proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.946408 |
Please explain the short- and medium-term trend of United Spirits and SB & T International.
United Spirits (Rs 530.7): United Spirits moved close to the long-term trough at Rs 425 formed in January 2009 and the stock continues to hover above this level. This level can act as a stop-loss for both short- as well as medium-term investors. If this level is breached, the supports at Rs 362 and then Rs 288 will come into play.
Short-term targets for the stock are Rs 750 and Rs 925. The zone between Rs 900 and Rs 950 is also a key medium-term resistance. Inability to move above this zone will mean that the stock will vacillate between Rs 500 and Rs 950 over the upcoming months.
Medium-term view will turn positive only on a strong close above Rs 950. Subsequent targets for the stock are Rs 1,068 and Rs 1,215.
SB & T International (Rs 9): This stock is sliding incessantly since the peak at Rs 133 recorded in April 2005. The stock reached its nadir in the first quarter of 2009 as it recorded the low at Rs 5.6. The stock has not made any progress in the last couple of years and continues in bear's grip.
Medium-term hurdle for the stock is at Rs 25. A move above this will take it further to Rs 36 or Rs 57. But it is quite likely that the stock continues wavering in the band between Rs 6 and Rs 25 in the months ahead. Investors holding on to the stock should divest their holding as it nears Rs 25.
Stop-loss should be at Rs 5 for short-term investors. But those with longer investment horizon should consider switching out of SB & T International at this juncture.
I am holding Dish TV purchased at Rs 58. Kindly advise the prospects of the company.
Dish TV India (Rs 54): The rally that began at the October 2008 trough in Dish TV halted at the key long-term resistance at Rs 93 last July. The stock is in a medium-term downtrend since then.
This decline is halting after the stock retraced half the rally from the 2008 low. Key medium-term support for the stock is now at Rs 43. Investors can hold the stock only as long as it trades above this level.
Long-term trend will turn negative only on breach of this support. Next supports for the stock are at Rs 31 and Rs 22.
Short-term resistances are at Rs 68 and Rs 78. Investors with short-term perspective can divest their holdings at either of these levels. Long-term view will turn positive only when the stock moves beyond the resistance band between Rs 95 and Rs 105. The stock needs to move above this level to signal the intention of heading towards its previous peak at Rs 143.
Please let me know the outlook of Agro Tech Foods and Pratibha Industries.
Agro Tech Foods (Rs 459.8): Agro Tech Foods is on a roll. This stock defied the market correction last year and is currently placed at a new life-time high. It is also trading 60 per cent above its January 2008 peak. Needless to add, that the long-term trend in this stock is up.
Long-term support that investors need to watch out for lies around Rs 320. Current uptrend will be threatened only if the stock goes on to close below this level.
Investors should, however, desist from buying this stock on a close below Rs 320. That will imply that the stock is heading for the next long-term supports at Rs 273 and Rs 223.
The stock will continue to wobble as it nears the psychological support at Rs 500. Long-term target on a strong move beyond Rs 500 is Rs 580.
Pratibha Industries (Rs 45.2): Pratibha Industries declined below its long-term support at Rs 40 last November. But the stock has managed to recover above this level and is currently trading just above it. Investors can hold the stock with stop at Rs 27. But decline below this level will mean that the going can get worse and decline to Rs 11 or even Rs 9.5 will be possible.
Key short-term resistance is around Rs 52. Inability to move above this level will imply that the stock will head lower in the upcoming months. But strong move above Rs 55 will pull the stock to Rs 59 or Rs 61 over the medium-term.
I would like to know the technical aspects for MOIL and outlook for Tecpro Systems. I am holding shares of them.
MOIL (Rs 243.8): MOIL spiralled lower from its listing day high of Rs 591 to the trough of Rs 217 in December 2011. Structural trend continues to be down in this stock. It needs to record a strong weekly close above Rs 361 to signal the reversal in this long-term trend. Subsequent targets are Rs 405 and Rs 450.
But the manner in which the short-term rallies are unable to make any headway implies that the short-term outlook is negative. Key short-term hurdles are at Rs 278 and Rs 315. If the stock reverses down from either of these levels, it will mean that there is a possibility of the recent trough at Rs 217 being breached.
It is hard to anticipate where the stock will halt once it moves below Rs 200. Stop-loss for investors can, therefore, be at Rs 200.
Tecpro Systems (Rs 164.9): Tecpro Systems also dredged new lows to bottom out at Rs 141 in January.
The stock is not out of the woods yet and trends along all timeframes — short, medium and long — are currently down. The stock needs to move above Rs 260 to make the medium-term trend reverse higher. Subsequent targets are Rs 298 and Rs 335.
Investors should, however, divest their holding if the stock declines below Rs 141. Since the stock has limited trading history, it is hard to say where the next halt will be once this level is breached.
|
0.99931 |
We provide several composting facilities where we undertake organic waste recycling. This process involves the activity of microorganisms (fungi, bacteria, etc) for the decomposition of organic matter. To achieve this process our specialists establish and supervise the necessary optimal temperature, humidity and oxygen conditions, in each of our facilities.
Treating organic waste using these new technologies reduces the volume that is sent to landfills and reduces reliance on chemical fertilizer.
The following content was shared with you: https://www.tradebe.com/product/composting-biodegradable-waste Text We provide several composting facilities where we undertake organic waste recycling. This process involves the activity of microorganisms (fungi, bacteria, etc) for the decomposition of organic matter. To achieve this process our specialists establish and supervise the necessary optimal temperature, humidity and oxygen conditions, in each of our facilities. In the past few years, we have developed new technologies to obtain compost that allow us to better utilize the space and reduce the time for processing Treating organic waste using these new technologies reduces the volume that is sent to landfills and reduces reliance on chemical fertilizer.
Among other services we provide to our clients we collect and manage their waste oils.
|
0.993918 |
Tailor the way you sell to maximize the lifetime value of your most strategically important customers. Effective key account management requires a structured approach with targeted sales plays, insightful, collaborative selling and regular evaluation. With this modern best practice learn how to exploit analytics, big data, mobile, and social listening tools to manage your key accounts, understand sophisticated buyer behavior, track purchase patterns and create new opportunities.
Create differentiated, value-centric content to showcase offerings. Design sales plays to facilitate guided selling and drive productivity, transparency and accountability.
Perform insight-driven review of key accounts, your existing customer base and prospect lists to determine targets.
For the selected accounts, determine and confirm decision makers, influencers, purchase patterns/processes and buyer behavior.
Customize sales play(s) for the key account using prospect insights.
Improve sales effectiveness and domain expertise of the key account team with on-demand training. Managers monitor progress via secure dashboard.
Execute account campaign using a tailored sales play. Leverage social media as appropriate and monitor digital activity of account decision-makers and influencers.
Convert the key account to an opportunity based on positive campaign response. Determine budget availability and likely timing of purchase.
|
0.930321 |
The McDonald's Corporation is the world's largest chain of hamburger fast food restaurants. Headquartered in the United States, the company began in 1940 as a barbecue restaurant operated by Richard and Maurice McDonald. In 1948, they reorganized their business as a hamburger stand using production line principles. Businessman Ray Kroc joined the company as a franchise agent in 1955. He subsequently purchased the chain from the McDonald brothers and oversaw its worldwide growth.
What songs have been played in McDonald's Commercials?
|
0.999864 |
Can an old-fashioned sitcom address #BlackLivesMatter?
Jerrod Carmichael is not the kind of comedian whose stand-up would transfer into the family-friendly arena without toning it down. He wasn’t even supposed to enter that arena in the first place, as The Carmichael Show is the second go-round for Carmichael at NBC. After the original version of the show was passed on, it was “retooled into a family-friendly vehicle” for a six-episode first season. This could mean death for a comedian like Carmichael, who feels so wholly fresh and original onstage. The Carmichael Show creates dissonance by tackling topics where other shows fear to tread but stays rooted in the traditional multi-camera setup. It’s a show that both pauses for laughter and addresses the Black Lives Matter movement.
It’s not that Carmichael’s material lives or dies on whether it’s blue—the material, not the language, is what’s funny. It might not be traditionally family-friendly, but Carmichael certainly doesn’t shy away from social-justice issues in his work, either. It’s when the show—co-executive produced by Carmichael’s Neighbors director Nicholas Stoller—allows him to explore those issues and expand on his voice that it begins to show real promise. The pilot episode is not about that: Carmichael has just moved in with his girlfriend Maxine (Amber Stevens West), a therapist-in-training. In the same building is his underachieving brother Bobby (LilRel Howery) and his ex-wife Nekeisha (Tiffany Haddish), but he has yet to tell his parents Joe (the great David Alan Grier) and Cynthia (the equally great Loretta Devine) for fear of their judgment. The pilot has its moments, especially when Grier and Devine are worked up into a lather. But it’s a scenario that could feature any young comedian in the lead and it would essentially be the same episode, with a couple more jokes about Obama thrown in to deflect from Maxine revealing that she and Jerrod have already been living together for three weeks.
It’s the second episode where The Carmichael Show gets interesting. It’s Jerrod’s birthday, and an unarmed black man has been shot in in Charlotte, where the show is set. Rather than celebrate Jerrod’s birthday, Maxine and Cynthia opt to join protesters, with Cynthia clad in her “civil rights clothes.” It’s hard to make jokes about senseless deaths, but the episode works exceedingly well. Carmichael can still bemoan the deaths of the countless unarmed black men (he name-checks Trayvon Martin specifically) and make jokes about racial profiling without it feeling contrived or inappropriate. In fact, it feels all too appropriate, and it’s the reason Carmichael should have a sitcom in the first place.
Carmichael is up for the challenge. He’s good when he’s repurposing his stand-up topics in the form of dialogue (“The guy who runs it almost made it onto Top Chef: Boston,” Maxine says about a food truck she wants to go to. “You don’t go to Boston for the food, you go there for the enthusiastic racism,” Jerrod says), but he’s better when he goes beyond showcasing his voice to conveying why his voice is a necessary one. Carmichael is also not afraid to get heavy. In the third episode, “Kale,” he gets upset because Joe isn’t taking care of himself. It’s an unexpected moment of vulnerability—just as in the conclusion of “Protest”—that occurs relatively early in the young sitcom’s life.
But those moments of insight and vulnerability don’t characterize the whole. The Carmichael Show feels odd confined in the multi-camera format, and even when the show is highlighting its star’s unique perspective, it’s mired in the tropes of lesser sitcoms. Still, it’s a shame that NBC has decided to double up on episodes for the show’s short run. With time, The Carmichael Show could develop its message into something far meatier than what it’s beginning presented. It has great potential to be an incendiary comedic voice among a sea of family sitcoms with a harpy mother, a no-nonsense dad, a scheming brother and a girlfriend who wants the approval of her boyfriend’s parents. Let’s hope that NBC gives The Carmichael Show room to reach that potential.
|
0.956701 |
var iNum = parseInt(sVal); //Output will be 234.
It takes 2 parameters. First parameter is value which needs to be converted. And second parameter "radix" is used to specify which numeral system to be used, for example, a radix of 16 (hexadecimal) indicates that the number in the string should be parsed from a hexadecimal number to a integer number.
var iNum = parseInt(sVal); //Output will be 23.
|
0.999809 |
As an organizational transformation coach, my primary job is often to help people find what they’ve lost. It is typical to hear from executives and tenured employees alike that they used to be more aligned, focused, responsive to customers and the market, etc. But after I listen, understand, and empathize, I’ll usually ask ‘where did you lose it?’. As you might imagine, the typical response is a blank stare, and it isn’t surprising.
What do you typically do when you’ve lost something?
Transformational change in organizations requires a razor focus on a future state that must draw leaders and employees out of their current world to embrace a different focus. Creating this pull to change involves fundamentally shifting how individuals understand their value and purpose, and in practice, this can be incredibly disorienting and look high-risk. However, the highest risk comes from continuing the same pattern and entrenching dysfunction.
|
0.999882 |
How many neutrons are present in the nucleus of one atom of ?
From the periodic table, we find that the atomic number, i.e., the number of protons in the nucleus of is 15. Given that the mass number is 32, and recalling the formula which relates mass number to the number of neutrons and protons: , we find that the number of neutrons in the nucleus of one atom of is 17.
Which atomic symbol represents a period five transition metal that has 42 electrons when it forms a cation?
Transition metals extend from groups 3 through 12 and periods 4 through 7. Ru, in its neutral state, has 44 electrons. Therefore, when it becomes a cation, it will have 42 electrons.
What is the mass number, atomic number, and charge, of the isotope of an atom that contains 34 protons, 36 neutrons, and 36 electrons?
The atomic number is equal to the number of protons in the element, so from the periodic table, we find that the element with atomic number 34 is selenium. Since , we calculate that the mass number is 70. Lastly, there are two more electrons than protons, so the charge will be .
Which of the following organizes the forces from strongest to weakest?
Covalent bonds are by far the strongest, requiring to be broken.
Next are hydrogen bonds, which require between to be broken.
Next are dipole-dipole interactions, which require to be broken.
Finally, van der Waals forces are the weakest of those listed, requiring to be broken.
Which of the following electron configurations indicates an atom in an excited state?
An atom is considered to be in an excited state when one of the electrons has jumped to a higher energy level while a lower energy level is available. In the case of , an electron has jumped to the 2p energy level while there is still room in the lower 2s subshell. As a result, it is considered to be in an excited state.
What is the complete ground state electron configuration for the magnesium atom?
Magnesium has an atomic number of 12, so the total number of electrons in its configuration should add up to twelve. The maximum number of electrons in the s subshell is two. Of all the answer choices, only 1s22s22p63s2 fits the criteria. The sum of the exponent values is 12, matching the atomic number of magnesium, and the number of electrons in the s and p subshells matches the maximum amount possible.
What is the complete ground state electron configuration for the iron atom?
Iron has an atomic number of 26, so the total number of electrons in its configuration should add up to twenty six. The maximum number of electrons in the s subshell is two. The sum of the exponent values is 26, matching the atomic number of magnesium, and the number of electrons in the s and p subshells matches the maximum amount possible.
In an atom or molecule, why can't two electrons have the same four electronic quantum numbers?
The Pauli Exclusion Principle explains various phenomena such as the structure of atoms and how different atoms combine to share electrons. When you have two electrons that are located in the same orbital, the quantum numbers n, l and ml are the same. However, ms will be different. Two electrons cannot have the same four electronic quantum numbers because no more than two electrons may occupy an orbital, and if they do, the spin of one must cancel the spin of the other so their spins will have a zero net spin angular momentum.
What is the hybridization on the nitrogen atom in a molecule of ammonia?
The hybridization of an atom can be determined by the number of atoms it is bonded to, as well as the number of lone pairs it has. Two of these variables would be sp, three variables would be sp2, and four would be sp3.
The nitrogen in ammonia is bonded to three atoms of hydrogen, but also has a lone pair in order to satisfy its octet. This means that nitrogen exhibits sp3 hybridization.
Which of the following are true regarding and orbitals?
Orbitals are regions in an electron shell where electrons might be located. There are several types of orbitals such as , and . Most elements found on the periodic table contain electrons within one of these orbitals. A characteristic of an orbital is that it can only contain two electrons maximum. A shell might contain multiple orbitals; however, each orbital can only contain two electrons. Each orbital has a unique shape that corresponds to the electron density (the possible location of an electron at a given point in time). The orbital has a spherical shape whereas the orbital has a dumbbell shape. As mentioned, a shell can contain multiple types of orbitals. A shell can typically contain one orbital, three orbitals, five orbitals, and seven orbitals. Remember that the shape of the orbital has no bearing on the amount of orbitals in a shell. An orbital is higher in energy if it is found farther away from the nucleus. The orbitals in order of increasing energy is as follows . Therefore, an orbital has lower energy than a orbital in the same shell.
|
0.990399 |
In this code examples, 2x16=32words is tranmitted using SPI and received back in ping-pong mode. This operation happens contineously.
In this code examples, 2x16=32words is tranmitted using SPI and received back in ping-pong mode.
|
0.999689 |
Who cares if Lady Claire, the daughter of the Duke of Rockland, marries Sir Ware, a baron? Her married name will be Lady Ware, and a lady is a lady, right?
I get a lot of questions about keeping all of those lords and ladies straight in historical romances and why titles matter. It's complicated in particular because although the peerage has clear rankings (a duke is higher than a marquess, etc.) some people are addressed the same way. This is especially confusing among women.
Royalty includes the king and queen, the Prince of Wales, any children, and so on. Since I write about Victorian England, the reigning monarch would have been Queen Victoria. Prince Albert was her prince consort (the husband of the queen regent who was not a king himself). The Prince of Wales, the heir apparent, would have been Bertie who then became Edward VII on Victoria's death.
The Queen The queen would first have been addressed as Your Majesty on first instance. Then she would be addressed as Ma'am.
Prince Consort, Princes and Princesses of Royal Blood, Dukes and Duchesses of Royal Blood This group would have included Prince Albert, Victoria's husband who served as prince consort, the Prince of Wales, and all other royal princes, princesses, and royal dukes and duchesses. They would have been addressed first as Your Royal Highness and then afterward as Sir or Ma'am.
There are five hereditary titles for members of the peerage that are ranked as follows from highest to lowest: duke (duchess), marquess (marchioness), earl (countess), viscount (viscountess), and baron (baroness).
This might all seem straightforward, but it can become confusing and muddled for a few reasons. First of all, in addition to a title, a man or woman would also have a family name. For instance, I might be Julia Kelly, Marchioness of Dunnett. Kelly would be my family name, Dunnett would be my title.
Then there were courtesy titles. If a man was a marquess, he might be Christopher Kelly, Marquess of Dunnett, Earl of Kirk, and so on and so on. He would only be addressed as Lord Dunnett because marquess is his highest ranking title, and his eldest son would be given the courtesy title of Earl of Kirk and would be addressed as Lord Kirk. In the rare cases when there was no second title, the eldest son would be given the family name as a courtesy title (ie Lord Kelly).
There are even more exceptions to the rule, but for now let's focus on the most common instances.
Dukes and Duchesses The name of a dukedom is taken from an existing place (ie the Duke of Devonshire). When addressing a duke or duchess, you would call them Your Grace (or referring to them in third person His Grace and Her Grace). My copy of Titles and Forms of Address recommends using titles sparingly in conversation.
The widowed wife of the last duke would would retain her title. However, to differentiate her from the current duchess she would be referred to as the Dowager Duchess and addressed by her first name and then her title. For example, after her husband died in 2004, the Duchess of Devonshire became the Dowager Duchess and was referred to as Deborah, Duchess of Devonshire.
Marquesses and Marchionesses Just to make matters complicated, the title of marquess can also be spelled marquis (they may choose how they spell it). The title is generally taken from a place name so one would be the marquess of [place name], although there are four modern exceptions to this rule just to keep things interesting.
A marquess and marchioness would be referred to as Lord and Lady Dunnnett and addressed in speech as My Lord and My Lady. The full formal title of the Marquess of Dunnett would only be used on very formal occasions.
Dowagers marchionesses follow the rule of dowager duchesses.
Younger sons of marquesses are Lord [First name Family name], and rules of address follow the younger sons of dukes.
Younger daughters of marquesses are Lady [First name Family name], and rules of address follow the daughters of dukes.
Earls and Countesses Some earldoms take a geographical name (which would make the title the Earl of [Place]), some take a family name.
An earl and countess would be referred to as Lord and Lady [Title] and addressed in speech as My Lord and My Lady. As with marquesses and marchionesses their full formal title would only be used on rare formal occasions.
Dowagers countesses follow the rule of dowager duchesses.
Younger sons of marquesses are the Honorable [First name Family name], and would be addressed as Mr.
Younger daughters of earls are Lady [First name Family name], and rules of address follow the daughters of dukes.
Viscounts and Viscountesses As with earls, the title is sometimes taken from a geographical name and sometimes a family name.
Titles and forms of address follow marquesses and earls, making them Lord and Lady [Title].
Dowagers viscountesses follow the rule of dowager duchesses.
Courtesy titles stop at the level of earls. The eldest son of a viscount is styled as the Honorable [First name Family name] as are the younger sons of viscounts. They would be addressed as Mr.
Younger daughters of earls are styled as the Honorable [First name Family name], and are addressed as Miss. The eldest daughter would be Miss [Last name] and her younger sisters would be Miss [First name] (ie Miss Emory would be the eldest sister followed by Miss Alexandra and Miss Alexis Emory).
Barons and Baronesses Barons are the last rank of the peerage. Their names can be derived from geographical location, family name, or other sources.
Titles and forms of address follow marquesses, earls, and viscounts making them Lord and Lady [Title].
The eldest son of an baron follows the form of address of the eldest son of a viscount. The younger sons of barons and the daughters of barons also follow the rule for viscounts.
If you're interested in learning more about forms of address, I recommend picking up a copy of Titles and Forms of Address.
|
0.999853 |
A pin has been sent to the given phone. Please do not refresh the page.
Your pin is incorrect. Please try again.
Telephone: Please enter a valid mobile number.
Pin: Please enter a valid pin.
|
0.923562 |
Engineer Joe realizes that always happened a speed fall when the measures of an engine speed slope were made at 10 ms time interval. But this fall happened at varying points at each new engine test.
Joe got curious with that lack of pattern and wants to know, for each engine test, what is the first point in which this speed fall happens.
The input is an engine test and is given in two lines. The first one has the number N of speed measures (1 < N ≤ 100). The second line has N integers: the engine RPM (revolutions per minute) Ri of each measure (0 ≤ Ri ≤ 10000, for all Ri, such that 1 ≤ i ≤ N). A measure is considered a speed fall if it is lower than the previous measure.
The output is the measure index where the first speed fall happened in the test. If no speed fall happens the output must be the number zero.
|
0.946179 |
Summary: Russia’s violation of the INF Treaty is a serious problem. However, U.S. withdrawal from the treaty without an effective strategy to focus political blame and strategic pressure on Russia, and to unify allies in a shared effort to stabilize alarming military competitions, would be counterproductive.
Heralded by president Ronald Reagan as holding universal significance for humankind, the Intermediate-Range Nuclear Forces (INF) Treaty between the United States and the then Soviet Union was the first agreement to eliminate an entire class of nuclear weapons delivery systems, prohibiting short-flight-time missiles with ranges between 500 and 5,500 kilometers, which were particularly threatening to Europe. In 2014, the United States determined that a new Russian ground-launched cruise missile, the SSC-8/9M729, violated the treaty, and Washington unsuccessfully attempted to resolve the issue. The Trump administration has decided to withdraw from the treaty to develop its own noncompliant missile systems.
With NATO-Russia relations worse than at any time since the Cold War, withdrawing from the treaty without a strategy supported by allies to contest Russian coercion and restore stability in Europe poses severe political and military problems for the United States and its European allies. U.S. withdrawal will exacerbate missile proliferation in Asia without improving U.S. security in the Pacific. U.S. standing with its Asian regional allies—including Japan, South Korea, Australia, Taiwan, and India—could be further reduced without a comprehensive regional security strategy that those allies support.
Leaving the INF Treaty will unleash a new missile competition between the United States and Russia. The U.S. nuclear weapons modernization budget is projected to cost $494 billion between 2019 and 2028, with some estimates putting the thirty-year cost at $1.7 trillion, even before adding in new intermediate-range missiles. U.S. strategic competition with Russia and China is driving military cost increases, but this competition will require long-term prioritization. Ultimately, not every need will or can be met. Both Moscow and Beijing will likely outpace any U.S. deployments of intermediate-range missiles, especially over the next decade, making an arms race unwise and costly for the United States. By preserving the INF, the United States could concentrate funding on more important U.S. priorities than unnecessary ground-launched missile systems.
Russia is violating the INF Treaty, and the United States publicly explained how.
Director for National Intelligence Dan Coats explained Russia’s efforts to conceal the violation by testing the 9M729 missile to beyond 500 kilometers from a fixed launcher, which the INF Treaty permits, and then to less than 500 kilometers from a mobile launcher, which the Treaty prohibits.1 The United States detected that the tested missiles were the same and concluded the 9M729 violates the INF Treaty.
(b) exploiting the fears of U.S. allies that find the U.S. withdrawal regrettable because it raises difficult questions for them. These same allies are understandably nervous about the direction of U.S. policy after the withdrawal from the JCPOA with Iran and hints that the United States might withdraw from NATO. Russia has tried to use this discord between allies by calling for high-level diplomacy to deal with the INF problem, which European countries largely support and the United States was forced to go along with.
Clarify the public record on Russia’s intentions and actions. The administration needs to keep the pressure and focus on Russia by testing in publicly perceivable ways whether Moscow is actually willing to return to compliance with the INF Treaty. This is critical for maintaining solidarity with European governments wary of replaying the Euromissile crisis of the early 1980s and for building support for any future U.S. offensive or defensive missile deployments.
Develop within NATO and bilaterally with European allies a comprehensive strategy to contest and reverse Russia’s threats. NATO and other European allies must be prepared to face the threat Russia already poses to Europe and consider how best to counter the 9M729 deployments. Matching Russia missile for missile is not a smart strategy and one that NATO is unlikely to support.
Prepare for spillover effects of the U.S. INF withdrawal among Asian allies. China and Russia will look to exploit any rift caused by the U.S. withdrawal between the United States and its Asian partners, including those concerned about China’s strength in the region. Washington should develop plans with allies to deny China and Russia opportunities to sow divisions or achieve military advantages because of the INF Treaty’s collapse.
Do not let the consequences of the INF Treaty’s demise cascade into other agreements. Even if the INF Treaty cannot be preserved, Congress and the administration should maintain pragmatic implementation of New START, which continues to deliver important transparency and stability benefits for the United States, as the U.S. military’s continual support for New START makes clear.
Russia’s violation of the INF Treaty is a serious problem, which the Trump administration is correct to highlight. However, U.S. withdrawal from the treaty without an effective strategy to focus political blame and strategic pressure on Russia, and to unify allies in Europe and Asia in a shared effort to stabilize alarming military competitions, would be counterproductive. Such stabilization may require buttressing U.S. and allied military capabilities, but deploying ground-based intermediate-range missiles after withdrawal from the INF Treaty would not be an alliance-building element of military rebalancing.
“Withdrawal from the INF Treaty is a lot like shutting down the government. The impulse was understandable, but the action will lead to no good outcome and a lot of wasted money.
Russia should not be allowed to get away with violating the treaty (just like the U.S. border needs to be secure). However, the United States does not need to deploy the types of missiles the treaty prohibits (much as a concrete wall is not what is needed to secure the border). Trying to deploy ground-based intermediate-range missiles would only blow up relations with allies in Europe and East Asia. This would advantage Russia and China.
“The administration’s INF Treaty withdrawal was perhaps inevitable, and the impact it has on widening U.S.-Russian strategic competition may be severe. But in the context of the president’s inability to support the U.S. Article 5 commitment to defend NATO allies in the event of an attack, the real victim is our transatlantic alliance.
The administration called out China as a key reason to withdraw, abandoning Europe to Russia and the SSC-8 threat. The administration has advanced no plan to make Europe safer now, no strategy to address the fielded missile, and no agenda for mitigating a new costly arms competition with Russia.
1 “Director of National Intelligence Daniel Coats on Russia’s INF Treaty Violation,” Office of the Director of National Intelligence, November 30, 2018, https://www.dni.gov/index.php/newsroom/speeches-interviews/item/1923-director-of-national-intelligence-daniel-coats-on-russia-s-inf-treaty-violation?tmpl=component&print=1.
2 In reference to Aegis Ashore Ballistic Missile Defense sites in Europe, designed to provide missile defense against short- to intermediate-range ballistic missile threats emanating from the Middle East, as the European Phased Adaptive Approach portion of the U.S. national missile defense strategy.
Unfortunately the USA has diminished credibility and few people will believe that Russia --which is defending herself fron Nato's eastern drive, the Ucrania coup financed and armed by the West not to speak of the arab Wars in the Southern flank of Russia. It is very difficult not to see our aggressive moves over the last 20 years. And we aggravate the issue by pretendy a poor and sparsely populated country such as Russia y Threatening us.
George, a good balanced straightforward proposal noting some signs of readiness from the Russian side for negotiation.
It is not Russia who allegedly has violated the INF Treaty. The 9M729 has a verified limit 480 km only. It is the USA who has violated the 1987 Treaty 96 times after 2001 till February 2019 when it used dummy/mock medium-range and shorter range target missiles to test the efficiency of the US missile defence system. Vladimir Kozin, Russian military expert, the author of the White Book. Perspectives of the 1987 INF Treaty. Moscow. 2018. 208 PP.
|
0.905627 |
How can I install apt-get & tar CentOS 6?
Hi, let me start with "you don't need APT", as far I know CentOS has ported apt in their repositories but RHEL family use yum as their package manager. APT is used by Debian-based distros. As for tar it is probably installed but you haven't noticed, if you execute the command 'yum install tar' will install tar, in case it is not installed.
|
0.954376 |
If the US contributes increased military support to Guatemala under the premise of curtailing the drug trade, it could inadvertently further destabilize this already politically unstable country. It certainly will not contribute to developing a sense of political alliance in the hearts and minds of its citizens. Concerns about destabilization in Guatemala (and Central America more generally) and the role of this destabilization in facilitating the drug trade have led the Economist to suggest that the solution is to increase military foreign aid to Guatemala. To propose militarization as a foreign policy response to political problems in Central America demonstrates ignorance or naiveté about 1) contemporary use of police and military to support the actions of private security firms; 2) the commitments of the Peace Accords that are the basis of contemporary stability in Guatemala and the abuses of military power they are supposed to curtail; and 3) the long history of US support for non-democratic practices and institutions in the region through financial support and training of militaries. What political interests are behind the Economist’s proposal? Certainly not those of the Guatemalan people.
Any proposal to use the military to curtail the drug trade needs to examine the role of the military and police in community destabilization and the role of such community destabilization in the drug trade. Guatemalan people in the Polochic Valley have experienced the likely use and misuse of increased military resources. Communities are destabilized when their sources of livelihood are destroyed to make way for large-scale agriculture or other business interests, as seems to have taken place in March 2011 in Guatemala. A plan to increase stability needs to address the sources of instability and the role of private security forces, paramilitary forces, and police in destabilization.
Similarly, such proposals – whether coming from journalists or policy makers – should be respect the Peace Accords, which express the government’s commitment to enhancing “the legitimacy of its democratic institutions in the interest of the people of Guatemala.” These accords specifically curtail the use of private security firms (IV.A.32), assuring that such firms will operate under the control of the National Civil Police. The violence of March 2011 by a private security firm took place under an observing police force. If this is contemporary interpretation of the Peace Accords, we might expect foreign military aid to be used against the Guatemalan people in ways that might be destabilizing and ultimately conducive to Guatemala's becoming increasingly important in drug trafficking.
Finally, journalists and policy makers need to consider the longer history of the US military and CIA roles in supporting multinational agricultural interests and interfering in national politics, and the local elites’ inclination to use that support against its own population as an important part of the foreign-policy background. Rather than acting ignorant about this history and naïve about its import, the Economist might investigate and report on the business and political winners and losers in such a military initiative.
|
0.949212 |
Cycling, use of a bicycle for sport, recreation, or transportation. The sport of cycling consists of professional and amateur races, which are held mostly in continental Europe, the United States, and Asia. The recreational use of the bicycle is widespread in Europe and the United States. Use of the bicycle as a mode of transportation is particularly important in non-Western nations and in flatter countries, some of which, like the Netherlands, have a widespread system of bicycle paths.
Cycling as a sport officially began on May 31, 1868, with a 1,200-metre (1,312-yard) race between the fountains and the entrance of Saint-Cloud Park (near Paris). The winner was James Moore, an 18-year-old expatriate Englishman from Paris. On November 7, 1869, the first city-to-city race was held between Paris and Rouen; again Moore was the winner, having covered the 135 km (84 miles) in 10 hours 25 minutes, including time spent walking his bicycle up the steeper hills. While road racing became common within a few years in continental Europe, in England the deteriorated conditions of the roads made them unsuitable, and therefore the sport there focused on the track or time trials.
In the United States the first recorded race was held on May 24, 1878, in Boston, two years after the start of professional baseball and 13 years before basketball was invented. Almost all of the early American racing was on tracks, in long races sometimes employing pacers who rode ahead of contestants at a fast speed and then dropped away. By the 1890s there were about 100 dirt, cement, or wooden tracks around the country, mainly in big cities. More than 600 professionals traveled on this national circuit, which ranged from Boston to San Francisco, with competitions in such cities as St. Louis, Salt Lake City, Denver, and Los Angeles. The sport received an enormous publicity boost on June 30, 1899, when one of these riders, Charles M. Murphy, rode on a wooden track behind a Long Island Rail Road train and covered a mile in 57.8 seconds, earning the nickname of Mile-a-Minute Murphy.
A particularly grueling form of racing flourished in the United States in the 1890s: the six-day race, 142 hours (since the races usually started at midnight and ended, six days later, at 10 pm) of nonstop competition with prizes up to $10,000 and an international field of riders. This form of racing was transformed with the change from one-man teams to two-man teams in 1899, and six-day races retained their popularity well into the 1930s. While no longer held in the United States, these races continue to attract large crowds in Belgium, Italy, France, and Germany.
With the waning of six-day races during the Depression in the United States, American interest in cycling began to fade until the 1980s. American riders dominated the Olympic Games in Los Angeles in 1984, and in 1986 Greg LeMond won the first of his three Tours de France, rekindling American interest. In England, racing declined in popularity after the turn of the 20th century, with the advent of the automobile; despite the occasional Briton who makes a career as a professional on the Continent and a sporadic series of races, such as the Milk Race and the Prutour, both now defunct, the sport remains marginal. Hindering the growth of the sport in England is the public clamour that arises whenever a road is closed for a bicycle race. In Asia and Australia, however, there is no such resistance, and the roads are usually lined with spectators for such races as the Tour Down Under in Australia, the Tour of Langkawi in Malaysia, and the Japan Cup. These races attract many professional teams from Europe and the United States. Many other Asian countries have races also, mainly for amateur teams from the region.
Road and track races for men were held at the first modern Olympic Games in 1896; women entered Olympic competition in road races in 1984 and track races in 1988. Mountain biking, a cross-country race over rough terrain, became an Olympic event for men and women at the 1996 Games in Atlanta. The Atlanta Games also marked the first Olympics at which professionals were allowed to enter the road race and time trial competitions.
The sport is governed overall by the Union Cycliste Internationale (UCI), which is based in Switzerland, and by each country’s cycling federation. Amateur races are held for both men and women in local, regional, and national competition by age group, ranging upward in age from competitors 12 to 13 years old. In the World Championships, amateurs are no longer differentiated from professionals among men, but the sport is divided into those under 23, called espoirs (hopefuls), and those over that age. Categories of competition during the season include time trials, which can be an individual or team event; one-day, or classic, races in which distances can vary between 200 and 280 km (124 to 175 miles) for professionals and 140 to 200 km (87 to 124 miles) for amateurs; and multiday, or stage, races, basically a series of classic races run on successive days. The winner of a stage race is the rider with lowest aggregate time for all stages. Also popular, especially in Britain and the United States, are criterium races, which are run over a relatively short distance of 4 to 5 km (2.5 to 3 miles) for a succession of laps totaling up to 100 km (62 miles).
Track racing events include the sprint, the pursuit, the one-kilometre time trial, the points race, and the keirin, or motor-paced race. Keirin is especially popular in Japan because betting on the outcome is legal there, much like a horse or dog race. Some European track stars ride on the keirin circuit in Japan, both for the experience and for the salary. Cyclo-cross, or cross-country racing, established in the mid-1920s, covers rough terrain that may require racers to dismount and walk or run with their bicycles. Mountain biking, over rough terrain, but usually downhill rather than on the flat, is increasingly popular. One difference between cyclo-cross and mountain-bike racing is that cyclo-cross riders are allowed to ride up to three bicycles during a race, whereas in mountain-bike competition the cyclist must carry all the tools necessary to fix the bicycle, as only one bicycle may be used during a race. One other recent form of racing is bicycle motocross (BMX) racing, which can be traced to motocross racing. Racers (children and adults) ride on dirt tracks which feature a large number of jumps and turns. BMX racing is very popular in the United States, Europe, and Australia. In 2008 BMX racing made its Olympic debut at the Beijing Games in the form of a men’s individual race and a women’s individual race.
The use of performance-enhancing drugs is considered to be widespread in cycling, especially after the scandal that shook the Tour de France in 1998 and resulted in the expulsion of one of the leading teams (the Festina team). To circumvent the medications prohibited by the UCI, many professional teams and individual riders employ doctors to administer drugs that are difficult to detect, such as erythropoietin (EPO), a hormone that acts to increase the level of red blood cells and thus the flow of oxygen to muscles. The UCI periodically checks riders for the level of red cells in their blood, with a limit of 50 percent (55 percent for riders from high-altitude regions); anything above that is regarded as an indication of the use of EPO and carries a two-year suspension. Stimulants and antifatigue drugs such as amphetamines are detectable and therefore outmoded performance-enhancing drugs.
Cycling as recreation became organized shortly after racing did. In its early days, cycling brought the sexes together in an unchaperoned way, particularly after the 1880s when cycling became more accessible owing to the invention of the Rover Safety bicycle. Public cries of alarm at the prospect of moral chaos arose from this and from the evolution of women’s cycling attire, which grew progressively less enveloping and restrictive.
In modern times, recreational cycling has been a cornerstone in fitness campaigns, especially in the United States, where more than 65 million people are believed to ride regularly, including more than 6 million who use bicycles to commute. Bicycle and touring clubs abound in Europe, especially in France, Belgium, Italy, and England. Touring by bicycle (cyclotourism) is also on the increase worldwide. Bicycle paths have been created on the streets of many cities and in national as well as municipal parks, and in the United States more than 10,000 miles (16,000 km) of abandoned railroad corridors have been turned into bicycle paths.
Since its invention, the bicycle has always been an inexpensive and democratic form of transportation. The advent of the automobile slowed the growth of cycling as a means of conveyance in some Western societies, whereas in China and Southeast Asia the bicycle has remained a very popular form of transportation. In Africa and several central European nations many people travel by bicycle. In the 1990s citizens and city planners in industrialized nations began to question the role of the automobile in urban life; some observers blamed the problem of suburban sprawl in countries such as the United States directly on the rise of automobile-based planning and designs. International groups such as Critical Mass formed to encourage traffic laws and city design more conducive to cycling.
A list of Tour de France winners is provided in the table.
*Riis was no longer recognized as champion after his 2007 admission of illegal drug use.
**Armstrong was stripped of the title in 2012, having declined to continue contesting ongoing charges of illegal drug use.
***Became champion after the original winner tested positive for illegal drug use and was stripped of the title.
A list of cycling world road-racing championship winners is provided in the table.
*From 1996 professionals and amateurs competed in the same event.
**Not held because of Olympic championships.
A list of cycling world track championship winners is provided in the table.
1From 1993 professionals and amateurs competed in the same event.
4Not held because of Olympic championships.
5Original winner stripped of title after missing a drug test.
|
0.999999 |
What is rosé? Is it a blend of white and red wine?
First of all, we need to know that most grapes, both black and white, have clear juice. The red colour of red wine comes from the skin. As a rule of thumb, the longer the skin is in contact with the juice, the darker the wine becomes.
Rosé is made from black grapes. It has only a very short time of skin contact, hence the colour pink. In fact, the colour could range from very pale pink (such as rosé from Provence in France), medium pink or salmon colour (often rosé from Spain and some New World wines) to darker pink (rosé from Tavel in France or some Australian rosés). Very pale pink rosés have minimum contact with the skin (the juice is run off immediately after pressing), while darker rosé wines could have skin contact of more than 24 hours.
Put simply, rosé is in between white and red wine. The pale pink rosé has the delicate structure of white wine but red fruit aromas (e.g. rosé from Provence or rosé made from Pinot Noir). The darker rosé has a firmer, bolder structure than white wine but is nowhere as tannic as red wine, such as rosé made from Nebbiolo or Syrah grapes.
Rosé is to be served chilled like white wine and to be drunk young to preserve the primary fruit aromas. It is not for ageing because the colour will develop an orange or brown tone owing to oxidation, which is not appealing. Because of the way it is made, most rosés do not have the structure to improve in the bottle. Most are dry or off-dry, but some are made semi-sweet, such as white Zinfandel from California (pale pink rosé made from Zinfandel grapes), to appeal to the target market.
Rosé can also be made by blending white and red wine together, but this is not allowed in the Old World, except for sparkling wine. However, quality wine producers in the New World would not normally blend white and red wine to make rosé because only 5–10% of red wine is enough to give the pink colour, but this small percentage is not enough to bring out the red fruit aromas and the structure of a rosé made from black grapes. A rosé made by blending white and red wine is, in effect, a white wine with a pink colour.
Sparkling wine made in the traditional method (e.g. champagne) involves blending base wines, usually of different vintages after primary fermentation, before bottling for secondary fermentation. Thus rosé sparkling wine is made from blending base white and red wines together. However, the base red wine is made as delicate as white wine with minimum extraction of tannin so that there is no sacrifice of quality.
It's a pity that more consumers don’t give much thought to rosé and often dismiss it as ‘unsophisticated’ wine. In fact, the styles of rosé are diverse and could be drunk on different occasions. A delicate pale pink rosé is a refreshing aperitif and complements light food, while a darker rosé, with more structure and tannin, is well matched with sautéed meat dishes. I recently met a German wine producer, Schloss VAUX available from Schmidt Vinothek), who makes only sparkling wine, and he swore his Rosé Gourmet is a perfect pairing with lamb chops. I once had a rosé champagne with double chocolate Belgium pudding and it was heaven – the fresh acidity lightened the heavy chocolate, but the wine had adequate fruit support and was therefore not overpowered by the dessert.
Please give rosé its well-deserved place on the dining table.
|
0.952288 |
When will Raspberry Pi organization release a 64-bit operating system?! Ideally the Raspberry Pi 3 B+ will work faster if a 64-bit operating system were available in Raspbian. The current 32-bit operating system may present a bottleneck.
I see no difference between the 3b & the 3B+ regarding 32/64bit OS's and it's been discussed several times on these forums. There are 64bit OS's available for the Pi.
This is an old question of course.
The consensus is that the performance gains of going to 64 bits are not worth the disruption in compatibility of Raspbian versions.
