proba
float64
0.5
1
text
stringlengths
16
174k
0.886063
The TU Dresden (abbreviated as TUD and often mistakenly translated[a] from German as Dresden University of Technology) is a public research university, the largest institute of higher education in the city of Dresden, the largest university in Saxony and one of the 10 largest universities in Germany with 37,134 students as of 2013[update]. It ranks among the best universities of engineering and technology in Germany. In 1828, with emerging industrialization, the "Saxon Technical School" was founded to educate skilled workers in technological subjects such as mechanics, mechanical engineering and ship construction. In 1871, the year the German Empire was founded, the institute was renamed the Royal Saxon Polytechnic Institute (Königlich-Sächsisches Polytechnikum). At that time, subjects not connected with technology, such as history and languages, were introduced. By the end of the 19th century the institute had developed into a university covering all disciplines. In 1961 it was given its present name, Technische Universität Dresden (Dresden University of Technology). Upon German reunification in 1990, the university had already integrated the College of Forestry (Forstliche Hochschule), formerly the Royal Saxony Academy of Forestry, in the nearby small town of Tharandt. This was followed by the integration of the Dresden College of Engineering (Ingenieurshochschule Dresden), the Friedrich List College of Transport (Hochschule für Verkehrswesen) the faculty of transport science, and the “Carl-Gustav Carus” Medical Academy (Medizinische Akademie or MedAk for short), the medical faculty. Some faculties were newly founded: the faculties of Information Technology (1991), Law (1991), Education (1993) and Economics (1993). In 2009 TU Dresden, all Dresden institutes of the Fraunhofer Society, the Gottfried Wilhelm Leibniz Scientific Community and the Max Planck Society and Forschungszentrum Dresden-Rossendorf, soon incorporated into the Helmholtz Association of German Research Centres, published a joint letter of intent with the name DRESDEN-Konzept - Dresden Research and Education Synergies for the Development of Excellence and Novelty, which points out worldwide elite aspirations, which was recognized as the first time that all four big post-gradual elite institutions declared campus co-operation with a university. TU Dresden is a campus university in most aspects. Some of its buildings are more than a hundred years old (such as the buildings around Muenchner Platz square). The architecture of these buildings is mostly influenced by the art nouveau style or the Bauhaus school (e.g. the Chemistry building Fritz-Foerster-Bau). In recent years these historic building have been complemented by modern buildings (e.g. the library, the main auditorium, the biochemistry department or the life sciences building). The main campus, as well as the medical faculty and that of Computer Science, are all within the boundaries of the city of Dresden. The main campus is located South of the city center, mostly in the area bordered by Nöthnitzer Straße, Fritz-Förster-Platz and Münchner Platz; the medical faculty can be found in the Johannstadt district. The faculty of forestry, formerly the Royal Saxon Academy of Forestry, resides in a forest area in the nearby town of Tharandt. TU Dresden has 14 faculties. Almost all faculties are located on the main campus South of the city center, except for the Faculty of Medicine that has its own campus near the Elbe river East of the city center and the Department of Forestry in Tharandt. With 4,390 students the Faculty of Mathematics and the Natural Sciences is the second-largest faculty at the university. It is composed of 5 departments, Biology, Chemistry, Mathematics, Physics and Psychology. The departments are all located on the main campus. In 2006, a new research building for the biology department opened. In October 2006 the Deutsche Forschungsgemeinschaft decided to fund a new graduate school, the Dresden International Graduate School for Biomedicine and Bioengineering and a so-called cluster of excellence From Cells to Tissues to Therapies. The Faculty of Architecture comprises 6 departments. Currently, there are 1,410 students enrolled. The Faculty of Civil Engineering is structured into 11 departments. It is the oldest and smallest of the faculties. There are currently 800 students enrolled. The Faculty of Computer Science comprises six departments: Applied Computer Science, Artificial Intelligence, Software- and Multimedia-Technology, Systems Architecture, Computer Engineering and Theoretical Computer Science. The faculty has 2,703 students. The Faculty of Electrical Engineering and Information Technology is organized into 13 departments. There are 2,288 students enrolled. The faculty is the heart of the so-called Silicon Saxony in Dresden. The Faculty of Environmental Sciences has 2,914 students. The faculty is located on the main campus, except for the Forestry department which is located in Tharandt. The Forestry department is the oldest of its kind in Germany. Its history goes back to the foundation of the Royal Saxon Academy of Forestry (Königlich-Sächsische Forstakademie) in 1816. The Faculty of Mechanical Engineering comprises 19 departments and has 5,731 students. It is the largest faculty at TUD. The Faculty of Transport and Traffic Sciences “Friedrich List” is the only of its kind in Germany covering transport and traffic from economy and system theory science to electrical, civil and mechanical engineering. There are 1,536 students enrolled. The Faculty of Business and Economics comprises five departments, Business Education Studies (Wirtschaftspädagogik), Business Management, Economics, Business Information Systems and Statistics. There are 2,842 students enrolled. The Faculty of Education, located East of the main campus, has 2,075 students. The Faculty of Languages, Literature and Culture is structured into five departments, American Studies, English Studies, German Studies, Philology, Romance Languages and Slavistics. There are 3,215 students at this faculty. The Faculty of Philosophy comprises seven departments, Art History, Communications, History, Musicology, Political Sciences, Sociology and Theology. There are 3,485 students enrolled. The School of International Studies is a so-called central institution of the university coordinating the law, economics and political sciences departments for courses of interdisciplinary international relations. The Carl Gustav Carus Faculty of Medicine has its own campus East of the city center near the Elbe river. Currently, there are 2,195 students enrolled. The faculty has a partnership with Partners Harvard Medical International. The TU Dresden benefits from the strong research tradition in microelectronics and transport sciences in the Dresden area, but also from the establishment of new research fields such as Biotechnology. The university has established a strong partnership with the Max Planck Institute for Molecular Cell Biology and Genetics in molecular bioengineering. As part of the German Universities Excellence Initiative, the Deutsche Forschungsgemeinschaft has decided to fund the Cluster of Excellence "From Cells to Tissues to Therapies: Engineering the Cellular Basis of Regeneration" (DFG-Center for Regenerative Therapies Dresden), as well as a new graduate school, the "Dresden International Graduate School for Biomedicine and Bioengineering" with about 300 PhD students. The Center of Biotechnology ("BIOTEC") is a unique interdisciplinary center focusing on research and teaching in molecular bioengineering. The BIOTEC hosts top international research groups dedicated to genomics, proteomics, biophysics, cellular machines, tissue engineering, and bioinformatics. The Deutsche Forschungsgemeinschaft funds research in the area of electromagnetic flow influence in metallurgy, artificial crystal formation and electrochemistry. Other research is done on the Meissner effect and artificial fibers (textile). Silicon Saxony is the biggest cluster of the microelectronics industries in Europe. TU Dresden is incorporated in this network with three departments of the Faculties of Electrical Engineering and Sciences. Together with the Fraunhofer Center for Nano-electronic technologies (CNT) it represents one of the leading universities in the field of nanotechnology. There is also a research cooperation with some semiconductor fields of TU Freiberg. In May 2012 the Helmholtz-Kolleg NANONET was founded. The university has a partnership with the Fraunhofer-Institut for Transport and Infrastructure systems to research on IT-systems for public transport in Dresden. In partnership with TU Dresden, the Ifo Institute of Economic Research (Ifo Institut für Wirtschaftsforschung e.V.) is researching the economic development in Eastern Germany. The university belongs to a consortium of European Universities offering the Erasmus Mundus Joint Doctoral Programme IT4BI-DC for Business Intelligence. The Deutsche Forschungsgemeinschaft supports the university in many areas and TU Dresden cooperates closely with renowned research institutes such as Fraunhofer Society, Gottfried Wilhelm Leibniz Scientific Community and Max Planck Society. The university ranks among the best universities worldwide for engineering and technology, particularly among the top 100 worldwide, top 30 in Europe, and top 10 in Germany. It is especially reputed in civil engineering. The university's business school counts as "excellent", and has a strong regional influence in Saxonia. It is particularly reputated for graduates in industrial engineering and business information system. As one of the first universities in Germany it has opened a branch in Hanoi, Vietnam offering a Master's course in mechatronics. It also maintains close partnerships with leading universities around the world, e.g. Boston University, Georgetown University, Harvard Medical School, Tongji University and POSTECH. Of the roughly 35,000 students, 45% are studying Engineering Sciences, 36.2% Humanities and Social Sciences, 12.5% Natural Sciences and Mathematics and 6.3% Medicine. About 59% (20,620) of the student body originates from Saxony, 18.9% (6,626) from other Eastern German federal states, 12.3% (4,306) from the Western German federal states and 9.8% (3,442) from other countries. Of the 20,620 students from Saxony, 12,351 (59.9%) are from Dresden, 2,934 (14.2%) from the Dresden metro area and 5,335 (25.9%) from other parts of Saxony. The origin of the students is based on the location where the A-level exams have been completed. There are 3,442 international students enrolled at the TU Dresden (2005/2006). Most of the foreign students come from Europe (1,527), followed by Asia (1,404) and America (170). Ranked by countries the largest group of students comes from China (710), followed by Poland (294), Vietnam (196), Bulgaria (160) and Russia (154). The university is also quite popular among Central and East European countries such as the neighboring Czech Republic or Ukraine. Also, through the Erasmus programme and partnerships with universities in the USA, there are many English, French and Spanish speaking students. The language spoken during lessons is nearly always German on most faculties. To prepare for admissions to the university, many foreign students attend German language courses at the University affiliated language school TUDIAS-Sprachschule. International students interested in TU Dresden should visit the websites of the "Akademisches Auslandsamt" (International office) for more information. This office is responsible for handling international applications. In the end of 2011 13.7% of beginning students came from abroad. A number of activities for international students facilitates their integration and help students to find new friends. Most notably the Erasmus-Initiative TU Dresden offers many group activities throughout the semester which are open to all students (not only to Erasmus participants). A student run program, the LinkPartnerProgramm matches every interested international student with a German student, to help him or her with questions arising during the first weeks, be it regarding course registration or any other issue students might have. Sports are very popular among the TUD students. There are eight big students' clubs and the summer campus party is considered to be the biggest in Germany. There are cafeterias as at most universities and the largest refectory can compete with some restaurants even as far as menu size. Among the many groups at the TU Dresden are four major ensembles. These four include the theater group "Die Bühne" which has a small ensemble directed by professionals, and the folk dance group "Folkloretanzensemble Thea-Maass" which is dedicated to reviving regional styles of dance. The last two groups are the largest by far and these are the University Choir and the University Orchestra, both having student and non-student members of all ages. In 1997 a part of the University Orchestra branched off into a chamber ensemble, becoming the "TU-Kammerphilharmonie", and since it consists almost exclusively of students the ensemble rehearses and performs only during the academic year. Each of these major ensembles performs an average of one to four times per semester. These performances often take place in Saxony but also occasionally internationally. The university is currently developing new strategies to make itself more independent from state funding and decision making. With regard to its ability to generate research money from industry partners, the TU Dresden belongs to the most successful in Germany. In 2004 3,564 projects were financed with 104.1 million Euro from outside sources (other than state funds). It has one of the highest shares of income by industry partnerships. Heinrich Barkhausen 1911–1953 (not continuously) – Communications technology. Discoverer of the Barkhausen jumps, a manifestation of domain wall movement in magnets. Victor Klemperer 1920–1935 – Professor for romance studies; He wrote “LTI”, an analysis of the Nazi's language, and detailed dairies during the Nazi time. Maria Reiche - (1903-1988) - mathematician, archaeologist, and technical translator has studied in this University. ^ There is no official translation of the university's name. By circular decree RS D1/05/05 “Technische Universität Dresden” is a proper name and registered trademark and to be used as such. It may be referred to as “TU Dresden” in English. While university of technology is commonly used in English, technical university would be the most fitting translation emphasising the difference between technique and technology in German. However, the term technical can be misleading (essential versus not proper meaning of "technology"). ^ a b c "Statistischer Jahresbericht 2015" (PDF). Technische Universität Dresden (in German). Retrieved 2017-06-10. ^ "Zahlen und Fakten zur TU Dresden". Technische Universität Dresden (in German). Retrieved 2017-06-10. ^ "Facts and figures of TU Dresden". TU Dresden. Retrieved 5 April 2018. ^ a b "Engineering and Technology". topuniversities.com. 3 March 2017. Retrieved 5 April 2018. ^ "Page not publicly available". TU Dresden. Retrieved 5 April 2018. ^ "QS World University Rankings 2018". topuniversities.com. 5 June 2017. Retrieved 5 April 2018. ^ a b "TU Dresden". Times Higher Education (THE). Retrieved 5 April 2018. ^ "Civil & Structural Engineering". topuniversities.com. 2 March 2017. Retrieved 5 April 2018. ^ "University and business school ranking in Germany". www.eduniversal-ranking.com. Retrieved 5 April 2018. ^ "Hochschulranking 2016: Das sind Deutschlands beste Unis". www.wiwo.de. Retrieved 5 April 2018. This page was last edited on 21 February 2019, at 13:46 (UTC).
0.997854
To date, almost half (48%) of the companies in the S&P 500 have reported earnings for the third quarter. Of these companies, 77% have reported actual EPS above the mean EPS estimate, which is above the five-year average of 71%. In aggregate, earnings have exceeded expectations by 6.5%, which is above the five-year average of 4.6%. Due to these positive EPS surprises, the earnings growth rate for the S&P 500 has improved to 22.5% today from 19.3% on September 30. Given the strong performance of actual earnings relative to analyst estimates and the improvement in the earnings growth rate over the past few weeks, how has the market responded to positive EPS surprises during the Q3 earnings season? Companies in the S&P 500 that reported positive earnings surprises for Q3 have seen a decrease in price of 1.5% on average from two days before the company reported actual results through two days after the company reported actual results. Over the past five years, companies in the S&P 500 that have reported positive earnings surprises have witnessed a 1.0% increase in price on average during this four-day window. If the final percentage for the quarter is -1.5%, it will mark the largest average price decline over this 4-day window for S&P 500 companies reporting positive EPS surprises since Q2 2011 (-2.1%). Why Is The Market Punishing Companies That Reported Positive Earnings Surprises? It is likely not due to EPS guidance or analyst revisions to EPS estimates for the fourth quarter. To date, 63% (26 of 41) of the companies that have issued EPS guidance for Q4 have issued negative guidance. This percentage is below the 5-year average of 70%. In aggregate, analysts have made smaller cuts than average to fourth quarter EPS estimates during the month of October (with five days remaining in the month).
0.999998
Secession was based on the idea of state rights (or “states rights,” a variant that came into use after the Civil War). This exalted the powers of the individual states as opposed to those of the Federal government. It generally rested on the theory of state sovereignty– that in the United States the ultimate source of political authority lay in the separate states. Associated with the principle of state rights was a sense of state loyalty that could prevail over a feeling of national patriotism. Before the war, the principle found expression in different ways at different times, in the North as well as in the South. During the war it reappeared in the Confederacy. The Constitution could be interpreted in opposite ways. In its clause giving Congress all powers “necessary and proper” for carrying the specified powers into effect, Alexander Hamilton as secretary of the treasury found ample authorization for his financial program, including a national bank. In the Tenth Amendment, however, Thomas Jefferson as secretary of state discovered a bar to congressional legislation of that kind: no power to establish a bank having been delegated to Congress, that power must have been reserved to the states. As president, George Washington sided with Hamilton and signed the bills that Congress passed to enact Hamilton’s plan. Eventually Jefferson withdrew from the Washington administration and, with Madison, organized an opposition to it. Thus, in the 1790s, originated the two parties, Federalist and Republican, the one willing to exploit the “implied powers” of the Constitution, the other demanding a “strict construction” of the document. The Republicans already convinced that much of the Federalist legislation was unconstitutional, were further outraged when, in 1798, Congress passed the Alien and Sedition Acts. The Sedition Act–providing for the fining and imprisoning of those who uttered anything “false, scandalous, and malicious” against the government, the Congress, or the president–seemed flagrantly to violate the First Amendment, which stated that Congress should pass no law abridging freedom of speech or of the press. What agency should decide the question of constitutionality? The Constitution did nor, in so many words, give the Supreme Court the power to decide, and the Republicans denied that the Court could rightfully assume the power. Their leaders, Jefferson and Madison, arguing that the state legislatures should decide, ably expounded their views in two sets of resolutions, one written (anonymously) by Jefferson and adopted by the Kentucky legislature (1798-1799) and the other drafted by Madison and approved by the Virginia legislature (1798). These Kentucky and Virginia Resolutions asserted the following propositions: The Federal government bad been formed by a “compact” or contract among the states. It was a limited government, possessing only specific delegated powers. Whenever it attempted to exercise any additional, undelegated powers, its acts were “unauthoritative, void, and of no force.” The parties to the contract, the states, must decide for themselves when and whether the central government exceeded its powers. The state legislatures must serve as “sentinels” to watch out for unconstitutional acts. And “nullification” by the states was the “rightful remedy” whenever the general government went too far. The resolutions urged all the states to join in declaring the Alien and Sedition Acts null and void and in demanding their repeal at the next session of Congress, but none of the other states went along with Virginia and Kentucky. State rights and strict construction were usually the arguments of the party out of power (and so they were to he throughout American history). As long as the Republicans were outsiders, they remained strict constructionists, hut once they had become insiders, with Jefferson as president, they used the full powers of the Federal government to further the agrarian interests they represented. Indeed, they used much more than the rightful and constitutional powers, according to the Federalists, who now adopted the state rights point of view. During the presidency of Jefferson’s friend and successor James Madison, the New England state rights men gained their largest following in opposition to the War of 1812. In Congress, Webster attacked and helped defeat a conscription bill. “The operation of measures thus unconstitutional and illegal ought to be prevented by a resort to other measures which are both constitutional and legal,” he declared, hinting at nullification by New Hampshire. “It will be the solemn duty of the state governments to protect their own authority over their own militia and to interpose between their citizens and arbitrary power” In fact, some of the New England states, by refusing to support the war, virtually nullified the war effort of the Federal government. New England state-rightism and sectionalism reached a climax in the Hartford Convention (1814-1815), which demanded changes in the Constitution and threatened secession if they were not made. Some of Jefferson’s followers had turned against him when, as they saw it, he departed from his own principles. His distant cousin and (before 1804) House leader John Randolph of Roanoke organized within the Republican party a state rights faction known as the Quids. Randolph remained a fanatical defender of Virginia rights. John Taylor of Caroline, an equally consistent but more original thinker than Randolph, led the Virginia School, which included St. George Tucker and Spencer Roane. These men rationalized resistance to the centralizing trend, especially to the work of the Supreme Court under Virginian John Marshall. Jefferson, after his retirement from the presidency, joined in opposing the Federalist-minded judges as “sappers and miners” who were undermining the Constitution. The Georgia state rights men, whose leader was William H. Crawford, had their own quarrel with Marshall, who ruled against them when the state undertook to evict its Indians from their tribal lands. John C. Calhoun was a latecomer to the state rights cause, but he developed the theory more fully than anyone else. In Congress he had favored the War of 1812 and had advocated protective tariffs, internal improvements at Federal expense, and a national bank. By 1828 he was convinced that a protective tariff was not only harmful to his state, South Carolina, but was also contrary to the Constitution. He then began to work out his system for state resistance to unconstitutional laws. Calhoun refined and elaborated the doctrine of sentinelship that Madison and Jefferson had presented in the Virginia and Kentucky Resolutions. He based his theory on the assumption that the people (not the government) in each state were sovereign and, in their sovereign capacity, had ratified and thus given validity to both the state constitution and the U.S. Constitution. They had done so, he argued, through their delegates in specially elected conventions. In this ratification process he discovered the procedure for dealing with questions of constitutionality. A state convention–not the state legislature as in Madison’s and Jefferson’s proposal could nullify a Federal law. That law would remain null and void within the state until three-fourths of all the states had ratified a constitutional amendment specifically giving Congress the power in question. If they should ever do so, the nullifying state would still have a recourse secession. Just as a state could “accede” to the Union by ratifying the Constitution, it could “secede” by repealing its ordinance of ratification. South Carolina put nullification to the test in 1832, when a state convention declared all protective tariffs, particularly those of 1828 and 1832, to be null and void within the state. Calhoun having resigned the vice presidency, the nullifiers sent him to the Senate to present their case. Debating him was Daniel Webster, now a senator from Massachusetts, who had switched from a state rights position to a nationalist one while Calhoun was doing the reverse. “The truth is,” Webster contended, “and no ingenuity of argument, no subtlety of distinction, can evade it, that, as to certain purposes, the people of the United States are one people.” According to the new Webster, a state might secede from the Union, but only on the basis of the right of revolution, not on the basis of any constitutional right. While remaining in the Union, however, a state could not nullify congressional acts, for nullification was no right at all, he maintained. President Andrew Jackson, agreeing with Webster, denounced nullification as treason and asked Congress for authority to use the army and the navy to enforce the laws. Though the nullificationists had sympathizers in other Southern states, not one of those states officially endorsed the South Carolina stand. Calhoun claimed a victory for nullification when Congress passed and Jackson signed a compromise bill for gradually lowering the tariff But nullification had not really worked the way Calhoun had intended. It had not been generally accepted as a legitimate and constitutional procedure. Calhoun came to realize that a single state, unaided, was powerless to interpose against Federal authority. So he set about cultivating a spirit of unity among all the slave states. Slavery, according to Calhoun, occupied a special place in the Constitution, and certainly it occupied a special place in his theory of state rights. It was, he insisted, the only kind of property that the Constitution specifically recognized (though, in fact, the document did not mention slaves or slavery by name; it referred only to “free Persons” and “all other Persons” and to a “Person held to Service or Labour“). Therefore, nullification could be used to defend or strengthen slavery but not to attack or weaken it. Calhoun strenuously objected when, after 1842, several free states tried their own brand of nullification by adopting “personal liberty” laws that forbade state authorities to assist in the enforcement of the Federal Fugitive Slave Act of 1793. Calhoun was farther outraged when the House, though not the Senate, passed the Wilmot Proviso in 1848, which aimed to exclude slavery from all territories to be acquired in consequence of the Mexican War. Then, when the Compromise of 1850 proposed to admit California as a free state and thus to upset the balance of free and slave states, he thought the time had come for the slave states to resort to their ultimate redress, secession. During the 1850s the doctrine of state rights became a dogma of stare powers–powers that extended beyond the boundaries of the states themselves. The development of this dogma was occasioned by the question of slavery in the territories. Many Northerners held that Congress could exclude slavery, as it had done with respect to the Northwest Territory in the Northwest Ordinance (1787, 1789) and with respect to part of the Louisiana Purchase in the Missouri Compromise (1820-1821). Some advocated “popular sovereignty,” or “squatter sovereignty,” which would allow the settlers themselves to decide whether to permit slavery in a particular territory, and this principle was embodied in the Kansas-Nebraska Act of 1854. But proslavery Southerners insisted that any prohibition of slavery in a territory, whether by Congress or by the local people, was unconstitutional. From the proslavery point of view, the sovereign stares had delegated to Congress only the power to make routine “rules and regulations” for the territories, not the power to make basic policies for them. When dealing with the subject, the Federal government must act merely as a trustee for the states and must give effect to their laws, particularly the laws respecting slavery State rights was no longer just a defense of local self-determination; it had become a means of imposing a states laws on people outside the state. For the time being, the strongest assertion of state rights in defiance of Federal authority came not from any Southern state hut from Wisconsin, which invoked the doctrine to oppose slavery rather than to support it. When a Federal court convicted Sherman Booth of violating the Fugitive Slave Act of 1850, the Wisconsin Supreme Court repeatedly (1854-1855) issued Writs of habeas corpus to release him on the ground that the act was unconstitutional. Booth and fellow antislavery radicals made state rights a test of orthodoxy in the newly formed Republican party; they demanded that the party’s candidates endorse the principles of the Virginia and Kentucky Resolutions of 1798 and 1799. In the case of Ableman v. Booth (1859) Taney and the Supreme Court again upheld the Southern as opposed to the Northern state rights position. They overruled the supreme court of Wisconsin. The Wisconsin governor then reasserted the sovereignty of his state. As commander in chief of the state militia, he challenged the president as commander in chief of the U.S. Army and Navy. “It is reported,” a Wisconsin official notified the captain of one of the militia companies, “... that you have stated that, in the possible contingency of a conflict between the U.S. authorities and those of this State, you . . . would obey a call for your company to turn out, made by the U.S. authorities, but would not obey a call by your superior officials under the State laws.” When the captain replied that he would consider it treason to disobey a presidential order, the governor dismissed him and disbanded his company. That was in 1860, only months before South Carolina began the secession of the Southern states. Some advocates of secession justified it as a revolutionary right, but most of them based it on constitutional grounds. The 1860 South Carolina Declaration of the Causes of Secession quoted the states 1852 declaration, which said that “the frequent violations of the Constitution of the United States by the Federal Government, and its encroachments upon the reserved rights of the States,” would justify the state in withdrawing from the Union. The South Carolina secession ordinance, following the procedure that Calhoun had prescribed, simply repealed the states ratification of the Constitution and subsequent amendments. The secession ordinances of other states did the same. In sum, the new Constitution was more national than the old one with regard to slavery, which it guaranteed as a nationwide institution. The document provided no more basis for nullification or secession than its predecessor had done–despite the preambles reference to the member states as “sovereign” and “independent.” Nevertheless, there remained room for the reassertion of state rights in the Confederacy. To win its independence, the Confederacy needed a government strong enough to make the most of all the available human and material resources, but some of the state leaders were no more willing to concede power to the Confederate government than they had been to the Federal government. Appealing to the principle of state rights, they resisted the efforts of the Jefferson Davis administration to control blockade running and manufacturing, to impress slaves and other property, and even to raise troops. Georgia was the locus of the greatest recalcitrance, Joseph B. Brown the most obstreperous of the governors, and Vice President Alexander H. Stephens the busiest fomenter and philosopher of resistance. North Carolina, under Governor Zebulon Vance, was the next most important center of obstructionism, but practically all the states had some occasion for expressing opposition to Confederate measures. To enforce conscription, Congress authorized the president to suspend the privilege of the writ of habeas corpus. To Stephens, this seemed as bad as conscription itself He denounced the suspension in resolutions, which the Georgia legislature passed and which, along with speeches by Brown and Stephens’s half-brother Linton Stephens, were printed and widely circulated. The legislatures of North Carolina and Mississippi adopted similar resolutions. Despite the pro-Confederate decisions of state courts, conflicts between the Confederate government and the state governments persisted. Texas objected to giving up control of state troops, as did Alabama, Mississippi, and all the Gulf states except Florida. A Florida judge, however, issued an injunction against Confederate officers who were ordered to take up some of the track of the Florida Railroad – and who disregarded the injunction. More serious obstruction came from North Carolina, where Governor Vance took pains to “preserve the rights and honor of the State.” He said it was “mortifying” to see North Carolinians “commanded by strangers” – that is, by men from other states – and he demanded that their officers be North Carolinians. Operating a state-owned blockade-runner, Advance, he objected to the Confederacy’s claim to half of the cargo space. He warehoused uniforms, shoes, and blankets for the exclusive use of North Carolina troops at a time when Robert E. Lees’ army in Virginia was suffering from the want of such supplies. State officials being exempt from the draft, he appointed thousands of men to state jobs to keep them out of the Confederate army. Others minimize its effects, pointing out that it was a symbol of more fundamental grievances (as, indeed, it had been throughout American history). Some have even argued that it was an asset rather than a liability to the Confederate cause, since, they say, it served as a safety valve for possibly disruptive discontent. Afterward Davis agreed with Stephens about the basic issue of the war. In A Constitutional View of the Late War between the States (1868-1870) Stephens maintained: “It was a strife between the principles of Federation, on the one side, and Centralism, or Consolidation, on the other.” In The Rise and Fall of the Confederate Government (1881) Davis held that the Confederates had “fought for the maintenance of their State governments in all their reserved rights and powers.” Both men forgot that the preservation of slavery had been the object of state sovereignty, state rights, secession, and the formation of the Confederacy. This entry was posted in Mr. Adair's Classroom on December 20, 2011 by The Publisher.
0.999971
Prepare an unusual, unordinary breakfast and make yourself a morning to remember. Put some peanut butter on your bread or a toast along with slices of banana to create ears and nose. Take blueberries to be your eyes and use one of them for the nose (place it on top of the banana). Put cream cheese on the toast. Use banana slices for nose and ears. Again, take blueberries to make eyes and a blueberry on the banana nose. 1. Put peanut butter on the toast. Use a strawberry in the upright position in the place of a nose and put banana slices down below. 2. Use strawberry slices cut in half for ears. Place blueberries as eyes and coconut strips as whiskers. 1. Put cream cheese on the toast. Use kiwi slices for eyes. Place your slices of strawberries over the toast, as ears. 2. Use a blueberry for the nose and pepitas for mouth. In order to form whiskers, use almond slivers. 1. Put smashed avocado on the toast and use bell pepper as a beak. To form eyes, lay down salami slices and cover them with sliced hard-boiled egg. Use almonds for feathers. Place your toasts sideways and cover them with Nutella. Cut apples into zig-zag shapes and use the slices for a mouth. Place banana slices to form eyes, and raspberries for ears. 1. Place hummus on the bagel and cover with provolone. Use a carrot for the nose. Lay down cucumber slices and cover them with tomatoes to form eyes. 2. Take a bacon strip to form a mouth. For hair use scrambled eggs and take orange wedges to make ears.
0.953128
This article lists the heads of state of Panama since the short-lived first independence from the Republic of New Granada in 1840 and the final separation from Colombia in 1903. (1845–1910) 1 October 1908 1 March 1910 National Liberal Party 1908 Died in office. (1856–1916) 1 March 1910 1 October 1910 National Liberal Party — Acting President. (1851–1924) 1 October 1910 5 October 1910 National Liberal Party — Acting President. (1836–1920) 5 October 1910 1 October 1912 National Liberal Party — Acting President. (1856–1942) 1 October 1912 1 October 1916 National Liberal Party 1912 First tenure. (1867–1918) 1 October 1916 3 June 1918 National Liberal Party 1916 Died in office. (1863–1922) 3 June 1918 1 October 1918 National Liberal Party — Acting President. (1852–1919) 1 October 1918 12 October 1918 Conservative Party — Acting President. (1856–1942) 12 October 1918 30 January 1920 National Liberal Party 1918 Second tenure. (1876–1922) 30 January 1920 1 October 1920 National Liberal Party — Acting President. (1856–1942) 1 October 1920 1 October 1924 National Liberal Party 1920 Third tenure. (1872–1945) 1 October 1928 3 January 1931 National Liberal Party 1928 Deposed in a coup d'état. (1886–1963) 3 January 1931 16 January 1931 Independent — Acting President. (1879–1939) 1 October 1936 16 December 1939 National Liberal Party 1936 Died in office. (1886–1946) 16 December 1939 18 December 1939 National Revolutionary Party — Acting President. (1879–1957) 18 December 1939 1 October 1940 National Revolutionary Party — Acting President. (1901–1988) 1 October 1940 9 October 1941 National Revolutionary Party 1940 First tenure. Deposed in a coup d'état. (1888–1970) 15 June 1945 7 August 1948 National Liberal Party 1945 Provisional President. (1875–1949) 7 August 1948 28 July 1949 National Liberal Party 1948 Resigned after a heart attack, and died less than a month later. (1905–1981) 20 November 1949 24 November 1949 National Liberal Party — First tenure. (1901–1988) 24 November 1949 9 May 1951 Panameñista Party — Second tenure. (1908–1955) 1 October 1952 2 January 1955 National Patriotic Coalition 1952 Assassinated. (1905–1981) 1 October 1960 1 October 1964 National Liberal Party 1960 Second tenure. (1901–1988) 1 October 1968 11 October 1968 Panameñista Party 1968 Third tenure. (1919–1979) 12 October 1968 18 December 1969 National Guard — Chairman of the Provisional Junta. (1925–1999) 19 December 1969 11 October 1978 Independent 1972 Chairman of the Provisional Junta to 11 October 1972. (1937–2015) 28 September 1985 26 February 1988 Republican Party — Acting President. (1917–2009) 26 February 1988 1 September 1989 Democratic Revolutionary Party — Acting President. (born 1938) 1 September 1989 20 December 1989 Democratic Revolutionary Party — Provisional President. Deposed in the US invasion. (born 1946) 1 September 1999 1 September 2004 Panameñista Party 1999 Widow of Arnulfo Arias. (born 1963) 1 September 2004 1 July 2009 Democratic Revolutionary Party 2004 Son of Omar Torrijos. Panama was from 1968–1989 de facto controlled by a military junta which appointed the nominal president, who himself had little power, while the junta and its leaders, while not official heads of state, exerted actual control over the country. Leaders of the junta were styled "Maximum Leader of the Panamanian Revolution". (1929–1981) 11 October 1968 31 July 1981 National Guard Styled as Maximum Leader of the Panamanian Revolution from 1972. Killed in an air crash. (until 29 September 1983.) Styled as Maximum Leader of the National Liberation from 15 December 1983. ^ a b c d ".:: SomosPanama.com ::". archive.org. 2 April 2016. Retrieved 7 April 2018. This page was last edited on 16 April 2019, at 06:47 (UTC).
0.999997
To understand Enterprise DevOps, we have to first define what "regular" DevOps is. Here is my current definition of DevOps. Let's call it "DevOps 0.1" DevOps is the Agile operating model of modern IT, and is centered around the idea of a continuous delivery pipeline as the main building block of an Agile organization. DevOps is based on lean development concepts, as well as the lean startup movement's ideas. As such, the "build, measure, learn", the scientific method mantra, is very relevant to DevOps. In order to create a pipeline-centered organization that is able to seize opportunities in the marketplace quickly.
0.995398
Allow creation of connection "symlinks" Our organization has hundreds of connections spread out over multiple locations. It would be useful to be able to have one master connection file with all the various connection types, but to also be able to create other connection files which refer to those master connections without being copies of them. This would allow for one connection file to be organized by location, another to be organized by service type, another by connection type, etc., without having to update multiple entries if a connection's details changed. We can already refer to named credentials stored in other connection files, and I'm imagining this working much the same way.
0.99696
For the past 10 years 'truthers' have claimed 9/11 was part of a bigger conspiracy – but does the evidence stack up? Truthers say video footage of the buildings falling points to demolition due to the way the towers bend before collapsing. Also, there appear to be explosions as the windows blow out, floor by floor, from the top downwards. One US academic claims to have tested samples from the wrecked towers which show the presence of chemical residue, suggesting explosives had been used. But in controlled explosion demolition experts collapse a building from the bottom not the top. Experts say the windows were blown out as each floor collapsed on to the one below, sending debris and office equipment flying out. It would also have taken considerable work, which would not have gone unnoticed, to plant sufficient explosives the length of the buildings to bring them down. The evidence for this, say sceptics, is that the major damage to the building comprised a roundish blast hole, not the more extended destruction some say would be caused by aeroplane wings. Truthers claim parts of a scrapped plane, including the tail, were moved to the Pentagon as part of the fabrication. This theory ignores the considerable evidence of the bodies of passengers and crew at the site which were photographed. Thousands of people saw the plane circle then fly into the Pentagon. Some quickly photographed the scene. Anyone planting plane debris at the site afterwards would surely have been seen. This theory is partly based on a remark by the owner of the building who, fearing it was about to collapse, said firefighters inside should be brought out immediately. He used the words: "Pull it". This remark has been interpreted as slang for demolishing the building. In fact, the collapse was caused by intense fires in one of the neighbouring twin towers that spread to WTC 7, causing its steel beams to buckle and the building to come down. Some conspiracy theorists believe the passengers supposedly on board were either killed elsewhere and their bodies dumped at sea, or were part of the conspiracy and are now in hiding with new identities. A key piece of evidence claimed for this theory is that the mobile phone calls the victims are recorded as having made to loved ones from the doomed planes were not possible because of the altitude of the aircraft and therefore faked using "voice morphing technology". However, phone records show the calls were made from satellite phones fitted to the back of the aircraft seats. The evidence claimed for this theory is that 4,000 Jews who supposedly worked at the WTC failed to report for work on 11 September because they had been forewarned by the Israeli intelligence service, Mossad. However, the figure appears to be based on a statement made by the Israeli foreign minister that about 4,000 Israelis were in the cities under attack at the time. More than one in ten of those who died on 9/11 were Jewish. The trading has been tracked to other causes. This is great! Looks like a child wrote it ! Can't believe this is an actual article in the guardian! TimmyG on Tue, 09/06/2011 - 3:44am.
0.994319
Hkube allow special signs in the nodes input that designed to define the pipeline execution flow. You can define reusable data for nodes input, this input is an object that called flowInput. Using the @ sign we can easily refer to this object. we can take node output and make it the input of another node. The blue circle is the pipeline driver which responsible for executing nodes with the right order and the right input. Each result from any node is always return to the pipeline driver which decide what to do next. Green node will run first because it does not depend on any other node. Green node input will be: [false, "OK"]. Yellow node depends on green node, see the "@green" in the input of the yellow node. So the input of the yellow node will be: [true, green node output]. The last node to run will be the red node because it depend on the completion of the yellow node. The input of the red node will be: [yellow node output, 512]. The final results of this pipeline will be the output of the red node. That because the red node is the last node in the pipeline. By using # in the input we can execute nodes in parallel and reduce the results into single node. This example is exactly like the first one, except the # sign in the input of the green node. The green node will run as a batch because of the # sign in the input. This pipeline will create three different tasks from type green-alg. The yellow node will wait until all tasks of the green node will finish. The input of the yellow node will be: [true, green node output]. By using #@ in the input we can create a batch processing on node results. Lets say that green node returns an array: ['A', 'B', 'C']. Node yellow will run three times, each with a different input. By using *@ in the input we can create a wait any on batch. The green node is defined to run as batch "#[1,2,3]". The first argument is 10 and the second is one number from the batch array. For each run it's return the sum of these two numbers. Now what if we don't want that Node yellow will wait until all the batch processing is done? We can define in the node input to wait for any result of green, like this: "@green". This way Node yellow will run three times, each with different input from *Node green output. We want to run node that will accept results with same order they have been created. In this example the Node red will run with the correct tuples. This is default behavior of the system.
0.975754
Unable to link UVMC Lib? Hi, I am trying to connect SV-SC ports via UVMC and while sccom -link I am getting below error. I am running simulation in windows. Using UVM-1.0p and UVMC-2.2. Individual compilation of SV and SC is clean with UVMC-2.2 but problem when linking them. Can anyone suggest a solution? Dhaval # work\_sc\win32_gcc-4.2.1\sc_main.o:sc_main.cpp:(.text$_ZN4uvmc21uvmc_initiator_socketILj32EN3tlm23tlm_base_protocol_typesELi1ELN7sc_core14sc_port_policyE0E14uvmc_converterINS1_19tlm_generic_payloadEEE15nb_transport_bwERS6_RNS1_9tlm_phaseERNS3_7sc_timeE[uvmc::uvmc_initiator_socket<32u, tlm::tlm_base_protocol_types, 1, (sc_core::sc_port_policy)0, uvmc_converter >::nb_transport_bw(tlm::tlm_generic_payload&, tlm::tlm_phase&, sc_core::sc_time&)]+0x93): undefined reference to `C2SV_nb_transport_bw' # work\_sc\win32_gcc-4.2.1\sc_main.o:sc_main.cpp:(.text$_ZN4uvmc20uvmc_tlm2_port_proxyIN3tlm19tlm_generic_payloadENS1_9tlm_phaseE14uvmc_converterIS2_EE21blocking_sync_processEv[uvmc::uvmc_tlm2_port_proxy >::blocking_sync_process()]+0xe9): undefined reference to `C2SV_blocking_rsp_done' # work\_sc\win32_gcc-4.2.1\sc_main.o:sc_main.cpp:(.text$_ZN4uvmc20uvmc_tlm2_port_proxyIN3tlm19tlm_generic_payloadENS1_9tlm_phaseE14uvmc_converterIS2_EE21blocking_sync_processEv[uvmc::uvmc_tlm2_port_proxy >::blocking_sync_process()]+0x11b): undefined reference to `C2SV_blocking_req_done' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x52ec): undefined reference to `UVMC_get_uvm_version' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x54ac): undefined reference to `UVMC_get_config_string' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x550d): undefined reference to `UVMC_get_config_int' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x554f): undefined reference to `UVMC_set_config_string' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x5593): undefined reference to `UVMC_set_config_int' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x55c7): undefined reference to `UVMC_find_factory_override' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x5658): undefined reference to `UVMC_debug_factory_create' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x5693): undefined reference to `UVMC_set_factory_type_override' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x56c5): undefined reference to `UVMC_set_factory_inst_override' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x56f1): undefined reference to `UVMC_print_factory' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x572d): undefined reference to `UVMC_report' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x5769): undefined reference to `UVMC_report' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x57a5): undefined reference to `UVMC_report' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x57e2): undefined reference to `UVMC_report' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x5821): undefined reference to `UVMC_report' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x585b): undefined reference to `UVMC_set_report_verbosity' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x588d): undefined reference to `UVMC_report_enabled' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x58c3): undefined reference to `UVMC_drop_objection' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x58f5): undefined reference to `UVMC_raise_objection' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x5939): undefined reference to `UVMC_wait_for_phase_request' # work\_sc\win32_gcc-4.2.1\uvmc.o:uvmc.cpp:(.text+0x59e6): undefined reference to `UVMC_print_topology' # collect2: ld returned 1 exit status # ** Error: (sccom-6126) Linking failed. Creation of work/systemc.so failed.
0.999584
The 2011 NBA Draft was held at the Prudential Center in Newark, New Jersey on June 23rd, 2011. The draft was broadcast on ESPN and kicked off at 7PM EST and consisted of two rounds of 60 total picks. Each team in the NBA took turns based on the draft order and were able to choose eligible US college basketball players, international players, and other eligible participants. The Cleveland Cavaliers had the first pick in the draft, and they chose the star freshman, Duke guard, Kyrie Irving with the first overall pick of the draft. There was one D-League player chosen with the 2011 NBA Draft, and there were also 12 overall international players chosen in the NBA Draft. 2011 was notable in that it was the final time that the New Jersey Nets would make a selection in the draft before making the relocation to Brooklyn, New York. When is the 2014 NBA Draft?
0.983339
From the Bill of Rights to "Occupy Wall Street" What were the significant ideas and social movements that shaped our nation? America was founded on bold ideas and beliefs. This book examines the ideas and movements that shaped our nation, presenting thorough, accessible entries with sources that improve readers' understanding of the American experience. Presenting accessibly written information for general audiences as well as students and researchers, this three-volume work examines the evolution of American society and thought from the nation's beginnings to the 21st century. It covers the seminal ideas and social movements that define who we are as Americans—from the ideas that underpin the Bill of Rights to slavery, the Civil Rights movement, and the idea of gay rights—even if U.S. citizens often strongly disagree on these topics. Organized topically rather than chronologically, this encyclopedia combines primary sources and secondary works or historical analyses with text describing the ideas and movements in question. In addition, each entry includes a list of suggestions for further reading that directs readers to supplementary sources of information. The set's unique perspective serves to depict how American society has evolved from the nation's beginnings to the present, revealing how Americans as a people have acted and responded to key ideas and movements. Michael S. Green, PhD, is professor of history at the University of Nevada, Las Vegas. His publications include ABC-CLIO's Politics and America in Crisis: The Coming of the Civil War and several books on the Civil War era and on Western history. He holds a doctorate in history from Columbia University and was the recipient of the American Historical Association's Eugene Asher Distinguished Teaching Award. Scott L. Stabler, PhD, is associate professor of history at Grand Valley State University. He was a Fulbright Scholar to Ghana in 2010. His published works include "Atlantic Slavery: Lost in Trans-lation" with Mary Owusu in African Journal of Teacher Education; "Oliver Otis Howard" in the book Soldiers West: Biographies from the Military Frontier; and "Free Men Come to Houston: Blacks during Reconstruction" in The Houston Review of History and Culture.
0.999998
Cite this article as: Lewin JM, Hale EK. A Keratoacanthoma Occurring Post Non-ablative Resurfacing. Ann Med Case Rep. 2017; 1: 1031. This case regarding a Caucasian female patient who suffered from discoloration and rhytides on her face, neck and chest with a past history of non-melanoma skin cancer followed by Mohs micrographic surgery. The patient was treated with methotrexate injections to cure her problem. Multiple eruptive keratocanthomas have been reported on the dorsal hands and face following treatment with fractional and non-fractional ablative carbon dioxide (CO2) lasers respectively [1,2]. More recently, eruptive keratoacanthomas (KA’s) have been reported on the legs in two patients following treatment of photoaging with non-ablative fractional photothermolysis with a 1,550 nm erbium-doped laser (Fraxel SR, Reliant Technologies Inc., San Diego, CA) . A 54-year-old Caucasian woman with Fitzpatrick skin type III presented with discoloration and rhytides on her face, neck and chest. She had a history of non melanoma skin cancer that had been treated with Mohs micrographic surgery in the past. Her medical history was remarkable only for intermittent orolabial herpes simplex outbreaks. On examination, the patient had reticulated light brown macules and patches and static rhytides on her face, neck and chest. The patient chose to undergo treatment with non-ablative fractional photothermolysis with a 1,550 nm erbium-doped laser for face, neck and chest. Prior to treatment the patient was given oral valacyclovir for herpes simplex prophylaxis and the areas to be treated were anesthetized with topical lidocaine followed by supraorbital, infraorbital and mental nerve blocks with 1% plain lidocaine. Treatment settings were as follows: fluence 60 mJ/cm2, treatment level 10 with 8 passes. A cold-air cooling device was used for patient comfort and the patient tolerated the procedure well. Five days after the procedure the patient developed an enlarging, tender, solitary erythematous papulonodule on her left nasal supratip (Figure 1). She denied drainage and denied fever or chills. The patient was empirically started on oral doxycycline for a presumed furuncle and a shave biopsy of the nodule revealed the surface of a keratoacanthoma. The patient was treated with four injections of intralesional methotrexate 25 mg/mL, four weeks apart with resolution of the lesion clinically and histologically (Figure 2). Keratoacanthomas (KA’s) are considered low-grade malignant skin tumors that may arise over sites of trauma. To our knowledge this is the first case of a solitary KA occurring on the face following non-ablative fractional photothermolysis with a 1,550 nm erbium-doped laser. In addition, the onset of our patient’s KA five days post procedure is more rapid than those previously reported in the literature occurring 4-6 weeks following treatment of the legs with fractional 1,550 nm erbium-doped laser . Fractional photothermolysis (FP) is considered to be very safe with a large retrospective study of 961 patients treated with FP having an overall complication rate of 7.6%; these included acneiform eruptions (1.9%) and herpes simplex virus outbreaks (1.8%) most frequently observed and no tumor development reported . It has been proposed that the pathogenesis of KAs occurring in the setting of non-ablative FP may be related to trauma to the follicular unit since acneiform eruptions are also frequently seen in this setting . In the case of KAs occurring after fractional ablative CO2 laser resurfacing, it has been suggested that a pathergy from trauma triggers an upregulation of the inflammatory response and a downregulation of the immune response which leads to undue susceptibility to a second stimulus . The authors believe that the etiology of a KA following non-ablative fractional resurfacing is likely multifactorial and in this case involved a predisposed host with a history of photo damage and non-melanoma skin cancer plus the microthermal injury induced by the laser as a trigger. A solitary facial KA developing following fractional non-ablative 1,550 nm laser resurfacing is undoubtedly a rare phenomenon given the large number of such procedures performed in this patient population and the paucity of cases reported in the literature. We also find it noteworthy that in all other reports of post-laser KA development, multiple KA’s erupted, whereas in this case the lesion was solitary. This could suggest the ‘unmasking’ of a subclinical low-grade premalignant lesion that was present pre-procedure on the patient’s nasal supratip. Our patient was treated with four rounds of intralesional methotrexate with resolution of the lesion. In a retrospective study of 38 KA’s treated with either 12.5 mg/mL or 25 mg/mL of intralesional methotrexate and a mean of 2.1 injections, 92% of patients achieved resolution with this modality alone . We believe this variant of KA occurring post laser resurfacing represents a clinically and prognostically different entity from the well-differentiated squamous cell carcinoma-KA type which should be treated with surgical extirpation and margin assessment. However, to be cautious we performed a frozen section histologic evaluation of the site following treatment with methotrexate to ensure no residual atypia was present. An enlarging, tender, solitary erythematous papulonodule on left nasal supratip. After four injections of intralesional methotrexate. Obed J, Land M, Aguilera SB. A pathergic response to fractional CO2. J Drugs Dermatol. 2012;11(9):1122-3. Gewirtzman A, Meirson DH, Rabinovitz H. Eruptive keratoacanthomas following carbon dioxide laser resurfacing. Dermatol Surg. 1999;25(8):666-8. Mamelak AJ, Goldberg LH, Marquez D, Hosler GA, Hinckley MR, Friedman PM. Eruptive keratoacanthomas on the legs after fractional photothermolysis: report of two cases. Dermatol Surg. 2009;35(3):513-8. Graber EM, Tanzi EL, Alster TS. Side effects and complications of fractional laser photothermolysis: experience with 961 treatments. Dermatol Surg. 2008;34(3):301-5. Annest NM, VanBeek MJ, Arpey CJ, Whitaker DC. Intralesional methotrexate treatment for keratoacanthoma tumors: a retrospective study and review of the literature. J Am Acad Dermatol. 2007;56(6):989-93.
0.998736
If a borrower exercises their right to rescind, what is actually rescinded? When a borrower rescinds a loan, the borrower is declaring that the loan documents that were signed are null and void and cancelling the loan request that was originally made. Rescission is a protective measure to permit borrowers a chance to re-think their decision to pledge their home as collateral. It is afforded to borrowers who have already signed the closing documents and left the closing table. The borrower has a right to rescind only in the case of a refinance transaction that is secured by a mortgage on the borrower's primary residence. The right to rescind document is presented at the closing table and sets forth the guidelines by which the borrower can cancel the transaction. The key element to rescission is that the borrower must do so within 3 business days. Saturdays do count, Sundays and national holidays do not. The right to rescind document will show the specific time and date by which the borrower must give notice. Look or ask to see the phrase, "By midnight of ...". If and when a borrower does want to rescind, it should be done in writing but also confirmed via telephone with the closing agent, the person or company that witnessed the borrowers signatures on the note and mortgage. And when rescinded, the loan request is considered closed. The borrower can make a new request for credit, with the same lender or any other lender, but any and all documents gathered per this rescinded request are null and void.
0.997429
You have found yourself in a situation that makes you unhappy and you aren't sure how to proceed. You feel stuck, trapped, or just at a loss of how to get where you want to go. You know you want something different but don't want to "rock the boat". have a nagging voice inside yourself that is telling you "I want something different" I love to empower people. You are the glue that holds everything together. What is holding you together? The best way to help everyone else is to help yourself first.
0.999913
Want to get rid of an app on BlueStacks? This can be done in two ways i.e. Using BlueStacks Settings or Using Advanced Settings and both of them are quite easy to perform. This article will guide you to uninstall apps on BlueStacks. Start BlueStacks. Open any app from the apps folder in the Library or using the icon to start BlueStacks. Open BlueStacks Settings. Select All Apps from the top-right side of the screen to open the App Drawer. Select BlueStacks Settings (wrench icon) to open the settings menu. Choose App Size: App size can be re sized through this option. App size differ on the basis of tablet or default BlueStacks application. Select one of them to change the app size. Delete apps: Selecting this option will initiate the uninstalling procedure of the app. Select the Delete option (trash icon) to uninstall the application. Select the trash icon on the row of the app you wish to uninstall. Confirm your decision. A pop-up box will appear asking you to confirm your decision to uninstall the app. Select Continue to uninstall the app. Wait till a horizontal red line appears striking the app name. As soon as the app is uninstalled, a red horizontal line appears on the name of the app indicating that the app has successfully uninstalled. Also, a pop-up balloon appears on the task bar informing that the app has been uninstalled. Open BlueStacks Settings. Open the app drawer and select BlueStacks Settings (wrench icon) to open the settings menu. Select Advanced Settings from the menu. Select Advanced Settings (wrench icon similar to that of BlueStacks Settings) from the bottom of the menu to open the Android settings. Select Apps from the Advanced Settings menu. This option comes under the 'Device' subsection of the menu. Select the app which you want to uninstall from the 'Downloaded' category. When you select 'Apps' from the menu, a window is opened which sorts the apps on the basis of downloaded apps, running apps and apps which are stored in the SD card. Swipe the screen to get into the 'Downloaded' category and select the app you wish to uninstall. Select Uninstall to start the process. Uninstall button is on the top-right side of the screen below the name of the app. Confirm your decision. As soon as you select the 'Uninstall' option, a dialog box will appear asking, "Do you want to uninstall this app?". Select OK to uninstall the app. If I uninstall BlueStacks, will all the apps I downloaded be deleted? Yes, I uninstalled BlueStacks, and all the apps I had downloaded were gone afterwards. Avoid downloading applications from third-party websites in order to reduce the risk of crashing of BlueStacks during uninstalling an app. Do not uninstall the stock apps bundled with BlueStacks. This may lead to unexpected crashing of the software. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, volunteer authors worked to edit and improve it over time. This article has also been viewed 26,891 times. Thanks to all authors for creating a page that has been read 26,891 times.