Which I have to say has worked very well for me. I have not checked performance as such but 64 bits is needed for some software, particularly some databases.
Like Raspbian they simply need to update their boot code and kernel, in a short while all other OS's will work. there is no reason why they cannot be updated for the PI 3B+.
in the meantime the older 3B is also still for sale.
That's an interesting 64-bit recommendation. I think there are 64-bit versions of Arch and Ubuntu that also run on the Pi 2 and 3. I wonder how the different distributions compare from reliability, security, support and performance points of view.
Note that switching from Raspbian is a jump from ARMv6 compatible code all the way to ARMv8. Certain things will run much faster and if those are the things you are interested in, then the difference can be significant.
Still, as demonstrated by the popularity of the 32-bit Raspbian for x86 processors, there is quite a bit of computer science that can be learned using a 32-bit operating system.
I too would like to see a 64 bit raspian. I have 64 bit 4.14 running but need 64 bit java and postgresql, essentially a sanctioned 64 bit package.
I would not get too hung up on the "sanctioned" idea. Certainly don't hold your breath waiting for a 64 bit Raspbian. Supporting both 32 and 64 bit is a lot of work for somebody and will cause a lot of confusion in user land. Especially since 64 bit is not needed for 99% of users and applications of a Pi.
https://github.com/bamarni/pi64, sounds good to me.
The only issue is, will bambarni, support is creation into the future? Or will somebody? Or can we support it ourselves?
I only tried out bambarni/pi64 because I wanted to experiment building a database cluster with CockroachDB and three Pis: https://www.cockroachlabs.com/. I did not want to do the required hacks of cockroach to get it running on 32 bit machines.
Also, it niggles me to think of all those transistors of the top 32 bits of registers, ALU's, busses etc in the 64 bit Pi going to waste. Something had to be done about that!
Raspbian does not run on x86 CPU machines, it is a fork of Debian ARMHF..
Raspbian does not run on x86 CPU machines, it is a fork of Debian ARMHF.
Thanks for the clarification. It seems the version of Raspbian for the x86 is actually called The Raspberry Pi Desktop OS for PC and Mac.
I find it amazing how much RAM we 'need' nowadays, when we were doing very similar tasks in 32MB devices not that long ago. Just badly written code in my opinion.
I once worked on an IBM mainframe (S/360-30) that had 32KB. It really hurt when a new release caused the OS nucleus to grow from 6KB to 8KB. I spent several weeks recompiling programs to get rid of double-buffering of files so they would still fit and run (no virtual memory in those days...and, as an aside, almost no microcomputers, either).
@jamesh - my 4GB onboard is not a wish but just the point at which 64bit would start to offer benefit for me ... however, a 2GB now would be of interest - even at a price premium.
There is something odd about ARM addressing, or its memory mapped IO, that requires a 64-bit OS when moving to 2GB, not 4GB as you might think. Thats one reason why the Pine64 and the Odroid C2 both have 64-bit official OS's (they use the same Cortex-A53 as the Pi's and 2GB RAM).
I use 32-bit on the Pi's simply because Rasbian is such a good, stable, well supported distro, ... though I'd love to see a 64-bit version.
I also find it amazing and sympathize with your point of view.
1) Remove all internationalization from every application. English should be good enough for anyone smart enough to use a computer.
2) Remove Unicode support, which we don't need because of 1) above. And what is wrong with simple ASCII anyway? And besides, it's computationally impossible to support Unicode properly.
3) Remove support for proportional fonts and antialiasing. What is that for? Only fluff.
4) Probably we don't need colour displays either. Green, text only, screens were good enough back in the day.
Needless to say, I don't have much hope of my suggestions getting much traction.
In what way is the current ARMv7 Raspbian bottlenecked or limited compared to a theoretical ARMv8 Raspbian?
There are some odd things that need a 64 bit address space.
I believe MongoDB is one. If your database is bigger than 2GB.
CockroachDB can get by with 32 bits but needs tweaking to do so.
Of course nobody in their right mind is going to be using a Pi for huge databases. Except for experimentation.
Ok, so "database engines that memory map inordinately huge database files" is one valid reason. Any more?
Nope, no more, at this time.
However I would suggest that a database bigger than 2GB or 4GB is not "inordinately huge" now a days.
It's common to have 8, 16, 32, 64GB SD cards in a Pi. Makes sense to use a word size that can handle that without any hassel.
But, as you quoted me as saying "nobody in their right mind is going to be using a Pi for huge databases. Except for experimentation"
"Buy 32, get 32 free"
Even if the second 32 are completely superfluous.
Some guy or girl, or many of them, have been working very hard, 8 hours per day or more, for some years, to bring us a 64 bit Pi.
After all that effort on their part, we say "Meh" don't need that.
ATM we don't need it (actually the Pi architecture right now doesn't) but it is a stepping stone toward the future and those that do feel they need it now do have options.
|
0.924106 |
For some it means 'menu', for others it represents 'draggable item' (in preference to the small dots used in GMail for instance).
Is context alone sufficient to disambiguate its meaning?
The context is key, and you will probably have to learn what it means for each context. Even when you know it is a menu, it is not clear what kind of menu it is. Take Chrome. In Windows, there is only the hamburger, while on Mac OS, there is the top main menu as well, as in all Mac Apps. The Hamburger does not say what kind of menu it is.
The Draggable Handle icon is besides the scrollbar case, also common for rearranging lists, for example pressing Edit in a list in some iOS apps, when the delete icon shows up on one side, and the "draggable handle" icon on the other. What says that this does not mean there is a menu on each row? You have to try, to know.
It comes from that physical, draggable switches often have a set of lines, for better grip.
As a button icon, I would say three lines has many meanings. It is such a simple symbol and looks like a list, or a set of rows (of text).
Three lines are also used in text editing for Columns, Lists, and Justify text vs e.g. left align. There are probably more uses for it.
Its use as a menu icon comes from that a menu often also is a couple of rows of text. When the menu instead is a grid, then the menu button may also look like a grid.
This google grid menu used to be in the form of a horizontal menu bar on top of the page.
The hamburger's emerging representation of a menu comes from the need of buttons like these, originating from the trend of hiding the traditional "main menus", that used to reside on top of the window. Smaller device screens do not have room for all the menu options. Designs move away from "easily available on screen" and "lowest number of clicks" and move towards clarity, and more focus on the main things on screen. In those applications that do not depend entirely on the menus, the kind of users that actually are using the menus options will still be able to find them behind that button as directly on screen.
The three lines must be situated at something that makes sense to drag, to be interpreted as a Draggable Handle.
In any application that is lacking menus on screen, chances are that the menu is behind that button.
In a text editor, if it shows up in a button next to the Left Align icon, it's probably not a scrollbar. ;) And so on.
So, it is hard to find/build apps where this comes out as ambiguous. Examples are of course welcome!
these two icons have accidentally fallen upon the same symbol. The fact that they look the same is purely incidental, unnecessary, and rather unfortunate for UX.
Key question Is there any good reason to depend on context alone to disambiguate icons? No. Here example of drag handle that is a distinct icon.
It has to be in the middle of a vertical bar (like a scrollbar) to be considered a draggable element.
Before answering, I'd like to pose a question (hoping you are not a Mac user). How would you interact with the two arrows appearing at the top-right of this window?
The fact that the icon reminds of the resize cursor, and the fact it is not contained within a button, makes many people drag it.
However, as Sara mentioned, most people will be familiar with the lines from scrollbars or other draggable items.
As affordance is defined "A property in which the physical characteristics of an object or environment influence its function", you can argue that before the popularity of hamburger icons, their affordance is draggable item.
However, the button in which the icon resides will signify to people that this is nothing but an icon of a button, and the affordance of a button is click (outside UI design software, buttons can hardly ever be dragged). So the affordance is now clickable item. This will radically change if we are to remove the button boundaries from the button - the icon will then afford dragging.
I think luke wroblewski stated the same result once ago.
Not the answer you're looking for? Browse other questions tagged icons drag-n-drop or ask your own question.
What is the best icon to show that something can be dragged and reordered?
Should we use the 3x3 9-dots icon as an apps menu?
|
0.567219 |
Rabies is an acute, progressive viral encephalomyelitis that principally affects carnivores and bats, although it can affect any mammal. The disease is fatal, once clinical signs appear. Rabies is present in many countries worldwide, although a number of countries are free of the disease due either to successful elimination programs or to their island status and enforcement of rigorous quarantine regulations.
Rabies is caused by lyssaviruses in the Rhabdovirus family. Lyssaviruses are usually confined to one major reservoir species in a given geographic area, although spillover to other species is common.
Reservoirs of rabies vary throughout the world. Canine rabies predominates in Africa, Asia, Latin America, and the Middle East. In North America and Europe, where canine rabies (rabies maintained by dog-to-dog transmission) has been eliminated, rabies is maintained in wildlife.
For many years, skunks were the most commonly reported rabid animal in the USA, but since 1990, rabid raccoons have been the most numerous. Canine rabies became established in dogs and coyotes (Canis latrans) in southern Texas, but was eliminated. Canine rabies persists in Mexico, with the potential to spread throughout the USA if reintroduced. Skunk, raccoon, and fox rabies are each found in fairly distinct geographic regions of North America, although some overlap occurs. Bat rabies is distributed throughout the Americas. The vampire bat is an important reservoir in Latin America, and is the source of multiple outbreaks in cattle, as well as in humans, particularly in parts of Amazonia.
Other wild species play an important role in the transmission of rabies in certain areas, including mongooses in the Caribbean, southern Africa, and parts of Asia; jackals in parts of Africa; and wolves in parts of northern Europe.
Transmission almost always occurs via introduction of virus-laden saliva into tissues, usually by the bite of a rabid animal. Although much less likely, it is possible for virus from saliva, salivary glands, or brain to cause infection by entering the body through fresh wounds or intact mucous membranes. Usually, saliva is infectious at the time that clinical signs occur, but it is possible for domestic dogs, cats, and ferrets to shed virus for several days before onset of clinical signs. Viral shedding in skunks has been reported for up to 8 days prior to onset of signs.
The incubation period is both prolonged and variable. Typically, the virus remains at the inoculation site for a considerable time. The unusual length of the incubation period helps to explain the effective action of local infiltration of rabies immune globulin during human postexposure prophylaxis, even days after exposure. Most rabies cases in dogs develop within 21–80 days after exposure, but the incubation period may be shorter or considerably longer.
The virus travels via the peripheral nerves to the spinal cord and ascends to the brain. After reaching the brain, the virus travels via peripheral nerves to the salivary glands. If an animal is capable of transmitting rabies via its saliva, virus will be detectable in the brain. Virus is shed intermittently in the saliva.
Clinical signs of rabies are rarely definitive. Rabid animals of all species usually exhibit typical signs of central nervous system (CNS) disturbance, with minor variations among species. The most reliable signs, regardless of species, are acute behavioral changes and unexplained progressive paralysis. Behavioral changes may include sudden anorexia, signs of apprehension or nervousness, irritability, and hyperexcitability (including priapism). The animal may seek solitude. Ataxia, altered phonation, and changes in temperament are apparent. Uncharacteristic aggressiveness may develop—a normally docile animal may suddenly become vicious. Commonly, rabid wild animals may lose their fear of humans, and species that are normally nocturnal may be seen wandering about during the daytime.
The clinical course may be divided into 3 general phases—prodromal, acute excitative, and paralytic/endstage. However, this division is of limited practical value because of the variability of signs and the irregular lengths of the phases. During the prodromal period, which lasts ∼1–3 days, animals show only vague nonspecific signs, which intensify rapidly. The disease progresses rapidly after the onset of paralysis, and death is virtually certain a few days thereafter. Some animals die rapidly without marked clinical signs.
The term “furious rabies” refers to animals in which aggression (the acute neural excitative phase) is pronounced. “Dumb or paralytic rabies” refers to animals in which the behavioral changes are minimal, and the disease is manifest principally by paralysis.
This is the classic “mad-dog syndrome,” although it may be seen in all species. There is rarely evidence of paralysis during this stage. The animal becomes irritable and, with the slightest provocation, may viciously and aggressively use its teeth, claws, horns, or hooves. The posture and expression is one of alertness and anxiety, with pupils dilated. Noise may invite attack. Such animals lose caution and fear of humans and other animals. Carnivores with this form of rabies frequently roam extensively, attacking other animals, including people, and any moving object. They commonly swallow foreign objects, eg, feces, straw, sticks, and stones. Rabid dogs may chew the wire and frame of their cages, breaking their teeth, and will follow a hand moved in front of the cage, attempting to bite. Young pups can seek human companionship and are overly playful, but bite even when petted, usually becoming vicious in a few hours. Rabid skunks may seek out and attack litters of puppies or kittens. Rabid domestic cats and bobcats can attack suddenly, biting and scratching viciously. As the disease progresses, muscular incoordination and seizures are common. Death results from progressive paralysis.
This is manifest by ataxia and paralysis of the throat and masseter muscles, often with profuse salivation and the inability to swallow. Dropping of the lower jaw is common in dogs. Owners frequently examine the mouth of dogs and livestock searching for a foreign body or administer medication with their bare hands, thereby exposing themselves to rabies. These animals may not be vicious and rarely attempt to bite. The paralysis progresses rapidly to all parts of the body, and coma and death follow in a few hours.
In general, rabies should be suspected in terrestrial wildlife acting abnormally. The same is true of bats that can be seen flying in the daytime, resting on the ground, paralyzed and unable to fly, attacking people or other animals, or fighting.
Clinical diagnosis is difficult, especially in areas where rabies is uncommon and should not be relied on when making public health decisions. In the early stages, rabies can easily be confused with other diseases or with normal aggressive tendencies. Therefore, when rabies is suspected and definitive diagnosis is required, laboratory confirmation is indicated. Suspect animals should be euthanized and the head removed for laboratory shipment.
Rabies diagnosis should be done by a qualified laboratory, designated by the local or state health department in accordance with established standardized national protocols for rabies testing. Immunofluorescence microscopy on fresh brain tissue, which allows direct visual observation of a specific antigen-antibody reaction, is the current test of choice. When properly used, it can establish a highly specific diagnosis within a few hours. Brain tissues examined must include medulla oblongata and cerebellum (and should be preserved by refrigeration with wet ice or cold packs).
|
0.99886 |
Can solar panels look attractive?
While selecting solar panels for your rooftop, most of the emphasis is on aspects like capacity, cost economics, returns etc. For many rooftop owners, putting up solar panels is also a matter of pride and reputation. And what better way to keep your reputation than installing solar panels that look good. Very often, the aesthetics of solar panels can be pretty important too.
There have been cases where solar projects were blocked due to bad appearance or affecting the visual space of residents. This has been especially seen in the case of historic buildings or home associations. Even homeowners have hesitated to go for solar systems due to reservations on how solar panels look.
Now, whether solar panels look good on a rooftop or not is a matter of perception. Nevertheless, with so many solar solutions on offer by installers, finding a solar solution that is both economic and aesthetically pleasing is no more a difficult task.
More often than not, the appearance of a solar system on your rooftop can be improved by making simple design tweaks such as placing the panels in a way that is less conspicuous to the observer or away from the visible portion of the home, thereby minimizing distractions.
One interesting solution to make solar panels look attractive is to use BIPVs (building-integrated photovoltaics). These form part of the roof by replacing roofing materials like glass, window, skylight etc. and additionally producing solar power. They come in various shapes and designs with numerous solution offerings for integrating well with your building. Despite being an expensive solution, these are being increasingly adopted due to the twin benefits of replacing roofing material plus generating solar power.
|
0.953577 |
A rat does not know that it knows. Structuralist Dependency Theory Structuralists argued that capitalist development in the periphery was possible, even starting off in a dependent relationship with the center, and that foreign investment was not detrimental to growth. To improve the analogy, one should suppose that there is no Supernatural Shuffler involved.
So, he advocated relationism and rejected Newton's substantivalism. Time ends for any object that falls into a black hole.
This nothingness is the philosopher's nothing, not the physicist's vacuum; it is the absence of all time, as well as all fields, matter, and space. He spoke of our mind structuring our perceptions so that space always has a Euclidean geometry, and time has the structure of the mathematical line.
Mechanics,forward, translated by J. For us and other objects not inside a black hole, the future is very probably infinite.
Discussions about Dependency Theory There continue to be many discussions centered on dependency theory of development and its applicability to helping understanding issues in international relations.
Based on hieroglyphic prototypes, but also including entirely new symbols, each sign apparently stood for a consonant rather than a word: The first example demonstrates how dependencies can be injected into the function using parameter names. Physicists generally consider statements that are factual and so not conventional to be invariant under change of reference frame.
Dependency and autonomy referred to the degree of development of the political structure and the ability or lack of ability of local political elites to take economic decision making into their own hands.
In the early days of television broadcasting, engineers worried about the problem of keeping audio and video signals synchronized. Relativity theory implies that part of the correct answer to the question "What is time?
If space or spacetime curve, then a Cartesian coordinate system will not be applicable, and more exotic coordinate systems must be used. In the fifth century, Augustine disagreed with Aristotle and said the past is finite because time came into existence by an act of God.
This change is propagated at the speed of light, not instantaneously. Yet another position is that the debate between substantivalism and relationism no longer makes sense given the new terminology of the general theory of relativity because the very distinction between spacetime and event in spacetime, or between space and matter, has broken down.
Neuroscientists and psychologists have investigated whether they can speed up our minds relative to a duration of physical time. In this way, we can say a specific point event has just one temporal coordinate t1, with t1 being some real number with a unit, such as a second; and we can say that at t1 the event has just one ordered set of spatial location coordinates x1, y1, z1, which is an ordered triple of real numbers, all having units such as meters.
The electrolyte concentration is given as it is an important variable in determining the cell potential. Two people with good clocks who move relative to each other will find that their clocks get out of syncyhrony with each other, yet both clocks are showing the correct proper time.
But this speed limit is not the limit for how fast space itself can expand or contract. We are lucky we live in a universe with so many different processes that can be used for clocks: Big Snap the fabric of space suddenly reveals a lethal granular nature when stretched too much.
According to special relativity, spacetime does not curve and space also does not curve. Take the time at which the event ends, and subtract the time it starts. The word "adequate" here means successful for the purposes we have for using a clock, for example for measuring lifetimes of mountain ranges or for measuring the duration of a photon interacting with another photon.
The standard electrode potential for the SHE is zero, by definition. General relativity also implies time is intimately linked to space, and that time is a distinguished dimension of a more basic entity, spacetime. The periphery then would jump into the monopolistic phase of capitalistic development, with local governments controlled by the monopolists.
The scientific theories don't always agree, but when they don't disagree, the scientific community trusts their implications for time.
Using a stationary clock, suppose you correctly measure an event to have lasted t seconds. Development and underdevelopment were economic categories related to the degree of development of the productive structure and to its level of technological development.
In some of neuroscientist David Eagleman's experiments, he has shown clearly that a person can be tricked into believing event A occurred before event B, when in fact the two occurred in the reverse order according to clock time.
They want to be told more about the nature of time.
These avenues definitely affect the ease with which pulses of neurotransmitters can be sent from one neuron to a neighboring neuron and thus affect our psychological time, but so far, none of these avenues has led to success productivity-wise.
History of the Debate after Kant Inthe philosopher Sydney Shoemaker presented a thought experiment in favor of substantivalism. Everyone agrees time cannot be measured without there being changes, but the present issue is whether time exists without changes. Those who answer "yes" tend to accept McTaggart's A-theory of time.How to Write a Persuasive Essay.
In this Article: Article Summary Writing Persuasively Laying the Groundwork Drafting Your Essay Polishing Your Essay Sample Persuasive Essays Community Q&A A persuasive essay is an essay used to convince a reader about.
Modernization theory is that positive material growth yields positive social equality. Dependency theory states that a dependent economy yields or brings social inequality, which in turn can lead to political authoritarianism.
1) Structural Dependency 2) Control Dependency 3) Data Dependency.
These dependencies may introduce stalls in the pipeline. Stall: A stall is a cycle in the pipeline without new input. Structural dependency. This dependency arises due to the resource conflict in the pipeline. Marxist Dependency Theory.
Marxists would argue that development in the periphery was impossible, while structuralisms would argue that dependent development was feasible. The vigorous growth in some parts of the developing world in the s and s seemed to justify the views of the latter group.
In our series “25 Years after the fall of the Berlin Wall”, we are looking at Central and Eastern European countries to see how their relations with Europe (and Russia) have evolved over time, and how their internal economic and political situations have changed since the fall of the Soviet.
Electrochemistry is the branch of physical chemistry that studies the relationship between electricity, as a measurable and quantitative phenomenon, and identifiable chemical change, with either electricity considered an outcome of a particular chemical change or vice agronumericus.com reactions involve electric charges moving between electrodes and an electrolyte (or ionic species in a solution).
|
0.945203 |
Write a customer review. The Maggi news was on every channel. Nestlé had gotten official clearance from the Bombay High Court in October and spent weeks preparing. Then he sent her one more message: The list Food Processing, a food industry publication, ranks the top food and beverage processors in the U. Nestlé India also got a boost in late July from the arrival of Suresh Narayanan as its new top executive. How do we know this?
|
0.999501 |
If you are someone who loves a do-it-yourself project and some woodwork in your backyard, then building your own shed may be the right project to get started. While the task may be a daunting one, it is a rewarding experience if you plan well and ahead. Usually the steps are pretty straightforward and by following instructions, it will be quite a simple endeavor. Find below some basic steps that you can help get started on building your shed.
The most crucial first step is to identify the purpose of your shed and what you will use it for. This will determine the shape, size and the materials you will need to start building it. Some of the common uses of a shed are for storing lawn and yard equipment. You can also store household tools and equipment instead of using cheap self storage facilities. However, if this is the case some sheds may require additional features such as climate control depending on what is stored. If it is a workshop shed then, it will have to be bigger as you would need space to move around, closets and the ability to comfortably work inside. The most complex shed would be to park a vehicle, in which case it would require a large amount of space with solid foundations and easy front access.
After determining the purpose, you will have a fairly clear picture of how complex the project is. Accordingly, you can start designing the shed and if you are building it from scratch, make sure to plan everything and have a blueprint for each section such as the foundation, back wall, front with door, side walls with windows, roof rafters, roof decking and flooring to name a few. In each section, make sure you plan out the materials you will be using keeping in mind the purpose of the shed. For example; if you don’t plan on wiring the shed for electricity, then the windows will be the only source of light. Thus, the placement of the windows to ensure maximum sunlight will be helpful.
There are certain areas and states that require special permits if a shed is over a certain size, even if it is in your own backyard. Therefore, be sure to check with your local authorities that you can legally build the shed. If by any chance, you require a building permit, then you will have to work with a building inspector to which you will have to follow certain criteria in order to start construction.
When it comes to finding an ideal spot in your backyard to build a shed, there are several factors that you must take in to consideration. These factors include the location of the utility such as electricity and water lines. You must never build over these major lines as this will disrupt any repairs or work that needs to be done on them. Other factors include ground angle, trees, and property lines.
|
0.999976 |
Describe the electric strike that you need by selecting from a list of attributes.
The New Definition for RIM Strike Performance and Value Is Now In Stock!
Camden CX-ED1259L is a Grade 1 slim-line, surface mount, electric RIM strike with 1,500 lbs. static strength, is for use with exit devices. The strike offers 'universal' performance with selectable 12/24V, AC/DC, fail safe/fail secure operation and includes 2 spacer plates and horizontal adjustment.
The CX-ED1079L and CX-ED1079DL 'Universal' grade 1 ANSI strike for cylindrical locksets, and selectable 12/24V AC/DC, fail safe/fail secure, have horizontal adjustment and come with 3 stainless steel faceplates.
Camden CX-ED1410 Grade 1 ANSI strike for cylindrical locksets offer the very best strike quality and performance, with a stainless steel faceplate provided. The 'ANSI' fire strike design delivers unparalleled application flexibility, with field selectable voltage and fail safe/fail secure operation.
CX-ED1579L Grade 1 electric strike for mortise and cylindrical locksets offers the very best strike quality and features, with the added value of built-in latch monitoring, 5 stainless steel faceplates and 'Universal' performance, and field selectable voltage and fail safe/fail secure operation.
The CX-ED2079 (12/24V) and CX-ED2071 (8-16V) low profile 'Universal' grade 2 ANSI strike for cylindrical locksets, provide exceptional value, with 3 faceplates, and fail safe/fail secure and horizontal adjustment.
Series 20 Pre Load electric strikes offer the highest pre load rating,12/24V AC/DC operation, adjustable keeper, fail safe/fail secure operation, and latch monitoring. Latch cavity accommodates cylindrical locksets with 1/2" to 5/8" projection.
Camden 'Value Line' electric strikes include models for use with centerline cylindrical and mortise lockset and ideal for a wide range of light duty applications, particularly for use with telephone entry systems in small multi-unit residential buildings.
Camden 12 VDC and 24 VDC glass door electric strikes are designed for single swing glass doors, 1/2" (12.7mm) thick. The strikes are reversible for left and right handed doors and can be installed at top or side of door.
|
0.980972 |
The full moon called to my lone wolf. I responded. I centred myself and express my desire to meet my lone wolf.
I saw her quickly emerged from the shadow, she was beautiful with silvery white fur, watching me with crystal-clear eyes. I saw her. Then I hugged her and started crying. I wasn't even sure if it was the joy of reunion, or the pain of separation, or the regret of neglecting her.
She was calm, offering comfort with her fluffy silvery-white hair. I kept whispering 'i love you', pouring my heart and tears out. The more I cried, the more I felt she was truly me. And eventually I whispered, 'I love me.' She smiled and told me I was loved, I was ready.
There was a magnetic force between us. I knew we were going to merge. I asked fearfully, 'do you want to merge?' Before I finished the question, she gave me the answer. There was no merging, because I am her, and she is me.
She told me, we connected solely by the heart, and when we were connected, there was no merging or separation, we just were one.
'It is the heart.' She said. I understood what she meant. When I tried to explain, I lost words. Words cannot describe how the heart manifested our being. It is indeed the heart. When I surrendered and allowed myself to connect with my heart, she came into my forehead.
'Let me guide your steps, trust me with your path.' Then her head came out of my forehead, leading the way. Soon it wasn't enough. I felt a tingle in me and knew it was the signal. Then I shapeshifted into her, my lone wolf.
My senses heightened. I see different colours, shapes and geometries. They showed me the way my heart desired. To the right. And I ran. I saw my pack, but I knew it was not time to go join them yet. I needed to fully experience me. I could smell my path.
When my limbs and mind stopped flying, my lone wolf told me, 'You are ready. Let me lead the way. It is ok if we make mistakes. It helps us to see our true heart and our true desire.' I left that place, opened my eyes and looked at the full moon.
Thank you for taking me for a walk, my lone wolf.
|
0.931628 |
Direction (Q. 1 - 10) : In the following passage there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, four words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case.
This happened thousands of years ago. Life was hard as people had to do all the work by themselves. A large number of people were (1) they would travel from one place to another in search of food and shelter. While travelling one day, a man arrived at the (2) of a desert. He was walking on the sand, when suddenly, he came across a frightening.creature - it had extremely long, thin legs, a giant hump and a long neck. It was this neck that he extended towards the man, who scared out of his (3) , ran away from the spot. The following day, he met the creature again. It was standing near a lake, (4) water. This time, the man was fascinated at what he saw - the creature putting its long neck into the lake and drinking water continuously. Then suddenly, aware it was being watched, the giant creature looked up and stared straight into the eyes of the man standing across. But this time, an (5) of water separated the two, and the man did not run away. He stood and watched the animal, which made no effort to come closer: In the following weeks, the man saw more such creaturs. again and again. It seemed they were all over the desert, aimlessly walking about for miles on (6). The mao began to observe the creatures very closely. He saw that they were vegetarian. Moreover, despite their huge size, they were remarkably meek and (7). And the stamina the creatures had wras (8). They could walk the entire length of the desert w ilhout being exhausted Observing them the man thought, "What if I (9) this creature and make it ferry all my stuff ? I could then make the desert my home." So, one day, while one of the creatures was dozing, the man went up to it and put a bridle in its mouth. Then he rode around on it, after placing an enormous amount of load on its back. With that, the taming of the came! was complete (for that was who the creature was). And ever since that day, the camel has faithfully (10) up to its title of 'Ship of the Desert'.
This happened thousands of years ago. Life was hard as people had to do all the work by themselves. A large number of people were (1) they would travel from one place to another in search of food and shelter. While travelling one day, a man arrived at the (2) of a desert. He was walking on the sand, when suddenly, he came across a frightening.creature - it had extremely long, thin legs, a giant hump and a long neck. It was this neck that he extended towards the man, who scared out of his (3), ran away from the spot. The following day, he met the creature again. It was standing near a lake, (4) water. This time, the man was fascinated at what he saw - the creature putting its long neck into the lake and drinking water continuously. Then suddenly, aware it was being watched, the giant creature looked up and stared straight into the eyes of the man standing across. But this time, an (5) of water separated the two, and the man did not run away. He stood and watched the animal, which made no effort to come closer: In the following weeks, the man saw more such creaturs. again and again. It seemed they were all over the desert, aimlessly walking about for miles on (6). The mao began to observe the creatures very closely. He saw that they were vegetarian. Moreover, despite their huge size, they were remarkably meek and (7). And the stamina the creatures had wras (8). They could walk the entire length of the desert w ilhout being exhausted Observing them the man thought, "What if I (9) this creature and make it ferry all my stuff ? I could then make the desert my home." So, one day, while one of the creatures was dozing, the man went up to it and put a bridle in its mouth. Then he rode around on it, after placing an enormous amount of load on its back. With that, the taming of the came! was complete (for that was who the creature was). And ever since that day, the camel has faithfully (10) up to its title of 'Ship of the Desert'.
|
0.999451 |
When was the last time you inspected your climbing harness? Do you know how old it is and if it needs to be retired? As a climber, it is your responsibility to inspect your gear before or after each use to help reduce the inherent risks of climbing. If your harness is showing unexpected degradation, it should be quarantined until a detailed inspection can be done.
Step 1: Review the conditions in which the harness has been used and identify any “exceptional events” during its lifespan (examples: falls, exposure to extreme temperatures, modification outside of manufacturer’s facilities, etc).
Step 2: Verify the presence and legibility of the serial number and the CE mark. Please note that the serial number on your climbing harness could be one of two styles. See below for details on each type of serial number.
Step 3: Verify that the maximum product lifetime–10 years–has not been exceeded.
Step 4: Compare with a new harness to verify there are no modifications or missing elements.
Step 5: Check the waist belt straps, bias tapes, leg loop straps, and shoulder straps for any cuts, swelling, damage, and wear from overuse, heat, or contact with chemicals. Be sure to check the areas hidden by the buckles.
Step 6: Check the condition of the safety stitching on both sides. Look for any threads that are loose, worn, or cut. The safety stitching is identified by thread of a different colour than that of the webbing.
Step 7: Check the belay loop for any cuts, swelling, damage, and wear due to use, heat, or contact with chemicals.
Step 8: Check the condition of the protective webbing on the tie-in points for any cuts, swelling, damage, and wear due to use, heat, or contact with chemicals. Certain harnesses (e.g. SIMBA, LUNA, SELENA, ADJAMA, SAMA) have a red wear indicator on the lower tie-in point. Retire your harness if this indicator is visible.
Step 9: Check the condition of the adjustment buckles for any marks, cracks, wear, deformation, corrosion, etc.
Step 10: Check that the straps are correctly threaded, with no twists.
Step 11: Verify that the buckles operate properly.
Step 12: Check the condition of the waist and leg foams for any cuts, wear, tears, etc.
Step 13: Check the condition of the elastic keepers and leg loop elastics for any cuts, wear, tears, etc.
Step 14: Check the condition of the equipment loops for any cuts, wear, tears, etc.
If any element of your harness is marked as “To repair”, you should refrain from using it until any possible repairs can be made. If an element was marked as “Do not use, retire”, you should destroy it to prevent further use and purchase a new one.
Posted in General News, Tips, Guides, How To's.
|
0.992391 |
When a customer or user chooses the new channel as a first interaction with a business, existing channels can struggle to capture the fancy of the customer.
Here's our table. Let's look at the app-only audience.
Re-Visit Rate = (100 + 300 + 200) / (100 + 300 + 200 + 1,000) = 37.5%.
Re-Visit Index, Website = 100 / 600 = 16.7%.
Re-Visit Index, App = 300 / 600 = 50.0%.
Re-Visit Index, Website + App = 200 / 600 = 33.3%.
The clear preference of the customer is to use only the app. Some customers/users will use both the website and the app.
When you see trends like this, you know that the app is going to win, long-term. And if the app is going to be the preferred channel, long-term, you have a responsibility to educate the rest of your management team about the implications of this shift in customer behavior. The new channel is clearly going to command the interest of the customer, and needs to be developed accordingly. Conversely, the existing channel is going to experience a slow customer drain over time --- if the existing channel is responsible for generating advertising revenue, then a lot of thought needs to go into how your brand will maintain a steady diet of advertising revenue when channel shift really takes hold.
Just wondering if more websites were mobile optimized if the results might be different ?
|
0.999689 |
MEIN Kampf, Adolf Hitler's infamous and evil autobiography, is where the Nazi leader laid out his disgusting vision of the future.
A new version of the extensive work, whose title translates as 'My Struggle', became a bestseller in Germany after selling 85,000 copies since being published a year ago. But what else do we know about the book? When was it written and is it banned?
When did Adolf Hitler write Mein Kampf?
Hitler began work on Mein Kampf when he was imprisoned following his failed 'Munich Putsch' coup in November 1923.
Initially sentenced to five years at Landsberg Prison, he only served a year before being pardoned by the Bavarian government and released.
Hitler dictated much of the book to fellow prisoner Rudolf Hess, a prominent Nazi who later became Deputy Fuhrer and later helped to edit the book.
Initially, the Nazi leader wanted the book to be called "Viereinhalb Jahre (des Kampfes) gegen Lüge, Dummheit und Feigheit", which translates as "Four and a Half Years (of Struggle) Against Lies, Stupidity and Cowardice".
However, he was convinced by Nazi publisher Max Amann to change it to the more concise Mein Kampf - "my struggle".
Following his release from Landsberg, Hitler decamped to a hut in the alpine town of Berchtesgaden, where he would later build his famous "Eagle's Nest" chalet, to finish the book.
It became so long that it was published in two volumes, in 1925 and 1926.
The book was incredibly popular, selling 228,000 copies between 1925 and 1932 – and an astonishing one million in 1933, after Hitler came to power.
What is in Mein Kampf?
The book lays out the outline of much of what would characterise Hitler and the Nazi Party's time in power.
He divides humans into categories based on physical appearance, asserting that the blond-haired, blue-eyed Aryan race are above all others.
There are also clues towards the rampantly militaristic foreign policy Germany pursued under the Nazi leader in his passages on Lebensraum – or "living space".
"We National Socialists (Nazis) consciously draw a line beneath the foreign policy tendency of our pre-War period," Hitler writes.
"We take up where we broke off six hundred years ago. We stop the endless German movement to the south and west, and turn our gaze toward the land in the east."
Was the book banned in Germany?
The 2016, annotated version of Mein Kampf is the first to be published in Germany since the end of World War II.
The publisher spent years adding comments to Hitler’s original text in an effort to highlight his propaganda and mistakes.
Before the copyright on the book held by Bavaria’s state finance ministry expired at the end of 2015, the ministry had used it prevent the publication of new editions in the country.
Despite its incendiary content, the book wasn’t actually banned in Germany and could be found online, in secondhand bookshops and in libraries.
A far-right publisher announced last year that it planned to produce an edition “without annoying commentary,” prompting an investigation of suspected incitement.
|
0.906127 |
Fernando Verdasco saved three match points on his way to a stunning victory over Serbia's Janko Tipsarevic in the second round of the Australian Open.
The Spanish ninth seed looked to be on his way home at two sets down and again when Tipsarevic served for the match in the fourth set when leading 6-5.
But Verdasco hung in there, saving one of the match points with a stunning running pass down the line from way out of the court, and eventually came through 2-6 4-6 6-4 7-6 (7/0) 6-0.
Having been taken to the fourth set breaker Tipsarevic crumbled, winning just five points the rest of the way.
Verdasco will now meet Kei Nishikori, the young Japanese player beating Germany's Florian Mayer 6-4 6-3 0-6 6-3.
Andy Roddick, the eighth seed, overcame a tight first set to see off Igor Kunitsyn 7-6 (9/7) 6-2 6-3 and the American was pleased to have got through in a little over two hours.
'It could have got uncomfortable today if that first set had got away,' he said.
'You always try to convince yourself it is a good thing to get through a tough set like that, but going into the match, if you're given an option, you want it to be as easy as possible every time.
'I feel like I'm hitting the ball fine. I'm serving very well, controlling the match with that right now. That's always a good thing for me.
Roddick, the 2003 US Open champion, has reached the Australian Open semi-finals on four occasions, and was his usual bundle of energy against Kunitsyn.
'I have a tough time remembering what my excitement level was back in 2002,' he added.
Roddick, who takes on Dutchman Robin Haase next in Melbourne, tipped his hat to grand slam record holder Roger Federer for his continued hunger for the game at 29.
'He enjoys himself,' the American said. 'Unlike some champions in the past, I don't think it's a tortured existence to be good at this game for him. He honestly enjoys it.
Tomas Berdych, the 2010 Wimbledon finalist and sixth seed, beat Germany's Philipp Kohlschreiber 4-6 6-2 6-3 6-4, while 17th seed Ivan Ljubicic saw off Benoit Paire 6-3 6-7 (2/7) 6-4 7-6 (7/5).
Berdych will meet 28th seeded Frenchman Richard Gasquet next. Gasquet today beat countryman Adrian Mannarino in straight sets.
Mardy Fish is out, though, after losing to Spain's Tommy Robredo. The 16th-seeded American started well before Robredo upped his game to go through courtesy of a 1-6 6-3 6-3 6-3 triumph.
Novak Djokovic advanced to the third round but made hard work of Croatian Ivan Dodig.
The third-seed toiled through the opening two sets as Dodig held his own before finally upping his game to record a 7-5 6-7 (8/10) 6-0 6-2 victory in two hours 21 minutes.
It was a baffling display from Djokovic. Normally such an effervescent character on court, for long periods he looked out of sorts and disinterested, allowing a player 78 places below him in the rankings to dictate the play.
Djokovic was particularly subdued early on before coming to life in the latter stages of the first set.
He earned a set point at 5-4 up but could not convert, dumping a weak backhand into the net.
But he made no mistake in Dodig's next service game, creating two more chances and taking the second with a drive volley behind his opponent.
Dodig continued to trade blows with his more illustrious opponent in the second set but he failed to capitalise on the chances he created, two break points opportunities coming and going as Djokovic hung in there despite playing well below his best.
And, typically, Djokovic struck in the very next game to establish a 5-3 lead.
Dodig was not done, though, and he hit back immediately with his first break of the match and the set eventually went to a tie-break.
Both players had their chances but it was Dodig who found the breakthrough at the third time of asking.
Djokovic responded by breaking at the start of the third set and again to establish a 3-0 lead.
And he continued his barrage as Dodig faltered once more on serve, Djokovic wrapping up the set in just 28 minutes.
Dodig was battling hard but the gulf in class was now apparent as Djokovic ran through the fourth set as well to set up a third-round meeting with countryman Viktor Troicki.
Meanwhile, Andy Murray will have to cope with the changeable Melbourne weather and an opponent who has vowed to create 'trouble" for him when he continues his bid to win the Australian Open tomorrow.
Murray eased into round two after seeing off Karol Beck on Tuesday, the Slovakian retiring with a shoulder injury when 6-3 6-1 4-2 down, and now comes up against personable Ukrainian Illya Marchenko.
World No 79 Marchenko, who helped his country beat Great Britain in a Davis Cup tie in Glasgow in 2009, is aware of how important the match could be as he plots a rise up the rankings and is prepared to scrap all the way against fifth seed Murray.
'The next game is going to be more difficult but I will do everything I can,' said the 23-year-old from Dneprodzerzhinsk, who enjoyed a straight-sets win over Ruben Ramirez Hidalgo in the first round.
While Murray admits he knows little about Marchenko, the same cannot be said in reverse.
'I know him better than he knows me but he doesn't really care how I play,' Marchenko added. 'He will focus on his game and I will focus on mine.
In addition to a fired-up opponent, Murray will have to work out the conditions, which have ranged from customary heat to unseasonal chilliness in the Victorian capital.
'It's different to what we normally have here,' the Scot admitted. 'Yesterday was actually pretty cold and it changes the way the court plays a lot.
'It comes through quite low, whereas I'm sure in the next round later on in the week when it gets warmer the ball is gong to be bouncing very high. It's very different tennis.
|
0.995806 |
Do you need any tech support to uninstall l1neum 1.3 on your Mac? Is there any problem cause you cannot remove it smoothly on your machine? This is a removal guide that help you to troubleshoot your problem and get rid of it on your PC.
l1neum 1.3 is categorized as a Others application that the current version is , and can be installed and operated in ,people usually can install it via dragging its package to the Applications folder.
These problems are often the ones that happening when you try to uninstall l1neum 1.3 on the Mac computer. So, how about the right way to remove this program as well as other installed applications effectively on Mac?
If dragging the target app to Trash is currently all you know about the program removal on Mac, you can update the experiences and knowledge now and make clear the correct way to manually uninstall l1neum 1.3 thoroughly on the computer.
As a matter of fact, many people don't want the program removal on their Mac computers become so complicated and annoying, no matter it's to remove l1neum 1.3 or other installed applications. Therefore, I would like to recommend another way which is much more effective and useful to get rid of the unwanted program: invite a third party remover. The specific uninstall tool can replace the user to conduct the program removal automatically, and more importantly, it will not leave any leftover issue on your computer after the removal.
Osx Uninstaller is a professional removal that can do a clean removal for the application, including the l1neum 1.3, when uninstall l1neum 1.3 with Osx Uninstaller instead of the manual removal, you will find that the program removal become much easier, and there is no any further issue after the standard removal on the utility.
After restarting the computer when finish the removal, you will find that all the things related to l1neum 1.3 have been totally removed on the Mac, and you cannot find any vestige on the hard disk. Additionally, the removal utility does not create any other operation problem or removing issue on the computer.
If it is for sure that the associated files and folders are cleared well in these folders in the Library, but there are still some vestiges remaining on the computer, and cause you resulted in the same situation: incomplete removal for the l1neum 1.3, you should consider to check whether there is a kernel extension or hidden file on your Mac, because they may not locate on the Library and are not so obvious and easy to be found. In this situation, you will need the help of Google, and search about the related component of the specific application, and then check them one by one on your Mac to erase them completely.
Don't want to be revolved in such a troublesome situation when uninstall l1neum 1.3 as well as other applications on the Mac, download and install Osx Uninstaller to handle the app removal more easily and effectively now.
|
0.994698 |
Why does the OT time estimate stop decreasing as I ask for progressively poorer sensitivity?
"Broadly speaking, the OT time estimates are arrived at by (silently and invisibly) converting the information in the Science Goal into the Scheduling Blocks that will be executed at the telescope. It does this by taking the required on-source times, the default times for the various calibrations (both of which are frequency- and array-dependent), the best estimate of the current overheads and latencies, as well as a standard time for how much on-source time an SB will typically contain (50~minutes for a 12-m Array SB). Required integration times that are longer than this will therefore require multiple executions of the same SB (each of which is called an Execution Block, or EB). On the other hand, the requested sensitivity can imply a very short amount of observing time and therefore the OT enforces a minimum amount of time that can be spent observing a single pointing (10~seconds). In addition, the total time for all sources combined cannot be less than 5~minutes (or 50~per~cent of the calibration time, whichever is largest)."
Therefore, as you ask for progressively poorer sensitivity (increase the value of the "desired sensitivity per pointing") for a Science Goal past some level, you will hit one of these limits and the total integration time will stop decreasing.
|
0.957929 |
As soon as it became apparent to Churchill that Hitler might launch an invasion of Britain after Dunkirk, urgent thought had to be given to every aspect of home defence. Boer Commandos taught the British the value of units that operated behind the enemy's frontline and were able to melt into their surroundings after they had attacked. Indeed, in the dark days following Dunkirk, Lieutenant Colonel Dudley Clarke RE, a South African who had been weaned on the exploits of the Boer Commandos had written a paper for Churchill and the War Cabinet in which he recommended the adoption of Boer tactics. This led to a serious consideration for a stay-behind resistance force, that would slow down advancing enemy troops and grant the regular army time to mount a counter-attack.
On 30 June 1940, Churchill invited General Thorne, one of his military advisors, to come to lunch at Chequers. That lunch at Chequers was to have even more far-reaching effects, for it revived an idea that General Thorne had first considered years before: the formation of a 'stay behind' guerrilla resistance force in Britain. They were not expected to count for much in direct combat with a superior invader, but since they had intimate knowledge of their terrain, and could be provided with stockpiled secret arms caches, they were reckoned to present an obstacle out of all proportion to their strength.
Major Gubbins (later to become Sir Colin Gubbins and to achieve fame as the head of SOE, (and pictured right), on his return to Britain from Norway in June 1940, was promoted to Colonel, and was instructed to create an underground army which would form the nucleus of a resistance movement in the event of a successful occupation of all or part of the UK by German invasion forces. This organisation was to be known by the codename of 'Auxiliary Units' and was to come under the direction of GHQ Home Forces, whose Commander in Chief, at that time was Field Marshal lronside.
Initially Colonel Gubbins requested and was given the support of some dozen officers, hand-picked from those known personally to him and on whom he could rely to 'get on with the job'. These were known vaguely as 'Intelligence Officers' and were to form the Regular Army units who were to be responsible for the organisation and local training of the proposed resistance movement.
In 1940, Peter Fleming (the brother of James Bond author Ian Fleming) was working for Military Intelligence (Research) - normally abbreviated to M.I.(R) - a semi-secret department within the War Office. M.I.(R) considered Fleming to be the best candidate to establish a British guerrilla unit, in particular one that would be comprised of men who could live off the land. So in a secluded farmhouse called the Garth in Bilting, Kent, Fleming set up the first regional training centre for a new, British, 'stay-behind' force. This, the first "Auxiliary Unit" was known by the cover name 'XII Corps Observation Unit'. The name Auxiliary was chosen because it was thought a suitably nondescript term that was unlikely to arouse unnecessary attention.
Intelligence suggested that, although the Germans might supplement their invasion attempt by the use of airborne forces, the main assault would be seaborne and might occur anywhere in the approximately 300 miles between the Norfolk and Hampshire coasts. Kent was considered the likeliest invasion area. The second most likely was East Anglia, and here, using Fleming's unit as a model, a similar organisation was set up. Then a third, in Sussex, around Lewes and Arundel, did likewise. By the end of August 1940 the Auxiliary Unit organisation stretched as far north as Brechin on Scotland's cast coast, south to Land's End and north of the Bristol Channel as far as Pembroke Dock.
M.I.(R) however, felt that the entire British coastline stretching from southern Wales eastwards round to Scotland was vulnerable and Auxiliary Unit patrols should deployed throughout this region accordingly. The best units were concentrated in southern England near the coast. In this way Auxiliary Units could be put to good use scouting and spotting areas the Nazis might use to expand a particular bridgehead as they began their inland push.
Strictly speaking a Unit is a composite thing, embracing location, weaponry and personnel. However, Auxiliary Units chose their own base location and often improvised weaponry, so post-war information often treats Units as personnel, and I have also used that simplification where convenient.
A member of the Auxiliary Units in Bath has sent me his memories of recruitment, training and exercises. He described himself as a member of the Bath Resistance Movement. I have placed it in the Memories section.
Auxiliary Unit sabotage missions would have had the effect of slowing down this build-up, buying time for the regular army to reach peak efficiency, and be deployed directly against the most threatened area. Eventually there were patrols all over the UK extending inland as far as Manchester and Hereford, and by late 1941 nearly 600 had been formed, comprising over 3,500 Auxiliaries.
Auxiliary Units comprised two parts. The first consisted of specially selected civilians with a good knowledge of their local area and physically capable of living rough and fighting and harassing enemy forces. The other part consisted of local wireless networks operated by Royal Corps of Signals personnel with outstations near the coast, each having a civilian operator. A system of spies and runners would supply information of enemy activity to these operators for relaying to the Signals control stations who would in turn transmit the information to the Area HQs attached to Brigade/Corps of the conventional forces. Each control station had from five to ten outstations, Southern England having a larger number as the more likely area to be invaded.
Because the Auxiliary Units were intended to operate behind enemy lines after an invasion, when Government offices and military bases had been captured, it was important that the enemy should find nothing in captured files that could alert them to the existence of a resistance organisation. Almost nothing was written down, which means that this part of wartime history can now only be pieced together from personal memories.
As well as the overriding need for secrecy, the Auxiliary Units were expected to improvise, and so there would be differences in individual experiences from unit to unit. Many of those involved will recognise most of what follows, but there could be differences in timescale and detail. It is written to be typical rather than definitive.
The Auxiliaries (or "Auxiliers" as they were sometimes known) were all to be part-time volunteers, recruited mainly from members of the recently formed Home Guard, and Gubbins was given the authority to requisition suitable men. These recruits varied in age and occupation, from young students, factory workers in reserved occupations, miners and farmers, to professional men like doctors and accountants. Age was no barrier, as long as the recruit was fit and capable of existing under the harsh conditions anticipated. Gamekeepers and countrymen of all sorts were much sought after, as well as those with experience of Scouting and woodsmanship.
Although the battalion numbers were created in the early days, most members did not know these identities existed, and it was considerably later that insignia were produced and issued, and some areas, including Bath, never received them at all. To avoid looking conspicuous, patrols usually wore the badges of their "notional parent" Home Guard Unit when wearing uniform, but avoided being seen in public in uniform if possible, in case Home Guard members were suspicious.
The recruits were told that as far as the units they were drawn from were concerned, they were being selected for special Home Guard duties, although in reality the Auxiliary Units had their own command structure under MI6 which was completely different from that of the Home Guard. Recruits were notionally 'posted' to one of three battalions, later numbered 201 (Scotland and Northern Counties), 202 (Midlands) and 203 (London and Southern Counties). Whilst these men publicly maintained that they were in the Home Guard but on special duties (and indeed any that had actually been recruited from the Home Guard usually kept and wore their original Home Guard insignia), this was purely a cover.
Since they were not enrolled as fighting men, they were not strictly covered by the Geneva Convention, although their uniform may have given them some degree of protection against being shot out of hand if captured. As part of their Home Guard cover, Auxiliaries wore the standard 1940 pattern battle-dress blouse and trousers, with the FS sidecap. The trousers were tucked into black or dark brown leather anklets over standard black ammunition boots. No equipment was worn, other than a webbing or leather waist belt, supporting a revolver holster.
As a concession to the 'dirty' conditions under which Auxiliary Units operated, either in training or more commonly, in the construction of their underground 'hideouts', they were given Overalls, Denim, comprising a separate blouse and trousers, worn over and to protect either their uniform or civilian clothing, together with black rubber short lace up boots having a waterproof tongue behind the lace eyelets. These were ideal for construction work or for moving soundlessly over paved surfaces. The rubberised brown groundsheet/cape was also issued and some units wore a woollen 'cap-comforter' with their denims.
This was the official position. In practice however, lapel badges were issued after the "Stand Down" at the end of 1944, and were presented by local area Intelligence Officers. It is thought that MI6 arranged it, but no records survive to prove or disprove this.
Insignia were minimal, the cap badge being that of the county regiment. The Home Guard shoulder title was worn on each shoulder, surmounting the battalion number and the county name or abbreviation, both in black on khaki denim patches. Off duty, members could be identified by a small metal lapel badge (pictured), bearing the three battalion numbers, in cross formation on the red and blue shield and crown of GHQ Home Forces. Some Auxiliaries wore better quality Army issue uniforms 'acquired' from friends or relatives in the Forces.
Likely recruits were vetted before being approached. Vetting was done by plain clothes or Special Branch police officers who made discreet enquiries from employers or neighbours without knowing or stating the purpose of the enquiry. Once recruited, volunteers were subject to the Official Secrets Act, and their wives and families were largely unaware of the special duties in which they were involved.
The movement was organised on the cell principle, the cell being a patrol of some five or six men led by a sergeant. A volunteer Group Leader, given the rank of a Home Guard Lieutenant or Captain, would be responsible for several such patrols within a ten or fifteen mile radius of his home, and certainly in the early days, this was the only contact between individual patrols. By September 1940, most counties had their own Intelligence Officer, who was often stationed in his home county because of his contacts. Each Intelligence officer was given a platoon of some dozen NCOs and men, to help him with the supervision, distribution of supplies to and local training of the Auxiliary Unit patrols in his area.
In June 1940 the selection and training of the patrol members began in earnest. Col. Andrew Croft was appointed as operational and training officer, and by the following November Croft had trained 24 seven- or eight-man groups in Essex and Suffolk. Croft then opted to return to Commando units, and the Auxiliary Units HQ and training centre moved to Coleshill House (pictured right), a Palladian mansion about 10 miles from Swindon, chosen by Colonel Gubbins because its large parklands and woods made it very very suitable for guerrilla training.
Auxiliary Units were given high priority in the provision of patrol weapons and explosive devices. Personal weapons were, with some exceptions, intended for defence rather than offence, as in no way was it proposed that they should fight pitched battles with superior forces but rather should avoid direct confrontation, killing only when necessary to achieve surprise or to effect material damage on the enemy's supply lines or stores. Explosives were to be the main offensive weapons of the Auxiliary Units, whose role was to attack the enemy's stores, transport and communications rather than his ground troops. But given the right sort of combustible target, a properly placed incendiary could do as much, if not more, damage to an enemy's stores and supplies as an explosive, and the Auxiliary Units were supplied with a variety of equipment for this purpose, which could be used, either on its own or in conjunction with explosives for greater effect. Every Auxiliary received training in the basic principles of making and using explosive and incendiary devices.
Thus patrols and individual Auxiliaries were sent to Coleshill for training in the use of explosives, sabotage, booby-traps and unarmed combat. Instruction in the latter was based on a book by W.E. Fairburn, designer of the Fairburn dagger (Field Service Fighting Knife). Having been a policeman in the seamier areas of Shanghai, Fairburn could write with authority on all the dirty tricks that could be employed in close combat, as well as on the art of silent killing. How well patrols had learned their training was thoroughly tested, often with patrols competing against each other. These tests were a combination of tests of knowledge and tests of effectiveness.
Secrecy was such that trainees did not report to Coleshill direct. They were instructed to call at the tiny post office in Highworth, where, on proof of their identity, the post-mistress would leave them, make a short phone call, and then advise them that transport was being sent to collect them.
Initial training was given by the Regular Army support troops, and such knowledge was passed on largely by word of mouth, and in the interests of security, no written training manuals were prepared. However, in July 1942, membership of the Auxiliary Units had grown to such an extent that some form of essential sabotage information was necessary as an aide-memoire for the volunteers. This was issued as a 42-page booklet, put together by a captain in the RE and which contained all the reminders that a well trained saboteur would need in practice. Apart from the standard government caution relating to the disclosure of information to unauthorised persons printed on the fly-leaf, there was no indication for whom this publication was intended.
As a doubtful concession to security, it was given a cover title which would not look out of place on any farmer's bookshelf, The Countryman's Diary - 1939. It was humorously issued 'With the Compliments of Highworth and Co' and stated that 'Highworth Fertilisers do their stuff unseen, until you see results!' This could well have become the operational motto of the three Auxiliary Unit Battalions!
Once the German plans for an early invasion of Britain had been deferred, the immediate need for Auxiliary Units had passed, and they were able to concentrate on the construction of their permanent bases, training and the acquisition of their weapons and explosives.
Local training largely took place at night, the patrols moving silently about their area, learning its characteristics and byways and practising the arts of demolition on tree trunks, abandoned railway tracks and derelict vehicles. Any 'nasty sounds of banging' were attributed by the local population to stray enemy aircraft discharging their bomb load before returning home.
Patrols also participated in group training and frequently assisted the Military in 'their areas with exercises or 'schemes', often playing their intended roles of saboteurs or guerrillas.
As 1944 approached the threat of invasion receded, although the patrols were maintained in a state of readiness. Gradually, some of their stores, particularly Plastic High Explosive and delay mechanisms were called in for use by the invasion troops or by the European Resistance. Meanwhile, the Intelligence Officers and their teams had been disbanded and posted to other units, many joining the SOE or SAS Regiment, where they applied their skills in clandestine operations in occupied Europe.
Yet it was considered that there was a possibility, albeit remote, that the Germans could mount a counter-invasion against southern England, and Auxiliary Units were alerted prior to D-Day. Some North Country patrols were moved to the Isle of Wight, which could have become a prime target, to increase the Auxiliary Unit presence there, and they carried out some preparatory work which, in the event, was not needed. Patrols in the south-west were also put on stand-by against a possible enemy air landing.
By November 1944, the fighting on the Continent was sufficiently advanced for the Auxiliary Units to be stood down. Their weapons and explosives (some, not all) were collected, any doubtful explosives being carefully destroyed. In that month, most County battalions held a standing down parade in their County town, where they were they were addressed by their Colonel-Commandant and individually presented with 'Home Guard' certificates (although they were still not members). When Defence Medals were issued to members of the Home Forces, Auxiliaries were overlooked, as they still had no official standing.
Of greater personal value to the Auxiliaries were the letters sent to each of them which confirmed and emphasised the secret nature of their duties. What had begun in secrecy ended in secrecy, and it was not until April 1945 that the existence of the British Resistance Movement was released to the Press.
Fortunately, it will never be known how effective the Auxiliary Units would have been in practice, but it is possible to speculate, based on the knowledge gained from the experiences of the European Resistance Movement. Certainly, Auxiliary Units had a head start on these, they were well organised, well trained and well supplied with the necessities for underground activities. It is generally considered that their effectiveness would have been high in comparison with their numbers, although the patrols themselves thought that their active life would not last longer than a few weeks.
Whilst casualties would have been serious and inevitable, there is no doubt that some members would have survived the initial actions and that these would either have gone to ground or returned unobtrusively to their homes, during the confusion of the early occupation. These men could have formed the nucleus of any National Resistance, acting as leaders to recruit and train the population as the harshness of the occupation became felt. Once the hidden stores of arms had been used up, patrols would have depended upon captured weapons. Like their European counterparts, any movement would have suffered from the activities of collaborators and informers, and all Auxiliaries were aware of the possible effect that their actions would have had on their families, friends and neighbours if reprisals were inflicted.
5th (Bath City) Battalion Somerset Home Guard, under the command of Lt. Col. G H Rogers.
6th (Admiralty) Battalion Somerset Home Guard, under the command of Lt. Col. D Morrison.
Intelligence officers were sent around the country to establish Auxiliary Units. Alan Crick was sent to Somerset and Dorset to organise Auxiliary Units there, and once formed, these Units were commanded by Captain Ian Fenwick, initially from a headquarters at 28 Monmouth Street, Bridgewater, but later moved to The Lodge, Bishop's Lydeard, near Taunton. Stores were held at Bishop's Lydeard.
There were five Auxiliary Unit patrols notionally attached to the 5th Battalion and another five notionally attached to the 6th.
Captain Shackell's command was not restricted to Bath, but included Norton St Philip, Radstock and Midsomer Norton. At the time of the "stand down" he was the area Intelligence Officer.
The five Bath City patrols were Swainswick, Bathampton, Weston, Englishcome and Southstoke. These patrols were commanded by Capt. Malcolm T. Shackell (Swainswick Patrol) and Lt. William Ralph Hornett.
This patrol had its hideout in the south corner of Bare Wood just below the Gloucester Road. The major objective for the patrol was Colerne airfield.
This patrol had its hideout in one of the stone mines on Hampton Rocks. The objectives for this patrol were the railway junction at Bathampton, and Claverton Manor if occupied by the Germans. Secondary areas for possible sabotage were the engine sheds at Green Park station and Colerne airfield. Besides its hideout the patrol had an arms/explosives store in what had been the explosives store of a disused quarry on the edge of Claverton Down, near the top of Widcombe Hill. This store was damaged in the raid of 26 April 1942 and its contents were then transferred to Manor Farm Swainswick.
This patrol had its hideout at the north end of a field called Long Pear Tree that is near Weston village, Bath.
This patrol had its hideout in Kilkenny Wood (Middle Wood), Englishcombe. It was an Elephant Shelter (which was like a very large Anderson Shelter) buried in the bottom right hand corner of Middle Wood GR 727617, close to Kilkenny Cottages.
This patrol had its hideout at the bottom of Rowley Valley in Hodshill Wood. It was under the command of Captain M. Shackell.
When these patrols (all commanded by Capt. Malcolm T. Shackell) had to meet, they did so on neutral territory, at Mary's Gown Shop, 15 Milsom Street. There was a family connection to this unlikely venue: Sgt. J Giles of the Bathampton Patrol married the daughter of the owner.
This patrol had its hideout at Kelston Park, in the Ice House at the top of the stone steps leading down into the wood.
This patrol had its hideout just outside the village of Langridge, in the valley roughly half way between Upper Langridge Farm and Charlcome Grove Farm. The Royal Engineers completed this base in 1943.
This patrol had its hideout off the Warminster Road in Hengrove Wood. Their base was located near the point where a stream descending from Hampton Rocks meets the bridle track from the Warminster Road to Claverton Manor. Water was supplied from the stream by a beer pump purchased from Bowlers in Bath. (This base was about 200 yards from the base of the Bathampton Patrol. The Bathampton Patrol knew of the Admiralty No 3 base, but there is no indication that the Admiralty No 3 patrol knew of the presence of the Bathampton Patrol).
This patrol had its hideout in Prior Park. The icehouse in the grounds of Prior Park just north of the larger lake was their base. Today it can be identified from the path by the proximity of a Yew tree.
This patrol originally had its hideout the old mineshaft at Pennyquick but abandoned it because it tended to flood. The patrol then moved to a base in Newton Park. For transport the patrol acquired a large Canadian Essex Terraplane car that could accommodate seven persons. (There were several pre-war Hudson Essex Terraplane models; the picture is the one most capable of carrying seven.) L/Cpl S.F.Phillips was its custodian/driver.
|
0.999944 |
I wanted to make the Heartwarming Chili (here on TOH) but didn't have the chili seasoning packet. I mixed this up quick. I didn't have the coriander so I used cilantro instead, reduced the cayenne to 1/8 tsp and I also added onion powder and a little �... I posted previously about my homemade taco seasoning that we all love. Well the same goes for the chili seasoning I use instead of those chili seasoning packets from the store.
As a chili seasoning this does not work for me because it is missing the Cumin, a necessary ingredient for chili and southwestern dishes. and the use of seasoned salt � how to put on wall paneling Here�s a recipe for homemade chili seasoning packets along with a simple recipe for chili. To make the chili seasoning packets you will need: For each packet of seasoning: small bowl 1 tbsp flour 2 tbsp minced onion 1 1/2 tsp chili powder 1 tsp salt 1/2 tsp crushed red pepper 1/2 tsp minced garlic 1/2 tsp sugar 1/2 tsp ground cumin Set out as many bowls as you want.
3. Once cool, place the peppers and cumin into a small food processor or blender. Add the garlic powder, oregano, and paprika. Process until a fine powder is formed.
|
0.999759 |
My company is basically in the business of manufacturing fabrics. We have an in-house development team. We are using VB6, SQL Server 2000, Crystal Reports and COM components. By using VB.NET, what are the advantages I would gain in the following cases and how?
Is it worth it to switch over VB.NET?
On all of the issues you enumerate, I have to say that .NET is a much better solution than VB6.
Performance is much better as code ultimately gets compiled to the native platform and .NET was designed for performance. Microsoft has many real-world examples that show the performance and scalability of .NET.
As far as size goes, you could be concerned with resource utilization (memory) or the amount of code. As far as resources, VB.NET is similar to VB (and maybe a little heavier for small apps). Part of this footprint is due to the automatic memory management built into .NET, but that is one of the reasons .NET applications exhibit good performance. As far as code goes, you'll write much less code in VB.NET than VB6 since the .NET platform has much more built into it.
VB.NET is designed with asynchronous operations in mind and it's very easy to develop spooling type operations.
ADO.NET (which you'll likely use to provide access to the database) is designed for ease of development with optimal access to data.
To summarize all these points, Microsoft took all the good parts of their various development languages and platforms and rolled them into .NET. Rapid development from VB, power and control from C++ were combined with a rich set of highly optimized features in the SDK.
Given what I've said above, what is not easy or straightforward is the migration from VB6 to VB.NET. If you were starting over, I'd say go for it with expectations of having a learning curve in front of you but better applications being rapidly developed in the future. Learn VB.NET first (it's very different from VB6), and a rewrite should easily follow. If you seek to migrate your code base instead of starting over from scratch, I have to say: Proceed with caution and first do the research on VB6 to VB.NET migration. You can simply Google VB migrate .NET to find a great deal of resources or go straight to Microsoft's migration page.
Ultimately, you are developing for a different platform: VB6 targeted the Windows platform, while VB.NET targets the .NET platform. They are different (even though .NET primarily sits on top of Windows), so you really need to learn the new platform to have the transition go smoothly.
If the benefits of the added functionality and performance you seek in the long run (keep in mind this will be true for all future apps developed in VB.NET) are worth the learning curve you'll have in the short term, then it's probably worth it to switch over. My guess is, if you are careful, that it will be worth your while to switch.
How can I configure Visual Studio.NET 2002 to use the .NET Framework 1.1?
Can I use VS.NET on a server that's not upgraded to .NET Framework?
|
0.996456 |
How can I make money from my website?
There are a lot of ways you can make some extra money if you own a website, and let me tell you, making money online has never been easier than it is today. Even though it might seem like a head scratcher in the beginning, once you figure it out, you’ll be surprised. This article is for everyone, who has even once asked themselves the question given above. So, without further ado, let’s get right to the point.
• The most obvious and the most popular way to make money online, is to sell advertising space on your website. This can only work, if your site gets a fair number of visitors daily, so the company you are advertising, will actually pay you for your space. I guess I wouldn’t want my website to be crowded with ads, because let’s be honest, no one does, but if ads: 1) make you money, 2) do not cover website content, 3) can easily be removed from your user’s screen by the user itself and 4) do not get any other complaints from visitors, then why not.
• Another popular way to make money is creating and selling virtual products and/or services. Creating and selling product is actually how Gridgum gets its income. You might think it is a time and energy consuming way, but actually it’s not as hard as it looks. This digital product can be anything from texts and articles to videos and website templates. Services is a little bit different. To not completely abandon the internet’s whole purpose and deliver every service to your users, the services you offer should be able to be requested and delivered online. What this means, is that you should lean towards something like video tutorials on the requested topics, and not hire a guy to do home calls and fix someone’s hardware.
• The idea to make a chargeable membership or premium content to make extra money has become quite the winner as of late. I guess in some ways this could be similar to selling digital content, but charging users for premium memberships can be really profitable. The way premium accounts work is fairly simple. People visit your website, users love your content, they want more, so you offer them more for a small monthly payment. These small payments made by a lot of people create a stable monthly income for you. The only drawback this might have, is that it requires a lot of attention and hard work to keep your site up to date with newly trendy content that people will pay for.
• Last but not least, a simply effortless way to get money is to just sell your whole website. Of course, this is the one that pays the most, hence might be the way you all choose to make some money. So, typically websites sell for 12 to 24 months’ income, but if your site has something special, you can sell for any price you want. One thing to consider is, that the sell price should be more than what your site “earns” in a period of time.
There are many more ways to earn money. If these are the options you have already considered, just make a list of the things you would pay for. If those products/services are things you can add to your website, do it. I can guarantee you won’t be the only one willing to pay for that content or service.
|
0.99881 |
Regular U.S. release. This score-only album was released several weeks after the more highly advertised song-only soundtrack albums for the film.
Winner of a Grammy Award and nominated for a BAFTA Award.
Buy it... if you're ready to be patient with a very restrained, dark, and respectful orchestral and gospel score that carefully and poignantly represents Ray Charles' many challenges in life.
Avoid it... if you seek either Charles' vocal performances or expect the score to reflect the shiny, positive spirit that many listeners think of when the artist comes to mind.
Ray: (Craig Armstrong) Released shortly after the death of music icon Ray Charles in 2004, Taylor Hackford's Ray is a biographical telling of the performer's life from 1930 to 1966. For younger audiences familiar with Charles' glowingly positive aura in the final 40 years of his career, there might not be as much knowledge about the very troubled childhood and early career that Charles was forced to navigate through to achieve control over his own addictions. It is safe to say that the life of Charles is an ultimate study in victory over tragedy, although the man's circumstances certainly had enough tragedy to fill an entire film. In the movie Ray, viewers witness the horrific, emotionally paralyzing death of Charles' brother as Ray watches; it is one of the few lasting memories of sight once Charles goes blind later in his childhood. Upon moving to Seattle to ignite his performing career, his addictions to pot and heroine were twenty years in the conquering, and he never really was able to resist the plethora of women who threw themselves at him. The film's concentration, however, is on Charles' journey to the light at the end of the tunnel, as well as his actual reaching of that goal. Summarizing the most positive and far less dramatic modern era for the artist would likely have done an injustice in its lack of depth compared to the first half of the film. It's important to understand the points above because the score by composer Craig Armstrong is by no measure a happy tale either. While his score for Love Actually the previous year was a delightfully chipper experience, Armstrong's career has been punctuated by scores with generally somber and more dramatic tones. From Romeo + Juliet and The Bone Collector to The Quiet American and The Clearing, a consistently withdrawn, melancholy tone is often to be heard in Armstrong's work. He is certainly best known for his coordination and additional score for the sensational Moulin Rouge in 2001, and for collectors of the original score from that film, much of the spirituality in Ray is derived from Satine's theme in that classic. The same daunting journey of the soul is coincidentally shared by Charles and Nicole Kidman's character from Moulin Rouge, so a reprise of Satine's lonely, choral atmosphere is strangely appropriate. Structurally very similar, the two themes differ only in their slight melodic variation and the addition of a gospel voice for a connection between the traditional gospel choirs and voices inherent in Charles' home state of Georgia.
The insert includes a note from Armstrong about the score and film.
or redistributed without the prior written authority of Christian Clemmensen at Filmtracks Publications. All artwork and sound clips from Ray are Copyright © 2004, Rhino/Warner and cannot be redistributed without the label's expressed written consent. Page created 1/8/05 and last updated 10/19/11.
|
0.987941 |
List out the various kinds of jobs people might do on a website, how they are going to achieve them, and how easy you wish to help it become for them. Not every website is really a valid job website, or maybe a great site. Naming a website after its domain name is essential, for the very simple reason that if folks think of your site, they are going to ponder over it by name.
You require the website to be hosted. The site has on the lookout for key navigation options that happen to be visible at the very first glance. It may allow you to do updates. A nice-looking site is much more likely to create a positive impression and keep visitors on your website as soon as that they arrive. Many sites provide you with the power to store several distinctive maintains and apply for a job making use of the edition of your application you’ve developed for that certain sort of opportunity.
Together with style, your own web page should have substance. Make sure the information you enhance your website is displayed in a straightforward and incredibly clear way. Sometimes you may want to rework the full site whenever a new version comes out.
Consider what your website does or what you would like it to do. Websites can be the work of somebody, a business or other organization, and so are usually devoted to a specific subject or purpose. Your site is frequently a possible customer’s first impression of your respective enterprise. Making a website has come to be a simple and manageable https://exry.thelift.site endeavor. You should do exactly the same thing together with your site! The best method to get paid a fantastic website is to only begin. Powerful and very crystal clear message Your website is your best chance to generate a durable impression to your customers.
There are lots of models of sites, each specializing in a given kind of content or make use of, and they might be arbitrarily categorized in numerous ways. They are generally dedicated to a particular topic or purpose, ranging from entertainment together with social networking to providing media and education. There are over 600 million websites on the planet.
The ideal solution to communicate your site’s objective is by way of a very very clear message on your homepage. Your internet site might be the very first, and only, impression a prospective customer obtains of your organization. If your site or company caters to the area community, like a pizza shipping and delivery company or recruitment agency possibly even on, then it makes sense to experience a country-specific domain.
No matter your current design resembles, keeping it consistent will always bring this up a notch. You may have a design and style that looks beautiful nonetheless is 1100px wide and may produce a horizontal scroller for nearly all users. Though the design and style itself is easy and intuitive, to comprehend what the page is around the consumer should hunt for the answer. Certainly you’re able to acquire great design and style from a superior site custom too, but that is going to become pretty much the exact cost regarding any good CMS platform.
Simply by reducing cognitive load you make it a lot easier for surfers to grasp the idea behind the pc system. When beginning your quest, it’s frequently a good perception to start with common search engines, just like Google, and general explanations just like you can find on Wikipedia. It’s far better to actually do something than simply speak about doing it. If you’re really pressed for time, we now have created a summarized version to aid you. Hey, nobody can be wholly productive all the moment.
|
0.999998 |
Given an array where each element is the money a person have and there is only Rs. 3 note. We need to check whether it is possible to divide the money equally among all the persons or not. If it is possible then find Minimum number of transactions needed.
The first line of input consists of an integer T denoting the number of test cases Each test case contains an integer N denoting the size of the array. Then in the next line are N space separated elements of the array.
For each case in a new line print the minimum number of transactions if it is possible to divide the money else print "-1" without quotes.
In first example third person will give a 3 rs note to first person so that all will have same amount of money.
In second example it is not possible to divide the money.
|
0.983232 |
Artificial intelligence pioneer Alain Colmerauer passed away on May 12.
Alain Colmerauer, a French computer scientist and a father of the logic programming language Prolog, passed away on May 15 at the age of 76.
Alain Marie Albert Colmerauer was born in the French town of Carcassonne on Jan. 24, 1941.
He earned a degree in computer science from the Institut polytechnique de Grenoble (Grenoble Institute of Technology) in 1963, and a doctorate in the discipline in 1967 from the École nationale supérieure d'informatique et de mathématiques appliquées de Grenoble, which is part of the Institut.
The newly minted doctor spent 1967–1970 as assistant professor at the University of Montreal, where he created Q-Systems, a method of directed graph transformations according to given grammar rules.
Colmerauer moved to the University of Aix-Marseille at Luminy in 1970 as Professeur 2ème classe (associate professor). He was promoted in 1979 to Professeur 1ère classe (Full Professor), and in 1988 to Professeur classe exceptionnelle (University Professor).
He was the center of a research group that, in the early 1970s, first conceived of Prolog (an abbreviation for "programmation en logique," which is French for "programming in logic"), a general-purpose logic programming language rooted in first-order logic that is well-suited for tasks that benefit from rule-based logical queries such as searching databases, voice control systems, and filling templates.
In 1972, Colmerauer worked with Philippe Roussel to develop the first Prolog system; its first implementations were interpreters.
In 1984, Colmerauer created the company Prologia to exploit the development of Prolog III. In 2000, the software company, which came to specialize in financial risk planning and management (as well as mortgages), became a part of the Air Liquide services group. In 2005, it was purchased by Experian, which made it part of the company's specialist decision support business, Experian-Scorex.
Prolog, as an elegant realization of programming in logic, has influenced a generation of researchers. It has been the basis for research in a variety of application areas, including natural language understanding and dialog, planning, symbolic computing, and probabilistic programming. Notably, Prolog played a key role in IBM's Watson question answering system, the winner of the Jeopardy Man vs. Machine Challenge.
Colmerauer was also one of the founders, in 1987, of the field of constraint logic programming, a form of constraint programming in which logic programming is extended to include concepts from constraint satisfaction.
In 1982, Colmerauer shared with Henry Kanoui and Michel Van Caneghem la Pomme d'Or du Logiciel Francais, an award from Apple France for a Prolog II implementation. In 1984, he received an award by the Conseil Regional of Provence, Alpes, and Côte d'Azur, and in 1985 he received the Michel Monpetit Award from the French Academy of Sciences. In 1986, he was made Chevalier de la Legion d'Honneur by the French government. He became Fellow of the American Association for Artificial Intelligence in 1991, and received the ACP Research Excellence Award, Principles and Practice of Constraint Programming in 2008. He was also a Correspondent of the French Academy of Sciences in the area of Mathematics.
In 2000, Colmerauer became Professeur classe exceptionnelle at the Faculty of Sciences of Luminy, University II of Aix-Marseille, Institut Universitaire de France; he became Emeritus Professor there in 2006. From 1993 to 1995, he was Head of the Laboratoire d'Informatique de Marseille (LIM), a joint laboratory of the Centre National de la Recherche Scientifique, the University de Provence and the University de la Mediterranee.
Colmerauer was married to Colette Coursaget, and they had three children.
|
0.987444 |
Step 1: Read the question stem to determine the subject that is being tested. This question stem is not helpful because it only says “Grace is” therefore, read the answer choices with a light touch. Each answer choice has language associated with criminal law. It is clear that this is a criminal law question.
Step 2: Read the paragraph carefully.
Step 3: In your own words, without looking at the paragraph, summarize what is happening. This will help you recognize who exactly the parties are and what they are doing.
Step 4: Ask yourself: Why could the Defendant be in trouble? Here, Grace may be in trouble because she told an 11-year-old to steal a television set from another person’s house.
Step 5: Ask yourself: What would the Defendant say in her defense? In answering this question, remember only to make true statements. If Grace has no defense, don’t make one up. In this question, the only truthful positive statement Grace could only say is that she did not physically take the television set.
Step 6: Does this defense disprove or cancel out a key element of larceny? In this case, Grace’s defense does not disprove or cancel out a key element of larceny because she had the specific intent to permanently deprive Sam of his television set and it was moved.
Step 7: Come up with your predicted answer by picking a side for a specific reason. Here, your predicted answer would be: Grace is guilty of larceny because she intended to trick the child into taking Sam television set and it was moved.
Step 8: First, go to the 2 answers that state Grace is guilty. Choose the answer that most closely translates to your predicted answer.
ANSWER: D (D) is correct. Grace is guilty of larceny by use of an innocent agent translates to guilty because she tricked the child into stealing the television set.
(C) is an incorrect statement of law because Grace is not guilty as an accessory. An accessory before the fact is a person who assisted or encouraged a principal to commit the crime. A principal is a person who intentionally and actually engaged in the crime. Here, Grace is guilty as a principal rather than an accessory because she intentionally and actually engaged in larceny by her own actions and Roy is not guilty of any crime because he lacked the specific intent to commit larceny. (A) and (B) are automatically wrong because they state Grace is not guilty.
Grace, while baby-sitting one night, noticed that Sam, who lived next door, had left his house but that the door did not close completely behind him. Grace said to Roy, the 11-year-old boy she was baby-sitting with, “Let’s play a game. You go next door and see if you can find my portable television set, which I lent to Sam, and bring it over here.” Grace knew that Sam had a portable television set and Grace planned to keep the set for herself. Roy thought the set belonged to Grace, went next door, found the television set, and carried it out the door. At that moment, Sam returned home and discovered Roy in his front yard with the television set. Roy explained the “game” he and Grace were playing. Sam took back his television set and called the police.
(A) not guilty of larceny or attempted larceny, because Roy did not commit any crime.
(B) not guilty of larceny but guilty of attempted larceny, because she never acquired possession of the television set.
(C) guilty of larceny as an accessory to Roy.
(D) guilty of larceny by the use of an innocent agent.
|
0.999981 |
In a nutshell, this respectable LED television entry by TCL is well suited for young couples that desire quality viewing experience, but are on a limited budget. It is also well situated for any individual that needs a television for a spare bedroom or office, but does not want to shell out big dollars for that privilege.
The television itself is rated as durable enough to support daily viewing and is adaptable to support gaming features as well. While the size may limit its use to smaller rooms and more intimate settings, this can be a great addition to a game room, or for late night movie watching.
The TCL 32-inch model is slim and sleek, and it brings premium picture quality to any entertainment area within the house. Because of its slim nature, the television itself can fit almost anywhere, meaning that the superior picture quality can be viewed from anywhere within a small to medium size room.
The picture itself is enhanced by a High Definition viewing experience that brings with it a respectable 720p resolution and a 3,500,000:1 dynamic contrast ratio. This ensures that the picture is not distorted as an individual moves closer and closer to the screen.
To further enhance the image quality, this particular model is equipped with True Color Technology, resulting in a superior contract and brilliant array of colors that makes it more than suitable for both television viewing and gaming experiences.
The feature rich TCL model also has direct LED backlighting, which enables individual to view black color in a darker perspective, while still being able to laminate bright colors as well.
The main strength of this model lies in its price and its maneuverability. Priced most places under a few hundred dollars, this is a great television with many features that can likely fit within most budgets, particular for young people and individuals who simply need a spare television.
Also, the television itself think and easy to move, which makes it suitable for a wide array of locations within a typical house or another type of building environment. The television is limited, however, in its sounds features and it does not provide many of the modern technological enhancements and plug and play ability available in many higher end models. If one does not require those abilities, however, this model is a great option.
This model by TCL brings home a viewing experience that will wow many viewers with the color, clarity, and detail of the picture, particularly at this pricing point. In addition, the 32-inch model has a sleek design that adds a contemporary feel to any room, and it is equipped with an energy efficient LED console.
|
0.951751 |
The first wartime naval Enigma machine (M3) was identical to the model used by the German Army and Air Force, but it was issued with additional rotors, VI, VII and VIII, which were reserved for the Kriegsmarine (German Navy). However, the Kriegsmarine also employed codebooks to shorten signals as a precaution against shore high-frequency direction-finding, and some manual ciphers. The most important codebooks were the Kurzsignalheft (short signal book) for reports such as sighting convoys, and the Wetterkurzschlüssel (weather short signal book) for weather reports.
Naval Enigma signals used different ciphers, each with its own daily key (rotor order, ring settings, plugboard connections and ground setting). The principal cipher was Heimisch (Heimische Gewässer - known to Bletchley Park as Dolphin) for U-boats and surface ships in 'Home Waters', including the Atlantic. At least 14 other naval Enigma ciphers were used later in the war.
Most ciphers had Allgemein (general) and Offizier keys. Offizier signals were first enciphered using the plugboard connections from monthly Offizier keylists. The complete message was then enciphered a second time using the Allgemein key. A few ciphers also had Stab (Staff) keys, which were also doubly enciphered, but had their own special settings. Offizier signals often took a week or more to break at Bletchley.
The British codebreakers at Bletchley Park received an Enigma machine and rotors I to V from the Polish Cipher Bureau in August 1939. Marian Rejewski, an outstanding Polish cryptanalyst, had reconstructed the wiring of rotors I to III at the end of 1932 using mathematical techniques, and the wiring of rotors IV and V before the war began (he had also developed his bomba kryptologiczna in 1938 to aid him to break Enigma - an idea Turing later emulated). The British recovered rotors VI and VII from the crew of U-33 on 12 February 1940, while rotor VIII was captured in August 1940.
In May and June 1940, using cleartext and cipher text captured from Schiff 26, Hut 8 at Bletchley Park had solved some April naval Enigma traffic with the aid of the first bombe (a high speed key-finding aid). That bombe, which was Alan Turing's brainchild, was much slower than the bombes with the 'diagonal board' invented by Gordon Welchman. The improved bombe, with the board, entered service in mid-August.
'cribs' (probable plain text, used to 'program' the bombes) were non-existent until mid-1941.
Hut 8 could not read Dolphin traffic without delay until June and July 1941, when it used keys captured from the weather ships München and Lauenburg. Decrypts were translated by Hut 4, which then sent their full text by teleprinter to the Admiralty's Operational Intelligence Centre (OIC) in London. Intelligence from the decrypts enabled the OIC to re-route many convoys past the few U-boats (about 20) then in the North Atlantic. Re-routeing convoys on the basis of 'Ultra' saved many lives and hundreds of thousands of tons of vital shipping.
Hut 8 broke Dolphin cryptanalytically from August 1941 onwards. It was helped because the order in which the rotors were inserted in Enigma changed only every two days. If a crib was available, a bombe run on the second day could therefore find the day's settings in under 20 minutes, saving much precious bombe time.