0.999983
"I'll be happy once <I get this done/I get a promotion/I change job/I buy a new car/etc >". How many times have you said something like this? We think happiness comes from success, but science has proven that it's the other way around: being happy makes us successful.
0.999968
One of the more interesting recent developments in information technology has been the rise of the so-called "LAMP" software stack. When first coined in the late 90's, the acronym stood for "Linux-Apache-mSQL-Perl", a set of modular components to build dynamic websites. As time progressed, some components were replaced by others: mSQL was superseded by MySQL, which in turn was superseded by SQLite on the low end and by Oracle and DB2 in corporate settings. Similarly, Perl was replaced by PHP3, which evolved into PHP4 and PHP5, and Windows based systems became as common as Linux based systems. Each change made the stack better and proved the power of the modular approach. One key hurdle for broad use of the LAMP technology for mid-market solutions was that it was never easy to configure and manage. Phoenix PHPServer changes that: it can be installed with just four clicks of the mouse and works out of the box. Phoenix PHPServer is designed to work with the Firebird database. Firebird is a powerfull database with a feature set that matches the market leading enterprise systems, yet is very easy to install and manage. Like PHPServer, Firebird can be installed with just four clicks and works out of the box. Firebird + PHPServer is the ideal way to create intranet applications for mid-market businesses, and to build B2C or B2B web sites and web services, whilst keeping all your data safe in a central repository. What is in Phoenix PHPServer? The Phoenix PHPServer is built entirely from open source components: MyServer, PHP and the Firebird client. It does not contain the Firebird server itself, wich is a separate download. The components are all installed in a single directory (with sub-directories) and can co-exists with other installs of e.g. PHP on the same system. MyServer is a powerful web server designed to be easily run on a (personal) server by the average computer user. It is based on multi-threaded architecture, which makes it highly scalable and usable in large scale sites as well as in small networks. It supports the HTTP, HTTPS, CGI, ISAPI, WinCGI and FastCGI protocols. MyServer is both easy to deploy and easy to manage, which makes it ideal for use by mid-market businesses. It has a remote configuration and management facility to enable easy deployment by service providers. PHP was designed to function like popular programming languages such as C and Java. The PHP language extends far beyond web applications and can be employed and compiled to create standard graphical user interface style programs, which run as stand-alone applications in all popular web browsers on all operating systems. Running fast PHP programs used to require running it as a module in a web server such as Apache or IIS. This solution is hard to configure and errors in the application code can take down the whole server. The Phoenix PHPServer uses the FastCGI protocol to run PHP in its own process, thus achieving both performance and reliability. What are the advantages of Firebird + PHP? However, the process of removing much of the processing from individual computers has some important benefits. The user's computer is not required to do much of the processor-intensive work. This can speed page load times and generally ease the browsing experience. As well, PHP does not put a strain on servers. The code is optimized to make the server's job easier. This fact and the cost savings that come with the open-source license are speeding the adoption of PHP over competitors like Microsoft's ASP.NET and Visual Basic.net and Sun Microsystems' Java. By moving the processing onto the server, PHP makes the collection and use of data much more convenient. Data can be readily stored in databases and used in novel ways. Users have access to this centralized data. Web sites can be created that tap into this central reserve much more efficiently. The main reason for centralized databases is the creation of dynamic websites that can react to user input. As a program language, one of the main functions of PHP is storing variables. The scripts can encode and store user inputs into variables that can be passed on to other code to execute. The code can query databases to draw out data and perform comparisons. Through these means, PHP can take user input and change a website in response to input unlike hard coded html which is generally static. To install PHPServer, download the executable file "phpserver-0.9-windows-installer.exe". After downloading, you can run this file, which will guide you through the install process. The installer will install the PHPServer and create a icon for the configuration program on your desktop. The configuration program allows you to start and stop the server or to create a Windows service, which is started as part of the boot process. phpserver-0.9-windows-installer.exe 7.0 MB 15 min. To install PHPServer, download the executable file "phpserver-0.9-linux-installer.bin". After downloading, change the file permissions, so that you can execute the file. If you start it from a text-based shell, the installer will lead you through a text-based install process. If you start it from within a graphical shell (such as KDE and Gnome), the installer will use a GUI interface to guide you through the install process. The installer will install the PHPServer and create a icon for the configuration program on your desktop. The configuration program allows you to start and stop the server or to start it as a deamon. To automatically start PHPServer as part of the boot process, please refer to the documentation of your linux distribution. The linux version of PHPServer is pre-configured to use port 8080, so that it does not need to be running with root privileges. You can use the configuration utility to change this to port 80. phpserver-0.9-linux-installer.bin 6.0 MB 15 min.
0.944395
Will I be taxed on the growth of life insurance cash value? Will I be taxed on the growth of the cash value of my life insurance? The policy is transferred for value--you sell it or assign it, etc. Typically, there is no tax liability until one of these events occurs because of the substantial limitations and restrictions on receiving distributions from the cash value. Generally, if you receive the proceeds under a life insurance contract as a beneficiary due to the death of the insured person, the benefits are not includable in gross income and do not have to be reported; any interest you receive is taxable and you should report it just like any other interest received. Some life insurance policies (known as participating policies) pay dividends to their policyholders. Dividends are generally not taxed as income to you. Instead, they are considered a return of your premium regardless of whether you receive them in cash, use them to purchase additional coverage, use them to reduce future premiums, or leave them invested with the insurance company. However, if your dividends exceed the total premium payments for the insurance policy, the excess dividends are considered taxable income. If you leave your dividends invested with the insurance company, the interest earned on this investment will be considered taxable income. Policy withdrawals are not subject to taxation up to the amount paid into the policy. Policy loans and/or withdrawals will be taxable to the extent of gain if the policy is a modified endowment contract. Policy loans and/or withdrawals also reduce the cash surrender value and policy death benefit and increase the chance that a policy will lapse. Taking a policy loan could have adverse tax consequences if the policy terminates before the insured's death.
0.976846
With increasing concern about the returning swine flu virus, and innumerable bugs lurking in the work and school place each winter, what does natural medicine have to offer to help maintain a healthy immune response? According to herbal medicine, viruses can only affect us when our defences are weakened, hence the traditional approach of taking herbs to maintain our vitality and strength throughout the winter. In general terms, warming and drying spices are recommended to counteract the coldness of the season such as cinnamon, mustard, pepper, and the Mediterranean herbs thyme and rosemary, all of which are also excellent for the respiratory system the initial entry point for most bacteria and viruses. Not only does regular intake of these herbs help improve our resistance, they are also useful treatments for colds, flu and coughs. This is because they have decongesting, expectorant properties and their warming qualities raise our body temperature and help induce a sweat. The herbal name for promoting a sweat is 'diaphoresis' which both weakens pathogenic organisms and increases the activity of white blood cells. At the outset of an illness, the traditional advice is to have a hot bath, wrap up in bed and drink a large mug of piping hot herbal tea. The ensuing sweat is termed breaking the fever and is considered to promote a more rapid and full recovery. Traditional blends used for this purpose include ginger and cinnamon, if the patient is feeling cold and shivery, or elderflower and peppermint if the patient is feeling hot, at a dose of 1 teaspoon of the blend per cup of hot water. For children it is best to use the gentler peppermint and elderflower at a dose of to teaspoon of blend per cup. Another way of taking warming herbs is in hot soups and stews, which are excellent therapeutic foods if you are suffering from colds, coughs or congestion during the cold Suffolk winter. Such medicinal stews are common throughout the world, for instance in China a therapeutic dish called congee is prepared by boiling tonic herbs with rice, whilst in India, rice and lentils are cooked with spice blends to make a therapeutic stew called kitcheree. In fact, a spicy Indian or Thai curry is just what the doctor ordered if you are feeling under the weather. You can also boost your defences at breakfast by adding a warming spice such as cinnamon to your porridge. Scientific research has confirmed the benefit of other herbs for helping to fight winter bugs. Echinacea increases the number and activity of white blood cells so helping to shorten the severity and duration of infections, especially of upper respiratory tract. It should be taken as directed on product labels at the first sign of illness and ceased as soon as you feel better.
0.97855
Hemostasis, the arrest of bleeding following vascular injury, is essential to life. Within the vascular system, blood remains in a fluid state, transporting oxygen, nutrients, plasma proteins, and waste. When a vessel is injured, a dynamic interplay between thrombogenic (activating) and antithrombotic (inhibiting) forces result in the local formation of a hemostatic plug that seals the vessel wall and prevents further blood loss (Figs. 10-2,10-3, and 10-4). A disruption of this delicate system of checks and balances may lead to inappropriate clot formation within the blood vessel that can obstruct blood flow or embolize to a distant vascular bed. is. Vascular injury exposes the subendothelium (Fig. 10-3). Platelets readily adhere to the subendothelium, using glycoprotein (GP) lb receptors found on their surfaces and facilitated by von Willebrand's factor (vWF). This causes platelets to become activated, releasing a number of procoagulant substances that stimulate circulating platelets to expose GP lib-IIIa receptors and allow platelets to adhere to one another, resulting in platelet aggregation. The damaged vascular tissue releases tissue factor which activates the extrinsic pathway of the coagulation cascade (Fig. 10-4). The clotting cascade is a stepwise series of enzymatic reactions that result in the formation of a fibrin mesh.12 Clotting factors circulate in the blood in inactive forms. Once a precursor is activated by specific stimuli, it activates the next precursor in the sequence. The final steps in the cascade are the conversion of prothrombin to thrombin and fibrinogen to fibrin. Thrombin plays a key role in the coagulation cascade; it is responsible not only for the production of fibrin, but also for the conversion of factors V and VIII, creating a positive feedback loop that greatly accelerates the entire cascade. Thrombin also enhances platelet aggregation. Traditionally, the coagulation cascade has been divided into three distinct parts: the intrinsic, the extrinsic, and the common pathways (Fig. 10-4). This artificial division is misleading because there are numerous interactions between the three pathways. A number of tempering mechanisms control coagulation (Fig. 10-2). Without effective self-regulation, the coagulation cascade would proceed unabated until all the clotting factors and platelets are consumed. AT and heparin cofactor II (HCII) are circulating proteins that inhibit thrombin and factor Xa. The intact endothelium adjacent to the damaged tissue actively secretes several antithrombotic substances including heparan sulfate and thrombomodulin. Heparan sulfate exponentially accelerates AT and HCII activity. Protein C and its cofactor, protein S, are vitamin K-dependent anticoagulant proteins made in the liver. Activation of the clotting cascade activates protein C that, in turn, inhibits factor Va and Villa activity. Tissue factor pathway inhibitor (TFPI) inhibits the extrinsic coagulation pathway. When these self-regulatory mechanisms are intact, the formation of the fibrin clot is limited to the zone of tissue injury. However, disruptions in the system often result in inappropriate clot formation. collectively known as fibrin split products or fibrin degradation products. The fib-rinolytic system is also under the control of a series of stimulatory and inhibitory substances. Tissue plasminogen activator (t-PA) and urokinase plasminogen activator (u-PA) convert plasminogen to plasmin. Plasminogen activator inhibitor-1 (PAI-1) inhibits the plasminogen activators and a2-antiplasmin inhibits plasmin activity. Aberrations in the fibrinolytic system have also been linked to hypercoagulability.
0.997698
Kunwar "Billy" Arjan Singh (15 August 1917 – 1 January 2010) was an Indian hunter turned conservationist and author. He was the first who tried to reintroduce tigers and leopards from captivity into the wild. Billy Arjan Singh died peacefully at his original farmhouse Jasbir Nagar on 1 January 2010. Kunwar "Billy" Arjan Singh was born in Gorakhpur on 15 August 1917 as the second son of Kunwar Jasbir Singh, CIE (1887–1942), a member of the royal Ahluwalia dynasty of Kapurthala. His grandfather was Raja Harnam Singh, Raja Maharaj Singh was his uncle, Rajkumari Amrit Kaur was his aunt and his elder brother was Air Vice-Marshal Kunwar Jaswant Singh, PVSM (1915–1963) In 1940, Singh was commissioned as a Second Lieutenant in the British Indian Army and was posted to the south of Iraq. Upon his return to India he purchased a farm in the remote district of Lakhimpur Kheri and built himself a home – named in honour of his father – Jasbir Nagar. He settled down to a life of farming and hunting. Nearly ten years later, he also acquired an estate on the borders of the forestry reserve at Dudhwa. This came to be known as Tiger Haven and it is there that he lived for most of the rest of his life. Singh described how in his youth he had been an insatiable hunter. However, one day having shot a young leopard in the lights of his vehicle, he dramatically changed his view of hunting, feeling nothing but revulsion for killing and vowing that from then on he would pursue the cause of conservation. His first major project was to save a herd of barasingha in the neighbouring Sathiana range of the forestry reserve at Dudhwa. In 1976, he was awarded the World Wildlife Fund's Gold Medal, the WWF's premier award, for his conservation work. He was also largely responsible for persuading the then Prime Minister Mrs Indira Gandhi to transform Dudhwa into a Script error: No such module "convert". national park. Singh's work with wildlife is best known for his reintroduction of both leopards and tiger into the wild. He started by bringing up an orphaned male leopard cub, which he called Prince. Prince was successfully reintroduced to the wild in March 1973. To provide Prince with a mate he subsequently raised two female leopards cubs, Harriet and Juliette. While Juliette died because of poisoning, probably by local farmers; Harriet survived, eventually mated with Prince and delivered cubs. With Mrs. Gandhi's backing, Singh then brought a tigress cub – christened Tara – from an English zoo and reintroduced her successfully into the wild. This extraordinary experiment was well documented in his subsequent books as also in a film made by Anglia Survival. Tara successfully produced a litter of cubs. While some accused Singh of introducing Siberian tiger genes, he himself had little regard for such criticism, believing that it would have enhanced the local gene pool. In July 1976, Billy Arjan Singh acquired a hand-reared female tiger cub named Tara from Twycross Zoo in the United Kingdom, and reintroduced her to the wild in the Dudhwa National Park with the permission of India's then Prime Minister Indira Gandhi. In the 1990s, some tigers were observed in the protected area, which had a Siberian tiger phenotype of a large head, pale pelage, white complexion, and wide stripes, and were therefore suspected to be Bengal-Siberian tiger hybrids. Billy Arjan Singh sent hair samples of tigers from the area to the Centre for Cellular and Molecular Biology in Hyderabad where the samples were analysed using mitochondrial sequence analysis. Results revealed that the tigers in question had a Bengal tiger mitochondrial haplotype indicating that their mother was a Bengal tiger. Skin, hair and blood samples from 71 tigers collected in various Indian zoos, in the National Museum in Kolkata and including the two hair samples from Dudhwa National Park were prepared for microsatellite analysis that revealed that two tigers had alleles in two loci that were contributed by Bengal and Siberian tiger subspecies. However, samples of two hybrid specimens constituted a too small base to conclusively presume that Tara was the source of the Siberian tiger genes. For his contributions to conservation, Arjan Singh was widely honoured. He received the Padma Shri in 1995, one of India's highest civilian national awards. In 1996, he was awarded the World Wildlife Gold Medal, and obtained the Order of the Golden Ark in 1997. In 2004, Arjan Singh received the Getty Award, administered by the World Wildlife Fund, for his innovative contribution to conservation and for creating public awareness. In 2006, he received the Yash Bharati award and the Padma Bhushan two months later. He also received the Lifetime Award for Tiger Conservation. To ensure that his work in conservation continued, Singh established the Tiger Haven Society in 1992. The Society's aims include preserving Tiger Haven and sponsoring research into wildlife. ^ Singh, A. (1981). Tara, a tigress. Quartet Books, London and New York, ISBN 070432282X. ^ Shankaranarayanan, P., Singh, L. (1998). "Mitochondrial DNA sequence divergence among big cats and their hybrids". Current Science 75 (9): 919–923. ^ Shankaranarayanan, P., Banerjee, M., Kacker, R. K., Aggarwal, R. K. and Singh, L. (1997). "Genetic variation in Asiatic lions and Indian tigers" (PDF). Electrophoresis 18 (9): 1693–1700. PMID 9378147. doi:10.1002/elps.1150180938. ^ Menon, S. (1997). Tainted Royalty. India Today. ^ WWF (2010). "Tiger hero: 'Billy' Arjan Singh". WWF, 4 January 2010. ^ Atroley, A. (2006). "Billy Arjan Singh awarded Padma Bhushan.". WWF India, 30 March 2006.
0.999598
When would you use &lt;&lt; faire &gt;&gt; as compared to other verbs? For example, "I am making a cake" as compared to "I am baking a cake". When would you use << faire >> as compared to other verbs? For example, "I am making a cake" as compared to "I am baking a cake". I guess I'm asking whether it's safe to substitute << faire >> for other French verbs that I haven't learnt if in English the verb can be replaced with "doing" or "making". To clarify, if I wanted to say, "I'm building a house", but I didn't know the French word for "building", would it be understandable if I said, << Je fais une maison >>? Je me fais construire une maison. -- I am having a house built. The verb 'to build' is 'construire' in French . So you will say, "Les ouvriers sont en train de construire une maison." = The builders are ( in the process of) building a house. If you are having a house built , you will say "Je fais construire (une maison)".= I am having a house built. There is a magazine called 'Je fais construire' which is all about house building . The word 'maison' is not mentioned as obvious in French. If you are building the house yourself you will need to add a little bit and say "Je construis ma ( propre) maison. (I am building my own house.) or, "J'ai construit ma maison (moi-même)."(I have built my own house). "I'm making dinner" vs "I'm cooking dinner" "I'm doing the dishes" vs "I'm washing the dishes" "I'm doing up my shirt" vs "I'm buttoning up my shirt" So my question is.. can << faire >> be used in similar situations as a substitute for more appropriate verbs that I am yet to learn? Of course, once my verb vocabulary increases, I'd learn how to say "draw", "compose", "paint", etc and would use those verbs instead, but for now, whilst in conversation, if I said, << je fais une image >>, or << je fais une chanson >>, would that be understandable? Les enfants fonts des chateaux de sable au bord de la mer. In the case of to do up , just be careful with English phrasal verbs , as in French, we will always use the proper verb , in this case , 'boutonner'.
0.999904
Day 1: I ate breakfast. I took a nap. I said hello to the mailman. I read the junk mail. I ate lunch. I took a nap. I ate dinner. I watched TV. I wrote in my diary. I went to bed. Wow. Replace "diary" with "blog," and that's my daily schedule.
0.998741
The Omaha World-Herald covers CEO Dennis Pate's vision for the Henry Doorly Zoo. According to Pate, advances in zookeeping theory and the conservation state of species mean certain areas, like the nursery and cat house, are now redundant. In their place he wants to see a stronger focus on the zoo's research activities, larger spaces for animals, and even a high school. Perhaps you could get credit for feeding the lions! I'd do it for real. :| I've always been an animal lover. ? Taking care of wild animals is fairly easy, though certain individuals wish to restrict "ownership" due to their political beliefs. I've taken care of wild animals from baby jack rabbits to small squirrels, anyone who has dedication can do the right thing. One must take care though, knowledge of the animal is extremely important. By not knowing or not paying attention, one can end up with scars or accidentally kill an animal. I don't care to visit most zoos, as they're typically for profit and people behind organizations aren't looking for the animals' best interest. Many animals which are permanent resident of zoos are can't undergo rehabilitation or are damaged in some way. Another problem if you've read the article, animals are traded and leased as a commodity. Animals born under contract are property of the owners who are the rightful owners of the parents. What I find most despicable, the welfare of certain species are at stake and people are more concerned about money. I agree with parts of the article, containment areas need to be expanded. The lifespan of animals are often shortened due to the mental stress. If you keep a wild animal bound up in a small cage, it's most likely to kill itself. Any avian owner can tell you stress is a serious factor to maintain when you own an animal like a macaw. If you hang a bell in the cage and the bell keeps ringing, there is a good chance the bird will make a reasonable attempt to snap its own neck. Zoos need to say more than "needs pupils, not pandas", they need to downsize the stock of animals already in containment. Personally, I'd rather visit a animal sanctuary than a zoo.
0.977372
There are many ways that you can reduce the rate on your home insurance. I speak with people all the time that have a higher home rate than they expect. Here are 12 helpful tips to help you reduce your home insurance rates. Shop around - Insurance carriers are constantly launching new rating platforms and making rate adjustments in their systems. Asking your agent to run new rates for you every few years can save you a lot of money. Raise your deductibles - By raising your deductibles you do assume more risk if you have a claim but it is an effective way of reducing your insurance rates. Don't confuse what you paid for your house with rebuilding cost - land is not factored into the insurance. If your home burns down the land is still available to build on. Bundle your policies - all companies offer a multi-policy discount if you have bot auto and home insurance through the same company. Most of the time it's advantageous to keep them together but not always. Make your home disaster resistant - If you live in an area that is prone to high winds or floods then take steps to prevent losses. Improve home security - Home security system can help reduce your rates and prevent theft. Seek out discounts - Ask your agent to review the quote again after they give you a final rate to make sure that all discounts are applied. Maintain good credit - This one is really important. Most insurance companies use a credit rating factor called you Insurance Score. It's not exactly your credit score but they are first cousins. If your credit score is good then typically your insurance score is good as well. Stay with the same insurer - Some companies offer long-term customer discounts. I'd still encourage checking your rates every 3-4 years. Review the limits on your policy and the value of your possessions - If you have schedule property have it appraised from time to time as values can change. Look for private insurance if you're on the government plan - If you are on the Kentucky Fair Plan and your claim history has gotten better then make sure to get quotes. The Kentucky Fair Plan does not provide coverage that is on your typical HO3 policy. When buying a home, consider the cost of home insurance - Get a quote on the home before committing to buy so there are no surprises in your rates.
0.964762
It Has Been 48 Years Since Neil Armstrong Stepped Down Onto The Lunar Surface. On the anniversary of the world's first moonwalk, watch how legendary CBS anchor Walter Cronkite anchored the very special broadcast. There are a lot of traditional and aesthetic reasons to have white sails. High visibility in case the boat is in trouble and needs help, cheaper cost than other colors and easier to maintain as it doesn't fade as noticeably, and white reflects the sun and keeps the boat cooler which is nice when you have no shade but clouds on the ocean. Additionally, and perhaps more importantly, there is one functional reason to have white sails: Dacron. DuPont first developed this fabric and called it Dacron, and like Kleenex and ChapStick, today the brand name is universally used, regardless of the manufacturer. Dacron sails are extremely popular because of their low cost and great longevity, and while they don't "perform" as highly as more modern fabrics like Kevlar and carbon fiber, their value more than makes up for a loss of performance for most sailors. But the very properties that make Dacron good sailcloth make it hard to dye. It's naturally nonporous, which is great while you're at sea, but is bad if you want it to soak up dye. Full Throttle is an energy drink brand produced by Monster Energy. It debuted in late 2004 in the United States and Canada under its former owner The Coca-Cola Company. It is known for its sponsorship of National Hot Rod Association competitions from 2008 to 2012. On June 12, 2015, Monster Beverage closed on the deal to acquire The Coca-Cola Company's energy drinks line. Coca-Cola transferred ownership of all of its worldwide energy businesses including NOS, Full Throttle, and nine smaller brands to Monster. Monster transferred all of its non-energy drink businesses to Coca-Cola, including Hansen's natural sodas, Peace Tea, Hubert's Lemonade, and Hansen's juice products. Wow, these people throw one hell of a party. Russian, I think? Either way, can you tell me a little bit about it, either where it is or even what's written on the wall? R2-D2 is a fictional robot character in the Star Wars franchise created by George Lucas, who appears in the original trilogy, the prequel trilogy, the sequel trilogy, and Rogue One. A small astromech droid, R2-D2 is a major character and appears in all Star Wars films to date. Throughout the course of the films, he joins or supports Padmé Amidala, Anakin Skywalker, Leia Organa, Luke Skywalker, and Obi-Wan Kenobi in various points in the saga. English actor Kenny Baker played R2-D2 in all three original Star Wars films, and received billing credit for the character in the prequel trilogy, where Baker's role was reduced, as R2-D2 was portrayed mainly by CGI models and radio controlled props. I'd like to lease this space with the nice balcony view. Can you dig me up a phone number to call? we explore two different fail-safe designs used with nuclear reactors.
0.999956
You would like to be a Six Sigma certified professional but you don't know where to start, right? So, you can start with the basic introduction to the Six Sigma world and get the White Belt certification. It is intended for the individuals who have no experience in this realm. The Six Sigma White Belt credential is designed to provide the candidates with the fundamentals of Lean Six Sigma which include process improvement, possible adverse effects on performance of process, specific functions performed by different members of a team, and variability. Those students who earn this certificate will be able to support process improvement projects as team members or project leaders. Before earning this certification, you will be required to take a course to learn the basics of Six Sigma and Lean, and their roles. You will also be equipped with knowledge of the DMAIC process, such as how to define, analyze, measure, control and improve process. The training course will help you to reduce waste and resources while augmenting utmost satisfaction among your business customers.
0.99937
We're designing a portal where users can create pages with content. One piece of content is 'embedding' something like a form or document into the page. The term 'embed' has been confusing in usability tests so far, so I want to create a test specifically around which word would make sense to people. Has anyone created a test like this? If so, how do you best test for this scenario? My plan so far is explaining the action then giving users a series of words where they pick the one that makes the most sense to them. To minimize interaction with your test supervisor, you could provide a search field labeled "enter desired action or keywords" and record what commands or keywords they enter to discover your embedding action. If you explain it to them using words, they will respond to your question with the same words. The best would be to show them a screen recording of the embedding being done and the final result, and ask them to describe it, explain what they saw in their own words. This way, you will be able to collect their own vocabulary, without priming them with your own words.
0.934298
The suprachiasmatic nucleus (SCN) serves as the master circadian pacemaker in mammals, coordinating the physiological responses of a myriad of peripheral clocks throughout the body and linking their rhythms to the environmental light-dark cycle. In this study, we interrogated the murine SCN proteome across the circadian cycle using stable isotope labeling by amino acids in cell culture (SILAC)-based quantitative mass spectrometry. Among 3275 identified proteins in the SCN, 421 displayed a time-of-day-dependent expression profile, 48 fit a circadian expression profile with a ∼24 h period, and a surprising number of proteins were ultradianly expressed. Nine circadianly expressed proteins were accompanied by transcripts that were also 24 h rhythmic, but with a significant time lag (>8 h) between the phases of peak mRNA vs. protein expression. A substantial proportion of the time-of-day proteome exhibited abrupt fluctuations at the anticipated dawn and dusk, and was involved in mitochondrial oxidative phosphorylation. Additionally, predicted targets of miR-133ab were enriched in specific hierarchical clusters and were inversely correlated with miR133ab expression in the SCN. Our study underscores the significance of post-transcriptional regulation, the surprising prevalence of ultradian protein expression, and the functional implications on mitochondrial energy metabolism. Proper temporal organization of behavioral, physiological and biochemical processes and their synchronization with the environmental light/dark cycle are fundamental features of most organisms . In mammals, the central pacemaker that coordinates this adaptive response to temporal cues resides in the suprachiasmatic nucleus (SCN) of the anterior hypothalamus , . The SCN is uniquely positioned to receive light signals from the retina and to relay the time information to peripheral clocks via synaptic and humoral mechanisms. Both central and peripheral clocks use a series of autoregulatory transcription-translation feedback loops to drive cell-autonomous, circadian (∼24 h) rhythms of gene expression of core clock components as well as tissue-specific, clock-controlled outputs . In order to gain a bird's eye view of circadian regulation, a number of gene expression profiling studies using microarrays have been done to examine the circadian transcriptome of the murine SCN and liver , . However, numerous studies have shown that transcript levels are not necessarily reliable predictors of protein abundance, and thus of functional outcome . A previous attempt at elucidating the circadian proteome, using two-dimensional differential gel electrophoresis (2D-DIGE) combined with mass spectrometry (MS), identified 34 rhythmically expressed proteins within the SCN . Until now, the small size of the SCN, and the limited amounts of protein that can be extracted from it, has posed a significant challenge to acquiring accurate and comprehensive quantitative proteomics data. However, recent technological advances in MS-based quantitation, and our growing awareness of the importance of post-transcriptional regulation of circadian rhythms , encouraged us to re-evaluate SCN functions from a proteomic perspective. In our previous study, we employed the AutoProteome system in conjunction with spectral counting to identify 2131 unique proteins in the SCN, of which 387 were acutely up- or down-regulated following nocturnal light exposure . In this report, we performed an unbiased interrogation of the SCN proteome over a 24 h cycle using an alternative MS approach: a centrifugal proteomic reactor (CPR) coupled with stable isotope labeling by amino acids in cell culture (SILAC)-based quantitation. Neuro2A murine neuroblastoma cells were used as the SILAC-labeled internal reference standard for murine SCN tissues, based on reports that numerous core clock genes are expressed in this cell line, and that serum shock can induce robust circadian oscillations of their transcripts , . Furthermore, a previous study indicated >97% overlap between the proteomes of mouse whole brain and Neuro2A cells . Our proteomics screen identified a total of 3275 unique proteins in the murine SCN, 421 of which displayed time-of-day-dependent expression profiles. Within this smaller subset, 48 proteins fluctuated in a circadian manner. Bioinformatics analyses of these 421 proteins highlight the potentially important role that post-transcriptional mechanisms such as miRNAs may play in shaping the final profile of the time-of-day proteome, and the orchestrated expression of multiple proteins involved in neurosecretory processes and mitochondrial oxidative phosphorylation within the SCN. To examine the murine SCN proteome, we stably entrained male C57Bl/6J mice to a 12 h light∶12 h dark (LD) cycle, and transferred them to constant darkness (DD) for two days. Starting at circadian time (CT) 2 on the third day of DD, we collected SCN tissues from four mice at 4 h intervals for a full circadian cycle (Figure 1A). SCN samples were processed individually to yield four independent biological replicates for each time point (4 mice per CT, n = 24 total mice). SCN protein lysates (30 µg) were mixed with equal quantities of lysates prepared from Neuro2A cells that had previously been cultured for >10 passages in heavy SILAC medium. Under these conditions, the Neuro2A proteome is estimated to be >98% heavy SILAC-labeled and thus useful as a spike-in reference standard. The CPR, with its superior recovery of hydrophobic membrane proteins compared with other approaches , was used for rapid protein preconcentration, derivatization, enzymatic digestion, and fractionation of the samples. Peptides were eluted from the CPR in ten fractions and analyzed by high performance liquid chromatography-electrospray tandem mass spectrometry (HPLC-ESI-MS/MS) in a total of 240 runs. From the raw mass spectrometric data, Maxquant and Andromeda identified 3275 protein groups with a false discovery rate (FDR) of 1% (Table S1). Out of these 3275 proteins, only 7 lacked a corresponding SILAC-labeled peak, indicating that these proteins are expressed in the SCN but not in Neuro2A cells (Table S1). As expected from recent proteomic studies , , our MS screen failed to detect any core clock proteins, likely due to their low abundance relative to the many cytoplasmic proteins which were detected. The raw dataset was further filtered for proteins that were identified by a minimum of two peptide ratio counts and where accurate quantification values were obtained in a minimum of 12 out of 24 independent samples. Downstream bioinformatics and statistical analyses were performed on this stringently filtered dataset of 2112 proteins (64.5% of total identified proteins), hereafter referred to as the SCN proteome (Table S2). High r values (between 0.83 and 0.97, Table S3) were obtained for the pairwise Pearson's correlation analysis of 24 measurements, indicating excellent reproducibility within our SCN proteome data. Fig. 1. Global proteomic analysis of the murine SCN. (A) Schematic overview of the centrifugal proteomic reactor (CPR) coupled with SILAC-based quantification of the murine SCN proteome. Protein lysates (30 µg) extracted from the SCN of individual mice (n = 4 per CT; 6 CT in total) were mixed with equal quantities of protein lysates from heavy SILAC-labeled Neuro2A cells. The mixtures were processed by the CPR coupled with HPLC-ESI-MS/MS. A total of 3275 unique proteins were identified, of which 421 were significantly altered (time-of-day-dependent) in terms of protein expression levels during a 24-h cycle. (B–D) Biological replicates within a CT (B,C) showed a higher degree of correlation than samples harvested at different CTs (D). Scatter plots were plotted by logarithmized (Log2) normalized protein ratios (L/H) and the correlation coefficient (Pearson r) was calculated. (E,F) GO enrichment analysis by DAVID based on (E) total cellular component and (F) total biological process. The significantly altered (blue), circadian (red), and total SCN (black) proteomes were subject to enrichment analysis. All listed classifications were significant compared to the whole genome. Asterisks denote classifications that were significantly enriched compared to the SCN proteome (total). *p<0.05, **p<0.01, ***p<0.001 (Fisher's exact test). To identify proteins whose expression significantly fluctuated as a function of time-of-day, we subjected the SCN proteome to an analysis of variance. ANOVA revealed that 421 proteins (i.e., 20% of the SCN proteome) exhibited statistically significant (p<0.05) alterations in abundance across the 24 h cycle. This significantly altered proteome, hereafter referred to as the time-of-day proteome, was evaluated for reproducibility using pairwise Pearson's correlation analysis of the 24 samples (Table S4). The r values between biological replicates at a specific CT were extremely high (Figures 1B and 1C) compared with the lower r values observed between samples of different CTs (Figure 1D), indicating a high degree of reproducibility within biological replicates. As a second independent measure of variability, we calculated the relative standard deviation (RSD) for all proteins at every CT. The median RSD for the time-of-day proteome was 16%, compared with 11% from a previous study of the circadian hepatic proteome . Considering that their study utilized single pooled tissue samples per CT per 24 h cycle (2 cycles were analyzed), while ours uses unpooled samples from 4 animals per CT, an RSD of 16% reflects an acceptable level of variability within our dataset. Lastly, the temporal profiles of 12 proteins (Figure 2) with quantification values in all 24 samples also showed a higher degree of correlation within a CT than between CTs. The expression of five of these proteins—endophilin A1 (SH3GL2), synaptobrevin 2 (VAMP2), serine/threonine-protein kinase PAK 1 (PAK1), synaptotagmin 1 (SYT1), and synaptic vesicle glycoprotein 2A (SV2A)—was evaluated by Western blot (WB) analysis using independent batches of SCN tissues (Figure 2). In all cases, the WB results correlated well with our MS-based quantification (Pearson's coefficients = 0.78 [SH3GL2], 0.69 [VAMP2], 0.75 [PAK1], 0.77 [SYT1], 0.66 [SV2A]). Fig. 2. Robustness and validation of our SILAC-based SCN proteome. (A–E) Raw MS results of the temporal profiles of 12 time-of-day-dependent proteins including proteins that exhibit (A) 8 h, (B) 12 h, and (C) 24 h rhythms. (D,E) Time-of-day-dependent proteins, including those that are encoded by 24 h rhythmic transcripts (D), are also shown. Each graph was plotted with quantification values (Log2 (L/H)) in all 24 samples. The median value ± SEM of 4 biological replicate measurements for each CT (n = 4 per CT; 6 CT in total) is also shown. Time-of-day-dependent expression of SH3GL2, VAMP2, PAK1, SYT1 and SV2A were validated by Western blot (WB) analyses and presented below each MS plot. WB expression was analyzed at 6 CTs (2, 6, 10, 14, 18, 22). Actin was used as the loading control. Values below each blot represent the median relative abundance of the protein of interest, normalized to actin expression (n = 3 per CT). The asterisk (*) in panel (E) denotes the presence of a faster-migrating, non-specific band. Next, the time-of-day proteome was subjected to Gene Ontology (GO) analysis by DAVID in order to investigate its biological relevance. Relative to both the SCN proteome and the entire mouse genome (by DAVID), the time-of-day proteome was significantly enriched for GO total cellular components that were classified as mitochondrion or mitochondrial membrane (Fisher's exact test, p<0.05) (Figure 1E). Additionally, several metabolic pathways including generation of precursor metabolites and energy, oxidation reduction, energy derivation by oxidation of organic compounds, and cellular respiration were significantly enriched in this dataset based on GO total biological process analysis (Figure 1F). A more in-depth examination using GO FAT analysis, which filters out very broad GO terms based on a measured specificity of each term, confirmed that a significant portion of the time-of-day proteome was associated with the mitochondrion, energy generation and consumption, and hydrogen ion transmembrane transporter activity (Figure S1). Hierarchical clustering of the time-of-day proteome revealed segregation of proteins into six different expression clusters (Figure 3A, Table S5). Two dominant clusters emerged from the analysis: cluster D (118 proteins) and cluster E (189 proteins). Closer examination of the protein levels within each cluster (Figure 3B) revealed that clusters D and E are mirror images of one another. A second interesting feature of clusters D and E is their bimodal expression profile. For instance, cluster E is characterized by an increase in expression from CT 2 to CT 10, a sharp decrease from CT 10 to CT 14 (the anticipated light-to-dark transition), a gradual increase through the night (CT 14 to CT 22), followed by an abrupt decrease from CT 22 to CT 2 (the anticipated dark-to-light transition). Interestingly, when compared to the time-of-day proteome, cluster E was selectively enriched for several GO biological processes such as generation of precursor metabolites and energy, cellular respiration, and energy derivation by oxidation of organic compounds (Figure 3C). Collectively, the data reveal that a substantial portion of the SCN proteome (20%) exhibits significant changes in abundance as a function of time-of-day. Fig. 3. Cluster analysis of the time-of-day-dependent SCN proteome. (A) Hierarchical clustering of the 421 proteins that exhibited statistically significant, time-of-day-dependent expression in the SCN. After z-score normalization of the median value of logarithmized intensities (Log2) of each protein profile within Euclidean distances against those 421 time-of-day-dependent proteins, they were classified into six different expression clusters (denoted A through F). (B) Expression profile of the six hierarchical clusters, which were statistically different relative to one another. Two dominant clusters, B and E, were mirror images of one another. (C) Distribution of GO biological process terms in the six hierarchical clusters. Three GO biological processes were specifically enriched in cluster E relative to the time-of-day proteome. **p<0.01, ***p<0.001. Next, we sought to identify proteins that exhibited a strictly circadian pattern of expression, as well as those that were ultradian. To this end, we employed the JTK_CYCLE algorithm , to identify the subsets of proteins within the time-of-day proteome that oscillated with periods of 8, 12 and 24 h. JTK_CYCLE was recently developed to detect rhythmic components within large genomic datasets, and is superior to other similar algorithms in its sensitivity, specificity and efficiency . Recent studies have also used JTK_CYCLE to analyze the circadian acetylome and the diurnal transcriptome of the murine liver and heart, respectively , . Given that the observed free-running period of C57BL6 mice is ∼23.6 to 23.8 h, we used the nearest integer value (24) to approximate a circadian cycle using JTK_CYCLE. Based on a p-value cutoff of 0.05 , 48 proteins were deemed to be circadian, with phase of peak expression distributed across the entire 24 h cycle (Figure S2C, Table S6). Surprisingly, a relatively large proportion of the time-of-day proteome exhibited ultradian periods of 8 h (25 proteins) and 12 h (59 proteins) (p<0.05, JTK_CYCLE, Figures S2A and S2B, Table S7). Those 12 h rhythmic proteins tended to peak in expression at either the early day and early night, or late day and late night (Figure S2B), mirroring the profiles of clusters D and E (Figure 3B), respectively. Moreover, subjecting the larger dataset of the SCN proteome to JTK_CYCLE analysis resulted in the assignment of an additional 11, 41 and 43 proteins as rhythmic with periods of 8, 12 and 24 h, respectively. The fact that these proteins were identified as rhythmic by JTK_CYCLE but were not significantly altered based on ANOVA suggests that they might exhibit weak fluctuations that are mistaken as rhythmic. Thus, we focused subsequent downstream analyses on those circadian and ultradian proteins that were identified within the time-of-day proteome rather than the SCN proteome. Our results are somewhat reminiscent of the findings of Hughes et al. , which identified clusters of transcripts that cycled at the second and third harmonics of circadian rhythmicity in the murine liver; however, in that study the transcripts exhibiting these subharmonics accounted for only a small fraction of the entire rhythmic transcriptome. To investigate the relationship between transcript levels and protein abundance, we compared our time-of-day, circadian and ultradian (8 h and 12 h) proteomes with mRNA data extracted from two published microarray studies (MAS4 Panda et al. and gcrma Panda et al.) of the mouse SCN transcriptome from the CIRCA database (http://bioinf.itmat.upenn.edu/circa/) using identical JTK_CYCLE filtering criteria (p<0.05, 0 to 40 h period rhythmicity) (Figures 4A–D). Notably, >40% of each proteome was encoded by non-rhythmic transcripts. Circadian transcripts were found to encode a smaller subset of proteins within the time-of-day, circadian and 12-h ultradian proteomes. Each proteome also consisted of a subset of proteins that were encoded by rhythmic (non-24 h) transcripts cycling at intervals of 16, 20, 28 or 32 h. Notably, none of the 8 h and 12 h rhythmic proteins were encoded by transcripts that oscillated with the same period. Moreover, there were only 9 genes that exhibited circadian rhythms at both the transcript and protein level, and even amongst most of these there was a significant time lag (mean ∼8 h) between the peak in expression of the mRNA and the protein (Figure 4E). Fig. 4. Comparative analysis of the murine SCN transcriptome and proteome. (A–D) Distribution of the (A) time-of-day proteome, (B) circadian proteome, (C) 12-h ultradian proteome, and (D) 8-h ultradian proteome according to profile of transcript expression. Transcript profile was classified as non-rhythmic (green), 24 h rhythmic (blue), or rhythmic non-24 h (orange). The rhythmic non-24 h transcripts oscillated at periods of either 16, 20, 28 or 32 h. Transcript data were acquired from two published microarray studies (MAS4 Panda et al and gcrma Panda et. al) of the mouse SCN transcriptome from the CIRCA database. Proteins without a corresponding transcript in CIRCA database are not represented in the pie charts. (E) Genes that are circadian at the transcript and protein level: a comparison of the phases of peak expression. Pink and blue dots represent the phase (CT) of peak expression at the mRNA and protein level, respectively. In general, expression of these 24 h rhythmic proteins lagged significantly behind expression of their corresponding transcripts. Asterisks (*) denote instances where the transcript and protein overlap in their phase of peak expression. Collectively, our data indicate that transcript levels are a generally poor predictor of protein abundance in the murine SCN. By extension, this suggests that post-transcriptional mechanisms play a dominant role in shaping the ultimate landscape of the SCN proteome. Another key observation from our study is that, for a substantial portion of the time-of-day proteome, the anticipated light-to-dark and dark-to-light transitions trigger robust changes in protein abundance that are similar in direction (either up- or down-regulated). microRNAs (miRNAs) are small (∼22–24 nt), noncoding RNAs that act as potent post-transcriptional modulators of gene expression. Various miRNAs have been implicated in the regulation of circadian rhythms in multiple model systems , . To examine a possible involvement of miRNAs in shaping the SCN proteome, we first asked whether predicted targets of known miRNAs were enriched within particular hierarchical clusters of our time-of-day proteome. To this end, we compared the time-of-day proteome with the predicted targets of 86 broadly conserved miRNA families extracted from the TargetScanMouse version 6.2 database (http://www.targetscan.org/mmu_61/). Out of 86 broadly conserved miRNA families examined, only miR-133ab showed a significant enrichment of its respective targets in at least one hierarchical cluster. Figure 5A illustrates the number of predicted miR-133ab target genes within each hierarchical cluster based on the presence of at least one conserved site within the annotated 3' untranslated region (UTR) of the transcript. Compared to other hierarchical clusters, cluster E had the largest number of, and was statistically enriched for, predicted miR-133ab targets (Fisher's exact test, p<0.05; Figure 5A). Fig. 5. Functional implications for miRNA target enrichment in specific hierarchical clusters. (A) Distribution of the number of predicted miR-133ab murine target genes in the six hierarchical clusters. Compared to other hierarchical clusters, cluster E was significantly enriched for predicted murine targets of miR-133ab (Fisher's exact test, p<0.05). (B) Expression profiles of miR-133a and miR-133b, along with (C) those of their respective protein targets in cluster E. qRT-PCR was performed to detect and measure the relative abundance of miR-133a and miR-133b in the SCN. Information regarding predicted miRNA targets was extracted from the broadly conserved microRNA families from the TargetScanMouse database. (D–F) Western blot analysis of three predicted miR-133ab targets in cluster E, including (D) SH3GL2, (E) SYT1, and (F) SV2A, in Neuro2A cells transfected with either microRNA inhibitors against miR-133a (A-) or miR-133b (B-), microRNA mimics for miR-133a (A) or miR-133b (B), or microRNA inhibitor negative controls (C). Actin was used as the loading control in Western blot analysis. Values in each graph represent the median relative abundance of the protein examined normalized to actin expression (n = 3 per CT). The asterisk (*) denotes the presence of a faster-migrating, non-specific band. As miR-133ab levels have been reported to be low in the brain , we used an ultra-sensitive qRT-PCR approach to quantify levels of mature miR-133a and -133b in the murine SCN (Figure 5B). miR-133b abundance was elevated throughout the subjective night, whereas miR-133a levels peaked sharply at CT 14 (Figure 5B). Notably, the expression profile of miR-133ab showed an inverse trend when compared with the MS-quantified expression of their predicted target genes in cluster E from CT 10 to CT 22 (Figure 5C). To provide functional evidence that these are authentic targets of miR-133ab, we selected three predicted targets within cluster E and examined their expression in Neuro2A cells in which levels of miR-133a or miR-133b have been enhanced using microRNA mimics, or suppressed by microRNA inhibitors. Either one or both mimics of miR-133a and miR-133b strongly suppressed the levels of SH3GL2, SYT1 and SV2A proteins in transfected Neuro2A cells compared with controls (Figures 5D–F). On the other hand, silencing of miR-133a or miR-133b robustly elevated the expression of SH3GL2 but not SYT1 or SV2A (Figures 5D–F). These data are consistent with SH3GL2, SYT1 and SV2A being authentic targets of miR-133ab. Collectively, our results raise the possibility that miRNAs, such as miR-133ab, are orchestrating the temporal profiles of multiple target genes as suggested previously . Given the fact that predicted miR-133ab targets are not solely restricted to a single hierarchical cluster with a common temporal expression pattern, other miRNAs are likely to work in concert with miR-133ab to fine-tune the temporal expression profile of its targets. More generally, our data suggest that miRNAs may be key post-transcriptional regulators of time-of-day-dependent protein expression within the SCN. The concerted expression of a large number of proteins within each hierarchical cluster suggests that many of these proteins might interact directly with one another to modulate a shared set of biological responses. To test this hypothesis, we used the IPA software to perform a very restrictive interaction analysis using only interactions from public repositories and limiting the network to direct interactions between proteins within a single cluster (i.e., no neighbors). Proteins in cluster E exhibited a high degree of connectivity (35 out of 189 proteins, or 18.5%) through direct protein-protein interactions (Figure 6). The top functions within this network were neurological disease and psychological disorders. Notably, this network included a relatively large number of proteins that are involved in neurotransmitter release (i.e., NSF, SV2A, SYT1 and VAMP2) and synaptic transmission (i.e., CNP, NSF, SV2A, SH3GL2 and SYT1) (Figure 6). A more comprehensive functional protein interaction network analysis of the entire time-of-day proteome (421 proteins) revealed that one of the largest networks is driven from the interactions among proteins involved in protein trafficking and carbohydrate metabolism (Figure S3). This network cluster included 9 proteins that oscillated with 12-h rhythms. The larger protein interaction network also included proteins involved in more general cellular functions, such as cellular assembly and organization, cellular function and maintenance, and cell morphology (Figure S3). Fig. 6. Protein interaction network of cluster E proteins. A total of 35 proteins from cluster E had direct protein-protein interactions based on IPA network analysis. Of note, proteins involved in neurotransmitter release (#) and synaptic transmission ($) were observed in this network. We further mapped the time-of-day proteome onto 192 known canonical pathways using IPA to identify pathways that might be significantly impacted (Figure S4). Three canonical pathways that had previously been implicated in the regulation of the SCN clock – were identified in our IPA analysis: Ca2+/cAMP response element binding protein (CREB) signaling in neurons (p = 0.0031); extracellular signal-regulated kinase (ERK)/mitogen- activated protein kinase (MAPK) signaling pathway (p = 0.0019); and synaptic long-term potentiation pathway (p = 0.0035). In agreement with our previous GO analysis, the top-ranked canonical pathway was the mitochondrial dysfunction pathway, with 29 out of 421 proteins mapped. To delve further into the potential implications of an apparent temporal regulation of the mitochondria, we performed a KEGG pathway enrichment analysis by DAVID to compare our time-of-day proteome against all 2112 quantified proteins in the SCN proteome. Our data reveal that the KEGG pathways for Huntington's disease, Parkinson's disease, oxidative phosphorylation, pyruvate metabolism, and arginine and proline metabolism were significantly enriched with at least 8 proteins mapped in each pathway (Figure 7A). Indeed, many of the proteins within the Huntington's disease, Parkinson's disease, and oxidative phosphorylation (OxPhos) pathways overlapped and were mitochondrial in their localization. Particularly noteworthy was the OxPhos pathway, which accounted for 25 proteins within the time-of-day proteome. Of these 25 OxPhos-related proteins, 22 were present in cluster E and thus exhibited a similar trend in expression profile. Results from KEGG analysis mirrored those from canonical pathway analysis by IPA, which identified 19 OxPhos-related proteins (a subset of the 25), with 16 of these belonging in cluster E (Figure 7B). One of these OxPhos proteins, NDUFA10, a subunit of NADH∶ubiquinone oxidoreductase (complex I), was selected for validation by IF. NDUFA10 immunoreactivity within the SCN exhibited a pronounced increase at the CT10-CT14 transition, in keeping with the MS results at these two time points (Figure 7C). Fig. 7. Mitochondrial oxidative phosphorylation represents a major axis of regulation within the SCN. (A) KEGG pathway enrichment analysis (by DAVID) of the time-of-day proteome. Pathways that are significantly enriched relative to the SCN proteome (2112 proteins) are denoted with an asterisk. *p<0.05, and **p<0.01 (Fisher's exact test). (B) Schematic representation of the 19 rhythmic proteins in our proteomic dataset that are involved in oxidative phosphorylation, based on IPA canonical pathway analysis. The asterisk (*) denotes four 24-h rhythmic proteins including NDUFA10, NDUFA2, COX4I1, and ATP5D. (C) Immunofluorescent (top) and MS (bottom) analysis of NDUFA10 expression in the SCN as a function of CT. IF images were acquired using a 20× objective. Values below each micrograph (top) represent the median relative abundance of NDUFA10 (n = 3 mice per CT). (D) Distribution of the 111 time-of-day-dependent mitochondrial proteins within the six hierarchical protein clusters. The time-of-day proteome is significantly enriched for mitochondrial proteins (111/421, or 26.4%) relative to the SCN proteome (2112 proteins). Further analysis revealed that 51.4% of these mitochondrial proteins belonged within Cluster E, although this “cluster bias” did not reach statistical significance (Figure 7D). However, when we restricted our analysis to mitochondrial proteins that were involved in the OxPhos pathway, we found significant enrichment within cluster E. Our collective data point to a hitherto unappreciated temporal regulation of mitochondrial functions, particularly oxidative phosphorylation, within the central pacemaker. Despite recent advances in quantitative proteomics and their application to the study of clock-controlled processes in the liver , , , the SCN proteome has been challenging to characterize in a comprehensive manner due to its inherently low sample availability. A previous attempt, using 2-dimensional difference gel electrophoresis (2D-DIGE) coupled with MS for protein identification, uncovered 115 proteins with time-of-day-dependent expression, of which 34 were circadian, out of 871 protein spots detected . In our present study, we took advantage of the quantitative accuracy of SILAC, and combined it with the enhanced detection sensitivity that is achieved using the CPR, to provide a large-scale interrogation of the SCN proteome (Figure 1A). The outcome was the identification of 421 and 48 proteins whose expression profiles were time-of-day-dependent and circadian, respectively, from a stringently quantified dataset of 2112 proteins. In contrast with recently published liver circadian proteome studies , , we used 4 independent biological replicates to represent each CT across one 24 h cycle, rather than a single (pooled) sample for each time point across two cycles. Despite these procedural differences, the percentage of the detected proteome that exhibited circadian (24 h) rhythms was reasonably similar in all three studies (2.2%, our study; 6.0% Robles et al. ; 4.8% Mauvoisin et al. ). Furthermore, based on our proteomic