Manual weather ciphers broken by Bletchley's weather section in Hut 10 provided many cribs. The Atlantic U-boats made numerous weather reports, encoded on the Wetterkurzschlüssel before encipherment. From February 1941 on, Hut 10 broke general weather signals, enciphered with the naval manual meteorological cipher, which incorporated the U-boats' weather reports. In early May 1941, Bletchley received a copy of the 1940 edition of the Wetterkurzschlüssel from München and U-110. This enabled Hut 8 to reconstruct the U-boats' weather signals, and so obtain a second source of cribs. In addition, identical signals on subjects such as mine-clearing were sometimes sent using naval Enigma and another manual cipher, the Werftschlüssel ('dockyard cipher'). When Hut 4 broke the signals using Werftschlüssel, Hut 8 had more cribs.
Hut 8 suffered a massive reverse on 1 February 1942 when a new Enigma machine (M4) came into service on Triton (codenamed Shark by Hut 8), a special cipher for the Atlantic and Mediterranean U-boats. The combination of M4, Shark and a second edition of the Wetterkurzschlüssel proved devastating. Bletchley Park became blind against Shark for over 10 months. Fortunately, M4's fourth rotor (beta) was not interchangeable with rotors I to VIII. Beta increased M4's power by a factor of 26, but rotors could still only be mixed in 336 (8x7x6) different ways - not 3,024 (9x8x7x6).
At one setting of beta, M4 emulated M3, which was M4's undoing. Three members of the British destroyer HMS Petard seized the second edition of the Wetterkurzschlüssel from U-559 on 30 October 1942, before it sank near Port Said. Hut 8 once again had cribs, which it could run on three-rotor bombes, the only type available. The U-boats were using M4 in M3 mode when enciphering the short weather reports. A three-rotor bombe run on 60 rotor combinations therefore took only about 17 hours instead of the 442 hours (18 days) required if M4 had used its full potential.
On 13 December 1942, Bletchley teleprinted the OIC the positions of over 12 Atlantic U-boats, on dates from 5 to 7 December, as established from Shark weather signals. Hut 8 had penetrated M4 Shark with the help of the weather broadcasts broken by Hut 10. Intelligence from Shark, although sometimes badly delayed, played a critical part in the Battle of the Atlantic, perhaps saving from 500,000 to 750,000 tons of shipping in December 1942 and January 1943 alone.
Hut 8's use of the Wetterkurzschlüssel against Shark was short-lived. A third edition of the weather short signal book took effect on 10 March 1943, depriving Hut 8 of cribs. Bletchley had feared that the change would blind it for several months, but by using short signal sighting reports (made by U-boats in contact with convoys and encoded from the Kurzsignalheft) as cribs, Hut 8 re-entered Shark again on 19 March and broke it for 90 out of 112 days before 30 June. Kurzsignalheft short sighting reports also used M4 in M3 mode - and the Kurzsignalheft had also been recovered from U-559.
British and US Navy four-rotor bombes entered service in June and August 1943, respectively, but some July and August Shark keys took up to 26 days to solve. However, from September on, Shark was generally broken within 24 hours. At the end of 1943, work on Shark was transferred to the US Navy's Op-20-G codebreaking unit in Nebraska Avenue, Washington, DC, because the US Navy had over 50 bombes by mid-November.
The main role for naval Ultra was probably in re-routeing convoys, but it was used in many different ways. The US Navy employed Ultra offensively in 1943 and 1944 to sink many of the important supply U-boats (Types XB and XIV, such as U-118, U-233 and U-460), which applied a multiplier effect to the U-boats by replenishing them at sea.
The Wetterkurzschlüssel and Kurzsignalheft were retrieved from U-559 by Lieutenant Anthony Fasson, Able Seaman Colin Grazier (both were posthumously awarded the George Cross - Britain's second highest award for gallantry) and 16 year-old Tommy Brown (who survived to receive the George Medal). Without their bravery, Shark would not have been broken before four-rotor bombes came into service, if at all. The Allies (Britain, Canada and the United States) would not then have established naval supremacy in the Atlantic until the second half of 1943 at the earliest, which would have probably delayed the D-Day Normandy landings until 1945. Few acts of courage by three individuals can ever have had so far-reaching consequences. Without Ultra, the U-boats would still have been defeated in the long run, but the cost in human life in the global conflict would have been even more terrible than it was.
but the cipher was not used by U-boats after Oct 5, 1941.
[Frank Cass], 3(1) (1988) 162-183.
David Kahn, Seizing the Enigma: The Race to Break the U-Boat Codes.
|
0.953221 |
Brad Douglas Paisley (born October 28, 1972) is an American country music singer and songwriter. Starting with his 1999 debut album Who Needs Pictures, he has released eleven studio albums and a Christmas compilation on the Arista Nashville label, with all of his albums certified Gold or higher by the RIAA. He has scored 32 Top 10 singles on the US Billboard Country Airplay chart, 19 of which have reached number 1. He set a new record in 2009 for the most consecutive singles (10) reaching the top spot on that chart.
Paisley has sold over 11 million albums and has won three Grammy Awards, 14 Academy of Country Music Awards, 14 Country Music Association Awards, and two American Music Awards. He has also earned country music's crowning achievement, becoming a member of the Grand Ole Opry. Paisley also wrote songs for Pixar's Cars franchise ("Behind the Clouds", "Find Yourself", "Collision of Worlds" (along with Robbie Williams), "Nobody's Fool", etc.).
Paisley was born on October 28, 1972, in Glen Dale, West Virginia. He is the only child of Douglas Edward "Doug" Paisley, who worked for the West Virginia Department of Transportation, and Sandra Jean "Sandy" (née Jarvis) Paisley, a teacher. He was raised in Glen Dale, West Virginia. He has stated that his love of country music stems from his maternal grandfather, Warren Jarvis, who gave him his first guitar, a Sears Danelectro Silvertone, and taught him how to play at eight years old. In third grade, he performed for the first time in public by singing in his church. Initially, they were just going to have him play the song on the guitar instead of a piano. But then the adults heard him sing the tune and said, "forget the choir, let's just have Brad do the whole thing." After that, he never had to ask for a gig until he left Glen Dale. He later recalled that "Pretty soon, I was performing at every Christmas party and Mother's Day event. The neat thing about a small town is that when you want to be an artist, by golly, they'll make you one." At age 13, he wrote his first song, "Born on Christmas Day", which later appeared on his album Brad Paisley Christmas. He had been taking lessons with local guitarist Clarence "Hank" Goddard. By 13, Goddard and Paisley formed a band called "Brad Paisley and the C-Notes", with the addition of two of Paisley's adult friends.
Within a week after graduating from Belmont, Paisley signed a songwriting contract with EMI Music Publishing; and he wrote David Kersh's "Top 5" hit, "Another You", as well as David Ball's 1999 single, "Watching My Baby Not Come Back". The latter song was also co-written by Ball.
Later in 2000, Paisley won the Country Music Association's (CMA) Horizon Award and the Academy of Country Music's best new male vocalist trophy. He received his first Grammy Award nomination a year later for Best New Artist. On February 17, 2001, Paisley was inducted into the Grand Ole Opry. He was 28 when he accepted the invitation. PBS did a 75th anniversary concert special, in which Paisley and Chely Wright sang a song that they co-wrote called "Hard to Be a Husband, Hard to Be a Wife". This song later appeared on the compilation album Grand Ole Opry 75th Anniversary, Vol. 2. The concert would get a CMA nomination for Vocal Event of the Year. Paisley would later contribute to Wright's 2001 album Never Love You Enough, co-writing the tracks "One Night in Las Vegas", "Horoscope", and "Not as In Love". Paisley co-produced the former two tracks with her, in addition to playing guitar on them and featuring members of his road band, The Drama Kings; he also sang backing vocals on "One Night in Las Vegas" and "Not as In Love".
In 2002, he won the CMA Music Video of the Year for "I'm Gonna Miss Her (The Fishin' Song)". Several celebrities made notable guest appearances in the video, including Little Jimmy Dickens, Kimberly Williams, Dan Patrick, and Jerry Springer. His three other singles from the Part II album, "I Wish You'd Stay", "Wrapped Around", and "Two People Fell in Love", all charted in the top 10. The album stayed in the charts for more than 70 weeks and was certified platinum in August 2002. To support his album, he toured the country as the opening act for Lonestar.
Paisley also contributed two original songs to the Disney Pixar's film Cars. These can be found on the film's soundtrack. This was in recognition of his contribution to the "Route 66: Main Street America" television special.
His track "Accidental Racist", a duet with rapper LL Cool J, generated a bit of notoriety when it was released. Paisley sings about how he finds himself "caught between Southern pride and Southern blame": Paisley explained that he's proud of where he's from, but he's ashamed of themes such as slavery and racism. The song generated controversy for its discussion of racism, particularly the song's message of showing "Southern pride", which includes reappropriation of the Confederate flag.
On April 6, 2014, Paisley released "River Bank." It is the lead single from his tenth studio album for Sony Music Entertainment, Moonshine in the Trunk, which was released on August 26, 2014. Paisley co-wrote the song with Kelley Lovelace and co-produced it with Luke Wooten. The album's second single, "Perfect Storm", was released to country radio on September 2, 2014. It reached number one on the Country Airplay chart in January 2015. The album's third single, "Crushin' It", was released to country radio on January 26, 2015. The album's fourth single, "Country Nation", was released to country radio on September 14, 2015.
Love and War features several collaborations with iconic artists, including Timbaland, John Fogerty, Bill Anderson, and Mick Jagger, as well as a songwriting credit with Johnny Cash.
On October 4, 2018, Paisley and his wife Kimberly Williams-Paisley partnered with Belmont University and opened a free referral-based grocery store in Nashville to help the community in need. The Board of Trustees for The Store include Brad Paisley, President; Megan Zarling, Chair; Pete Fisher, Vice-Chair; Doug Paisley, Secretary and Elaine Bryan, Treasurer. Other board members include Sarah Cates, Jaynee Day, Hope Fisher, David Minnigan, John Zarling, Olivia Munn, John Schario, Scott Scovill, Michael Stagg, Becca Stevens and Kimberly Williams-Paisley. Executive Director is Gina Hancock.
In November 2018, Paisley released "Bucked Off" the lead single from his upcoming studio album. On March 11, 2019, Paisley released "My Miracle"
Paisley released his book Jug Fishing for Greazy and Other Brad Paisley Fishing Stories in 2003 under Thomas Nelson Publishing. He co-wrote the book with author M. B. Roberts.
In the last months of 2000, Paisley had a relationship with fellow country music singer Chely Wright. Unbeknownst to Paisley, Wright and her female partner had moved together into a new home earlier in the year. In her autobiography, Wright expressed regret for how she treated him.
He is also a lifelong fan of the Cleveland Browns and Los Angeles Dodgers. Paisley sang the National Anthem at Dodgers Stadium before Game 2 of the Dodgers vs Astros World Series in 2017, and again before Game 3 of the 2018 World Series against the Boston Red Sox. Paisley also sang the national anthem before a game during the 1999 season, and stated in an interview with ESPN his dream job would be to play football for them. He also invited former Browns Quarterback Brady Quinn to a concert at the Blossom Music Center, in 2008.
Paisley is also a fan of West Virginia athletics. In 2014, Paisley appeared as a celebrity guest picker on the popular ESPN show College Gameday, when it was held on the campus of West Virginia University.
In 2015 Santa Cruz Guitar Company introduced the Brad Paisley Signature Model, B/PW, acoustic dreadnought guitar. Paisley is often seen playing this model of guitar, such as in the 2017 Netflix original Brad Paisley's Comedy Rodeo.
2013 Late Night with Jimmy Fallon Himself Pros & Cons - Campaigning For Anthony Weiner, Jimmy Fallon & Brad Paisley Sing "Balls In Your Mouth"
2014 Two and a Half Men Derek Guest role: "Oh WALD-E Good Times Ahead"
Rising Star Expert Along with singers Kesha and Ludacris, and Host Josh Groban.
The Voice Himself/Adviser Team Blake in the Battle Rounds from Season 9.
^ "Brad Paisley Biography". The Ellen DeGeneres Show. Archived from the original on 2014-10-27. Retrieved 2014-06-09.
^ "Alumnus Brad Paisley Establishes Endowed Scholarship for Curb College Students". Belmont University. March 28, 2012. Archived from the original on May 2, 2014. Retrieved May 2, 2014.
^ "Brad Paisley Falls Off Stage in S.C. (Video)". Right Celebrity. 2010-03-07. Archived from the original on 2013-03-29. Retrieved 2013-04-09.
^ "Brad on Mark Twain: words & music CD". Bradpaisley.com. Archived from the original on 2012-01-25. Retrieved 2012-09-16.
^ "30 Country Music Stars Join Forces for Historic CMA Music Video, 'Forever Country'". Abcnews.go.com. September 16, 2016. Retrieved April 25, 2017.
^ Jim Asker (October 20, 2016). "LoCash Leaps to No. 1; Brad Paisley's New Pinnacle; Garth Brooks Bows". Billboard. Retrieved April 25, 2017.
^ "New Brad Paisley Album Features Timbaland, John Fogerty, Mick Jagger". Sounds Like Nashville. 2017-03-10. Retrieved 2017-03-13.
^ Dukes, Billy (November 13, 2018). "Brad Paisley's 'Bucked Off' Is His Turbo Honky–Tonk Song [Listen]". Taste of Country. Retrieved January 9, 2019.
^ "Brad Paisley Premiers New Single, "My Miracle" At Country Radio Today". Brad Paisley.com. March 11, 2019. Retrieved March 19, 2019.
^ Roberts, Soraya (May 2, 2010). "Country singer Chely Wright set to announce she is lesbian in next People Magazine: report". New York: NY Daily News. Archived from the original on 4 May 2010. Retrieved 2 May 2010.
^ Johnson, Beth (July 16, 2009). "Kimberly and Brad: City Girl, Country Boy". Good Housekeeping. Archived from the original on February 28, 2010. Retrieved February 18, 2010.
^ "33". Supreme Council 33º, SJ. September 20, 2013. Archived from the original on September 22, 2013. Retrieved 2013-09-20.
^ Turner, Mimi (March 11, 2004). "10 Burning Questions with Brad Paisley". ESPN. Archived from the original on December 15, 2009. Retrieved 2010-02-18.
^ "Brad announces involvement in new TV show". BradPaisley.com. October 15, 2009. Archived from the original on April 12, 2010. Retrieved 2010-02-18.
^ a b c Meeker, Ward (January 2012). "B.P.'s VIPs: Two Vital Guitars from the Collection of a Modern Superpicker". Vintage Guitar. pp. 34–35.
^ "Hand Made Boutique Guitar Effect Pedals | Signature Series | The Paisley Drive". Wampler Pedals. Archived from the original on 2013-03-31. Retrieved 2013-04-09.
^ "Photograph of Brad Paisley Rack". Audiotechusa.net. Archived from the original on 2012-10-29. Retrieved 2013-04-09.
|
0.999999 |
What is the difference between aerobic and anaerobic organisms?
Aerobic refers to organisms that require oxygen to exist; for example, most living organisms need oxygen to stay alive. As humans, our cells get our energy by using oxygen to fuel our metabolism. Anaerobic refers to organisms that need little or no oxygen to exist; it often refers to bacteria, such as those found in the human small intestines.
|
0.978657 |
Suppose you were a Conservative leader hoping to win a stonking majority in your general election campaign, which of these two manifesto propositions do you think would win the most votes?
Matt Ridley’s annual Global Warming Policy Foundation lecture at the Royal Society in London last night was great – and I do recommend you read the text in full, now that it’s available on the GWPF website.
Britain is currently in the midst of a heatwave with temperatures as high as 34 degrees C (that’s 94 degrees in old money – fahrenheit).
there has now been no “global warming” for 18 years and six months. Not only does this contradict all the doomladen climate models cited in the IPCC’s various reports – none of them predicted the so-called “Pause” – but it also means that not one of the kids in school being fed climate propaganda by their on-message teachers has ever personally lived during a time of global warming.
|
0.990268 |
Nowadays, weightlifting which means strength training with the use of weights has become more and more popular with people as a method to gain strength, muscle and reduce fat. However, are you sure that you know everything about weightlifting.
This article is going to provide you with a list of frequently asked questions about weightlifting.
1. Which group of muscles should work out together?
The chest, shoulders and triceps: All of them are known as the push muscles which cooperate to push the resistance away from the body. The shoulders, the chest and the pectorals are representative of the larger muscles. On the other hand, the triceps are representative of the smaller muscles.
The back and biceps: Known as pull muscles, they function to pull the resistance towards the body. The back, a large muscle, includes rhomboid and latissimus muscles, which are upheld by the bicep, a small muscle. To train this muscle group, you should do pull down exercises with barbells and cable pulleys or deadlifts.
Hamstrings (biceps), calves and the glutes:This group of muscles is positioned at the back of the leg and support hip and knee movements.
2. Can I build muscle with free weights or machines?
If you want to gain muscle mass, you should work out with free weights rather than with machines. The reason is that lifting weights with free weights can help you build muscle in the long term; however, doing so with machines is more useful for training stubborn muscles.
3. What exercises to do with free weights?
There are various exercises to which can be done with free weights, three of which will be specifically described below.
Whether you are starter or an experienced body builder, you can do this exercise.
Steps: Stand with feet positioned wider than shoulders; use both hands to hold a dumbbell in front of your chest. Sit downlike when you are doing a squat, stand up and repeat.
This exercise is ideal for people who want to look like an Olympian.
It will not only help you to build lean muscles but also build explosive power.
It also accelerates muscle growing process by carrying blood to your hamstrings, glutes, arms and shoulders with the highest speed.
Steps: Hold two dumbbells, one in each of your hands and then uplift the weights towards your shoulders, slightly jump up. Slowly extend your legs until you stand up. After that, bring the weights down to your thighs and then turn into a squat.
This movement will affect several muscles in your upper body (traps, rhomboids, lats and biceps).
Steps: Hold the two dumbbells with two hands; uplift the weights to your chest and lower them to your ankles and repeat. Keep your core tight and your back straight.
4. Which dumbbell weight should I use to build muscle?
Which dumbbell weight to use depends on what is your purpose when lifting weights.A heavy weight helps build muscle. On the other hand, the lighter one helps stabilize the muscles, supporting joints and tendons. Regardless of which weight you choose, it is advisable to follow some general advice below.
First, you should measure your strength to decide which dumbbell weight is ideal for you. Secondly, in the process of weight lifting, you should listen to your body to decide when to put more weights in the dumbbell, when to reduce or stop.
5. How many days a week should I do weightlifting?
Depending on your goals and schedule, the maximum number of days to do weight lifting may vary. However, you should plan your workout session beforehand so that you can get the desirable results. For an average body builder, you should lift weights from two to four days per week and three days per week for the best.
6. How does theStrongLifts5x5 workout work?
Above are six of the most frequently asked questions about weightlifting. Do not forget to consult your doctor or fitness trainer for advice and guidance. Hope that this will help you safely and effectivelybuild muscle and gain strength through weightlifting.
|
0.997064 |
What is the best way to speak fluent Korean? There are many methods that you can use, but one of the best ways is definitely reading and listening to a lot of native Korean speakers having conversations with one another.
These two books (beginner and intermediate) have been made to help you achieve just that, except much more efficiently!
Through natural dialogues on very realistic and common day-to-day topics and situations, you can pick up new words, new cultural knowledge and new sentence patterns that you can put to use in your next interaction with a Korean speaker.
Here are some reviews from people who have studied with these books.
|
0.999165 |
Facebook Exchange about the Threat from Our Supposed "Enemy"
The trouble with essays like Ali's is that they invite the reader to abandon any interest in the facts by flattering their loyalties—a classic technique right out of propaganda 101. If, Joe, we are to see the world "as it is," then we should juxtapose the claims of this writer against the answers to some simple questions.
For instance, throughout the world there are thousands, perhaps hundreds of thousands of people proselytizing fundamentalist versions of their religion by traveling to "other civilizations", establishing schools, institutes, and other organizations, and encouraging the natives to abandon their own religious traditions. Question: are these proselytizers Muslims traveling to western countries, or Christians traveling to east and south-west Asian countries?
Having trouble with that one? Here's an easier one: What large country is currently surrounded by enormous military bases from a "different civilization", one that has repeatedly and very publicly threatened to attack it, including with nuclear weapons?
Or this one: what large country has not initiated warfare against any other country in nearly 150 years?
Still too hard? Ok, what country is currently painted in western media as the single greatest threat to Israel and the west generally? Final hint: it is the same country described in the three previous paragraphs.
Experience has taught me that when a writer represents that I have to see the world their way in order to "distinguish friends from enemies," I know I am being conned.
Becker, after reading your post, I had to reread the essay. I did not recall Ali asking us to "see the world as it is" or to see the world her way." Rather she was positing two conflicting views of the world--Huntington and Fukuama. I am also confused as to the series of questions. You never provide an answer. Ali discusses Turkey, Saudi Arabia, (which I believe is who you are referring to), Malaysia, Indonesia, and several others. So if these are facts, is it your opinion that the Saudi's are in fact the friend of Israel? That they are the friend of the United States? That we need not be concerned with recent events in Turkey?
@ Becker...I had to reread my post to you about rereading your post. I think I was unclear. Essentially my question to you is: is your overriding point that cultures interact with each other and that we have influenced other cultures just as they have influenced or are influencing ours?
Certainly cultures influence one another, but that is not one of the points I am explicitly making here. My point is that to carve the world up into friends and enemies, those who are with us and those who are against us (as W put it), in short, into "us" and "them", is to impose on oneself a kind of mental filter that prevents one from examining the plain facts of a matter without fear or prejudice. It also tends to unhinge us from the most basic principle of morality, the principle of universality (applying the same standards of "right" and "wrong" to myself that I apply to others).
The country currently facing overwhelming force from a country that has threatened repeatedly to attack it, including with nuclear weapons, and that maintains large ground, air, and naval presences just over its borders in Iraq, Afghanistan, Turkey, and the Gulf Arab states; the country that, though repeatedly attacked (with such attacks in the last 55 years sponsored by the threatening country afore mentioned) has not attacked any other country since before our own civil war; the country that has sheltered it's own minority Jews with greater tolerance than any other since the diaspora; the country currently vilified in the western press on the basis of repeated half-truths and outright lies...the country in question is of course Iran.
And just to put a little polish on the looking-glass world Ali lives in, consider this. The United States was directly involved in the overthrow of the democratically elected government of Iran in 1956, and installed a puppet monarchical dictatorship that ran a brutal regime of political repression for over 20 years. It sponsored the attack on Iran by Saddam Hussein in 1980 in revenge for the overthrow of the Shah by the Islamic Republic, initiating a war that slaughtered hundreds of thousand of Iranians. It still provides direct monetary and logistical support to organizations operating within Iran to overthrow the present government of Iran, including to the MEK, an organization that was until 2009 on the State Dept.'s list of international terrorist organizations.
So how is it exactly that we (the west) are the ones under threat?
Here's a mental exercise: Suppose it was this country that was surrounded by hostile military forces, under threat of nuclear attack from a country that had repeatedly attacked us by both covert and overt means, that it was the U.S. contending with foreign supported terrorists operating openly in the countryside, funded by this same foreign attacker. What would you think of that country's citizens pointing their finger at you and calling you the threatening enemy?
The principle of universality demands this mental exercise of us if we are to take ourselves seriously as moral beings. That should be obvious, but it won't be if the world is only populated by "us" and "them".
I want to add that I think very highly of you for permitting someone like me, who is obviously possessed of a very different political sentiment, to engage in a discussion like this on your Facebook page. It says a lot about your generosity and character, I think. It's also very American, if a fellow American may say so.
|
0.999906 |
Antzup moviles online She has since starred in various films, including The Wedding Planner (2001), Maid in (2004), Monster-in-Law (2005), and The Back-up Plan (2010). Lopez . Película Online, Antz (Hormigaz) - Jennifer Lopez, Azteca (voice), 1998-10-02.
For Z life as an ant is not all it s cracked up to be He s not much of a digger he doesn t and laugh out loud humor of the exciting new movie from DreamWorks . epic dating fails meme Antzup moviles online Ver Online El diario de Ana Frank pelicula completa español latino y subtitulada watch Movies online for free,ver peliculas de estreno gratis completas,ver.
Antzup moviles online In America, 3-D animation films like Shrek and Toy Story have become huge Dreamworks ("Antz", "Shrek", "Madagascar") . Even if a reporter asks a follow-up question that seems to disagree with what you said, restate your response in different words. Games where is Shrek are sure Shrek online pexeso.
Panic In Antz Extreme Racing, the characters of the movie Antz are bored and start a racing. Born James Jonah Cummings on November 3, , he grew up in Youngstown, Ohio. Antz extreme racing PC Video Games. Watch 32 Movies Online. distancia sao luis pio xii Antzup moviles online 101 Dalmatians (1996 movie) - Simple English Wikipedia Ver película 101 Dalmatas 2 online latino 2003 gratis VK to kill them for their fur, but various animals then gang up against her and get their revenge in slapstick fashion. #101 dalmatas #antz #bambi #childhood #cinderella #dvd #pinocchio #pocahontas #the. Watch full length Así es mi tierra Full HD Formats Movie for Free Online.
|
0.977159 |
List your favorite celebrities with the reasons by you like them?
Johnny Deep, mailnly for his acting as Jack Sparrow in the Pirates of the Caribbean movies, I like how he plays him as a comical and witty man.
He is also my all-time favorite one too have wonderful action.
Obviously Shahrukh Khan. Because of his acting. LOL!
|
0.986026 |
How long does it typically take before one can expect to see results with GenF20? This depends a lot on your present health condition and age. What most people typically report is that it takes 3-6 months to see any positive results. This is also typical for any health supplement you take, be it vitamin pills or herbal tablets. The reason that it often takes months is because the changes will only happen on a cellular level. As your pituitary is regularly prodded to produce HGH, the resulting increase only gains on an incremental level. The release of growth hormone is taken up by your liver and binds onto growth hormone receptors which is then converted into IGF-1 and used by your cells.
If your pituitary is sluggish or atrophied, it may take a while to get it to be responsive again. Furthermore, if you generally practice an unhealthy lifestyle, it will also work against you. Things like sleeping late; not getting adequate rest, smoking, drinking, and a poor diet deficient in nutrients are also major contributors to aging. So it goes without saying, you need to get rid of any habits that suppress normal release of growth hormone. If your health has been compromised by an unhealthy lifestyle for years, you need to address it.
Another factor is age. The older you are, logically speaking, the less responsive your organs and glands are; the less efficient your organs function. The way to retrain and recondition your body is through gradual means, and this also invariably involves practicing a healthier lifestyle. Dismissing the importance of health guidelines, while sitting in front of the TV for the whole day with a beer can in hand is not the way to effect changes in your life, no matter what therapy you undergo or supplements you take. Even in the case of people who have the means to obtain a prescription, get a doctor, and pay for HGH injections, the results greatly depend on the aforementioned parameters: Health condition and age.
There is no way to force the process of regaining your health except through a patient, gradual, and sustained effort. But the advantages of using a quality HGH releaser like GenF20, along with making positive changes in your life will bear fruit in the long run; which while not dramatic, are real and will delight you. Things like observing an improvement in your skin tone, better energy levels, and a renewed appetite for living are just some of the subtle yet delightful changes which creep up ever so subtly that you may not notice them initially, until perhaps 6 months later!
HGH releasers are natural agents that can promote the enhanced production of HGH from the pituitary gland, and this method of raising growth hormone is the safest, most cost effective way of doing that. At the present time, one of the most prudent ways of boosting hormone levels that drop with age, is by using natural agents that can stimulate metabolism, cell repair and rejuvenation.
While there are several types of agents that can be classified as HGH releasers (even exercise can be classified as a HGH releaser), the most successful regimens that you can self-implement are those that combine the whole works, namely exercise, nutrition, and healthy living. The nutritional aspect should be balanced in as much as possible, but bear in mind, is no substitute for watching your diet or keeping to a healthy lifestyle. Truth is, there are no miracle cures that can do all the work for you without any positive participation on your part, not even HGH injections.
As far as natural HGH releasers go, GenF20 can provide for a near-complete supplementation system, and the effectiveness of its component nutrients in promoting HGH levels is well documented by strong scientific research. The components in GenF20 work synergistically to address HGH decline because of the way the pituitary responds to a surge of its component nutrients in the bloodstream, each time you take it.
Cost-wise, GenF20 compares very favorably with other HGH releasers on the market, and this is also taking into account user satisfaction and long term market presence. Although there are many HGH products being sold, not all are effective, and quite a number just plainly – don’t work. A proper HGH releaser will only stimulate, NOT replace HGH in your body, and the only way to stimulate HGH release is by a solid, proven combination of amino acids and growth factors that is provided by GenF20.
Some people may assume that HGH is a magic bullet, and that more is better. For the record, HGH is NOT a magic bullet or cure-all, and neither does it act by itself in the body. HGH is a very important (master) hormone, but it needs to work in synergy with other hormones in the body.
Hormones like testosterone, estrogen, melatonin, or DHEA are all affected by HGH levels, which itself is affected by the bloodstream levels of those other hormones. The trigger for regulating these hormones lie in the hypothalamus in the brain, which gives “orders” to the pituitary to release HGH concurrent with the levels of the other hormones. All these processes are governed automatically by the workings of the hypothalamus and the pituitary, which we don’t have control over. When we were young, these processes operated almost perfectly, but as we age, this equilibrium/balance gets less and less efficient.
So, supplementing HGH should be done in as natural a manner as possible. A HGH releaser like GenF20 is just about the safest way to increase your HGH levels without incurring risks associated with pure HGH injections. But, you should always take GenF20 according to the recommended dosage, and include healthy eating and exercise as part of your routine. Related to the above, supplementing other lesser hormones that work with HGH, like for example, testosterone replacement therapy, or melatonin supplementation, should enhance the combined synergistic effect.
But remember, only supplement the other hormones in conjunction with a qualified doctor’s advice. As GenF20 is a nutrient based HGH releaser, it does not require a medical prescription, but it still does require a whole lot of common sense in usage.
|
0.989517 |
Hello I am new to sqlanywhere have experience from MSSQL I have not really figured how to use sqlanywhere tools to access a running databse to view index, database structure and so on.
does someone have any starter information to get me going ?
This is probably a good place to start: Getting Started with SQL Anywhere The docs are quite readable and have a lot of good explanations as well as reference material.
You don't say which version you are using - these docs are for v12, earlier and later versions are similar but not exactly the same. The latest version is 16.
The tool you will probably want to start with is Sybase Central which fulfils a similar role to the Management Studio tool for MSSQL.
One important thing to know coming from the MSSQL world is that SQLA has no "Master" database on a server - login credentials belong to each individual database. Also, if you are looking around the internet for things, remember that SQL Anywhere is a completely different product from Sybase Enterprise (ASE) and instructions for that will not necessarily apply.
Do come back here with any questions you have - it's a pretty friendly forum compared with many! Just specify which version you are using and as much detail as you can about what you have tried and is giving you problems.
you will find a couple of videos on YouTube, for example created under the account "SAP Technology".
The video "SAP D&T Academy - How to Connect to a SQL Anywhere Database" should help you.
|
0.999055 |
Original Article: "16 All-Season Patios to Escape the Chicago Cold"
The weather outside is frightful, but retractable rooftops and enclosed patios are so delightful.
When the weather gets cool, many Chicagoans love to be in denial that winter is around the corner or already here. Thankfully, some of Chicago’s restaurants and bars have just the right cure for winter denial—all-seasons patios. With cozy fireplaces, glass-enclosed escapes and retractable roofs, these restaurants and bars have put together all the stops to pretend it’s still warm outside.
Here are 16 solid restaurants and bars to forget the weather’s cold and hang out on a patio all year long. For the 2018 update, new additions include VU Rooftop Bar, Saint Lou’s Assembly, and Waydown.
Cafe Ba-Ba-Reeba’s patio is already almost fully enclosed, which makes it perfect for the winter. The glass-covered rooftop allows natural light to come in, making it easy to forget the chill of the outdoors. And the tapas don’t hurt, either.
Stella Barra’s patio is whimsical in the summer and even more popular in the winter. The roof closes and fireplaces come on that are installed into the wall, creating a cozy all-weather-appropriate evening.
|
0.998451 |
Enhancers physically interact with transcriptional promoters, looping over distances that can span multiple regulatory elements. Given that enhancer–promoter (EP) interactions generally occur via common protein complexes, it is unclear whether EP pairing is predominantly deterministic or proximity guided. Here, we present cross-organismic evidence suggesting that most EP pairs are compatible, largely determined by physical proximity rather than specific interactions. By reanalyzing transcriptome datasets, we find that the transcription of gene neighbors is correlated over distances that scale with genome size. We experimentally show that nonspecific EP interactions can explain such correlation, and that EP distance acts as a scaling factor for the transcriptional influence of an enhancer. We propose that enhancer sharing is commonplace among eukaryotes, and that EP distance is an important layer of information in gene regulation.
Enhancers mediate the transcriptional regulation of gene expression, enabling isogenic cells to exhibit remarkable phenotypic diversity (Davidson and Peter 2015). In complex with transcription factors, they interact with promoters via chromatin looping (Marsman and Horsfield 2012), finely regulating transcription in time and space. A prevailing view is that most enhancers have a mechanism to selectively loop to a target promoter (van Arensbergen et al. 2014). Examples in this category usually require specific transcription factor binding at both enhancer and promoter sites (Davidson and Peter 2015), which could explain why some enhancers seem to influence different promoters to varying degrees (Gehrig et al. 2009). On the other hand, EP looping is generally mediated by common protein complexes (Kagey et al. 2010; Malik and Roeder 2010), conflicting with the specific molecular interactions required by such a model at a larger scale. Examples of nonspecific EP pairing also seem to be common (Butler and Kadonaga 2001). Yet given that this model could result in transcriptional crosstalk, it appears inconsistent with our current paradigm of gene regulation. The predominant EP pairing scheme, specific or nonspecific, and its determinants are thus unclear. Here, we ask to what extent are potential EP pairs compatible through a meta-analysis of the genome-wide transcription of gene neighbors in five species. We propose that enhancer sharing occurs widely across eukaryotes, test key aspects of this hypothesis in Caenorhabditis elegans, and analyze its implications in other genomic phenomena.
To compute the background correlation, each gene was paired with 20 randomly selected genes from a different chromosome and the 95% median confidence interval was computed by bootstrapping with 10,000 samples. A list of genes annotated with RNA in situ hybridization data (Hammonds et al. 2013; Tomancak et al. 2002, 2007) was obtained from the Berkeley Drosophila Genome Project (http://insitu.fruitfly.org). Insulator Chromatin ImmunoPrecipitation coupled with microarrays (ChIP-chip) data were obtained from Negre et al. (2010) (GSE16245); the intersection of replicates was used. HiC data were obtained from Rao et al. (2014) (GSE63525, GM12878 primary replicate HiCCUPS looplist). Functional protein classification was conducted using Panther (Mi et al. 2016). Genomic manipulations were conducted using Bedtools v2.24.0 (Quinlan and Hall 2010). Data analysis was conducted using Python 2.7.9 and the Scipy library (McKinney 2010). Plots were generated using Matplotlib 1.5 (Hunter 2007).
C. elegans was cultured under standard laboratory conditions (Stiernagle 2006). For enhancer additivity experiments, transgenic C. elegans lines carrying extrachromosomal arrays were generated by injecting each plasmid at 50 ng/μl into unc-119 mutant animals. The minimal Δpes-10 promoter (Fire et al. 1990) and nuclear localized GFP (Lyssenko et al. 2007) were used in all constructs. Minimal regions of the myo-2 and unc-54 enhancers (Okkema et al. 1993) able to drive tissue-specific expression were used. The BWM (body wall muscle) enhancer was obtained from the upstream region of F44B9.2; the BWM/intestine enhancer was obtained from the upstream region of rps-1. Animals were imaged at 40 × using a GFP filter on a Zeiss Axioskop microscope.
For the EP distance and ectopic enhancer experiments, we defined an EP distance of 0 to be the enhancer placed just upstream of the Δpes-10 promoter, which is ∼350 bp away from the start codon of gfp. To ensure neutrality yet maintain a similar GC content as noncoding sequences in C. elegans, we used nonoverlapping AT-rich DNA spacers obtained from the genome of Escherichia coli. Constructs were integrated in single-copy into chromosome IV via CRISPR-Cas9 using plasmids provided as gifts by Zhiping Wang and Yishi Jin (unpublished results). Briefly, plasmids containing the following expression cassettes were coinjected: reporter and hygromycin resistance genes flanked by homologous arms for recombination-directed repair (10 ng/μl), single-guide RNA (10 ng/μl), Cas9 (10 ng/μl), and an extrachromosomal array reporter for expression of either rfp or gfp outside the tissue of interest (10 ng/μl). Transformants were selected for using hygromycin at 10 μg/μl, and those not carrying extrachromosomal transgenes, which lacked gfp or rfp expression outside the tissue of interest, were subsequently isolated. Animals homozygotic for the insertion were identified by polymerase chain reaction (PCR) and Sanger sequencing.
Quantitative PCR was carried out as previously described (Ly et al. 2015) using pmp-3 as a reference gene (Zhang et al. 2012). Briefly, third-stage larval (L3) worms, when expression from the test enhancers is maximal according to RNA-seq data, were synchronized at 20° via egg-laying. Fifteen animals were lysed in 1.5 μl of Lysis Buffer [5 mM Tris pH 8.0 (MP Biomedicals), 0.5% Triton X-100, 0.5% Tween 20, 0.25 mM EDTA (Sigma-Aldrich)] with proteinase-K (Roche) at 1.5 μg/μl, and incubated at 65° for 10 min followed by 85° for 1 min. Reverse transcription was carried out using the Maxima H Minus cDNA synthesis kit (Thermo Fisher Scientific) by adding 0.3 μl H2O, 0.6 μl 5 × enzyme buffer, 0.15 μl 10 mM dNTP mix, 0.15 μl 0.5 μg/μl oligo dT primer, 0.15 μl enzyme mix, and 0.15 μl DNAse, and incubated for 2 min at 37°, followed by 30 min at 50°, and finally 2 min at 85°. The cDNA solution was diluted to 15 μl and 1 μl was used for each qPCR reaction, so that on average each well contained the amount of RNA from a single worm. All qPCR reactions were performed with three technical replicates and at least three biological replicates using the Roche LightCycler 480 SYBR Green I Master in the LightCycler 480 System. Crossing point-PCR-cycle (Cp) averages were computed for each group of three technical replicates; these values were then subtracted from the respective average Cp value of the reference gene.
Strains are available upon request. Relevant DNA sequences, including spacers, enhancers, primers, sgRNA, and homology arms are available in Supplemental Material, Table S1. Correlation datasets are available in File S1 and File S2. qPCR data are available in Table S2. Python source code, and links to all expression datasets used in this study, are available for download on the following github repository: https://github.com/WormLabCaltech/QuinteroSternberg2016.git.
We reasoned that widespread EP compatibility should result in transcriptional correlation among gene neighbors. Indeed, gene coexpression clusters have been extensively reported in eukaryotic genomes (e.g., Sémon and Duret 2006; Roy et al. 2002; Lercher et al. 2002, 2003; Lercher and Hurst 2006; Williams and Hurst 2002; Singer et al. 2005; Williams and Bowles 2004; Spellman and Rubin 2002; Purmann et al. 2007; Zhan et al. 2006; Boutanae v et al. 2002; Kalmykova et al. 2005; Caron et al. 2001; Rubin and Green 2013) in spite of order of magnitude variations in genome size (e.g., ∼12 Mb in Saccharomyces cerevisiae vs. ∼3 Gb in H. sapiens). An early informative example is the discovery of chromosomal domains of gene expression in S. cerevisiae (Cohen et al. 2000) that exhibit features that strongly support enhancer-sharing, mainly distance-dependence in transcriptional correlation that qualitatively resemble chromosome contact matrices (e.g., Rao et al. 2014), and instances in which a single enhancer seems to be responsible for the coexpression of adjacent gene pairs. The ubiquity of these features across eukaryotes would support the idea that EP interactions are largely determined by physical proximity rather than by specific interactions. Given the accumulation of transcriptome sequencing data, we decided to investigate the transcriptional correlation of gene neighbors in representative eukaryotic species as a first step to explore the average EP pairing scheme.
We paired every protein-coding gene of five organisms (S. cerevisiae, C. elegans, Drosophila melanogaster, M. musculus, and H. sapiens) with its 100 nearest neighbors within the same chromosome. This yielded lists of around 600,000 (S. cerevisiae) and 2 million (each of the rest) gene pairs. We then computed the Spearman correlation coefficient between paired genes across multiple RNA-seq datasets (Gerstein et al. 2010; Attrill et al. 2016; Ellahi et al. 2015; The ENCODE Project Consortium 2012) and the intergenic distance between the start of the 5′ untranslated region of the first gene to the start of the second gene in each pair.
(Figure 1C), indicating that 100 gene neighbors are a sufficient number to study this effect.
vertical red dashed line). The genome size (G) is displayed for each organism. Distribution of intergenic distances between each gene and its nearest neighbor (B) and all paired genes (C). The organism analyzed in each case is indicated for each group of three subplots.
= 22 compared to 6 kb), suggesting that RNA-seq analysis, which included mostly whole-organism transcriptome averages, resulted in a conservative estimate.
Given that pairing every gene with 100 proximal genes provides a complete set of distance-dependent correlations between gene pairs, we concluded that gene neighbors have a spatio-temporal correlation in expression that is highly dependent upon the spacing between them. Our meta-analysis unifies the findings of previous reports (reviewed in Michalak 2008) and highlights the distance-dependence of genome-wide and cross-organismic transcriptional correlations that transcend localized gene coexpression clusters.
< 1 kb in S. cerevisiae, (Dobi and Winston 2007), < 10 kb in C. elegans, (Araya et al. 2014), and 120 kb in H. sapiens (Sanyal et al. 2012); (iii) common protein complexes such as the mediator seem to be widely utilized bridges in EP looping (Kagey et al. 2010; Malik and Roeder 2010); (iv) a high frequency of chromatin interactions are observed within topologically-associated domains identified through high-resolution Chromosome Conformation Capture (Hi-C) (Rao et al. 2014); and (v) studied enhancers often do not show promoter specificity (Butler and Kadonaga 2001). This line of reasoning suggests a model where, as opposed to only having a specific target gene (Figure 2A), the average enhancer has a range of action in which it can influence any active promoter within its reach (Figure 2B). A concrete example consistent with this idea is the upregulation of neighboring genes upon enhancer activation by fibroblast growth factor in mammalian cells (Ebisuya et al. 2008). Transcriptome analysis could thus provide indirect evidence of genome and condition-wide EP looping that is difficult to access through Hi-C (Rao et al. 2014) due to the low signal-to-noise ratio of short-range interactions.
Enhancer sharing explains the transcriptional correlation of gene neighbors. Two possible models for EP relationship: (A) Enhancers have specific target genes and (B) enhancers have a range of action in which they influence genes by physical proximity. Tissue-specific enhancers (C) are generally compatible. Pharynx and body wall muscle (D) and pharynx, body wall muscle, and intestine (E) enhancers driving nuclear gfp expression. mRNA levels of gfp with increasing EP distance for lines with myo-2 (filled circles) (F) and unc-54 (hollow circles) (G) enhancers. (H) Genomic context of the integration site. The inserted construct is shown over a dashed black line and includes a hygromycin resistance gene (hyg-R) regulated by a ribosomal enhancer (rps-0) and promoter in addition to the reporter (gfp) regulated by either the myo-2 or unc-54 enhancers; the native genes dpy-13 and col-34 flank the insertion site. Relative mRNA levels of dpy-13 (I) and col-34 (J) in wild-type and lines with and without the 2 kb spacer (* two tailed P-value < 0.05, Mann-Whitney U-test). The difference in crossing point-PCR-cycle (ΔCp) with the reference gene pmp-3 and the corresponding median for each group of biological replicates is shown for every qPCR experiment. EP, enhancer–promoter; mRNA, messenger RNA; PCR, polymerase chain reaction; qPCR, quantitative PCR.
Because of its compact genome, rapid development, and availability of tissue-specific enhancers (Corsi et al. 2015), we decided to use C. elegans to test the validity of a nonspecific EP pairing model. We first postulated that unrelated enhancers should generally be compatible, showing qualitative additivity when placed upstream of a single promoter. We thus paired the well-characterized myo-2 pharyngeal enhancer with a BWM and a BWM plus intestine enhancer, placed them upstream of a minimal promoter and a gfp reporter, and examined expression in transgenic animals. In both cases, we observed fluorescence in the corresponding tissues (Figure 2, C–E). This observation is consistent with typical enhancer studies in artificial constructs (Dupuy et al. 2004) and agrees with some EP compatibility studies (Butler and Kadonaga 2001).
Given that both chromatin looping and expression correlation decay exponentially, we reasoned that transcription of a given gene should also decay exponentially with increasing EP distance if the observed correlation is to be explained by enhancer sharing. To test this hypothesis, we first built a series of genetic constructs with increasing neutral EP distances (0, 1, 1.5, and 2 kb) for two different enhancers, myo-2 and unc-54 (∼400 and 300 bp, respectively). We then integrated each construct in single-copy into the genome of C. elegans and used quantitative PCR to: (i) measure the influence of EP distance on the reporter gene in native chromatin and (ii) analyze the impact of the perturbation on the two genes that natively flank the site of transgene insertion (dpy-13 and col-34, Figure 2H), which we reasoned should be affected in two counteracting ways. First, the ectopic enhancers should promote their expression. Second, the increased EP distance caused by the addition of spacers should reduce their expression by scaling down the influence of both ectopic and native enhancers (the latter of unknown identity and location) to the opposite side of the spacer.
is only a rough estimate of the average enhancer rage of action; this is useful to gain insight into genome-wide mechanisms but not for precise individual predictions.
Chromatin modifications have been shown to have a significant impact on enhancer function (Calo and Wysocka 2013) and thus likely influence EP pairing. Thus, chromatin features and enhancer sharing might be mutually inclusive rather than stand-alone explanations for the observed correlation domains. From this perspective, transcriptionally correlated genes would have similar chromatin states, facilitated by their physical proximity, that make them accessible to enhancer action.
The existence of multiple, independent, but similar enhancers is an alternative possible explanation. However, since we are looking at genome-wide averages, this would mean that most gene neighbors have a functionally redundant set of independent enhancers that function through distinct molecular interactions. Although possible, this is a rather intricate explanation.
(6–22 kb). Additionally, these long-range interactions appear to be particularly specific, with enhancers selectively activating their target promoters (Ghavi-Helm et al. 2014; Kwon et al. 2009). It is, thus, possible that in compact genomes, long-range EP interactions would need to be specific, whereas nearby interactions would tend to fall in the nonspecific pairing scheme, ultimately resulting in the observed correlation domain size.
We next wished to determine the extent to which enhancer sharing could explain other genomic phenomena. Previous reports have suggested that divergent, parallel, and convergent gene pairs tend to have distinct correlation profiles (e.g., Chen and Stein 2006). To explore this hypothesis, we compared the distribution of intergenic distances of gene pairs oriented in parallel, divergent, and convergent orientations (Figure 3A and Figure S6). As expected, divergent gene pairs tend to be closest, followed by parallel, and finally convergent genes. We then confirmed that each group appears to have different distributions of correlations (Figure 3B and Figure S6). To consider the influence of EP distance, we sampled gene pairs from each orientation controlling for intergenic size. This resulted in distributions of correlations that exactly overlap (Figure 3C and Figure S6), an observation that is supported by previous reports in specific cases (Ghanbarian and Hurst 2015; Cohen et al. 2000). We thus conclude that the apparent influence of gene orientation in the transcriptional relationship of neighboring gene pairs is consistent with the enhancer sharing hypothesis. In this scenario, the effect of gene orientation can be simply explained by the different EP distance distributions for each configuration.
EP distance causes gene orientation-dependent correlation and provides regulatory independence to gene neighbors. Distribution of intergenic distances < 10 kb of gene pairs in D. melanogaster by configuration (∼5–18,000 gene pairs for each group) (A) and flanking insulator binding sites identified through ChIP-chip (Negre et al. 2010) (∼5–15,000 pairs for each group) (D). The corresponding distribution of correlations is shown for the same gene pairs (B, E) and pairs with controlled distributions of intergenic distances between 30 and 40 kb (∼7–14,000 pairs for gene orientation groups, ∼10–18,000 for insulator groups) (C and F). CHIp-chip, Chromatin ImmunoPrecipitation coupled with microarrays; EP, enhancer–promoter.
From the regulatory perspective, EP distance provides independence to most gene pairs, as the vast majority have an intergenic distance that puts them in the baseline correlation regime (Figure 1C). To study the enhancer-blocking influence of insulators (Bushey et al. 2009) genome-wide, we analyzed each group of genes flanked by insulator binding sites, which were previously determined using ChIP-chip for six known insulators in D. melanogaster: BEAF-32, CP190, CTCF, GAF, Mod(mdg4), and Su(Hw) (Negre et al. 2010). We observed that gene neighbors closer than 10 kb bound by each of the insulators tend to be less correlated in gene expression than gene pairs not bound by them (Figure 3E), supporting their role in genome-wide insulation and agreeing with the observation that insulators tend to separate differentially expressed genes (Negre et al. 2010; Xie et al. 2007). Nevertheless, the same groups of gene pairs also tend to have much larger intergenic distances than genes that are not flanked by insulator binding sites (Figure 3D). After controlling for the distribution of intergenic distances, we found very similar correlation distributions between insulator and not insulator flanked gene pairs (Figure 3F). This finding agrees with previous reports suggesting that insulators do not block enhancers everywhere they bind, but rather act only on very specific genomic contexts (Schwartz et al. 2012; Liu et al. 2015; Ong and Corces 2014); it also reconciles the lack of known insulator orthologs in C. elegans (Heger et al. 2009) in the context of local enhancer-blocking. In combination, these studies strongly suggest that EP distance is the general source of transcriptional independence for close gene neighbors.
Previous EP compatibility studies have suggested that EP specificity is widespread (Gehrig et al. 2009), while others have suggested that it is restricted to a smaller subset of enhancers (Butler and Kadonaga 2001). Although our results support the latter, views arising from these studies might not be mutually exclusive, as it is likely that enhancers have specificity to promoter classes (Danino et al. 2015), whose limited number could result in general EP compatibility.
The implications from considering our observations are broadly applicable to gene regulation. Position effects, in which transgene expression levels are influenced by the insertion site (Gierman et al. 2007), are naturally expected from enhancer sharing. Chromosomal translocations and mutations involving regulatory elements likely impact genetic contexts rather than individual genes. Furthermore, enhancer sharing and distance-based scaling of enhancer influence potentially provides an additional layer of information in gene regulation, as the transcriptional output of a given gene would be the result of scaled contributions from multiple shared enhancers. Such a feature could, by itself, be under selective pressure, leading to a roughly constant size of the correlation domain in number of genes regardless of absolute physical distance, as observed in this study. Our analysis provides a clarifying perspective of gene regulation consistent with both mechanistic and genome-wide studies.
We thank Zhiping Wang and Yishi Jin for plasmids for CRISPR-Cas9 single-copy insertion; Carmie Robinson for discussions, experimental suggestions, and comments on the manuscript; Han Wang for discussions, technical advice, and comments on the manuscript; Hillel Schwartz, Mitchell Guttman, Mihoko Kato, David Angeles-Albores, Jonathan Liu, Barbara Wold, Isabelle Peter, and Angelike Stathopoulos for discussions and comments on the manuscript; the Encode and ModEncode consortiums, FlyBase, WormBase, and Ensembl databases, the Wold Lab, and the Guigo Lab for data accessibility. Our work was supported by the Howard Hughes Medical Institute, of which P.W.S. is an investigator.
Author contributions: P.Q.C. performed the experiments and analyzed the data. P.Q.C. and P.W.S. designed the experiments and wrote the paper. The authors declare no competing financial interests.
Supplemental material is available online at www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.036228/-/DC1.
, 2011 A global analysis of C. elegans trans-splicing. Genome Res. 21: 255–264.
, 2014 Regulatory analysis of the C. elegans genome with spatiotemporal resolution. Nature 512: 400–405.
, 2016 Flybase: establishing a Gene Group resource for Drosophila melanogaster. Nucleic Acids Res. 44: D786–D792.
, 2002 Large clusters of co-expressed genes in the Drosophila genome. Nature 420: 666–669.
, 2009 Chromatin insulators: regulatory mechanisms and epigenetic inheritance. Mol. Cell 32: 1–9.
, 2001 Enhancer–promoter specificity mediated by DPE or TATA core promoter motifs. Genes Dev. 15: 2515–2519.
, 2013 Modification of enhancer chromatin: what, how, and why? Mol. Cell 49: 825–837.
, 2001 The human transcriptome map: clustering of highly expressed genes in chromosomal domains. Science 291: 1289–1292.
, 2006 Conservation and functional significance of gene topology in the genome of Caenorhabditis elegans. Genome Res. 16: 606–617.
, 2000 A computational analysis of whole-genome expression data reveals chromosomal domains of gene expression. Nat. Genet. 26: 183–186.
, 2015 The core promoter: at the heart of gene expression. Biochim. Biophys. Acta 1849: 1116–1131.
, 2015 Chapter 1 - The genome in development, pp. 1–40 in Genomic Control Process, edited by Davidson E. H., Peter I. S.. Academic Press, Oxford.
, 2007 Analysis of transcriptional activation at a distance in Saccharomyces cerevisiae. Mol. Cell. Biol. 27: 5575–5586.
, 2004 A first version of the Caenorhabditis elegans promoterome. Genome Res. 14: 2169–2175.
, 2008 Ripples from neighbouring transcription. Nat. Cell Biol. 10: 1106–1113.
, 2015 The chromatin and transcriptional landscape of native Saccharomyces cerevisiae telomeres and subtelomeric domains. Genetics 2: 505–521.
, 1990 A modular set of lacZ fusion vectors for studying gene expression in Caenorhabditis elegans. Gene 93: 189–198.
, 2014 Ensembl 2014. Nucleic Acids Res. 42: D749–D755.
, 2009 Automated high-throughput mapping of promoter-enhancer interactions in zebrafish embryos. Nat. Methods 6: 911–916.
, 2015 Neighboring genes show correlated evolution in gene expression. Mol. Biol. Evol. 32: 1748–1766.
, 2014 Enhancer loops appear stable during development and are associated with paused polymerase. Nature 512: 96–100.
, 2007 Domain-wide regulation of gene expression in the human genome. Genome Res. 17: 1286–1295.
, 2009 Loss of the insulator protein CTCF during nematode evolution. BMC Mol. Biol. 5: 1–14.
, 2010 Mediator and cohesin connect gene expression and chromatin architecture. Nature 467: 430–435.
, 2005 Regulated chromatin domain comprising cluster of co-expressed genes in Drosophila melanogaster. Nucleic Acids Res. 33: 1435–1444.
, 2009 Enhancer-promoter communication at the Drosophila engrailed locus. Development 136: 3067–3075.
, 2006 Co-expressed yeast genes cluster over a long range but are not regularly spaced. J. Mol. Biol. 359: 825–831.
, 2002 Clustering of housekeeping genes provides a unified model of gene order in the human genome. Nat. Genet. 31: 180–183.
, 2003 Coexpression of neighboring genes in Caenorhabditis elegans is mostly due to operons and duplicate genes. Genome Res. 13: 238–243.
, 2010 RNA-Seq gene expression estimation with read mapping uncertainty. Bioinformatics 26: 493–500.
, 2015 Genomic discovery of potent chromatin insulators for human gene therapy. Nat. Biotechnol. 33: 198–203.
, 2015 Rapid RNA analysis of individual Caenorhabditis elegans. MethodsX 2: 59–63.
, 2007 Cognate putative nuclear localization signal effects strong nuclear localization of a GFP reporter and facilitates gene expression studies in Caenorhabditis elegans. Biotechniques 43: 596–600.
, 2010 The metazoan mediator co-activator complex as an integrative hub for transcriptional regulation. Nat. Rev. Genet. 11: 761–772.
, 2012 Long distance relationships: enhancer–promoter communication and dynamic gene transcription. Biochim. Biophys. Acta. 1819: 1217–1227.
, 2010 Data structures for statistical computing in Python. Proceedings of the 9th Python in Science Conference, edited by van der Walt S., Millman J. pp. 51–56.
, 2016 Panther version 10: expanded protein families and functions, and analysis tools. Nucleic Acids Res. 44: D336–D342.
, 2008 Coexpression, coregulation, and cofunctionality of neighboring genes in eukaryotic genomes. Genomics 91: 243–248.
, 2010 A comprehensive map of insulator elements for the Drosophila genome. PLoS Genet. 6: e1000814.
, 2014 CTCF: an architectural protein bridging genome topology and function. Nat. Rev. Genet. 15: 234–246.
, 2012 The duplicated genes database: identification and functional annotation of co-localised duplicated genes across genomes. PLoS One 7: 1–8.
, 2007 Genomic organization of transcriptomes in mammals: coregulation and cofunctionality. Genomics 89: 580–587.
, 2014 A 3D map of the human genome at kilobase resolution reveals principles of chromatin looping. Cell 159: 1665–1680.
, 1999 Quantitative comparison of DNA looping in vitro and in vivo: chromatin increases effective DNA flexibility at short distances. EMBO J. 18: 6630–6641.
, 2013 Expression-based segmentation of the Drosophila genome. BMC Genomics 14: 1–8.
, 2012 Nature and function of insulator protein binding sites in the Drosophila genome. Genome Res. 11: 2188–2198.
, 2006 Evolutionary origin and maintenance of coexpressed gene clusters in mammals. Mol. Biol. Evol. 23: 1715–1723.
, 2005 Clusters of co-expressed genes in mammalian genomes are conserved by natural selection. Mol. Biol. Evol. 22: 767–775.
, 2002 Evidence for large domains of similarly expressed genes in the Drosophila genome. J. Biol. 1: 1–8.
Stiernagle, T., 2006 Maintenance of C. elegans (February 11, 2006), WormBook, ed. The C. elegans Research Community WormBook, doi/10.1895/wormbook.1.101.1, http://www.wormbook.org.
, 2002 Systematic determination of patterns of gene expression during Drosophila embryogenesis. Genome Biol. 3: research0088.1–88.14.
, 2007 Global analysis of patterns of gene expression during Drosophila embryogenesis. Genome Biol. 8: R145.
, 2014 In search of the determinants of enhancer–promoter interaction specificity. Trends Cell Biol. 24: 695–702.
, 2004 Coexpression of neighboring genes in the genome of Arabidopsis thaliana. Genome Res. 14: 1060–1067.
, 2002 Clustering of tissue-specific genes underlies much of the similarity in rates of protein evolution of linked genes. J. Mol. Evol. 54: 511–518.
, 2007 Systematic discovery of regulatory motifs in conserved regions of the human genome, including thousands of CTCF insulator sites. Proc. Natl. Acad. Sci. USA 104: 7145–7150.
, 2006 Islands of co-expressed neighbouring genes in Arabidopsis thaliana suggest higher-order chromosome domains. Plant J. 45: 347–357.
, 2012 Selection of reliable reference genes in Caenorhabditis elegans for analysis of nanotoxicity. PLoS One 7: e31846.
|
0.999957 |
If a person is staying in a hotel on Shabbat, and the non-Jewish hotel staff brewed coffee for its guests, the majority of whom are not Jewish, may he drink this coffee?
As a general rule, Halacha allows benefitting from a Melacha performed on Shabbat by a non-Jew for a non-Jew, as long as it is clear that no additional Melacha was performed for a Jew. However, the Shulhan Aruch (Orah Haim 325:6) makes an exception when it comes to bread. If a non-Jew bakes bread for himself on Shabbat, even though all the ingredients are kosher, a Jew may not partake of this bread. (The Shulhan Aruch writes that this is permissible only �Bi�she�at Ha�dahak� � under extenuating circumstances.) The question thus arises as to the reason for this exception, and whether it applies to freshly-brewed coffee, as well.
The Mishna Berura (Rav Yisrael Meir Kagan, 1839-1933) brings two reasons for this Halacha. The first reason is that the bread is forbidden because of the rule of �Nolad,� which forbids making use of something which came into existence before Shabbat. Bread baked on Shabbat did not exist before Shabbat, as when Shabbat began there was only flour and the other ingredients, and thus the bread is forbidden on Shabbat. The second possibility, which the Mishna Berura cites from the Mordechi, is that since people are drawn after food, the Sages forbade partaking of food prepared on Shabbat by non-Jews for non-Jews. If this were allowed, the Sages feared, then people might then ask non-Jews to prepare food for them on Shabbat, in violation of Halacha.
The Ben Ish Hai (Rav Yosef Haim of Baghdad, 1833-1909) discusses (in Parashat Teruma) the question of how this might affect the status of coffee prepared by gentiles on Shabbat. The context of his discussion is the practice that many Jews in Baghdad had at that time to drink coffee in gentile shops on Shabbat. They would make an arrangement with the shopkeepers before Shabbat to avoid having to pay money on Shabbat, and then enjoy on Shabbat the freshly-brewed coffee which was prepared by the gentile shopkeepers for their predominantly non-Jewish clientele. The Ben Ish Hai writes that as for the first concern, the prohibition of �Nolad,� one could argue that coffee, unlike bread, does not fall under this category. After all, coffee is, essentially, flavored water, and the water and coffee beans both existed before Shabbat. Coffee differs in this respect from bread, which is an entirely new entity once it is baked. Therefore, one could certainly contend that coffee brewed on Shabbat should not be forbidden on the grounds of �Nolad.� (The Ben Ish Hai draws proof from the fact that we recite �Sha�hakol� on coffee, not �Ha�etz,� indicating that Halacha treats coffee essentially as flavored water.) However, the Ben Ish Hai writes, the second concern � that food prepared by gentiles on Shabbat is treated differently than other cases of Melacha performed by gentiles � would, seemingly, apply to coffee just as it does to bread. Just as bread baked on Shabbat is forbidden due to the concern that one might ask a gentile to prepare bread for him on Shabbat, by the same token, coffee should be forbidden out of the concern that one might ask a gentile to brew coffee for him.
Rav Shlomo Miller (contemporary) suggests distinguishing in this regard between food and beverages, proposing that perhaps people are not as drawn after beverages as they are after food. As such, perhaps there is room to permit coffee brewed by non-Jews on Shabbat. However, while this might be true regarding water � such that it would be permissible, for example, to take hot water from an urn turned on by a gentile on Shabbat for other gentiles � it would seem that coffee is no different from food in this regard. Many people very much enjoy � and in fact need � coffee, and thus there is no less concern that people might ask a gentile to brew coffee for them as there is that people might ask a gentile to prepare bread for them.
The Ben Ish Hai concludes that those who drink the coffee in the gentiles� shops have a basis on which to rely, for, as we saw, according to one view, the determining factor is �Nolad,� which does not apply to coffee. However, since according to others there is a special prohibition that applies to food, it is preferable to act stringently in this regard. This is the view accepted also by Hacham Ovadia Yosef, in his Halichot Olam. Therefore, it is preferable not to drink coffee brewed on Shabbat by gentiles, even if this were done for gentiles.
It should be noted that this would not apply to coffee brewed by machines. The concern applies only to food or beverages prepared by a non-Jew on Shabbat; it does not pertain to machines. Therefore � assuming, of course, there are no Kashrut concerns � it would be permissible to drink coffee brewed by an automated machine on Shabbat.
Summary: If a non-Jew brewed coffee on Shabbat for other non-Jews � such as in a hotel serving mainly non-Jewish guests � there is room to allow a Jew to drink this coffee (assuming, of course, there are no Kashrut concerns), though it is preferable not to drink the coffee. However, coffee brewed by an automated machine on Shabbat may be drunk (again, assuming there are no Kashrut concerns).
|
0.999999 |
El equipo de damas de Glenbervie puso en una gran actuación en el Annodata Golf Club Classic Finals en España, ganando su semifinal, pero lamentablemente perdiendo en la final.
For the non-Spanish speakers out there, the title and first paragraph above reads: "Very Well Done Glenbervie Ladies. The Glenbervie ladies team put in a great performance at the Annodata Golf Club Classic finals in Spain, winning their semi-final, but unfortunately losing out in the final."
Having won through 6 earlier rounds against teams from across the UK, the Glenbervie Ladies team travelled to the Montecastillo Golf Resort in Cadiz, Spain, to play in the finals of the Annodata Golf Club Classic. After two days of practice, the Glenbervie ladies took on and beat the Lambourne GC team in their semi-final. In the final, Glenbervie faced the ladies from the Links GC in Newmarket. The first two matches resulted in 1 win each, before Links GC went on to win the remaining three matches. These were close affairs, however, with one match finishing at the 17th and the other two going the full distance.
What a superb performance to get all the way to the final of a UK-wide competition. Everyone at Glenbervie should be very proud of what these ladies have acheived. Congratulations to the team members that played in Spain (shown below) - Fiona Ross, Margaret Tough, Helen Goodwin, Alison Goodwin, Elizabeth Goodwin - and to those other ladies who played in the earlier rounds.
|
0.999608 |
what expression do i use for something that is in its early stages or premature stage?
Try a thesaurus, starting with any of these: developing, immature, nubile, pubescent, labile, half-baked. They're not synonyms, and they're in a range of registers, but they should be enough to get you going. Any questions arising, ask again and someone will probably have something to say; they're more likely to be inclined to if you've made an effort to start with.
|
0.994448 |
Which Vitamix Container is Best?
It's hard to decide which Vitamix container is best for all of your needs, and as they continue to expand their already rich assortment of blender containers, I constantly get asked the following questions.
Which Vitamix container is best for smoothies or peanut butter or ice cream?
Which Vitamix container is compatible with which models?
Do I need the Vitamix dry container?
Do I need an additional Vitamix container and if so which one?
You can also watch a video my friend Lenny and I made about Vitamix Containers above. He's a Vitamix Blender Babe and you can find him at LifeisNoYoke.com... Doesn't he look good in his BB gear?!
P.S. If you still need help deciding Which Vitamix to BUY <<-- Click this link.
The most notable piece of equipment for most blenders is the container, for it has the blades and holds the finished product. Blade design varies, depending on purpose, as does jar size and even base size.
While interchangeability is usually a desired trait, Vitamix does not have a "one size fits all" approach so I wanted to make clear which Vitamix container fits with which models.
The Vitamix lineup of containers varies from single-serving personal containers to the 64oz low profile jar. It's worth noting that these polar end products are not interchangeable, as the motor is built for different volume needs.
Vitamix 64 oz Tall Standard Container – the original Vitamix 64 oz container, this tall jar with 3 inch base totals 20.4″ tall. Does not fit under most kitchen cabinets. Should only be used on C-Series models with a 2 peak horsepower motor.
Vitamix 64 oz container for Ascent Series ONLY – this is also a shorter 64 oz container that makes the unit 17" tall on base and fits under most kitchen cabinets. Due to the "Smart Detect" technology used in the Ascent Series, you cannot use any container on an Ascent base other than those made for the Ascent Series. This container also has an improved spout and transparent lid which locks in place.
Vitamix 48 oz Compact Container – smaller capacity compact container - totals 17.4” tall on base - fits all Vitamix C-Series or G-Series models.
Vitamix 32 oz Dry Container – made especially for grinding. Great if you plan to do A LOT of grinding (otherwise usually unnecessary) - fits all Vitamix C-Series or G-Series models.
Vitamix 20 oz Travel Container – blend-and-go style cup. Use removable blade to flip over and blend then add the flip cup lid and take on the go - fits all S-Series models only for blending - but can be purchased separately as a to-go cup for any use.
Vitamix 40 oz Container – removable blade and gasket for cleaning - fits all S-Series models only (only the blade can be purchased separately).
NOTE: Sometimes I find Vitamix Containers on Amazon for less $$.
Each Vitamix container (except the travel cup) comes with its own perfectly sized tamper.
That said the low profile Vitamix 64 oz container with a wider 4 inch base may require less tamping with certain blends.
Yet the low profile Vitamix 64 oz container can't do smaller portions. More on that below.
Which Vitamix Container Should You Get?
So, if you're planning to purchase a Vitamix, which jar should you get for it?
Stop! Sorry if you answered that. If you don't have a Vitamix yet, you really should research which vitamix to buy FIRST and purchase the model and features that are best based on your needs.
In other words, don't get a blender for your container, get a container for your blender.
If you already own a Vitamix or not, you may wonder which additional jars are necessary from all the products above. Let's begin by deciding whether you need the Vitamix dry container.
Do You Need the Vitamix Dry Container?
There is only one dry jar and it comes in the 32 oz size.
The Vitamix dry container is designed specifically to grind grains into flour and to mix batter.
The blades on this container are different from the wet jars and is designed to push grains away from the blades, thus limiting material packing at the bottom of the container.
The Vitamix dry container blade design is also engineered to prepare dough by simulating the kneading process.
In comparison, wet jars, which come in three sizes, 64 oz, 32 oz and 48 oz - are engineered to pull your ingredients into the blades, thus aiding in the liquefying process.
So does this mean you can't make flour or mix batter in a wet jar, thus justifying the purchase of a Vitamix dry container?
Fortunately, in our testing and experience, we have had no issues creating flour or mixing batter in our wet jars.
You can see our results grinding popcorn into cornmeal with the vitamix wet jar vs dry jar here.
It is therefore our "Blender Babes" recommendation that unless you plan on grinding grains A LOT, the Vitamix dry container isn't worth it.
The jar that comes with your Vitamix purchase will serve the purpose of occasional grinding needs just fine.
The Next Generation and Ascent Series low profile Vitamix 64 oz container features a larger 4 inch base vs the conventional 3 inch base of the tall Vitamix 64 oz standard container.
The wider base helps facilitate "chopping" and is more efficient for blends such as smoothies due to its wider design.
Due to the wider design, the jar is also shorter, measuring in at 10.1 inches high. This is several inches shorter than the 64 oz conventional "tall" jar. This shorter design is therefore easier to store under your kitchen cabinet.
However, the drawback to this is that it requires more volume to work properly.
For this reason, single-serving smoothies or small amounts of items such as peanut butter, ice cream, and sauces are difficult to make, as the volume is not sufficient and can get packed under the blade due to the larger base.
In contrast, the tall Vitamix 64 oz standard container with 3 inch base does not have a problem with single-serving and smaller volume needs.
However, the 3 inch base also does not do as well a job of "chopping" your materials and the taller size makes them harder to store, especially if you keep your jar on top of your blender.
In order to demonstrate the volume necessary when blending with the Vitamix 64 oz container (low profile), my friend Lenny and I decided to have a little fun by comparing the amount required by this container vs the smallest Vitamix 32 oz container making ice cream... aka strawberry banana "nice cream".
We began with 1/2 a banana and 1 strawberry and continued to add, in these same increments, frozen fruit with NO LIQUID to these jars, using the tamper to press the ingredients into the blade.
We added and processed until we had successful, thick Vitamix ice cream.
As demonstrated, the wider low profile 64 oz jar had difficulty achieving a single-serving with the same amount of frozen fruit as the 32 oz jar.
It took 2.5 times more ingredients to be able to process properly.
If you have not yet purchased a Vitamix, begin by first determining which model is best for YOU with our comprehensive "which vitamix to buy review".
Then decide which additional Vitamix container(s) will meet your needs.
Personally I recommend the Vitamix 32 oz container (wet not dry) as the #1 only other jar you need if the model you want comes with a low profile Vitamix 64 oz container.
That said, if the model you want comes with the tall Vitamix 64 oz container you might not need an additional jar at all!
The jars obviously enhance your product, but they should not be the deciding factor.
Which Vitamix Container(s) Meet YOUR Needs?
Yes, I learned a few things. I didn’t know there was a 32 oz wet AND dry container. I also decided I don’t need a 64oz container. I think that a 48 oz container would suit my needs, and then add a 32 oz wet container maybe(?). Still on the fence with that since I have a nutribullet that I really like but just a tad small. When I first saw the compact 64 oz container I thought it would be nice to have, but seeing that it doesn’t do smaller batches very well I realized that it would not be a good buy. . I have been reviewing the different vitamix options for a couple months and glad I didn’t jump the gun. I thought I knew what I wanted a few times but then changed my mind after further “research”. Thank you for your info and recommendations.
Hi, I currently have the low profile container but am having trouble making baby food with it because you need such large quantities. Which is the best jug I can buy that will make the smallest quantity of baby food?
I have the Vitamin Professional series 750.
Hi, Kristina! Thanks for reaching out!
Great question! The best container for you to make baby food in small quantities would be the 32 oz wet jar container. Here is a link to the jar.
Also, remember us our promo code (06-007974) at checkout to receive free shipping. Forward your confirmation email to [email protected] to receive their free gifts.
Understanding the differences in Vitamix models and various containers better than previous for which I am grateful to you. Regardless of a specific model Vitamix is a fantastic appliance.Thank you for sharing your knowledge and I am a fan.
Thanks, Jo! I’m so happy you found the review useful.
Hi, Sim! If you have the tall 64 oz standard jar, it can blend single servings because it has 3 inch wide blades. You should be fine making baby food and small quantities of purees with the container you currently have. The 64 oz low profile, however, can’t blend single serving because it has a really wide blade extending 4 inches. You would need at least 2 cups of ingredients for that blender.
|
0.999998 |
Many people think about gambling and they automatically get concerned. The ties between gambling addiction and the industry as a whole are strong and can make many people nervous just by thinking about it. But, is it possible to lead a healthy life and still gamble from time to time? The answer is yes.
Gambling is similar in a lot of ways to things like alcohol or enjoying less-than-healthy foods; it is possible to have these things in your life without ever experiencing a problem. However, there are key differences between gambling in a way that is healthy, and crossing into addiction territory. To help you see the difference, consider these points below.
While it might not be wise to think that gambling is ever a “safe” activity based on the fact that money and risk are involved, it is possible to gamble responsibly. Often, this involves having a full awareness of the risks, including the fact that the odds are distinctly not in your favor. Additionally, limiting the amount of funds spent based on the amount you can afford to lose can also allow a person to gamble without putting oneself in harm’s way.
When done responsibly, gambling can be just like any other form of entertainment that involves spending money for an experience without necessarily getting anything tangible in return. For example, if instead of going to the movie theater, you decide to spend the same amount at a casino, then you might be acting responsibly, especially if you are not canceling plans with those close to you in favor of gambling alone.
Gambling can be considered a problem at any point once the activity causes significant harm to one’s life. For example, if you stop visiting friends and family, preferring to gamble alone instead, this can be a warning sign. Additionally, spending money gambling that you can’t actually afford to lose is another sign of trouble.
Some more serious signs can include inflated highs when you win and serious depression when you lose. Also, not believing that you are “truly living” unless you are gambling is also a point of concern. Further, if you find yourself ashamed of your actions, and actively trying to hide the activity from friends, family members, or other important people in your life, this could indicate you have begun to have problems with gambling.
However, if you ever participate in illegal activity to help support your gambling habit, then it is almost certain that you have a serious problem and need help. Additionally, if you have stopped paying your bills or managing other expenses, like to cost of food, and instead use that money to gamble, it is best to seek help immediately.
In cases where you are gambling responsibly, there is not much need to worry about an occasional trip to a casino or spending time online playing bitcoin blackjack. Just make sure that the activity is only occasional, and that you aren’t risking any more money than you can safely afford to lose.
However, if gambling is interfering with your life, or putting you or your family at risk, then seek the help of a professional immediately. Problem gambling does not have to take over your life. Help is available.
|
0.99174 |
Right now, I am trying to imagine how your life will turn out. I keep thinking about all the happy moments, that you will have together as a family. These are the moments that make life worth living. It makes me very happy to know that I have been a part of making all this possible. Even though my help was crucial in the process of creating your little family, it is now up to you to establish the safe and loving environment that is needed in order to ensure the wellbeing of your child and your entire family.
I am very glad that I could be of help and I wish you all the best for the future.
|
0.999936 |
If you’ve searched for health information on WebMD and want a second opinion, here are some similar websites for you to try.
Probably one of WebMD’s most often-cited competitors, the Mayo Clinic is an actual hospital based in Minnesota, but with other major campuses in Arizona and Florida, and several smaller branches across the United States. Therefore, it has functions for finding a doctor at a Mayo Clinic outlet, as well as for booking an appointment at one. It also has a symptom checker function like WebMD does. Also similar to WebMD, it is funded by advertisements, sponsorships, and grants, but is a not-for-profit company that specializes in medical research and alternative care.
Healthline is another private corporate provider of health information that is funded by advertisements and corporate sponsorships, much like WebMD. The main thing that stands out about Healthline is that it places an increased focus on interactive content, such as educational videos and animations, as well as a suite of tools for consumers. These include a symptom checker, doctor directory, body explorer, pill identifier, drug comparer, and more.
Despite what you might think from the title, no, this is NOT a website for purchasing drugs, legal or otherwise. It is an information website that specializes in news and information related to pharmaceutical treatments, including what they treat, potential side effects, dosage guidelines, and more. It also includes tools like a symptom checker, pill identifier, and a drug interaction checker. Some of its information is provided by the Mayo Clinic, or by Harvard University.
Medline Plus is a project of the National Library of Medicine and the National Institutes of Health in the United States. In addition to having general information on health conditions, symptoms, and pharmaceutical treatments, it also has some neat interactive content. This includes videos on how certain medical tests and procedures are performed; tutorials on how to understand, check, and treat various health conditions; and games, quizzes, and other resources on how to read, understand, and evaluate health information. They even have a series of videos dedicated to older adults like you!
Everyday Health is a health website that brings together health information and advice from trusted sources, including celebrity endorsements from the likes of music mogul and diabetes patient Randy Jackson, CNN medical correspondent Dr. Sanjay Gupta, and fitness trainer Jillian Michaels. In addition to having general information on common medical conditions, pharmaceutical treatments, as well as general healthy living and eating advice, Everyday Health has a series of health-related tools. These include a symptom checker, drug finder, calorie counter, meal planner, and an index of healthy yet yummy recipes. As you can maybe tell, this website has a slight focus on health related to food and nutrition.
|
0.999999 |
How important is to find cheap domain?
One of the most vital requirements for having a successful online presence is the domain name. It is what visitors will note first when they chance upon your web page and what they will relate you with. The domain name should be easy to memorize, but should also be something that informs your website's visitors what the website is about.
A domain name typically has two parts - a Top-Level Domain Name (TLD) and a Second-Level Domain (SLD). If you have domain.com, for instance, ".com" is the TLD and "domain" is the Second-Level Domain Name. There are several categories of Top-Level Domain Names that you should contemplate before you choose the domain you wish. Your decision should be based on the intention of your site and on its target audience. Let's take a glimpse at the gTLDs, or generic TLDs - these are the most popular Top-Level Domains intended to show a specific purpose - .com (commercial establishments), .net (networks), .biz (businesses), .info (informative web pages), .org (organizations), .mobi (mobile devices), .asia (the Asia Pacific), .name (individuals or relatives), .pro (certain professions), etc. As you can perceive, these Top-Level Domains encompass most spheres of life, so you should pick the one that would designate the intention of your site best. There is no limitation as to who can register such Top-Level Domain Names, but some of them include additional requirements to prove that you are eligible to keep such a Top-Level Domain (.mobi and .pro, for example).
The ccTLDs, or country-code TLDs, are country-specific domain names. Each country has its own ccTLD. Opting for such a TLD is good if your target group of website visitors is from a given country. Many people would elect to buy goods or services from a local website, and if your target is Canada, for instance, opting for a .ca Top-Level Domain could boost the visits to your web page.
You can register a number of Top-Level Domain Names, which can send your web page's visitors to a particular web site like domain.com, for instance. This would raise the traffic and lower the likelihood of someone pinching your web page visitors by using the same name with a different Top-Level Domain - if you are not availing of a trademark.
Each and every Top-Level Domain has domain records. The name server records (NS records, a.k.a. DNS records) display where the domain name is hosted, i.e. they point to the web hosting distributor whose name servers (NSs, a.k.a. DNSs) it is using at the moment. You can swap the DNSs of your domain name whenever you want. You can have your domain registered with one firm and get the web page hosting service itself from another. Hence, if you register your domain and encounter good website hosting solutions someplace else at a later time, you can point your domain name to the present company's DNSs at once.
On the whole, as long as your domain name uses a specific set of name servers, all its domain records will direct to the same site hosting vendor. Some hosting providers, however, permit you to modify given DNS records, such as the A records and the MX records of your domain name. The A record is an IP address, which indicates on which server your site is situated, while the MX records disclose which web hosting server tackles the mailbox accounts related to your domain name. For instance, if you appoint a new web site designer and he constructs an .ASP web page that will be situated on his own Windows web hosting server, you may want to edit just the Internet Protocol address (the A record) but not the MX records of your domain name. Hence, www.domain.com will point to the Windows web server, but your e-mails or any sub-domains such as forum.domain.com or shop.domain.com will still be in your present Linux web site hosting account. The .ASP environment is developed by Microsoft and calls for a Windows web server, although a Linux hosting server would be far more reliable.
Only a number of web hosting providers permit you to modify particular domain name records and very often this an additional paid service. With Hosting.com.ru , you get a wide array of TLDs to choose from and you can modify all domain name server records or forward the domain names using a forwarding tool at no additional charge. Because of that, 'Hosting.com.ru' would be your finest pick when it comes to handling your domain name and to building a successful presence on the Internet.
|
0.799887 |
There are six schools of thought within Hinduism addressed as the Shat (Astik) Darshana (darshana meaning "viewpoint.") Within the Astika schools of Hindu philosophy, the Samkhya and the early Mimamsa school did not accept a God in their respective systems.
The atheistic viewpoint as present in the Samkhya and Mimamsa schools of Hindu philosophy takes the form of rejecting a creator-God. The Samkhya school believed in a dual existence of Prakriti ("nature") and Purusha ("spirit") and had no place for an Ishvara ("God") in its system. The early Mimamsakas believed in a adrishta ("unseen") that was the result of performing karmas ("works") and saw no need for an Ishvara in their system. Mimamsa, as a philosophy, deals exclusively with karma and thus is sometimes called Karma-Mimamsa. The karmas dealt with in Mimamsa concern the performance of Yajnas ("sacrifices to gods") enjoined in the Vedas.
The Vedanta philosophy had its practitioners advocating a Nirguna Brahman of which the most prominent example is Adi Shankara.
In Indian philosophy, three schools of thought are commonly referred to as Nastikas: Jainism, Buddhism and Cārvāka for rejecting the doctrine of Vedas. Nastika refers to the non-belief of Vedas rather than non-belief of God. However, all these schools also rejected a notion of creationist god and so the word Nastik became strongly associated with them. Cārvāka, an atheistic school of Indian philosophy, traces its origins to 600 BCE. It was a hedonistic school of thought, advocating that there is no afterlife. Cārvāka philosophy appears to have died out some time after 1400 CE. Buddhism and Jainism also have their origins before 300 BCE but are not hedonistic. It is debated whether the ancient followers of the Jain and Buddha paths were Hindu or non-Hindu because they, like Hinduism, discussed the Arya Sangh, karma, brahman and Moksha.
"In some ways people had got used to the idea that India was spiritual and religion-oriented. That gave a leg up to the religious interpretation of India, despite the fact that Sanskrit had a larger atheistic literature than exists in any other classical language. Even within the Hindu tradition, there are many people who were atheist. Madhava Acharya, the remarkable 14th century philosopher, wrote this rather great book called Sarvadarshansamgraha, which discussed all the religious schools of thought within the Hindu structure. The first chapter is "Atheism" - a very strong presentation of the argument in favor of atheism and materialism.
This page was last modified on 19 June 2009, at 23:16.
|
0.976625 |
A rectangle object containng top, left, bottom, and right coordinates.
offset Adjust the position of the rectangle.
bottom Specifies the y-coordinate of the lower-right corner of the rectangle.
left Specifies the x-coordinate of the upper-left corner of the rectangle.
right Specifies the x-coordinate of the lower-right corner of the rectangle.
top Specifies the y-coordinate of the upper-left corner of the rectangle.
|
0.970358 |
What you are about to read is a fictional account told from two different perspectives. My sister and I compiled this story from our interactions with one another to give you a brief experience of what it’s like to interact and live with DID.
I keep asking questions to hear about her ideas and intellectual thoughts. She’s always teaching me something, challenging me to focus on the road, follow her highly complex ideas, and formulate a response all at the same time. She is always a wonder to me.