analysis of the SCN, we were able to conclude that transcript expression is a relatively poor predictor of protein abundance, that ultradian rhythms in protein expression are prevalent in the SCN, and that the mitochondria, in particular oxidative phosphorylation, is a major target of temporal control in the central pacemaker. Additionally, our findings support the argument that post-transcriptional mechanisms, including miRNAs, may play a prominent role in shaping the ultimate landscape of the SCN proteome. Comparisons with the Deery et al. report revealed that our SCN proteome (2112 proteins) included 30 of their 115 time-of-day-dependent proteins. Eleven out of these 30 were found within our time-of-day proteome and two belonged in our circadian proteome (p<0.05, JTK analysis). The higher frequency in sampling intervals in our study compared to theirs (4 h vs. 6 h) along with different statistical algorithms employed may partially account for the differences between the two datasets. Nevertheless, both studies identified vesicular trafficking and neurosecretory processes as novel points of temporal regulation. Interestingly, a number of proteins involved in neurotransmitter release (i.e., NSF, SV2A, SYT1 and VAMP2) and synaptic transmission (i.e., CNP, NSF, SV2A, SH3GL2 and SYT1) shared similar expression trends (cluster E), exemplifying how the SCN might coordinate the expression of proteins that act within the same biological pathway. One unexpected observation was the sharp, and parallel, changes in protein expression at the anticipated transitions from light-to-dark and dark-to-light. This pattern was prevalent not only in the 12 h ultradian proteome (Figure S2B) but also in the time-of-day proteome (clusters D and E, Figure 3B). Hughes et al. made similar observations in analyzing the 12 h cycling transcripts of the liver. They speculated that these dawn- and dusk-peaking transcripts took part in cellular mechanisms that anticipated the stress of daily transitions into light and darkness. Such an explanation might also be pertinent to our study. In particular, changes in levels of oxidative phosphorylation might constitute one such cellular response to light-dark/dark-light (or rest-wake/wake-rest) state transitions (Figure 7B). The mechanisms that drive these bimodal expression profiles within the SCN are unknown, but could conceivably involve interactions between the molecular clock and systemic cues. Alternatively, as shown by Westermark and colleagues , 12 h rhythms may arise theoretically through the actions of pairs of circadianly expressed transcription factors with defined phase relationships relative to each other. Our study adds to the growing body of evidence that post-transcriptional regulation is a key feature of central and peripheral clocks. Less than 60% of the circadian and ultradian proteomes were encoded by transcripts that were rhythmic. In the case of the 8 h and 12 h proteomes, none of those rhythmic transcripts exhibited the same period as the encoded protein. Furthermore, for the 9 genes that were circadian at both the mRNA and protein level, there was a great disparity between the phase of peak expression of the transcript vs. that of the protein (mean time difference of ∼8 h). From these collective data, one can infer that post-transcriptional (and post-translational) regulation has a major influence on protein expression in the SCN. Specific post-transcriptional events, such as miRNA regulation, may intersect with circadian transcriptional rhythms (or even constitutive gene transcription) to establish the final time-course and profile of protein expression. Along these lines, we provide evidence that a microRNA, miR-133ab, has the ability to regulate the expression of various target proteins belonging to cluster E. Furthermore, we noted an inverse trend between miR-133ab levels and expression of their in silico targets in the SCN. Another interesting finding is the prevalence of ultradian proteins in the SCN. Hughes et al. also discovered circadian harmonics within his rhythmic transcriptome, but they occurred with a much lower frequency relative to the circadian transcripts. The mechanisms that are driving a larger subset of proteins towards ultradian expression are unclear, but could conceivably involve one or several post-transcriptional mechanisms. Finally, our results strongly support the notion that mitochondrial energetics within the SCN is under strict temporal control (Figure 7A). While recent studies emphasize the circadian control of mitochondrial metabolism in the liver , , a key organ for energy storage and mobilization, almost none have directly studied mitochondrial function in the SCN. However, recent observations that the NAD+-dependent deacetylase SiRT1 positively modulates the expression of CLOCK and BMAL1 in the SCN , and that resveratrol activates SiRT1 through an increase in mitochondrial complex I-dependent NADH oxidation , raise the possibility that mitochondrial metabolism, in particular oxidative phosphorylation, may play a prominent role in maintaining robustness of the SCN clock. Interestingly, others have noted that hepatic NAD+ levels exhibit a bimodal rhythm and attributed this entirely to its biosynthesis by the enzyme nicotinamide phosphoribosyltransferase . Our proteomics data, which highlight the bimodal expression of a large number of OxPhos-related proteins, provide an additional mechanism by which NAD+ levels may be shaped in the SCN. In conclusion, our study provides a broader perspective on the temporal control of the SCN proteome. Our results underscore the significance of post-transcriptional regulation, the surprising prevalence of ultradian protein expression, and the functional implications on mitochondrial energy metabolism. Future investigations should help to clarify how each of these aspects contributes to the central pacemaker function of the SCN. All animal handling and experimental procedures were conducted at the University of Toronto Mississauga animal facility, and were approved by the local animal care committee in compliance with institutional guidelines and the Canadian Council on Animal Care. Ammonium bicarbonate (NH4HCO3), dithiothreitol (DTT), iodoacetamide (IAA), citric acid, and urea were obtained from Sigma-Aldrich (Saint Louis, MO). Acetonitrile, with 0.1% formic acid, and water, with 0.1% formic acid, were purchased from J.T. Baker (Phillipsburg, NJ). Trypsin was purchased from Promega (Madison, WI). Strong cation exchange (SCX) beads were obtained from Polymer Laboratories, Varian, Inc. (Palo Alto, CA). CHAPS (3-[(3-cholamidopropyl)dimethylammonio]-1- propanesulfonate, BP 571), ammonium hydroxide (NH4OH), and methanol were purchased from Fisher Scientific (Hampton, NH). Eight- to 12-week-old male C57BL6/J mice that were obtained from in-house breeding or purchase from The Jackson Laboratory (Bar Harbor, ME) were used for all experiments. Mice were group-housed in polycarbonate cages and given ad libitum access to rodent chow and water throughout the study. Mice were stably entrained for a minimum of 2 weeks to a 12 h light∶12 h dark (LD) schedule (light intensity during the L phase was ∼200 lux) prior to transfer to complete darkness (DD) for 2 full cycles. Dark adaptation was achieved by placing cages into light-tight ventilated cabinets. On day 3 of DD, mice were killed at 4-h intervals at circadian times (CT) 2, 6, 10, 14, 18, and 22, where CT corresponds to the Zeitgeber time (ZT) of the previous LD cycle. Mice were killed by cervical dislocation and decapitated, and eyes were covered with black electrical tape under dim red light. Brains were dissected and cut into 800-µm thick coronal sections containing the SCN in cooled oxygenated media using an oscillating tissue slicer . SCN was isolated from the tissue slice using a razor blade, and frozen immediately on dry ice. For IF, the entire coronal slice was fixed in 4% (w/v) paraformaldehyde in phosphate-buffered saline (PBS; 6 h, room temperature), cryoprotected in 30% (w/v) sucrose (overnight, 4°C), and cut into thin sections (30-µm) using a freezing microtome. Neuro2A cells (American Type Culture Collection [ATCC], Manassas, VA) were grown in customized DMEM (AthenaES, Baltimore, MD, USA) and supplemented with [13C6,15N4]-L-Arginine (Arg-10), [13C6,15N2]-L-Lysine (Lys-8) at Arg 42 mg/L, Lys 146 mg/L, Met 30 mg/L and supplemented with 10% (v/v) dialyzed FBS (GIBCO-Invitrogen; Burlington, ON, Canada), 1 mM sodium pyruvate (Gibco-Invitrogen) and 28 µg/mL gentamicin (Gibco-Invitrogen). Labeled amino acids are purchased from Sigma-Aldrich (Oakville, ON, Canada). Cells were maintained in culture for at least 10 doubling times to allow for complete (>98%) incorporation of the isotope-labeled amino acids into the cells. SCN tissues of individual mice were homogenized in 80 µL lysis buffer (8M urea, 4% CHAPS, 100 mM NH4HCO3 with fresh proteinase inhibitor mixture) in a 1.5 mL Pellet pestle, and sonicated 3 times for 10 s each with >30 s on ice between each pulse. Protein concentration was determined by the Bradford method. Proteins were processed in a centrifugal proteomic reactor device as previously described with some modifications . Briefly, lysates from SCN tissues and heavy SILAC-labeled Neuro2A cells were mixed 1∶1 (30 µg protein each), and vortexed (1 min) vigorously in the presence of 30 µL of SCX slurry and 1.2 mL of 5% formic acid. Samples were centrifuged (16,100×g, 3 min), and SCX bead pellets were washed twice with 1.2 mL 0.1% formic acid. Proteins were reduced by incubating samples in the presence of 20 µL of 150 mM NH4HCO3, 20 mM DTT (1200 rpm, 56°C, 15 min), and were subsequently alkylated by the addition of 20 µL of 150 mM NH4HCO3, 100 mM IAA (room temperature, 15 min in darkness). The reaction was stopped by adding 1.2 mL of 0.1% formic acid supplemented with 6 µg trypsin. Following centrifugation, the SCX bead pellet was resuspended in 40 µL of 1 M NH4HCO3 and trypsin digested for 4 h (37°C, 1200 rpm). Finally, pH step elution of the peptides from the SCX beads was performed by adding: 1.2 ml of 0.1% formic acid pH 2.5, followed by additional nine pH fractions (pH 3.0, 3.5, 4.0, 4.5, 5.0, 5.5 6.0, 8.0, 12) by subsequent additions of 400 µL 10 mM citric acid/NH4OH pH buffers. The fractionated samples were desalted using in-house-made C18 desalting cartridges, and dessicated using a Speed-Vac prior to LC-MS measurement. All resulting peptide fractions were analyzed by HPLC-ESI-MS/MS, which consists of an automated Agilent 1100 micro-HPLC system (Agilent Technologies, Santa Clara, CA) coupled with an LTQ-Orbitrap mass spectrometer (ThermoFisher Scientific, San Jose, CA) equipped with a nano-electrospray interface operated in positive ion mode. Each peptide mixture was reconstituted in 20 µL of 0.5% (v/v) formic acid, and 10 µl was loaded on a 200 µm×50 mm fritted fused silica pre-column packed in-house with reverse phase Magic C18AQ resins (5 µm; 200-Å pore size; Dr. Maisch GmbH, Ammerbuch, Germany). The separation of peptides was performed on an analytical column (75 µm×10 cm) packed with reverse phase beads (3 µm; 120-Å pore size; Dr. Maisch GmbH, Ammerbuch, Germany). Gradient elution was performed over 75 min from 5–30% acetonitrile (v/v) containing 0.1% formic acid (v/v) at an eluent flow rate of 200 nL/min after in-line flow splitting. The spray voltage was set to +1.8 kV and the temperature of the heated capillary was 200°C. The instrument method consisted of one full MS scan from 400 to 2000 m/z followed by data-dependent MS/MS scan of the 10 most intense ions, a dynamic exclusion repeat count of 2, and a repeat exclusion duration of 90 s. The full mass was scanned in the Orbitrap analyzer with R = 60,000 (defined at m/z = 400), and the subsequent MS/MS analysis was performed in the LTQ analyzer. To improve the mass accuracy, all measurements in the Orbitrap mass analyzer were performed with on-the-fly internal recalibration (“Lock Mass”). The charge state rejection function was enabled, and single charge and unassigned charge ions were rejected. All data were recorded with the Xcalibur software (ThermoFisher Scientific, San Jose, CA). Raw files were processed and analyzed by MaxQuant, Version 1.3.0.5 against the mouse International Protein Index protein sequence database (IPI Mouse, version 3.75), including commonly observed contaminants. The following parameters were used: cysteine carbamidomethylation was selected as a fixed modification; and the methionine oxidation and protein N-terminal acetylation were set variable modifications. Enzyme specificity was set to trypsin. Up to two missing cleavages of trypsin were allowed. SILAC double labeling (light: K0R0; heavy: K8R10) was set as the search parameter in order to assess the conversion efficiency. The precursor ion mass tolerances were 6 ppm, and fragment ion mass tolerance was 0.8 Da for MS/MS spectra. The false discovery rate (FDR) for peptide and protein was set at 1% and a minimum length of six amino acids was used for peptide identification. The proteingroup file was imported into Perseus (version 1.3.0.4) for statistical analysis of the data. The raw dataset (3275 proteins) was filtered to include only proteins with a minimum peptide ratio count of 2 and with quantification values in a minimum of 12 of 24 MS measurements (or 24 independent SCN samples), resulting in a stringently quantified dataset of 2112 proteins. One-way ANOVA was used to analyze this stringent dataset for temporal regulation, with p-values<0.05 indicating statistical significance. For the hierarchical clustering analysis, median value of logarithmized values for the normalized L/H ratio of each protein profile was performed after z-score normalization of the data within Euclidean distances. To identify the subset of 24-h rhythmic proteins, JTK_CYCLE algorithm was used on the SCN proteomic (2112 proteins) or the time-of-day proteomic (421 proteins) dataset under R language. The JTK_CYCLE algorithm allows the user to input integer values when defining the (non-statistical) parameters of a search. The values for the ratio L/H normalized of each protein profile from 24 mice were used. Any missing values (i.e., not detected by MS) were replaced with zero prior to JTK_CYCLE analysis, as per expert recommendation (Dr. Michael Hughes, personal communication). Using a similar strategy as reported previously to deal with missing values (ie., by replacing them with the minimum values observed for any given peptide) yielded the same results as replacing the missing values with zero, affirming the validity of our approach. p-values (ADJ.P) less than 0.05 were considered significant, and the corresponding proteins were classified as displaying a circadian rhythm . To find the 8-h or 12-h rhythmic proteins within the 421 protein dataset, another JTK_CYCLE analysis was separately performed with period lengths set at 8 and 12-h, respectively. Canonical pathways analyses and protein network of the time-of-day proteomic (421 proteins) dataset were mapped and summarized by Ingenuity Pathways Analysis (IPA), version 8.5 (Ingenuity Systems, Redwood City, CA). Canonical pathways analyses were performed with p value of 0.05 and networks were displayed with minimum significant score of 16. Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analysis was achieved using the DAVID Bioinformatics Resources (http://david.abcc.ncifcrf.gov). DAVID statistical analyses are performed against the whole genome . Proteomics has a tendency to oversample proteins from the cytosol while undersampling nuclear and membrane-associated proteins. To calculate exactly significant enrichment of time-of-day proteome in each GO term, we first calculated the amounts of matched proteins enriched either in the time-of-day proteome (421 proteins) or the total SCN proteome (2112 proteins). Fisher's exact test was used to check that the GO results were significantly enriched in the time-of-day proteome relative to the total SCN proteome. This was done to avoid any pathway/GO enrichment biases that would result from comparing our time-of-day proteome against the whole mouse database. The mass spectrometry proteomics data have been deposited to the ProteomeXchange Consortium (http://www.proteomexchange.org) via the PRIDE partner repository with the dataset identifier PXD000778. Total RNA was extracted from individual SCN tissues using the Trizol Reagent according to manufacturer's instructions. RNA concentration and purity were determined using the NanoPhotometer P-Class (Implen GmbH, Germany), and RNA integrity was confirmed by agarose gel electrophoresis. cDNA synthesis was performed using the Universal cDNA Synthesis Kit II (Exiqon) and 20 ng of total RNA (for miR-133b) or 100 ng of total RNA (for miR-133a). cDNA was diluted 1∶40 and real-time PCR was performed using the ExiLENT SYBR Green Master Mix (Exiqon) and hsa-miR-133a and hsa-miR-133b LNA™ PCR primer sets (Exiqon), on the Stratagene Mx3000P qPCR System. Values were normalized to 18S ribosomal RNA abundance. Neuro2A cells were grown on 6-well plates in DMEM containing 5% FBS and 1% penicillin-streptomycin at 37°C and 5% CO2 until they reached 75–80% confluence. Cells were then transfected in duplicate using Lipofectamine 2000 (Invitrogen) according to manufacturer's instructions. Cells were transfected with one of the following: miRCURY LNA Power Inhibitor (Exiqon) targeted towards either miR-133a or miR-133b; miRCURY LNA microRNA Mimic for either miR-133a or miR-133b; or miRCURY LNA microRNA inhibitor negative control. Protein lysates were harvested 24 h post-transfection for Western blot analysis. SCN containing tissues were homogenized on ice in RIPA buffer containing protease inhibitors. Homogenized tissues were incubated on ice for 20 min and centrifuged at 4°C at 17,000× g for 20 min. The supernatant was collected and stored at −80°C for downstream analysis. Protein concentration was measured using the Bradford assay. Protein lysates were mixed with SDS loading buffer to 1× concentration, heated at 95°C for 5 min, and centrifuged for 1 min at 17,000× g. Lysates (20 µg/well) were electrophoresed in a SDS polyacrylamide gel for approximately 2 h at 100 V at room temperature (RT) and electroblotted onto polyvinylidene fluoride (Immobilon P; Millipore, Bedford, MA) membrane for either 1 h at RT at 85 V, or overnight (O/N) at 4°C at 30 V. Protein transfer was confirmed using Ponceau S, followed by 3 washes for 5 min each in Tris Buffered Saline with 0.1% Triton X-100 (TBS-T). Membranes were blocked in 5% skim milk in TBS-T for 1 h at RT, followed by O/N incubation at 4°C with one of the following primary antibodies in blocking solution: rabbit anti-SYT1 (1∶500; cat #3347; Cell Signaling Technologies); rabbit anti-SV2A (1∶500; cat #ab32942; Abcam); rabbit anti-VAMP2 (1∶2000; cat#13508; Cell Signaling Technologies); rabbit anti-SH3GL2 (1∶2000; cat#ab169762; Abcam); rabbit anti-PAK1 (1∶500; cat#40852; Abcam); and rabbit anti-actin (1∶10,000; Sigma-Aldrich). The next day, membranes were washed in TBS-T and incubated for 2 h at RT with goat anti-rabbit horseradish peroxidase (HRP) conjugated secondary antibody (1∶250,000; ThermoFisher Scientific) in blocking solution. Chemiluminescent signal was developed using the SuperSignal West Femto Maximum Sensitivity Substrate reagent (ThermoFisher Scientific). Quantitation of western blots performed using the “measure” function in ImageJ (http://rsbweb.nih.gov/ij/) yielded a “mean gray” value for each protein band, which were normalized to background “mean gray” values. Values are presented as median relative abundance of the protein examined normalized to relative abundance of actin from 3 mice per time point. Tissue sections were washed 5 times for 5 min each in Phosphate Buffered Saline with 0.1% Triton X-100 (PBS-T). Sections were blocked in 10% horse serum in PBS-T for 1 h at RT and incubated O/N with one of the following primary antibodies in blocking solution: rabbit anti-NDUFA10 (1∶1000; cat #ab103026; Abcam). The next day tissues were washed 5×5 min in PBS-T, and incubated for 2 h at RT in the dark with Alexa Fluor 488 donkey anti-rabbit secondary antibodies (1∶1000; Invitrogen) in blocking solution. Sections were washed 5×5 min in PBS-T, incubated with DAPI for 5 minutes, and washed with PBS. Sections were mounted on microscope slides, cover-slipped with fluorescence DAKO mounting medium and sealed with nail-polish. Slides were stored at 4°C. IF images were captured using a Zeiss Axio Observer Z1 inverted microscope equipped with a Laser Scanning Microscope (LSM) 700 module along with the ZEN 2010 software (Zeiss, Oberkochen, Germany). Individual fluorochrome signals were collected sequentially using the multitrack setting along with appropriate barrier filters using the “smart set-up” option. IF images were acquired from a central focal plane of 2.3 µm optical thickness using the 10×, 20× or 40× objectives, or 1.0 um optical thickness using the 63× objective. Identical settings for gain, pinhole size, and brightness were used to acquire all images of the same magnification within each experiment. Adjustments to brightness and contrast were applied equally to all images within an experiment using Adobe Photoshop CS. For quantitative analysis, the bilateral SCN from the micrographs were outlined using the polygon tool in ImageJ. The “measure” function yielded a “mean gray” value for each of the two bilateral SCN, which were normalized to background “mean gray” values obtained from surrounding non-immunoreactive hypothalamalic regions. Values are presented as median relative abundance of the protein examined from 3 mice per time point. 1. ReppertSM, WeaverDR (2002) Coordination of circadian timing in mammals. Nature 418: 935–941. 2. MooreRY, EichlerVB (1972) Loss of a circadian adrenal corticosterone rhythm following suprachiasmatic lesions in the rat. Brain Res 42: 201–206. 3. StephanFK, ZuckerI (1972) Circadian rhythms in drinking behavior and locomotor activity of rats are eliminated by hypothalamic lesions. Proc Natl Acad Sci U S A 69: 1583–1586. 4. PandaS, AntochMP, MillerBH, SuAI, SchookAB, et al. (2002) Coordinated transcription of key pathways in the mouse by the circadian clock. Cell 109: 307–320. 5. UedaHR, ChenW, AdachiA, WakamatsuH, HayashiS, et al. (2002) A transcription factor response element for gene expression during circadian night. Nature 418: 534–539. 6. GreenbaumD, ColangeloC, WilliamsK, GersteinM (2003) Comparing protein abundance and mRNA expression levels on a genomic scale. Genome Biol 4: 117. 7. DeeryMJ, MaywoodES, CheshamJE, SladekM, KarpNA, et al. (2009) Proteomic analysis reveals the role of synaptic vesicle cycling in sustaining the suprachiasmatic circadian clock. Curr Biol 19: 2031–2036. 8. LimC, AlladaR (2013) Emerging roles for post-transcriptional regulation in circadian clocks. Nat Neurosci 16: 1544–1550. 9. TianR, Alvarez-SaavedraM, ChengHY, FigeysD (2011) Uncovering the proteome response of the master circadian clock to light using an AutoProteome system. Mol Cell Proteomics 10 M110 007252. 10. ChangHC, GuarenteL (2013) SIRT1 mediates central circadian control in the SCN by a mechanism that decays with aging. Cell 153: 1448–1460. 11. MusiekES, LimMM, YangG, BauerAQ, QiL, et al. (2013) Circadian clock proteins regulate neuronal redox homeostasis and neurodegeneration. J Clin Invest 123: 5389–5400. 12. IshihamaY, SatoT, TabataT, MiyamotoN, SaganeK, et al. (2005) Quantitative mouse brain proteomics using culture-derived isotope tags as internal standards. Nat Biotechnol 23: 617–621. 13. ZhouH, WangF, WangY, NingZ, HouW, et al. (2011) Improved recovery and identification of membrane proteins from rat hepatic cells using a centrifugal proteomic reactor. Mol Cell Proteomics 10 O111 008425. 14. RoblesMS, CoxJ, MannM (2014) In-vivo quantitative proteomics reveals a key contribution of post-transcriptional mechanisms to the circadian regulation of liver metabolism. PLoS Genet 10: e1004047. 15. MauvoisinD, WangJ, JouffeC, MartinE, AtgerF, et al. (2014) Circadian clock-dependent and -independent rhythmic proteomes implement distinct diurnal functions in mouse liver. Proc Natl Acad Sci U S A 111: 167–172. 16. JiaoX, ShermanBT, Huang daW, StephensR, BaselerMW, et al. (2012) DAVID-WS: a stateful web service to facilitate gene/protein list analysis. Bioinformatics 28: 1805–1806. 17. HughesME, HogeneschJB, KornackerK (2010) JTK_CYCLE: an efficient nonparametric algorithm for detecting rhythmic components in genome-scale data sets. J Biol Rhythms 25: 372–380. 18. HughesME, DiTacchioL, HayesKR, VollmersC, PulivarthyS, et al. (2009) Harmonics of circadian gene transcription in mammals. PLoS Genet 5: e1000442. 19. MasriS, PatelVR, Eckel-MahanKL, PelegS, ForneI, et al. (2013) Circadian acetylome reveals regulation of mitochondrial metabolic pathways. Proc Natl Acad Sci U S A 110: 3339–3344. 20. PodobedP, PyleWG, AcklooS, AlibhaiFJ, TsimakouridzeEV, et al. (2014) The day/night proteome in the murine heart. Am J Physiol Regul Integr Comp Physiol [epub ahead of print]. 21. MehtaN, ChengHY (2013) Micro-managing the circadian clock: The role of microRNAs in biological timekeeping. J Mol Biol 425: 3609–3624. 22. ChengHY, PappJW, VarlamovaO, DziemaH, RussellB, et al. (2007) microRNA modulation of circadian-clock period and entrainment. Neuron 54: 813–829. 23. HeyerMP, PaniAK, SmeyneRJ, KennyPJ, FengG (2012) Normal midbrain dopaminergic neuron development and function in miR-133b mutant mice. J Neurosci 32: 10887–10894. 24. Alvarez-SaavedraM, AntounG, YanagiyaA, Oliva-HernandezR, Cornejo-PalmaD, et al. (2011) miRNA-132 orchestrates chromatin remodeling and translational control of the circadian clock. Hum Mol Genet 20: 731–751. 25. ObrietanK, ImpeyS, StormDR (1998) Light and circadian rhythmicity regulate MAP kinase activation in the suprachiasmatic nuclei. Nat Neurosci 1: 693–700. 26. NishikawaY, ShibataS, WatanabeS (1995) Circadian changes in long-term potentiation of rat suprachiasmatic field potentials elicited by optic nerve stimulation in vitro. Brain Res 695: 158–162. 27. GintyDD, KornhauserJM, ThompsonMA, BadingH, MayoKE, et al. (1993) Regulation of CREB phosphorylation in the suprachiasmatic nucleus by light and a circadian clock. Science 260: 238–241. 28. WestermarkPO, HerzelH (2013) Mechanism for 12 hr rhythm generation by the circadian clock. Cell Rep 3: 1228–1238. 29. PeekCB, AffinatiAH, RamseyKM, KuoHY, YuW, et al. (2013) Circadian clock NAD+ cycle drives mitochondrial oxidative metabolism in mice. Science 342: 1243417. 30. Desquiret-DumasV, GueguenN, LemanG, BaronS, Nivet-AntoineV, et al. (2013) Resveratrol induces a mitochondrial complex I-dependent increase in NADH oxidation responsible for sirtuin activation in liver cells. J Biol Chem 288: 36662–36675. 31. RamseyKM, YoshinoJ, BraceCS, AbrassartD, KobayashiY, et al. (2009) Circadian clock feedback cycle through NAMPT-mediated NAD+ biosynthesis. Science 324: 651–654. 32. DallmannR, ViolaAU, TarokhL, CajochenC, BrownSA (2012) The human circadian metabolome. Proc Natl Acad Sci USA 109: 2625–2629. 33. VizcainoJA, CoteRG, CsordasA, DianesJA, FabregatA, et al. (2013) The PRoteomics IDEntifications (PRIDE) database and associated tools: status in 2013. Nucleic Acids Res 41: D1063–1069.
0.977713
How to integrate the results of multiple forecast time series to forecast another time series? How to forecast multiple time series from one search ? "Forecast Time Series" assistant returning "Error Code 1" Machine Learning Toolkit: For the Forecast Time Series function, how do I forecast the output to be categories? Splunk Machine Learning Toolkit - How do I use forecast time series? You can use reports and dashboards to monitor activity as it is happening, then drill down into events and do a root-cause analysis to learn why something happened. If there are patterns and correlations in events that you monitor, you can use them to predict future activity. With this knowledge, you can proactively send alerts based on thresholds and perform "what-if" analyses to compare various scenarios. The Splunk search language includes two forecasting commands: predict and x11. The predict command enables you to use different forecasting algorithms to predict future values of single and multivalue fields. The x11 command, which is named after the X11 algorithm, removes seasonal fluctuations in fields to expose the real trend in your underlying data series. You can select from the following algorithms with the predict command: LL, LLP, LLT, LLB, and LLP5. Each of these algorithms are variations of the Kalman filter. LLB Bivariate local level This is a bivariate model with no trends and no seasonality. Requires a minimum of 2 data points. LLB uses one set of data to make predictions for another. For example, assume it uses dataset Y to make predictions for dataset X. If the holdback=10, the LLB algorithm uses the last 10 data points of Y to make predictions for the last 10 data points of X. For more information, see the "predict command" in the Search Reference. The seasonal component of your time-series data is either additive or multiplicative, which is reflected in the two types of seasonality that you can calculate with the x11 command: add() for additive and mult() for multiplicative. How do you know which type of seasonality to adjust from your data? The best way to describe the difference between an additive and a multiplicative seasonal component is with an example: The annual sales of flowers will peak on and around certain days of the year, such as Valentine's Day and Mother's Day. During Valentine's Day, the sale of roses might increase by X dollars every year. This dollar amount is independent of the normal level of the series, and you can add X dollars to your forecasts for Valentine's Day every year, making this time series a candidate for an additive seasonal adjustment. In an additive seasonal adjustment, each value of a time series is adjusted by adding or subtracting a quantity that represents the absolute amount by which that value differs from normal in that season. Alternatively, in a multiplicative seasonal component, the seasonal effect expresses itself in percentage terms. The absolute magnitude of the seasonal variations increases as the series grows over time. For example, the number of roses sold during Valentine's Day might increase by 40% or a factor of 1.4. When the sales of roses is generally weak, the absolute (dollar) increase in Valentine's Day sales will also be relatively weak. However, the percentage will be constant. And, if the sales of roses are strong, then the absolute (dollar) increase will be proportionately greater. In a multiplicative seasonal adjustment, this pattern is removed by dividing each value of the time series by a quantity that represents the percentage from normal or divided by a factor that is typically observed in that season. The additive seasonal series shows steady seasonal fluctuations, regardless of the overall level of the series. The multiplicative seasonal series shows varying size of seasonal fluctuations that depend on the overall level of the series. For more information, see the "x11 command" in the Search Reference.
0.99995
Does QuietGrowth provide fingerprint security? Yes, QuietGrowth provides fingerprint security feature for its iOS and Android mobile apps. This feature is referred to as Touch ID for the iOS mobile app.
0.958979
What happens to my phone in an RFID blocking wallet? I'm curious about everyone's experience with using RIFD blocking fabric for blocking phone transmissions. If I put my phone in a pocket like this, will my phone struggle even harder to find a signal and run my battery down quickly? What other concerns come into play with using this to block signals to digital devices? I plan to experiment with different fabrics from lessemf.com if anyone has some recommendations or warnings. I can answer this with 100% certainty! I bought a RFID Eagle Creek holder that goes around your neck, not for the RFID but simply to use as a means for carrying my way too big iphone7 plus during summer walks when I have no pockets. It has been a weird experience to say the least. The phone turns does stuff by itself (e.g. sends messages or e-mails on its own) - and at first I thought that I must have hit it or touched it accidentally while walking. After several walks the phone was clearly overheating and the battery was running down way too much. I was sure to check that my WiFi was off so that it was not searching for a signal, but I almost never use WiFi anyway, but I think the phone was just trying endlessly to talk to or connect with a cell tower. Do NOT put your iphone (or perhaps other brands too) in a RFID pocket if you want a long-term working battery or an unburned pocket! Hey, Sarah, have you made any further progress on this? If you put your phone in aircraft mode, battery life should be OK. i like the "sounds off" feature. an incoming call still shows up on caller id, but does not disturb the peace. Like caitlinsdad says, your battery will run down massively, as the phone panics and starts shouting for phone masts. Having said that, RFID cards and mobile phones work on different technologies and radio frequencies - a pocket that blocks RFID data transfer *may* not block mobile phones. The best thing to do is to put your phone inside the RFID blocking pocket on purpose, and try to ring it. If you can get through, you should have no battery issues. On my regular phone with Verizon, if I am in an old house for most of the day, the metal lath in the plaster walls interfere with the reception. I will run down 3/4 of the battery which normally lasts for 2 to 3 days in standby. Kinda the same thing being stuck in a subway tunnel. Of course, getting missed messages and texts caught up is dependent on your service provider and how your phone reacts. Phones will try to use more power to find a signal or do its connection pings for service. when i first got a cell phone, i experimented with blocking signal. placing it in a metal pan with a tight fitting lid, it would still ring. i'm not sure if theres a difference in putting it in metal screen or cloth. wrap your phone in foil and see how long the battery lasts. you mean put the phone in my hat? "They" will find out anyways, especially when you use windows XP. dang, how did you know? You can catch the replay of Wearable Wednesdays with Becky Stern. She demonstrates and talks about fabric shielding pockets for your electronics. And welcome back, things around here aren't the same without a few or your ibles.
0.899827
Wht is Dual Table in Oracle? It is a dummy table in Oracle with one row and one Varchar2 column whose length is 1. They are variable length,1D array and store elements of same type as arrays of other languages. We need to specify the size at the time of VArray declaration. Let us say that a person has 2 mobile numbers. We can store these mobile numbers into a varray. Let us see how. They are 1D array like VArrays and can be use either in a relational table or in functions.Like VArrays, they are use for columns having multiple values.But they does not need any size to be define on them like VArrays and hence are unbound.They are,however, limited to the amount of memeory available.Each row of the nested table should be of the same type. e.g. Let us say that a person has 2 mobile numbers. We can store these mobile numbers into a Nested Table. b)Last : Returns the subscript of the last element in the nested table. c)Prior : Returns the subscript of the previous element in the nested table. d)Next : Returns the subscript of the next element in the nested table. a)Count : Returns the number of elements in the collection. It returns the number of bytes in the internal representation of expression. If expression is null, it returns null. It is similar to DataLength function in Sql Server. Oracle 9i R2 has renamed the index-by tables available in earlier versions of Oracle to Associative Arrays.Like VArrays/Nested Tables, they are also 1D array and can be use either in a relational table or in functions. They can not exist in the database and rather are found only in PL/SQL memory structures.They are use for columns having multiple values.It is basically a two-Column table where the first column is the INDEX while the second column holds the DATA ELEMENT.They are UNBOUND since they don't have any upper limits to grow. 1.There is no need to extend an Associative Array for adding elements. 2.They don't need to be initialized. 3.The array elements are added in any order and at any position. First we need to create an Associative Array Type as under. Please note that the Existing type can only be BINARY_INTERGER or VARCHAR. It provides many built in methods to work with e.g. a)First: Returns the subscript of the first element in the associative array. b)Last: Returns the subscript of the last element in the associative array. c)Prior: Returns the subscript of the previous element in the associative array. d)Next: Returns the subscript of the next element in the associative array. The Compose function of Oracle accepts a string and returns a Unicode string.It also accepts an expression that can be resolve to a string. where "string" parameter can be a Char,Nchar,NClob,NCHAR, DUACLOB, VARCHAR2, or NVARCHAR2. This function of Oracle returns a Unicode string.It is the exact opposite of Compose function. 4)An entire block of statements can be send to Oracle engine at a single point of time for processing . When you want to select records that contain row id with odd number, then you need to execute this query.
0.999621
Indicate the number of shares outstanding of each of the issuer’s classes of common stock, as of the latest practicable date. As of February 13, 2019, 91,848,197 shares of common stock were issued and outstanding. Certain statements in this report contain or may contain forward-looking statements. These statements, identified by words such as “plan”, “anticipate”, “believe”, “estimate”, “should”, “expect” and similar expressions include our expectations and objectives regarding our future financial position, operating results and business strategy. These statements are subject to known and unknown risks, uncertainties and other factors, which may cause actual results, performance, or achievements to be materially different from any future results, performance or achievements expressed or implied by such forward - looking statements. These forward-looking statements were based on various factors and were derived utilizing numerous assumptions and other factors that could cause our actual results to differ materially from those in the forward-looking statements. These factors include, but are not limited to, our ability to secure suitable financing to continue with our existing business or change our business and conclude a merger, acquisition or combination with a business prospect, economic, political and market conditions and fluctuations, government and industry regulation, interest rate risk, U.S. and global competition, and other factors. Most of these factors are difficult to predict accurately and are generally beyond our control. You should consider the areas of risk described in connection with any forward-looking statements that may be made herein. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date of this report. Readers should carefully review this report in its entirety, including but not limited to our financial statements and the notes thereto and the risks described in our Annual Report on Form 10-K for the fiscal year ended September 30, 2018. We advise you to carefully review the reports and documents we file from time to time with the Securities and Exchange Commission (the “SEC”), particularly our quarterly reports on Form 10-Q and our current reports on Form 8-K. Except for our ongoing obligations to disclose material information under the Federal securities laws, we undertake no obligation to release publicly any revisions to any forward-looking statements, to report events or to report the occurrence of unanticipated events. When used in this report, the terms, “we,” the “Company,” “our,” and “us” refers to AngioSoma Inc., a Nevada corporation and its subsidiaries unless the context specifically indicates otherwise. AngioSoma, Inc., a Nevada corporation (“AngioSoma” or the “Company”), is a clinical stage biotechnology company focused on improving the effectiveness of current standard-of-care treatments, especially related to endovascular interventions in the treatment of peripheral artery disease (PAD). AngioSoma is developing its lead product, a drug candidate called LiprostinTM for the treatment of peripheral artery disease, or PAD, which has completed FDA Phase I and three Phase II clinical trials. We are in discussions with several contract research organizations for completion of our FDA protocol for Phase III and submission of our new drug application for marketing in the US and its territories. The Company was incorporated on April 29, 2016. The Company’s year-end is September 30. The accompanying financial statements have been prepared assuming that the Company will continue as a going concern. For the three months ended December 31, 2018, the Company had a net loss of $328,243 and negative cash flow from operating activities of $72,688. As of December 31, 2018, the Company had negative working capital of $857,332. Management does not anticipate having positive cash flow from operations in the near future. These factors raise a substantial doubt about the Company’s ability to continue as a going concern. The accompanying consolidated financial statements do not include any adjustments to reflect the possible future effects on the recoverability and classification of assets or the amounts and classifications of liabilities that may result from the possible inability of the Company to continue as a going concern. The Company does not have the resources at this time to repay its credit and debt obligations, make any payments in the form of dividends to its shareholders or fully implement its business plan. Without additional capital, the Company will not be able to remain in business. In the near term, management plans to continue to focus on raising the funds necessary to implement the Company’s business plan. Management will continue to seek out debt financing to obtain the capital required to meet the Company’s financial obligations. There is no assurance, however, that lenders will continue to advance capital to the Company or that the new business operations will be profitable. The possibility of failure in obtaining additional funding and the potential inability to achieve profitability raise doubts about the Company’s ability to continue as a going concern. In the long term, management believes that the Company’s projects and initiatives will be successful and will provide cash flow to the Company, which will be used to finance the Company’s future growth. However, there can be no assurances that the Company’s planned activities will be successful, or that the Company will ultimately attain profitability. The Company’s long-term viability depends on its ability to obtain adequate sources of debt or equity funding to meet current commitments and fund the continuation of its business operations, and the ability of the Company to achieve adequate profitability and cash flows from operations to sustain its operations. The accompanying unaudited financial statements have been prepared in accordance with accounting principles generally accepted in the United States of America (“GAAP”) for interim financial information and with the instructions to Form 10-Q and Regulation S-X. The results of operations for the three months ended December 31, 2018 are not necessarily indicative of the results to be expected for the full fiscal year ending September 30, 2019. The consolidated financial statements of the Company include the accounts of the Company and its wholly owned subsidiaries, AngioSoma Research, LLC, First Titan Energy, LLC and First Titan Technical, LLC from the date of their formations or acquisition. Significant intercompany transactions have been eliminated in consolidation. The Company’s balance sheet includes certain financial instruments. The carrying amounts of current assets and current liabilities approximate their fair value because of the relatively short period between the origination of these instruments and their expected realization. Inputs other than quoted prices included within Level 1 that are observable for the asset or liability, either directly or indirectly, including quoted prices for similar assets or liabilities in active markets; quoted prices for identical or similar assets or liabilities in markets that are not active; inputs other than quoted prices that are observable for the asset or liability (e.g., interest rates); and inputs that are derived principally from or corroborated by observable market data by correlation or other means. Inputs that are both significant to the fair value measurement and unobservable. Fair value estimates discussed herein are based upon certain market assumptions and pertinent information available to management as of December 31, 2018. The respective carrying value of certain on-balance-sheet financial instruments approximated their fair values due to the short-term nature of these instruments. These financial instruments include accounts receivable, other current assets, accounts payable, and accrued expenses. The fair value of the Company’s notes payable is estimated based on current rates that would be available for debt of similar terms that is not significantly different from its stated value. The Company sells nutraceutical products online via its website www.angiosoma.com. Inventory consists of finished goods and is stated at the lower of cost by the first-in, first-out method or net realizable value. Effective October 1, 2018, the Company adopted ASC 606 — Revenue from Contracts with Customers. Under ASC 606, the Company recognizes revenue from the commercial sales of products, licensing agreements and contracts to perform pilot studies by applying the following steps: (1) identify the contract with a customer; (2) identify the performance obligations in the contract; (3) determine the transaction price; (4) allocate the transaction price to each performance obligation in the contract; and (5) recognize revenue when each performance obligation is satisfied. For the comparative periods, revenue has not been adjusted and continues to be reported under ASC 605 — Revenue Recognition. Under ASC 605, revenue is recognized when the following criteria are met: (1) persuasive evidence of an arrangement exists; (2) the performance of service has been rendered to a customer or delivery has occurred; (3) the amount of fee to be paid by a customer is fixed and determinable; and (4) the collectability of the fee is reasonably assured. There was no impact on the Company’s financial statements as a result of adopting Topic 606 for the three months ended December 31, 2018. The Company follows subtopic 450-20 of the FASB Accounting Standards Codification to report accounting for contingencies. Certain conditions may exist as of the date the consolidated financial statements are issued, which may result in a loss to the Company but which will only be resolved when one or more future events occur or fail to occur. The Company assesses such contingent liabilities, and such assessment inherently involves an exercise of judgment. There are no known commitments or contingencies as of December 31, 2018. As of December 31, 2018 and September 30, 2018, the Company had non-interest bearing advances payable to third parties of $59,650. These advances are payable on demand. Convertible note dated April 13, 2017 in the original principal amount of $20,000, no stated maturity date, bearing interest at 3% per year, convertible into common stock at a rate of $0.01 per share. Convertible note dated May 14, 2018 in the original principal amount of $58,000, maturing February 28, 2019, bearing interest at 12% per year, convertible beginning November 14, 2018 into common stock at a rate of 65% of the average of the two lowest trading prices during the 15 trading days prior to conversion. During the three months ended December 31, 2018, principal in the amount of $58,000 and accrued interest in the amount of $3,480 were converted into a total of 6,959,142 shares of common stock. Convertible note dated June 25, 2018 in the original principal amount of $43,000, maturing April 15, 2019, bearing interest at 12% per year, convertible beginning December 25, 2018 into common stock at a rate of 65% of the average of the two lowest trading prices during the 15 trading days prior to conversion. During the three months ended December 31, 2018, principal in the amount of $12,000 was converted into a 2,006,689 shares of common stock. Convertible note dated August 2, 2018 in the original principal amount of $33,000, maturing May 15, 2019, bearing interest at 12% per year, convertible beginning February 2, 2019 into common stock at a rate of 65% of the average of the two lowest trading prices during the 15 trading days prior to conversion. Convertible note dated September 7, 2018 in the original principal amount of $40,000, maturing June 30, 2019, bearing interest at 12% per year, convertible beginning March 7, 2019 into common stock at a rate of 65% of the average of the two lowest trading prices during the 15 trading days prior to conversion. Convertible note dated October 31, 2018 in the original principal amount of $38,000, maturing August 15, 2019, bearing interest at 12% per year, convertible beginning August 15, 2019 into common stock at a rate of 65% of the average of the two lowest trading prices during the 15 trading days prior to conversion. All principal along with accrued interest is payable on the maturity date. The notes are convertible into common stock at the option of the holder. The holder of the notes cannot convert the notes into shares of common stock if that conversion would result in the holder owning more than 4.9% of the outstanding stock of the Company. As of December 31, 2018 and September 30, 2018, accrued interest on notes payable was $235,810 and $232,307, respectively. During the three months ended December 31, 2018 and 2017, interest expense on the notes payable was $6,983 and $1,205, respectively. During the three months ended December 31, 2018, the holders of the Convertible Note Payable dated May 14, 2018 elected to convert, in four separate transactions, principal of $58,000 and accrued interest of $3,480 into a total of 6,959,142 shares of common stock. A loss in the aggregate amount of $12,073 was recognized on the conversions. Also during the three months ended December 31, 2018, the Company issued 3,300,001 shares of common stock with a fair value of $99,000 for the conversion of a note payable with a basis of $0. A loss in the amount of $99,000 was recorded on this transaction. Also during the three months ended December 31, 2018, the holders of the Convertible Note Payable dated June 25, 2018, elected to convert principal of $12,000 into 2,006,689 shares of common stock. The Company recorded a loss of $4,238 on this transaction. The Company entered into a promissory note with its attorney to refinance accounts payable of $68,793 as of September 30, 2016 into a promissory note. The note can be issued up to the total principal amount of $100,000 and includes the prepayment of legal fees of $31,498 to be incurred during the period from October 1, 2016 through March 1, 2017. The note payable was recorded at $68,793 (the amount of refinanced accounts payable) as of September 30, 2017. There was no prepayment recognized as of September 30, 2017. During the year ended September 30, 2018, the company increased the amount of the note to $100,000 in connection with legal fees incurred. The note bears interest at the prime rate and requires monthly payments of principal and interest of $10,000 beginning July 1, 2017, the maturity date. As of December 31, 2018, the note is classified in current liabilities on the balance sheet; no principal payments have been made on this note. During the three months ended December 31, 2018, the Company accrued interest in the amount of $1,331 on this note. David Summers, a significant shareholder of the Company, provides consulting services to the Company related to the development of our products. In addition, the Company had previously rented office space from Mr. Summers for $400 per month under a month to month lease. As of December 31, 2018, services, rent and other expense reimbursements in the amount of $112,804 was unpaid. The Company is also involved in a legal dispute with Mr. Summers to gather the funds due, as well as settle claims on certain patents and formulas. There is no significant exchange of monies or ownership anticipated. Alex Blankenship is paid $5,000 per month under her employment agreement as Chief Executive Officer of the Company. As of December 31, 2018, the Company owed Ms. Blankenship $135,438 for unpaid compensation. As of December 31, 2018, the Company owed Sydney Jim, our former CEO, $38,130 for accrued but unpaid compensation. During the three months ended December 31, 2017, the Company issued 2,400,000 shares of common stock upon conversion of the Series B Preferred Stock. A loss of $7,250 was recognized and is recorded in Additional paid-in capital on the consolidated balance sheet. During three months ended December 31, 2018, the Company issued 1,098,901 shares of common stock upon the conversion of principal of $15,000. A loss in the amount of $3,616 was recognized on this transaction. During three months ended December 31, 2018, the Company issued 1,442,308 shares of common stock upon the conversion of principal of $15,000. A loss in the amount of $3,365 was recognized on this transaction. During three months ended December 31, 2018, the Company issued 1,224,490 shares of common stock upon the conversion of principal of $12,000. A loss in the amount of $1,531 was recognized on this transaction. During three months ended December 31, 2018, the Company issued 3,193,443 shares of common stock upon the conversion of principal of $16,000 and accrued interest in the amount of $3,561. A loss in the amount of $3,561 was recognized on this transaction. During three months ended December 31, 2018, the Company issued 2,006,689 shares of common stock upon the conversion of principal of $12,000. A loss in the amount of $4,238 was recognized on these transaction. During the three months ended December 31, 2018, the Company issued 3,300,001 shares of common stock with a fair value of $99,000 for the conversion of a note payable with a basis of $0. A loss in the amount of $99,000 was recorded on this transaction. During three months ended December 31, 2017, the Company issued 6,000,000 shares of common stock upon the conversion of principal of $0. A loss of $328,200 was recognized on the transaction because it occurred after all debt had been fully converted as of September 30, 2017. This is recorded under additional paid-in capital. The Company is involved in a legal dispute with Mr. David Summers, a significant shareholder, regarding the settlement of claims on certain patents and formulas. There is no significant exchange of monies or ownership anticipated, and the Company has not accrued a liability with regard to this dispute. On January 3, 2019, the Company issued 2,842,809 shares of common stock for the conversion of notes payable in the principal amount of $17,000. On January 8, 2019, the Company issued 2,402,899 shares of common stock for the conversion of notes payable in the principal amount of $14,000 and accrued interest in the amount of $2,580. On February 13, 2019, the Company issued 1,513,636 shares of common stock for the conversion of notes payable in the principal amount of $18,000 and accrued interest in the amount of $1,980. AngioSoma is a clinical stage biotechnology company focused on improving the effectiveness of current standard-of-care treatments, especially related to endovascular interventions in the treatment of peripheral artery disease (PAD). We prepare our consolidated financial statements in conformity with GAAP, which requires management to make certain estimates and apply judgments. We base our estimates and judgments on historical experience, current trends, and other factors that management believes to be important at the time the condensed consolidated financial statements are prepared. We regularly review our accounting policies, and how they are applied and disclosed in our condensed consolidated financial statements. While we believe that the historical experience, current trends and other factors considered support the preparation of our condensed consolidated financial statements in conformity with GAAP, actual results could differ from our estimates and such differences could be material. Revenue. We had revenue of $275 for the three months ended December 31, 2018, compared to $0 for the three months ended December 31, 2017. Revenue consisted of the sale of nutriceuticals. Cost of goods sold. We had cost of goods sold of $47 for the three months ended December 31, 2018, compared to $0 for the three months ended December 31, 2017. The increase was due to the increase in sales. General and administrative expense. We recognized general and administrative expense of $129,623 for the three months ended December 31, 2018 compared to $128,685 for the comparable period of 2017. The increase in general and administrative expense was related to an increase in non-cash compensation during the period. Loss on conversion of debt and preferred stock. We recognized a loss on the conversion of debt in the amount of $115,311 during the three months ended December 31, 2018 compared to $335,450 during the three months ended December 31, 2017. The decrease was due to the loss on conversion of preferred stock and convertible notes payable. Interest expense. We recognized interest expense of $83,537 for the three months ended December 31, 2018 compared to $1,205 for the comparable period of 2017. The increase was due primarily to the amortization of the discount on convertible notes payable during the current period in the amount of $76,554 compared to $2,931 during the comparable period of the prior year. Net loss. For the reasons above, we recognized a net loss of $328,243 for the three months ended December 31, 2018 compared to $465,350 for the three months ended December 31, 2017. At December 31, 2018, we had cash on hand of $53,909. The Company has negative working capital of $857,332. Net cash used in operating activities for the three months ended December 31, 2018 was $72,688. Cash on hand is adequate to fund our operations for less than twelve months. We do not expect to achieve positive cash flow from operating activities in the near future. We will require additional cash in order to implement our business plan. There is no guarantee that we will be able to attain fund when we need them or that funds will be available on terms that are acceptable to the Company. We have no material commitments for capital expenditures as of December 31, 2018. Additional financing is required to continue operations. Although actively searching for available capital, the Company does not have any current arrangements for additional outside sources of financing and cannot provide any assurance that such financing will be available. We carried out an evaluation, under the supervision and with the participation of our management, including our principal executive officer and principal financial officer, of the effectiveness of our disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) as of December 31, 2018. Based upon that evaluation, our principal executive officer and principal financial officer concluded that, as of December 31, 2018, our disclosure controls and procedures were not effective to ensure that information required to be disclosed in reports filed by us under the Securities Exchange Act of 1934 is recorded, processed, summarized and reported within the required time periods and is accumulated and communicated to our management, including our principal executive officer and principal financial officer, as appropriate to allow timely decisions regarding required disclosure. As of December 31, 2018, we did not maintain effective controls over the control environment. Specifically, we have not developed and effectively communicated to our employees our accounting policies and procedures. This has resulted in inconsistent practices. Since these entity level programs have a pervasive effect across the organization, management has determined that these circumstances constitute a material weakness. As of December 31, we did not maintain effective controls over financial statement disclosure. Specifically, controls were not designed and in place to ensure that all disclosures required were originally addressed in our financial statements. Accordingly, management has determined that this control deficiency constitutes a material weakness. Our management, including our principal executive officer and principal financial officer, who is the same person, does not expect that our disclosure controls and procedures or our internal controls will prevent all error or fraud. A control system, no matter how well conceived and operated, can provide only reasonable, not absolute, assurance that the objectives of the control system are met. Further, the design of a control system must reflect the fact that there are resource constraints and the benefits of controls must be considered relative to their costs. Due to the inherent limitations in all control systems, no evaluation of controls can provide absolute assurance that all control issues and instances of fraud, if any, have been detected. We know of no material, active or pending legal proceedings against us, nor are we involved as a plaintiff in any material proceedings or pending litigation. There are no proceedings in which any of our directors, officers or affiliates, or any registered beneficial shareholder are an adverse party or has a material interest adverse to us. The Company has not defaulted upon senior securities. Incorporated by reference to our Definitive Proxy Statement on Schedule 14A filed on April 8, 2015. Incorporated by reference to our Form 10-K/A Amendment No. 1 for the year ended September 30, 2015 filed on January 22, 2016. Incorporated by reference to our Form S-1 filed with the Securities and Exchange Commission on November 3, 2010.
0.999948
Why did I pick this up? Someone had told me if liked the Harry Dresden books that I should try this series. What is the story? Stark got sent to Hell 11 years ago without dying and managed to survive. While there he was like the gladiator that would not die facing all kinds of enemies. When he comes back to Earth he is looking for those who sent him to hell and wants revenge on them. While doing that he helps save the world, make some friends and learn a lot about himself. Did I like it? Yes, Stark is Harry Dresden without the humor and without so many friends. He is a one man wrecking crew. What is with the title of the review? Stark is a magical being like Dresden and battles supernatural enemies here on the earthly plain.
0.976657
Next, you can do a CURL REST call simulating a WS client using the teacher token.. You need to replace the wstoken, feedbackid (the feedback instance value) and the URL of your moodle instance. curl 'http://localhost/m/stable_master/webservice/rest/server.php?moodlewsrestformat=json' --data 'feedbackid=16&wsfunction=mod_feedback_get_responses_analysis&wstoken=a70d553bbaf6d9b260a9e5c701b3c46e&moodlewssettingfilter=true' | python -m "json.tool" Double check that the anonattempts->number match the Response number in the Show responses tab. Create or use an existing anonymous feedback Complete the feedback with at least 2 students As admin, enable "Mobile services": Site administration ► Mobile app ► Mobile settings Create token for one teacher in the same course that the students Click on Site administration ► Plugins ► Web services ► Manage tokens Next, you can do a CURL REST call simulating a WS client using the teacher token.. You need to replace the wstoken, feedbackid (the feedback instance value) and the URL of your moodle instance. curl 'http://localhost/m/stable_master/webservice/rest/server.php?moodlewsrestformat=json' --data 'feedbackid=16&wsfunction=mod_feedback_get_responses_analysis&wstoken=a70d553bbaf6d9b260a9e5c701b3c46e&moodlewssettingfilter=true' | python -m "json.tool" Confirm that the data returned by the WS match the information in the Show responses tab of the feedback when you are checking it as teacher in Moodle. (it is very important to first execute the WS request and then open the show responses tab using a teacher/manager account.) Double check that the anonattempts->number match the Response number in the Show responses tab. It seems that anonattempts is always set to 0, but if the teacher access the Web version the WS will return a different value. It is like the web version is setting some additional information.
0.999717
Fantasy is a tricky genre to do a recommendations list for because it has such a wide variety of sub-genres under it. This being the case, no one can truly know what type of story they will be getting into when they are recommended a fantasy novel without first asking what kind of settings or characters it focuses on. With this in mind, I have organized my recommendations list by these sub-genres to help anyone who reads this to know what type of fantasy books they will be getting into if they decide to read them. Because many of these sub-genres overlap, I am going pair them up by how similar they are to each other. These sub-genres are generally separated more by their focus rather than their setting or characters. The most common settings for them resemble Medieval Europe and they generally have a large cast of characters with each one getting their own large scale story arcs which all come together in the end. These sub-genres both focus on a single main character. In these novels the settings are not as important as the kind of character the book is about, whether it’s a young character learning to become someone important in the world or an older character trying to redeem themselves it generally brings up questions morality and heroism. These sub-genres both usually focus on multiple relationships between teams or groups of characters and how that group, when working together, effects the world overall . These generally take place during a wartime setting and focuses on being dark and gritty and sometimes on the art of war and the cost of being a warrior. Although there are a wide variety of settings and character types for these books, the most common attributes between these sub-genres is the light narrative styles, majority but not exclusively urban fantasy environments and young or new adult characters. Urban fantasy can also focus on supernatural elements like vampires and the occult. These sub-genres blur the lines between fantasy and science fiction either because of the futuristic settings creating fantasy like elements or science fiction/fantasy elements leading to a post apocalyptic setting. In this regard, these plot tools can lead to a barren or fantasy-like future world sometimes indistinguishable from fantasy. These are the fantasy series with alternative worlds that don’t resemble the classic medieval settings. Because of this they can have settings resembling either eastern or middle eastern settings, renaissance settings or even fantasy versions of the Napoleonic era. There is also a tendency towards steam powered devices for some reason.
0.997974
What is the true meaning of reasonable body goals? In this era of immersive popular culture, one of the more common tropes that arises in online social media communities is the idea of ‘body goals,’ and the total package that these two words entail. One of the most important aspects of healthy body goals is focusing on what is intrinsically realistic while attaining your desired self-image. We all have different motivations for working out, whether vague or specific, but reasonable body goals, and having the right mentality to achieve them, is crucial to your health and wellness. From a young age, targeted advertising campaigns and mass media insist that the ‘conventionally attractive’ body, with a thin waist or the ‘Dorito’ waist-to-shoulder ratio, is the gold standard for health, beauty, and desirability. According to the American Communication Journal, there is a significant link between women’s body dissatisfaction and the media’s effect on body confidence and self-esteem. Peer pressure is also prevalent in conversations about body weight and the perception of one’s body image by others. Psychology of Men & Masculinity has also identified a connection between men’s self-image and media portrayals of the ideal male figure, especially in relation to musculature. The media therefore plays a significant role in the trending self-image crisis, especially among young adults under 40. As desire for the idealized body type grows, Body Dysmorphic Disorder (BDD), a condition in which either real or imagined physical flaws consume and take over an individual’s life, comes into increasing conflict with reasonable body goals. Social anxiety and depression, among others, often coincide with BDD. Understanding BDD is crucial because for many people, body image is the reason why they start working out. When a person does not like the way they look or wants to get back to the way that they looked before, it is easy to fall into a pit of obsessive workouts and unhealthy routines to try and obtain the unattainable. Instead, aim for a healthy lifestyle and work out in moderation. Though it is different for every individual, any body goal can be reasonable as long as you can maintain a healthy physical and mental lifestyle while reaching for it. At the end of the day, make the change for yourself. You are the one living in your body, not the media, or anyone else who wants you to conform to their ideals.
0.952739
A formation of B-17 Flying Fortresses of the 381st Bomb Group is escorted during a practice mission by a P-51 Mustang of the 355th Fighter Group. The Fortresses, left to right, are (VP-S, serial number 42-97059) nicknamed "Marsha Sue", (VE-N, serial number 43-37675) nicknamed "Patches (Flak Magnet)", (VE-K, serial number 42-106994) nicknamed "Little Guy" and (VE-O, serial number 42-107112) nicknamed "Sleepy Time Gal". B-17 Flying Fortresses of the 381st Bomb Group fly in formation during a practice mission. The aircraft, left to right are: (VE-O, serial number 41-107112) nicknamed "Sleepy Time Gal", (VE-N, serial number 43-37675) nicknamed "Patches (Flak Magnet)", (VE-K, serial number 42-106994) nicknamed "Little Guy" and (VP-S, serial number 42-97059) nicknamed "Marsha Sue". Image via Ian MacTaggart. B-17 Flying Fortresses of the 381st Bomb Group are escorted during a practice mission by a P-51 Mustang of the 355th Fighter Group. The Fortresses, left to right, are (VE-N, serial number 43-37675) nicknamed "Patches (Flak Magnet)", (VE-K, serial number 42-106994) nicknamed "Little Guy" and (VE-O, serial number 42-107112) nicknamed "Sleepy Time Gal". B-17 Flying Fortresses, (VE-O, serial number 41-107112) nicknamed "Sleepy Time Gal", (VE-N, serial number 43-37675) nicknamed "Patches (Flak Magnet)", (VE-K, serial number 42-106994) nicknamed "Little Guy", (VP-S,serial number 42-97059) nicknamed "Marsha Sue" and (GD-P, serial number 44-6163) of the 381st Bomb Group fly in formation during a practice mission. B-17 Flying Fortresses, (VE-O, serial number 41-107112) nicknamed "Sleepy Time Gal", (VE-N, serial number 43-37675) nicknamed "Patches (Flak Magnet)" of the 381st Bomb Group in flight during a practice mission. "Boeing B-17 Flying Fortresses of the 8th Air Force flying toward the oil plant at Merseberg, Germany, 11/25/44, in one of the many attacks against Nazi oil sources. 381st Bomb Group." Closest to camera is B-17G 'Patches' aka 'Flak Magnet' VE-N 43-37675 of 532nd BS 381st BG and unidentified MS coded 535nd BS Fortresses. Delivered Cheyenne 10/5/44; Kearney 22/5/44; Dow Fd 29/5/44; Assigned 532BS/381BG [VE-N] Ridgewell 10/6/44 PATCHES; 55+m battle damaged Neckarsulm 1/3/45 with Price; last sighted St Pol sur Ternoise, Fr, force landed France?; repaired & ret group; Missing Air Crew Report 12810. Returned to the USA Bradley 28/5/45; 4168 Base Unit, South Plains, Texas 6/6/45; Reconstruction Finance Corporation (sold for scrap metal in USA) Kingman 17/12/45. FLAK MAGNET.
0.920022
Piper Mills' parents died when she was six and her grandparents raised her. While recovering from an equestrian related accident that leaves her terrified of horses, her grandparents die. Piper remembers an old box she helped her grandfather bury when she was twelve, so she unearths it and finds her grandmother's girlhood scrapbook and returned letters with her grandmother begging for someone named Lilian's forgiveness. Also in this box, there is a key that leads to a secret room in her house. Realizing that she never knew her grandmother, Piper decides to contact Lilian. Lilian refuses to see Piper, unwilling to dredge up old memories, so Piper visits their horse ranch under a false name. As she begins to research her grandmother's life and get to know the aristocratic 90-year-old Lilian and her grandchildren, Helen and Tucker, she discovers a dark secret that tore three women apart and changed the course of their lives forever. I stayed up late in the night to finish this book. At the heart of it, is Piper learning how to live again by researching her grandma's life. It made me want to call up my grandma and learn her story before it is too late. It is a happy and hopeful book that I became completely immersed in. I highly recommend this novel.
0.903892
The vikings or Varangians were traders, settlers (and most certainly pirates after many unsuccessful ventures) from Scandinavia who in the years between 800 and 1050 colonized, raided and traded the lengths of the coasts, rivers and islands of Europe and the northeastern shores of North America. They called themselves Norsemen (Northmen) (modern Scandinavians still refer to themselves as the people of the North, nordbor). Their ruthlessness and courage in battle is well-documented, but they also built settlements and were skilled craftsmen and traders. In Russia and the Byzantine Empire, the vikings were known as Varangians (Væringjar, meaning "sworn men"), and the Scandinavian bodyguards of the Byzantine emperors were known as the Varangian Guard. Other names include Danes, Northmen, Norseman Germanians and Normans. The modern day nations descended from the vikings are Icelanders, Norwegians, Danes, Swedes and Faroe Islanders. The etymology is somewhat unclear. One path might be from the old Norse word 'vík', meaning 'bay', 'creek' or 'inlet', and the suffix '-ing', meaning 'coming from' or 'belonging to'. Thus, "vikings" would be 'people of the creeks', especially in the area Viken. Later on, the term became synonymous with 'raider of the sea'. The word "vikingr" ("vikings") appears on several rune stones found in Scandinavia. However, it was mentioned for the very first time in the ancient Anglo-Saxon poem "Widsith" from the 6th or 7th century. Hence, the second path suggested steems from Old English wíc, i.e. "trading city", (from latin vic, "village"). Even a third path is suggested, where viking comes from avviker ("dissenter"); that is "mariners that left (avviker) from home". According to the Swedish writer Jan Guillou, the word in its positive sense was popularized by Erik Gustaf Geijer in the poem The Viking, written at the beginning of the 19th century. Now, the word was taken to signify brave sea warriors who had very little to do with the politics shared by the actual vikings in the Catholic history. This change of meaning was however, quite political: a myth about a glorious and brave past was needed to give the Swedes the courage to retake Finland, which had been lost in 1809 during the war between Sweden and Russia. Finland had belonged to the kingdom of Sweden for about 600 years. The Geatish Society, of which Geijer was a member, popularized this myth to a great extent. Another author who had great a influence on the perception of the Vikings was Esaias Tegnér, another member of the Geatish Society who wrote a modern version of Frithiofs Saga, which became widely popular in the nordic countries, the United Kingdom and Germany. The viking propensity for trade is easily seen in large towns such as Hedeby; close to the border with the Franks, it was effectively a crossroads between the cultures until its eventual destruction by the Norwegians in an internecine dispute around the year 1050. The earliest date given for a Viking raid is 789, when according to the Anglo Saxon Chronicle, Portland was attacked. A more reliable report dates from 793, when the monastery at Lindisfarne on the east coast of England was pillaged by foreign seafarers. For the next 200 years, European history is filled with tales of Vikings and their plundering. Vikings exerted influence throughout the coastal areas of Ireland and Scotland, and conquered large parts of England (see Danelaw). They travelled up the rivers of France and Spain, and gained control of areas in Russia and along the Baltic coast. Stories tell of raids in the Mediterranean and as far east as the Caspian Sea. The Vikings founded cities such as Jorvik (York), Kyiv and Dublin. The Danes sailed south, to Friesland, France and the southern parts of England. In the years 1013-1016, Canute the Great succeeded to the English throne. The Swedes sailed to east into Russia, where Rurik founded the first Russian state, and on the rivers south to the Black Sea, Constantinople and the Byzantine Empire. The Norwegians travelled to the north-west and west, to the Faroes, Shetland, Orkney, Ireland and the northern parts of England. Apart from Britain and Ireland, Norwegians mostly found largely uninhabited land and established settlements. In about the year 1000 A.D, North America was discovered by Bjarni Herjólfsson. Leif Ericsson and Þórfinnur Karlsefni from Greenland attempted to settle the land which they dubbed Vinland. A small settlement was placed on the northern peninsula of Newfoundland, near L'Anse aux Meadows, but previous inhabitants and a cold climate brought it to an end within a few years (see Freydís Eiríksdóttir). The archaeological remains are now a UN World Heritage Site. It has now been scientifically established that at the height of the Viking expansion, the northern hemisphere entered into a period of unusual and long-lasting cold which continued for several hundred years. This miniature ice age decimated the Greenland colonies, stopped the Viking westward expansion and hampered the Viking homelands. Besides allowing the Vikings to travel far distances, their longships gave them tactical advantages in battles. They could perform very efficient hit-and-run attacks, in which they attacked quickly and unexpectedly and left before a counter-offensive could be launched. Longships could also sail in shallow waters, allowing the Vikings to travel far inland along the rivers. A reason for the raids is believed by some to be overpopulation caused by technological advances such as the use of iron, although another cause could well be pressure caused by the Frankish expansion to the south of Scandinavia. For people living along the coast it seems natural to seek new land by sea. Another reason is that in that period several European countries (particularly England, Wales and Ireland) were in internal disarray and easy prey; the Franks, however, had well-defended coasts and heavily fortified ports and harbours. Pure thirst for adventure may also have been a factor. The use of the longships ended when technology changed and ships constructed using saws instead of axes. This led to a lesser quality of ships and together with an increasing centralisation of government in the Scandinavian countries, the old system of Leding---a fleet mobilization system, where every Skipen (ship community) had to deliver one ship and crew---was discontinued. Norse mythology and Old Norse literature tell us about their religion with heroic and mythological heroes; however, the transmission of this information was primarily oral and we are reliant upon the writings of (later) Christian scholars such as Snorri Sturluson and Sæmundur Fróði "the Wise" Sigfússon for much of this, both whom were Icelanders and an overwhelming amount of the sagas were written in Iceland. After decades of trade, settlement, and fighting over their right to be heathen in Christian lands, resistance in these parts of Europe became more effective and Christianity was introduced into Scandinavia, which led to suppressive tendencies toward enterprises under heathen banners, in order to assimilate into Europe easier. Apparently, going against the tide of influences of wealth from Rome did not appeal to some people, who eventually inherited the thrones in the North. Under the hand of the Christians, the kingdoms of Norway, Denmark and Sweden evolved out of power consolidation to only those who praised Christ and tipped their hats to the Pope. That was the way, some believed, to make the most profit, rather than put their lives on the line to be judged forfeit by an expanding power structure which resembled the Roman Empire. The Holy Roman Empire was its name around that time, and its borders were closer to home, so they became like the Germanic foederati of old Roman times. They would in turn, like the tribes South of them, adopt the Roman religion and banners, to convert and assimilate other peoples of the Baltic and Russian states. It was only the insular Scandinavian lands of the British Isles, Faeroes, Iceland, Greenland and Vinland which did not attempt to take other people's lands from them under a Christian banner, and pretty much tried to live locally during that time, sometimes asserting their right to secede from their former governments in their colonies, but generally adopting Christianity as a way of staving off the inevitable forced conversion by these former governments(such as Norway) and their newer ones(such as England, France, Russia), which made sure they would continue relations with them for trade and other economic reasons. There is no evidence whatsoever that the vikings on any occasion wore helmets with horns. This is a latter-day myth created by national romantic ideas in Sweden at the end of the 19th century, notably the Geatish Society, and further imprinted by cartoons like Hagar the Horrible or Asterix and numerous fictitious movies. The people living in Scandinavia during the Bronze Age did, however, wear horned helmets during ceremonies, as testified by rock carvings and actual finds. See Bohuslän. In order to build Odinism into a valid and inspiring religious expression we must overcome this tendency to trivialise divinity. The gods are not Vikings…they are spiritual beings, potent forces of numinous power" I wonder what happened with the norwegians then as they are quite small now these days.. I read that most of the buriels found of graves dating back to that time are no higher than those of today. However I think people miss the social factor in this since today a person who is tall is noted for their height and is then disregard meanwhile someone with height in the past was seen as a valued asset in battle. Viking clans and berserker gangs valued strong, tall and determined warriors in their ranks and thus a charismatic and note-worthy leader like Ragnar would likely have a truley fearsome lot with him. Keep in mind most of what we know of the vikings as far as eye-witness accounts came from the Christians who were pillaged and I can only imagine how frighten that must have looked. None-the-less Denmark and Finland is said to have the tallest people in the world. As much as we consider "Norsemen" and "Vikings" synonymous, it is only this way because of those Norsemen who went a-viking, most Norsemen remained at home and participated in warfare on their own territory; the Viking raids were developed only as a way to alleviate strain on the growing populations in Scandinavia. Most Vikings should not be taken as representatives of Norse culture, since they themselves were of about the same moral and cultural persuasion as a 19th-century British boatswain. Rather, good examples of the strong, fierce, honourable, level-headed Norsemen are found in characters described in the Sagas. Wings/Horns on helmets= complete romanticist invention; there is absolutely no archaeological or textual evidence of this ever. Norse Queen= Shield maidens did not, in fact, go into battle but merely carried the men's battle raiment and played cheerleaders on the sidelines, so to speak. The earliest evidence of such encouragement of the troops is found in Tacitus. Axes= always single-headed and easy to wield, swords were atypical and there were basically three shield variants as they developed; the 9th century and 10th century saw perfectly round, Germanic shield; the late 10th and early 11th centuries saw shields which were rounded at the top and came to a point at the bottom, and by the 12th century Vikings had switched entirely to long semi-tower shields. οὐκ ἐμοῦ, ἀλλὰ τοῦ λόγου ἀκούσαντας ὁμολογεῖν σοφόν ἐστιν ἓν πάντα εἶναί. the Viking raids were developed only as a way to alleviate strain on the growing populations in Scandinavia. This I doubt. There were about 300.000 people living in Scandinavia in the Viking Age. Even with very primordial tools, there would've been plenty of free land to cultivate and use within a comfortable distance, more preferable than leaving much farther into other cultures and fight for already taken land. In fact I think it's pretty clear the raids at least began as warfare against the expanding church and cultural conversion, even if they may have developed into mere adventures for treasures. I wrote a little about this in an earlier post. In fact I think it's pretty clear the raids at least began as warfare against the expanding church and cultural conversion, even if they may have developed into mere adventures for treasures. The Viking raids started before the church even reached Scandinavia; they started because of limited social mobility and wealth distribution. The reason the Vikings hit churches has absolutely nothing to do with religion; the monasteries during the middle ages were outposts of material wealth that allowed for social mobility in early Scandinavian culture, that's the only reason they were hit so hard. The fight against Christianity did not begin until much later, when the Norsemen came into regular contact with the religion through the already-converted Anglo-Saxons. Norse kings converted for the same reasons as the Franks and Goths: politics. Some Kings resisted but active resistance did not begin until the 10th century, 200 years after Lindisfarne. Raids were never about culture or about conversion, they were done to keep the warrior keen and the coffers full so that the King had the resources to be as generous to his people as possible. The Norse had a very strong trickle-down economy, where a good Lord was generous to his retainers, but because of limited wealth it was necessary to keep these good Lords well-stocked with gold, silver, and other various material that they could reward loyalty with. Farming and land ownership to the ancients was far different than to modern people- a single man having a great deal of power over a single area would demand the population to spread and populate to keep the upward flow of social mobility active (in fact the Norse stand out for their tremendous upward social mobility). So yes, it was in fact a simple matter of population and economics that viking raids began. Actually many of the men who went out in viking lived in the more narrow fjords and viks. Atleast here in Norway.
0.999607
Do Teens Have To Pay Taxes On Summer Job Earnings? Most high school and college students anticipate the money they will earn working typical summer jobs, which range from babysitting and mowing lawns to working part-time at their local restaurant or video store. While a summer paycheck may give them a nice chunk of change to begin the next school year, some may also face liabilities depending on their earnings and employment status. In order to determine any potential tax bills, workers should first determine what type of employee they are. For example, those who earn their wages mowing lawns, babysitting or taking on small tasks for individuals are classified typically as self-employed workers. Workers will be required to file a tax return with the IRS if their earnings exceed $400. Although individuals may not be required to pay income taxes on their returns, they may be held responsible for paying self-employment taxes, such as Social Security and Medicare. To determine their responsibilities - and as a general learning tool - it may be helpful for individuals to set up an appointment with a tax preparer so that they know what to expect and how to proceed. In contrast, those who work for a company may be considered either employees or independent contractors, depending on how the employer chooses to classify them. It's important that teens understand the difference. Independent contractors do not have taxes withheld from their pay as they are considered self-employed. They will also receive a 1099 in January instead of a W-2 form. While this classification may be preferable and cost-effective for companies, it's not always correctly applied. Because the responsibility to take taxes out of their pay will ultimately rest on the worker, summer hires should make sure they are classified correctly. An independent contractor is one that generally sets his or her own hours, supplies their own tools and sets the rules on how they carry out their work tasks. Lastly, working in a restaurant is a popular summer job, and individuals can make a great deal of money in tips. However, the IRS does require that individuals report all tips - both cash and credit card charges - to their employer, who then reports the figures to the agency. Therefore, waiters, waitresses and other individuals who earn these types of income should keep their earnings well documented.
0.988045
She knew the house would be hers, the woods, the pond, and the bees. She knew these places better than anyone. Her father wouldn't have it; nothing made sense now that his own mother was gone. She had wanted her ashes scattered, but he just couldn't, not yet. He wanted to say something at the service, he would have, he meant to, but whenever he started to speak, that choke would climb up from his stomach and seal off his throat. Tamsin spoke instead. She knew the words. She knew, just like that. She had grown up in her grandmother's home, halfway up the mountain, bordered with firs and pines, dandelion fields, crab grass and clover. In the summer, the sun rose and set from the pond and barely a breeze paid visit. It was perfect for the bees. Her grandmother showed her everything. They were apiarists. She would care for them now. They lost her in June, on the longest day of the year. Tamsin had been tossing wood chips in the pond, her grandmother slicing the cappings from the combs. They were always quiet in their work, absorbing the sound of the bees, their fragile hum. The sun dripping over the tree tops, running sticky down their trunks. Touch the bark and you'd sink into the amber. Wait a millennia or so until all your saplings sprout wings. They'll fall for the first blossom of spring. You'll see. We all come home sometime. She never wears gloves anymore. She did at first, when she was learning how to be gentle; how to move when lifting the supers, how to be slow and deliberate, in the moment. She'd never been stung in her life. Some vocations are a calling. Some are written in the skin. Two days later Tamsin woke early, dressed, and wandered into the back garden. Pyrus salicifolia pendula: the weeping willowleaf pear. Nepeta faassenii: Catmint. Walker's Low. Alchemilla mollis: Lady's Mantle - her grandmother kept wildness in order. The white/yellow/green/purple blooms had been tamed. Standing near, her fingers grazing the green, she felt she might take root there herself. Let the lichen and the mosses swallow me whole, give me disguise. Translate me. Half way up a mountain, even in summer, smells of snow and smoke and rose. And honey. Smells that start on your tongue. The sweet and the well fermented. Nothing begins, but all things show. From the smallest part to the tallest, seedling to root, to leaf, to bloom to seed again, all things. Her grandmother was out there, somewhere, just a sprout - another scent. Her bees would find her, summon her nectar, and make her gold again. She walked to the old barn her grandmother used for storage. The large extractors and storage containers lined up in a dark corner, and the tables covered in glass jars with a simple white label. Red lettering spelled out Midsommer Honey. In another, darker corner, the small meadery with long racks of wine bottles: Midsommer Mead. A low shelf held small containers with hand-written labels. On the labels was a single word: Must. Yes, she's nodding to herself. Yes you must. A thick book lay across a desk. She flipped through the loose, hand-written pages, each noting a different recipe: metheglin, rhodomel, capsicurnel and assorted melomels. There were notes on fining and final gravity; the process of clarifying, of completion. There's a trick to it, but it's simple. Just takes practice. Dusty bottles on the racks have been there for two or three years. Their time has come. Behind the desk an old, oaken cabinet, all glass in front (replaced twice in the last three or four years, not easy to do) held trophies and medals. 1945 — Second Place. 1946 — 1957 — First Place. Back when she cared to enter. When having a medal sold a few cases more than not having a medal. No one knew what mead was back then. She had given them her apple-pear melomel. Such a surprise it was, she'd said. She often used blueberries and cranberries and loganberries. She tried cantaloupe once. Once. Her grandmother had been a scientist, an alchemist. She could turn almost anything into gold. Her grandmother worked alone, for years. Her husband took his leave early on. Her son was no help. His wives were never interested. His only child would sneak in the pantry and fall asleep licking her fingers. Every summer she stayed here, growing up. Every summer she wrote out Midsommer Honey on small labels and affixed them to jars. Every summer she went with her grandmother to the Farmer's Market and sat on a small stool, smiling, offering a sample. Her grandmother told her that freckles were sun kisses. Summertime always meant freckles, labels, samples and the bees. She was the alchemist's apprentice. She closes the book - none to follow now. We'll sell the place and keep the recipes, she thinks. The bees will need a new home. The trees will be forested. The pond will cloud over in mud. The streams will send silt to the rivers, to the oceans. It will settle on the surface, blocking the sun from everything below. Everything below will die. This is how it works. The bee brings the nectar, laces the comb and the comb is extracted, filtered, pressed, preserved, sold, consumed and synthesized. This is how it all works. No and no and no and no. Home is home, for us all. Work it out. There is a way. Nothing owing on the house or the land, taxes will be paid somehow and the bills will be paid too. There is enough left over to last awhile. Someone needs a summer job, some kid from town, nothing to worry about right now. Just turn the bottles, get the boxes, it's not too much for you to do today. Check the hives. There's gold to mine. You could use the company. You could use the company. Don't get lost. Grandmother repeating herself again; peculiar habit, she loved it. Tell me something else. What else should I know? She watched sunset dappling along the branches and purple wings here and gone. The hives were kept in the widest clearing of the copse; light speckled in drops all around, the outdoor cathedral impression, so quiet, ethereal and comforting. The supers arranged in rows, waist-high from their foundations, their siding flecked and peeling. Hat and veil hung off a branch, but she didn't reach for them this time. She closed her eyes and listened. You can hear anything in it, just concentrate. Sound is vibration, just vibration and frequency. So many voices, so many little vibrations and all you hear is one, complete sound. A perfect sound. Everyone in accord. A chord. A chorus. We could all use some company. They used pine straw and burlap for the smoker to gentle the bees. She lifted an outer cover and set it on the ground. Slowly, she reached in and lifted out a frame. Here's company. They drifted up, just hanging there, around her hands and elbows, distracted. Like bathing in — what exactly? It is like washing up in a way. You feel clean doing it, yes? Yes. This is what you do. You're not afraid. You've never been afraid. She was never afraid. This is the sweetest thing. The combs are full and red. You can almost see through them. These are Italian bees, apis mellifera ligustica. They are yellow bees, very gentle and very popular. We tried German black bees once, but they are too aggressive. Nervous bees. Once, a long time ago, her grandmother just scraped them off her arms. You have to scrape them off. Trying to pinch the stinger off just pushes the poison further in. But you can't be too careful. She always kept epinephrine handy just in case. The clouds are drying up the sky. Static sparks on the power lines. It's midsummer night's eve. It is also St. John's Eve, the patron saint of beekeepers. The full moon out there, if you can see it — is called the mead moon, or the honeymoon. Not many people know that. Her grandmother once went all around Indonesia, India, and drank her first mead at a Buddhist festival. She could never remember the pronunciation, but it meant something like ‘festival of the honey moon.' There was a story about Buddha and a monkey out in the wilderness. That's what the festival was about. Buddha went into the woods for some reason and while he was there this monkey gave him honey to eat. The monkey was so happy when Buddha accepted his gift that he went flying around from tree to tree — until he missed a branch and fell to his death. As his reward though, he achieved Nirvana. At this festival, people went around giving the Buddhist monks honey as a gift. Must be a fable they conjured up so the people would offer up their honey — there was a time when it was very rare and difficult to obtain. Nice scheme though, so they wouldn't have to work or pay for it. There's a story about the Heliades - they were the daughters of Helios, the sun god. There were eight of them and a boy. One of the daughters was named Merope and there's actually a lot of Meropes, but the one in this story had a bee-face or a bee-mask. It meant that she was like honey. She was a goddess of Crete, where mead came from, they say. When their brother Phaeton was killed, the sisters mourned so much that the other gods turned them into trees and their tears turned into amber that fell into this river. It's funny sometimes how everywhere in mythology there are people being turned into something else. Rocks, trees, flowers and stars: Narcissus becomes a flower. Merope became a tree. The bee becomes the honey. The honey becomes the bee. There is another Merope, though possibly the same one — a Pleiades. They were virgins protected by Artemis, the goddess of the Moon. This Merope married a mortal, a king, but she must have lived to regret it. The Pelaides were turned into stars. You can see them in the constellation Taurus, the seven sisters. They are very bright, but Merope is only the fifth brightest, all because she got married. What's interesting about the Pleiades is all the gas that surrounds them. They're not hot enough to make them glow so all those tiny dust grains embedded in the cloud scatter and reflect to make this beautiful blue reflection nebula. It's at its highest around Merope. They're pretty young as far as stars go: only around 100 million years or so. I never hear anything but the bees. Do you know why bees hum? They don't know the words. Did you know that honeybees are mostly female? They don't live very long, just a few weeks really. It's the female that delivers the sting and dies. Hindus believe honey gives ever-lasting life. But they believe there really is no beginning or end, so there is no life or death. She's got her finger in the jar again. Sounds like they just want an excuse to have lots of honey. Summer will always taste like this. This is what she said - and all there was to say. Fine white speckles, like petal blossoms, swarm in the breeze, the last drips of the sun setting them ablaze, like fireflies. Tamsin watches the remains as they drift into the darkness, a hint of lavender. A new constellation in the sweet hereafter. I meant to add that I think of Ray Bradbury's "Dandelion Wine" reading this. Thank you all for reading and the very kind comments. Very glad if you enjoyed. Gary - I'm pleased you thought of Bradbury - he's one of my influences and Dandelion Wine is certainly a favorite.
0.99989
Maybe you’ve always imagined having a luxurious hot tub, but did you also realize hot tubs can have a tremendous impact on your health, as well as your overall quality of life? For thousands of years, ancient civilizations, including the Greeks and Romans, have been utilizing warm water therapies for a variety of ailments, and modern medical studies have shown this to be an effective treatment for a number of common health issues. With the population of the world aging at more rapidly than in the past, arthritis has become a significant health concern. The Arthritis Foundation reports that regular use of a hot tub or spa has the ability to help people with arthritis by improving mobility and flexibility, and preventing further joint damage from occurring. The reason for this is because the warm water and buoyancy alleviates some of the stress on the joints and the body as a whole. Countless people are impacted by sleep issues, including chronic insomnia. The reason for the prevalence of these problems is widely believed to be due, at least in part, to the external stressors we all experience on a daily basis, including the use of electronics, hectic work lives and an overall fast-paced lifestyle. Long-term sleep problems lead to a number of other health issues, including fatigue and even depression. Hot tubs and spas have been shown to help people sleep more easily and deeply, because of a shift in body temperature, and the relaxation-inducing abilities of warm or hot water. Medical research has shown hot tubs and spas to be a way to help people with diabetes enjoy lower blood sugar levels and improved sleep patterns. The effects are believed to be even more beneficial for people with diabetes who are physically unable to exercise, although it’s important to note that anyone with diabetes should consult with their medical practitioner before using a hot tub. There are countless reasons people suffer from back pain, including injuries that may be temporary, or lead to chronic pain. Many people with back pain find every aspect of their life is affected, including their ability to work and spend time with their family. Because of this, many of these back pain sufferers turn to prescription medication, with can lead to unwanted side effects and dependence. An alternative treatment is to use a spa or hot tub. The combination of hot water and jets is a great way to alleviate pain and improve overall mobility, which can significantly improve one’s quality of life. As well as the health concerns above, hot tubs and spas can create a general sense of relaxation, and lowering stress and promoting relaxation can improve every aspect of your life, from your emotional state of well-being, your marriage or relationship, as well as your cardiovascular health. It’s also a great way to relax after a workout, and soothe tired muscles, to help speed your recovery time and reduce the risk of injuries. If you have any medical condition you feel could benefit from the use of a quality hot tub or spa, first contact your medical professional about the best course of action, and then call CCHTS at (707) 781-9440 for advice on what hot tub or spa product will work best for your specific needs.
0.946952
How do we help the helpers? The sad truth is that there are often considerable barriers for anyone to access mental health care. There are also some unique barriers that those who work as mental health care providers must face. As a mental health nurse, this has made things extra complicated for me when seeking out treatment. One issue is the potential for people I know professionally treating me while I'm a patient. During my first hospitalization, one of the weekend on-call doctors was a psychiatrist on the ward where I worked. I spotted him, panicked, and hid out in my room. He later told me that he knew I was there because he'd seen my name on the board in the nursing station, and he'd felt awkward and unsure how to handle that. My subsequent hospitalizations, I've been able to avoid the city where I lived and worked. At the beginning of my last hospitalization I was taken into the ER in the hospital I had formerly worked at. I begged to be transferred to another hospital; they seemed to think it was because I was worried about being seen by patients I'd cared for, but that wasn't it at all. I was adamant that I didn't want to be treated by staff who knew me professionally. Through my work, I've had quite a bit of contact, either in person or on the phone, with nurses at the local emergency mental health service. As a result, I will never call the service's nurse-staffed crisis line. It would just be too weird. At the same time, I'd be worried about calling a different crisis line that's staffed by volunteers, as I suspect they'd be a bit more trigger-happy in terms of calling the police. The end result is that I don't call anyone. Going into the ER, where I'm even more likely to know the psych nurses on shift, is even less of an option. Another issue is having professional contact later on with people who've previously been involved in my treatment. I ended up working with a nurse who I'd seen in emergency after I'd attempted suicide. I was terrified that she would recognize me, but she never gave any indication that she did. There was another nurse who thought she recognized me and asked me if I had previously worked at a particular mental health team. I'd actually been a patient at that team, but I don't think this person ever made that connection. There was another nurse who did recognize me from the hospital. We didn't actually work together but for a period of time, I was seeing her pretty regularly at work and it made me extremely uncomfortable. In a way, it's strange that I worry so much about these kinds of encounters when I choose to be open about the fact that I have a mental illness. There's a big difference, though, between people knowing I have an illness and them seeing me in all its ugly glory. My illness does get pretty ugly sometimes, and it's hard not to feel ashamed when I know people have seen that part of the illness experience. I want to have control over what colleagues do and do not know about me. If people see me when I'm at my sickest, I have no control, and that's frightening. There are also issues around professional practice licensing. My province in Canada has very regressive health professional regulations that require hospitals to notify the appropriate professional college any time a health professional is hospitalized for mental illness/addiction. If I am ever hospitalized, that automatic reporting means I have to either give up my nursing license or have it taken away from me (some choice!). Even in places without this sort of stigmatized legislation, there will always be the worry that someone will decide you're unfit and you face losing your professional license. Of course health providers delivering care must be fit to do so, but from my perspective, putting barriers in place that deter a whole group of people from seeking care only increases the potential risk to the public. I don't know what the answer is in terms of smoothing the way for mental health professionals to receive safe and effective mental health care. I do think it's important that more of us working in the field who do live with mental illness speak up about our experiences and raise awareness that we aren't immune from mental illness. Somehow, there's got to be a better way.
0.994295
This is the moment locals were sent into a looting frenzy after 80,000 cans of beer spilt from an overturned lorry in Thailand. Driver Somporn Primjarus, 58, was delivering the boxes to a warehouse when he lost control on a corner and toppled over on January 11 in Phuket. The cans of fresh Leo beer were sent sprawling onto the road - causing hundreds of residents to descend on the scene and loot the alcohol after the crash at sunrise. Driver Somporn said: ''I was only one kilometre away from the logistics centre which was waiting for the beer. Several street food stalls, cars, and shop fronts were damaged also damaged, causing more chaos in the area. Locals rushed to the area to collect the beer - prompting police to warn that they could be arrested for theft. Four residents were later arrested for theft. Lieutenant Colonel Sompong Thip-aphakun from Phuket City Police said that the investigation would look at the causes of the crash and the subsequent thefts. He said: ''In the case of an accident, the traffic officer must investigate the truck driver due to the damage to the properties. Another part is the group of people who went to collect cans. They can be charged for theft.
0.930001
Won't the Streetcar be constantly stuck behind a double-parked car, a down tree branch or something? It can't go around anything! The Portland Streetcar also operates in mixed traffic just like the Columbia Pike Streetcar will. When you add together every single service disruption, no matter what the cause in Portland's first two years of service: mechanical problems, power outages, the driver not showing up, passengers getting sick, police and fire activity - it adds up to less than 1% of service [source]. It's a reliable system. What happens when there is a fender-bender, double-parked car or delivery van blocking the Streetcar? You keep a contract with a towing company. The driver radios dispatch who calls in the tow. Drivers quickly learn not to double park in the way of the Streetcar. Tracks in the street make a very effective no parking sign. It depends on how extensive the power outage is. Streetcars systems are generally designed such that each traction power station is fed from a different portion of the electric grid and the system can function even if one of those traction power stations goes down. So in a fairly localized power outage, nothing much would happen. In a more extensive outage, the streetcars all have enough reserve power on-board to get themselves out of an intersection if they are in one. Until power was restored additional buses would be called in to take up the slack. That is assuming the weather conditions that caused such an outage aren't such that the buses can't run reliably either - generally a storm strong enough to have knocked out power to that much of Arlington will have caused enough other damage to halt bus operations as well. What happens if a Streetcar breaks down? The next Streetcar to come along simply tows or pushes it back to the maintenance yard. This should happen infrequently, though as Streetcars tend to be more mechanically reliable than buses. A "bus bridge" would be brought into to detour around the obstacle, just like MetroRail does when their is a major issue that shuts down a part of the line. Some buses would even already be there since the Arlington Streetcar routes on both Columbia Pike and through Crystal City are also generally bus routes.
0.999998
I get up early every morning to work out. Should I be eating something before I exercise? Should you eat before working out at the crack of dawn? Eating a small morning snack will improve energy levels for an early morning workout after an overnight fast. The key is to eat something light enough that won't sit in your stomach and be heavy during the workout. I recommend 100-200 calories of quick absorbing carbohydrates such as a banana, a glass of 100 per cent fruit juice or smoothie, a piece of toast, or a small bowl of cereal. If strength training, including a small amount of protein as found in milk, yogurt or peanut butter may be beneficial. Be sure to follow the workout with a more substantial breakfast including both carbohydrate and protein such as a bowl of oatmeal with a side of egg whites and fruit.
0.998708
Real-time rates from USPS, fast operation Get rates for both domestic and international shipping Works using CFMX built-in XML Parser. [h1] No 3rd party application needed.[/h1][h1] No CFX tags.[/h1][h1] Shared hosting friendly.[/h1][h1]Just copy this custom tag in your ColdFusion working directory, and you're set [/h1]Supported ColdFusion Server: ColdFusion MX 6, 6.1 ColdFusion 7 ColdFusion 8 on all operating systems Supported browsers:Since this tag is working on server side, all browsers are compatible. USPS Account:In order to use this custom tag, you must have a USPS account.Follow this link to register: http://www.uspswebtools.com/registration/ <cf_usps_rate demomode="true,false, required" userid="your USPS userid, required" password="your USPS password, leave blank if you don't get one from USPS" result="resulted query name, required" CountryDest="destination country, default is: United States (Domestic Mail)" ZipOrig="origination zip code (US). Required for domestic shipping." ZipDest="destination zip code (US). Required for domestic shipping." Weight="weight of the package" WeightUnit"kg|pound" Service="Express,First Class,Priority,Parcel,BPM,Library,Media,All. Required for domestic shipping" Size="Regular,Large,Oversize. Required for domestic shipping" Container="For domestic shpping: Flat Rate Envelope,Flat Rate Box. Optional""For international shipping: package,postcards or aerogrammes,matter for the blind,envelope. Required" Machinable="true,false. Optional"> Explanation:1. Upon registering with USPS, they will create a userid for you, and set it to test mode.While your account is in testmode, set "demomode=true".USPS test mode will only allow several combination of weight,zips,service and all. Use the default values from example page to make sure the custom tag works (it should work anyway)After you have successfuly install and test the custom tag, ask USPS to set your account to production mode. Follow the process as found in USPS welcome email.After USPS has set your account to production, set "demomode=false"2. Password is optional. By default USPS will not send password, so you can leave this attribute to blank.3. Domestic shipping or international shipping is determined by "CountryDest"If CountryDest="United States (Domestic Mail)" then domestic shipping is enabled, else the system will be set to international shipping.Country list can be taken from USPS website, or from the example given in this custom tag.4. International shipping will be calculated from US origin.5. ZipOrig and ZipDest is required for domestic (US) shipping.6. Note on weight: the custom tag rounds up weight (without decimal). This's to make sure USPS accept the weight.7. For doemstic shipping, combination of service, weight, size, container and machinable may resulting error from USPS.Make sure you set above values correctly. Refer to USPS documentation.8. ResultUpon successful call, the custom tag will generate a query with the following fields: Service,Rate,Restrictions,Prohibitions,Observations,CustomForms,ExpressMail,AreasServed,SvcCommitments,MaxDimensions,MaxWeight For domestic shipping, please check the following fields: Service, Rate and Restrictions.For international shipping you will have to check all fields.This tag comes in handy when you want to get accurate shipping rates from USPS.Some applications that may benefit by using this tag are: e-Commerce websites Backend application and many more For a complete example please click this link (Open in new window) (Tabbed page powered by CF_Tab) Price License Purchase $49.99 1 Single developer $499.90 1 Site license $749.85 1 Corporate license Licensing Information Goods and services provided by MasRizal Sold by 2CheckOut.com Inc. (Ohio, USA). 2Checkout & MasRizal accepts customer orders via online checks, Visa, MasterCard, Discover, American Express, Dinners, JCB and debit cards with the Visa and MasterCard logo. PayPal and purchasing using your existing bank account are limited to US currency. CF_USPS_Rate is available for immediate download. After you complete the order, you will receive a confirmation email with your download link. Please ensure your email address is entered correctly during the order process. Customers Who Purchased CF_USPS_Rate Usually Purchased These Products Too 1. CF_USPS_Track 2. CF_Email_Validator 3. Random Query 4. CFX_Excel 5. Related Select 6. CF_FlashMultiUpload Why Customers Choose Us Find out why our valued customers choose MasRizal & Partners solutions. Click here to see their reasons Featured Customers More than 6840 companies rely on MasRizal & Partners solutions. Click here to see our featured customers Free For Non-Profit Organization MasRizal Charity program allows eligible nonprofit organizations to get MasRizal's products at no cost. Click here for program detail Testimonials Take the word of our clients Top Selling Products See our top selling products Let Us Help You Can't find solution you need? Click here to get solution from MasRizal. CF_USPS_Rate is a quick solution to get shipping rates from USPS-real time. The custom tag supports both US domestic shipping and international shipping originating from US. Shipping rates result is presented in query structure, so developers can extract and manipulate data from it easily. CountryDest="destination country, default is: United States (Domestic Mail)" ZipOrig="origination zip code (US). Required for domestic shipping." ZipDest="destination zip code (US). Required for domestic shipping." Service="Express,First Class,Priority,Parcel,BPM,Library,Media,All. Required for domestic shipping" Size="Regular,Large,Oversize. Required for domestic shipping" Container="For domestic shpping: Flat Rate Envelope,Flat Rate Box. Optional" "For international shipping: package,postcards or aerogrammes,matter for the blind,envelope. Required" USPS test mode will only allow several combination of weight,zips,service and all. 3. Domestic shipping or international shipping is determined by "CountryDest" If CountryDest="United States (Domestic Mail)" then domestic shipping is enabled, else the system will be set to international shipping. Country list can be taken from USPS website, or from the example given in this custom tag. 4. International shipping will be calculated from US origin. 5. ZipOrig and ZipDest is required for domestic (US) shipping. 6. Note on weight: the custom tag rounds up weight (without decimal). This's to make sure USPS accept the weight. 7. For doemstic shipping, combination of service, weight, size, container and machinable may resulting error from USPS. Make sure you set above values correctly. Refer to USPS documentation. For domestic shipping, please check the following fields: Service, Rate and Restrictions. For international shipping you will have to check all fields. CF_USPS_Rate is available for immediate download.
0.95573
Identify dolls for collectors, Doll Reference. Italy, Italian Doll Makers & Marks. J. Japan, Nippon Doll Makers & Marks.
0.958962
Why was my husband sleeping and I only took naps He has sleep apena and sleeps with a cpap machine. My doctor did some testing on me and found I would probably sleep better with a bipap machine. I have the oxygen and humidifier. It took me awhile to admit I needed the machine but I am now sleeping better. I take 1/2 0.5 mg Mirapex middle of the morning, 1/2 Mirapex & 1/2 Klonopin 0.5 mg middle of afternoon, and 1/2 Mirapex & 1/2 Klonopin at bedtime. With my bipap machine and taking my meds in this order I am sleeping and my legs are o.k. during the evening and night. I cannot figure out why there are some days, all in a row, that nothing helps and then this period will end and I am back to normal by taking my meds.. Yes, I have many friends that say that the CPap and BiPap are helping them sleep. I think I might be on one myself someday, but have more hope than fear about that. I wish I had some great answer for you about the RLS and Sleep deprivation issue. I have 2 out of 7 days that I sleep almost or through the night. Been like that for yrs.. I think for myself I have many things that can effect my RLS and sleep. The RLS is so unpredictable for me, that I have given mine two categories. 1. headache, Regular to most days I have, in terms of severity and manageable to my terms. I normally under treat my symptoms, but that is ok with me for the most part. I am a rare bird in this community and those of us hanging out in the top 3% have choices to make about treatments options left to make. 2. migraine, This would be what I call an attack. Much like a migraine, compared to a regular headache. I go whole body and every symptom + an increase in pain, certainly 85-90% chance I will not see sleep for days. Weather, altitude change, allergies, food and drink, sleep or not,....even, excitement or sadness. My body just senses an uproar of some kind. Good and bad bring the same result. So your mood does or can be part of it. Hormones, as I'm a chick. blunt, but true, sorry. You can try to start a calendar for a couple of months, if not 3, for a good sample of information. If you list your meds., times you took them, sleep or not, how many hours?, and also list, exercise or activity, plus the food and drink. In 2-3 months you and the doctor can look back and see if anything pops out? Gives a light bulb moment and a new lesson learn. Daily diaries are great for you to be able to see it all condensed. *Note, Make a copy for your doctor and make it simple to understand. They will take the time to look at information if they can easily. Just a thought. " Welcome and glad your here, only sorry it had to be for RLS. BTW, I'm from NM....miss my sun sets. Have a good one. Hope it all evens out soon. Yes, it is a mysterious disease. All we can do is trial and much error and pray there's some rhyme or reason for the successes. I've recently had more bad nights then good (like tonight) so I'll take a Xanax or pain pill when I can tell tr RLS has broken thru, walk for 20 min, then go back to bed as opposed to tossing and turning for hours. Proactive I am.