I try to formulate a response without time to come up with something smart. “Oh, so you don’t actually know what that is?” Disappointment. It’s on her face. She was sitting on the edge of her seat, features animated, hands moving. She leans back now, stares ahead, becoming silent. This always happens. Our conversations are never enough to keep her engaged for very long. We sit in silence.
Sometimes she whispers, or laughs a little to herself. I’ve stopped asking her what’s so funny. She usually says, “Oh never mind.” This frustrates me because I want so badly to understand. Other times we have amazing conversations, like the night we went to Starbucks and talked for hours about her experiences and her goals, and reminisced about the past. I could tell she was tired when she began to disengage. When we got home, she went up to her room, with no goodbye. Her choice to engage even for a short period of time says more to me than the absence of “goodbye” or “I love you.” She is capable of communicating these things, but often in unconventional ways. When she struggles to be present, my choice to be present matters. Some part of her always hears. I want her to know that I love her. Always.
|
0.998751 |
The Turing Award 2018 has been awarded to Geoffrey Hinton, Yann LeCun and Yoshua Bengio who have kickstarted an AI revolution by studying the learning abilities of large artificial neural networks.
The deep neural network uses layers of artificial neurons which mimics the structure of animal brains.
Such AI is increasingly used in products that people use every day - from smart speakers to Facebook.
This forms the backbone of Deep Learning.
Deep learning involves building computer programs which mimics the structure of animal brains, with many layers of artificial neurons used for processing the data.
When the network of neurons digests data, each neuron has individual responses within each layer. These outputs are passed to the next layer until the network finally forms a decision or judgment about the input.
This deep learning technology can be used to transcribe human speech or recognise a person's face in different photographs.
Turing Award is an annual prize given by the Association for Computing Machinery (ACM) for individuals who have contributed a lasting and major technical importance to the computer field.
The Turing award is accompanied by a prize of US $1 million, with financial support provided by Google.
Turing Award is recognized as the highest distinction in computer science and is often referred to as the "Nobel Prize of computing".
Q. Geoffrey Hinton, Yann LeCun and Yoshua Bengio have been honoured with which award for kickstarting an AI revolution by studying the learning abilities of large artificial neural networks?
|
0.999999 |
The recalled models are from the 2011 to 2012 model year, and were produced from October 2, 2009 to April 21, 2011.
RYLANDS - JOAN April 21, 2011, (To My Very Dearest Aunty Joan, There's a face we shall always remember, A voice we shall always recall, A memory to cherish forever, Of one so dear to us all.
Monday, April 25, 2011, at the funeral home,Died Thursday, April 21, 2011.
She is pictured below, with her mother, at her father's temporary mass grave site in Higashi-Matsushima, Miyagi prefecture, on April 21, 2011.
KARACHI, April 21, 2011 (Balochistan Times): Pakistan Refinery Ltd (PRL) has posted a profit after tax of Rs 47.
PESHAWAR, April 21, 2011 (Frontier Star): The population of Khyber Pakhtoonkhwa has increased from 17 million to 25 million after census of 1998.
The first sentence of the third paragraph should read: In a separate case, the Second Intermediate People's Court of Shanghai ruled on April 21, 2011 that Zhejiang Daoming Reflective Materials Company infringed 3M's Chinese Patent No.
BRADY LAWRENCE April 21, 2011 (I can't believe you left us Dad, our hearts are broke in two, I know you're with our Mum now and she'll be so pleased to see you.
CHAMAN, April 21, 2011 (Balochistan Times): Commandant Pishin Scouts Colonel Saifullah Khan Khattak on Wednesday said that security along Pak-Afghan border has been beefed up in order to check arms and drug smuggling from across the border.
RAWALPINDI, April 21, 2011 (Frontier Star): The Anti-Terrorism Court (ATC) on Wednesday indicted 21 people including Former Khatib Lal Mosque Maulana Abdul Aziz and his family in murder charges of rangers official.
m Thursday, April 21, 2011, Graveside funeral services in B`Nai Brith Cemetery on St.
The firm is to move to the new premises from April 21, 2011.
|
0.987688 |
Create a new screaming girl image!
No, full time, just kidding... part time.
i dont want to !
stop trying to make me happy!!!
We are beasts and you made us that way.
|
0.999983 |
First Sentence: Landscape-tones: brown to bronze, steep skyline, low cloud, pearl ground with shadowed oyster and violet reflections.
I usually try to write my reviews within a few days of finishing the books, when I've had a chance to ponder a bit but not to forget everything (I have abysmal recall abilities). For a few reasons I had to put off this review, though, and now here I am some time later trying to write about Balthazar and decide at the same time whether I want to continue reading The Alexandria Quartet at all.
Because, you see, while I liked Justine quite a lot, I liked Balthazar quite a lot less than that.
The premise is thus: our anonymous narrator from Justine (initials revealed to be LGD, which, yes, are the same as Lawrence Durrell's) sends his finished manuscript to his friend Balthazar, a minor character from the first novel. Balthazar is a gay mystic who doesn't seem to figure much in this book bearing his name, either. He returns the manuscript to LGD with significant and substantial markups.
LGD calls this "the Interlinear," and it reveals that Justine didn't love him at all. She only used LGD to distract her husband Nessim's attention from her affair with Pursewarden, a minor writer character introduced in the first book, who didn't love her back. This revelation may have shocked me as much as it did LGD.
Pursewarden is expanded and improved here considerably from his Justine appearance. Nessim's brother is brought into the action, as well as the still mysterious Mountolive, who seems to have something to do with diplomacy. Nessim's brother is in love with Clea, who barely knows he exists, and this leads to a murder.
There is a lot going on in this book, woven as it is between two different people's perspectives and speculations. Whereas I enjoyed the arbitrary cast of characters and random threads in the first book, their compounding here has become much more confusing. Do I care enough about these people to keep reading and find out what happens in the end?
Clea is the most compelling character, and she remains somewhat of a cypher here. The title suggests that she must figure prominently in the fourth book. She is "golden," a painter, wounded and peaceful, or at least so far. I'm interested in her, but I'm not sure if I'm interested enough to keep reading, at least not right now.
So: Balthazar is an ok book and a fine companion to Justine.
For now I'm going to pause my reading of the Quartet, but I may revisit it in the future if my curiosity gets the better of me.
But then I suppose we live in the shallows of one another's personalities and cannot really see into the depths beneath.
|
0.999988 |
How do you collaborate with someone you don’t like? They’re not toxic or difficult, you just have different styles, and they rub you the wrong way. It all starts with reflecting on the cause of the tension. Remind yourself: You won’t get along with everyone, but there is potential value in every interaction. Take an honest look at what is causing the tension with you and your colleague and what role you play in creating it. Try to understand your colleague’s perspective. Few people get out of bed in the morning with the goal of making your life miserable. Make time to think deliberately about the other person’s point of view, especially if that person is essential to your success. Rather than trying to work through or around the other person, engage them directly, and try to understand your difference in interpersonal style. You may realize that your styles could be complimentary if you adapt your approaches. Lastly, ask for help. It shows that you value their intelligence and experience.
|
0.955679 |
Traveller is a studio album by Indian sitarist Anoushka Shankar, released in October 2011 through Deutsche Grammophon. The album was produced by Javier Limón.
Traveller received a nomination in the Best World Music Album category at the 2013 Grammy Awards. However, the award went to Anoushka's late father Ravi Shankar (for his album The Living Room Sessions Part 1), and was accepted by Anoushka on his behalf.
Shankar first came across flamenco when she travelled to Spain as a teenager. During that trip, she visited a small flamenco bar and was electrified by different stage performances. Her album Traveller was built around the idea that Spanish flamenco may have its origins in India. "In Indian music, we call it 'spirituality,' and in Spanish music, it's 'passion'. It's really the same thing in both forms, that reaching at the deepest part of the human soul," said Shankar.
To record the album, Shankar travelled to Spain and enlisted the help of flamenco producer and guitarist Javier Limón. During the early studio sessions, they would sit across from each other with their instruments, exploring the musical conversation between them.
|
0.999999 |
SocioCultural Level of Analysis in Psychology. All possible Short Answer Question that could come. To see explanation of the research that was used to answer the learning outcome, check out the following set I made: "IB Psychology HL-research"
Explain how principles that define the SCLOA may be demonstrated in research.
1. Social and cultural environment influences behaviour.
2. Humans are social animals with the need to belong.
-One's behaviour is "blamed" on one's personality, or other internal factors.
Explain the formation of stereotypes and their effect on behaviour.
Explain social learning theory making reference to two relevant studies.
Define the terms "culture" and "cultural norms".
→Culture can be defined as a collective mental programming ("the software of the mind"), which guides a group of people in their daily interactions and distinguishes them from other groups of people.
-Can be defined as the unwritten rules that a specific group uses for saying what is appropriate or inappropriate behavior, beliefs, values and attitudes.
-Give people a sense of order and control in their lives as well as the sense of belonging somewhere.
-May determine how people communicate, raise children, who they marry, or how they treat other generations.
Using one or more examples explain "emic" and "etic" concepts.
-Focus of research lies on a culture's norms, values, motives, customs and traditions.
-Compares psychological phenomena across cultures to investigate what could be universal in human behaviour.
-Compares and contrasts cultural phenomena across cultures to determine whether phenomena are culture specific or world wide.
→compared values, behaviors, institutions, and organizations across nations.
-Overestimating dispostional over situational factors when explaining others' behaviour.
Explain factor(s) that influence conformity.
|
0.999961 |
You need four or more players, whom you divide into two teams. The game is played in a manner similar to the game “It.” The first person on Team A throws the disc to a member of his team and his fellow teammates collectively attempt to keep the disc away from the other team. When a member of Team B is able to intercept and catch the disc she throws it to one of her teammates and the participants on her team aim to keep the disc away from the opposing team. The team that takes control of the disc earns a point each time. The first team to 10 points wins.
|
0.96526 |
Learn Portuguese? Yhea, with this you will learn “acordês”! É neCtarina, seus trambolhos!
|
0.92955 |
Learn how to say "It's on the left.", "It's on the right.", "It's on the first floor.", or "It's on the second floor." in Japanese!
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library., It's On The First Street And To Your Left., I Am On My Way To Second Street., I Am In The Café., Let's Go..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library., It's On The First Street And To Your Left., I Am On My Way To Second Street., I Am In The Café., Let's Go., I'm Near The Library., Is It Near The Supermarket?, Where Are You?, I Can Tell You Where I Am Near..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library., It's On The First Street And To Your Left., I Am On My Way To Second Street., I Am In The Café., Let's Go., I'm Near The Library., Is It Near The Supermarket?, Where Are You?, I Can Tell You Where I Am Near., Can I Get A Single Room?, I Would Like A Double Room., Do You Have Tv Here?, I Don't Like To Watch Tv..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library., It's On The First Street And To Your Left., I Am On My Way To Second Street., I Am In The Café., Let's Go., I'm Near The Library., Is It Near The Supermarket?, Where Are You?, I Can Tell You Where I Am Near., Can I Get A Single Room?, I Would Like A Double Room., Do You Have Tv Here?, I Don't Like To Watch Tv., I'm Across The Street From The Pub., How Many Miles Until We Get To The Pub?, How Far Away Is The Capital?, I Am Going To The Capital Across 1,000 Miles..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library., It's On The First Street And To Your Left., I Am On My Way To Second Street., I Am In The Café., Let's Go., I'm Near The Library., Is It Near The Supermarket?, Where Are You?, I Can Tell You Where I Am Near., Can I Get A Single Room?, I Would Like A Double Room., Do You Have Tv Here?, I Don't Like To Watch Tv., I'm Across The Street From The Pub., How Many Miles Until We Get To The Pub?, How Far Away Is The Capital?, I Am Going To The Capital Across 1,000 Miles., When Do You Want To Meet?, I'm Available Any Time After 7:00 Pm., When Should We All Get Together?, Let's Get Together This Week., When Did Your Children Leave?, Did Your Children Enjoy California?, Where Do You Want To Meet?, Is It Okay If We Meet By The Food Stand?, When Are You Leaving?, When Did They Leave?, When Will You Arrive?, When Do They All Arrive?, That Way., The Bus Arrives At 12:00., We Arrived Yesterday., From Here To There., Where Is The Radical Bookstore?, One Way Ticket Or Round Trip Ticket?, One Way Ticket To Japan, Please., Please Take Me To The Pub..
Words Covered : It's On The Left., It's On The Right., It's On The First Floor., It's On The Second Floor., More Than 100 Miles., More Than 2,000 Kilometers., The Bar Is Close To The Library., It's Near The Library., It's On The First Street And To Your Left., I Am On My Way To Second Street., I Am In The Café., Let's Go., I'm Near The Library., Is It Near The Supermarket?, Where Are You?, I Can Tell You Where I Am Near., Can I Get A Single Room?, I Would Like A Double Room., Do You Have Tv Here?, I Don't Like To Watch Tv., I'm Across The Street From The Pub., How Many Miles Until We Get To The Pub?, How Far Away Is The Capital?, I Am Going To The Capital Across 1,000 Miles., When Do You Want To Meet?, I'm Available Any Time After 7:00 Pm., When Should We All Get Together?, Let's Get Together This Week., When Did Your Children Leave?, Did Your Children Enjoy California?, Where Do You Want To Meet?, Is It Okay If We Meet By The Food Stand?, When Are You Leaving?, When Did They Leave?, When Will You Arrive?, When Do They All Arrive?, That Way., The Bus Arrives At 12:00., We Arrived Yesterday., From Here To There., Where Is The Radical Bookstore?, One Way Ticket Or Round Trip Ticket?, One Way Ticket To Japan, Please., Please Take Me To The Pub., It's Over Here., It's Over There., Where Is It?, Where Did You See It Last?, What's The Address?, This Is My Address., Where Are You Going?, I Will Tell You Where I Am Going., Where Is It?, Where Was It?, Where Would You Like To Go?, Want To Go With Me?, Do You Have Your Passport?, Can I See Your Passport?, Yes, I Have My Passport., My Passport Is Right Here., Do You Travel With Your Family?, Yes, We Travel With Our Family., Our Family Always Travels Together., Where Is Your Family Going?, Do You Have A Car Available For Rent?, I Would Like To Rent A Car., Where Can I Find A Car To Rent?, You Can Find A Car Rental Agency Two Blocks Down The Street., What's Your Address?, What's The Address Of The Hospital., Don't Worry, I Will Find The Address., The Address Has To Be Here Somewhere., Where Is The Hospital?, Where Is The Closest Bar?, Where Is The Cheapest Liquor Store?, Where Is The Loudest Concert?, Will You Take Me Home?, Are They Coming?, John Is Going On Vacation Tomorrow., My Vacation Starts Next Week., When Are You Moving?, I Am Moving Next Year., Is There A Bar In Town?, What Is There To Do In Town?.
Phrases - Travel, Part 16 - Learn how to say "Where is the radical bookstore?", "One way ticket or round trip ticket?", "One way ticket to Japan, please.", or "Please take me to the pub." in Japanese!
Phrases - Travel, Part 17 - Learn how to say "That way.", "The bus arrives at 12:00.", "We arrived yesterday.", or "From here to there." in Japanese!
Phrases - Travel, Part 18 - Learn how to say "When are you leaving?", "When did they leave?", "When will you arrive?", or "When do they all arrive?" in Japanese!
Phrases - Travel, Part 19 - Learn how to say "When did your children leave?", "Did your children enjoy California?", "Where do you want to meet?", or "Is it okay if we meet by the food stand?" in Japanese!
Phrases - Travel, Part 20 - Learn how to say "When do you want to meet?", "I'm available any time after 7:00 PM.", "When should we all get together?", or "Let's get together this week." in Japanese!
Phrases - Travel, Part 21 - Learn how to say "I'm across the street from the pub.", "How many miles until we get to the pub?", "How far away is the capital?", or "I am going to the capital across 1,000 miles." in Japanese!
Phrases - Travel, Part 22 - Learn how to say "Can I get a single room?", "I would like a double room.", "Do you have TV here?", or "I don't like to watch TV." in Japanese!
Phrases - Travel, Part 23 - Learn how to say "I'm near the library.", "Is it near the supermarket?", "Where are you?", or "I can tell you where I am near." in Japanese!
Phrases - Travel, Part 24 - Learn how to say "It's on the first street and to your left.", "I am on my way to second street.", "I am in the caf退.", or "Let's go." in Japanese!
Phrases - Travel, Part 25 - Learn how to say "More than 100 miles.", "More than 2,000 kilometers.", "The bar is close to the library.", or "It's near the library." in Japanese!
Phrases - Travel, Part 26 - Learn how to say "It's on the left.", "It's on the right.", "It's on the first floor.", or "It's on the second floor." in Japanese!
Phrases - Travel, Part 27 - Learn how to say "It's over here.", "It's over there.", "Where is it?", or "Where did you see it last?" in Japanese!
Phrases - Travel, Part 28 - Learn how to say "What's the address?", "This is my address.", "Where are you going?", or "I will tell you where I am going." in Japanese!
Phrases - Travel, Part 29 - Learn how to say "Where is it?", "Where was it?", "Where would you like to go?", or "Want to go with me?" in Japanese!
Phrases - Travel, Part 30 - Learn how to say "Do you have your passport?", "Can I see your passport?", "Yes, I have my passport.", or "My passport is right here." in Japanese!
Phrases - Travel, Part 31 - Learn how to say "Do you travel with your family?", "Yes, we travel with our family.", "Our family always travels together.", or "Where is your family going?" in Japanese!
Phrases - Travel, Part 32 - Learn how to say "Do you have a car available for rent?", "I would like to rent a car.", "Where can I find a car to rent?", or "You can find a car rental agency two blocks down the street." in Japanese!
Phrases - Travel, Part 33 - Learn how to say "What's your address?", "What's the address of the hospital.", "Don't worry, I will find the address.", or "The address has to be here somewhere." in Japanese!
Phrases - Travel, Part 34 - Learn how to say "Where is the hospital?", "Where is the closest bar?", "Where is the cheapest liquor store?", or "Where is the loudest concert?" in Japanese!
Phrases - Travel, Part 35 - Learn how to say "Will you take me home?", "Are they coming?", "John is going on vacation tomorrow.", or "My vacation starts next week." in Japanese!
Phrases - Travel, Part 36 - Learn how to say "When are you moving?", "I am moving next year.", "Is there a bar in town?", or "What is there to do in town?" in Japanese!
Phrases - Travel, Part 26 -- Added to http://www.EarthFluent.com.
|
0.912952 |
Figure A52. Maldives anomaly with (horizontal) [vertical] cross sections through (A)[D] the UUP07 p-wave) and (B)[D] the combined SL2013 and S40RTS s-wave models at 1510 km; C) the location of the modern geological record that we interpret to have formed during the subduction of the slab.
is located below the northwestern Indian Ocean from the deep mantle up to the upper part of the lower mantle. In previous tomographic studies it has been referred to as the eastern part of the III anomaly (Van der Voo et al., 1999b) or as the IO anomaly (Hafkenscheid et al., 2006), and was interpreted to result from northward subduction within the Neotethys ocean. We now distinguish the deeper NW-SE trending Maldives anomaly from the shallower SW-NE Carlsberg slab (section 3.22) (Gaina et al., 2015), which were previously considered a single feature (van der Meer et al., 2010). van der Meer et al. (2010) interpreted an onset of subduction of this anomaly to occur as early as the Late Triassic comparing to reconstructions of Stampfli and Borel (2004), which we now consider unlikely given the adjacent Carlsberg, India, and Arabia slabs that subducted in Cretaceous time. More recently, the age of the Maldives slab was interpreted from geological evidence of intra-oceanic subduction from ophiolites found in the Indus-Yarlung suture zone, thrust on the Tibetan Himalaya (e.g., Spontang and Xigaze ophiolites) (Hébert et al., 2012). These were suggested to have formed at equatorial latitudes based on paleomagnetic data (Abrajevitch et al., 2005), and were interpreted to have thrust onto the Tibetan Himalaya around 70 Ma based on arrival of mafic debris in the Tibetan Himalayan stratigraphy around that time (Searle et al., 1997; Corfield et al., 2001). Because paleomagnetic data of the Tibetan Himalaya also show equatorial latitudes around 70 Ma (Patzelt et al., 1996), van Hinsbergen et al. (2012) linked the record of the Himalayan ophiolites to the Maldives anomaly. Recently, however, Garzanti and Hu (2015) demonstrated that the~70 Ma mafic debris in the Tibetan Himalaya is not ophiolite-derived, but related to plume volcanism, perhaps from early-stage volcanics of the Deccan traps. Ophiolite-derived debris did not arrive in the Tibetan Himalayan stratigraphy until the Early Eocene instead. In addition, Huang et al. (2015) showed that the Xigaze ophiolites are unconformably overlain by Tibet-derived forearc sediments with ages very close to the formation ages of the ophiolite (~130-125 Ma). In addition, they showed that the previous paleomagnetic data of Abrajevitch et al. (2005) were strongly affected by compaction-induced inclination shallowing, and provided a ~16.5°N paleolatitude for these ophiolites instead, i.e. immediately adjacent to the south Tibetan margin. Its current depth in the mantle is consistent with Cretaceous subduction, and when the global plate circuit (e.g., Seton et al., 2012) is cast in a hotspot reference frame (e.g., Doubrovine et al., 2012), the Maldives anomaly is located within the Neotethys ocean below the India-Arabia plate boundary. At this plate boundary, there is evidence of subduction farther south, culminating in obduction of the Waziristan-Khost ophiolite onto Arabia around 80 Ma (e.g., Gaina et al., 2015). The nearest record of intra-oceanic subduction may be the Kohistan arc, and Jagoutz et al. (2015) argued for a low latitude of Cretaceous subduction below this arc. Borneman et al. (2015), however, documented Asia-derived detritus from Cretaceous sandstones within the Kohistan stratigraphy, arguing against such a scenario. At this stage, we therefore refrain from interpreting a geological record of subduction for the Maldives anomaly.
|
0.921241 |
Here's what you need to know about the slithering critters, should you spot one on a trail run.
Q: Most people want to know, first and foremost, what they should do if they encounter a snake on a trail.
A: "Giving it a wide berth is the best thing to do. Let it be. Don't provoke it. It'll likely try to get away from you as quickly as possible.
Q: Where do snakes tend to hang out?
A: "Snakes are cold-blooded, so they like to come out when it's warm and sun themselves. The like the sunny side of a little rock area, a cliff edge, a rock wall. We get reports of encounters when people sit on the edge of a sunny cliff and dangle their legs down.
Snakes also tend to be near water, especially if it's an otherwise dry environment. If you're in an area near a spring or a seep in an otherwise dry area, keep an extra eye out.
For people who are staying on well-groomed trails, just look ahead for a snake that might be crossing the trail, and give it a wide berth while it slithers away, if you see one. But if there's a fallen log, there's a chance that a snake might be basking in the sun on the other side, so maybe take an extra big step over the log.
And if you're really off-trail and rock-hopping, the odds go up because there are more cricks and crevices, and there aren't other people around flushing them out. Just be aware."
Q: Are there times of the day that snakes are more likely to be seen on a trail?
A: "Since they are cold-blooded, they like to come out when it's warm.
And most of the venomous snakes in the U.S., with exception of the southeast, are nocturnal predators. They're resting during the day, often sunning themselves, but likely on the edge of a sunny patch in the morning because the mid-day, direct sunlight can be too much. So, if you're running on a cool morning and come across a sunny patch, that increases your chances of encountering one. They seek out the sunny spots and rest in the shade. But typically you won't see them during the day, unless it's the cusp—in the early evening, their activity might be a bit higher."
Q: Are there times of the year that they're more likely to be seen?
A: "There are times when the frequency of sightings goes up, when snakes are seen more often crossing roads and trails. This is in the spring. Snakes hibernate, so in the spring after hibernating together, they disperse into territories for the breeding season. In the fall, they retreat to hibernaculum. They're on the go, and they may be less familiar with the territory so they may be less able to hide themselves."
Q: In the rare occurrence that someone should get bit, what should they do?
A: "Most treatment for snakebites is pretty much the same, no matter the type of snake.
There's basically nothing you can do in the field. You just need to get to a hospital for a treatment with anti-venom. But know that even if a snake is venomous, they don't inflict a lot of venom in their bites; they're just being defensive, not trying to kill you.
The main signs and symptoms are pain and swelling. Transport gingerly—the less movement, the better. Being calm is important. If you're by yourself, and it's your leg, try to hop out. If it's your hand, wrist, or arm, hold it as still as you can, and get help as quickly as you can.
From a trail runner's perspective, just have a little extra vigilance on rocky, sunny areas, logs across the trail, pockets of leaves—but the chances of having any problems with a snake are very slim.
Like any wild animal, they're more afraid of you than you are of them."
|
0.999872 |
At the high school level, learning can become problematic for a young person with dyslexia. He or she can find that the sheer volume of work provided, along with the tighter timelines and increasing requirements for personal organization and learning control, can all become overwhelming. Some young people may drop out of school at this point, often after a few run-ins with teachers over work performance, deadlines that have not been met and assignments that have not been completed.
Peer group pressure often becomes more of an issue at this age, and there is the ever-present risk of bullying, which can also get in the way of focused and effective learning and teaching. For a young person with dyslexia it can seem very daunting to sit down to a computer screen and struggle to read and engage with online content, particularly when their peers are sitting right next to them appearing to do so easily and without effort. It is important to develop some dyslexia learning strategies for the student that relate specifically to his own condition and which he feels will be powerful and empowering.
Can you tell me where the bus stop is pleased?
What did you bring me for my lunches?
Note that several words in the above text were highlighted as having alternative spellings available depending on sentence context (for example, 'stop' or 'stops' were both available options).
One of the main advantages of introducing a program such as Ginger to an older student group that's managing learning difficulties such as dyslexia is that it serves to empower the student. It places the focus of control firmly in their domain.
Students who are adolescent and beyond ideally are taking charge of their own learning in literacy, numeracy, vocational subjects and learning directions. These students are able to take charge of their dyslexia learning strategies and work out what works well for them, based on informed research and information from trained and qualified teachers and therapists, as well as people who know about and understand dyslexia.
They are also becoming independent learners who know what sort of learning style suits them best and what tools are going to work well to suit their needs. Obviously Ginger is not going to be for every learner, but it is a useful tool to know about as a teacher so that you can better inform your students about their options.
|
0.998145 |
I am a cancer patient and after my treatment, it messed up my teeth. What do I do to get help?
My sister has stage four breast cancer, which is now gone to her bones and other places. My question is, I would like to see her remaining months happy and would like to see her smile, though with her bad teeth from the chemo her teeth are all broken or dead, she can't afford to get them fixed. Do you know where we could get help for her?
I am sorry to hear of the impact chemotherapy had on your sister’s teeth. Dental health is important both during and after cancer treatment, but lack of dental insurance and high out-of-pocket costs can make even a routine dental visit a hardship for individuals already burdened by medical bills. There may be ways to obtain dental procedures or check-ups at a more manageable cost. First, local dental schools often run low-cost or sliding-scale fee clinics for routine dental call or minor procedures; if there is a dental school near your sister, they may be a good first point of contact. The American Dental Association provides an online dental school locator. Second, the Dental Lifeline Network offers an online database of free or reduced cost dental services in each state. Keep in mind that because of limited resources and often high demand, the availability of programs can vary and there may be a waiting list.
Additionally, the U.S. Health and Human Services Department maintains a list of local health clinics in each state that provide sliding-scale fee health services. While the main focus of these clinics is on primary medical care, some centers have oral health/dental services available. Utilize the online map to locate programs in your sister’s area, and then contact them directly to inquire about dental services.
Finally, if your sister had a general dentist she’s seen in the past, it may be worthwhile to contact that provider and see if he/she has any recommendations. Offices are sometimes willing to work out a payment plan for more costly services that would potentially allow your sister to get the procedures she needs.
What are the long term permanent side effects in my throat from radiation?
Depending on exactly where you receive radiation, a number of side effects can occur either on a temporary, long-term, or delayed basis. They include changes in sensation (the ability to feel), secretions (dry mouth), taste, and range of motion (when tissue hardening restricts movement and posture). These side effects can then affect key physical functions associated with the mouth and throat, such as speech and, especially after radiation, swallowing.
Whether these side effects turn into a chronic condition (or lead to other problems) often depends on how soon they are recognized and treated. Certain precautions such as addressing dental issues, can be taken before treatment begins to reduce—if not outright prevent—long-term side effects. A publication from the National Cancer Institute, Oral Complications of Chemotherapy and Head/Neck Radiation, provides an overview of possible treatment side effects and how to manage them.
I underwent a modified radical neck dissection. I lost feeling on the left side of my neck, head, tongue and shoulder. I have no sense of taste and have difficulty swallowing. Will the feeling and sense of taste return?
There are a number of changes after treatment similar to what you’ve described, some of which can be permanent. Rehabilitation, however, can ease the side effects of treatment, and there are ways to cope with these effects over the long term.
Given the complexities of treating head and neck cancer, a team approach which utilizes a variety of different specialists is essential to minimizing the complications and maximizing the chances for recovery. In addition to the treating physicians—an oral or ear, nose and throat surgeon, a medical and/or radiation oncologist, a plastic surgeon, prosthodontist, and a dentist among them—a number of other health care professionals can assist with your recovery. These other team members include dietitians, social workers, nurses, physical therapists, and speech-language therapists.
Check with your surgeon regarding the loss of feeling on the side of neck. While nerves may have been cut in the area during the node dissection, you should not rule out at least some sensation returning over time. Have your taste and swallowing problems evaluated using tests such as the modified barium swallow (a kind of x-ray) or fiberoptic endoscopy. A speech-language pathologist can provide advice and guide you with therapeutic exercises to improve swallowing ability. There are also medications (both prescription and over the counter) that can help with saliva problems and dietary changes (such as avoiding foods that are made up of small particles) to ensure you continue to obtain sufficient nutrition.
Consider joining a peer support group at your local medical center or through organizations such as Support for People with Oral and Head and Neck Cancer (SPOHNC) or CancerCare.
|
0.98833 |
Full name, Rosanna Lauren Arquette; born August 10, 1959, in New York, NY; daughter of Lewis (an actor and director of an improvisational comedy group) and Mardi (a poet and political activist) Arquette; granddaughter of Cliff Arquette (an actor and humorist; known as Charley Weaver); sister of Patricia Arquette (an actress), Alexis Arquette (an actor), David Arquette (an actor), and Richmond Arquette (an actor and writer); married first husband, 1977 (divorced, 1978); married James Newton Howard (a composer and musician), September13, 1986 (divorced, 1987); married John Sidel (a recording executive and restaurateur), December, 1993 (marriage ended); engaged to David Codikow (a lawyer, executive, and producer); children: (third marriage) Zoe Blue Sidel (somesources cite Zoe Bleu Sidel). Addresses: Agent: Creative Artists Agency, 9830 Wilshire Blvd., Beverly Hills, CA 90212.; Manager: Jason Weinberg, Untitled Entertainment, 8436 West Third St., Suite 650, Los Angeles, CA 90048.
Also appeared in other music videos, including "Liberian Girl," by Michael Jackson and "Into the Grove," by Madonna.
shouldnt Alexis be changed to actress considering shes now had gender reassignment surgery?
|
0.999965 |
Indicate the number of shares outstanding of each of the issuer's classes of common stock, as of the latest practicable date: 25,638,858 shares of Common Stock.
The accompanying unaudited financial statements have been prepared in accordance with generally accepted accounting principles for interim financial reporting and pursuant to the rules and regulations of the Securities and Exchange Commission ("Commission"). While these statements reflect all normal recurring adjustments which are, in the opinion of management, necessary for fair presentation of the results of the interim period, they do not include all of the information and footnotes required by generally accepted accounting principles for complete financial statements. For further information, refer to the financial statements and footnotes thereto, which are included in the Company's Annual Report on Form 10-K for the fiscal year ended December 31, 2012 as filed with the Commission on July 19, 2013.
The interim financial statements included herein, presented in accordance with United States generally accepted accounting principles and stated in US dollars, have been prepared by the Company, without audit, pursuant to the rules and regulations of the Securities and Exchange Commission (SEC). Certain information and footnote disclosures normally included in financial statements prepared in accordance with generally accepted accounting principles have been condensed or omitted pursuant to such rules and regulations, although the Company believes that the disclosures are adequate to make the information presented not misleading.
These statements reflect all adjustments, consisting of normal recurring adjustments, which, in the opinion of management, are necessary for fair presentation of the information contained therein. It is suggested that these condensed interim financial statements be read in conjunction with the financial statements of the Company for the year ended December 31, 2012 and notes thereto included in the Company's Annual Report on Form 10-K. The Company follows the same accounting policies in the preparation of interim reports.
The Company accounts for its income taxes under the provisions of ASC Topic 740, Income Taxes. The method of accounting for income taxes under ASC 740 is an asset and liability method. The asset and liability method requires the recognition of deferred tax liabilities and assets for the expected future tax consequences of temporary differences between tax bases and financial reporting bases of other assets and liabilities.
Revenue is derived on a per message/notification basis through the Companys patented technologies and a modular, adaptable platform designed to create multi-channel messaging gateways for all types of connected devices. The Company also earns revenue for services, such as programming, licensure on Software as a Service (SaaS) basis, and on a performance basis, such as when a client acquires a new customer through our platform. Revenue is recognized in accordance with Staff Accounting Bulletin (SAB) No. 101, Revenue Recognition in Financial Statements, as revised by SAB No. 104. As such, the Company recognizes revenue when persuasive evidence of an arrangement exists, title transfer has occurred, the price is fixed or readily determinable, and collectability is probable. Sales are recorded net of sales discounts.
Accounts receivable is reported at the customers outstanding balances, less any allowance for doubtful accounts. Interest is not accrued on overdue accounts receivable.
The Company accounts for its long-lived assets in accordance with Accounting Standards Codification (ASC) Topic 360-10-05, Accounting for the Impairment or Disposal of Long-Lived Assets. ASC Topic 360-10-05 requires that long-lived assets be reviewed for impairment whenever events or changes in circumstances indicate that the historical cost carrying value of an asset may no longer be appropriate. The Company assesses recoverability of the carrying value of an asset by estimating the future net cash flows expected to result from the asset, including eventual disposition. If the future net cash flows are less than the carrying value of the asset, an impairment loss is recorded equal to the difference between the assets carrying value and fair value or disposable value. The Company determined that none of its long-term assets at June 30, 2013 were impaired.
The Company capitalizes internal software development costs subsequent to establishing technological feasibility of a software application. Capitalized software development costs represent the costs associated with the internal development of the Companys software applications. Amortization of such costs is recorded on a software application-by-application basis, based on the greater of the proportion of current year sales to total of current and estimated future sales for the applications or the straight-line method over the remaining estimated useful life of the software application. The Company continually evaluates the recoverability of capitalized software costs and will charge to operations amounts that are deemed unrecoverable for projects it abandons.
The Company accounts for stock-based payments to employees in accordance with ASC 718, Stock Compensation (ASC 718). Stock-based payments to employees include grants of stock, grants of stock options and issuance of warrants that are recognized in the consolidated statement of operations based on their fair values at the date of grant.
The Company accounts for stock-based payments to non-employees in accordance with ASC 505-50, Equity-Based Payments to Non-Employees. Stock-based payments to non-employees include grants of stock, grants of stock options and issuances of warrants that are recognized in the consolidated statement of operations based on the value of the vested portion of the award over the requisite service period as measured at its then-current fair value as of each financial reporting date. The Company calculates the fair value of option grants and warrant issuances utilizing the Binomial pricing model. The amount of stock-based compensation recognized during a period is based on the value of the portion of the awards that are ultimately expected to vest. ASC 718 requires forfeitures to be estimated at the time stock options are granted and warrants are issued to employees and non-employees, and revised, if necessary, in subsequent periods if actual forfeitures differ from those estimates. The term forfeitures is distinct from cancellations or expirations and represents only the unvested portion of the surrendered stock option or warrant.
The Company estimates forfeiture rates for all unvested awards when calculating the expense for the period. In estimating the forfeiture rate, the Company monitors both stock option and warrant exercises as well as employee termination patterns. The resulting stock-based compensation expense for both employee and non-employee awards is generally recognized on compensation under ASC Topic 505-50, In accordance with ASC 505-50, the cost of stock-based compensation is measured at the grant date based on the value of the award and is recognized over the vesting period. The value of the stock-based award is determined using the Binomial or Black-Scholes option-pricing models, whereby compensation cost is the excess of the fair value of the award as determined by the pricing model at the grant date or other measurement date over the amount that must be paid to acquire the stock. The resulting amount is charged to expense on the straight-line basis over the period in which the Company expects to receive the benefit, which is generally the vesting period.
The Company reports earnings (loss) per share in accordance with ASC Topic 260-10, "Earnings per Share." Basic earnings (loss) per share is computed by dividing income (loss) available to common shareholders by the weighted average number of common shares available. Diluted earnings (loss) per share is computed similar to basic earnings (loss) per share except that the denominator is increased to include the number of additional common shares that would have been outstanding if the potential common shares had been issued and if the additional common shares were dilutive. Diluted earnings (loss) per share has not been presented since the effect of the assumed conversion of warrants and debt to purchase common shares would have an anti-dilutive effect. Potential common shares as of June 30, 2013 that have been excluded from the computation of diluted net loss per share amounted to 2,515,000 shares and include 250,000 warrants and 2,265,000 options. Of the 2,515,000 potential common shares at June 30, 2013, 990,000 had not vested.
The Company continually assesses any new accounting pronouncements to determine their applicability to the Company. Where it is determined that a new accounting pronouncement affects the Companys financial reporting, the Company undertakes a study to determine the consequence of the change to its financial statements and assures that there are proper controls in place to ascertain that the Companys financials properly reflect the change.
The accompanying financial statements have been prepared assuming the Company will continue as a going concern. As shown in the accompanying financial statements, the Company has incurred a net loss of ($1,536,958) for the six month period ended June 30, 2013 and has an accumulated deficit of ($4,153,571).
In order to continue as a going concern, the Company will need, among other things, additional capital resources. The Company is significantly dependent upon its ability, and will continue to attempt, to secure equity and/or additional debt financing. The Company has recently issued debt securities and may conduct an offering of its equity securities to raise proceeds to finance its plan of operation. There are no assurances that the Company will be successful and without sufficient financing it would be unlikely for the Company to continue as a going concern.
The financial statements do not include any adjustments relating to the recoverability and classification of recorded assets, or the amounts of and classification of liabilities that might be necessary in the event the Company cannot continue in existence. These conditions raise substantial doubt about the Company's ability to continue as a going concern. These financial statements do not include any adjustments that might arise from this uncertainty.
On February 7, 2012, the Company entered into a legal retainer agreement with a law firm, for which the Company paid a legal retainer of $5,000. The retainer will be expensed at the sole discretion of the law firm and all ongoing legal fees are billed to the Company as incurred. During the six months ended June 30, 2013, the Company recognized legal expenses of $225,274. As of June 30, 2013, the balance in prepaid expenses was $365.
During 2012, the Company entered into a business marketing agreement for term of one year. In accordance with the terms of each agreement, the Company issued 350,000 fully vested shares of common stock valued at $175,000 as a non-refundable retainer for services. The estimated fair value will be amortized on a straight-line basis of the term of the agreement. As of June 30, 2013, the Company recorded $87,500 as consulting expense related to the service for the six month period. The remaining prepaid balance at June 30, 2013 totaled $35,000.
On January 23, 2013, the Company entered into a public relations consulting agreement for a term of two years. In accordance with the terms of the agreement, the Company issued 500,000 fully vested shares of common stock on the date of agreement and an additional 500,000 shares on June 1, 2013. The fair value of the complete grant totaled $500,000 and has been recorded as a prepayment for consulting services. The estimated fair value of the grant will be amortized on a straight-line basis of the term of the agreement. As of June 30, 2013, the Company recorded $48,163 as consulting expense related to the service for the six month period. The remaining prepaid balance at June 30, 2013 totaled $451,837.
As of June 30, 2013, the Company had additional prepaid expenses in the amount of $3,000 related to travel advances.
On December 15, 2011, the Company issued a Promissory Grid Note to a director of the Company whereby formalizing various advances previously received from the director in the amount of $51,300 and allowing for future advances up to $250,000. The note is non-interest bearing, unsecured and matures on December 15, 2014. The Company imputed interest at a rate of 2% per annum and recorded a discount in the amount of $10,640. In connection with one of the previous advances in the amount of $25,000, the Company issued warrants to purchase up to 250,000 shares of the Companys common stock at a price per share of $1.00 resulting in an additional discount of $17,709. The total discount attributable to the Grid Note totaled $28,349 and is being amortized to interest expense over the term of the note. During the six months ended June 30, 2013, the Company repaid $10,000 of the principal balance of the loan and recorded interest expense of $4,688 related to the discount.
On December 15, 2012, the Company issued a promissory note in the amount of $100,000 to it chief executive officer for amounts previously advanced to the Company for working capital. The note is non-interest bearing, unsecured and matures on December 15, 2014. The Company imputed interest at a rate of 2% per annum and recorded a discount in the amount of $2,059 which is amortized to interest expense over the term of the note. During the six months ended June 30, 2013, the Company repaid $70,000 of the principal balance of the loan and recorded interest expense of $984 related to the discount.
On December 17, 2012, the Company issued a promissory note in the amount of $50,000 to a related party, the note is non-interest bearing, unsecured and matures on January 15, 2013. In the event of default, the loan will bear a default rate of interest at 10% per annum. As of June 30, 2013, the principal balance was unpaid and the Company recorded related party interest at the default rate in the amount of $2,347.
The Company is authorized to issue up to 300,000,000 shares of common stock, par value $0.001.
As of June 30, 2013, the Company issued 550,050 shares of its common stock previously authorized.
During the six months ended June 30, 2013, the Company authorized the issuance of 2,626,250 shares of its common stock for cash proceeds totaling $1,563,125. As of June 30, 2013, 801,250 shares were unissued.
During the six months ended June 30, 2013, the Company issued a total of 1,000,000 shares of common stock pursuant to a two year consulting agreement. The estimated fair value of the shares totaled $500,000 and is being amortized on a straight-line basis over the term of the agreement. As of June 30, 2012, $48,163 has been expensed to consulting fees and the remaining $453,837 has been recorded as prepaid consulting fees to be amortized over a remaining term of the agreement.