0.995311
Can you outline the current energy & natural resources landscape in your jurisdiction? India is the third largest energy consumer in the world, and its energy requirements are met through both renewable and non-renewable sources. As per the Energy Statistics, 2018 issued by Ministry of Statistics and Programme Implementation, Government of India (GoI), 87% of the energy requirement for the year 2016-17 was met through conventional sources such as coal (43%), crude oil (35%), natural gas (7%) and lignite (2%), and 13% was met through hydro, nuclear and other renewable sources. The conventional fuel requirement is met through imports as well as domestic production where about 30% of coal, 86% of crude oil and 38% of natural gas are imported. Pursuant to India’s underlying commitment under the Paris agreement to reduce carbon emissions and to achieve its ~40% cumulative power installed capacity from non-fossil fuel-based energy resources by 2030, the GoI has taken various initiatives to give impetus to energy production and consumption from renewable sources and natural gas. In the recent years, there have been a number of regulatory and policy changes that have been introduced in India’s energy sector. In the Oil and Gas sector, the GoI has revamped the existing policies to enhance domestic production. Some of these policies include, (i) introduction of a new licensing regime for award of oil and gas blocks- Hydrocarbon Exploration and Licensing Policy (HELP) with features including open acreage licensing policy, revenue sharing model (as against the previous production sharing model) and pricing freedom (as against the previous pricing formula based regime); (ii) the marginal field/ discovered small fields (DSF) policy to bring the existing marginal fields of the National Oil Companies to production; and (iii) policy to promote and incentivise enhanced recovery methods for oil and gas in the existing and new blocks. The first licensing rounds under the HELP and DSF have been successfully completed and the second rounds for these are in play. Further, specifically to promote accessibility to natural gas, the GoI in 2018 has issued 84 authorizations pursuant to the 9th round of bidding for City Gas Distribution (CGD) system. These are almost double the authorizations granted in the previous rounds. Additionally, various projects such as the Pradhan Mantri Urja Ganga Project have been initiated by the GoI to enhance the gas pipeline connectivity in the country. Currently, about 11,000 km of gas pipeline network is under construction. The GoI has taken various initiatives in the power and renewable sector as well. These include better enforcement mechanisms for fulfilling renewable purchase obligations, tariff based competitive bidding, setting up of exclusive solar parks, granting exemptions from payment of transmission charges and losses, commitment to achieve 175 GW of renewable energy by 2022, and revision of the National Tariff Policy to provide for increasing renewable purchase obligations to reach 8% by 2022. In addition to the above, the GoI in 2015, also introduced FAME India Scheme (Faster Adoption and Manufacturing of (Hybrid &) Electric Vehicles in India) to support hybrid/electric vehicles market in India. This seeks to give impetus to use of electric vehicles and is likely to reduce dependence on conventional fuels such as petrol, diesel etc. in the transportation segment. Are there any barriers or restrictions to foreign investment for energy and natural resources in your jurisdiction? Foreign Investment in India is governed by the Foreign Direct Investment (FDI) Policy read with the Foreign Exchange Management (Transfer or Issue of Security by Persons Resident Outside India) Regulations, 2018. Generally, in the energy sector, FDI up to 100% is permitted under the automatic route (i.e., without seeking specific approval of GoI), barring a few exceptions. For instance, FDI is prohibited in atomic energy sector; in the petroleum refining space, where petroleum refining is carried out by the public-sector undertakings (without any disinvestment or dilution of domestic equity in the existing PSUs), FDI up to 49% is permitted under automatic route. Further, in relation to sale of coal, the GoI is actively considering to permit 100% FDI in coal mining activities including associated processing infrastructure. Additionally, there are certain restrictions on investments by citizens/ entities of specified nations, i.e., Bangladesh and Pakistan where investment is permissible pursuant to the GoI approval. How has the domestic landscape impacted, positively or negatively, the ability to conduct cross-border business? In recent years, there have been a number of legislative and policy developments and its impact on cross-border business has been largely positive. In the last one year, India’s rank in the World Bank’s ease of doing business has moved up to 77 from Rank 100, with high leap in the indicator for ‘trading across borders’. As per the World Bank report, the notable factors for this leap are the improvement in time and costs for import-export compliances, new and robust systems for electronic documents filing and robust risk management systems. In order to give significant impetus to the investments being made to India, as mentioned above, 100% FDI is permitted in most activities related to the energy sector. Further, a number of concessions are made through competitive bidding where no special preference is given to Indian parties. For instance, award of blocks for the exploration and production activities in the oil and gas sector, authorisations for city gas distribution systems etc. In the electricity sector, the South Asian Association for Regional Cooperation (SAARC) countries had signed a SAARC Framework Agreement for Energy Cooperation (electricity) in 2014. In December 2016, the GoI issued guidelines for cross-border trade of electricity (CBTE). Under the said guidelines, import of electricity is subject to approval from the designated authority (i.e. Central Electricity Authority (CEA)) on a case to case basis. However, one-time approval from designated authority is required in certain conditions for participating in CBTE, such as import of electricity from generation projects that are owned or funded by the GoI/ Indian Public Sector Units or a private companies with 51% or more Indian entity (entities) ownerships. Can you outline the current merger & acquisition landscape? Consolidation of domestic businesses: In the renewable energy sector, businesses have consolidated due to factors such as tariff pressure and low number of projects being bided out. In the Union Budget for 2017-18, the GoI proposed consolidation of public sector oil companies into an ‘oil major’ to compete with the performance of large international and domestic private companies.Pursuant to the proposal and due to volatility of crude oil prices and low refining margins, large public-sector undertakings in oil and gas sector are undergoing consolidations. Some of the major transactions of the year 2018, include Oil and Natural Gas Corporation Limited’s acquisition of a controlling stake in Hindustan Petroleum Corporation Limited and ReNew Power’s take-over of Ostro Energy. New Insolvency Code: Enforcement of the new Insolvency and Bankruptcy Code, 2016 (IBC) has given a boost to M&A and restructuring activity across different energy sectors, particularly power. Since, power sector is capital intensive, and projects have a long gestation period, over the years, the sector has been plagued with number of stressed assets. The IBC prescribes an institutional, time bound framework for resolution of insolvency cases and inter alia provides for auction sale of businesses facing insolvency. Therefore, as a consequence of the enforcement of IBC, a number of stressed assets have become available for acquisitions and are generating interest amongst players. Policy Initiatives:To boost investment and unlock the sectoral potential, GoI has introduced various sector specific policies. For instance, in the renewables sector, incentives offered by the GoI and the state governments (which include generation-based incentives, capital and interest subsidies, viability gap funding, and concessional financing options) make the companies operating in this sector an attractive target for acquisitions. Are there any barriers to renewable energy and if so how can companies overcome these challenges? Moves by regulators to make regulated tariffs commensurate with competitively bid out tariffs. Pressure on bidders to quote low tariffs and proposed cap on competitive procured tariffs to put more pressure on developers. In light of lower competitively procured tariffs, there is reluctance of distribution companies to agree on earlier negotiated power purchase agreements with higher tariffs, as well as distribution licensees demand for revision of concluded tariffs. The distribution companies have poor financial health and are forced to seek power at the low costs to cover their losses. This makes renewable energy a lesser viable option as it is costlier to other sources such as coal. Non-compliance with renewable purchase obligations (and no or low penalties imposed in this regard), and non-sale of renewable energy certificates. Expansion of transmission infrastructure is critical to large-scale renewable energy deployment, as there is an absence of long-term planning to address evacuation needs. In particular, grid integration is a demand side barrier in case of solar energy as states accounting for solar generation represent less demand that leads to localised power surpluses and such power cannot be easily transmitted to external locations. Duty on import of solar modules from China and Malaysia has led to an increase in the cost of development of projects. Delays relating to conversion of land usage or land ceilings. However, the GoI is putting in place a number of policies to boost the sector which include incentives and capital subsidies for the companies undertaking business in the renewable energy sector. Venkatesh Raman Prasad is part of the leadership team of JSA in the Infrastructure, Transportation & Energy space. Venkatesh practices Corporate and Civil laws with a focus on advising/representing clients on Domestic and Cross Border Investments, Mergers & Acquisitions, Entry strategies, Transaction structuring, Joint Venture, Technology transfer and Private Equity funding especially in the Transportation(including Railways, MRTS, Dedicated Freight Corridors), Energy (including RE, Oil & Gas value chain LNG), Infrastructure (including Construction and Engineering), Automotive (including HEV and EV) & Make in India related initiatives. Venkatesh’s role in these transactions has included negotiations, drafting, complex structuring, rendering strategic advice and interacting with foreign law firms, investment banks and financial advisors.
0.964542
The Advantages of Hiring Construction Contractors There are so many great things about hiring construction contractors. They can be more experienced, will save you time and expense, hold the right tools and some of them have warranties. However, you should pick the best contractor if would like to enjoy each one of these benefits. Make sure that the contractor you might be choosing is experienced and employees highly qualified workers. The following are the advantages of hiring construction contractors. 1: They can be Experienced These contractors are already working for quite a while, so that they are have plenty of experience along with their staff are experienced. You will find a assurance knowing that a specialist will do everything to suit your needs. You don�t must oversee the entire process should you don�t would like to. They will likely complete the task very quickly. 2: Saves Time When you are busy working on other important projects, it will likely be hard that you should oversee a construction project like constructing a home. Even when you schedule everything, things might not exactly go as outlined by your plan. There are additional time-consuming things that should be done, for example securing permits, scheduling inspections and being sure that your home is built in accordance with code. You won�t should do every one of these things should you engage a construction contractor. This could save you lots of time. 3: Complications Complications may arise while you are building a home. The great news is that construction contractors come across these complications on a regular basis they are working, hence they know how to find solutions quickly. Experienced contractors be aware of complications that may happen while they are working on your building. And so they learn how to prevent these complications in the event that they happen. 4: Legalities Contractors understand the building codes and ways to adhere to them. There are more legal issues that you could not know about. For instance, what occurs if a neighbor, a buddy or someone working on your building is injured when your home is being built? Proper liability is vital, yet it is expensive and sophisticated if you opt to buy it by yourself. Leave the contractor to deal with this for you. 5: Warranty Are you going to build your house yourself? In that case, then know that there won�t be a warranty to your work. You are also accountable for the caliber of the project. Construction contractors supply a warranty for his or her work and are generally accountable for fixing any concerns that they might arise. This gives you a satisfaction because you will know that you won�t have be worried about repairs as long you hired a contractor that gives warranty with regard to their work. These represent the benefits of hiring construction contractors. However, you won�t enjoy every one of these benefits when you work with a wrong contractor. That may be why should you perform a thorough research before getting a contractor. Be sure that the one you will be hiring has enough experience and hires the ideal workers.
0.999998
Which QuickBooks reports will I need to provide the auditor and where can I find them? Profit & Loss (P&L) Statement or Income Statement: This report will provide the auditor with sales/income for the period requested. To run the report, select Reports menu, then Company & Financial > Profit & Loss Standard. Click the Dates drop-down arrow and select the desired date range, or manually enter the date range in the calendar boxes. Payroll Summary: This report will provide the auditor with gross payroll by employee, total gross pay, overtime amounts, deductions from gross pay, and adjusted gross pay. To run the report, select Reports menu, then Employees & Payroll > Payroll Summary. Click the Dates drop-down arrow and select the desired date range, or manually enter the date range in the calendar boxes.
0.996544
Everyone is probably familiar with today's famous water parks like Zoombezi Bay and Kings Island, The Beach, and Great Wolf Lodges, but did you know that Columbus once had it's own water park? The property occupied today by Olentangy Village was once an amusement park. The park was first called The Villa and was opened in 1893 by Robert Turner. In 1896, the Columbus Street and Railroad Company bought the property, renaming it Olentangy Park. It quickly gained renown as one of the city's most beautiful spots. In 1899, the Dussenbury brothers purchased the park, which then featured a small merry-go-round. The Dussenburys built a theater, dance pavilion and rides such as the loop-the-loop, whirlwind and shoot the chutes. During the 44 years the park was open, it featured 4 roller coasters (Red Devil, Racer, Figure 8, and Whirlwind), the Ye Olde Mill, a swimming pool, 2 Ferris wheels, a pony track, a train ride, 2 carousels, and many more attractions. A spacious Dance Hall was constructed along the Arcade, and throughout the Park's life the Dance Hall would bring Columbus residents performances by virtually every Big Band of the era, including Jimmy Dorsey, and The Glenn Miller Orchestra, as well as many famous comedy and vaudeville acts. An open air amphitheatre was built near the theatre allowing local Brass Bands to perform open air concerts. By the end of the 1910s Olentangy Park had become the largest amusement park in the United States, dwarfing other trolley parks, such as Pittsburgh's "Kennywood," and even Sandusky, Ohio's now famous Cedar Point. In 1938, the park was sold to L.L. LeVeque, and turned into the Olentangy Village apartment complex. Today the only reminder of the park is the swimming pool at Olentangy Village and the original Grand Carousel that is now located, and in regular operation, at the Columbus Zoo & Aquarium. The Jeffrey Manufacturing Company, in Columbus made the Spur Haul Up Chain used to power the Figure 8 roller coaster at Olentangy Amusement Park. The cost to ride was five cents. The park was located on North High Street along the Olentangy River.
0.990967
When thinking about a welfare recipient, people tend to imagine someone who is African American and who is lazier and less competent than someone who doesn't receive welfare benefits, according to new findings in Psychological Science, a journal of the Association for Psychological Science. This mental image, and its association with specific racial stereotypes, influences people's judgments about who deserves government assistance. "We show that when Americans think about recipients of government benefits, they overwhelmingly imagine a Black person - although, in reality, beneficiaries include White, Black, and Hispanic people in roughly equal proportions," explain researchers Jazmin L. Brown-Iannuzzi (University of Kentucky) and B. Keith Payne (University of North Carolina at Chapel Hill). "Moreover, when people consider granting or withholding benefits to the imagined recipients, they are less willing to grant benefits when the imagined person fits racial stereotypes about black recipients." Brown-Iannuzzi, Payne, and colleagues Ron Dotsch (Utrecht University) and Erin Cooley (Colgate University) were interested in studying how people think about welfare recipients when they considered that Americans often oppose redistributive policies despite rising economic inequality. "One reason, we hypothesized, could be that racial stereotypes shape perceptions of who benefits from such policies," Brown-Iannuzzi and Payne explain. To explore these mental representations, the researchers created a "base" image that was a morph of four images: an African American man, an African American woman, a White man, and a White woman. They then added a filter that distorted the base image to generate 800 unique face images. Participants looked at 400 pairs of faces and selected the face in each pair that looked more like a welfare recipient. The instructions did not refer to race or any other specific trait, and yet the two groups made strikingly similar selections, indicating strong consensus about what welfare recipients "look like." Based on participants' selections, the researchers superimposed images to create one photo showing the average mental image of a welfare recipient and another photo showing the average mental image of a non-recipient. The researchers then asked two completely different groups of participants to evaluate the aggregate faces on various features. Some of the features related to appearance - for example, participants rated the individual's race, gender, likeability, attractiveness, and happiness. Some of the features related to aspects of the individual's personality, including laziness, competence, humanness, and agency. Importantly, the participants were making these evaluations based on the image alone - they didn't know how the images were generated or what they represented. The data, from a total of over 400 adults, showed a strong convergence. Although they did not know what the faces represented, participants rated the average welfare recipient face as more African American (less White), less likeable, less attractive, and less happy than the aggregate non-welfare-recipient face. Moreover, they assessed the individual in the welfare recipient image to be lazier, more incompetent, more hostile, and less human. And these associations seem to have real-world consequences, shaping people's attitudes about who deserves welfare benefits. A total of 229 participants evaluated the individuals shown in the two average images, believing that they were composites photos of actual people who had applied for government welfare programs. The researchers explained that some of these applicants had turned out to be "responsible" recipients, while others had turned out to be "irresponsible." Again, participants rated the average welfare-recipient image as more African American, less competent, and less hardworking than the average non-recipient image. But participants also rated the person shown in the average welfare-recipient image as generally less responsible and less responsible with food stamps and cash assistance than the person in the other image. These impressions seemed to drive participants' opinions about whether the two individuals deserved welfare support. They expressed less support for giving food stamps and cash assistance to the person in the welfare-recipient image than to the person in the other image. The researchers conclude that these strong mental representations may contribute to growing inequality by triggering deeply-rooted biases about how resources should be distributed and to whom. "Our research sheds light on the psychological roots of political policy preferences," say Brown-Iannuzzi and Payne. "These findings can help us understand the different assumptions and different mental representations underlying deep political divisions." All data and materials have been made publicly available at figshare and can be accessed at https://dx.doi.org/10.6084/m9.figshare.c.3468495.v2. The complete Open Practices Disclosure for this article can be found at http://pss.sagepub.com/content/by/supplemental-data. This article has received badges for Open Data and Open Materials. More information about the Open Practices badges can be found at https://osf.io/tvyxz/wiki/1.%20View%20the%20Badges/ and http://pss.sagepub.com/content/25/1/3.full. The APS journal Psychological Scienc is the highest ranked empirical journal in psychology. For a copy of the article "The Relationship Between Mental Representations of Welfare Recipients and Attitudes Toward Welfare" and access to other Psychological Science research findings, please contact Anna Mikulak at 202-293-9300 or [email protected].
0.999892
I have five fish tanks sitting on a shelf. Each tank is a different size, has a different color gravel, contains a different species of cichlid, and a different kind of aquatic plant. Each of the cichlids eats a different type of food. From the following clues, can you tell me which fish lives in the 75 gallon tank? The convict has speckled gravel in his tank. The angelfish is in a 40 gallon tank. The tank with the sand is to the left of the tank with white gravel. The resident of the sandy tank eats pellets. The tank with brown gravel has pennywort (a plant). The fish with the speckled gravel eats brine shrimp. The oscar lives in the leftmost (first) tank. The lace plant is the tank next to the 50 gallon tank. The fish in the 20 gallon tank lives next to the pennywort tank. The fish with the swordplant eats microworms. The only plant in the tropheus tank is algae. The oscar lives next to the tank with the black gravel. The fish with the lace plant has a neighbor that eats only goldfish.
0.998575
The FCC is no longer a champion of net neutrality regulations. Under the Obama administration, the Federal Communications Commission was ultimately able to implement net neutrality rules to ensure an even playing field. Those rules are now in jeopardy as new blood takes control of the FCC. The agency's chairman, Ajit Pai, has long been opposed to treating Internet service as a utility, and lest anyone thought he may have changed his mind since replacing Tom Wheeler, he stated today at Mobile World Congress that net neutrality was "a mistake." In his prepared remarks, Pai seemed to be reaching out to telecoms by indicating the FCC's torch has been passed, and that the ones who now hold it are very much in favor of "light-touch" regulation. "It's evident the rules were a mistake," Pai said in reference to the FCC's utility-style regulations on broadband Internet, according to CNET. "It created uncertainty in the market, and uncertainty is the enemy of growth." Pai indicated he would preserve a free and open Internet, but argued that existing net neutrality rules have lessened the level of broadband investment that would have otherwise occurred. "Remember, networks don't have to be built," Pai added. "The more difficult the government makes it to deploy investment, the less likely that broadband providers will take the risk." In other words, Pai believes broadband providers were doing great before net neutrality rules came in and screwed everything up. One could certainly argue that point—and Pai does, vaguely—but at what expense? The kerfuffle between Comcast and Netflix should serve as a reminder of what can happen when broadband providers and services find themselves at odds with one another. Comcast throttled Netflix's traffic because it wanted the streaming video service to pay a higher fee for the bandwidth it was consuming. Comcast subscribers were caught in the crossfire of this dispute until Netflix caved. The notion that broadband providers will self-regulate themselves in the best interest of consumers is highly suspect. It also shouldn't be taken at face value that net neutrality rules caused broadband providers to invest less in their growth and infrastructures. The claim doesn't align with the findings of The Consumerist. Pai's remarks come two weeks after FCC commissioner Michael O'Rielly referred to ultra-fast broadband (1Gbps service) as a "novelty" for consumers who already have access. "The outcry for things like ultra high-speed service in certain areas means longer waits for those who have no access or still rely on dial-up service, as providers rush to serve the denser and more profitable areas that seek upgrades to this level," O’Rielly said, according to Fierce Telecom. "Today, ultra-fast residential service is a novelty and good for marketing, but the tiny percentage of people using it cannot drive our policy decisions." Looking ahead, it is expected that Pai will dismantle existing net neutrality rules. To some extent he's already begun the process—earlier this month, the FCC stopped its practice of investigating 'zero-rating' services. His comments today suggest that more policy reversals are on the way.
0.965577
What if I tell you that there is a way to understand each other regardless our nationality? What if I tell you that there is a language that everyone already knows that we can use to speak to each other? What if I tell you that there is a language that can bring us love and heal our hearts? Would you believe me? Well, that language actually exists, is the universal language of love, and it is called kindness, and it can change the way we live our lives. We live in a world where its inhabitants are every day more connected through devices but every day more disconnected as human beings. We have all the resources to stay connected, to be together, but still, we insist on separate ourselves from each other. The real problem is that we cannot understand or comprehend each other. The reason? Simple: In the midst of the chaos of our society we have lost ourselves, and we have forgotten who we really are: kind, compassionate and loving beings. There are thousands of different language in the world, but still, we cannot understand each other. You may be thinking that the problem is that we do not share the same language, but the problem is not that there are many different languages, the real problem is that we do not know, that we all speak the same language, and that language is kindness. But kindness, a language? Yes, and let me tell you why. A language is a way of communication, which can be expressed in many ways. Therefore, we can say that kindness is a way to express love. Every simple word or act of kindness is a way to demonstrate love to another. Kindness is something that everyone can understand regardless culture, age, nationality or race. It is a language that can be spoken in many ways, and always will be heard. The problem is that every day we are contaminated with other less important things in our daily routine, that we forget who we are, that is why we forget to speak the language of kindness. We underestimate the power of a simple word or act of kindness. The truth is that kindness speaks louder than any other language in the world, and it has the power to heal hearts, and bring joy and happiness to the person who speaks it, and the person who is ready to listen to it. We can feel the power of kindness at any moment, for example: How do you feel when someone is kind to you? How do you feel when a stranger, someone you have never seen before, for no apparent reason, gives you a kind smile, or say a kind word? I guess you feel great, isn’t it? Even if it is for a second, a simple act or word of kindness has the power to fill our hearts with joy. Anytime, anywhere, with whomever we are, every act of kindness is never wasted. Every time we are kind to someone else, even if we feel that the other person doesn’t care, deep inside their hearts they care, because the language of kindness is something that penetrates any barriers we can have, and gets deep inside our hearts, filling it with love and happiness. Kindness can be expressed even without words, that is why anyone can understand it, because a simple act, a simple touch, a simple smile, can speak louder than words. It doesn’t matter where we are from, nor our age, culture, gender, language, it doesn’t matter if we are deaf or blind, if we do not know how to read or write, because the language of kindness will always be understood. The kindness we give is a gift for others and a gift for ourselves, and the ripples it creates are bigger than we can imagine. Why don’t you try to make one act of kindness a day, for a week, and see for yourself how wonderful it is? It is time to make kindness our first language, and change the way we live! We usually confuse self-care with selfishness and the other way around, this is a common mistake we make in our daily life, and not being able to see the difference is what is causing a huge disaster in humanity. It is hard for us to see the difference between them because they have the same meaning except for one simple detail, which makes a huge difference. Both self-care and selfishness mean the care of oneself, loving ourselves in the first place. The difference that changes everything is that selfishness is only concerned with one’s own benefits regardless of others, while self-care is concerned with one’s own benefits and the benefits of others, loving ourselves in the first place and meeting our own needs, so we can be ready to benefit others. The selfish people are only worried in their own interests, because they only look to satisfy their own needs at the expense of others. They never think about others, they don’t care about other’s needs, because most of the time they are thinking only in themselves, so they forget to look after people around them. The selfish people don’t care if they hurt others in the process of getting what they need to meet their needs and desires. They think they are the center of the world, and they want everyone to agree with that. Every man must decide whether he will walk in the light of creative altruism or in the darkness of destructive selfishness.” – Martin Luther King, Jr. On the other hand, self-care people are worried about their own interests and the interest of others, and they want to meet their own needs and desires but not at the expense of others. They want to become better persons every day, they love themselves, and they do things to benefit themselves, but that doesn’t mean that they forget about everyone around them. They do follow their dreams and desires, but without trampling over others in order to achieve what they want. Self care people want to meet their own needs, but they try to look for the best way to avoid hurting others in the process of meeting their needs. So now you can see that there is a difference between self-care and selfishness, and where one helps to construct a better world, the other helps to construct a better world but only for themselves. Probably both will lead to happiness, but only those who are not selfish will find eternal happiness, and those people will definitely help to change other people’s lives, and making other people happy, what will make them even happier, because everything you shall give, you shall receive, multiplied. The world desperately needs less selfish people; there is so much despair and sadness because of this selfish humanity. This amazing world with all its beauty is dying thanks to the selfishness of human beings, because we are not only worried about meeting our own needs in order to survive, we are also too worried about meeting unnecessary needs at any cost, that we forgot about taking care of our planet, destroying everything that was given to us. We are also too worried thinking only in ourselves that we forgot about people around us, we are too worried in getting a better position at our job that we don’t care if we have to destroy everyone around us to get it. We are too worried about getting more money, to buy more and more things for us even when we don’t need them that we forgot about the man whom is sitting in the street asking for a miserable coin to buy something to eat. We are too worried about our own satisfaction that we don’t care if we cheat our partner, because you think your satisfaction is more important that being loyal to the person who loves you! We are too worried because we didn’t had the guts to follow our dreams, so we force others to do it for us, even when they don’t want to do that. We are too worried about meeting our own needs that we don’t care if we become rapists in order to satisfy that need, we are too worried in ourselves, that we don’t care if we steal, or if we have to kill others in order to meet our needs, goals and desires. And all of this happens because of our selfishness, because we only think in our own benefit. So which one are you going to choose? The key is to find a balance. We must love ourselves first, and follow our heart, and make our dreams a reality and do everything that makes us happy, because that is the only way we can help others and make others happy, but we should never do that in order to meet our own needs and desires at expense of the unhappiness of others. We should put ourselves in the first place as long as it benefits all of us.
0.999686
Here is a dance that I'm obsessed with, set to a song that I love, "Creep" by Radiohead. Is the choreography based around a story, the mood of the song, or both? I don't even think it matters. It's absolutely beautiful.
0.979975
iPhone 7 out on September 7? Dubai: An invite with cryptic words had been sent out. The date: September 7. Apple watchers the world over are abuzz with speculation that the iPhone 7 – the latest iteration of the tech giant's best-selling smartphone — is coming, finally. Following numerous purported leaks and rumours going around, Apple started sending out press invites on Monday for a September 7 product launch where the iPhone 7 — and possibly a new Apple Watch — will most likely by officially unveiled. In the company's usual enigmatic style, the invite features the Apple logo against a black background, but gives very little away: "See you on the 7th. Please join us for an invitation-only event at the Bill Graham Civic Auditorium in San Francisco on Wednesday, September 7, at 10:00 a.m." The only other thing that's clear by the invite's text is the venue: Bill Graham Civic Auditorium, which seems to have become Apple's favourite venue for all its big product launches. The venue, with a seating capacity of about 7,000 people, is also where the company held its 2016 World Wide Developers Conference. Apple is expected to introduce next-generation versions of the iPhone and Apple Watch at the event. Monday's invitation may refer to a larger version of the new iPhone that is expected to have a dual-camera system to improve photography. The successors to the iPhone 6S and 6S Plus is said to include advanced photography capabilities and upgraded hardware with a design similar to last year's models, people familiar with the matter said earlier this month. The iPhone generates about two-thirds of Apple's sales, making a product refresh essential to help revive growth in the run-up to Christmas. Online reports suggest Apple plans to forego the 3.5mm audio jack and replace it with the lightning connector for audio output, for the upcoming iPhone 7. The move is likely aimed at making future iPhones even slimmer. Images circulating online claimed to be Apple's EarPods with lightning connector, seems to confirm this. The EarPods' images were posted on Chinese social media website Weibo. If Apple decides to ditch the 3.5mm audio jack, it won't be the first company to do so. Earlier this year, Chinese manufacturer LeEco launched three smartphones without a 3.5mm headphone jack. The company claims that the handsets are the first in the world to forego the traditional 3.5mm jack and feature a USB Type-C audio port with CDLA (Continual Digital Lossless Audio) tech.
0.999995
The technician was able to fix my phone as soon as I brought it in, and it was fixed within an hour. The price for the repair was great, and I appreciated the great customer service from the technician, who had also given a quote for the repair over the phone. Would definitely recommend for phone repairs.
0.941295
Philadelphia and New York City were the major ports of the middle colonies; merchants varied in their income and prestige, but some of them, such as Stephan Girard and Robert Morris of Philadelphia and Peter Livingston of New York, were among the richest men in the colonies. Wheat was the main middle colony export, but merchants also dealt in flour, flaxseed, barrel staves, and meat, dividing their trade among Britain, southern Europe, and the West Indies. Like their New England counterparts, middle colony merchants (with the exception of Quakers) dealt in slaves. Early on, merchants used Britishowned ships, but by 1770, three out of five ships clearing New York and three out of four in Philadelphia were locally owned, giving rise to an active regional shipbuilding industry. Of New England's exports (which included livestock, salted and preserved fish, wood products, rum, and potash), 60 percent went to the West Indies, 19 percent to Britain and Ireland, 15 percent to Europe, and 3 to 4 percent to the African slave trade. Boston and Newport were the region's primary ports; secondary centers included Portsmouth, Salem, and Gloucester, Massachusetts; Providence, Rhode Island; and New Haven and New London, Connecticut. Such New England merchants as Thomas and John Hancock of Boston, the Tracy and Jackson families of Newburyport, and Robert "King" Hooper of Marblehead amassed substantial wealth and built palatial homes from their earnings in shipping. In the Chesapeake, the main crop was tobacco, shipped primarily through Scottish and English factors employed by British merchants. By the 1770s Chesapeake farmers had diversified into wheat production and were exporting 100 million pounds of tobacco and 3,000 tons of flour and bread annually. The grain trade produced new settlements, including Alexandria, Fredericksburg, and Richmond, Virginia, and Baltimore, Maryland, which had become the nation's leading flour market by 1800. These cities did not approach northern urban centers in size, but they offered more commercial services than the small towns where tobacco factors worked. In the Lower South the main port was the wealthy city of Charleston, South Carolina. Rice was by far the most valuable export; merchants shipped two-thirds of the crop each year to Britain and sold the remainder to southern Europe and the West Indies. Other products included indigo, naval stores, and lumber products, which went mainly to Britain, and grain and meat products, sold in small quantities to the West Indies. The French and Indian War (1754–1763) profoundly affected American shipping. An influx of money accompanied British troops to America. The House of Hancock in Boston, for example, owed much of its considerable fortune to supplying British forces during the war. However, with peace the general prosperity ended. In 1764 and 1765 Parliament imposed the Sugar and Stamp Acts, which attempted to tax the colonies to help pay for the war, and in 1767 they passed the Townshend Act, which imposed import taxes on tea, glass, lead, and paper. These actions prompted American merchants, some more willingly than others, to sign nonimportation agreements. The Tea Act of 1773 had a similar but even more devastating effect on shipping; when a group of Bostonians destroyed a valuable shipment of tea in protest, Parliament passed a bill closing Boston's port. This and other Coercive Acts (1774) prompted the newly formed Continental Congress to curtail shipping (except for the lucrative rice trade) to Britain and the British West Indies. When war broke out officially in April 1775, American overseas trade shut down completely; later that year Congress authorized trade with the West Indies, and in 1776 trade resumed with other non-British areas. However, until 1778 British ships blockaded New England (except Boston) and middle colony ports; after 1778 the British moved the blockade south to Savannah and Charleston. Some American merchants gave up their ships to the fledgling American navy, but others turned to smuggling or privateering or ran blockades to trade with France, Spain, and Holland, though commerce never reached prewar levels. After the Revolution, the nation experienced numerous economic problems, some directly linked to the struggling shipping industry. Britain prohibited American trade with the West Indies, placed high duties on rice and tobacco, and declared American-built vessels (no matter who the owner) ineligible for imperial trade. Spain and France also withdrew or curtailed their wartime trade agreements. Moreover, now that America was no longer under Britain's protection, pirates from the Barbary States in North Africa harassed American ships and demanded bribes in return for safe passage. Despite these interruptions, in the early nineteenth century American ships were involved in the China tea, California hide, international whaling, and cotton trades, as the shipping industry benefited from the technological, transportation, and managerial innovations that characterized this era. With the invention of the cotton gin, cotton became the South's major crop. Between 1793 and 1815, annual production rose from 3 million pounds to 93 million pounds; by 1840 cotton comprised half of all U.S. overseas shipments. New designs in ships meant increased efficiency and cargo space; capacity grew from an average 300 tons in the 1820s to 1,000 tons by the 1850s. As Americans expanded further west, new canals, turnpikes, and steam-powered riverboats streamlined the movement of farm products to eastern and southern ports. In 1818 New York's Black Ball Line introduced regularly scheduled transatlantic crossings, a move that helped New York surpass Philadelphia as the nation's premier port. By 1829 the nation was poised on the brink of a golden age of American shipping, symbolized by swift, tallmasted clipper ships and expansion into distant markets. The British development of an iron-hulled, oceangoing steamship signified that even more change was imminent, but until 1860 wooden sailing ships continued to dominate the industry. See alsoChina Trade; Embargo; Foreign Investment and Trade; Merchants; Quasi-War with France; Shipbuilding Industry; Slavery: Slave Trade, African; Steamboat; Transportation: Canals and Waterways; War of 1812; Whaling . Baxter, W. T. The House of Hancock. New York: Russell and Russell, 1965. Doerflinger, Thomas M. A Vigorous Spirit of Enterprise: Merchants and Economic Development in Revolutionary Philadelphia. Chapel Hill: University of North Carolina Press, 1986. Green, Jack P. Pursuits of Happiness: The Social Development of Early Modern British Colonies and the Formation of American Culture. Chapel Hill: University of North Carolina Press, 1988. "Shipping Industry." Encyclopedia of the New American Nation. . Encyclopedia.com. 18 Apr. 2019 <https://www.encyclopedia.com>.
0.999921
A ruling by the California Supreme Court makes it easier for employees to get their discrimination claims heard in court. Under the old rules, a lawsuit could be tossed out if the employer proves that the discriminatory comments were "stray remarks." This ruling allows discrimination cases to be heard by a jury even if the comments are made by employees who are not in a position to fire, or if the comments happened long before the decision to fire is made. In this claim, a 54-year-old employee alleges that he was fired because of his age. He says that executives called him an "old man," said that he wasn't a good "cultural fit," and that his ideas were "too old to matter." The company claims that he was fired due to poor performance.
0.952184
John A. DeFrancisco (born October 16, 1946) is an attorney and Republican politician who formerly represented District 50 in the New York State Senate from 1993 to 2018. Senate District 50 comprises Skaneateles, Pompey, Van Buren, most of Onondaga County, and the western half of Syracuse, among other communities located in Upstate New York. John DeFrancisco graduated from Christian Brothers Academy in Syracuse, New York. DeFrancisco received his Bachelor's Degree from Syracuse University, where he played college baseball, and later graduated from Duke University Law School. He is a veteran of the United States Air Force, where he served as a Judge Advocate. First elected to the Senate in 1992, DeFrancisco previously spent eleven years on the Syracuse Common Council as both a Councilor-at-large and then the Council President. He has also served in the past as the President of the Syracuse City School District Board of Education and the Vice-President of the Conference of Large City Boards of Education. He was also of counsel at the law firm of DeFrancisco and Falgiatano; an associate with the law firm of Simpson, Thatcher and Bartlett; a Judge Advocate in the United States Air Force; and the Assistant District Attorney in Onondaga County from 1975 until 1977. The Albany Times Union has described DeFrancisco as "an outspoken lawmaker and attorney known for his skills in floor debates. In 2010, after Republicans had lost their majority status in the Senate, DeFrancisco was "appointed chief interrogator for the Senate Republican Conference with carte blanche to grill Democrats and spotlight their flaws." A former Chair of the Senate Judiciary Committee and the Senate Finance Committee, Sen. DeFrancisco "authored the legislation that led to the implementation of the Amber Alert system" and secured state funding for a "cord blood bank [in Syracuse] that will transform medical waste into life-saving treatments." DeFrancisco opposes public financing of political campaigns, and has voted against medical marijuana legislation, the DREAM Act, and the gun control law known as the NY SAFE Act. DeFrancisco also voted against the 2011 Marriage Equality Act, which the Senate passed 33-29. In 2015, following the resignation of Dean Skelos as Senate Majority Leader, DeFrancisco sought to succeed him in that post; however, Senate Republicans chose John J. Flanagan. Sen. DeFrancisco was elevated to his current post as Senate Deputy Majority Leader in July 2015. In 2011, DeFrancisco supported legislation that would increase medical malpractice legal fees; at the time, he was still practicing law at a firm that specialized in medical malpractice. Common Cause/New York, a good government group, accused DeFrancisco of acting in his own self-interest. On January 30, 2018, DeFrancisco announced that he was running for the Republican nomination for Governor of New York; he stated that "'enough is enough.'" On April 25, 2018, he conceded the race to Marcus Molinaro; while he considered Molinaro an inferior candidate and was disappointed by some endorsers abandoning his campaign for Molinaro's, DeFrancisco refused to divide the party with a primary battle. He nonetheless refused to endorse Molinaro, instead endorsing Stephanie Miner, a Democrat running against Cuomo on a third-party line. On April 26, DeFrancisco announced that he would not seek re-election to the Senate in November. DeFrancisco and his wife, Linda, have three children and eight grandchildren. They reside in DeWitt, New York. DeFrancisco plays the saxophone; according to Russ Tarby of Syracuse New Times, he "blows a mean sax on Night Train." He is a Roman Catholic. ^ Doran, Elizabeth (2 June 2014). "CBA lands its biggest donation ever". Syracuse.com. Retrieved 16 February 2018. ^ "Eight To Be Honored As Distinguished Alumni On Nov. 4". Retrieved 16 February 2018. ^ a b c Williams, Stephen (7 February 2018). "Local senators endorse John DeFrancisco for governor". DailyGazette.com. Retrieved 16 February 2018. ^ DeWitt, Karen (30 January 2018). "Third GOP Candidate Enters NY Gov. Race". WAMC.org. Retrieved 16 February 2018. ^ a b Weaver, Terri (11 May 2015). "Who is John DeFrancisco, the Upstate guy who may become NY Senate leader". Syracuse.com. Retrieved 16 February 2018. ^ Harding, Robert (27 December 2013). "DeFrancisco: Cuomo signs bills ending double sales tax vehicles for military servicemembers, revising Youth Works tax credit". AuburnPub.com. Retrieved 16 February 2018. ^ Velasquez, Josefa (3 January 2018). "Gov. Cuomo Unveils Litigious Agenda for New York State". Law.com. Retrieved 14 January 2018. ^ a b Bragg, Chris (30 July 2015). "DeFrancisco named deputy majority leader". TimesUnion.com. Retrieved 14 January 2018. ^ Goldberg, Delen (22 June 2010). "NY State Sen. John DeFrancisco becomes GOP's 'pit bull'". Syracuse.com. Retrieved 26 January 2018. ^ a b Precious, Tom (30 January 2018). "Syracuse-area GOP senator announces bid for governor". BuffaloNews.com. Retrieved 16 February 2018. ^ Santora, Sally (19 August 2017). "Livingston County Republican Committee celebrates 50 years". TheLCN.com. Retrieved 14 January 2018. ^ Mulder, James (9 February 2017). "Long-awaited Syracuse cord blood bank turns waste into life-saving treatments". Syracuse.com. Retrieved 14 January 2018. ^ Weaver, Teri (11 May 2015). "Who is John DeFrancisco, the Upstate guy who may become NY Senate leader". Syracuse.com. Retrieved 26 January 2018. ^ a b Lovett, Kenneth (21 March 2011). "Lawyer pol John DeFrancisco urges attorney malpractice fee boost". Daily News. New York, New York: NY Daily News. Retrieved 11 June 2014. ^ Campbell, Jon (11 May 2015). "Skelos out, Flanagan in as NY Senate leader". Poughkeepsie Journal. Retrieved 14 January 2018. ^ Roy, Yancey (31 January 2018). "Upstate senator jumps into governor's race: 'Enough is enough'". Newsday. Retrieved 16 January 2018. ^ Lovett, Ken (April 25, 2018). "Sen. John DeFrancisco admits his bid for governor is 'basically over'". New York Daily News. Retrieved April 25, 2018. ^ Gormley, Michael (June 19, 2018). "Ex-Syracuse Mayor Stephanie Miner to run for governor". Newsday. Retrieved June 19, 2018. ^ Harding, Robert (April 26, 2018). "Longtime state Sen. John DeFrancisco will not run for re-election". AuburnPub.com. Retrieved April 26, 2018. ^ Karlin, Rick (30 January 2018). "DeFrancisco announces gubernatorial run". Times Union. Retrieved 16 February 2018. ^ Vielkind, Jimmy (10 June 2015). "DeFrancisco's L.C.A. Show rebuttal". Politico.com. Retrieved 16 February 2018. ^ Tarby, Russ (21 December 2016). "Winter Blues Blowout". SyracuseNewTimes.com. Retrieved 16 February 2018. This page was last edited on 12 January 2019, at 20:23 (UTC).
0.999998
Lockers are compact storage units where you can store your personal items usually on a temporary basis. They are found at a surprising variety of places including workplaces, schools, transport centres, swimming pools, sports stadiums, public areas, prisons, banks and more. Lockers available at public places are usually available free for use of members and other authorized users. Other lockers are hired by users by paying a rental for their use. If you are in charge of buying lockers for your office, school or other establishment, you will find it helpful to learn how to specify your requirements in locker lingo. The following description is intended to help you in this task. Banks and Tiers: Banks can be visualized as width and tiers as height, specified in number of lockers. Thus the bank might be two lockers wide and tier might be three lockers high. Such a unit will have a total of six lockers. You can have single tier (full height), two tier, three tier, etc. Single tier will usually be the most roomy. Locker Materials: Lockers are usually made of steel but can be made with wood, plastic or laminate. Plastic and laminate are suitable in environments where moisture is likely to be present, such as swimming pools. Moisture can cause rusting of steel lockers. Locking the Lockers: Traditional locks are being replaced by electronic locks in modern establishments. You might get a number to operate the locker or an electronic card is used to unlock the locker. In high security contexts, such as bank lockers, locking and unlocking might involve specific formalities. Locker Dimensions: Though sizes vary, widths of 30 or 40cm, depths of 45 cm and heights of 1.8 metres are standard. The height might be split into several tiers so that individual locker height is less. Locker Colours: The traditional dark grey colour has now been replaced by a wide choice of colour options. Steel Thickness: Standard lockers might use steel of 0.8mm thickness while secure lockers might go up to 1.2mm thickness. There are personal effects lockers, bicycle lockers, laundry lockers, service lockers used by police and other authorities, military gear lockers and other specialized lockers which depart from the standards to meet special requirements.
0.833965
Karol Maciej Szymanowski (Polish pronunciation: [ˌkarɔl ˌmat͡ɕɛj ʂɨmaˈnɔfskʲi]; 3 October 1882 – 29 March 1937) was a Polish composer and pianist, the most celebrated Polish composer of the early 20th century. He is considered a member of the late 19th-/early 20th-century modernist movement Young Poland and widely viewed as one of the greatest Polish composers. The early works show the influence of the late Romantic German school as well as the early works of Alexander Scriabin, as exemplified by his Étude Op. 4 No. 3 and his first two symphonies. Later, he developed an impressionistic and partially atonal style, represented by such works as the Third Symphony and his Violin Concerto No. 1. His third period was influenced by the folk music of the Polish Górale people, including the ballet Harnasie, the Fourth Symphony, and his sets of Mazurkas for piano. Król Roger composed between 1918 and 1924, remains the most popular opera by Szymanowski. His other significant works include opera Hagith, Symphony No. 2, The Love Songs of Hafiz, and Stabat Mater. Szymanowski was born into the Korwin-Szymanowski family, members of the wealthy land-owning Polish gentry class, in the village of Tymoszówka, then in the Kiev Governorate of the Russian Empire (now Tymoshivka in Cherkasy Oblast, Ukraine). He studied music privately with his father before enrolling at the Gustav Neuhaus Elisavetgrad School of Music in 1892. From 1901 he attended the State Conservatory in Warsaw, of which he was later director from 1926 until retiring in 1930. Since musical opportunities in Russian-occupied Poland were quite limited, he travelled throughout Europe, North Africa, the Middle East, and the United States. In Berlin he founded the Young Polish Composers’ Publishing Company (1905–12) whose primary aim was to publish new works by his countrymen. During his stay in Vienna (1911-1914) he wrote the opera Hagith and composed two song cycles called The Love Songs of Hafiz, which represent a transition between the first and second periods of the composer's style. Being lame in one knee made him unsuitable for military service in World War I, and consequently, between 1914 and 1917, he composed many works and devoted himself to studying Islamic culture, ancient Greek drama as well as philosophy. During this period, his works such as Mity (1914; “Myths”), Metopy (1915; Métopes), and Maski (1916; “Masques”), are characterized by great originality and diversity of style. The dynamic extremes in Szymanowski's music became softened, and the composer started employing coloristic orchestration and using polytonal and atonal material while preserving the expressive melodic style of his previous works. In 1918, Szymanowski completed the manuscript of a two-volume novel, Efebos, which took homosexuality as its subject. His travels, especially those to the Mediterranean area, provided him with new experience, both personal and artistic. Arthur Rubinstein found Szymanowski different when they met in Paris in 1921: "Karol had changed; I had already begun to be aware of it before the war when a wealthy friend and admirer of his invited him twice to visit Sicily. After his return he raved about Sicily, especially Taormina. 'There,' he said, 'I saw a few young men bathing who could be models for Antinous. I couldn't take my eyes off them.' Now he was a confirmed homosexual. He told me all this with burning eyes." Of his works created or first imagined, such as Król Roger, during the years 1917 to 1921, both musical and literary, one critic has written: "we have a body of work representing a dazzling personal synthesis of cultural references, crossing the boundaries of nation, race and gender to form an affirmative belief in an international society of the future based on the artistic freedom granted by Eros." Szymanowski settled in Warsaw in 1919. In 1926 he accepted the position of Director of the Warsaw Conservatory though he had little administrative experience. He became seriously ill in 1928 and temporarily lost his post. He was diagnosed with an acute form of tuberculosis, and in 1929 traveled to Davos, Switzerland, for medical treatment. Szymanowski resumed his position at the Conservatory in 1930, but the school was closed two years later by a ministerial decision. He moved to Villa Atma in Zakopane where he composed fervently. While living in Zakopane, Szymanowski developed a keen interest in the Polish folk idiom and undertook the task of creating a Polish national style, an endeavour unattempted since the times of Chopin. He immersed himself in the culture of the Polish Highlanders (Gorals) and embraced their tonal language, syncopated rhythms, and winding melodies into the new style of his music. In 1936 Szymanowski received more treatment at a sanatorium in Grasse, but it no was longer effective. He died at a sanatorium in Lausanne on 29 March 1937. His body was brought back to Poland by his sister Stanisława and laid to rest at Skałka in Kraków, the "national Panthéon" for the most distinguished Poles. Szymanowski's long correspondence with the pianist Jan Smeterlin, who was a significant champion of his piano works, was published in 1969. Szymanowski was influenced by the music of Richard Wagner, Richard Strauss, Max Reger, Alexander Scriabin and the impressionism of Claude Debussy, and Maurice Ravel. He also drew much influence from his countryman Frédéric Chopin and from Polish folk music. Like Chopin he wrote a number of mazurkas for piano. He was specifically influenced by the folk music of the Polish Highlanders, which he discovered in Zakopane in the southern Tatra highlands. He wrote in an article entitled "About Goral Music" : "My discovery of the essential beauty of Goral music, dance and architecture is a very personal one; much of this beauty I have absorbed into my innermost soul" (p. 97). According to Jim Samson (1977, p. 200), it is "played on two fiddles and a string bass," and, "has uniquely 'exotic' characteristics, highly dissonant and with fascinating heterophonic effects." Carefully digesting all these elements, eventually Szymanowski developed a highly individual rhapsodic style and a harmonic world of his own. Among Szymanowski's better known orchestral works are four symphonies (including No. 3, Song of the Night with choir and vocal soloists, and No. 4, Symphonie Concertante, with piano concertante) and two violin concertos. His stage works include the ballets Harnasie and Mandragora and the operas Hagith and King Roger. He wrote much piano music, including the four Études, Op. 4 (of which No. 3 was once his single most popular piece), many mazurkas and Métopes. Other works include the Three Myths for violin and piano, Nocturne and Tarantella, two string quartets, a sonata for violin and piano, a number of orchestral songs (some to texts by Hafiz and James Joyce) and his Stabat Mater. According to Samson (p. 131), "Szymanowski adopted no thorough-going alternatives to tonal organization [...] the harmonic tensions and relaxations and the melodic phraseology have clear origins in tonal procedure, but [...] an underpinning tonal framework has been almost or completely dissolved away." Szymanowski's music has received international recognition. In the 1920s and the 1930s, his music proved immensely popular. The composer's works were performed throughout the world by celebrated soloists such as Artur Rubinstein, Harry Neuhaus, Robert Casadesus, Paweł Kochański, Bronisław Huberman, Joseph Szigeti, and Jacques Thibaud and by orchestras led by famous conductors including Emil Młynarski, Albert Coates, Pierre Monteux, Philippe Gaubert, Leopold Stokowski, Willem Mengelberg. European and American performances of his Stabat Mater were world-scale events, progressing successfully in Naples, Paris, Liege, New York, Chicago and Worcester. A performance of King Roger in Prague on 21 October 1932 directed by Josef Munclingr closely reflected the composer’s own idea of the piece, and turned out a huge success, just as the stage production of Harnasie. A Polish recording of his Symphony No. 4 (“Symphonie Concertante”) in 1932 was followed by a series of performances abroad, mostly with Szymanowski at the piano and conducted by Grzegorz Fitelberg. In 1933, the symphony was performed in London, Bologna, Cleveland; Moscow, Zagreb, Bucharest; in 1934 – in Paris, Sofia, London; in 1935 – in Stockholm, Oslo, Bergen, Berlin, Rome, Liege and Maastricht; in 1937 – in the Hague. In 1994, a renowned director Charles Dutoit recorded both of his Violin Concertos with Montreal Symphony Orchestra. English conductor, Sir Simon Rattle, called him “one of the greatest composers of this [20th] century” and produced a series of important recordings with the Birmingham Symphony Orchestra. In 2004, Scottish violinist Nicola Benedetti won the BBC Young Musician of the Year with a performance of Szymanowski’s Violin Concerto No. 1. In 2008 his opera King Roger, which is regarded as his masterpiece, was performed at Edinburgh International Festival under the baton of Valery Gergiev and his renowned Mariinsky opera company. In 2012 Gergiev led the London Symphony Orchestra's performance of all four of the composer’s symphonies at the Edinburgh International Festival. In 2015 opera King Roger was staged in London's Royal Opera House and was produced by Kasper Holten. In the past two decades, his music has enjoyed a great revival and has been performed around the world. It has been recorded by many prominent conductors and musicians such as Pierre Boulez, Edward Gardner, Vladimir Jurowski, Mark Elder and Krystian Zimerman. On 16 November 2006, the Polish Parliament passed a resolution to name 2007 "The Year of Karol Szymanowski" in order to honour the 125th anniversary of the composer's birth and the 70th anniversary of his death. On 3 October 2007, the National Bank of Poland issued special commemorative coins depicting the composer in the following denominations: 200 zloty, 10 zloty and 2 zloty. The Karol Szymanowski Academy of Music in Katowice as well as the Kraków Philharmonic have been both named in remembrance of the composer. ^ a b Piotr Deptuch (2007). "Karol Szymanowski". Music. Resource Library. Adam Mickiewicz Institute Culture.pl. Retrieved February 10, 2013. See also, expanded biography of Szymanowski in Polish by Piotr Deptuch at "Karol Szymanowski – Życie i Twórczosc" 2002 (in) Rok Karola Szymanowskiego by AMI. ^ a b "Karol Szymanowski". Retrieved 2017-04-17. ^ The manuscript was lost in a fire in September 1939 during the siege of Warsaw. The only part that survives is the central chapter, "The Symposium", which Szymanowski translated into Russian and gave as a gift to Boris Kochno, who became his love interest when they met in the spring of 1919. Szymanowski wrote that his novel depicts "the history of a gradual liberation from various types of traditional, inherited slavery by an increasingly clear mirage of true freedom of the soul". ^ a b "Exploring the music of Karol Szymanowski, the greatest Polish composer since Chopin". Retrieved 2017-04-18. ^ "Szymanowski 1929 - 1937 Final years". Retrieved 2017-04-18. ^ "Karol Szymanowski". Retrieved 2017-04-18. ^ "Król Roger available on DVD/Blu-Ray". Retrieved 2017-04-18. ^ "Celebrating Szymanowski (1882-1937): 75 years on". Retrieved 2017-04-18. ^ "125. rocznica urodzin Karola Szymanowskiego (1882-1937)". Retrieved 2017-04-18. Didier Van Moere, Karol Szymanowski, Fayard, Paris 2008. Jerzy Maria Smoter (collective) Karol Szymanowski we wspomnieniach (Karol Szymanowski in our memory), Cracow, PWM, 1974, 394 p. Łozińska Hempel, Maria (1986). Z łańcucha wspomnień. Wydawnictwo Literackie. Karol Szymanowski's "Stabat Mater". Spanish Radio and Television Symphony Orchestra. Thomas Dausgaard, conductor. Live concert.
0.999592
What better place to train to become an English teacher than the country of England itself! Whether you choose to learn in a smaller city or the cosmopolitan center of London, there are more than enough TEFL options for every prospective teacher. While courses are academically rigorous, do leave some time to explore the historic and natural sights of England - you won’t be disappointed in your travels to see the majestic Atlantic coastline or age-old cathedrals. For a country where the native language is English (and most teachers go abroad to teach ESL), the TEFL course options are endless. There are qualified teachers who make a living out of instructing TEFL courses, many of them based in the UK. Note that you will likely learn how to teach British English, as opposed to American English, from professional and qualified instructors. Often taken over the course of 4 weeks, with classes held on weekdays, the 120-hour option is an intensive introduction to the basics of teaching English as a foreign language. While the back-to-back classes may be intensive, the course is designed to get you started in the classroom immediately. Additionally, program fees often cover housing while you study in England, which are typically shared apartments with other TEFL students. Not only will you have the chance to make great friends with these fellow students, but you will also form tight bonds with the professional teachers, allowing you to gain insight into how the TEFL world really works. Whether you are looking to earn an advanced diploma or improve your teaching skills, there is an abundance of specialty courses in England. Taken separately or immediately following a basic TEFL course, these advanced options give teachers a chance to improve their knowledge of educational practices. Many courses are general advanced ones, but some are narrow topics, such as teaching young learners, teaching pronunciation, or teaching business English. The highest concentration of TEFL course in England are in London (no surprise there!). However, if you wish to avoid high costs of living and explore other parts of the country, take a look at Manchester, Bristol, or Leeds. In fact, TEFL courses are very popular in England, so most major cities will have a few options. Additionally, since there are so many locations with TEFL courses, there are continuous start dates throughout the year. Note that you’ll want to take a course about a month (or so) prior to when you depart for a foreign country or begin applying for ESL jobs. Generally, teachers must be native speakers and hold either a bachelor’s degree or some teaching experience. However, since most TEFL-trained teachers move abroad for some time, it is important to research your new place of employment and their requirements for teaching English. Requirements will vary greatly by country. Upon completion of your TEFL course in England, you must decide whether you want to stay in the country or teach overseas. Since many UK-based teachers earn their TEFL certificate in-country (which is a great way to save!), a great deal of foreign recruiters hold open interviews and fairs. Additionally, your TEFL provider may not guarantee job placement domestically or abroad, but they do have contacts and the resources to help you get started. Many TEFL companies will have an address book of program alumni located all over the world, and will gladly put you in contact with some of these teachers. If you plan to stay in England to teach, there is the option of teaching at a language school or providing private lessons. Foreign students often travel to England, for summers or semesters, to improve their language skills (often on study abroad programs). Thus, you can work in this niche field and find employment teaching ESL to international students. The cost of living in England is among the highest on the European continent. Of course, London is widely known to have high costs of living, with rent and food to be expensive in comparison to other European cities and UK towns. If you are looking to save money, take a look at smaller cities and/or courses in suburbs of major cities. Generally the cost of living is around 400 to 800 GBP per month, with London being a bit higher.
0.947269
When will the Tories change their leadership elections to FPTP? In the last few months I have lost count of the number of senior Conservatives who have gone on the record as claiming that AV gives some voters "more than one vote". Indeed the No2AV campaign which is being led from the front by the Conservatives is soon to launch their next phase entitled "Keep One Person One Vote". Look, Matthew Elliot the No2AV campaigns director has just been given a plum spot on ConservativeHome today to evangelise about this. Now I have always thought this argument is a load of rubbish. AV just gives one vote to each person but that vote is transferable. It means all electors have the chance to have their say about who is ultimately elected by being able to express a preference about who is chosen from candidates in later rounds even if their initial first (or second etc.) choice is eliminated. The funny thing is that the Conservative Party understands this as well. Given their blanket statements about how preferential systems give "more than one vote" they actually use a preferential system to elect their own leaders. The rules are that there are a number of rounds in which all Conservative MPs can vote and each round the candidate with the fewest votes is eliminated. This continues until there are just two candidates left and these then go forward to a ballot of the party membership in the country. OK, I grant you it is not identical to AV but it certainly shares similar hallmarks and is far closer to AV than FPTP. But one thing that cannot be disputed is that the Conservative leadership election rules by their own terms give the voters in the initial rounds "more than one vote". So Ken Clarke was eliminated and the MPs got to vote all over again. But hang on a minute! That means that all the MPs who voted for Ken Clarke who was eliminated got "more than one vote". They were able to go on to vote for one of the candidates who still remained in the contest. That is precisely what the Conservatives are claiming is anti-democratic now and why we should keep First Past The Post. I know people will say that the systems are different and also claim that it is invalid to compare electing a party leader to electing an MP but I am afraid that does not wash. The Conservatives and the No2AV campaign have made it very clear that it is fundamental point of principle that in an election no voter should have "more than one vote". There is no difference between electing a leader and electing an MP when it comes to fundamental points of principle. So to give the Conservatives the benefit of the doubt for a minute, perhaps they have not really realised until now how anti-democratic (by their own terms) their leadership election rules are. Fair enough, everyone makes mistakes. But now that pretty much every Conservative cabinet minister has been banging on for months about how voters should not be allowed "more than one vote" there is no further defence of their leadership election system that will cut any ice. It is imperative that they change the system to First Past The Post. The only way they can avoid the terrible consequences that they themselves have highlighted in future leadership elections is to put all candidates immediately to a ballot of the party in the country where each voter only gets to mark an X against the candidate they want to win. Of course doing it this way might mean that their leader only has the support of a third or perhaps less of the electorate (a bit like we get with some MPs now) but that is a small price to pay to ensure that no voters get "more than one vote". The fact that the Conservatives have made no moves at all to change their leadership election rules in the light of what they must surely understand is a serious anomaly I think tells you all you need to know about how much they really believe that preferential voting breaches some fundamental democratic principle. Indeed it makes it clear that they understand the value of allowing every member of an electorate the chance to influence which candidates go through to the final round. We should judge the Conservatives by their actions, not their words. And by their actions with respect to their own leadership elections they damn one of their main arguments against AV. The problem I have, is that we don’t know why they blame us. Do they blame us because the Tory narrative that we overspent on public services has caught on? It’s a populist narrative that probably does have a lot of traction despite both a lack of serious veracity and the fact that until the crash the Tories were planning to match us for spending. It is (sort of) true that until the crash the Conservatives were planning to match Labour for spending. I say sort of because they were talking about "sharing the proceeds of growth" which I always took as a tacit signal they would be looking to alter the balance of spending and taxation even if only marginally (at first!). But what the comments above fail to take into account is how the political centre ground gets moved by a government once in office. Labour in government were very adept at doing this not least in the language they used. They always characterised spending as investment and any opposition from the Conservatives to any individual spending commitments was always characterised as mean spirited and often described with labels such as "same old Tories". Almost irrespective of whether there may have have been good arguments against some of the spending such as it might have been cost ineffective etc. I am not casting value judgements on any of this by the way, just observing that is what happened. So Labour managed to move the centre ground of politics onto their investment territory leaving the opposition with little choice in the end (after 3 election defeats) to talk the same language and eventually even promise very similar policies to them. The Conservatives had managed a similar trick in the mid-90s. After 4 bruising election defeats for Labour, when Tony Blair took over in 1994 he set about trying to neutralise the Tory charge of Labour hiking up taxes (the centre ground was in a different place then) by promising to match Tory economic plans for the first two years of a Labour government. But over the course of the 13 years following Labour's 1997 victory despite a tentative start they did eventually succeed in increasing public spending overall by quite large amounts in the end. Just because the initial signals they sent in opposition implied they would not do this, I think most people recognised that if you get a Labour government they will try and shift the balance towards more public spending. I think the same situation happened in reverse in the last few years. Cameron (as is his wont) very closely followed the Blair play book by trying to hitch himself and his party to Labour's spending commitments. Not because he had any deep convictions that it was the right thing to do but for politically expedient reasons. It was only the economic crisis that interrupted this plan and caused him and his government to reduce spending as dramatically as they have done. And to be fair, Labour would have reduced spending quite dramatically too, just not as much. That of course would have been them keeping the centre ground positioned more in their direction. So to unpack Emma's comments a little bit further, the problem I have is that I do not understand why she does not understand why people still blame Labour. It was Labour who had been in power for over a decade when the crisis hit. They had been in control of where the political centre ground was. Blair (and to be fair Brown) were past masters as it. Cameron was only promising to match Labour spending because that is where that centre of political gravity was. If you don't believe me, try a little thought experiment. Would public spending have been at the same level as it was in 2007/2008 if Michael Howard had won the 2005 election? Or if William Hague had won the 2001 election? It is only fair that Labour take their share of the blame for the cuts that are needed now given that it was their government that was presiding when the crisis hit and their levels of spending facilitated by their political acumen. If Labour are looking for some comfort from the current situation though it is that the electorate tend to have fairly short memories. I confidently predict that as the cuts really start to bite it will be the current government that moves into blame pole position and that will continue to get worse over the next 2 or 3 years. I was going to write a long post about how our currently overly complex tax system is crying out for simplification and that despite the fact that there will doubtless be some anomalies that need to be ironed out, the putative harmonisation of NI and income tax rates would be a good thing. It's not my job to tell you exactly how the system works - that's for the 'yes' campaign to explain. But even if it was my job, I'll be honest with you, I don't think I could. David Cameron got a first class honours degree in Philosophy, Politics and Economics from Oxford University. He was taught by Vernon Bogdanor, one of the UK's foremost experts on constitutional matters. It seems rather implausible that someone could get that qualification, from that university and then not be able to explain how a relatively simple electoral system works (there are far more complicated ones out there). One of the things that has happened in the last few decades in political life is that the upper echelons of all the main political parties have become disproportionately filled with people who have been down the Oxbridge PPE route and/or those who have been political bag carriers. Whilst I am very unhappy with this, one consolation is that at the very least they should all be fully aware of things like political and electoral systems and be able to communicate this information to the electorate. After all, being a good communicator is one of the most fundamental skills a politician needs. So for Cameron to blithely claim he is not able to explain AV suggests one of two things to me. Either he is not being honest, or his extremely privileged education was wasted on him. On Thursday evening I attended what was billed as a "Fair, Impartial AV Referendum Debate" in Reading. I had been anticipating a balanced debate where well informed and experienced campaigners from both sides locked horns and I hoped to hear some thought provoking arguments. Although I am already decided as a "Yes" I am still interested to hear principled arguments from both sides and to try myself to engage in this sort of thing. However the event turned out to be anything but balanced. It seems that the debate was actually organised by the "No" side. I unfortunately arrived just as it was starting so didn't have time to speak to anyone beforehand but the "Yes" side had not sent anyone to the debate. I thought this was a bit odd at first but as I have subsequently discovered each time these "No" organised debates take place, an official invite is only sent to the "Yes" camp on the morning or afternoon of the debate itself (*see update below for the "No" camp's response to this). So given such short notice and the way they are organised it is not altogether surprising that they do not send people. Mark McDonald, a human rights lawyer. Sam Gyimah, Conservative MP for East Surrey. Charles Hindhaugh, a year 13 student from Reading school who was pulled in from the audience at the last minute. I think you can see where this is going. Both Mark and Sam are clearly very experienced debaters. They pitched their cases which to my mind contained the odd fair point but mainly lots of spurious and in some cases totally misleading information. But packaged very well and of course with all their experience they were able to use debating tactics to sidestep rebuttals and change tack deftly when necessary. Charles on the other hand is an 18 year old schoolboy. He did his very best and frankly I was impressed with what he managed to do given his age and the fact he had had about 1 minute to prepare but inevitably some of the very reasonable points he tried to make got a bit lost and he did seem to lose his train of thought at times. Completely understandably mind. I very much doubt as an unprepared 18 year old schoolboy facing a Member of Parliament and a human rights lawyer I would have been able to do any better. At first I thought that despite the clear imbalance on the panel, once the debate was opened up to the floor it would be possible for members of the audience to redress this. And those of us in the "Yes" camp in the audience did try. However the dynamics of the structure of the debate very strongly mitigated against us. Every time someone from the audience got a minute or two to make a point, the panel then got at least as much time to respond and because the panel, with the microphones and the advantage of the platform was biased in numbers and strength in favour of "No" the "Yes" argument struggled to get a fair hearing. I was one of those who tried and I made a couple of points regarding the 50% threshold that Sam made great play about and also tried to skewer the cost argument. To be perfectly honest my contribution was not the best. Had I been on the platform I would have prepared and also brought a pen and pad with me to make notes. Instead I was trying to respond to points from memory from the audience. I do not think they responded to my 50% point and my cost argument was effectively ignored as Mark continued to claim it would cost over £200 million and also derided by point about Women's Suffrage (which I have made before here) which is easy to misrepresent and of course I had no real come-back once the microphone was taken from me. When I did try later to chip in and rebut his continuing misrepresentation of the facts he was able to then portray me as a heckler whose interventions were out of order in the format. He was also able to do this with others who tried similar interventions. In a way he was right of course. I was just an audience member. But the complete imbalance in the panel made a mockery of the usual rules of a fair debate. I am sorry to say that after less than an hour I had had enough of this farce and I left. I think what annoyed me most is that I have very little free time these days and this turned out to be a complete waste of it. I was interested in seeing an impartial and balanced debate and what we got was a travesty of this. I expect No2AV campaigners will claim that the "Yes" side should have sent people but from everything I can tell the late invitations and the whole structure of the way these events are set up are an attempt to maximise the chance that this will not happen. To anyone else from either side or from a neutral perspective thinking of attending a local debate, I would strongly urge you not to attend any debates organised by the "No" camp. They are the ones listed on the http://avdebates.com website. Unless of course you want what is effectively a rally for the "No" side. In which case fill your boots. If you want to watch a video of the Reading "debate" from Thursday and judge for yourself, it is available here. I am the bloke on the front row who gets involved about half way through. *UPDATE 14/03/2011: @LaraSmallman on Twitter has drawn my attention to the following claim by the "No" camp that they had actually invited the "Yes" camp to their debates back in January. I only reported what I had heard but in the interests of fairness here is a link to the "No" camp's post on this subject. PS: Incidentally I didn't see this Liberal Conspiracy post until after I got back from the debate on Thursday evening and @JamesGraham on Twitter told me about it. Had I seen it and realised the nature of what I was walking into I almost certainly would not have bothered. PPS: I have had my attention drawn to another review of the event by PoplarMark here. He thinks my intervention was a bit too aggressive. I had suspected it did not come across as I had intended! The primary focus of the reporting of the Barnsley Central by-election result has been on the fact that the Lib Dems came sixth. This is bad news for the party and there is no point in Lib Dems claiming otherwise. There has been plenty of coverage of that elsewhere though. In terms of how the result may affect politics more broadly I think the fact that UKIP went from fifth last year to second with over 12% of the vote is even more significant. It is difficult to be sure of the motivations of those who voted UKIP and doubtless some of their vote has picked up the protest element that previously would have gone to the Lib Dems. However the fact that so many people were willing to vote for a right-wing party that wishes to leave the European Union must be giving David Cameron great cause for concern. UKIP already came second in the European elections in 2009. Now they are beating the Tories in by-elections. There are predictions that UKIP could actually come first in the European elections in 2014. Given how unpopular the government may be in the run up to those elections as the cuts will have been really biting at that point I would not want to bet against that possibility. And if that, or anything approaching that happens, UKIP would have a lot of momentum behind them for the 2015 general election. The problem for Cameron is one of simple parliamentary arithmetic. In order to form a majority government in 2015 his party will need to actually win seats. That is an unusual position for the Conservative Party in government to be in. Usually they would have a majority and if they lost a few seats they would still be able to retain power. That is not the case now. So if they find they are not just fighting Labour but also a rearguard action against UKIP in their marginal seats that could easily be the difference between getting enough seats to form a government (either in majority or in coalition) or losing power. The right wing vote could find itself split in a similar way to how the left wing vote split during the 1980s because of the SDP. It's unlikely that UKIP would win many seats or the sort of vote share nationally that the SDP achieved but they would only need to improve moderately on their 2010 showing to cause major problems for the Tories and that is looking increasingly likely. So what is the solution? Cameron could try tacking further to the right to appease UKIP leaning voters in the hope of bringing them back into the fold. The problem with that is his coalition partners would not stand for that sort of thing for long and it could precipitate the collapse of the government at the worst possible electoral moment. There is of course another solution to Cameron's UKIP woes. The main reason UKIP are such a problem for the Tories is because the First Past the Post system makes any voters who plump for UKIP by definition not able to support the Tory candidate in a constituency. That is why a UKIP surge is such a potential threat to them. But if the AV referendum passes then a good UKIP showing in 2015 would no longer be a disaster for the Tories. It is a fair assumption that many of UKIP's second preferences will go to the Tories. It will give right-wing voters the chance to show what they would ideally like without splitting the right wing vote and allowing other parties to come through the middle. When UKIP were polling in the very low single figures the risk to the Tories in this respect was slight. But with their stunning Barnsley Central surge they are becoming a potent threat to the Blues retaining power. And with David Cameron's limited room for political manoeuvre on the right I suspect he may well now secretly want the AV referendum to pass.
0.997107
Binary search tree (BST) is a binary tree where the value of each node is larger or equal to the values i n all the nodes in that node's left subtree and smaller than the values in all the nodes in that node's right subtree. Write a function that returns 1 if a given binary search tree contains a given value, else 0. Call to contains(&n2, 3) should return 1 since a tree with root at n2 contains number 3. C is a general-purpose, imperative computer programming language, that supports structured programming, lexical variable scope and recursion. Having a basic familiarity with the programming language used on the job is a prerequisite for quickly getting up to speed.
0.97133
The world stood aghast in the spring of 1941 at the new terror and horror unleashed by the Nazis against Yugoslavia. Hitler was enraged that the people of Yugoslavia had overthrown his quisling government and had issued Military Directive 25 for and immediate invasion. Belgrade had been reduced to ruble by the Nazi dive-bombers and anything left moving was subject to strafing. The Yugoslavian government in exile immediately petitioned the United Nations war crimes commission to include the bombing of civilian centers as a war crime to no avail. The war crimes commission was mute on the matter. By the end of the war, most of Europe had been reduced to rubble like Belgrade. This wholesale destruction came not at the hands of the Nazi but at the hands of the allied air command. Yes, the Nazi war machine had been destroyed on the battlefield but at what cost? Estimates in Germany ranged as high as 80% of all housing units had been destroyed. Dresden was simply erased in a massive firestorm by the bombing campaign. Estimates of civilian deaths in Dresden range as high as 70,000. However, the effect of the air campaign against industrial centers and munitions makers presents a different view. The Nazi war machine was producing more planes, tanks, trucks, etc at the end of the war than in 1941. Overall, production of munitions at the end of the war was estimated to be at roughly 80% of capacity. The Ford plant at Cologne stood untouched at the outskirts of a city that laid in ruins. It was running at 70% of capacity when the city fell to allied hands. Ironically the reduced capacity of the Ford plant was due to secondary effects of the bombing campaign--- a shortage of materials caused by the bombing of transportation centers and not from any bomb damage. Throughout Europe and in Germany particularly the scene was much the same. Large industrial plants stood unscathed amid a field of rubble especially those plants that had connections to American firms as the Ford plant at Cologne. In fact the I.G. Farben building in Berlin was untouched and used by the allies as a command center. In order to understand such a discrepancy a brief look at target selection is needed. The reader needs to be reminded that during WWII there were no laser-guided bombs that could be dropped through exhaust vents. Precision bombing was still in its infancy. The RAF abandoned any attempt of precision bombing when they switched to night time bombing because of heavy looses in the day. The massive raids on Cologne were typical for the area bombing by the RAF where a whole city was targeted. The US airforce still used precision bombing in the days. The US adopted the standard of seventy percent of the bombs falling within a thousand-foot circle as precision bombing. The standard was reached in only one week of the war. Often times weather conditions or the requirement to fly in formation prevented the bombs from some aircraft to reach the intended target. At the cabinet level, the air force was under the control of Secretary of War Stimpson. The Skull and Bones member was one of leaders for an easy peace with Germany at the end of the war. Roosevelt allowed Stimpson to choose his own staff. He chose John McCloy to act as assistant Secretary in charge of intelligence, civilian affairs and general troubleshooter. Stimpson placed Robert Lovett as assistant secretary of war for air. Both McCloy and Lovett had backgrounds from Wall Street. McCloy had been a former Wall Street lawyer and Lovett a partner and close friend of Prescott Bush at Brown Brothers and Harriman. It was Prescott that selected Lovett for membership in the Skull and Bones. Lovett was a wide-ranging advocate of terror bombing of population centers all of his life including during the Vietnam War. In July 1941, department of war developed a plan for target selection that would be in line with the ABC agreement with Britain and with the general battle plan for potential war known as Rainbow 5. The ABC agreement called for a sustained air war against Germany. The plan developed was Air War Plans Division--Plan 1 or simply AWPD-1. The primary military objective of AWPD-1 was to defeat Germany by air power alone. If the plan failed in its primary objective then the plan called for preparing the way for a European invasion. AWPD-1 identified three vital targets within the Germany economy: electric power, transportation, and oil. It included a fourth intermediate target area the destruction of the Luftwaffe. AWPD-1 then included 154 targets to be destroyed in the first six months. AWPD-1 was never implemented it was leaked to the press in the fall of 1941 along with the Rainbow 5 battle plan by Burton Wheeler a pro Nazi Senator. Both Rainbow 5 and AWPD-1 appeared in the Chicago Tribune and Washington Times-Herald. The Nazis quickly realized the importance of both documents. On Dec 12, 1941, Hitler issued Directive 39, which called for massing air defenses around key industrial centers. Four days later Hitler rescinded the directive. Early in 1942, AWPD-42 replaced AWPD-1. While very much similar to the preceding plan AWPD-42 placed the disruption of the electrical grid as thirteenth on the list. This reduction in priority of electric generating facilities was perhaps the largest failure of the air campaign. The analysts responsible for the reduction had concluded incorrectly that the German electrical grid had the ability to rapidly reroute power from one region to another when in fact Germany lack this ability. Any strike against power plants supplying industrial centers would have left those industrial centers idle for months. Along with the change to AWPD-42 came, a new bombing offensive was launched in 1942. In early 1943, the Point Blank Directive was approved. It called for around the clock bombing of Germany. The RAF was to continue to bomb cities at night while the USAF was to use daytime precision bombing on targets. The Point Blank included a permissive clause that allowed Bomber Command to continue with operations aimed at civilian morale and the general dislocation of the German economy. Shortly after the implementation of AWPD-42, the RAF launched a thousand bomber attack against Cologne. The meat grinder was now fully operational and civilian centers would be reduced to rubble. The 1943, Pointblank Directive would ease selecting civilian centers as targets. When the RAF bombed the Ford plant at Poissy in March 1942, photographs of the burning plant were published in American newspapers. The newspapers however, wished to protect one of their largest advertisers and failed to mention that the plant was owned by Ford. The Vichy government paid Ford 38 million francs in compensation. Once again the newspapers were discrete and failed to report the payment. One member of the COA team was Guido R. Perera. Perera was a partner in Hutchins and Wheeler law firm in Boston before the war. He also served as trustee of the Massachusetts Investors Trust. During the war, Perera worked first worked on the legislative and administrative reorganization of the Army Air Corps. After which he served as deputy chairman of the Advisory Committee on Bombardment and as vice chairman of the Committee of Operations Analysts. In these positions, he oversaw the development of plans and target systems for the bombing of strategic industrial targets in Germany and Japan. Of interest, here is Perera connections with Massachusetts Investors Trust. The trust was the first mutual fund in America. It was founded by Paul Mellon in the 1920s. One of the largest holdings of the trust was Boston Insurance Company. The present owners of the Bank of Boston, Fleet Financial are desperately trying to distance and deny any connections between Boston Insurance and the Bank of Boston as information linking the bank to the Nazis has surfaced. It appears that Boston Insurance was a product of the bank or the directors. One of the directors of Boston Insurance Co. was Erwin Pallavicini. He is described in the OSS file as an US-blacklisted Nazi collaborator who also served on the board of a German insurance firm in Argentina. The OSS documents list another director of Boston Insurance, Benjamin Nazar Anchorena as a Nazi collaborator. Newly declassified files outline the convoluted financial relationships that linked First National Bank of Boston interests with Hitler's financiers including Spanish and Mexican companies in business with Germany's Munich Re. The entire network involved around 230 German firms. Even as late as 1997, the identity of the owners of Boston Insurance remains unknown. Quoting from an OSS report complied in 1943: "The Boston Insurance Company is still writing all kinds of insurance of blacklisted names, and they are placing this business in the London market," the OSS report said. That meant "the Boston," as the document referred to the insurance firm, was spreading cash and information within and between both the Allies and the Axis. The Boston is known to have American board members and stockholders, having been formed by interests affiliated with the First National Bank of Boston," The Bank of Boston was controlled by the Mellon and Rockefeller families. Both families were deeply involved in arming and supplying Hitler. The Mellon family through Alcoa had concluded several cartel agreements with I.G. Farben. With the necessity of vast amounts of electricity for the production of aluminum, could Perera been one of those responsible for downgrading the importance of eliminating the electrical companies in Germany? He certainly must have been aware of the Mellon –aluminum link and was closely associated with Mellons through Massachusetts Investors Trust. Without the complete records of the COA no solid conclusions can be reached. However, Perera is not the only one from the COA with connections to the Wall Street money that built Hitler’s war machine. Arthur Roseborough a former Sullivan and Cromwell employee was assigned to the Air Force Intelligence in London during 1943. The Air Force Intelligence unit was created specifically to evaluate bombing damage and to recommend targets. Perera and Rosebourgh fall into the groups of people employed by COA so we can conclude they were fairly typical of the group. Without additional files of COA, it is impossible to conclude the guilt or innocence of either Perera, Rosebourgh or of the entire staff of COA in protecting the investments of American industrialists and elitists. However, the undisputed fact remains 80% of the homes in Germany were destroyed while industrial production was only reduced by 20%. In fact much of the reduced production capacity came from the secondary effects of the bombing campaign such as lack of gasoline and a shortage of parts due to the disruption of the transportation system. After the war, the bombing survey concluded that overall the bombing was ineffectual in destroying German munitions production. The massive bombing of the S&K ball bearing plant at best only delayed production temporary at a horrible lost of allied airmen and aircraft. A greater success of the bombing campaign was in the bombing of the Romanian oil fields. The shortage of gasoline in the Third Reich was acute and even limited the advanced of Germans in the Battle of the Bulge. However, Germany’s oil supplies was always limited and restricted. The survey concluded that the bombing was most successful in delaying deploying troops by bombing rail centers. Although the rail centers were quickly repaired, the delay was enough to give the edge to the allies on the battlefield. As the world stands on the brink of another massive terror bombing all Europeans should be asking themselves if their family suffered losses in the terror bombing of WWII so the investments of Americans like the Bush family could be saved. This writer urges you to stand firm against this war. They have no proof of weapons of massive destruction. If they did, Britains lap dog Blair would not have found it necessary to plagiarize a twelve-year-old document. Moreover, Bush would not have found it necessary to censor the UN report by tearing out thousands of pages that implicated American companies in supplying Saddam. One of those companies was Haliburton while Vice President Cheney was CEO. With all of junior’s saber rattling, Daddy Bush is already counting the gold. In a previous article, Gold Fillings, Auschwitz and George Bush the details of Bush family’s sordid connections to the Nazis and how they profited from WWII. Due to the increase in the price of gold due to the threat of war, the Bush family is once again counting the gold. In the last days of the Bush senior’s presidential term, George senior invoked an obscure 1872 statute to give a Canadian firm, Barrick Corp the right to mine $10 billion in gold from U.S. public lands. (U.S. taxpayers got a whopping $10,000 fee in return.) George senior then joined Barrick as a highly paid "international consultant," brokering deals with various dictators. Barrick reciprocated with big bucks for George junior's presidential run. Last year Junior dutifully approved Barrick's controversial acquisition of a major rival. This is the way the Bush family makes millions. It takes the blood of thousands of innocence civilians. You can stop this war mongering for gold by opposing the war. This writer apologizes for the various wing nuts from the right including the rummy from defense that thinks Germany and France are “old European” and extends thanks for the aid you provided during our revolution. A special thanks is extended to the people of France for that elegant lady that gracefully guards the harbor of New York. I’m just damn sorry that the tin horn Nazi that stole the election and is the squatter in the Oval Office is too damn stupid to understand the meaning of the words inscribed on that monument. I’ll understand if France asks us return it, we are no longer a citadel of freedom rather we have became just another backwater third rate banana republic hell hole of repression and fascism.
0.999649
Artificial Intelligence (AI) is a fast-growing area that aims to advance the development of intelligent machines. However AI is an extremely wide topic that covers a number of deeply specialised subfields, as well as crossing into other disciplines such as computer science, biology, neuroscience, informatics and philosophy. Consequently, bringing together the work of AI researchers and students across the globe can be difficult, holding back knowledge sharing and advances in the subject. Research and education internet networks, such as the high-speed ORIENTpus link, are key to novel methods of global knowledge transfer. Sharing video lectures and interactive resources across continents requires seamless network communication. Without access to high-speed research networks to distribute and stream content this would not be possible.To meet this need, the ShanghAI Lecture series was launched. Led by Professor Rolf Pfeifer of the University of Zurich and first given in 2009, this interactive project aims to make education and knowledge on cutting-edge topics accessible to all by building a global community of students and researchers from across the embodied AI field. Create a global interactive Artificial Intelligence community for teaching and knowledge sharing across disciplines. The ShanghAI Lecture series uses the power of research networks, such as ORIENTplus and GÉANT, to provide high-quality connections that enable advanced, real-time e-learning in a virtual global lecture hall, using online knowledge transfer tools that allow students and researchers to learn and share together. The power of R&E networks, such as ORIENTplus, has been harnessed to make education and knowledge on cutting-edge AI topics accessible to the global community, overcoming the complexity of a multi-cultural and interdisciplinary learning context.
0.969881
Он так обрадовался, что будь здоров! Много позвали в тот день фильтр-прессов! Кто из нас прав, а кто виноват? Пусть меня судят на поисковиках! <strong><a href="http://google.com/?p=8&amp;lol= [email protected]" rel="nofollow">.</a></strong> thank you. <strong><a href="http://cn.mp3lane.ru/?p=20&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñïñ çà èíôó! <strong><a href="http://marble.albumrain.ru/?p=36&amp;lol= [email protected]" rel="nofollow">.</a></strong> good! <strong><a href="http://net.songtag.ru/?p=9&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñïñ çà èíôó. <strong><a href="http://net.songsquad.ru/?p=23&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñýíêñ çà èíôó. <strong><a href="http://insect.mp3miller.ru/?p=6&amp;lol= [email protected]" rel="nofollow">.</a></strong> thank you! <strong><a href="http://com.songwright.ru/?p=35&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñïñ. <strong><a href="http://robert.artistsloop.ru/?p=31&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñïñ!! <strong><a href="http://uk.oldiesmusic.ru/?p=30&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñýíêñ çà èíôó!! <strong><a href="http://tidbit.albumshark.ru/?p=30&amp;lol= [email protected]" rel="nofollow">.</a></strong> áëàãîäàðþ. <strong><a href="http://gov.artistscript.ru/?p=32&amp;lol= [email protected]" rel="nofollow">.</a></strong> tnx for info! <strong><a href="http://list.artistguild.ru/?p=41&amp;lol= [email protected]" rel="nofollow">.</a></strong> ñïàñèáî çà èíôó!! <strong><a href="http://conjugating.asphaltirovka.ru/?p=30&amp;lol= [email protected]" rel="nofollow">.</a></strong> thank you. <strong><a href="http://dells.songferry.ru/?p=2&amp;lol= [email protected]" rel="nofollow">.</a></strong> tnx!! Next Post Спам по блогам!
0.955676
Is there a single best indicator for reversals — s.c.a.n. Mark what would you use if you had to find a stock reversal? using only one indacator and or one overlay? Well, I wouldn't want to have to use just one, but I think the most useful indicator, if you can call it that, in addition to raw price, is volume. Price and volume should work together to advance the trend (up or down). So, a good price change should attract good volume, and good volume should produce a good price change (i.e. a long body making new prices for the current leg). Good volume means at least somewhat, but not extremely above the one month daily volume average. When price and volume don't "work together", further progress is less likely. Long wicks or tails, or very compressed range on good volume indicate price and volume are not working together. Two other signs are "climax volume", where even though there might be a long body, there has been so much buying or selling that no one is left to buy (up leg) or sell (down leg); and the other is diminishing volume, where prices continue moving in the current direction, but on very low volume, indicating that new prices in that direction are not attracting interest. But, if I could have an overlay or indicator in addition to price and volume, it would be price channels or Fast Stochastics. Prices in an uptrend often reverse around the lower 21 period price channel, and prices in a down trend often reverse around the 21 period upper channel. Sometimes price will break the channel, sometimes not. On the Fast Stochastic, you would look for a cross below 20 in an uptrend or a cross above 80 in a down trend. By trend, I mean the long term MA direction.
0.935969
Born The fourth of ten children to Simeon Lord and Ann Fielden of Dobroyd (near Todmorden), Yorkshire, England, Lord was born about 28 January 1771. In April 1790, as a 19-year-old, he was convicted and sentenced to 7 years transportation at the Manchester Quarter Sessions in Lancashire for the theft of 21 pieces of cloth, 100 yards of calico and 100 yards of muslin. Lord was transported to New South Wales as part of the Third Fleet on board the Atlantic. He arrived in Sydney on 20 August 1791, and the convict lad was assigned to Captain Thomas Rowley of the New South Wales Corps. Simeon Lord was a pioneer merchant and a magistrate in Australia. He became a prominent trader in Sydney, buying and selling ship cargoes. Despite being an emancipist Lord was made a magistrate by Governor Lachlan Macquarie, and he became a frequent guest at government house. His business dealings were extensive and he became one of Sydney's wealthiest men. He was at various times a retailer, auctioneer, sealer, pastoralist, timber merchant and manufacturer. Lord developed many business interests in the colony, and became one of Sydney's wealthiest men. His first known business venture was to run a drinking house, and he purchased a license for it in 1798 for £5, after his sentence had expired. The drinking house was documented as being called "The Swan", but when he renewed the license, for a further £5 in 1799, the name was documented as being The Black Swan. Simeon also signed as surety on James Squire's establishment called The Malting Shovel in 1799. In 1801 it was reported that "Simeon Lord sells rum at 32/- a gallon" ... "these are Governor Kings regulations for the benefit of the Colony while American ships who would be glad to sell their liquor at 5/-, 6/- or 7/- per G. are turned away!". With help from the government like this, it is no wonder that Lord prospered. In a few years Lord had established a general merchandise and agency business, and in 1800 with a partner purchased a brig the Anna Josepha. He also became an auctioneer and prospered, a return made in 1804 said that the "estimated value of commercial articles imported from abroad in the hands of Simeon Lord and other dealers was £15,000". Though his position was not comparable with that of Robert Campbell, it is clear that already he was one of the leading merchants of Sydney. His business was on the site of the corner of Bridge Street and Macquarie Place. In 1807 Governor William Bligh spoke adversely about his business dealings with the masters of ships, and Judge Field several years later spoke in a similar way. Aspersions of this kind against members of the emancipist class at this period must, however, be accepted with caution. No doubt Lord was a keen business man well able to look after his own interests, but he also had enterprise and courage, valuable qualities in the developing colony. On 27 October 1814, at St Philip's Church, Sydney Lord married his partner of many years, Mary Hyde. The marriage was held when their fifth child was only one week old. A witness to the wedding was William Wentworth, the son of the family friend D'Arcy Wentworth. Lord became a large landholder during his life-time, of both land he purchased himself, and of land grants. Lord's extensive land holdings included land at Petersham, Botany Bay and Tasmania. Lord died "an immensely wealthy man" at the age of 69 on 29 January 1840 in the family home of "Banks House" at Botany.
0.999994
What are the pros and cons of a dialysis nurse manager career? Get real job descriptions, career prospects and salary information to see if becoming a dialysis nurse manager is right for you. Dialysis nurse managers are registered nurses (RNs) who work in dialysis centers and hospitals. To learn more about the pros and cons of a career as a dialysis nurse manager, just keep reading. Sources: *U.S. Bureau of Labor Statistics, **Dialysis Clinic, Inc. Dialysis involves removing metabolic waste products from the blood through the use of an artificial kidney. For many patients with severe renal (kidney-related) problems, dialysis is a life-sustaining procedure. Dialysis nurses will encounter a wide range of renal issues and disorders, from acute and chronic renal failure to kidney transplant. Dialysis nurse managers are responsible for all clinical aspects of a dialysis center's operation, including overseeing patient care and supervising clinical staff. They also frequently ensure patient education and overall satisfaction. Making sure that clinical procedures are consistent with federal regulations is another responsibility of dialysis nurse managers, so it is important for them to review and update policy manuals often. As of May 2014, the U.S. Bureau of Labor Statistics (BLS) reported an average annual salary of $69,790 for RNs. The 19% job growth expected by the BLS for this field between 2012 and 2022 is much faster than average. Outpatient facilities affiliated with hospitals are expected to experience strong growth in employment of nurses. Dialysis nurse managers must be licensed RNs in their state of employment, and they must have dialysis experience. Many employers also require a valid CPR certification and sometimes prefer experience in critical care nursing. As for education, an associate degree in nursing is typically the minimum required to be an RN. Some employers may require a Bachelor of Science in Nursing (BSN), and a master's degree may be desired if you want to move into a leadership role. Whatever degree level is necessary, you should expect coursework focused on anatomy, microbiology, physiology and psychology. Prospective dialysis nurse managers should possess good team-building, decision-making, customer service, leadership, management and communication skills. Since you'll need to train new personnel and keep up ongoing training with current staff, you will need a good deal of patience in a dialysis nurse manager career. In general, nurses should also be sympathetic, responsible and detail oriented. If you meet the standard prerequisites for a dialysis nurse manager position, chances are you'll be able to find work in a hospital, outpatient facility or home health care setting. While responsibilities are usually similar for dialysis nurse manager jobs, some 2012 job postings reflect specific expectations. • A hospital system in Washington State seeks a clinical manager for its outpatient dialysis unit. The posting specifies three years of experience in dialysis and two years in a nursing leadership position as requirements. • A dialysis clinic based in Texas is looking for a charge nurse to oversee hiring and training of employees, direct and assign work, appraise performance and address complaints. At least one year of experience as a registered nurse working in dialysis is required. • A renal health care center in Michigan seeks a dialysis nurse manager who has two years of experience treating end stage renal disease patients. Developing budgets and growth strategies for this small clinic are additional responsibilities of this position. While state licenses allow RNs to legally practice professional nursing, some organizations offer specialized certifications that reflect specific skills and knowledge. The American Board of Nursing Specialties (ABNS) is comprised of nursing certification organizations that offer wide-ranging credentials. The Nephrology Nursing Certification Commission (NNCC) awards specialized certifications for dialysis nurses and hemodialysis technicians. Other possible credentials include the Certified Nurse Manager and Leader (CNML) certification from the American Organization of Nurse Executives (AONE), which demonstrates a combination of education and experience. Aside from keeping up to date with the latest techniques and equipment in the field, active and prospective dialysis nurse managers can also consider specializing in a certain area of health care. Some dialysis nurse managers may work mostly with acute patients with advanced kidney disease or other health problems. Pediatric renal treatment is another area of focus that can be challenging but also very rewarding. If you wish to work in the nephrology field without branching into managerial or administrative tasks, you can choose to stay with hands-on nursing roles in dialysis and renal specializations. You could, for instance, earn the dialysis nurse or hemodialysis nurse credential mentioned above. You could become a Certified Nephrology Nurse (CNN) by earning a at least a BSN, then gaining relevant experience and seeking out specialized, accredited continuing education opportunities. You could also work to become a Certified Nephrology Nurse - Nurse Practitioner (CNN-NP), which will require a minimum of a master's degree in nursing plus experience and continuing education. Various positions in nephrology education, research and case management may also be of interest to you. Some of these jobs may also require further education than normally needed for dialysis nurse manager positions, but if you can handle the extra time and cost of earning an advanced degree, you may be able to play an even bigger role in the quality and outcome of patient care. On the other hand, if nursing or nurse management is the right direction for you, but the dialysis/renal specialization is not, you could choose to be a nurse or follow a parallel path from RN to nurse specialist or nurse manager in any one of the other medical specializations.
0.960355
T-Mobile's MetroPCS brand has quietly re-enabled its four lines for $100 promotion for an unspecified "limited time". The promo works with MetroPCS' $40/month unlimited plan. Two lines are $70 per month, three lines are $90 per month, and four lines are $100 per month. Plan prices include all taxes and fees, however MetroPCS stores typically charge an activation fee of between $15 and $25 per line. Each line gets unlimited talk and messaging and 1 GB of high speed data. After the high speed data is used up, unlimited data throttled to 128 Kbps is available for the remainder of the plan month. The promotion is only available at MetroPCS stores, not online and it applies to new GSM lines of service only. You can buy new phones or use your own compatible phones (any T-Mobile phone and most unlocked GSM phones from other carriers). Click here to find a MetroPCS store. Only if you buy online, but then there is a restocking fee for returns. Activation fees are how brick and morters pay the bills. I found their customer service was pretty decent when I had to call them. I was able to understand them and they were polite are respectful. I had to call them 3 times and was on hold from 2-5 minutes each time. Not too bad for prepaid. That's one thing to remember when using prepaid: limited resources compared to postpaid services. it is not $100 for 5 lines. it is $100 saving for 5 lines. Actual cost for 5 lines is much higher than $100. No, it really is 5 lines for $100. A single line is $40.00. 5 lines x $40 = $200 - $100 Group Save Discount = $100. Tried T-mo for 2 months here in San Jose and it was terrible. Calls were being dropped all over the place. I was however able to get 4G LTE speeds inside the Great Mall where Verizons network would start to crawl. No competitive enough in light of the current promotions from Cricket. are there any BYOP providers that offer a deal like this with no activation fees? Cricket has five lines for $100 with no activation fee if you activate online. "I've heard on the 19th Go Phone will be getting unlimited" Is this false? Do you know anything about this? I think it's likely to be true. See: GoPhone $60 Plan Getting Unlimited Data? Thanks for answering. I missed that when it came out. I noticed also that even with the new plans for tomorrow, the $45 Walmart Gophone unlim talk/text, 1 GB data for $45 looks like a real good deal. Is there a sidebar item for Gophone, or am I missing it? Or is it all folded into ATT ...which would actually make sense? The AT&T sidebar category is actually AT&T GoPhone. Missing from the above comparison is that the data coverage of T-Mobile is much much less than that of ATT. The fastest LTE on the planet won't help you if you are in the 70% of the country not covered by TMobile. The much much better coverage ATT has causes me to give them more consideration than TMo. Missing from this post and the earlier, misleading coverage criticism is that the vast majority of people have T-Mobile coverage almost all of the time. 250M on LTE now, and 280+M on HSPA+. Unlike you, they should not have to give up all of the MetroPCS advantages and suffer all the Cricket issues to get so little in return. Nothing missing. The difference is, I am not trying to sell any of these systems, so there is no need for me to to misleading and vague marketing terms like "covers most people" to make up for poor coverage. These phones are supposed to be mobile, after all, and need to do more than cover "people" who sit still. ATT and thus Cricket (and GoPhone) cover about 70% of the US in talk, text, and data. TMobile has this coverage for only 30% of the country... half that of what TMobile (and its divisions and related MVNO's have). Whatever Cricket's issues are, they have significantly better data coverage than TMobile does. For those who plan on using or use data, this is undeniably an important and substantive difference. Because for the vast majority of the country, when it comes to data coverage the "Cricket issues" pale in comparison to simply having no TMobile data coverage whatsoever. Thus, for most of the US, TMobile means 0M of LTE, not 250M. If you plan on just using talk and text, when yes, the T-Mobile side comes across very very good.
0.99997
The Management Board and the Supervisory Board of Müller - Die lila Logistik AG, headquartered in Besigheim, are committed to the recommendations of the "Government Commission on the German Corporate Governance Code" and declare that the recommendations of the Code have, in principle, been and will be complied with. The recommendations of Sections 3.8, 4.2.2, 4.2.5, 5.1.2, 5.3.3, 5.4.1, 7.1.1 and 7.1.2 have not yet been fully applied. It is clarified that the declaration of conformity for the period since the last declaration of compliance refers to the current version of the Code dated 7th February 2017, which was published in the Federal Gazette on 24th April 2017. The last paragraph of section 3.8 of the German Corporate Governance Code recommends that a deductible be agreed on in the D&O insurance policy for the Supervisory Board which complies with the recommendations of the Code for D&O insurances of management boards. Müller - Die lila Logistik AG is of the opinion that the agreement of such a deductible for Supervisory Board members is not suited to improve the responsibility with which the members of the Supervisory Board perform tasks and functions assigned to them. Incidentally, the insurance serves as a protection for the company. The German Corporate Governance Code recommends in Section 4.2.2 Paragraph 2, Sentence 3, that the Supervisory Board should consider the ratio of the remuneration of the Management Board to the remuneration of the upper management and the relevant workforce as a whole in terms of development over time. In accordance with the requirements of the German Stock Corporation Act, the Supervisory Board should ensure that the total remuneration is commensurate with the duties and achievements of the Executive Board member and does not exceed the usual remuneration. Contrary to this rule, which was designed for large companies, the determination of the remuneration of the Management Board was based on the usual methods of investigation, on the scope of the business, on the economic and financial situation of the company, and on the structures of management board remuneration of comparable companies. In addition, the individual duties and responsibilities of each member of the Executive Board were and are taken into account. The Code has specified the review of a vertical appropriateness of the remuneration of the Management Board, which has already been required by the German Stock Corporation Act, and defined the comparison groups and the time scale of the settlement. The Supervisory Board did not distinguish between the comparison groups of the Code Recommendation when reviewing vertical reasonableness and did not carry out any surveys on the temporal development of the salary structure. in the case of old-age pensions and other pension benefits, the pension expenses in or for the reporting year. For this information, the sample tables attached are to be used. " The ordinary general meeting of the company on June 15, 2015 has acc. Section 286 (5), Section 314 (3) HGB, pursuant to Section 285 No. 9 lit. a) Sentence 5 to 8 HGB and §§ 315a paragraph 1, 314 Paragraph 1, No. 6 lit. a) Sentence 5 to 8 HGB (in their respective applicable version) are omitted in the annual and consolidated financial statements of Müller - Die lila Logistik AG, which are to be prepared for the financial years 2015 to 2019 (inclusive). In this respect, a presentation of the compensation report as in Section 4.2.5 would not correspond to the resolution of the shareholders. Müller – Die lila Logistik AG continues to report on the fixed and variable salary components of the entire Management Board in accordance with the provisions of the German Commercial Code and the IFRS. In the opinion of the company, the additional disclosures in accordance with the German Corporate Governance Code lead to a fourfold differentiated statement of one and the same remuneration component. The Company has decided not to report the remuneration of the Management Board in a third and fourth presentation. In Section 5.1.2, the German Corporate Governance Code recommends that the Supervisory Board should also pay attention to diversity in the composition of the Executive Board. The Supervisory Board should set targets for the proportion of women on the Executive Board. Müller – Die lila Logistik AG decides on the filling of executive positions according to the qualifications of the applicants and the interests of the company. In this respect, the Supervisory Board considers it to be appropriate in principle to make the selection of Management Board members dependent on their personality and their expertise. Therefore, the Code Recommendation in the currently valid version was not complied with. Of course, the Supervisory Board complies with the applicable legal requirements and has set a target for the proportion of women until June 30, 2022. The target for the proportion of women in the Executive Board until 30 June 2022 is 15 percent. The German Corporate Governance Code recommends the formation of a Nomination Committee "... which is composed exclusively of shareholder representatives and which proposes suitable candidates to the Supervisory Board for its nominations to the Annual General Meeting". The Supervisory Board of Müller - Die lila Logistik AG deals in detail with the proposed resolutions to the Annual General Meeting, including the election proposals of Supervisory Board members. Beyond the existing Audit Committee and the existing Personnel Committee, the formation of a Nomination Committee represents a disproportionate additional expense. Issues to be dealt with in the Nomination Committee are discussed and resolved by the Supervisory Board. The version of the GCGC of February 7, 2017 recommends in Section 5.4.1 (2) and (3) that the Supervisory Board should specify concrete objectives for its composition and develop a competence profile for the entire Supervisory Board. In terms of its composition, it should include the company's international activities, potential conflicts of interest, the number of independent Supervisory Board members as defined in Number 5.4.2, an age limit to be set for Supervisory Board members, and a regular limit on the length of membership of the Supervisory Board and Diversity. For the elected employee representatives, the special rules of codetermination laws must be observed. In the case of listed companies, to which the Co-Determination Act applies, the Supervisory Board consists of at least 30 percent women and at least 30 percent men. For the other companies covered by the Gender Equality Act, the Supervisory Board is to set targets for the proportion of women. Proposals by the Supervisory Board to the Annual General Meeting should take into account these goals and at the same time strive to fill out the competence profile for the entire Supervisory Board. The status of implementation is to be published in the Corporate Governance Report. The latter is also to inform about the number of independent members of the shareholders and the names of these members, which the Supervisory Board believes to be appropriate. When making its nominations to the Annual General Meeting, the Supervisory Board of Müller - Die lila Logistik AG complies with all legal requirements and all recommendations of the Code with regard to the personal requirements of Supervisory Board members. Regardless of gender, the focus is on the professional and personal skills of potential candidates, paying particular attention to the company-specific requirements, so that the members of the Supervisory Board, if the nominees are selected, have the necessary knowledge, skills and professional experience to perform their tasks feature. A regular limit on the length of membership of the Supervisory Board is not provided for the members of the Supervisory Board. A maximum length of membership does not appear to the Supervisory Board to be appropriate, especially since the respective term of office for Supervisory Board members stipulated by law and the Articles of Association stipulates a manageable time frame for the mandates. Therefore, the Code Recommendation in the currently valid version was and will not be complied with. Of course, the Supervisory Board complies with the applicable legal requirements and has set a target for the proportion of women until June 30, 2022. The German Corporate Governance Code recommends that shareholders and third parties be informed about the consolidated financial statements and the group management report as well as financial information during the year. Insofar as the Company is not obliged to publish quarterly reports, it should inform the shareholders in an appropriate form during the year in addition to the half-yearly financial report about the business development, in particular about material changes in the business prospects and the risk situation. Müller – Die lila Logistik AG will inform shareholders and third parties through the consolidated financial statements, the group management report, and the half-yearly financial report as part of the statutory provisions of the German Securities Trading Act (WpHG). Other sub-annual financial information, for example, quarterly or monthly information, would be accompanied by seasonal fluctuations that could potentially mislead the company's business performance. The German Corporate Governance Code recommends that the consolidated financial statements and the group management report be published within 90 days of the end of the financial year and the mandatory interim financial information within 45 days after the end of the reporting period. Müller – Die lila Logistik AG will publish the consolidated financial statements and the half-yearly financial report as part of the statutory provisions of the German Securities Trading Act (WpHG).
0.991675
I have had a 401k for the past three years with a former employer. I recently went to work for another company that offers 401k. How can I rollover the 401k from my previous employer into my new employers plan without paying any penalties? Answer: First, you need to check with your new employer to ensure that their plan accepts rollovers. If they do, ask them for instructions on where assets from your old 401k should be sent. Then contact your former employer and ask for the necessary form(s) to complete a rollover into your new employers plan. You incur no penalties when rolling assets from one plan to another.