During the six-months ended June 30, 2013, the Company issued 525,889 shares of its common stock as payment for previously accrued legal fees. The estimated fair value of the shares totaled $262,945 and has been recorded as a reduction to accounts payable.
On March 20, 2013, the Company authorized the issuance of 3,500,000 shares with an estimated fair value of $3,132,500 in connection with an asset acquisition. As of June 30, 2013, 750,000 of the shares are unissued.
On November 14, 2011, the Company issued warrants to purchase shares of the Companys common stock to a related-party in conjunction with a promissory note. The warrant holder was granted the right to purchase 250,000 shares of common stock of the Company for an aggregate purchase price of $250,000 or $1.00 per share. The aggregate fair value of the warrants totaled $60,720 based on the Black Scholes Merton pricing model using the following estimates: 2.04% risk free rate, 52% volatility and expected life of the warrants of 10 years.
On March 20, 2013, the Company assumed certain liabilities and acquired substantially all the assets of MeNetwork, Inc. (MeNetwork) used in connection with its business of developing, marketing and licensing a mobile marketing platform for use by merchants and consumers, pursuant to an Asset Purchase Agreement. As consideration the Company authorized the issuance of 3,500,000 shares of its common stock to the stockholders of MeNetwork, of which 350,000 shares are being held in escrow for a period of one year from the closing date for the purposes of satisfying any indemnification claims. In addition, upon the earlier of 180 days following the closing date or a change in control of the Company, the Company agreed to issue the remaining 750,000 shares of common stock to the director and Chief Operating Officer of MeNetwork and a current director of the Company.
This Quarterly Report contains forward-looking statements about Spindle Inc.s ("SPDL," "we," "us," or the "Company") business, financial condition and prospects that reflect managements assumptions and beliefs based on information currently available. We can give no assurance that the expectations indicated by such forward-looking statements will be realized. If any of our managements assumptions should prove incorrect, or if any of the risks and uncertainties underlying such expectations should materialize, Spindles actual results may differ materially from those indicated by the forward-looking statements.
The key factors that are not within our control and that may have a direct bearing on operating results include, but are not limited to, acceptance of our services, our ability to expand our customer base, managements ability to raise capital in the future, the retention of key employees and changes in the regulation of our industry.
We were originally incorporated in the State of Nevada on January 8, 2007 as Coyote Hills Golf, Inc. We were previously an online retailer of golf-related apparel, equipment and supplies. Through the date of this quarterly report, we only generated minimal revenues from that line of business. Spindle is a commerce-centric company with four primary customers: 1) individual consumers (buyers); 2) individual businesses (merchants or sellers); 3) third party channel partners (financial institutions and other non-bank partners such as wireless carriers); and 4) advertisers (retail, brands, and destinations). The Company intends to generate revenue through patented cloud-based payment processes under the Spindle product line, and licensing of its intellectual property. We believe that Spindle enables a trusted relationship between buyers and sellers (consumers and merchants) through our secure payments process; requested coupons, offers, and loyalty programs; and open consumer feedback on merchants products. Spindle provides the platform for the secure movement of funds between parties as well as enables brands, merchants, and institutions with the conversion tools necessary to deliver a seamless frictionless finance ecosystem.
On December 2, 2011, we acquired certain assets and intellectual property from Spindle Mobile, Inc. ("Spindle Mobile"), a Delaware corporation in the business of data processing, mobile payments fields and other related fields, in exchange for approximately 80% of the issued and outstanding common stock of the Company, which shares were distributed to the stockholders of Spindle Mobile, pursuant to the terms and conditions of an Asset Purchase Agreement, dated December 2, 2011 (the "Spindle Mobile Agreement").
Concurrent with the closing of the Spindle Mobile Agreement, we amended our articles of incorporation to change our name from "Coyote Hills Golf, Inc." to "Spindle, Inc." Additionally, we increased our authorized capital from 100,000,000 shares of common stock, $0.001 par value, and 100,000,000 shares of preferred stock, $0.001 par value to 300,000,000 shares of common stock, $0.001 par value, and 50,000,000 preferred stock, $0.001 par value. The actions were approved on November 11, 2011, by the consent of the majority stockholders who represent 90% of our issued and outstanding common stock, and effective on of December 2, 2011.
On October 11, 2012, pursuant to Article XII of the Companys Articles of Incorporation, the Board of Directors amended the Companys bylaws to (i) include the Chief Executive Officer as a person who may call a meeting of the Board of Directors and a special meeting of the Board of Directors; (ii) allow a quorum of the Board of Directors to be set by resolution of the Board of Directors; (iii) amend the description of the offices of Chief Executive Officer/President; (iii) set the annual meeting of shareholders at a time to be fixed by the Board of Directors; and (iv) allow for the election of Directors by a plurality of the votes cast in an election. Amendments to the bylaws were approved by the stockholders holding of a majority of the shares of entitled to vote thereon on October 29, 2012.
Company pursuant to the indemnification obligations of Parallel under the Parallel Agreement, and for any necessary accounts receivable adjustment after the Parallel Acquisition Closing Date. The Deferred Consent Escrow will be held for a period of up to five years after the Closing Date and will be released to Parallel or its legally permitted assign(s) incrementally as and when certain specified contract assignments or residual revenue streams are properly assigned to the Company or the residual revenue streams in respect of such specified contracts are bought out by the applicable third party, and otherwise the Deferred Consent Escrow is subject to cancellation to the extent such specified assignments or buy-outs fail to occur during such five year period, all as more particularly set forth in the Parallel Agreement.
On March 20, 2013 (the MeNetwork Closing Date), the Company assumed certain liabilities and acquired substantially all the assets of MeNetwork, Inc. (MeNetwork) used in connection with its business of developing, marketing and licensing a mobile marketing platform for use by merchants and consumers (the MeNetwork Assets), pursuant to an Asset Purchase Agreement, dated March 1, 2013, by and between Spindle and MeNetwork (the MeNetwork Agreement). As consideration for the assumption of such liabilities and the acquisition of the MeNetwork Assets, the Company issued an aggregate of 2,750,000 shares of common stock to the stockholders of MeNetwork, of which 350,000 shares are being held in escrow for a period of one year from the MeNetwork Closing Date for the purposes of satisfying any indemnification claims. In addition, upon the earlier of 180 days following the MeNetwork Closing Date or a change in control of the Company, the Company shall issue an additional 750,000 shares of common stock to Ashton Craig Page, the director and Chief Operating Officer of MeNetwork and a current director of the Company.
On February 6, 2013, the Companys Board of Directors, after consultation with management, determined that the Companys financial statements for the fiscal year ended December 31, 2011 (the "2011 Fiscal Year") as included in the Companys Annual Report on Form 10-K for the year ended December 31, 2011 (the "2011 Annual Report"), and the financial statements, as included in the Companys Quarterly Reports on Form 10-Q for the fiscal quarters ended March 31, 2012, June 30, 2012 and September 30, 2012 (the "2012 Fiscal Quarters", together with the 2011 Fiscal Year, the Restatement Periods) should no longer be relied upon and should be restated because of the Companys characterization of the acquisition of the Spindle Mobile Asset as an asset acquisition instead of a reverse capitalization. Accordingly, the restatement of the 2011Annual Report was filed with the Securities and Exchange Commission on August 6, 2013. The restatement of the quarters ended March 31, 2012 and June 30, 2012 was completed on August 19, 2013 and August 20, 2013, respectively.
Revenues from ongoing operations are expected to be derived from our patented conversion and networked payment processes under the Spindle product line and licensing of our intellectual property. During the three and six months ended June 30, 2013, we generated $327,210 and $705,446 in revenues in revenues as a result of the Company launching, its first payment and transactional platform. After factoring in cost of sales in the amount of $109,927 and $232,535 for the three and six months ended June 30, 2013, respectively, which relate to commissions paid to the Companys 130 independent sales agents, we realized a gross profit of $217,823 and $472,911 for the three and six months ended June 30, 2013, respectively. This compares to revenues during the three and six months ended June 30, 2012 of $0 and $17,974, respectively, and costs of sales of $0 and $7,749 for the three and six months ended June 30, 2012, respectively. There were no gross profits during the three months ended June 30, 2012 and $10,225 in gross profits during the six months ended June 30, 2012.
Our management is hopeful that as our base of operations continues to grow, we will see a corresponding increase in licensing and transactional revenue. As stated previously, we only recently changed our business direction. Therefore, our potential revenue streams are relatively new and have only recently begun to contribute materially to our operations. As a result, we are unable to forecast future revenue.
In the course of our operations, we incur operating expenses composed largely of general and administrative costs and professional fees. General and administrative expenses are essentially the cost of doing business, and encompass, without limitation, the following: research and development; licenses; taxes; general office expenses, such as postage, supplies and printing; utilities; bank charges; website costs; and other miscellaneous expenditures not otherwise classified. Accounting fees include: auditing by our independent registered public accountants, bookkeeping, tax preparation fees for filing Federal and State income tax returns and other accounting-specific consulting services. Professional fees include: transfer agent fees for printing stock certificates; consulting costs for marketing and advertising; general business development; and costs related to the preparation and submission of reports and information statements with the U.S. Securities and Exchange Commission.
As of June 30, 2013, we had total assets of $5,751,440, comprised of $1,158,155 in total current assets, $16,912 in fixed assets and $4,576,373 in other assets. This compares with total assets of $1,683,753 as of December 31, 2012, comprised of $369,067 in total current assets, $17,078 in fixed assets and $1,297,608 in other assets. The increase in other assets is contributed primarily to an increase in goodwill and software development related to the acquisition of the MeNetwork in the first quarter of 2013. In addition, the Company continued extensive investment on internal development of our payment services platform which included advancements to our single point boarding systems and enhancements to our Payment Service Provider (PSP) platform.
For the three and six months ended June 30, 2013, we incurred operating expenses in the amount of $1,073,614 and $2,000,740, respectively. These amounts are comprised of $13,525 and $46,922 in depreciation and amortization expense related to our intellectual property and fixed assets; $17,225 and $28,550 in promotional and marketing; $324,001 and $358,161 in consulting fees; $346,851 and $814,751 in salaries and wages; $26,505 and $53,010 in directors fees; $166,450 and $413,467 in professional fees; and $179,057 and $285,879 in general and administrative expenses.
The increase in operating expenses is primarily the result of transaction specific consulting fees related to our acquisition of Parallel Systems Inc. and MeNetwork, Inc.. Additionally, our emergence from the development stage into full operations has resulted in an increase in salaries and wages as anticipated. We expect this expense to continue and increase at a rate in direct proportion to our growth. Our professional fees were significantly higher due to our acquisition activities, regulatory compliance and one-time expenses related to restatements of our annual and interim financial reporting.
During the three and six months ended June 30, 2013, we recognized interest expense of $6,895 and $11,063, respectively. Our interest expense is partially offset by $1,509 and $1,934, respectively, in interest income for the same periods. This compares to $6,598 and $6,258 in interest expense for the three and six months ended June 30, 2012, offset by interest income of $1,870 and $3,740, respectively.
We have experienced net losses in all periods since our inception. Our net losses for the three and six months ended June 30, 2013 were $861,717 and $1,536,958, respectively. Net losses are attributable to the Companys recent acquisition and integration of PSI, ongoing Payment Card Services (PCI) certifications and maintenance, extensive internal software development, and deployment of the Companys initial suite of payment products. During the three and six months ended June 30, 2012, we incurred net losses of $4,728 and $5,986, respectively.
We anticipate incurring ongoing operating losses and cannot predict when, if at all, we may expect these losses to plateau or narrow.
Cash used in operating activities during the six months ended June 30, 2013 was $942,953, compared to $409,084 of cash used in operations during the comparable period ended June 30, 2012.
During the six months ended June 30, 2013, net cash used by investing activities totaled $191,827, of which $3,006 was utilized in the purchased of fixed assets and $188,821 is attributable to labor costs related to our software development costs. During the comparable six month period ended June 30, 2012, we allocated $181,163 of our labor costs to additions in our software development costs.
During the six months ended June 30, 2013, net cash provided by financing activities totaled $1,455,559, comprised of $1,563,125 which was received from investors purchasing shares of our common stock, ($27,566) was utilized in the repayment of debt to non-related parties and ($80,000) in debt repayment to related parties. In comparison, during the six months ended June 30, 2012, financing activities provided $607,736 in cash, primarily obtained from $90,236 loaned by a related party and $517,500 which was received from investors purchasing shares of our common stock.
As of June 30, 2013, we had $432,363 of cash on hand and working capital of $700,414.. Our management believes this amount is not sufficient to maintain our operations for at least the next 12 months. We are actively pursuing opportunities to raise additional capital through sales of our equity and/or debt securities for cash. We cannot assure you that any financing can be obtained or, if obtained, that it will be on reasonable terms. As such, our principal accountants have expressed doubt about our ability to continue as a going concern because we have limited operations and have not fully commenced planned principal operations.
Our Managements Discussion and Analysis of Financial Condition and Results of Operations section discusses our financial statements, which have been prepared in accordance with accounting principles generally accepted in the United States of America. The preparation of the financial statements requires us to make estimates and assumptions that affect the reported amounts of assets and liabilities at the date of the financial statements and the reported amounts of revenues and expenses during the reporting period. On an on-going basis, we evaluate our estimates and judgments, including those related to revenue recognition, recoverability of intangible assets, and contingencies and litigation. We base our estimates and judgments on historical experience and on various other factors that are believed to be reasonable under the circumstances, the results of which form the basis for making judgments about the carrying value of assets and liabilities that are not readily apparent from other sources. Actual results may differ from these estimates under different assumptions or conditions. The most significant accounting estimates inherent in the preparation of our consolidated financial statements include estimates as to the appropriate carrying value of certain assets and liabilities which are not readily apparent from other sources, primarily the valuation of intangible assets. The methods, estimates and judgments we use in applying these most critical accounting policies have a significant impact on the results we report in our consolidated financial statements.
Management regularly reviews property, equipment, intangibles and other long-lived assets for possible impairment. This review occurs quarterly, or more frequently if events or changes in circumstances indicate the carrying amount of the asset may not be recoverable. If there is indication of impairment, then management prepares an estimate of future cash flows expected to result from the use of the asset and its eventual disposition. If these cash flows are less than the carrying amount of the asset, an impairment loss is recognized to write down the asset to its estimated fair value. Management believes that the accounting estimate related to impairment of its property and equipment, is a critical accounting estimate because: (1) it is highly susceptible to change from period to period because it requires management to estimate fair value, which is based on assumptions about cash flows and discount rates; and (2) the impact that recognizing an impairment would have on the assets reported on our balance sheet, as well as net income, could be material. Managements assumptions about cash flows and discount rates require significant judgment because actual revenues and expenses have fluctuated in the past and are expected to continue to do so.
The Company reviews the carrying value of intangible assets for impairment whenever events and circumstances indicate that the carrying value may not be recoverable from the estimated future cash flows expected to result from its use and eventual disposition. In cases where undiscounted expected future cash flows are less than the carrying value, an impairment loss is recognized equal to the amount by which the carrying value exceeds the fair value. The factors considered by management in performing this assessment include current operating results, trends and prospects, the manner in which the property is used, and the effects of obsolescence, demand, competition and other economic factors.
The Company accounts for the cost of computer software developed or obtained for internal use of its application service by capitalizing qualifying costs, which are incurred during the application development stage and amortizing them over the softwares estimated useful life. Costs incurred in the preliminary and post-implementation stages of the Companys products are expensed as incurred. The amounts capitalized include external direct costs of services used in developing internal-use software and for payroll and payroll-related costs of employees directly associated with the development activities. The Company amortizes capitalized software over the expected period of benefit, which is three years, beginning when the software is ready for its intended use.
The Company recognizes revenue when all of the following conditions are satisfied: (1) there is persuasive evidence of an arrangement; (2) the service has been provided to the customer; (3) the amount of fees to be paid by the customer is fixed or determinable; and (4) the collection of our fees is probable.
Sales related to long-term contracts for services (such as engineering, product development and testing) extending over several years are accounted for under the percentage-of-completion method of accounting. Sales and earnings under these contracts are recorded based on the ratio of actual costs incurred to total estimated costs expected to be incurred related to the contract under the cost-to-cost method based budgeted milestones or tasks as designated per each contract. Anticipated losses on contracts are recognized in full in the period in which losses become probable and estimable.
For all other sales of product or services the Company recognizes revenues based on the terms of the customer agreement. The customer agreement takes the form of either a contract or a customer purchase order and each provides information with respect to the product or service being sold and the sales price. If the customer agreement does not have specific delivery or customer acceptance terms, revenue is recognized at the time of shipment of the product to the customer.
The Company records stock based compensation in accordance with the guidance in ASC Topic 718 which requires the Company to recognize expense related to the fair value of its employee stock option awards. This eliminates accounting for share-based compensation transactions using the intrinsic value and requires instead that such transactions be accounted for using a fair-value-based method. The Company recognizes the cost of all share-based awards on a graded vesting basis over the vesting period of the award.
Disclosure controls and procedures are controls and other procedures that are designed to ensure that information required to be disclosed in company reports filed or submitted under the Securities Exchange Act of 1934 (the Exchange Act) is recorded, processed, summarized and reported, within the periods specified in the Securities and Exchange Commissions rules and forms. Disclosure controls and procedures include without limitation, controls and procedures designed to ensure that information required to be disclosed in company reports filed or submitted under the Exchange Act is accumulated and communicated to management, including our chief executive officer and treasurer, as appropriate to allow timely decisions regarding required disclosure.
We conducted an evaluation, with the participation of our Chief Executive Officer and Chief Financial Officer, of the effectiveness of our disclosure controls and procedures as of June 30, 2013. Based on that evaluation and the material weakness in our internal controls and procedures described above, our Chief Executive Officer and Chief Financial Officer concluded that as of June 30, 2013, our disclosure controls and procedures were ineffective as a result of limited resources and personnel resulting in a lack of segregation of duties.
There have been no changes in our internal control over financial reporting (as such term is defined in Rules 13a-15(f) and 15d-15 (f) under the Exchange Act) during the quarter ended June 30, 2013 that have materially affected, or are reasonably likely to materially affect, our internal control over financial reporting.
On or about December 6, 2012, Spindle Mobile, John Devlin, Glenn Bancroft, David Ide (each of which are directors of the Company) and their spouses (the Defendants) were notified of a lawsuit brought by Mark Ogram and the Rod Living Trust (the Plaintiffs) in the Superior Court of the State of Arizona, County of Pima seeking relief for (1) breach of contract and (2) conversion of property related to the transactions with the Company with respect to the Spindle Mobile Agreement. The terms of the Spindle Mobile Agreement provided that any liabilities of Spindle Mobile would not be acquired by the Company. On March 4, 2013, a motion to dismiss on behalf of the Defendants was filed with the Superior Court of the State of Arizona which motion is still pending. On May 6, 2013, the cause of action related to the breach of contract was dismissed, however, as of June 30, 2013, the cause of action with respect to the conversion of property was still pending.
There are no other material pending legal proceedings, to which the Company or any director, officer or affiliate of the registrant, any owner of record or beneficially of more than five percent of any class of voting securities of the Company, or any associate of any such director, officer, affiliate of the registrant, or security holder is a party or any of its subsidiaries is a party or of which any of their property is the subject.
Our significant business risks are described in our Annual Report on Form 10-K filed with the Securities and Exchange Commission on July 19, 2013 for the fiscal year ended December 31, 2012, which is incorporated herein by reference.
During the three months ended June 30, 2013, the Company offered and sold an aggregate of 1,711,200 shares of common stock at $0.50 per share for total cash proceeds of $855,600. The Company relied on Section 4(a)(2) of the Securities Act of 1933 for issuing the securities, inasmuch as the offers and sales offer and sale was a private offering of securities made solely to accredited investors that had access to all information of the Company that they requested.
During the three months ended June 30, 2013, the Company issued 423,622 shares of common stock pursuant to the terms of consulting agreements with an estimated fair value of $211,811. The Company relied on Section 4(a)(2) of the Securities Act for issuing the securities, inasmuch as the offer and sale was a private offering of securities limited to the consultant which had access to all information of the Company that they requested.
During the three-months ended June 30, 2013, the Company issued 525,889 shares of its common stock as payment for services rendered with a value of $262,945. The Company relied on Section 4(a)(2) of the Securities Act for issuing the securities, inasmuch as the offer and sale was a private offering of securities limited to the consultant which had access to all information of the Company that they requested.
Incorporated by reference to the Registration Statement on Form SB-2, previously filed with the SEC on August 3, 2007.
Incorporated by reference to the Quarterly Report on Form 10-Q, previously filed with the SEC on November 14, 2012.
|
0.999999 |
What is the Best World of Warcraft Guide?
It makes sense that for a hugely popular online computer game like World of Warcraft (WoW), there would also be a number of guidebooks available to help both new and experienced players in various aspects of this rather complex game.
The best of these guides cover in detail topics such as WoW walkthroughs which are detailed explanations of what a player can expect from a particular part of the game such as going on a quest. Guides about how to acquire gold are especially popular since the acquisition of gold means power and wealth for World of Warcraft characters.
A good guide will also provide much detail in its presentation so that any level of player will have no trouble following the information presented.
1. Leveling and class guides are useful to WoW players in helping them bring their characters all the way from level 1 up to level 80. They provide details on quests and also on how your WoW character can acquire gold and the equipment you will need to successfully complete the quest.
2. Another category are the Profession and Gold guides. These books help players quickly earn gold by teaching the 5 professions that are most lucrative for earning tons of gold.
3. A third group of guides are what is known as the Player vs Player guides (PvP). These guides specialize in preparing players to go head to head in bouts with other WoW players. They will usually cover topics such as what weapons and equipment to have on hand, when is a good time to go PvP and strategies that have been proven to work in actual PvP bouts between all levels of players.
Whether you are just getting started in WoW or are an experienced player in the game you will find that World of Warcraft guidebooks give you a distinct advantage over players who don't use them. And since the game undergoes periodic upgrades and expansions, you will usually find the guidebook authors keep their information up-to-date with any changes in the game so you maintain your advantage.
|
0.977104 |
Choose one of the examples from this list.
Repeat steps 1-3 for a second example.
You do not need to comment on anyone else's post!
The first example of the green light in Fault in Our Stars.
Any time the allusion to that green light is used, the association is with the American Dream. The green light was the representation to Jay Gatsby of achieving wealth and fame. As a normal boy from a poor family, Gatsby had to work his way to the point of being wealthy. However, he felt he wouldn't achieve his dream until he had Daisy, who came from an established family. If he accepted her, all of her social peers would, as well. When used as an allusion, the green light represents any kind of youthful dream for a better life.
|
0.952 |
What is the Law Regarding Employment in Mountain Home?
Employment law refers to the body of laws in Mountain Home that regulate employees, employers, and independent contractors. These laws govern issues in employment such as hiring, workplace disputes, and terminations A general understanding of Mountain Home employment laws is required for both the employee and their employer.
Majority of the time employment is considered to be "at-will", although in some instances there might be an employment contract between the employer and employee for a set period of time. In "at-will" employment, either the employer or the worker may terminate the job at any time, just as long as the reasons for doing so are not illegal. When the parties use an employment contract, the terms of employment will be controlled by their state and federal laws, as applied to people living in Mountain Home.
Discrimination is illegal at any stage of employment such as hiring policies, wage distribution, and terminations, according to laws which apply to residents of Mountain Home. People who live and work in Mountain Home must follow laws which make it illegal to discriminate on the basis of certain categories. These categories include race, gender, age, national origin, and disability.
|
0.948425 |
What should my "official" title be?
I realize that titles mean jack squat in the large scheme of things, but in any event I'm wondering what exactly my title should be.
I am the IT department (i.e. only person0 for a very small 8-person company. That means I'm responsible for keeping systems up and running (sysadmin), database design and maintenance (dba), application design and maintenance (programming). I am considered management-level in the hierarchy of the company; I report directly to the President and work closely with the COO on tactical-level IT initiatives to help our core business. I can recommend purchases, but do not have direct purchasing authority. The company has a contract with a software development firm to provide some assistance with our systems, and I function as liaison between them and the COO. If and when we contract them to undertake larger projects, I am going to function as Project Manager for them.
I was thinking my title should be "Information Services Manager" since that accurately describes my role and doesn't sound pretentious (it was unofficially Director of IT Services, and once during a meeting with our supplier it was on the agenda sheet as Vice President of IT, but given that I only manage computers, not people I think it looks "bad" and smacks of arrogance). I've also seen "Manager, Information Systems" as a similar (albeit more archaic) title for someone in my position.
So again, even though the title has no real bearing on anything, I'd like to have something that effectively conveys my position but gives credit to the fact that I am more than just a "grunt" in the scheme of things.
seems appropriate. Director implies purchasing power, which you state you don't have. You do, in fact, manage your company's Information Services.
Since 'Director' level does not get a salary - they just get a share of the company profits.
They also tend to have a sizable wad of their own money invested in said company.
So, if you haven't re-mortgaged your house to invest in this company, I'd stick with Information Services Manager if I were you.
Actually Directors are employees of the company so can and do get a salary.
"Most company owners need to extract profits from their company to support themselves and their families and perhaps also to fund private investments elsewhere. It is therefore absolutely vital for the company owner to keep abreast of the changing answer to the 'Salary or Dividend' question, as the tax arising under the two methods can be significantly different and the wrong decision can cost thousands of pounds!"
How it operates in your corner of the planet, is another matter.
yes your absolutely right, to define the job role reflects the pay.
I think though the size of the company in question reflects the relaxed issue that we see in small family business's and such so give yourself the grandest title going if you got the oppertunity, it will look nice on the CV but do remember seasoned employers will be scrutinising you when you move on.
head of I.T. or what about Technical support manager. becasue basically if your doing all that then thats what it is.
Unless you got your finger on the chicken switch or your buying shares like hot meals then director doesnt even enter the equation.
I'm afraid its only one conclusion! Unless there hiring soon and your doing all the grunt jobs then your title must be I.T Technician/I.T. Supervisor/Manager/Head of Technical Support.
I hope your getting paid well?
Title "Infrastructure support specialist? which means I do every thing and can be paid by this title.
I currently support a 140 person network and do any thing that is needed.
The best thing about this is that I have great things to add to my resume.
"Director" is an "officer of the company".
And therefore bears some responsibilty for the operation and finances of the company.
A vice-president usually has authority over some aspect of the business including the authority to spend money for purposese as usually defined by a departmental budget.
Let your title reflect you.
Most companies look at the job title to reflect what you do now. If you manage your tech and personnel, you are an IT manager. If you direct your companies IT growth as well, you are an IT director. If you sit in an office suite with a personnal assistant, take two hour lunches and golf while someone else takes care of the IT, you are a vice president or CIO.
|
0.998893 |
Convolutional neural networks (CNNs) have shown great capability of solving various artificial intelligence tasks. However, the increasing model size has raised challenges in employing them in resource-limited applications. In this work, we propose to compress deep models by using channel-wise convolutions, which replace dense connections among feature maps with sparse ones in CNNs. Based on this novel operation, we build light-weight CNNs known as ChannelNets. ChannelNets use three instances of channel-wise convolutions; namely group channel-wise convolutions, depth-wise separable channel-wise convolutions, and the convolutional classification layer. Compared to prior CNNs designed for mobile devices, ChannelNets achieve a significant reduction in terms of the number of parameters and computational cost without loss in accuracy. Notably, our work represents the first attempt to compress the fully-connected classification layer, which usually accounts for about 25% of total parameters in compact CNNs. Experimental results on the ImageNet dataset demonstrate that ChannelNets achieve consistently better performance compared to prior methods.
|
0.999809 |
Understand the core workflow of a decoupled architecture.
Before diving into the technical steps, let’s understand the high-level design of the architecture itself. A “headless” or “decoupled” Drupal architecture typically involves the communication between two separate applications: a Drupal website (acting as a data source) and a front-end application (acting to display data provided by Drupal). For the purposes of this tutorial, we will use a Node.js based front-end application.
There are often project requirements which help to surface benefits of leaning on a decoupled Drupal architecture. These project requirements usually revolve around the intent of an “API-first” methodology. API-first Drupal can be contextually understood as leveraging the CMS to expose data for consumption in another application. Benefits of this architecture typically revolve around the desire to store data in Drupal, while offering options of displaying that same data in other locations outside of Drupal.
The core function of Drupal within the decoupled architecture to serve as a data source, but that role could translate into a couple of different things. There are project scenarios in which the Node.js application is intended to emulate the content type fields and mirror the data in the same manner. Some project requirements indicate that selected content combine to offer promotional or real-time updates. While there are a wide range of technical purposes, the end result of this scenario is typically structured around the housing of data. In this case a “data source” should be interpreted for both database storage and data construction patterns.
The role of Node.js within our decoupled architecture is two-fold: presenting data that is ingested from Drupal and sending data back to Drupal. In most cases, the Node.js application core focus serves the application and displays data from Drupal. This is not a suggestion that the application pulls data from Drupal solely, but for the purpose of this tutorial we will make this assumption. This need is a key driver for the adoption of Node.js as the abstracted presentation layer.
|
0.940075 |
There are three types of shapes that can be customized and inserted into a ScribbleMap: rectangle, circle and polygon.
1. Select the Rectangle tool from the top menu bar.
2. Select the fill and outline color by clicking on the color chooser for each.
3. Select the desired border width and line style by clicking once on each option.
4. Click and drag to draw the rectangle.
1. Select the Circle tool from the top menu bar.
3. Select the desired border width and style by clicking once on each option..
4. Click and drag to draw the circle.
1. Select the Polygon tool from the top menu bar.
4. Click and drag to draw one side of the polygon.
5. Continue to drag, then click to draw each side of the polygon.
6. Double click to finish drawing the polygon.
2. Click and drag the shape to the location of your choice.
2. Select a handle bar on the outline of the shape to modify the shape one side at a time.
3. To create additional handles, click on the handle bars with the + sign.
2. Because the shape consists of two parts (fill and border) each part can/must be deleted separately by clicking once on the area to be deleted.
|
0.999999 |
How does Soto build a central idea of his story in the excerpt? By showing how Carolyn s family lives in a way that is strange to him, Soto supports the idea that culture causes conflict between people. By showing how Carolyn s family lives in a way that is boring to him, Soto supports the idea that people from different cultures do not share interests. By showing how Carolyn s family lives in a way that is familiar to him, Soto supports the idea that people from different cultures can also share a culture. By showing how Carolyn s family lives in a way that is similar to him, Soto supports the idea that there are very few differences among cultures.
the idea that there are very few differences among cultures.
|
0.934296 |
Sir Humphry Davy, 1st Baronet, FRS (17 December 1778 – 29 May 1829) was a British chemist and physicist. He was born in Penzance, Cornwall and both his brother John Davy and cousin Edmund Davy were also noted chemists. Berzelius called Davy's 1806 Bakerian Lecture "On Some Chemical Agencies of Electricity" "one of the best memoirs which has ever enriched the theory of chemistry." This paper was central to any chemical affinity theory in the first half of the nineteenth century. Davy is probably best remembered today for his discoveries of several alkali and alkaline-earth elements, as well as contributions to the discoveries of the elemental nature of chlorine and iodine.
Sir Humphry revelled in his status, as his lectures gathered many spectators. Davy became well known due to his experiments with the physiological action of some gases, including laughing gas (nitrous oxide) - to which he was addicted, once stating that its properties bestowed all of the benefits of alcohol but was devoid of its flaws. Davy later damaged his eyesight in a laboratory accident with nitrogen trichloride. In 1801 he was nominated professor at the Royal Institution of Great Britain and Fellow of the Royal Society, over which he would later preside. He later invented the Davy lamp which was a great and well-known success.
In 1812 he was knighted, gave a farewell lecture to the Royal Institution, and married a wealthy widow, Jane Apreece. While generally acknowledged as being faithful to his wife, their relationship was stormy and in his later years Davy travelled to continental Europe alone. In October 1813 he and his wife, accompanied by Michael Faraday as his scientific assistant (and valet) traveled to France to collect a medal that Napoleon Bonaparte had awarded Davy for his electro-chemical work. Whilst in Paris Davy was asked by Gay-Lussac to investigate a mysterious substance isolated by Bernard Courtois. Davy showed it to be an element, which is now called iodine. The party left Paris on December 29, travelling south through Montpellier and Nice and then to Italy.
After passing through Genoa, they went to Florence, where, in a series of experiments starting on Sunday March 27, Davy, with Faraday's assistance, succeeded in using the sun's rays to ignite diamond, and proved that it was composed of pure carbon. Davy's party continued on to Rome, and also visited Naples and Mount Vesuvius. By the June 17, they were in Milan, where they met Alessandro Volta, and continued north to Geneva. They returned to Italy via Munich and Innsbruck, passed though Venice and returned to Rome. Their plans to travel to Greece and Constantinople (Istanbul) were abandoned after Napoleon's escape from Elba, and they returned to England.
After his return to England in 1815, Davy went on to produce the Davy lamp which was widely used by miners. Although the idea of the safety lamp had already been demonstrated by William Reid Clanny and an engineer, George Stephenson, his use of wire gauze to prevent the spread of flame was quickly copied by both of these inventors in their later designs.
He also showed that oxygen could not be obtained from the substance known as oxymuriatic acid and proved the substance to be an element, which he named chlorine. (However Carl Scheele is credited as the discoverer of chlorine. Scheele had discovered it 36 years before Davy, but was unable to publish his findings.) This discovery overturned Lavoisier's definition of acids as compounds of oxygen.
In 1815 Davy suggested that acids were substances that contained replaceable hydrogen – hydrogen that could be partly or totally replaced by metals. When acids reacted with metals they formed salts. Bases were substances that reacted with acids to form salts and water. These definitions worked well for most of the nineteenth century.
In 1818, he was awarded a baronetcy, and two years later he became President of the Royal Society.
Davy died in Switzerland in 1829, his various inhalations of chemicals finally taking their toll on his health. He is buried in the Plain Palais Cemetery in Geneva.
Davy's laboratory assistant, Michael Faraday, went on to enhance Davy's work and in the end became more famous and influential – to such an extent that Davy is supposed to have claimed Faraday as his greatest discovery. However, he later accused Faraday of plagiarism, causing Faraday (the first Fullerian Professor of Chemistry) to cease all research in electromagnetism until his mentor's death.
A lunar crater is named after Sir Humphry Davy. It has a diameter of 34 km and coordinates of 11.8S, 8.1W.
In Penzance in Cornwall, Davy's hometown, there is a statue of him in front of the imposing Market House, now owned by Lloyds TSB, at the top of Market Jew Street, the town's main high street. There also is a secondary school in Penzance named Humphry Davy School. Like James Prescott Joule and Isaac Newton, Davy is remembered in his hometown by a pub. The Sir Humphry Davy pub is located in Penzance opposite the Greenmarket at the end of Market Jew Street.
Davy was the subject of the first ever clerihew.
A satellite of the University of Sheffield at Golden Smithies Lane in Wath upon Dearne (Manvers) is called Humphry Davy House and is currently home to the School of Nursing and Midwifery, until April 2009.
^ Berzelius, J. J. (1818). Traite de chimie, trans. Jourdian and Esslinger, vol. 1, pg. 164. 1st Swedish ed. (Larbok i kemien), Stockholm, this ed., 8 vol., Paris (1829-33).
^ Levere, Trevor H. (1971). Affinity and Matter – Elements of Chemical Philosophy 1800-1865. Gordon and Breach Science Publishers. ISBN 2881245838.
^ Humphry Davy (1813). "On a New Detonating Compound". Philosophical Transactions of the Royal Society of London 103: 1-7.
^ Fullmer, June Z. (1969). Sir Humphry Davy's Published Work. Cambridge, MA: Harvard University Press.
Harold Hartley (1960). "The Wilkins Lecture. Sir Humphry Davy, Bt., P.R.S. 1778-1829". Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences 255 (1281): 153-180.
This article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article "Humphry_Davy". A list of authors is available in Wikipedia.
|
0.951374 |
SUMMARY: I'm a UFO ambassador.
THEME: Seeing UFOs in the sky.
I had awaken briefly and went back to sleep.
I'm in an apt. that looks similar to my childhood apartment. It's a bright, sunny day.
Participating. I dreamed of standing and looking out an apartment window. I saw an object in the sky to the left that turned out to be a disc-shaped UFO with a bluish, hazy appearance. It went overhead out of view.
Participating. The scene changed somewhat. The room and window area was similar, but the people were now highly visible and they look different. They were sun-tanned white men with chains crossed over their chests in an X fashion. (See sketch 3) These men knew about the UFOs and were very determined to have some sort of confrontation. They weren't angry but were prepared for something which I had a strong part in. They had to convince me (regarding the matter), and I reluctantly decided to join them.
On the right was a burly man with curly chest hair and not mean, exactly. He ordered a slender man (also on the right) to "Bring him clothes so that he can be presentable." This man was a type of ancient valet or servant. I think I was to meet someone very important, for when the slender man brought me the clothes (which turned out to be a robe of red checks with yellow), the burly man said the clothes were not suitable for someone of my stature (in this case I knew "stature" meant "position of authority or responsibility"), then he shoved the smaller man away firmly.
Participating. The next thing I know, I'm standing in a large, well lit room with no furniture. I'm talking to two men. I'm a white man, tall and handsome and wore a white suit (jumpsuit) with gold trimming at the pockets (as remembered at time dream was recorded). In the dream the pockets were very noticeable, because I was trying to pass something to the men beside me. Four to five feet away is a doorway and just inside the room I'm in are two(?) guards stationed to watch me. I don't want the guards to see what I'm doing, what I'm trying to give the men. They mustn't see. I awoke at that point, and I remembered nothing more.
Date in dream would likely be same as waking date of dream: 07/21/90?
Possible past life scene. The men's attitudes and style of dress was not modern.
This is what fascinates me about some dreams. I record the events, but clearly leave out impressions and thoughts from the dream. What was not recorded is that I was a liaison between the ETs and the men from this culture. They wanted to make contact with the ETs and for whatever reason, I was there (or maybe I was also there on the behalf of the ETS). I did not trust the men, this was clear. I felt that the ETs were going to be duped or walk into some kind of trap, and I felt it my responsibility to warn the them. Why I was being guarded by the men at the doorway is not entirely clear, just that I seemed to be under a sort of house arrest. I think they found out that I was not entirely on their side. What I am clear on is that the meeting with the ETs was still scheduled to continue, and I knew that it must not happen.
I still feel that the dream had elements of a past life. It could be the theme of being an ambassador or liaison of sorts, or of trying to warn the ETS, who knows? It really felt as if I was in the role of a double-spy. This is a theme that recurs from time to time in my dreams, usually with a Nazi motif.
|
0.976809 |
But Scotty hit the headlines again on Tuesday after saying the fact that Katie is married 'wouldn't stop' her sleeping with him.'She's a lovely girl, I've not seen her recently but I would get in touch with her,' she told The Sun.'She's fit! Write that I think she's fit and I totally would s**g her.'When reminded that Katie was married to husband Kieran Hayler, the cheeky 29-year-old replied: 'Yeah that wouldn't stop her!He captioned it: 'Chilling back at the villa.' The PDA-packed displays come amid reports Katie is deliberately pushing Kieran 'to the brink' so that he will quit their marriage - meaning she can cash in on a series of post-divorce interviews and magazine deals.'It's becoming clear Katie's increasingly unhappy in her marriage and is looking for a get -out clause to end things without appearing like the bad one,' a source told Closer magazine.'She seems to be pushing Kieran to the brink so that he'll leave her and she can then ride the wave of being the poor victim left at home with five kids to look after,' the source added.The claims about Katie and Kieran's reportedly rocky marriage comes after her rumoured one-time fling Scotty T said she was 'fit'.Katie and the Geordie Shore star set tongues wagging after they were pictured leaving a hotel in Newcastle last October.'She has said she doesn't trust him and can't see them having a future together.' Katie and Kieran married in the Bahamas in January 2013, just a few short months after they first met.The couple have two children together – three-year-old Jett Riviera Hayler and two-year-old Bunny Hayler.
She's trying to catch him out all the time to see if she can find an excuse to end the marriage,' the source added.
A source told The Sun: 'The marriage is essentially over.
Pals are speaking openly about the fact she plans to end things officially soon.
Other sources claimed Katie risks financial ruin as she is reportedly spending tens of thousands of pounds - despite her companies allegedly banking less than £100,000.
She is allegedly spending £10,000 a month to maintain the family home she shares with Kieran and her five children - as well as expensive gifts for her relatives, Now magazine claimed.
FIRST IMPRESSION: Men who drink specialized beers, like IPAs, dig that they're a cut above plain-old brewskies.
|
0.9987 |
Pregnancy App Article: "Antenatal appointments"
You’ll probably have an antenatal appointment in week 28. Your midwife might talk to you about what sort of birth you are hoping for so it’s worth considering beforehand so you’re ready with any questions you might want to ask. It's likely you'll also have some blood tests done, but you should be told about these in advance.
Perhaps you fancy using a birthing pool if there’s one available, or you might want to ask about the pain relief on offer, or how many birth partners you’re allowed to have. All of this could of course go straight out the window on the day, but it’s good to have an idea of what you’d like in an ideal situation.
The checks at week 28 are really quite important, I had high blood pressure at mine and had to be delivered early.
|
0.918636 |
West-Hollywood is located in Los Angeles County between Beverly Hills and Hollywood along Highway 2, near the Pacific Ocean. It is a 1.9 square mile community full of restaurants, shopping, art galleries, nightlife and top-rated entertainment venues, making it a "must-see" for visitors. Warner Hollywood Studios is located in West Hollywood and was established in 1919 by actors Douglas Fairbanks Jr. and Mary Pickford. It reigned as one of Hollywood's greatest movie production sites from the silent era through modern movies. Generally considered part of Hollywood, West Hollywood is near all the other major attractions including the famous Hollywood Sign, the Avenues of Art & Design, Mann's Chinese Theater, the Walk of Fame, the Hollywood Wax Museum, Paramount Studios, Bob Hope Square, Charlie Chaplin Studios, Griffith Park and the Hollywood Bowl. West Hollywood is also "Home of the Sunset Strip." For outdoor recreational fun, West Hollywood is just a short distance to both the beach and the mountains. Enjoy activities such as swimming, surfing, sunning, beach volleyball, boating and sailing, golf and tennis.