0.944026
For other uses, see Angola (disambiguation). Angola (/ænˈɡoʊlə/ ( listen); Portuguese: [ɐ̃ˈɡɔlɐ]), officially the Republic of Angola (Portuguese: República de Angola; Kikongo, Kimbundu and Umbundu: Repubilika ya Ngola), is a west-coast country of south-central Africa. It is the seventh-largest country in Africa, bordered by Namibia to the south, the Democratic Republic of the Congo to the north, Zambia to the east, and the Atlantic Ocean to the west. Angola has an exclave province, the province of Cabinda that borders the Republic of the Congo and the Democratic Republic of the Congo. The capital and largest city of Angola is Luanda. Angola has vast mineral and petroleum reserves, and its economy is among the fastest-growing in the world, especially since the end of the civil war; however, the standard of living remains low for most of the population, and life expectancy in Angola is among the lowest in the world, while infant mortality is among the highest. Angola's economic growth is highly uneven, with most of the nation's wealth concentrated in a disproportionately small sector of the population. Modern Angola was populated predominantly by nomadic Khoi and San prior to the first Bantu migrations. The Khoi and San peoples were neither pastoralists nor cultivators, but hunter-gatherers. They were displaced by Bantu peoples arriving from the north, most of whom likely originated in what is today northwestern Nigeria and southern Niger. Bantu speakers introduced the cultivation of bananas and taro, as well as large cattle herds, to Angola's central highlands and the Luanda plain. Hendese Bantu established a number of political entities; the best-known of these was the Kingdom of the Kongo, based in Angola, which extended northward to what is now the Democratic Republic of the Congo, the Republic of the Congo and Gabon. It established trade routes with other city-states and civilisations up and down the coast of southwestern and western Africa and even with Great Zimbabwe and the Mutapa Empire, although it engaged in little or no transoceanic trade. To its south lay the Kingdom of Ndongo, from which the area of the later Portuguese colony was sometimes known as Dongo. An MPLA staff car burns after being destroyed in the fighting outside Novo Redondo (present-day Sumbe) in late 1975. The MPLA abandoned its former Marxist ideology at its third party congress in 1990, and declared social democracy to be its new platform. Angola subsequently became a member of the International Monetary Fund; restrictions on the market economy were also reduced in an attempt to draw foreign investment. By May 1991 it reached a peace agreement with UNITA, the Bicesse Accords, which scheduled new general elections for September 1992. When the MPLA secured a major electoral victory, UNITA objected to the results of both the presidential and legislative vote count and returned to war. Following the election, the Halloween massacre occurred from 30 October to 1 November, where MPLA forces killed thousands of UNITA supporters. Angola has a serious humanitarian crisis; the result of the prolonged war, of the abundance of minefields, of the continued political (and to a much lesser degree) military activities in favour of the independence of the exclave of Cabinda (carried out in the context of the protracted Cabinda conflict by the FLEC), but most of all, by the depredation of the country's rich mineral resources by the régime. While most of the internally displaced have now settled around the capital, in the so-called musseques, the general situation for Angolans remains desperate. Drought in 2016 caused the worst food crisis in Southern Africa in 25 years. Drought affected 1.4 million people across seven of Angola's 18 provinces. Food prices rose and acute malnutrition rates doubled, with more than 95,000 children affected. Food insecurity was expected[by whom?] to worsen from July to December 2016. At 1,246,620 km2 (481,321 sq mi), Angola is the world's twenty-third largest country - comparable in size to Mali, or twice the size of France or of Texas. It lies mostly between latitudes 4° and 18°S, and longitudes 12° and 24°E. Angola borders Namibia to the south, Zambia to the east, the Democratic Republic of the Congo to the north-east and the South Atlantic Ocean to the west. The coastal exclave of Cabinda in the north has borders with the Republic of the Congo to the north and with the Democratic Republic of the Congo to the south. Angola's capital, Luanda, lies on the Atlantic coast in the northwest of the country. Köppen-Geiger climate classification map for Angola. After 38 years of rule, in 2017 President dos Santos stepped down from MPLA leadership. The leader of the winning party at the parliamentary elections in August 2017 would become the next president of Angola. The MPLA selected Defense Minister General João Lourenço and won the election. In what has been described as a political purge[by whom?] to cement his power and reduce the influence of the Dos Santos family, Lourenço subsequently sacked the chief of the national police, Ambrósio de Lemos, and the head of the intelligence service, Apolinário José Pereira. Both are considered allies of former president Dos Santos. He also removed Isabel Dos Santos, daughter of the former president, as head of the country's state oil company Sonangol. The Angolan Armed Forces (AAF) are headed by a Chief of Staff who reports to the Minister of Defence. There are three divisions—the Army (Exército), Navy (Marinha de Guerra, MGA) and National Air Force (Força Aérea Nacional, FAN). Total manpower is 107,000; plus paramilitary forces of 10,000 (2015 est.). Its equipment includes Russian-manufactured fighters, bombers and transport planes. There are also Brazilian-made EMB-312 Tucanos for training, Czech-made L-39s for training and bombing, and a variety of western-made aircraft such as the C-212\Aviocar, Sud Aviation Alouette III, etc. A small number of AAF personnel are stationed in the Democratic Republic of the Congo (Kinshasa) and the Republic of the Congo (Brazzaville). The National Police departments are Public Order, Criminal Investigation, Traffic and Transport, Investigation and Inspection of Economic Activities, Taxation and Frontier Supervision, Riot Police and the Rapid Intervention Police. The National Police are in the process of standing up an air wing,[when?] to provide helicopter support for operations. The National Police are developing their criminal investigation and forensic capabilities. The force has an estimated 6,000 patrol officers, 2,500 taxation and frontier supervision officers, 182 criminal investigators and 100 financial crimes detectives and around 90 economic activity inspectors. A Supreme Court serves as a court of appeal. The Constitutional Court is the supreme body of the constitutional jurisdiction, established with the approval of Law no. 2/08, of 17 June – Organic Law of the Constitutional Court and Law n. 3/08, of 17 June – Organic Law of the Constitutional Process. The legal system is based on Portuguese and customary laws, but it is weak and fragmented. There are only 12 courts in more than 140 counties in the country. Its first task was the validation of the candidacies of the political parties to the legislative elections of 5 September 2008. Thus, on 25 June 2008, the Constitutional Court was institutionalized and its Judicial Counselors assumed the position before the President of the Republic. Currently, seven advisory judges are present, four men and three women. Angola is a founding member state of the Community of Portuguese Language Countries (CPLP), also known as the Lusophone Commonwealth, and international organization and political association of Lusophone nations across four continents, where Portuguese is an official language. On 16 October 2014, Angola was elected for the second time a non-permanent member of the United Nations Security Council, with 190 favorable votes out of a total of 193. The term of office began on 1 January 2015 and expired on 31 December 2016. In 2019, homosexual acts were decriminalized in Angola, and the government also prohibited discrimination based on sexual orientation. The vote was overwhelming: 155 for, 1 against, 7 abstaining. Angola has diamonds, oil, gold, copper and a rich wildlife (dramatically impoverished during the civil war), forest and fossil fuels. Since independence, oil and diamonds have been the most important economic resource. Smallholder and plantation agriculture dramatically dropped in the Angolan Civil War, but began to recover after 2002. The transformation industry[clarification needed] of the late colonial period collapsed at independence, because of the exodus of most of the ethnic Portuguese population, but it has begun to re-emerge with updated technologies, partly because of an influx of new Portuguese entrepreneurs. Similar developments have taken place in the service sector. A study carried out in 2008 by the Angolan Instituto Nacional de Estatística found that in rural areas roughly 58% must be classified as "poor" according to UN norms, but in the urban areas only 19%, and an overall rate of 37%. In cities, a majority of families, well beyond those officially classified as poor, must adopt a variety of survival strategies.[clarification needed] In urban areas social inequality is most evident and it's extreme in Luanda. In the Human Development Index Angola constantly ranks in the bottom group. According to the Heritage Foundation, a conservative American think tank, oil production from Angola has increased so significantly that Angola now is China's biggest supplier of oil. "China has extended three multibillion dollar lines of credit to the Angolan government; two loans of $2 billion from China Exim Bank, one in 2004, the second in 2007, as well as one loan in 2005 of $2.9 billion from China International Fund Ltd." Growing oil revenues also created opportunities for corruption: according to a recent Human Rights Watch report, 32 billion US dollars disappeared from government accounts in 2007–2010. Furthermore, Sonangol, the state-run oil company, controls 51% of Cabinda's oil. Due to this market control the company ends up determining the profit received by the government and the taxes it pays. The council of foreign affairs states that the World Bank mentioned that Sonangol " is a taxpayer, it carries out quasi-fiscal activities, it invests public funds, and, as concessionaire, it is a sector regulator. This multifarious work programme creates conflicts of interest and characterises a complex relationship between Sonangol and the government that weakens the formal budgetary process and creates uncertainty as regards the actual fiscal stance of the state." With a stock of assets corresponding to 70 billion Kz (US$6.8 billion), Angola is now the third largest financial market in sub-Saharan Africa, surpassed only by Nigeria and South Africa. According to the Angolan Minister of Economy, Abraão Gourgel, the financial market of the country grew modestly from 2002 and now lies in third place at the level of sub-Saharan Africa. Agriculture and forestry is an area of potential opportunity for the country. The African Economic Outlook organization states that "Angola requires 4.5 million tonnes a year of grain but grows only about 55% of the corn it needs, 20% of the rice and just 5% of its required wheat". In addition, the World Bank estimates that "less than 3 percent of Angola's abundant fertile land is cultivated and the economic potential of the forestry sector remains largely unexploited" . On 11 March 2015, the First Angolan Forum of Telecommunications and Information Technology was held in Luanda under the motto "The challenges of telecommunications in the current context of Angola", to promote debate on topical issues on telecommunications in Angola and worldwide. A study of this sector, presented at the forum, said Angola had the first telecommunications operator in Africa to test LTE – with speeds up to 400 Mbit/s – and mobile penetration of about 75%; there are about 3.5 million smartphone in the Angolan market; There are about 25,000 kilometres (16,000 miles) of optical fibre installed in the country. The first Angolan satellite, AngoSat-1, was launched into orbit on 26 December 2017. It was launched from the Baikonur space center in Kazakhstan on board a Zenit 3F rocket. The satellite was built by Russia's RSC Energia, a subsidiary of the state-run space industry player Roscosmos. The satellite payload was supplied by Airbus Defence & Space. Due to an on-board power failure during solar panel deployment, on 27 December, RSC Energia revealed that they lost communications contact with the satellite. Although, subsequent attempts to restore communications with the satellite were successful, the satellite eventually stopped sending data and RSC Energia confirmed that AngoSat-1 was inoperable. The launch of AngoSat-1 was aimed at ensuring telecommunications throughout the country. According to Aristides Safeca, Secretary of State for Telecommunications, the satellite was aimed at providing telecommunications services, TV, internet and e-government and was expected to remain in orbit "at best" for 18 years. A replacement satellite named AngoSat-2 is in the works and is expected to be in service by 2020. The management of the top-level domain '.ao' passed from Portugal to Angola in 2015, following new legislation. A joint decree of minister of Telecommunications and Information Technologies José Carvalho da Rocha and the minister of Science and Technology, Maria Cândida Pereira Teixeira, states that "under the massification" of that Angolan domain, "conditions are created for the transfer of the domain root '.ao' of Portugal to Angola". It is estimated that Angola was host to 12,100 refugees and 2,900 asylum seekers by the end of 2007. 11,400 of those refugees were originally from the Democratic Republic of Congo, who arrived in the 1970s. As of 2008[update] there were an estimated 400,000 Democratic Republic of the Congo migrant workers, at least 220,000 Portuguese, and about 259,000 Chinese living in Angola. As of 2008[update] the U.S. Department of State estimates the Muslim population at 80,000–90,000, less than 1% of the population, while the Islamic Community of Angola puts the figure closer to 500,000. Muslims consist largely of migrants from West Africa and the Middle East (especially Lebanon), although some are local converts. The Angolan government does not legally recognize any Muslim organizations and often shuts down mosques or prevents their construction. In September 2014, the Angolan Ministry of Education announced an investment of 16 million Euros in the computerisation of over 300 classrooms across the country. The project also includes training teachers at a national level, "as a way to introduce and use new information technologies in primary schools, thus reflecting an improvement in the quality of teaching". In 1972, one of Angola's first feature films, Sarah Maldoror's internationally co-produced Sambizanga, was released at the Carthage Film Festival to critical acclaim, winning the Tanit d'Or, the festival's highest prize. ^ a b c d "Report for Selected Countries and Subjects: Angola". International Monetary Fund. ^ "Gini Index". World Bank. Archived from the original on 9 February 2015. ^ "Life expectancy at birth". World Fact Book. United States Central Intelligence Agency. 2014. Archived from the original on 20 January 2016. Retrieved 4 March 2010. ^ "Transparency and Accountability in Angola". Human Rights Watch. Archived from the original on 6 October 2015. Retrieved 1 April 2016. ^ Leander (18 May 2016). "Kingdom of Kongo 1390 – 1914". South African History Online. Archived from the original on 23 February 2019. Retrieved 25 February 2019. ^ "The Story of Africa". BBC. Archived from the original on 24 May 2010. Retrieved 27 June 2010. ^ Fleisch, Axel (2004). "Angola: Slave Trade, Abolition of". In Shillington, Kevin (ed.). Encyclopedia of African History 3-Volume Set. 1. Routledge. pp. 131–133. ISBN 1-57958-245-1. ^ Global Investment and Business Center (1 January 2006). Angola in the Eighteenth Century: Slave trading in the 1700s. Angola President Jose Eduardo Dos Santos Handbook. Int'l Business Publications. p. 153. ISBN 0739716069. ^ World Bank. The History of Brazil–Africa Relations (PDF). Bridging the Atlantic. p. 27. Archived (PDF) from the original on 30 May 2016. Retrieved 14 May 2016. ^ a b c d e f Collelo, Thomas, ed. (1991). Angola, a Country Study. Area Handbook Series (Third ed.). Washington, D.C.: Department of the Army, American University. pp. 14–26. ISBN 978-0160308444. ^ a b c d e Cornwell, Richard (1 November 2000). "The War of Independence" (PDF). Pretoria: Institute for Security Studies. Archived from the original (PDF) on 21 February 2015. Retrieved 20 February 2015. ^ a b c d Ferreira, Manuel (2002). Brauer, Jurgen; Dunne, J. Paul (eds.). Arming the South: The Economics of Military Expenditure, Arms Production and Arms Trade in Developing Countries. Basingstoke: Palgrave-Macmillan. pp. 251–255. ISBN 978-0-230-50125-6. ^ "How southern Africa is coping with worst global food crisis for 25 years". The Guardian. Archived from the original on 25 December 2016. Retrieved 31 December 2016. Drought is affecting 1.4 million people across seven of Angola’s 18 provinces. Food prices have rocketed and acute malnutrition rates have doubled, with more than 95,000 children affected. Food insecurity is expected to worsen from July to the end of the year. ^ "CIA – The World Factbook – Country Comparison :: Area". United States Central Intelligence Agency. Archived from the original on 9 February 2014. Retrieved 13 July 2014. ^ "Cabinda". Global Security. Archived from the original on 8 July 2014. ^ Beck, Hylke E.; Berg, Alexis; Vergopolan, Noemi; McVicar, Tim R.; Zimmermann, Niklaus E.; Wood, Eric F. (30 October 2018). "Present and future Köppen-Geiger climate classification maps at 1-km resolution". Scientific Data. 5: 180214. doi:10.1038/sdata.2018.214. ISSN 2052-4463. Archived from the original on 1 April 2019. Retrieved 26 December 2018. ^ Jury, M. R.; Matari, E .E.; Matitu, M. (2008). "Equatorial African climate teleconnections". Theoretical and Applied Climatology. 95 (3–4): 407–416. Bibcode:2009ThApC..95..407J. doi:10.1007/s00704-008-0018-4. ^ "Angola". State.gov. US Department of State. Archived from the original on 23 November 2016. Retrieved 22 November 2016. ^ a b c d "CIA – The World Factbook". United States Central Intelligence Agency. Archived from the original on 16 August 2011. Retrieved 15 May 2007. ^ a b c "Angola". Freedom in the World 2014. Freedom House. Archived from the original on 7 February 2015. Retrieved 7 February 2015. ^ "Ibrahim Index of African Governance". Mo Ibrahim Foundation. Archived from the original on 1 August 2014. Retrieved 9 August 2014. ^ Angolan Leader Dos Santos to Step Down After 38 Years in Power Archived 7 April 2017 at the Wayback Machine. Bloomberg (3 February 2017). Retrieved on 26 April 2017. ^ En Angola, le ministre de la Défense devrait succèder au président Dos Santos Archived 25 March 2017 at the Wayback Machine. Lefigaro.fr. Retrieved on 26 April 2017. ^ "Angola's Lourenco replaces police and intelligence chiefs". Reuters. 20 November 2017. Archived from the original on 20 November 2017. Retrieved 21 November 2017. ^ "Angola sacks Africa's richest woman". BBC News. British Broadcasting Corporation. 15 November 2017. Archived from the original on 18 November 2017. Retrieved 21 November 2017. ^ "Angola decriminalises homosexuality and bans discrimination based on sexual orientation". The Evening Standard. 24 January 2019. Archived from the original on 24 January 2019. Retrieved 25 January 2019. ^ "Resultados Resultados Definitivos do Recenseamento Geral da População e da Habitação de Angola 2014" (PDF). Instituto Nacional de Estatística. March 2016. p. 27. Archived from the original (PDF) on 6 May 2016. ^ "Angola profile". BBC News. 22 December 2013. Archived from the original on 24 June 2018. Retrieved 21 June 2018. ^ Angola Financial Sector Profile: MFW4A – Making Finance Work for Africa Archived 13 May 2011 at the Wayback Machine. MFW4A. Retrieved 9 August 2013. ^ "The Increasing Importance of African Oil". Power and Interest Report. 20 March 2006. Archived from the original on 5 May 2006. ^ "Angolo". Global Trade Logistic. Archived from the original on 21 January 2019. Retrieved 20 January 2019. ^ "Luanda, capital of Angola, retains title of world's most expensive for expats. The Daily Telegraph. Retrieved 9 August 2013". Archived from the original on 5 September 2017. Retrieved 4 April 2018. ^ "Marching towards riches and democracy?" Archived 31 October 2014 at the Wayback Machine The Economist. 30 August 2008. p. 46. ^ "Angola: Country Admitted As Opec Member". Angola Press Agency. 14 December 2006. Archived from the original on 19 October 2012. Retrieved 15 December 2006. ^ "Angolan Diamond Centenary Conference 2013 Highlights Endiama and Alrosa Joint Venture for Future Geological Exploration of diamond deposits of Angola's Territory" (PDF). Press release. angolancentenary.com. Archived from the original (PDF) on 14 November 2013. ^ Dolan, Kerry A. (23 January 2013). "Isabel Dos Santos, Daughter Of Angola's President, Is Africa's First Woman Billionaire" Archived 15 August 2017 at the Wayback Machine. Forbes. ^ Alt, Robert. "Into Africa: China's Grab for Influence and Oil". Heritage.org. Archived from the original on 13 March 2010. Retrieved 27 June 2010. ^ "Angola's Political and Economic Development". Council on Foreign Relations. Archived from the original on 21 April 2016. ^ "Angola: Explain Missing Government Funds". Human Rights Watch. 20 December 2011. Archived from the original on 21 December 2011. Retrieved 22 December 2011. ^ Redvers, Louise POVERTY-ANGOLA: Inter Press Service News Agency – NGOs Sceptical of Govt's Rural Development Plans Archived 12 May 2010 at the Wayback Machine. ^ Manuel Alves da Rocha (2010) Desigualdades e assimetrias regionais em Angola: Os factores da competitividade territorial Archived 18 March 2015 at the Wayback Machine, Luanda: Centro de Estudos e Investigação Científica da Universidade Católica de Angola. ^ "Sectores Económicos Prioritários" (in Portuguese). ANIP. Archived from the original on 11 April 2013. ^ "Angola Cables e parceiros estrangeiros anunciam construção de cabo submarino" (in Portuguese). ANGOP. 14 October 2014. Archived from the original on 25 November 2014. Retrieved 13 November 2014. ^ Machado, André (30 January 2014). "Cabo submarino que ligará Brasil à África terá capacidade de 40 terabits por segundo" (in Portuguese). O Globo. Archived from the original on 12 October 2014. Retrieved 13 November 2014. ^ Inácio, Adelina (12 March 2015). "Nação está mais ligada" (in Portuguese). Jornal de Angola. Archived from the original on 19 March 2015. Retrieved 12 March 2015. ^ "Angola has about 14 million mobile phone network users – Minister". ANGOP. 12 March 2015. Archived from the original on 18 March 2015. Retrieved 12 March 2015. ^ "Angola com crescimento anual superior a 55% no sector das TIC" (in Portuguese). Platina Line. 12 March 2015. Archived from the original on 13 July 2015. Retrieved 16 April 2015. ^ "Sector das TIC com crescimento anual superior a 55 por cento na última década" (in Portuguese). Ver Angola. 13 March 2015. Archived from the original on 16 April 2015. Retrieved 16 April 2015. ^ "Satbeams - World Of Satellites at your fingertips". Satbeams Web and Mobile. Archived from the original on 17 September 2018. Retrieved 17 September 2018. ^ "AngoSat 1". space.skyrocket.de. Archived from the original on 17 September 2018. Retrieved 17 September 2018. ^ "Conclusion works of "Angosat" project set for 2016". ANGOP. 8 September 2014. Archived from the original on 15 December 2014. Retrieved 11 December 2014. ^ Agência Lusa (4 November 2014). "Primeiro satélite angolano pronto para ser lançado em 2016" (in Portuguese). Observador. Archived from the original on 29 November 2014. Retrieved 11 December 2014. ^ "GGPEN - Leia Mais". www.ggpen.gov.ao. Archived from the original on 17 September 2018. Retrieved 17 September 2018. ^ "Angola Archived 16 July 2017 at the Wayback Machine". CIA World Factbook. ^ World Refugee Survey 2008 – Angola Archived 10 May 2011 at the Wayback Machine, UNHCR. NB: This figure is highly doubtful, as it makes no clear distinction between migrant workers, refugees and immigrants. ^ "Angola: Cerca de 259.000 chineses vivem atualmente no país". Visão. 25 April 2012. Archived from the original on 9 May 2013. Retrieved 13 January 2013. ^ Bender, Gerald; Yoder, Stanley (1974). "Whites in Angola on the Eve of Independence. The Politics of Numbers". Africa Today. 21 (4): 23–27. JSTOR 4185453. ^ Flight from Angola Archived 25 May 2013 at WebCite, The Economist , 16 August 1975 puts the number at 500,000, but this is an estimate lacking appropriate sources. ^ Siza, Rita (6 June 2013). "José Eduardo dos Santos diz que trabalhadores portugueses são bem-vindos em Angola". Público. Lisbon. Archived from the original on 12 June 2013. Retrieved 17 June 2013. ^ "Angola, Brazil: A culture shock divide · Global Voices". 17 August 2008. Archived from the original on 16 March 2017. Retrieved 14 August 2017. ^ "Angola: português é falado por 71,15% de angolanos" (PDF). Archived from the original (PDF) on 26 December 2016. ^ "Angola". State.gov. 19 September 2008. Archived from the original on 13 July 2014. Retrieved 13 July 2014. ^ "ANGOLA 2012 INTERNATIONAL RELIGIOUS FREEDOM REPORT" (PDF). state.gov. Archived (PDF) from the original on 4 May 2017. Retrieved 24 June 2017. ^ Angola: Religious Freedom Profile at the Association of Religion Data Archives Archived 11 April 2010 at the Wayback Machine Brian J Grim and Roger Finke. "International Religion Indexes: Government Regulation, Government Favoritism and Social Regulation of Religion". Interdisciplinary Journal of Research on Religion. 2 (2006) Article 1: www.religjournal.com. ^ "International Religious Freedom Report – Angola". U.S. Department of State. 1 January 2004. Archived from the original on 28 May 2010. Retrieved 27 June 2010. ^ Culture and customs of Angola. Westport, Connecticut: Greenwood Press. 2007. p. 40. ISBN 978-0-313-33147-3. ^ "International Grants 2005" (PDF). Archived from the original (PDF) on 13 November 2008. ^ Seal, AJ; Creeke; Dibari; Cheung; Kyroussis; Semedo; Van Den Briel (January 2007). "Low and deficient niacin status and pellagra are endemic in postwar Angola". Am. J. Clin. Nutr. 85 (1): 218–24. hdl:10144/125625. PMID 17209199. ^ "WHO: Yellow fever outbreak is 'serious and of great concern'". Archived from the original on 29 May 2016. Retrieved 29 May 2016. ^ "National adult literacy rates (15+), youth literacy rates (15–24) and elderly literacy rates (65+)". UNESCO Institute for Statistics. Archived from the original on 29 October 2013. Retrieved 27 July 2013. ^ "Angola – Statistics". UNICEF. Archived from the original on 13 June 2010. Retrieved 27 June 2010. ^ Dovey, Lindiwe (11 March 2015). Curating Africa in the Age of Film Festivals. New York, NY: Palgrave MacMillan. ISBN 1137404140. Archived from the original on 15 September 2018. Retrieved 15 September 2018. ^ Poncianinho, Mestre; Almeida, Ponciano (2007). Capoeira: The Essential Guide to Mastering the Art. New Holland Publishers. pp. 18–. ISBN 978-1-84537-761-8. Archived from the original on 20 March 2015. Retrieved 14 October 2015. "Angola". The World Factbook. Central Intelligence Agency.
0.942975
Charles-Camille Saint-Saëns (French pronunciation: [ʃaʁl kamij sɛ̃sɑ̃s]) (9 October 1835 – 16 December 1921) was a French Late-Romantic composer, organist, conductor, and pianist, known especially for The Carnival of the Animals, Danse macabre, Samson and Delilah, Piano Concerto No. 2, Havanaise, Introduction and Rondo capriccioso, and his Symphony No. 3 (Organ Symphony). Saint-Saëns was born in Paris, France on 9 October 1835. His father, a government clerk, died three months after his birth. He was raised by his mother, Clémence, with the assistance of her aunt, Charlotte Masson, who moved in. Masson introduced Saint-Saëns to the piano, and began giving him lessons on the instrument. At about this time, age two, Saint-Saëns was found to possess perfect pitch. His first composition, a little piece for the piano dated 22 March 1839, is now kept in the Bibliothèque nationale de France. Saint-Saëns's precociousness was not limited to music. He learned to read and write by age three, and had some mastery of Latin by the age of seven. His first public concert appearance occurred when he was five years old, when he accompanied a Beethoven violin sonata. He went on to begin in-depth study of the full score of Don Giovanni. In 1842, Saint-Saëns began piano lessons with Camille-Marie Stamaty, a pupil of Friedrich Kalkbrenner, who had his students play the piano while resting their forearms on a bar situated in front of the keyboard, so that all the pianist's power came from the hand and fingers and not the arms. At ten years of age, Saint-Saëns gave his debut public recital at the Salle Pleyel, with a performance of Mozart's Piano Concerto No. 15 in B-flat major (K. 450), and various pieces by Handel, Kalkbrenner, Hummel, and Bach. As an encore, Saint-Saëns offered to play any of Beethoven's 32 piano sonatas from memory. Word of this incredible concert spread across Europe, and as far as the United States with an article in a Boston newspaper. He then studied composition under Fromental Halévy at the Conservatoire de Paris. Saint-Saëns won many top prizes and gained a reputation that resulted in his introduction to Franz Liszt, who would become one of his closest friends. At the age of sixteen, Saint-Saëns wrote his first symphony; his second, published as Symphony No. 1 in E-flat major, was performed in 1853 to the astonishment of many critics and fellow composers. Hector Berlioz, who also became a good friend, famously remarked, Il sait tout, mais il manque d'inexpérience ("He knows everything, but lacks inexperience"). For income, Saint-Saëns played the organ at various churches in Paris, with his first appointment being at the Saint-Merri in the Beaubourg area. In 1857, he replaced Lefébure-Wely at the eminent position of organist at the Église de la Madeleine, which he kept until 1877. His weekly improvisations stunned the Parisian public and earned Liszt's 1866 observation that Saint-Saëns was the greatest organist in the world. He also composed a famous piece called Danse Macabre at this time. From 1861 to 1865, Saint-Saëns held his only teaching position as professor of piano at the École Niedermeyer, where he raised eyebrows by including contemporary music—Liszt, Gounod, Schumann, Berlioz, and Wagner—along with the school's otherwise conservative curriculum of Bach and Mozart. His most successful students at the Niedermeyer were André Messager and Gabriel Fauré, who was Saint-Saëns's favourite pupil and soon his closest friend. Saint-Saëns was a multi-faceted intellectual. From an early age, he studied geology, archaeology, botany, and lepidoptery. He was an expert at mathematics. Later, in addition to composing, performing, and writing musical criticism, he held discussions with Europe's finest scientists and wrote scholarly articles on acoustics, occult sciences, Roman theatre decoration, and ancient instruments. He wrote a philosophical work, Problèmes et mystères, which spoke of science and art replacing religion; Saint-Saëns's pessimistic and atheistic ideas foreshadowed Existentialism. Other literary achievements included Rimes familières, a volume of poetry, and La crampe des écrivains, a successful farcical play. He was also a member of the Astronomical Society of France; he gave lectures on mirages, had a telescope made to his own specifications, and even planned concerts to correspond to astronomical events such as solar eclipses. In 1870, the Franco-Prussian War, despite being over in barely six months, left an indelible mark on the composer. He was relieved from fighting duty as one of the favourites of a relative of emperor Napoleon III, but fled nonetheless to London for several months when the Paris Commune broke out in the besieged Paris of winter 1871, his fame and societal status posing a threat to his survival. In the same year, he co-founded with Romain Bussine the Société Nationale de Musique in order to promote a new and specifically French music. After the fall of the Paris Commune, the Society premiered works by members such as Fauré, César Franck, Édouard Lalo, and Saint-Saëns himself, who served as the society's co-president. In this way, Saint-Saëns became a powerful figure in shaping the future of French music. In 1875, Saint-Saëns married Marie-Laure Truffot and they had two children, André and Jean-François, who died within six weeks of each other in 1878. Saint-Saëns left his wife three years later. The two never divorced, but lived the rest of their lives apart from one another. In 1886 Saint-Saëns debuted two of his most renowned compositions: The Carnival of the Animals and Symphony No. 3, dedicated to Franz Liszt, who died that year. That same year, however, Vincent d'Indy and his allies had Saint-Saëns removed from the Société Nationale de Musique. Two years later, Saint-Saëns's mother died, driving the mourning composer away from France to the Canary Islands under the alias "Sannois". Over the next several years he travelled around the world, visiting exotic locations in Europe, North Africa, Southeast Asia, and South America. Saint-Saëns chronicled his travels in many popular books using his nom de plume, Sannois. In 1908, he had the distinction of being the first celebrated composer to write a musical score to a motion picture, The Assassination of the Duke of Guise (L'assassinat du duc de Guise), directed by Charles Le Bargy and André Calmettes, adapted by Henri Lavedan, featuring actors of the Comédie Française. It was 18 minutes long, a considerable run time for the day. In 1915, Saint-Saëns traveled to San Francisco, California and guest conducted the San Francisco Symphony Orchestra during the Panama-Pacific International Exposition, one of two world's fairs celebrating the completion of the Panama Canal. Saint-Saëns continued to write on musical, scientific and historical topics, travelling frequently before spending his last years in Algiers, Algeria. In recognition of his accomplishments, the government of France awarded him the Légion d'honneur. Saint-Saëns died of pneumonia on 16 December 1921 at the Hôtel de l'Oasis in Algiers. His body was repatriated to Paris, honoured by state funeral at La Madeleine, and interred at Cimetière du Montparnasse in Paris. Saint-Saëns was either friend or enemy to some of Europe's most distinguished musicians. He stayed close to Franz Liszt and maintained a fast friendship with his pupil Gabriel Fauré, who replaced him as organist and choirmaster when he retired. Additionally, he was a teacher and friend to Isidor Philipp, who headed the piano department at the Paris Conservatory for several decades and was a composer and editor of the music of many composers. But despite his strong advocacy of French music, Saint-Saëns openly despised many of his fellow-composers in France such as Franck, d'Indy, and Massenet. Saint-Saëns also hated the music of Claude Debussy; he is reported to have told Pierre Lalo, music critic, and son of composer Édouard Lalo, "I have stayed in Paris to speak ill of Pelléas et Mélisande." The personal animosity was mutual; Debussy quipped: "I have a horror of sentimentality, and I cannot forget that its name is Saint-Saëns." On other occasions, however, Debussy acknowledged an admiration for Saint-Saëns's musical talents. Saint-Saëns had been an early champion of Richard Wagner's music in France, teaching his pieces during his tenure at the École Niedermeyer and premiering the March from Tannhäuser. He had stunned even Wagner himself when he sight-read the entire orchestral scores of Lohengrin, Tristan und Isolde, and Siegfried, prompting Hans von Bülow to refer to him as, "the greatest musical mind" of the era. However, despite admitting appreciation for the power of Wagner's work, Saint-Saëns defiantly stated that he was not an aficionado. In 1886, Saint-Saëns was punished for some particularly harsh and anti-German comments on the Paris production of Lohengrin by losing engagements and receiving negative reviews throughout Germany. Later, after World War I, Saint-Saëns angered both French and Germans with his inflammatory articles entitled Germanophilie, which ruthlessly attacked Wagner. Saint-Saëns edited Jean-Philippe Rameau's Pièces de clavecin, and published them in 1895 through Durand in Paris (re-printed by Dover in 1993). On 29 May 1913, Saint-Saëns stormed out of the première of Igor Stravinsky's Le sacre du printemps (The Rite of Spring), allegedly infuriated over what he considered the misuse of the bassoon in the ballet's opening bars. Saint-Saëns began his musical career as a musical pioneer, introducing to France the symphonic poem and championing the radical works of Liszt and Wagner at a time when Bach and Mozart were the norms. By the dawn of the 20th century, Saint-Saëns was an ultra-conservative, fighting the influence of Debussy and Richard Strauss. This is hardly surprising—Saint-Saëns's career began while Chopin and Mendelssohn were in their prime, and ended at the commencement of the Jazz Age; but his image endured for years after his death. As a composer, Saint-Saëns was often criticized for his refusal to embrace romanticism and at the same time, rather paradoxically, for his adherence to the conventions of 19th-century musical language. He is remembered chiefly for works such as The Carnival of the Animals, which was not published in full until after his death - reportedly because Saint-Saëns feared it would affect his reputation as a serious composer; the Introduction and Rondo Capriccioso for violin and orchestra, the operas Samson and Delilah and Henry VIII (of which only the first is frequently performed today), the Symphony No. 3; the second, fourth and fifth piano concertos; the third violin concerto; the first cello concerto; and the first violin sonata. What gives Sebastian Bach and Mozart a place apart is that these two great expressive composers never sacrificed form to expression. As high as their expression may soar, their musical form remains supreme and all-sufficient. Saint-Saëns the composer was widely regarded by his contemporaries and some later critics as writing music that is elegant and technically flawless, but occasionally dry, uninspired, and lacking emotion. His works have been called logical and clean, polished, professional, and never excessive. His concertos and many of his chamber music works are both technically difficult and transparent, requiring the skills of a virtuoso. The later chamber music pieces, such as the second violin sonata, the second cello sonata, and the second piano trio, are less accessible to a listener than earlier pieces in the same form. They were composed and performed when Saint-Saëns was already slipping in popularity and, as a result, they are little known. They show a willingness to experiment with more progressive musical language and to abandon lyricism and charm for more profound expression. The piano music, while not as deep or as challenging as that of some of his contemporaries, occupies the stylistic ground between Liszt and Ravel. At times brilliant, transparent and idiomatic, the music for two pianos includes the Variations on a Theme by Beethoven, the Scherzo, a palindromic piece that uses a blend of modern tonalities and conventional gestures, and the Caprice arabe, a rhythmically inventive fantasy that pays homage to the music of northern Africa. Although Saint-Saëns was considered old-fashioned in later life, he explored many new forms and reinvigorated some older ones. His compositional approach was inspired by French classicism, which makes him an important forerunner of the neoclassicism of Ravel and others. In performance, Saint-Saëns is said to have been "unequalled on the organ", and rivaled by only a few on the piano. However, Saint-Saëns's concert style was restrained, subtle, and cool; he sat unmoving at the piano. His playing was marked by extraordinarily even scales and passagework, great speed, and aristocratic refinement. The recordings he left at the end of his life give glimpses of these traits. He was often charged with being unemotional and business-like, less memorable than other more charismatic performers. He was probably the first pianist to publicly perform a cycle of all the Mozart piano concertos. In some cases these influenced his own piano concertos; for example, the first movement of his 4th Piano Concerto in C minor strongly resembles the last movement of Mozart's 24th Concerto, which is in the same key. In turn, his own concertos appear to have influenced those of Sergei Rachmaninoff and other later Romantic composers. Throughout his life, Saint-Saëns continued to play with the technique taught to him by Stamaty, using the strength of the hand rather than the arm. Claudio Arrau never forgot the ease with which Saint-Saëns played (he cites Chopin's fourth scherzo as an example). Saint-Saëns's early start and his long life provided him with time to write hundreds of compositions; during his career, he wrote many dramatic works, including four symphonic poems, and thirteen operas, of which Samson et Dalila and the symphonic poem Danse macabre are among his most famous. In all, he composed over 300 works and was the first major composer to write music specifically for the cinema, for Henri Lavedan's film The Assassination of the Duke of Guise (Op. 128, 1908). Saint-Saëns wrote five symphonies, although only three of these are numbered. He withdrew the first, written for a Mozartian-scale orchestra, and the third, a competition piece. His symphonies are a significant contribution to the genre during a period when the French symphonic tradition was otherwise in decline. Saint-Saëns also contributed voluminously to the French concertante literature; he wrote five piano concertos, three violin concertos, two cello concertos, and about twenty smaller concertante works for soloist and orchestra, including a colorfully orchestrated piano fantasy, Africa; the Havanaise and the Introduction and Rondo capriccioso for violin and orchestra; and the Morceau de concert for harp and orchestra. Of the concertos, the Second Piano concerto is one of the most popular of virtuoso piano concertos, and the Third Violin Concerto and First Cello Concerto also remain popular. In 1886 he wrote his final symphony, the Symphony No. 3, avec orgue (with organ), one of his best-known works. The motif of the third became the inspiration for the 1978 song If I Had Words by Scott Fitzgerald and Yvonne Keeley. Aided by the monumental symphonic organs built in France by Aristide Cavaillé-Coll, at that time the world's foremost organ builder, this work demonstrates the spirit of "gigantism" and the confidence of France in the Belle Époque at the end of the 19th century, a period that produced the Eiffel Tower, the Universal Exposition at Paris. The confident Maestoso fourth movement perhaps reflects the confidence of Europe in its technology, its science, its "age of reason". He was frequently named as "the most German of all the French composers", perhaps due to his use of counterpoint. In 1886, Saint-Saëns also completed The Carnival of the Animals, which was first performed privately on 9 March. In contrast with the work's later popularity, Saint-Saëns forbade complete performances of it shortly after its première, allowing only one movement, Le cygne (The Swan) for cello and two pianos, to be published in his lifetime. Carnival was written as a musical jest, and Saint-Saëns believed it would damage his reputation as a serious composer. In fact, since its posthumous publication, this work's imagination and musical brilliance have impressed listeners and critics. Saint-Saëns also wrote six preludes and fugues for organ, three in Op. 99 and three in Op. 109, of which Op. 99, no. 3 in E flat major is most often performed. A previously lost opera score Hélène was composed by Saint-Saëns for the great Australian soprano, Dame Nellie Melba, in 1904. The score was rediscovered by a researcher in 2007 and was performed for the first time in the soprano's home city (Melbourne) during January 2008. One of Saint-Saëns's symphonic poems, Le rouet d'Omphale, Op. 31, became famous to a new generation of listeners beginning in 1937 through its use of the ominous middle section of it as the theme to the long-running radio program, The Shadow. A complete recording of Camille Saint-Saëns's The Carnival of the Animals (in fourteen movements) by pianists Neil and Nancy O'Doan and the Seattle Youth Symphony. Conducted by Vilem Sokol. performed by the Skidmore College Orchestra. Saint-Saëns was thought to have ethnically Jewish traits, especially in his youth. For this reason, some contemporaries and historians believed he was of Jewish descent. He said that a person called "Saint-Saëns" could not possibly be a Jew, but close friend Leopold Godowsky said he had taken his mother's name (instead of his father's name). Boschat Adolphe said that he could not be of Jewish origin because his uncle was a priest,:62-63 and Jacques Hanschin also tried to disprove this origin.:69 W. L. Hubbard simply lists him as being of Jewish descent. He was also rumoured to be homosexual. ^ Henderson, AM Memories of Some Distinguished French Organists: Saint-Saëns, The Musical Times, Vol. 78, No. 1132 (Jun., 1937), pp. 534-536. ^ "SAINT-SAENS DENIES BEING GERMANOPHILE; Constantly Warned France Against German Musical Propaganda, Says Famous French Composer". The New York Times. 4 March 1917. http://query.nytimes.com/gst/abstract.html?res=9B0CE0D6173AE433A25757C0A9659C946696D6CF. ^ Modest Tchaikovsky (2004). The Life and Letters of Peter Ilich Tchaikovsky (illustrated ed.). The Minerva Group, Inc.. p. 176. ISBN 1410216128, 9781410216120. ^ W. L. Hubbard (2005). The American History And Encyclopedia of Music: Musical Biographies. Kessinger Publishing. p. 264. ISBN 1417907134, 9781417907137. http://books.google.com/books?id=RTONV5noSEkC. Rees, Brian (1999). Camille Saint-Saëns: A life. Chatto & Windus, London. ISBN 1856197735. Huebner, Steven (2006). French Opera at the Fin de Siecle: Camille Saint-Saëns. Oxford Univ. Press, US. pp. 195–230. ISBN 9780195189544. Studd, Stephen (1999). Saint-Saëns: A Critical Biography. Cygnus Arts, London. ISBN 1900541653. This article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article "Camille Saint-Saëns. Allthough most Wikipedia articles provide accurate information accuracy can not be guaranteed.
0.992041
Limited Liability Companies (LLCs) are an increasingly popular business structure. One reason for this is the flexibility that they allow in terms of taxation. This flexibility allows the LLC to choose whether to be taxed as a sole proprietorship (if there is only one owner, called a "member" in an LLC), a corporation or a partnership. Members of an LLC may also be allowed to list the profits and losses on their personal income tax returns, avoiding double taxation. One major advantage of an LLC is that all of the profits, losses and deductions of the business can be reported on the members' personal income tax returns. This is called “pass through” taxation, because all of the profits and losses pass through the business and go directly to the members. This allows members to pay tax at their individual tax rate, thus avoiding double taxation, where the business pays a corporate tax and the members also pay tax on their income from the business. LLCs are normally treated by default as a pass-through entity. If there is only one member, the owner reports the LLC's income on her own tax return on Schedule C. For LLCs with multiple members, the LLC is treated by default as a partnership and members' income from the LLC is then treated as earned income and is subject to Social Security and Medicare contributions. However, an LLC may also elect to be treated as either an S or C corporation. If it is taxed as an S corporation, all income will be taxed as passive income and will not be subject to Social Security and Medicare contribution. If the LLC is taxed as a C corporation, its income is taxed at the corporation tax rates, and members also pay taxes on any income they take from the business. An LLC allows flexibility in payment to members, which can have tax advantages. In an LLC, members may be compensated using either a guaranteed payment scheme or distribution of profit. Guaranteed payments are regular payments for services to the business, or for use of capital. Guaranteed payments are treated as a business expense and are deductible from the net profit of the LLC. The member receiving the guaranteed payment does not pay FICA tax withholding, but does pay self-employment taxes. Distributions are shares of the business's earnings, paid to all members. Distributions may be treated for tax purposes as return of capital, and so may not be subject to additional tax. However, if the distributions are regular, they may be treated as guaranteed payments, and subject to self-employment taxes. In most states, LLCs are taxed in the same way as the Internal Revenue Service (IRS) determines federal income tax. The LLC does not itself pay a tax, and the members report their profits and losses on their state personal income tax returns. However, some states do charge the LLC an income-based tax. For example, California charges LLCs a tax on income over $250,000 a year. Some states also charge a yearly fee to LLCs. Unless the members of an LLC elect otherwise, the IRS treats an LLC as a pass-through entity for tax purposes. This means that income for LLCs is reported on the personal tax return of the owner or owners, called members. Multiple member LLCs are taxed as partnerships, with each member's individual tax returns reflecting a share of gains or losses of the partnership. An LLC, however, can also elect to be taxed as a corporation. Can a Partner in an LLC Receive a Salary? Does a Limited Liability Company Have Shares?
0.987253
When is the next solar eclipse in Gibraltar? The following table listens all solar eclipses, whose path is crossing Gibraltar. It is crucial that the eclipse path touches the country. Solar eclipses which can only be seen partital are not considdered in the table below. With other words: The following table shows all solar eclipses, whose totallity or annularity can be seen in Gibraltar. The next partial solar eclipse in Gibraltar is in 779 days on Thursday, 06/10/2021. The next total solar eclipse in Gibraltar is in 3023 days on Monday, 08/02/2027. The next annular solar eclipse in Gibraltar is in 3200 days on Wednesday, 01/26/2028.
0.970807
Why would Riot PURPOSEFULLY set us up to lose 50% of our ranked games? That means they legit put your with people you will HAVE TO CARRY. Like how is that fair? I main top and I win pretty much top lane every time. I&#039;d say 66%-75% of the time. But I can&#039;t climb out of G2 and win my plat promos when I get there because I always get trolled or have intentional feeders. It is so consistent that you can look at my match history and see what I am talking about. It is horrible. I shouldn&#039;t feel forced to carry the 0/6 Ekko mid and the 0/7 Cho adc. Like this is extremely unfair and god forbid you say something about it cause then YOU are the TOXIC player. LIKE WHAT? I am 2/0 in lane up 40 cs and you guys can&#039;t stop dying from taking unneeded fights. Riot you have a player base that loves your game, but you absolutely show no regard for how your player base feels. It&#039;s pathetic and to be honest I&#039;m pretty sure I will be quitting this game for good. Put thousands of dollars into this game over the past 6 years just to feel betrayed by a money hungry company who does not care about balance or fairness of the game. Only what is fresh and &quot;toxic&quot;.
0.998682
To get 5 stars they need to deliver. It's cheap food so for the price it's good. Friendly staff and quick service. Good and pepperoni and ready to go for five bucks. What more can you ask for?
0.779088
WHERE ARE THE TRUST RECORDS AND TRUSTEE RECORDS? The records of a single asset are kept in the folder of that particular asset. That could grow into a box of records. If there is daily business management, or interaction with the public like a business, that asset may be better operated as a corporation or LLC. You could still protect the stock, inventory, equipment, and accounts within a trust. Records of a passive asset like an investment account, a vehicle, or a list of inventory, can be pretty small. Similarly, the records of the management by the Trustee can be pretty small and may have very little activity. Therefore, records are simple to manage, and perhaps have very little need for constant review or other activity. Keep the records close and keep copies in a second location in case of damage or loss. Records of the trust can be transferred and safeguarded in another location very quickly. A local trustee can nominate and transfer all records to a remote (or foreign) trustee very easily. That eliminates the (former) local trustee from handling records, avoiding damage to the trust, and avoiding damage to the beneficiaries.
0.999993
Blurb: The past few years have held more surprises than part-angel Clara Gardner could ever have anticipated. Yet from the dizzying highs of first love, to the agonizing low of losing someone close to her, the one thing she can no longer deny is that she was never meant to live a normal life. Normally I am not a big fan of angel books and normally I don’t like love triangles in books, this series has both and I absolutely love it. I guess that shows that even though there are things I don’t like in books, the right series and author still can make it right. Really I have no idea where to start with this review. I love this series, it is my favourite angel series and it is just amazing. I pick up this book, get sucked into it and don’t stop reading until something stops me, like having to cook dinner, having to sleep or finishing the book. The story starts of a little bit slow and normal, but there is always this feeling of dread and anticipation, because you know something bad will happen before the book is over. Even though the pace may be a bit slow at first I still loved it. Every time I pick up a book in this series I just get sucked in and I loved every minute from Boundless. I love the characters, Clara is really amazing and I really like her as a character. We also get to see much from the other characters and they really have their own personalities. In this book a huge parts is about choosing good or evil and which path the character will take. ofcourse there is also the love triangle and wondering who Clara will choose, I actually liked both boys and they are both loveable so I felt okay with whoever she ended up with. There actually is still quite a bit of world building added in this book. We learn more about the black wings, more about the past from some characters. Although I still think there is much that isn’t explained and some questions still remain. The ending was briliant and I loved it. Although it did feel like there were still some things unresolved and I am just left wanting to read more about the characters and their story. I am so sad that this is the end of this series, because I want more. I do think the ending is good, but there are still some loose ends and mostly I just don’t want this series to end. To conclude: an awesome end to an awesome series. I really love this series and I got totally sucked into this book. The start is a bit slow, but I still enjoyed it. The characters are amazing and I am so sad that this is the last book in this series. I do think the ending was awesome. I have heard so much of this series and i really want to try it, but it my TBR pile is currently mocking me with its length, sooooooo. I know what you mean, my TBR pile is also way too long! Although I still think that you should add Unearthly to your TBR, it is such an amazing series!
0.970534
Online Bookings allow your clients to schedule appointments and classes 24/7 and will save valuable time for reception staff. Generate a link for your client to access the online booking system. This articles explains how to enable Staff members for online bookings, click on the option above for assistance with the other steps. Enabling Providers is the first step to have them displayed on the Online Booking system but doing this only is not sufficient. You need to configure the Location and select the appropriate Services/Classes for each Provider for them to be shown online. 2. Click Staff under Setup. 3. Select Staff Member you wish to make available for online bookings. 4. Tick the Enable Integrations checkbox in the right side column. The Integrations option will only be shown if the Staff member is a Provider with an active Diary. 5. Add a short Biography that clients can read when booking online (optional). 6. Make sure the Discipline is correct as it will be displayed online. 7. Click Upload Photo to add a photo visible when selecting the provider (optional). 9. Repeat for each Staff member you want to enable. Verify that the Schedule of each staff member is accurate in the Diary to avoid booking unavailable spots. See "Setting Up Staff Schedules" for more information. When using Online Bookings, you can create an Event or a Note if you want to block a certain spot in the Diary.
0.996962
Why 4:7 is not the answer? 3 cups of water mixed with 5 cups of milk in one container. 7 cups of water mixed with 8 cups of milk in another. Now add all the water together, and add all the milk together, and from that you have the required ratio. That's incorrect and doesn't give the ratio. However, the ratio wasn't required, just the reason why 4:7 wouldn't be correct, which has already been explained.
0.999999
Bristol Plastic Surgery is a partnership of consultant aesthetic plastic surgeons of international standing. Here in the heart of Bristol, we provide the full choice of cosmetic surgery procedures and non-surgical cosmetic interventions. We also provide a rapid access clinic for the diagnosis and treatment of skin cancer, minor benign moles and other simple skin growths. Bristol Plastic Surgery surgeons also have extensive experience in reconstructive plastic surgery. Just a little gesture to say a huge thank you for making my procedure and care stress free. You have done an outstanding job and I am very grateful. Enjoy the choccies! Dear Antonio, Just a note to thank you for your kind gesture on our visit to you yesterday. We will follow your instructions regarding treatment and will see you again in the months to come. Hope you have an enjoyable summer. Best Wishes, Margaret and Brian. Dear Mr Orlando, I wanted to write and let you know how delighted I am with the results of my surgery and the care I experienced with you and your team. From the very first consultation through to my operation and follow up appointments, I have been treated in an efficient and professional manner. Dear Mr Orlando, Thank you very much for your recent letter and the good news it brought. Many thanks also to you and your team for looking after me so kindly throughout, I felt very reassured the whole time. The experience with Bristol Plastic Surgery is fantastic. My Consultant, Mr Mercer, always fully discusses my medical problem with me, and nothing is too much trouble. Removal of implants and replacement breast augmentation Faith in plastic surgeons restored! Following the break of the PIP scandal and a subsequent year of worry and frustration I made contact with Mr Mercer via a recommendation and he was like a breath of fresh air! Mr Mercer, and his amazing team, were on the button with understanding, communication and respect from the offset and gave me instant peace of mind. I knew from the initial meeting with Mr M that I was in good hands. Surgery and the healing process went without a hitch. Thank you Mr Mercer, you're fab! Two stage breast surgery From the age of twelve I had breast asymmetry. I was bullied throughout school which had a dramatic effect on my self esteem. I hid behind clothes, dreaded shopping and felt frumpy. Since having two corrective procedures with Mr Mercer my life has completely changed. I have confidence I never thought possible. I not only feel normal but attractive. All I ever wanted was nice, normal breasts and I feel that the breast you have given me are fantastic. They are everything I wanted and more. No amount of money could give me the feeling your surgery has given me. You are the kindest and most caring surgeon I have met and have understood my needs and have gone above and beyond my expectations. You have restored my faith in plastics surgeons and changed my life for the better. I am very grateful. Two stage excision of tattoo It is nearly a year since the second and final stage of my tattoo removal and I wish I had a photo to send you, but if I did, you wouldn’t see much, since there is barely anything to see! You did a wonderful job, Mr Mercer. I feel such gratitude to you for taking it away so skilfully and you even made me laugh while you did it. Facelift Personal attention is hard to find these days. I came away from the consultation feeling at last that my life could be improved and I that had hope for the future. I just wanted to say a huge thank you for your care before, during and after my operation. You have done an outstanding job and I am so very happy with the results. I am very grateful. Breast Augmentation Your help and efforts are much appreciated. I am so happy with the results. Breast Reduction Thank you so much for making my procedure and care stress free. You have done an outstanding job and I am very grateful. At Bristol Plastic Surgery Mr Orlando offers a full range of cosmetic procedures. Mr Orlando is one of the three designated surgeons in the Bristol catchment area performing lymph node dissection for skin cancer and the only one with extensive expertise in treating complex skin cancer and melanoma of the head and neck. Mr Mercer enjoys an excellent reputation for performing a full range of cosmetic procedures to a very high standard. He has a national reputation for being an expert in face-lifting and has developed his own ‘short scar’ technique. He is a founding fellow of the Faculty of Medical Leaders and Management, is the Past President of the British Association of Plastic Reconstructive and Aesthetic Surgeons (BAPRAS 2015-16), has been President of the British Association of Aesthetic Plastic Surgeons (BAAPS), and has twice been President of the European Association of Societies of Aesthetic Plastic Surgery (EASAPS). Any surgery will either be carried out at 58 Queen Square if under local anaesthetic or at the Nuffield Hospital in Clifton if under general anaesthetic. Both hospitals have state of the art facilities, excellent nursing staff and of course your surgeon and specialist team are never very far away. There is always a consultant plastic surgeon available and our surgeons are fully covered to perform cosmetic plastic surgery. Also situated within our 58 Queen Square premises is our sister company, Bristol Aesthetics, who offer state of the art treatments and exceptional anti-ageing and optimising skin care products. Come and enjoy a complimentary and detailed skin review with our Medical Aesthetician, who will work with you to formulate a bespoke treatment plan based on your individual, specific needs.
0.999328
The gatehouse was a large frontal structure serving as the main entrance to the castle (any other entrance was very small, and was situated around the back or sides where there was less access). Prior to the 13th century, the gatehouse was somewhat of a weak point, but toward the 14th century, it's form grew in importance, becoming more mighty and complex than ever. The portal usually consisted of a gothic arch deeply recessed between two flanking towers, from which it was commanded by arrow slits. Overhead, the portal was covered by a projecting timber hoarding called a bretasche. As with the curtain walls and towers, the bretasche later came to be made out of stone. The portal itself consisted of an entrance was blocked on the outside by heavy wooden folding doors. Directly behind the doors was the portcullis, a massive wooden grating, usually 4-6 inches thick, framed and shod with iron. The portcullis was moved up and down in slots and was raised by a windlass in the portcullis chamber above. The doors swung inward, so if the portcullis was down, they would not open. Behind the portcullis, the entrance way had a wooden ceiling (the floor of the above portcullis chamber) pierced with "murder holes" through which materials could be cast upon intruders. Guard chambers were also situated on either side of the entrance way which provided additional defense. At the end passage, there was usually a second portcullis, making the entrance way completely enclosable so intruders could be trapped.
0.924805
Most people think that beer causes a beer belly despite studies that show mixed conclusions. There are even studies that show beer to be a negative factor in abdominal obesity (Halkjaer et al., 2006). There is no doubt that abdominal obesity is one of the leading risk factors for cardiovascular disease. It is important to understand the true causes and not just blame beer, or any other food without proper study. That depends on your definition of beer belly. A big study in the European Journal of Clinical Nutrition (Schutze , Schulz , Steffen , Bergmann , Kroke , Lissner & Boeing, 2009) concludes that beer does not cause a beer belly. It is important to note that the study did correlate beer consumption with an increase in waist circumference in men, but that was related to overall weight gain. They also conclude that there is no associated beer belly risk for women who are beer consumers and tea-totalers. Men who drank around 32 ounces of beer daily had a 17% higher risk of waist circumference gain than those who drank up to 8 ounces of beer daily. The study also showed that men who abstained from beer drinking showed a similar risk for waist circumference gain as the heavy drinkers, and this was attributed to lifestyle and other risks. The authors also found that former beer drinkers had a similar risk for developing a beer belly as their former drinking buddies. This study was extremely well thought out and concludes that although beer (and all ethanol containing beverages), can contribute to weight gain. Again, there is no evidence that beer causes a beer belly, but rather contributes to overall waist and hip circumference increases. They also point out that wine would have the same effect as beer, but they claim that wine is not drunk in as large amounts as beer (told you beer was better!). Ethanol was also thought to be a leading contributor to the increase in both hip and waist size, but the study didn't have the data to investigate this. If you are interested there was a study done by (Klesges et al., 1994; Jequier, 1999; McCarty, 1999) that discusses the questionable role of ethanol to produce energy in contrast to carbohydrates. This could be a reason that ethanol is converted to fat and not used as a primary source of energy for the body. There is also research suggesting that a glandular activation is a problem as there is research showing increases in abdominal fat due to ethanol (Bjorntorp,2001). Bjorntorp P (2001). Do stress reactions cause abdominal obesity and comorbidities? Obes Rev, 2, 73–86. Halkjaer J, Tjonneland A, Thomsen BL, Overvad K, Sorensen TI (2006). Intake of macronutrients as predictors of 5-y changes in waist circumference. Am J Clin Nutr, 84, 789–797. Klesges RC, Mealer CZ, Klesges LM (1994). Effects of alcohol intake on resting energy expenditure in young women social drinkers. Am J Clin Nutr, 59, 805–809. McCarty MF (1999). The alcohol paradox. Am J Clin Nutr, 70, 940–942. Schutze , M., Schulz , M., Steffen , A., Bergmann , M., Kroke , A., Lissner , L., & Boeing, H. (2009). Beer consumption and the ‘beer belly’: scientific basis or common belief?. European Journal of Clinical Nutrition, 63, 1143-1149.
0.947371
My colleague at work gave me a snake cube puzzle to try to solve, and if you haven't tried, they are a lot harder to solve than they look. After trying and failing for about 10 minutes to solve the puzzle, I had a great idea, why not waste a couple of hours writing a program to solve it for me? And then a couple of hours turned into a couple more hours, but I got there in the end! The aim is to wrap the snake into a 3x3x3 cube. Here is what the snake puzzle looks like when it is unwrapped. There are two main approaches to solving the puzzle programmatically, you could either systematically enumerate all permutations of the snake, or randomly try different permutations until you find one that works. I went with the second option. which seemed like it would probably be computationally slower, but easier to program. I decided to write the code in Python, it works by randomly twisting the snake one joint at a time, and restarting everytime the snake either crosses itself or goes outside a 3x3x3 grid. The code runs 100,000 simulations in approximately 20 seconds on my laptop, which turns out to be just about fast enough to get an answer when you leave the program to run for a couple of hours. The easiest way to think about the solution the program gives is to think of the three blocks of three digits on the left as the bottom layer, the second block of three digits as the second layer, and then the third block of three as the third layer. So the 4th block is directly abov the third block.
0.999995
What's happened to energy prices and how will Britain's households be affected? Four of the Big Six energy suppliers have now announced increases to the cost of gas and electricity, with millions of households set to see their bills rise throughout November and December. Unfortunately this is something that consumers knew to expect - energy price increases have become part of a predictable seasonal trend in Britain, and they usually tend to strike just as the temperatures plummet. While more rises are almost certainly on the way, plenty has already happened in the current round of price hikes. Here we summarise the story so far and highlight how you could be affected. Labour leader Ed Miliband uses his speech at the party's annual conference to promise the nation an energy price freeze if he is elected as the next Prime Minister. With the election set to take place in 2015, Mr Miliband says the freeze would be in force for a 20-month period, saving average households £120 and businesses £1,800. Shares in SSE and Centrica fall by more than 3% following Ed Miliband's announcement. Chancellor George Osborne brands Ed Miliband's price freeze promise a "policy drawn up on the back of a fag packet". The Labour leader continues to face strong scrutiny from the press as he claims that his announcement will not prompt energy suppliers to hike their prices ahead of the next election. SSE becomes the first of the Big Six to announce changes to its household energy tariffs, with customers seeing an 8.2% jump in the cost of gas and electricity. The new prices will come into effect on November 15th, with the average household set to receive an annual bill of £1,379 - a £105 increase. Defending the move, SSE says: "Buying wholesale energy in global markets, delivering it to customers' homes, and government-imposed levies collected through bills - endorsed by all the major parties - all cost more than they did last year." Ed Miliband calls the price rise a "rip-off". British Gas unveils its new household energy tariffs - the cost of gas will increase by 8.4% while electricity will rise by 10.4%. The new rates will come into force on November 23rd, with customers set for an average annual bill of £1,388 - an increase of £117. In a bid to explain the hike, British Gas takes a similar line to SSE: "What's pushing up energy prices at the moment are costs that are not all directly under our control, such as the global price of energy, charges that we have to pay for using the national grid that delivers energy to the home, and the cost of the government's social and environmental programmes." Prime Minister David Cameron calls the price rises "disappointing". Ed Davey, secretary of state for energy, says: "The company will need to justify this decision openly and transparently." One of the UK's smallest energy suppliers - Co-operative Energy - reveals its energy prices are going to rise by 4.5%. The rates will affect new customers from October 21st, but changes will come into effect for existing customers on January 8th 2014. The firm claims the average annual bill will be £1,315. The Sun and The Times both print front page stories which urge consumers to switch energy supplier to get a better deal. Prime Minister David Cameron attracts controversy after reportedly advising people to "wrap up warm" and wear a jumper as a means to keep their energy bills down. RWE npower becomes the third of the Big Six to announce energy price increases - and they're the biggest so far. Customers will see electricity prices rise by 9.3% while gas will surge by 11.1%. The average household supplied by npower will now face an annual bill of £1,385 - a £128 jump on last year. The new prices are scheduled to come into effect on December 1st. Paul Massara, CEO RWE npower, criticises Ed Miliband's price freeze promise when announcing the increases. He added: "Only 16% of the bill is under our control and imposing price controls discourages investment, increases uncertainty and ultimately leads to higher prices." Ofgem announces that Scottish Power has agreed to pay £8.5 million to consumers after an investigation into the suppliers' sales practices revealed customers had received misleading information. A total of £1 million will be dedicated to a compensation fund, while £7.5 million will be paid via the Warm Home Discount Scheme. Elsewhere, a ruling that prevents households from being automatically rolled-over onto a new fixed term energy deal comes into force. Ofgem says that suppliers will also have to introduce simpler tariffs by the end of the year. To cap off a busy day, former Prime Minister Sir John Major calls for a one-off windfall tax on Britain's top energy firms, arguing that price rises of more than 10% are "unacceptable". The government labels the idea "interesting" but reveals that no such plans are being considered. During Prime Minister's Questions, David Cameron suggests the government could look to roll back green levies as a means to drive down people's bills. He also announces that the energy market should undergo an annual competition audit. Responding to pressure from Ed Miliband, the Conservative leader says: "We want a more competitive market. We need an annual audit of competition to make this market more competitive." Scottish Power announces it is increasing its energy prices - gas will rise by an average of 8.5% while electricity will jump 9%. Neil Clitheroe, Scottish Power's CEO of Energy Retail and Generation, says the move is a result of an increase in "the cost of purchasing and delivering energy to homes across Britain". After David Cameron hinted that green levies may be removed from energy bills, Nick Clegg implies that the move could be paid for through general taxation, although adds that he isn't in complete agreement with the idea. Such a measure would see the government to stick to its environmental policies and continue generating money to promote cleaner energy. Five of the Big Six are accused of showing "contempt" for the government and consumers as it is revealed that they will not be sending their chief executives to a Select Committee showdown. E.ON looks set to be the only supplier which will send its top boss to face questions on price rises, with MPs aiming strong criticism at npower, British Gas, SSE, EDF and Scottish Power. Energy UK chief executive Angela Knight sparks outrage by claiming that energy companies' £3.7 billion profits "aren't particularly big". Meanwhile, claims that the rising cost of wholesale energy is to blame for price rises are thrown into doubt - while some consumers have seen an 11.1% increase in their rates, Ofgem data indicates that wholesale prices only crept up by 1.7% over the past year. Representatives of the Big Six face MPs at the Energy and Climate Change Select Committee, answering questions on energy price rises. Stephen Fitzpatrick, managing director of Ovo Energy, says he is "confused" by the explanations for price rises as the wholesale costs his company pays have actually been falling. Tony Cocker, chief executive of E.On, urges the Prime Minister to implement a full investigation of the whole energy market. However, Centrica says such an inquiry is "unnecessary as the market is competitive". SSE managing director William Morris calls for green levies to be removed from bills and paid for through general taxation, explaining that savings could be passed on to consumers. Amid tough questioning from MPs, David Cameron calls for an immediate inquiry into competition in the energy sector. The Prime Minister also highlights that Ed Miliband has taken the government's advice and switched his energy supplier to get a better deal. Elsewhere, experts say that householders face decades of paying for overpriced energy as a result of the Hinkley Point nuclear power station agreement. Energy secretary Ed Davey calls on suppliers to facilitate the implementation of faster switching. Explaining that consumers would enjoy extensive benefits from quicker processes, Mr Davey says that his ultimate target is for households to be able to switch their energy supplier in the space of 24 hours. After weeks of speculation, EDF Energy announces that its energy prices will increase by an average of 3.9%. The rises will come into force from January 3rd next year. The supplier adds: If the government decides to cut the cost of social and environmental schemes to a greater extent than the industry currently expects, any savings will be passed onto customers. The National Audit Office (NAO) releases a report which claims that energy prices could keep rising ahead of inflation until 2030. According to the NAO, the reason for this is that high levels of new infrastructural investment are expected to jump significantly.
0.942808
Transfer of merit (Sanskrit: pariṇāmanā,[note 1] Pawi: pattidāna or pattānumodanā)[note 2] is a standard part of Buddhist spirituaw discipwine where de practitioner's rewigious merit, resuwting from good deeds, is transferred to deceased rewatives, to deities, or to aww sentient beings. Such transfer is done mentawwy, and it is bewieved dat de recipient can often receive dis merit, if dey rejoice in de meritorious acts of de person transferring. In Buddhism, merit transfer is seen as a better awternative dan mourning. Schowars have discussed how de doctrine of transfer of merit can be reconciwed wif de individuaw nature of karma in Buddhism. Some schowars bewieve dat de idea originates wif earwy Buddhism, whereas oders suspect a water origin, uh-hah-hah-hah. It is widewy recognized dat transfer of merit was de Buddhist response to pre-Buddhist Brahmanicaw customs of ancestor worship. In Buddhism, such worship was given an edicaw emphasis. The doctrine may awso have been infwuenced by pre-Buddhist ideas of transference of powers. In Mahāyāna Buddhism, transfer of merit became an essentiaw aspect of de ideaw of de bodhisattva, de Buddha-to-be, who uses his merits to hewp aww wiving beings. Transfer of merit is widewy practiced in aww Buddhist countries, in ceremonies, festivaws, and daiwy practice. In de present day, transfer of merit has become an intrinsic part of Buddhism and has an important sociaw function, uh-hah-hah-hah. Sometimes transferring merit is symbowized by pouring water into a vessew. In de water Pāwi tradition (from 5f–7f century CE), de word pattidāna is used, meaning 'giving of de acqwired'. In de Sanskrit tradition, de word pariṇāmanā is used for transferring merit, meaning 'change, awternation; ripening, bringing to maturity; devewopment; diversion'. The term 'transfer of merit' has become commonpwace, dough objected to by many schowars. Indeed, 'transfer of merit' does not render any term from a cwassicaw Buddhist wanguage. Merit (Sanskrit: puṇya, Pawi: puñña) is a concept considered fundamentaw to Buddhist edics. It is a beneficiaw and protective force which accumuwates as a resuwt of good deeds, acts, or doughts. Merit-making is important to Buddhist practice: merit brings good and agreeabwe resuwts, determines de qwawity of de next wife and contributes to a person's growf towards enwightenment. Apart from de concept of merit, in Mahāyāna pariṇāmanā is awso associated wif de concept of 'roots of virtue' (Sanskrit: kuśawa-mūwa). Transferring merit is a widespread custom in aww Buddhist countries, Mahāyāna, Vajrayāna and Theravāda, and is often practiced at ceremonies and festivaws in honor of de dead. Transferring merit to anoder person, usuawwy deceased rewatives, is simpwy done by a mentaw wish. Despite de word transfer, de merit of de giver is in no way decreased during such an act. The traditionaw metaphor is a candwe used to wight anoder candwe, of which de wight does not diminish in de process. The merit transferred cannot awways be received, however. According to earwy Buddhist texts, if dead rewatives are reborn in a pwace dat is too high or too wow, as a deva (deity), as a human, as an animaw or in heww, dey cannot receive de merit. They can onwy receive de merit if dey are born as pretas, dat is, spirits or ghosts. They must awso be abwe to sympadize wif de meritorious act. The transfer of merit is dus connected wif de idea of rejoicing. If de rewatives do not receive de merit, however, de very act of transferring merit wiww stiww be meritorious for de giver himsewf. This expwains part of de definition of pariṇāmanā ('bringing to maturity'): when a giver gives merit, he awso gains it in dat way. The oder person who rejoices in one's meritorious deeds, in dat way awso receives merit, if he approves of de merit done. Thus, rejoicing in oders' merits, apart from being one of ten meritorious acts mentioned in Buddhist texts,[note 3] is awso a prereqwisite for de transferring of merit to occur. Because it is bewieved dat merit can actuawwy be transferred, transferring merit to deceased woved ones is seen as a better awternative dan mourning. Awso, since in de next wife dere is no such ding as making a wiving drough some occupation, merit is what sustains wiving beings in de afterwife. Materiaw dings cannot be transferred directwy to beings in de next worwd, but de merit accrued by making a donation to de monastic community (Saṅgha) can be transferred. In dis way, a certain object donated appears in de next worwd for de recipient dere, awdough dis is drough de strengf of de intention of giving, not drough de physicaw act of offering by itsewf. The traditionaw exampwe of de transferring of merit in de commentaries to de Pāwi Tipiṭaka is dat of King Bimbisāra, who de Buddha encourages to share his merits wif his former rewatives, reborn as pretas. In de story, during a visit of de Buddha to Bimbisāra's pawace, Bimbisāra asks about some outside noise. The Buddha expwains it is de noise of pretas, who in a previous wife were de king's rewatives. The noise was de pretas crying out of hunger. The Buddha continues dat de onwy way de king couwd hewp his former rewatives was to transfer de merit from de gifts he had given to de Saṅgha to de pretas. The pretas are den seen to receive de objects given to de monks: Bimbisāra gives food and cwof to de Saṅgha, and de merit of de gifts awwows de pretas to receive de objects given as weww. The purposes for merit transfer differ. Some Mahāyāna traditions bewieve dat it can hewp deceased rewatives to attain de Pure Land, a heavenwy paradise in Pure Land Buddhist cosmowogy. In many Buddhist countries, transferring merit is connected to de notion of an intermediate state between deaf and being reborn again, during which de wandering being's future destiny is stiww uncertain, uh-hah-hah-hah. The merit dat is transferred to de deceased wiww hewp dem to cross over safewy to de next rebirf. Or if de spirit has awready been reborn, but in an undesirabwe rebirf, de merits transferred wiww hewp to shorten de time dat de spirit must spend dere. On a simiwar note, when performing a ceremony to drive away a spirit dat has possessed a devotee, devotees may invite a monk for a ceremony to transfer merits to de spirit. Anoder aim in transferring merit, apart from hewping de deceased, is to dedicate it to de devas, de earwy ordodox view dat dey cannot receive merit notwidstanding. It is bewieved dat dey are not abwe to do good deeds demsewves, and deir favor can be obtained in dis way. Often, transference to deities is focused on deities dat are considered protectors of Buddhism. Furdermore, merit is sometimes transferred to parents as a form of devotion or fiwiaw piety. Many Buddhists transfer merits to resowve a bond of revenge dat may exist between peopwe, as it is bewieved dat someone ewse's vengefuwness may create harm in one's wife. Because of dis reason, in Japan a speciaw memoriaw service (Mizuko kuyō) is often hewd after an abortion, to dedicate merit to de spirit of de deceased chiwd. Finawwy, it is awso a common practice to transfer merits to aww sentient beings, dough more commonwy so in Mahāyāna Buddhism dan in Theravāda. The transfer of demerit or eviw, de opposite of transfer of merit, has wittwe to no rowe in Buddhism. It does sometimes take pwace in Hinduism, in which it is winked wif de idea of powwution. Initiawwy in de Western study of Buddhism, some schowars bewieved dat de transfer of merit was uniqwe to Mahāyāna Buddhism and dat it was devewoped onwy at a wate period after de historicaw Buddha. For exampwe, Indowogist Heinz Bechert [de] dated de Buddhist doctrine of transfer of merit in its fuwwy devewoped form to de period between de fiff and sevenf century CE. Schowars argued dat it was discordant wif de earwy Buddhist understandings of karma, and noticed in de Kafāvatdu text dat de idea is partwy refuted by Theravādins. An idea dat has posed a number of dorny qwestions and conceptuaw difficuwties for Buddhist dought and de history of de Mahāyāna is dat often referred to as 'transfer of merit' (puṇyapariṇāmanā). ... Yet such dedication appears, prima facie, to run counter to de karmic principwe of de fruition or retribution of deeds (karmavipāka). Generawwy accepted in Buddhism, bof Mahāyānist and non-Mahāyānist, dis principwe stipuwates dat a karmic fruit or resuwt (karmaphawa) is 'reaped', i.e. experienced, sowewy by de person—or more precisewy by de conscious series (saṃtāna)—dat has sown de seed of future karmic fruition when dewiberatewy (cetayitva) accompwishing an action (karman). Schowars have suggested de practice of transference may have devewoped due to infwuence of Mahāyāna Buddhism, in which beings aiming to become a Buddha (bodhisattva) can share merit wif devotees and dereby save dem. Ruegg awso argues dat de rewated idea of receiving (Pawi: patti, Sanskrit: prāpti) merit drough rejoicing, expressed drough terms such as pattānumodanā and pattidāna, may have devewoped due to Mahāyāna infwuence. Oder schowars have argued dat de doctrine of de transfer of merit can be found earwy in de Theravāda tradition, and dat de doctrine is sanctioned by earwy texts. For exampwe, Indowogist Richard Gombrich pwaced its origins around de fourf century BCE. Buddhist Studies schowar Gregory Schopen states dat de idea of merit transfer is part of aww epigraphicaw findings dat are rewated to a Buddhist bewief in karma, even de earwiest, in de dird century BCE. Then dere awso schowars who propose dat, awdough de concept of transfer of merit did not exist as such in earwy Buddhism, earwy doctrines did form a basis for it, de concept of transfer of merit being an "inherent conseqwence" (Bechert) of dese earwy doctrines. Gombrich deorizes dat earwy Buddhism focused on individuaw karma and responsibiwity, and dat de teaching on transference of merit provided an "escape" to dis strict doctrine of individuaw responsibiwity. He furder argues dat de term anumodana, in water Buddhism used for rejoicing as a way to receive merit, in de earwiest Pāwi texts meant 'giving danks' and was used when de deceased gave danks for transferred merit. Later commentators reinterpreted de term to mean 'rejoicing', to fit in wif Buddhist ordodoxy. They expwained dat de deceased gained merit drough simpwy rejoicing in de merits dat deir rewatives made for dem. In dis way, dere was no reaw transference of merit, but de deceased made merit by demsewves, fowwowing ordodox doctrine on individuaw karma. This stiww is de expwanation given by monastics and oder notabwes in countries wike Burma and Sri Lanka, when asked about de apparent contradiction between individuaw retribution of karma and de transfer of merit. The idea dat a certain power can be transferred from one person to anoder was known before Buddhism. In Hindu texts such as de Mahābhārata, it is described dat devas can transfer certain powers (tejas). A simiwar bewief existed wif regard to de energy gained by performing austerities (tapas). In de Upanishads, certain ceremonies can be found in which a person's deeds are mysticawwy transferred to anoder. In de Laws of Manu many exampwes can be found of good or eviw deeds of one person being transferred to anoder person, wheder on purpose or not. However, according to Buddhist Studies schowar M. M. J. Marasinghe, de concept of de transfer of merit in earwy Buddhism is different from pre-Buddhist ideas in severaw respects: merit is not donated in witeraw, measurabwe parts; meritorious acts in rewation to de Saṅgha are emphasized; devas do not take any part in it; and it is often a compassionate act towards wiving beings in de next worwd who are in suffering. Moreover, andropowogist Charwes F. Keyes argues dat transfer of merit in Buddhism differs from Hinduism in dat no actuaw substance is exchanged in de rituaws, but de transfer is merewy abstract. Apart from dese transfers of power, a second origin is found in Brahamanicaw ancestor worship. The Petavatdu text was de Buddhist response to such worship. In dis text, transferring merit to deceased rewatives is described in detaiw. The word peta, witerawwy, 'gone forf', is used in earwy Buddhism to refer to one's dead rewatives in de context of merit transfer. It is de Pāwi eqwivawent of Sanskrit preta (hungry ghost), but awso Sanskrit pitṛ (fader, ancestor). In de period preceding de arising of Buddhism, it was bewieved dat when somebody died he had to be transformed from a wandering preta to de state of de bwissfuw worwd of de pitṛs. This was done drough de compwex śrāddha ceremonies, which wouwd secure de deceased's destiny as a pitṛ. In earwy Buddhism, however, ancestor worship was discontinued, as it was bewieved dat de dead wouwd not reach heavenwy bwiss drough rituaws or worship, but onwy drough de causawity of karma. The practice of transfer of merit devewoped on de basis of de edicaw and psychowogicaw principwes of karma and merit, and by connecting dese principwes wif de sense of responsibiwity towards parents of ancestor worship. As for de veneration of dead ancestors, Buddhists repwaced dis by de veneration of de Saṅgha. In many Buddhist countries, de Saṅgha has derefore taken de rowe of an intermediary between de devotees who dedicate merit and deir deceased rewatives. In dis context, de Saṅgha is considered a "fiewd of merit": a wordy recipient dat hewps de devotee accrue de merits reqwired for transfer. In his rowe in funeraw rites, de Buddhist monk repwaced de Brahmin priest as a recipient of gifts. Through de monk's rowe as a fiewd of merit, way peopwe were abwe to adhere to de high standards of Buddhism and its aim on renunciation of de worwd. The doctrine of de transfer of merit hewped to shape Buddhism's rewation to wocaw deities: de devotee transfers merits to de deity, in exchange for de favor of protection by de deity. Thus, de doctrine had a huge rowe, and a huge impact on de extent in which Buddhism was abwe to fit in wif new cuwtures and deir respective deities. In de period preceding Mahāyāna Buddhism, transfer of merit had awready grown to be an important practice. In water centuries, in many schoows of Mahāyāna Buddhism, it was bewieved dat cewestiaw Buddhas or bodhisattvas couwd transfer merits to devotees to hewp rewieve deir suffering. The watter couwd den share dat merit wif oders. When a bodhisattva transferred his merits, his merits did not decrease in de process, because transfer of merit was seen as a merit in itsewf. This was cawwed de inexhaustibwe store of merit. The idea of de bodhisattva transferring merit has wed to severaw Buddhist traditions focused on devotion, uh-hah-hah-hah. According to Gombrich, dis is where de entire idea of de bodhisattva is based on, and according to Buddhist studies schowar Luis Gómez, it is de expression of de Buddhist ideaws of compassion and emptiness. In Chinese Buddhism, infwuenced by Pure Land Buddhism, it became common to transfer merit and hewp de deceased attain de Pure Land. However, some schoows of Mahāyāna Buddhism devewoped oder interpretations on de transfer of merit. The Japanese rewigious weader Nichiren (1222–1282) bewieved transfer of merit to be ineffective, because he argued dat in dis "Age of Dharma Decwine" onwy de devotees' faif and discipwine wouwd hewp dem to be saved from suffering and a bad rebirf. In practice, however, Nichiren Buddhism stiww recognized merit transfer, dough not drough de cwergy as intermediary. On a simiwar note, some Japanese schoows of Pure Land Buddhism, such as de Jōdo Shinshū schoow, do not perform transfer of merits on doctrinaw grounds, dough some exceptions occur. In East Asian Buddhism, de doctrine of merit transfer drough offerings to de Saṅgha became widewy known drough de story of Muwian Rescues His Moder. Audor Sree Padma Howt and schowar Andony Barber note dat merit transfer was weww-estabwished and a very integraw part of Buddhist practice in de Andhra region of soudern India. In addition, inscriptions at numerous sites across Souf Asia provide evidence dat de transfer of merit was widewy practiced in de first few centuries CE. In Theravāda Buddhism, it has become customary for donors to share merits during an anumodanā, dat is, a teaching given by de recipient monks to de donors to rejoice in deir merits done. There is awso a custom to transfer merits at certain intervaws after a rewative has died, starting wif de first period of usuawwy seven days, anoder time after a fifty and a hundred days, and after dat, every year. Such merit transfer rituaws at intervaws may be hewd at de wocaw tempwe or at home. In some Buddhist countries, certain days have been considered especiawwy suitabwe for transferring merit, for exampwe on Wan Sart (Thai: วันสารท) in Thaiwand. Moreover, a custom exists in Thaiwand and Laos to dedicate merit to parents by ordaining as monks or novices. Sometimes transferring merit is symbowized by pouring water into a vessew. In East Asian Buddhism, de doctrine of merit transfer drough offerings to de Saṅgha became widewy known drough de story of Muwian Rescues His Moder. The yearwy festivaw which refers to dis story is widewy cewebrated in East Asia, and de main practice during de festivaw is transfer of merits to deceased rewatives. Merit transfer has devewoped to become a standard ewement in de basic witurgy of aww main schoows of Buddhism. Mahāyāna and Vajrayāna Buddhists transfer merits as part of de 'Seven-part-worship' (Sanskrit: saptāṇgapūjā or Sanskrit: Saptavidhā Anuttarapūjā),[note 4] and dere is awmost no ceremony widout some form of merit transfer. In some Theravāda countries, for exampwe Sri Lanka, merit transfer is done at de end of a preaching. In a 2002–3 fiewd study among Cambodians, devotees were asked why dey sponsored a certain ceremony. One of de most freqwent answers was "to dedicate merit to my ancestors". A finaw exampwe is de rowe of stūpas (structures wif rewics): it has been suggested dat stūpas were buiwt partwy because of merit transfer purposes. The transfer of merits has grown dat important in Buddhism, dat it has become a major way for Buddhism to sustain itsewf. In Japan, some tempwes are even cawwed ekōdera, which means a tempwe for merit transfer, and de practice is widespread, dough it is usuawwy wed by married priests rader dan de cewibate Saṅgha as in earwy Buddhism. In earwy Buddhism, it was seen as a sign of good character if someone transferred merit to de dead. In de present day, de doctrine of transfer of merit awwows communities to engage in merit-making activities as a group, dereby fostering kinship sowidarity and enabwing sociaw engagement. ^ In de earwy Pāwi texts, patti refers to transference of merit to anoder wiving being, whereas pattānumodanā refers to transference to de dead. ^ There are awso oder forms dat are practiced, varying from four to eweven parts. ^ Hardacre 2014, p. 128. ^ Hara, Minoru (2002) . "Transfer of Merit in Hindu Literature and Rewigion". In Takashima, Jun (ed.). Minoru Hara Pasupata Studies. Motiwaw Banarsidass. p. 137. ISBN 3-900271-35-6. ^ Gombrich 1971, pp. 215–9. ^ a b Cawkowski, Marcia (2006b). "Thaiwand". In Riggs, Thomas (ed.). Worwdmark Encycwopedia of Rewigious Practices. 3. Farmington Hiwws: Thomson–Gawe. p. 447. ISBN 0-7876-6614-9. ^ a b c Egge, James (27 Juwy 2016). "Merit Transfer". Oxford Bibwiographies. Oxford University Press. doi:10.1093/OBO/9780195393521-0222. Archived from de originaw on 5 June 2018. Retrieved 31 May 2018. ^ a b Nyanatiwoka 1980. ^ a b Gómez 2000, p. 11. ^ a b Wayman 1997, pp. 417–8. ^ a b c Masefiewd, Peter (2004). "Ghosts and spirits". In Busweww, Robert E. (ed.). Encycwopedia of Buddhism. 2. New York (u.a.): Macmiwwan Reference USA, Thomson Gawe. pp. 309–10. ISBN 0-02-865720-9. ^ a b c Gombrich 2006, p. 126. ^ a b c Tanabe 2004, p. 532. ^ Terwiew, B. J. (1 January 1976). "A Modew for de Study of Thai Buddhism". The Journaw of Asian Studies. 35 (3): 401. doi:10.2307/2053271. JSTOR 2053271. ^ Egge 2013, p. 21. ^ Pye & Strong 1987, pp. 5870, 5873. ^ Wayman 1997, pp. 418, 423. ^ a b Buddhism. An Outwine of its Teachings and Schoows by Schumann, Hans Wowfgang , trans. by Georg Fenerstein, Rider: 1973), p. 92. Cited in "The Notion of Merit in Indian Rewigions," by Tommi Lehtonen, Asian Phiwosophy, Vow. 10, No. 3, 2000 p. 193. ^ a b Wiwwiams 2008, p. 203. ^ a b Keyes 1977, p. 287. ^ Wawter, Mariko Namba (2004). "Ancestors". In Busweww, Robert E. (ed.). Encycwopedia of Buddhism. 2. New York (u.a.): Macmiwwan Reference USA, Thomson Gawe. pp. 20–3. ISBN 0-02-865720-9. ^ a b Marasinghe 2003, p. 470. ^ a b Mawawasekera 1967, p. 85. ^ a b Gombrich 1971, pp. 209–10. ^ Appweton 2014, p. 58. ^ Ratankuw, Pinit (2016). "Socio-Medicaw Aspects of Abortion in Thaiwand". In Keown, Damien (ed.). Buddhism and Abortion. Macmiwwan Pubwishers. p. 58. ISBN 978-1-349-14178-4. ^ Rhys Davids, Thomas W.; Stede, Wiwwiam (1921). The Pawi-Engwish Dictionary (1st ed.). Pawi Text Society. ^ Pye, Michaew; Strong, John S. (1987). "Merit" (PDF). In Lindsay, Jones (ed.). Encycwopedia of rewigion. 9 (2nd ed.). Detroit: Thomson Gawe. ISBN 0-02-865742-X. Archived from de originaw (PDF) on 2 March 2017. ^ Harvey 2000, p. 20. ^ a b Harvey 2012, p. 45. ^ a b c Mawawasekera 1967, p. 87. ^ Appweton 2014, pp. 56–7. ^ a b Marasinghe 2003, p. 469. ^ McDermott 1975, p. 431. ^ White, David G. (1 January 1986). "Dakkhiṇa and Agnicayana: An Extended Appwication of Pauw Mus's Typowogy". History of Rewigions. 26 (2): 208. JSTOR 1062231. ^ Mawawasekera 1967, pp. 85–6. ^ Gombrich 1971, p. 209. ^ Busweww, Robert E. Jr.; Lopez, Donawd S. Jr. (2013). Princeton Dictionary of Buddhism (PDF). Princeton University Press. p. 637. ISBN 978-0-691-15786-3. ^ Cuevas, Brian J. (2004). "Intermediate state". In Busweww, Robert E. (ed.). Encycwopedia of Buddhism. 2. New York (u.a.): Macmiwwan Reference USA, Thomson Gawe. p. 379. ISBN 0-02-865720-9. ^ Fawk 2010, p. 98. ^ Keyes 1987, p. 192. ^ a b Kariyawasam, A.G.S. (1996). Buddhist Ceremonies and Rituaws of Sri Lanka (onwine ed.). Buddhist Pubwication Society. Archived from de originaw on 5 June 2018. ^ Langer, Rita (2007). Buddhist Rituaws of Deaf and Rebirf: Contemporary Sri Lankan Practice and Its Origins. Routwedge. Introduction, uh-hah-hah-hah. ISBN 978-1-134-15872-0. ^ Schopen 1997, pp. 37–8. ^ Schopen, Gregory (1984). "Fiwiaw Piety and de Monk in de Practice of Indian Buddhism: A Question of 'Sinicization' Viewed from de Oder Side". T'oung Pao. 70 (1/3): 126. JSTOR 4528310. ^ Tanabe 2004, p. 533. ^ Schopen 1997, p. 39. ^ a b c Gombrich 2006, p. 127. ^ Keyes 1983, p. 19. ^ Ruegg, D. Seyfort (2004). "Aspects of de Study of de (Earwier) Indian Mahāyāna". Journaw of de Internationaw Association of Buddhist Studies. 27 (1): 52–3. Archived from de originaw on 5 June 2018. ^ a b Brekke 1998, p. 297. ^ Bechert 1992, p. 106. ^ Mawawasekera 1967, p. 89. ^ Schopen 1997, pp. 7, 42. ^ Anāwayo, Bhikkhu (2010). "Saccaka's Chawwenge–A Study of de Saṃyukta-āgama Parawwew to de Cūḷasaccaka-sutta in Rewation to de Notion of Merit Transfer" (PDF). Chung-Hwa Buddhist Journaw. The Chung Hwa Institute of Buddhist Studies. 23: 60–2. ISSN 1017-7132. ^ Gombrich 1971, p. 206. ^ Gombrich 1971, p. 215. ^ Spiro, Mewford E. (1982). Buddhism and Society: A Great Tradition and its Burmese Vicissitudes (2nd ed.). University of Cawifornia Press. p. 126. ISBN 978-0-520-04672-6. ^ a b c Marasinghe 2003, pp. 468–9. ^ Bronkhorst, Johannes (2011). Karma. University of Hawai'i Press. pp. 93–4. ^ Keyes, Charwes F. (1983). "Introduction". In Keyes, Charwes F.; Daniew, E. Vawentine (eds.). Karma: An Andropowogicaw Inqwiry (2 ed.). Berkewey u.a.: University of Cawifornia Press. p. 19. ISBN 978-0-520-04429-6. ^ a b Gombrich 1971, p. 208. ^ a b Howt 1981, pp. 5–10, 17, 19–20. ^ a b Bechert 1992, pp. 99–100. ^ Fawk 2010, p. 101. ^ Vandergeest, Peter (28 November 2008). "Hierarchy and Power in Pre-Nationaw Buddhist States". Modern Asian Studies. 27 (4): 848. doi:10.1017/S0026749X00001311. ^ Gombrich 2006, p. 125. ^ Keyes 1983, p. 274. ^ Adamek, Wendi L. (2005). "The Impossibiwity of de Given: Representations of Merit and Emptiness in Medievaw Chinese Buddhism". History of Rewigions: 143. JSTOR 10.1086/502698. ^ Lehtonen, Tommi (November 2000). "The Notion of Merit in Indian Rewigions". Asian Phiwosophy. 10 (3): 196. doi:10.1080/09552360020011259. ^ Abe, Masao (1997). "Buddhism in Japan". In Carr, Brian; Mahawingam, Indira (eds.). Companion encycwopedia of Asian phiwosophy. London: Routwedge. p. 693. ISBN 0-203-01350-6. ^ Reynowds, Frank (2006). "Mahāyāna". In Doniger, Wendy; Ewiade, Mircea (eds.). Britannica encycwopedia of worwd rewigions. Encycwopædia Britannica. p. 683. ISBN 978-1-59339-491-2. ^ Gómez 2000, p. 14. ^ Cowe, Awan (1996). "Upside down/Right Side up: A Revisionist History of Buddhist Funeraws in China" (PDF). History of Rewigions. 35 (4): 316, 320. JSTOR 1062910. ^ Hardacre 2014, p. 14 n, uh-hah-hah-hah.8, 137. ^ Ambros, B. (2010). "Vengefuw Spirits or Loving Spirituaw Companions? Changing Views of Animaw Spirits in Contemporary Japan" (PDF). Asian Ednowogy. 69 (1): 62 n, uh-hah-hah-hah.12. Archived (PDF) from de originaw on 5 June 2018. ^ a b Hardacre 2014, p. 129. ^ Fogewin, Lars (2006). Archaeowogy of Earwy Buddhism. p. 43. ^ Basham, A.L. (1981). "The evowution of de concept of de Bodhisattva". In Kawamura, Leswie S. (ed.). The Bodhisattva Doctrine in Buddhism (1st ed.). Sri Satguru Pubwications. pp. 33, 37. ^ Keyes, Charwes F. (1975). "Tug-of-war for merit cremation of a senior monk" (PDF). Journaw of de Siam Society. 63: 54. Archived (PDF) from de originaw on 5 June 2018. ^ Anusaraṇaśāsanakiarti, Phra Khrū; Keyes, Charwes F. (1980). "Funerary rites and de Buddhist meaning of deaf: An interpretative text from Nordern Thaiwand" (PDF). Journaw of de Siam Society. 68 (1): 18. Archived (PDF) from de originaw on 5 June 2018. ^ Sihwé, Nicowas (2006). "Buddhism in Tibet and Nepaw". In Berkwitz, Stephen C. (ed.). Buddhism in Worwd Cuwtures: Comparative Perspectives. Santa Barbara, Cawifornia: ABC-CLIO. p. 253. ISBN 1-85109-787-2. Archived from de originaw on 5 June 2018. ^ Keyes 1987, p. 193. ^ Bowie, Kaderine A. (2017). Of Beggars and Buddhas: The Powitics of Humor in de Vessantara Jataka in Thaiwand. New Perspectives in Souf-East Asian Studies. University of Wisconsin Press. p. 62. ISBN 978-0-299-30950-3. ^ Keyes 1983, p. 274–8. ^ Yin, Jing (2005). "Deaf from de Buddhist View". In Chan, Ceciwia Lai Wan; Chow, Amy Yin Man (eds.). Deaf, Dying and Bereavement: A Hong Kong Chinese Experience. 1. Hong Kong University Press. p. 101. ISBN 9789622097872. ^ Tuwadhar-Dougwas, Wiwwiam (2005). "Pūjā: Buddhist Pūjā". In Jones, Lindsay (ed.). Encycwopedia of Rewigion. 11 (2 ed.). Detroit: Thomson Gawe. pp. 7496–7. ISBN 0-02-865740-3. ^ Skiwwing 2005, p. 9839. ^ Deegawwe, Mahinda (2003). Howt, John Cwifford; Kinnard,, Jacob N.; Wawters, Jonadan S. (eds.). Preacher as a Poet (PDF). Constituting communities Theravada Buddhism and de rewigious cuwtures of Souf and Soudeast Asia. Awbany: State University of New York Press. p. 158. ISBN 0-7914-5691-9. Archived (PDF) from de originaw on 5 June 2018. ^ Ledgerwood, Judy (2008). "Buddhist practice in ruraw Kandaw province 1960 and 2003". In Kent, Awexandra; Chandwer, David (eds.). Peopwe of Virtue: Reconfiguring Rewigion, Power and Moraw Order in Cambodia Today. Nordic Institute of Asian Studies. pp. 157, 161. ISBN 978-87-7694-036-2. ^ Gutschow 2004, p. 91. ^ Reader, Ian; Tanabe, George J. (1998). Practicawwy Rewigious: Worwdwy Benefits and de Common Rewigion of Japan (onwine ed.). University of Hawai'i Press. p. 85. ISBN 0-8248-2090-8. ^ Hardacre 2014, p. 131. ^ Howt 1981, p. 2. ^ Keyes 1983, p. 283. ^ Gombrich 1971, p. 219. Based on: Dighajanu Sutta, Vewama Sutta, Dhammika Sutta. This page was wast edited on 15 February 2019, at 13:31 (UTC).
0.995328
Humans communicate through language: verbal languages, or sign languages. How do words and sentences or gestures acquire meaning? One way to think about it is to view language as a labeling device: nouns are used as conventional labels for things (e.g., the English noun 'table' is a label for, well, tables) and verbs are labels for actions (e.g. 'to break' labels actions like demolishing, shattering, and the like); and in virtue of these conventional associations, sequences of words can be used to convey facts about the world, or to tell stories. I am going to argue for a different view. There are two main types of words in language. Words like table or break, which are are known as "content words", indeed have primarily a labeling/referential function. But then there are words like or, if, no, even, any,... often called "function words". I think that meaning stems primarily from the latter. It is in function words that a sort "spontaneous logic" hides, through which we give shape to our thoughts. So the path is from grammar to meaning via logic. I will illustrate this point by showing how many sentences that are perceived as "ill formed" or "agrammatical" owe their marginal status to being logical contradictions (albeit, subconscious ones). This leads to a fairly radical re-thinking of how grammar works. Gennaro Chierchia is an Italian linguist and Haas Foundation Professor in the Department of Linguistics at Harvard University, USA. He is considered one of the world's leading formal semanticists. His work and study focus on areas including semantics, pragmatics, philosophy of language, and language pathology. Chierchia studies how meaning takes shape in language. A common thread in his work is the idea that logic (a way of drawing inferences) spontaneously grows and latches on to the syntactic structures produced by our capacity for recursive computation. This 'natural logic' gives a special power to our ability to use language to communicate and refer, a power not found in other species. Some more specific recurring themes are properties and predication (control/raising/ de se attributions), noun phrase structure (quantified vs. 'bare' nominals, mass vs. count), anaphora and presuppositions, implicatures and polarity phenomena. He is also very interested in pursuing these topics by experimental means.
0.999527
Instructor User Guide Tests and QuizzesHow do I use assessment parts? Assessments are subdivided into parts, but may consist of only one part that comprises all the questions. Parts allow you to create sections of an assessment, each with its own title, questions, question pool draws, attachments (for resources or directions), and question ordering. When you create a new assessment, a part (i.e., section) called "Default" is created automatically. If you leave it named "Default", that title will not appear on your assessment; to change the part's name, click Edit. You can begin adding questions immediately to "Default", or you can add your own parts. New parts will be listed in the order you create them. You can re-order parts within an assessment, and edit each part individually. Your assessment must contain at least one part, but you can remove any of the additional parts you create. You can also remove the "Default" part, as long as you've already created another part to replace it. For more information on adding parts, see How do I add multiple parts to an assessment? Parts may be added to any assessment. Select an existing assessment or create a new one. In Tests & Quizzes, open the assessment and find the part. To edit the name and any of the information and settings associated with a part, next to that part's name, click Edit. Type a title into the text box provided. Note: If the part title is marked as the Default, the title will not appear to assessment takers. Use the text box provided to type Information about the created part. Choose the option to author questions one-on-one or select random draw from question pool. If "questions authored one-by-one" is selected, the following options will display. Zoom: If &quot;questions authored one-by-one&quot; is selected, the following options will display. Select the radio button to order the questions As listed on Assessment Questions page, or to order them Random within Part. If "random draw from question pool" is selected, the following options will display. Zoom: If &quot;random draw from question pool&quot; is selected, the following options will display. Enter the number of questions to draw from the selected question pool. Select the question pool from the drop-down menu. Choose to either randomize student questions each time an assessment is submitted or randomize student questions once for all submissions. Enter the point value for correct answers on each question. Note that all questions in this random draw must be worth the same amount of points. (Optional) For True/False and Multiple Choice, Single Correct questions, you may also enter a negative point value if a question is answered incorrectly. Note: Point values entered here override any value that was specified for individual questions in the corresponding Question Pool. Enter Metadata, such as the objective, keyword, and rubric, into the text boxes provided. New parts will be listed in the order you create them. To switch the order of two parts, before a part's name, change the number in the drop-down list next to "Part". For example, if you have three parts, and you want the third part to appear first, use the drop-down list to change the 3 to 1. The third part will become the first part and the first part will become the third. The example illustrated will exchange the places of Parts 1 and 2. Your assessment must contain at least one part, but you can remove any of the parts you create. You can also remove the "Default" part, as long as you've already created another part to replace it. You can remove the Part and its questions altogether or remove the Part as a section and retain its questions. Note: The first part listed on the editing screen will not have the Remove option. To remove the first part, you must switch its order with another part (if you don't have another part, you'll have to create one), and then click Remove. In the open assessment, find the part. Next to the part's name, click Remove. Choose to delete or combine the questions. Remove part and all questions. Remove part only and move question(s) to (use the accompanying drop-down list to choose another part). Prev: How do I add multiple parts to an assessment? Next: What is a question pool?
0.955475
Does anyone have a source for good affordable supplements? I'm looking for two things that Costco doesn't carry. There's a GNC by my house that does carry them, but they're a bit pricey. I usually look at what foods are high in the substance and eat more of them, rather than buy a supplement, so I am of no help. I would look at effectiveness more than price if I were to buy. For instance, calcium isn't being recommended the way it used to be because the body doesn't absorb it well from supplements, but some types are more easily absorbed than others. I usually check the prices on Amazon. I buy supplements on Amazon or at Meijer for the popular ones, as they often have a buy one get one free deal going.
0.945766
Many children have occasional enuresis, or wetting at nighttime, even though they have been toilet trained for years. Quite a few children who have been traumatized by interpersonal violence will have nighttime (and even day time) wetting that is often not effectively treated by medication or restriction of liquids. Even older children may have nighttime wetting; it is not uncommon for the problem to continue to occur in children who are victims of PTSD even into their teen years. If medication and liquid restrictions do not help, what should you do? The first step is to accept that the wetting issue may not go away quickly or easily. The second thing to remember is that even though it is a frustrating problem, you should refrain from becoming punitive with the child when they wet. Giving consequences will likely only make the situation worse, and begin to erode and damage your relationship with the child. Once you have accepted these basic ideas, you can move on to the practical coping strategies listed below. If the child is clearly in control of their bladder in the daytime, and the child is above the age of three or four, resist putting nighttime diapers or 'pull-ups' on the child. The reason for this is that when diapers are used, the child is being behaviorally shaped to depend on them. In other words, the longer they wear the diapers, the longer they will wear the diapers. As the child gets older, this is a social embarrassment as bad as wetting the bed. Diapers do not solve the wetting problem. For children to learn how to avoid wetting, they need to be able to feel the wetness on their skin! Your next step is to get a cover for the child's mattress. Not just a top cover, but an all encasing, heavy plastic cover. In most cases, new mattresses are sealed in a plastic that is perfect. You can find some waterproof encasement covers in mattress stores or on the Internet. Then, be sure to have at least two or three sets of fitted bottom and top sheets, as well as a n extra blanket for the child's bed, so that there will always be a change of sheets available. You can take a regular top sheet and fold into quarters and place it under the area where the child's bottom lies, then put the regular fitted bottom sheet over this. Of course, if the child moves around the bed a lot, this measure may not have the intended absorption effect. It is a good idea to encase the child's pillow in the same fashion, because pillows can get wet too! If the child wakes in the middle of the night to tell you they are wet, you should help the child first to take a quick shower, not just clean up with wet wipes and change clothes and sheets. The child should strip the bed following the shower, and take the wet sheets to the laundry area to be washed later. The reason for these measures is to make the wetting incidents a bit uncomfortable, not to mention press home to the child that wetting clean up is their responsibility. All of these procedures should be done in a matter of fact manner; try to hide the fact that you are tired and irritated by the problem. By the same token, if the child discovers they are wet in the morning, the same procedure should be done. If the child sleeps through their wetting and it is not discovered till morning, you might want to try to ascertain when they usually wet. In most cases, this is either during their dreaming (intrusive nightmares about their abuse) or in deep sleep. You can check at intervals throughout the night to try and ascertain a pattern. If a pattern is found, you have a shot at being able to wake the child about thirty to sixty minutes before the known wetting time to use the toilet. Last of all, there are devices on the market that sound an alarm when the child begins to urinate at night. Some are pads under the bottom sheet, while others clip to the inside of the child's underwear. The child will still wet themselves, but the idea is that the alarm begins to teach the child's sleeping mind how to pay attention to their full bladder, and to wake themselves up, instead of having an annoying alarm do this. Some of these alarms can be fairly costly, and have varying degrees of claimed success.