The closest airports in the area are the Bob Hope airport (BUR) located about 7 miles north of West Hollywood in Burbank, California, the Los Angeles International airport (LAX) located approximately 10 miles southwest of West Hollywood in Los Angeles, California, the Van Nuys airport (VNY) located roughly 11 miles northwest of West Hollywood in Los Angeles ( Van Nuys ), California, and finally the Long Beach airport (LGB) located around 22 miles southeast of West Hollywood in Long Beach, California.
Universal Studios Hollywood Universal City CA 3.4 mi.
Pacific Park Santa Monica CA 8.9 mi.
Knott's Berry Farm Buena Park CA 25.9 mi.
Six Flags Magic Mountain Valencia CA 28.2 mi.
Adventure City Anaheim CA 31.1 mi.
Disney's California Adventure Anaheim CA 31.1 mi.
Disneyland Anaheim CA 31.1 mi.
Scandia Amusement Park Ontario CA 40.7 mi.
Boomers Family Fun Center Upland CA 40.8 mi.
Castle Amusement Park Riverside CA 56.1 mi.
Pharaohs Lost Kingdom Redlands CA 67.5 mi.
Legoland California Carlsbad CA 86.8 mi.
Six Flags Hurricane Harbor Santa Clarita CA 23.3 mi.
Soak City U.S.A. Buena Park CA 25.9 mi.
Six Flags Hurricane Harbor Valencia CA 28.2 mi.
Raging Waters San Dimas CA 31.8 mi.
The Haunted Galleon and Volcano Island Lake Elsinore CA 66.1 mi.
Pharaoh's Waterpark Redlands CA 67.5 mi.
Oasis Waterpark Palm Springs CA 105.6 mi.
Roosevelt Municipal Golf Course Los Angeles CA 4.5 mi.
Studio City Golf Course Studio City CA 4.6 mi.
Rancho Del Rey Golf Club Atwater CA 6.5 mi.
Brentwood Lake Brentwood CA 6.8 mi.
Shadow Lakes Golf Club Brentwood CA 6.8 mi.
Brentwood Country Club Brentwood CA 7.7 mi.
Woodley Lakes Golf Course Van Nuys CA 7.7 mi.
Penmar Golf Course Venice CA 8.1 mi.
Scholl Canyon Golf & Tennis Club Glendale CA 8.4 mi.
De Bell Municipal Golf Course Burbank CA 8.6 mi.
Sepulveda Golf Complex Encino CA 9.0 mi.
Westchester Golf Course Los Angeles CA 9.6 mi.
Van Nuys Golf Course Van Nuys CA 10.1 mi.
Arroyo Seco Golf Course South Pasadena CA 11.1 mi.
Verdugo Hills Golf Course Tujunga CA 11.2 mi.
Monterey Park Golf Course Monterey Park CA 11.6 mi.
Hansen Dam Golf Course Pacoima CA 11.9 mi.
Chester Washington Golf Course Los Angeles CA 12.1 mi.
Rancho Maria Golf Club Santa Maria CA 12.3 mi.
Sunset Ridge Golf Center Santa Maria CA 12.3 mi.
Mission Hills Golf Course Sepulveda CA 12.7 mi.
Lakes at El Segundo El Segundo CA 12.8 mi.
South Gate Municipal Golf Course South Gate CA 13.0 mi.
Brookside Golf Club Pasadena CA 13.1 mi.
Eaton Canyon Golf Course Pasadena CA 13.1 mi.
Alhambra Municipal Golf Course Alhambra CA 13.8 mi.
Marriott Golf Course Manhattan Beach CA 14.1 mi.
Ford Park Golf Course Bell Gardens CA 15.0 mi.
Cascades Golf Club Sylmar CA 15.2 mi.
Altadena Golf Course Altadena CA 15.3 mi.
Ski Sunrise Wrightwood CA 45.6 mi.
Snow Valley Running Springs CA 72.1 mi.
Will Rogers State Park CA 9.0 mi.
Santa Monica Beach State Park CA 9.7 mi.
Will Rogers Beach State Park CA 10.0 mi.
Dockweiler Beach State Park CA 12.4 mi.
Manhattan Beach State Park CA 14.8 mi.
Redondo Beach State Park CA 18.7 mi.
Malibu Creek State Park CA 21.1 mi.
White Point State Park CA 26.4 mi.
Alamitos Bay State Park CA 28.1 mi.
Bolsa Chica Beach State Park CA 33.2 mi.
Point Mugu State Park CA 37.1 mi.
Chino Hills State Park CA 38.3 mi.
Huntington Beach State Park CA 38.9 mi.
Los Angeles Zoo Los Angeles CA 7.2 mi.
Birch Aquarium La Jolla CA 32.1 mi.
Santa Ana Zoo Santa Ana CA 37.0 mi.
Santa Barbara Zoological Gardens Santa Barbara CA 79.7 mi.
San Diego Wild Animal Park San Diego CA 117.7 mi.
San Diego Zoo San Diego CA 117.7 mi.
Sea World of San Diego San Diego CA 117.7 mi.
|
0.998993 |
Fun player allows play very funny videos: Rémi Gaillard and Just For Laughs Gags.
Rémi Gaillard is a French humorist who uploads videos on YouTube. After losing his job at a shoe store, Rémi began to use his free time to have fun and run pranks on the public. Gaillard gained attention in the French media after performing a series of well-documented pranks, including an appearance disguised as a Lorient football player in the 2002 Coupe de France final match, during which he took part in the winners' celebrations and was greeted by the then president of the French Republic, Jacques Chirac. He plays football and has posted videos showing his skills, including one with Brazilian legend Ronaldo. Gaillard has appeared in several sport events, TV game shows and political rallies. Rémi Gaillard became famous for his videos where he displays an "outrageous" style of humour, challenging public norms. Recurring themes include dressing up as and interpreting the behaviour of various animals in public, racing unsuspecting car-drivers whilst dressed up as Mario à la Mario Kart, and numerous provocative interactions with parking enforcement officers and the police. Gaillard's satirical motto is "C'est en faisant n'importe quoi qu'on devient n'importe qui". The exact meaning is difficult to translate into English, as it plays on a classic French proverb "C'est en forgeant qu'on devient forgeron". Literally translated the proverb reads "It's by forging that one becomes a blacksmith," or more figuratively, "Practice makes perfect". In Gaillard's jeu de mots "n'importe quoi/qui" can read "no-matter what/who", or more simply "anything/anyone", such that the phrase would read It's by doing anything that one becomes anyone. However "n'importe quoi/qui" can also be used to mean "a stupid thing/person". The dual meaning lends itself towards challenging the proverb, as is Gaillard's style.
Just for Laughs: Gags (JFL Gags) is a Canadian silent comedy/hidden camera reality television show that is under the Just for Laughs brand. In 2000, JFL Gags began airing on French Canadian network Canal D. In the following years, the show was picked up by TVA, CBC and The Comedy Network in Canada, BBC1 in the UK, TF1 in France, and ABC and Telemundo in the United States. This series' format is a hidden camera comedy show, playing silly pranks on unsuspecting subjects while hidden cameras capture peoples' responses. The show plays music in the background, but does not contain any sound or dialogue other than brief sound effects and laughter. In 2011, the show spawned a spinoff titled, Just Kidding which consists exclusively of kids playing pranks on adults. With its silent format and no translation required, Just for Laughs Gags has been purchased for use in over 100 countries throughout the world, as well as in airports and by airlines. Reactions to the gags range from "inane" to cross-culturally funny.
|
0.999414 |
A large body of research has demonstrated that attentional biases are a relatively robust phenomenon among anxious populations, but less pronounced and consistent in non-anxious subjects [1–5]. Generally, attentional biases lead individuals to selectively and differentially allocate attention towards threatening stimuli in comparison to neutral stimuli. In particular, attentional biases characterized in research can be divided into facilitated attention (i.e., faster detection of threat vs. non-threat stimuli), difficulty in disengagement (i.e., disengaging attention from threat stimuli is harder than from a neutral stimulus), and attentional avoidance (i.e., shifting attention towards locations opposite the location of threat; for a review, see ).
The most commonly used task to measure attentional bias is the modified or Emotional Stroop task . In this task, different types of words (e.g., threatening and neutral) are displayed in varying colors. Subjects are asked to name the colors while ignoring the semantic contents of the words. Slower response times to color-naming of threat words compared to neutral words are considered an indication of an attentional bias. However, interpretation of the attentional bias measured by the Emotional Stroop task is difficult. That is, delayed response times to threat words may be due to enhanced attention towards threat as well as a general delayed responding to threat . Furthermore, these aspects of difficulty in disengaging and facilitated attention (also referred to as vigilance or attentional orienting) are not addressed in the Stroop task. The dot probe task was established and improved in order to resolve this problem, disentangling the different components of attentional biases. In this task, two words appear on a computer screen with one word above or beside the other for a brief duration. Then, a probe appears in the location of one of the two words. Subjects indicate which stimulus the probe replaced. Different response times towards probes that replace threatening compared to neutral stimuli indicate the presence of attentional biases. Here, difficulty in disengagement is present when subjects are slower in indicating the probe when it appears in a different location than the threat word, whereas an attentional orienting is present when subjects are faster in indicating the probe when it appears in the location of the threat word .
From a clinical point of view, attentional biases are of interest because they are most likely relevant in the development and maintenance of psychiatric disorders [10, 11]. For instance, the schema-based model of information-processing by Beck and Clark proposed that anxiety disorders are caused by different cognitive processes (e.g., [12, 13]). According to this model, cognitive biases in information processing are reflected by selective attention to threat, interpretation of ambiguous stimuli as threatening, selective recall of threatening experiences, and an expectancy of aversive events [14, 15]. That is, it is suggested that attentional biases influence individuals’ everyday lifes and interactions by influencing, for instance, if threatening cues (e.g., angry faces) are detected in a room, if a peer’s comment is interpreted as a negative evaluation, in which way a student evaluates and recalls his performance in a presentation, and if a danger or reward is expected in the next encounter with a peer. In line with this assumption, attentional biases could be detected in several studies examining subjects with high trait anxiety and clinical anxiety . Using the Emotional Stroop task, attentional biases have been found in patients with posttraumatic stress disorder (PTSD) [16, 17], panic disorder , generalized anxiety disorder (GAD) , obsessive-compulsive disorder , social phobia [21–23], and specific phobia . In these studies, patients with anxiety disorders showed increased reaction times towards disorder-relevant words when compared to neutral or positive words. Similarly, attentional biases have been demonstrated in the dot-probe task for patients with GAD , social phobia [26–28], and PTSD [29, 30].
Although the majority of studies demonstrated a difficulty in disengagement among anxious individuals [1, 9, 31, 32], there are also studies presenting converse or even no bias effects. For example, attentional avoidance, rather than disengagement, was found in socially anxious subjects [27, 28]. Moreover, there are several studies failing to show any attentional bias in PTSD patients towards trauma-related pictures, threatening faces or other disorder-related stimuli [33–35]. Additionally, studies applying the dot-probe task showed null results in patients with panic disorders , and obsessive-compulsive disorder (OCD) [37–39]. Likewise, the literature of Emotional Stroop studies presents inconsistent results. For example, did not find any differences in reaction times towards threat words between patients with panic disorder or OCD and healthy controls. Similarly, Moritz and colleagues (2004) could not show interference effects in patients with OCD .
With respect to attentional biases in other psychiatric disorders, the current body of literature is peppered with inconsistencies as well. A meta-analysis of 29 empirical studies examining depressive patients demonstrated an attentional bias towards negative information in this population . While depressive patients differed significantly from controls in the dot-probe task, there was only a marginal difference between depressive subjects and healthy controls in the Emotional Stroop task. Other studies could not find any differences between depressive and healthy subjects using the Emotional Stroop or the dot-probe task . In patients with personality disorders, particularly borderline personality disorder, facilitated attention towards negative emotional stimuli was found in an Emotional Stroop task . However, von Ceumern-Lindenstjerna and colleagues (2010) could determine that an attentional bias towards negative faces was not due to Borderline personality disorder per-se but to an interaction between mood and the personality disorder, i.e., only patients with negative mood showed facilitated attention towards threatening stimuli . Furthermore, attentional biases were demonstrated in patients with schizophrenia and psychotic disorders [47–49]. Again, attention was allocated towards disorder-related stimuli.
Accordingly, it appears that trait anxiety and psychopathology are associated with attentional biases. However, this association seems to be moderated by both parameters within the paradigms used to detect biases (i.e., threat intensity and stimulus duration) and individual differences that lie beyond trait anxiety and psychopathology. The former suggestion is built upon findings that attentional biases in high trait anxious individuals were more easily found when highly, but not mildly, threatening stimuli were presented, and that facilitated attention was associated with a rather quick presentation of stimuli . The latter assumption is supported by studies reporting attentional biases in healthy subjects, as well [9, 50]. Adverse child experiences (ACEs) are a potential candidate in distorting attentional processes and moderating the association between psychopathology and attentional biases. Consider that ACEs during childhood and adolescence have lasting consequences and contribute to different psychological disorders including depression and anxiety disorders [51–55]. Indeed, recent studies have shown that attentional biases were present in patients with a history of ACEs but not in patients who did not report ACEs in their childhood and adolescence [56, 57]. For example, Günther, Dannlowski, Kersting, and Suslow (2015) reported that in a sample of depressive patients facilitated attention towards sad faces was heightened in subjects reporting ACEs . Furthermore, attentional biases towards negative stimuli were also reported in healthy subjects with ACEs [59–61].
To date, most studies examined ACEs including low maternal care, parental conflicts [62, 63], or physical or sexual transgression by caretakers [64–68]. However, there are also social experiences that involve emotional abuse and neglect by caretakers [69, 70] as well as emotional forms of abuse by peers. The latter are also referred to as relational peer victimization and are characterized by bullying, verbal threats or aggression, malicious manipulation of a relationship, friendship withdrawal, and damaging another’s peer relationships . Recently, it has been proposed that emotional types of maltreatment lead to psychological consequences that can be as severe as the outcomes of physical or sexual maltreatment [70, 72]. In particular, experiences of relational peer victimization increase the risk of various forms of psychopathology . For instance, peer victimization is linked to sub-clinical as well as clinical social anxiety disorder (SAD) [71, 74–81]. Accordingly, Rosen, Milich, and Harris (2007) proposed a modified social-information-processing model in which the activation of a so-called victim schema initiates hypervigilance for threatening cues and an attentional bias to threatening compared to non-threatening cues in social interactions . In line with this assumption, children who reported more frequent experiences of victimization responded more quickly to victim-related words in an Emotional Stroop task . To our knowledge, however, there are no studies examining the extent to which experiences of relational peer victimization contribute to the implementation of attentional biases in adults with and without psychiatric disorders.
The aim of the present study was to address inconsistencies in the existing literature about attentional biases in clinical samples. Here, a large body of studies presenting an attentional bias towards negative stimuli [16, 30, 46] conflicts with recurrent reports of either converse or null effects [27, 33, 34, 40, 43]. Recent studies reporting effects of ACEs on attentional processes in clinical as well as healthy samples suggest that negative life experiences may serve as a moderator of the magnitude of attentional biases [56, 58–60]. Here, given its effect on a wide range of psychopathology, the contribution of peer victimization to the development of attentional biases seems to be underrepresented in the literature.
The current study sought to address this underrepresentation by examining the influence of peer victimization on attentional biases as measured by the Emotional Stroop task and the dot-probe task in two samples consisting of subjects with either a diagnosed psychiatric disorder or healthy controls. With respect to the existing literature, we hypothesized that subjects with a diagnosed psychiatric disorder would show an attentional bias towards negative compared to neutral adjectives. Furthermore, we assumed that the attentional bias would be more pronounced in subjects with a history of peer victimization irrespective of their current diagnostic status. When comparing positive to neutral adjectives, we did not expect to find any attentional biases.
Due to the study’s aims, recruitment of participants was two-pronged. The clinical sample was recruited through the Hans-Peter-Kitzig-Institut (Gütersloh, Germany), a regional rehabilitation hospital for patients with psychiatric disorders. The healthy control sample was recruited through online advertisements in student newsgroups and bulletins at the campus of Bielefeld University. Advertisements informed that the study examined the association of personality traits, life experiences, and attentional processes.
The total sample consisted of 61 participants, (26 females, 42.6%). Out of the whole sample, 30 individuals (49.2%) represented the clinical sample. Exclusion criteria for the clinical sample included (a) evidence of a current substance abuse or dependence, (b) evidence of current active-phase symptoms of psychosis as delusions, and hallucinations, and (c) evidence of acute suicide intention or ideation. Number and types of diagnoses of the clinical sample are presented in Table 1. For the healthy control group, 32 individuals were screened for participation initially. One individual was excluded because criteria for a current mental disorder were fulfilled. Accordingly, the 31 individuals (50,8%) comprising the control sample reported no current mental or neurological disorders, no current use of prescriptive medication except oral contraceptives, and no current alcohol or drug dependence. Out of the control sample, 30 individuals were students at university and one reported to be working full time. Eligible participants of both groups read and signed an informed consent form that was approved by the Ethics Committee of Bielefeld University. Participants of the healthy control sample either received course credit or a compensation for their time of 6€/hour. The demographic characteristics of the two groups and diagnoses of the clinical sample are presented in Table 1.
Information about the diagnostic status (i.e., number and type of diagnoses) of the clinical sample was obtained from the participants’ health records of the Hans-Peter-Kitzig Institut. Diagnostic status of the control sample was assessed using the German Version of the Mini International Neuropsychiatric Interview (M.I.N.I.) [83–85]. The M.I.N.I. is a structured clinical interview designed to generate diagnoses for the main Diagnostic and Statistical Manual-III-R/IV Axis I disorders. The interviews were conducted by Master-level clinical psychologists who were trained in the application of the M.I.N.I.. Participants in the control sample were eligible for the study when no current or lifetime diagnosis was present.
The stimulus set consisted of 180 adjectives (negative, neutral, positive) and was derived from prior studies on word processing [86–88]. In these studies, adjectives had been rated in terms of valence and arousal in an interpersonal evaluative context. Because peer victimization most commonly implies negative evaluations by others (overt as well as implicit), it was suggested that adjectives with a social evaluation connotation would be of special interest and suitable to detect attentional biases in the context of peer victimization. Out of these 180, 60 adjectives (the 20 most negative, the 20 most neutral, and the 20 most positive) were selected for the Emotional Stroop task and 80 adjectives (the 20 most negative, the 40 most neutral, and the 20 most positive) were selected for the dot-probe task (see Table 2). The selected adjectives were matched in their linguistic properties, such as word length and frequency within each task (see Table 3). Negative and positive adjectives differed in their valence only. With respect to previous experiences with the stimulus set, neutral adjectives were allowed to be less arousing [86–88].
The Emotional Stroop task consisted of 240 trials. In total, 80 negative, 80 neutral, and 80 positive words were shown, in each case 20 words were colored in red, 20 in blue, 20 in green, and 20 were colored in yellow on a black background. Each single word was presented four times. Stimuli were shown throughout until the participants responded. After an intertrial interval of 200 ms the next stimulus was presented. Participants’ task was to identify the color of the presented words as quickly and as accurately as possible. Participants indicated their response by pressing buttons on a keyboard with the index and middle fingers of both hands. In order to reassure that the participants were able to assign the colors to the right buttons, the assignment of buttons and colors was presented on the screen throughout the experiment. The assignment of buttons was counterbalanced across participants. The order of words, word valences, and colors was randomised. We used the software package Inquisit 4.0.3 (Millisecond Software, Seattle, WA, USA) to deliver stimuli and record responses and reaction times (RTs).
The dot-probe task consisted of two blocks of 240 trials each, with a short break between the blocks. There were three different types of trials in the present task: negative–neutral, positive-neutral, and neutral-neutral, with negative and neutral, neutral and neutral, and positive and neutral words combined, respectively. All words were presented in black on a white background, lowercase. The word pairs were presented with one word beside the other (horizontal) in the middle of the screen. The dot-probe experiment began with 12 practice trials using neutral–neutral word pairs to familiarize participants with the task. Each trial started with a black fixation cross presented in the center of a white screen for 500 ms. Then, a word pair appeared with one word beside the other for 500 ms. A gray dot emerged in one of the word locations immediately after the offset of the words. The location of the target word (left or right) and probe (left or right) was randomized for all trials. The inter-trial interval for all trials was 500 ms. Participants were instructed to respond as quickly and as accurately as possible and to indicate the location of the gray dot (left or right) by pressing either the button “E” (left) or “I” (right) on a keyboard with their index fingers of both hands. The three types of word pairs were randomly formed. Each word was presented six times (3 times on each side) for a total of 480 experimental trials. The combination and order of word pairs varied randomly for each participant. We used the software package Inquisit 4.0.3 (Millisecond Software, Seattle, WA, USA) to deliver stimuli and record responses and reaction times (RTs).
Prior to the laboratory session, participants were asked to fill in a questionnaire assessing relational peer victimization (Fragebogen zu belastenden Sozialerfahrungen, FBS [Adverse Social Experiences Questionnaire]) . The FBS consists of 22 items describing aversive social situations like rejection, exclusion, being laughed at, insulted, and teased by peers (e.g., “I was excluded from games or activities by other children or adolescents”, “I have been laughed at in the presence of other children”). For each situation, respondents were asked whether or not they have experienced this situation during childhood (age 6 to 12) or adolescence (age 13 to 18). The total score is calculated as a sum of “Yes” responses across both age periods and ranges from 0 to 44. The total-score of the FBS presented with a satisfying stability over a 20-month period (r = .89) . Construct validity has been confirmed through correlations with measures of psychological symptom distress and social anxiety. Moderate correlations with the scales of the Childhood Trauma Questionnaire , as well as an incremental contribution to the prediction of psychopathology, support the idea that the FBS assesses an additional construct of child maltreatment [74, 89]. The FBS was applied in several studies examining the role of peer victimization in terms of psychopathology and psychophysiology before suggesting a good fitness of the instrument (e.g., [74, 81, 91–93]). Additionally, participants were asked to complete an assessment battery including a socio-demographic questionnaire as well as well-established questionnaires for child maltreatment (German version of the Childhood Trauma Questionnaire, CTQ) [90, 94], symptoms of depression (German version of the Beck Depression Inventory II, BDI-II) [95, 96], general psychopathology and psychological distress (German version of the Brief Symptom Inventory, BSI) [97–99], and trait anxiety (German version of the State Trait Anxiety Inventory-Trait) [100, 101]. In the current sample, we obtained good to excellent internal consistency on all scales (see Table 1). Once completed, participants of the control sample were administered the M.I.N.I. to determine diagnostic status. Afterwards, the Emotional Stroop task and the dot-probe task were used to detect any attentional biases in participants. The presentation order of tasks was counterbalanced across participants. Instructions for the tasks were presented on the computer screen for the participants to read. After completion of the tasks, participants were debriefed.
In the Emotional Stroop task an attentional bias is indicated by greater color-naming latencies following negative/positive words in comparison with neutral words . Therefore, difference scores for the reaction times (RT) in color-naming negative and neutral as well as positive and neutral words were calculated (Emotional Stroop Index = RT negative/positive words – RT neutral words). Positive scores indicate a greater attentional bias in the processing of negative and positive words. Consistent with procedures of prior studies, trials with reaction times lower than 300 ms or higher than 4000 ms were excluded from analyses [39, 102]. In addition, trials where participants indicated the wrong color (error trials) were excluded. Error rates did not differ between the two samples. Out of 240 trials, participants indicated between 0 and 17 wrong colors (clinical sample: M = 5.65, SD = 4.17; control sample: M = 6.29, SD = 4.26; t (57) = .58, p = .562). No participants were excluded due to higher error rates than 25%. Outliers were defined as participants presenting reaction times that deviated more than three SDs from mean reaction times and were removed from analyses. Outliers were present in both the clinical (n = 1) and the control sample (n = 1).
For the dot-probe task, attentional bias scores were calculated for two different trial types (i.e., negative-neutral and positive-neutral). Here, an attentional bias is indicated by either lower RTs to the probe if it emerges at the location where the participants were focusing their attention, or higher RTs to the probe when it appears in the location where the participants were not attending . Particularly, the attentional bias scores are calculated by subtracting participants’ RTs to the probe when it appears in the same position as the target word from participants’ RTs to the probe when it does not appear in the same position as the target word [103, 104]. In the present study, the target words were the negative words in the negative–neutral trials, and the positive words in the positive–neutral trials. According to previous research [103, 104], significant positive bias scores indicate that participants were focusing their attention on the area around the target words when the probe occured, whereas significant negative bias scores indicate that participants were not attending to the area around the target words when the probe occurred.
To better understand the mechanisms underlying the attentional bias, additional index scores were calculated to differentiate vigilance and difficulty to disengage . Vigilance should lead to faster responses on trials where the probe appeared where participants were attending compared to neutral trials. This would indicate that participants preferentially hold their attention at the target location. Specifically, the Orienting Index scores are calculated by subtracting participants’ RTs to the probe when it occurs in the same position as the target word from participants’ RTs to the probe when two neutral words were presented . Should participants have difficulties in disengaging attention from valenced words, this would result in slower reaction times on trials where the probe appeared in a location they were not attending to due to the time needed to shift attention from the valenced to the neutral location. Specifically, the Disengaging Index scores are calculated by subtracting participants’ RTs to the probe when two neutral words were presented from participants’ RTs to the probe when it does not occur in the same position as the target word . All bias and index scores must differ significantly from zero to confirm that an absolute attentional bias exists. In addition, a relative bias is indicated by significantly differing bias/index scores between two groups.
In line with previous studies, trials with reaction times lower than 150 ms or higher than 2000 ms were excluded from analyses [9, 105, 106]. In addition, trials where participants indicated the wrong location of the probe (error trials) were excluded. Error rates did not differ between the two samples. Out of 480 trials, participants indicated between 0 and 38 wrong locations (clinical sample: M = 10.52, SD = 10.12; control sample: M = 8.13, SD = 5.71; t (56) = 1.11, p = .273). No participants were excluded due to higher error rates than 25%. Outliers were defined as participants presenting reaction times that deviated more than three SDs from mean reaction times and were removed from analyses. Outliers were present for the clinical (n = 1) and the control sample (n = 2). Accordingly, the remaining sample for the analyses of the Emotional Stroop task consisted of 59 participants (30 clincial sample participants, 50.8%) and for the analyses of the dot-probe task of 58 participants (29 clinical sample participants, 50.0%).
All statistical analyses were carried out using the Statistical Package for the Social Sciences 25. Because age differed significantly between the two samples, all ANOVAs were carried out with age serving as a covariate. Initially, an omnibus 2 (group: clinical vs. control sample) × 2 (peer victimization: high vs. low) × 3 (valence: negative, neutral, positive) analysis of covariance (ANCOVA) with repeated measures on valence and age serving as a covariate was calculated for the mean RTs of the Emotional Stroop task. Similarly, an omnibus 2 (group: clinical vs. control sample) × 2 (peer victimization: high vs. low) × 2 (valence: negative vs. positive) × 2 (location of the dot: congruent vs. incongruent) analysis of covariance (ANCOVA) with repeated measures on valence and age serving as a covariate was calculated for the mean RTs of the dot-probe task. Afterwards, several 2 (group: clinical vs. control sample) × 2 (peer victimization: high vs. low) analyses of covariance (ANCOVAs) were conducted to examine the different hypothesized attentional biases dependent on the extent of diagnostic status and peer victimization. To date, the FBS lacks a representative norm sample and validated cutoff scores for peer victimization. In line with previous studies [81, 91, 92], therefore, a median-split of the FBS was used to categorize the samples into high vs low peer victimized participants. To be included in the high peer victimization group, participants had to score higher than the median (FBS total > 11; n = 28) on the FBS . Participants scoring lower than that were assigned to the low peer victimization group (n = 33). Next, for explorative reasons the existence of absolute attentional biases was examined by applying planned t-tests for each attentional bias index score. Specifically, the bias and index scores for all four combinations of group (clinical vs. control) and peer victimization (high vs. low) were compared to zero. Additionally, because the clinical sample and the healthy control sample differed significantly on some subscales of the CTQ, all ANOVAs were carried out as analyses of covariance (ANCOVAs) with age and the CTQ sum score serving as covariates to control for the influence of childhood maltreatment within the family. As the pattern of results did not change, only ANCOVAs with age serving as the covariate are reported. For the ANCOVAs, partial eta-squared (η2) values were reported to demonstrate the size of effects such that 0.01 represents a small effect, 0.06 a medium effect, and 0.14 a large effect .
The average age of the total sample was M = 24.59 years (SD = 4.97). However, mean age differed significantly between the two samples (clinical sample: M = 26.20 years, SD = 6.12; control sample: M = 23.03 years, SD = 2.83; t (59) = 2.61; p = .012). Participants’ means on the assessments and diagnoses are presented in Table 1.
The initial repeated measures ANCOVA showed a significant interaction effect of Valence x Peer victimization, F (2, 104) = 3.30; p = .041; η2 = .060. Further main or interaction effects did not reach significance (all p’s > .05; see Table 4). Mean RTs and standard deviations are presented in Table 5. In a next step, the hypotheses that individuals diagnosed with a psychiatric disorder as well as peer victimized individuals show an attentional bias towards negative compared to neutral adjectives were tested. Additionally, the influence of diagnostic status and peer victimization on the processing of positive compared to neutral adjectives was analyzed.
For negative-neutral trials, the age-corrected ANOVA revealed a marginally significant main effect of peer victimization, F (1, 54) = 3.90; p = .053; η2 = .067 (see Fig. 1). The main effect of group was not significant, F (1, 54) = .11; p = .747; η2 = .002. The interaction effect of Group x Peer victimization did also not show significant differences, F (1, 54) = .19; p = .662; η2 = .004.
For positive-neutral trials, the age-corrected ANOVA showed a significant main effect of peer victimization, F (1, 52) = 4.57; p = .037; η2 = .081. There was no main effect of group, F (1, 52) = .06; p = .803; η2 = .001. Similarly, the interaction of Group x Peer victimization did not reach significance, F (1, 52) = .37; p = .548; η2 = .007. Additionally, the Emotional Stroop Index score for the positive-neutral trials showed a significant difference from zero in healthy controls without a history of peer victimization, t (22) = − 2.56; p = .018. In the explorative analyses, all other Emotional Stroop index scores did not differ significantly from zero (all p’s > .05).
Initially, in the omnibus repeated measures ANCOVA significant main effects of valence and group were found (valence: F (1, 53) = 5.89; p = .019; η2 = .100; group: F (1, 53) = 16.21; p < .001; η2 = .234). Additionally, the interaction effects of Location x Group, F (1, 53) = 4.77; p = .033; η2 = .083, and Location x Peer victimization, F (1, 53) = 6.20; p = .016; η2 = .105, reached significance. Further significant main or interaction effects were not found (all p’s > .05; see Table 6). Mean RTs and standard deviations are presented in Table 7. Next, the hypotheses that individuals diagnosed with a psychiatric disorder as well as individuals reporting high levels of peer victimization show attentional biases towards negative compared to neutral adjectives were examined for the three attentional bias indeces of the dot-probe task. Similarly, attentional biases in positive versus neutral trials were explored.
The ANOVA with age serving as a covariate revealed a significant main effect for peer victimization, F (1, 53) = 6.27; p = .015; η2 = .106, for the general attentional bias score when comparing negative to neutral words (see Fig. 2). Here, the main effect of group, F (1, 53) = 2.46; p = .123; η2 = .044, and the interaction effect of Group x Peer victimization, F (1, 53) = .83; p = .367; η2 = .015, were not found to be significant. The age-corrected ANOVA for the attentional bias score for positive compared to neutral words did not show any significant effects (all p’s > .05; see Table 6). Similarly, no absolute attentional bias scores differed significantly from zero in the explorative analyses (all p’s > .05) indicating that only relative attentional biases were present.
For the orienting index score comparing negative to neutral words, the age-corrected ANOVA did not reveal any significant effects (all p’s > .05; see Table 6). For the orienting index score examining positive and neutral words, the ANOVA showed similar results. Here, no significant effects were found (all p’s > .05; see Table 6). Again, there were no significant absolute bias scores in the explorative analyses (all p’s > .05).
The ANOVAs with age serving as the covariate for the analyses of the effects of peer victimization and group on the difficulty to disengage from negative or positive words showed no significant effects (all p’s > .05; see Table 6). However, the main effect of peer victimization indicated a tendency towards significance when comparing negative to neutral words, F (1, 53) = 3.20; p = .080; η2 = .057. In the explorative analyses, the analyses of absolute bias scores showed no significant effects (all p’s > .05).
In the current study two tasks measuring attentional biases were administered. Both tasks showed that attentional processes were linked to a higher degree to the experience of peer victimization in childhood and adolescence than to the current diagnostic status of the participants. As a function of earlier peer victimization, participants’ responses to negative as well as positive words compared to neutral words shifted from faster to delayed reactions. While individuals reporting low levels of peer victimization were faster in the color-naming of emotionally valenced compared to neutral words, color-naming of negative and positive words was interfered (i.e., slower) in highly peer victimized participants. With respect to the results of the dot-probe task, peer victimized participants’ responding can be interpreted as attentional avoidance of emotional stimuli. Reported effect sizes of the significant effects were medium.
In accordance with studies indicating attentional biases in subjects with ACEs [56–61] and our hypotheses, peer victimized subjects showed delayed responses to color-naming negative compared to neutral adjectives in the Emotional Stroop task. However, in contrast to studies that reported facilitated attention towards [58, 60, 61] or difficulties to disengage from threatening stimuli in maltreated subjects , the dot-probe task utilized in the present study revealed that participants with a history of peer victimization avoided negative adjectives rather than detecting them faster or allocating their attention towards negative words. This is in accordance with findings of threat avoidance in maltreated children with PTSD . Furthermore, Fani and colleagues (2011) reported that childhood maltreatment predicts attention bias scores beyond the effects of traumatic experiences in adulthood in a sample of PTSD patients . Here, victims of childhood abuse showed an attentional bias towards happy relative to neutral faces, and reported to have experienced more PTSD avoidance and numbing symptoms. Since the attentional bias was not linked to other PTSD symptomatology, the authors concluded that the attentional bias may reflect avoidant tendencies rather than hyperattention to positive cues in this study . As an explanation, it was suggested that maltreated subjects may have learned to selectively allocate their attention away from potential stressors as a means of coping with constant adversity. With respect to recent studies linking attentional avoidance to emotional regulation strategies [1, 31, 109–111], our results indicate that maltreated subjects may attempt to strategically regulate negative affect via distraction which may be due to an inavailability of other cognitive coping resources [2, 4, 112].
It may be speculated that for subjects encountering situations of peer abuse there are initially no active coping or behavioral resources based on a fight or flight stress response which would be associated with facilitated attention towards threat. Instead, subjects experiencing peer victimization may undergo a down-regulation of behavioral and attentional processes which are reflected by avoidance of threatening stimuli. This reasoning is supported by the fact that peer victimization is associated with blunted responses to stress [63–66, 68, 113–118]. Accordingly, attentional avoidance was linked to prefrontal cortex functioning which is also involved in the processing of social stress [1, 119–121]. Here, several studies showed an activation of prefrontal cortex areas, in particular the dorsal anterior cingulated cortex and the right ventrolateral prefrontal cortex [119–130], when subjects were socially excluded, which is a part of the wide range of experiences of peer victimization. Similarly, it has been suggested that attentional avoidance is related to strategic cognitive-regulatory processes that are also linked with higher-order cortical structures like the prefrontal cortex . Hence, it may be assumed that negative words used in the present study were able to elicit a connotation to social stress experiences in peer victimized subjects. As a consequence, cognitive emotion regulation processes in higher-order cortical structures may have led to attentional avoidance of negative versus neutral words in subjects with a history of peer victimization. In accordance with this assumption, a recent study indicated higher neural activity in brain regions that are involved in social cognition and cognitive control in chronically victimized girls . Effect sizes in our sample that was not explicitly recruited with respect to high amounts of peer victimization experiences were already found to be medium. It is likely that attentional biases may even be larger in samples consisting of individuals that were screened for chronical victimization.
However, since the pattern of results did not differ between negative and positive adjectives, the present study indicated a general emotion-avoidant, rather than threat-avoidant, attentional style in subjects with a history of peer victimization. This finding is in accordance with other reports of attentional biases in reaction to different emotional stimuli [132–134] as well as with generalized hyper-sensitive and hyper-vigilant reactions towards emotional stimuli in matreated individuals [116, 135–137]. Albeit, some of the referenced studies deal with methodological shortcomings (e.g., balancing of word frequency ) which should be addressed in future studies.
Recently, Rudolph, Troop-Gordon, and Granger (2010) reported that anticipatory cortisol and salivary alpha amylase activation was increased in victimized children who were informed that they would be interacting with unfamiliar peers . It was suggested that enhanced physiological activation in victimized subjects reflects a hyper-alertness to social threat . Accordingly, the present result patterns in subjects with a history of peer victimization may also illustrate a hyper-alertness or hyper-vigilance to social threat. That is, based on negative social experiences victimized subjects may be more likely to anticipate social threat and negative consequences for their well-being even when confronted with positive stimuli. In a next step, this anticipation of social threat and its consequences may lead to hyper-sensitive emotion regulation processes so that attentional avoidance reactions are generalized from negative to all kinds of emotional stimuli. In agreement with this, children who reported adverse experiences have been found to be more likely to show vigilance and cognitive sensitivity to social threat [138–140]. Moreover, this hyper-alterness may represent the link between peer victimization and the development of psychopathology documented in several studies [71, 73–75, 79, 81].
Contrasting with a wealth of research [2, 16, 27, 29, 42] and our hypotheses, the present study did not find a significant influence of psychopathology or the clinical diagnostic status on attentional biases. However, on a descriptive level, subjects of the clinical sample, overall, showed a facilitated attentional orienting towards negative words. Interestingly, in dependence of experiences of peer victimization, the quality of the attentional bias, rather than quantity, depicted in the present study changes. While subjects scoring low in peer victimization showed an allocation of attention towards negative stimuli, attentional allocation shifted into avoidance of threatening stimuli in highly victimized subjects. Hence, it may be concluded that attentional biases are linked to psychopathology, but the quality (i.e., the allocation of attention) of these biases is determined by further factors as early life experiences (i.e., peer victimization).
Addressing the fact that diagnoses in the present study were rather heterogeneous and therefore may be accompanied by a varying magnitude and direction of biases, this conclusion also refers to the finding that peer victimization influenced attentional processes even beyond the effects of trait anxiety. However, most studies indicating attentional biases in psychiatric disorders, and particularly anxiety disorders, used stimuli that were either threat-, fear- or disorder-related [2, 16, 49]. The present study, however, did not use stimuli that were related to a certain disorder or subject of fear, but negative, neutral, and positive adjectives that may have provided a social evaluation connotation. It may be speculated that the present stimuli may rather be related to experiences of peer victimization than to psychopathology. Hence, the null effects found for the influence of psychopathology on attentional biases may be due to the utilized stimuli set. Accordingly, adjectives that reflect depressive or anxious cognitions and experiences (e.g., sad, afraid, nervous, worried) may rather have been suitable to elicit attentional biases in the clinical sample. Consequently, future studies should use a set of stimuli that includes both peer victimization related social evaluative adjectives as well as disorder- or fear-related adjectives to disentangle different effects of victimization and psychopathology on the processing of emotional words.
Moreover, the present study has several additional limitations. The assessment of peer victimization was based on self-report and retrospective accounts and may be subjected to recall biases . Analyses of the validity of retrospective reports, however, suggest that these biases are not large enough to invalidate retrospective studies . In addition, under-reporting of child maltreatment was more prevalent than over-reporting in retrospective assessments. Moreover, the set of stimuli that was used in the present study may not have been arousing or threatening enough to generate attentional biases. According to Mogg and Bradley (1998), different attention to threat in subjects with varying levels of trait anxiety depends on the valence of stimuli . Here, the use of pictures rather than words may have been useful to elicit higher levels of arousal and potentially more elevated attentional biases . Furthermore, stimuli were not masked in their presentation. Therefore, underlying mechanisms and stage of processing (automatic versus strategic) could not be examined systematically. The generalizability of our findings is limited. Affective disorders comprised about 60% of the psychiatric patients sample while anxiety disorders were rather under-represented. This may also be reflected by the trait anxiety scores which did not differ from the control group. With respect to the literature on attentional biases in anxiety disorders , it may be assumed that a higher amount of patients with anxiety disorders may have resulted in greater attentional biases in the psychiatric sample. Accordingly, considering the diagnostic status as a single, categorical variable may limit the validity of the current study as it may conceal differences in attention processes in various psychiatric disorders. Future studies should address this shortcoming by recruiting psychiatric samples comprising sufficiently largh enough sub-samples of different psychiatric disorders to account for disorder-related differences in emotion processing. Additionally, the current study is limited by the small sample size and sample composition. With a total of 61 participants, the analyses may have been underpowered to reveal potential effects. Next, the clinical sample and the healthy control sample differed in age which had to be controlled for in the analyses again weakening the power of analyses. Moreover, the sample was relatively young, with subjects who are predominantly single. Limitations in sample size and composition should be addressed in future studies using larger and more representative samples. Additionally, the present study is limited by the fact that information about the diagnostic status (i.e., number and type of diagnoses) of the clinical sample was obtained from the subjects’ health records and no clinical interviews were carried out in this sample. Therefore, reliability and validity of clinical diagnoses may be limited. Future studies should address this point by carrying out clinical interviews in all subjects.
Recently, a growing body of literature has emphasized the role of peer victimization as a major public health concern. In school children, reports of repeated victimizations range from 10 to 20%, with periodic adversities being indicated even more frequently [138, 144, 145]. This prevalence rates of victimization become even more alarming with respect to reports indicating that the outcomes of emotional maltreatment are as harmful as the consequences of sexual and/or physical maltreatment [70, 72]. However, knowledge about the mechanisms linking peer victimization and psychopathology remains elusive. Here, the effects of ACEs on emotion processing styles may play a crucial role [57, 146]. With respect to the results of the present study, peer victimization in and of itself is associated with biases in emotion processing. Hence, biased emotional processing styles may be a mechanism that link peer victimization to a wide range of latter psychopathology. In this conceptualization, it may be assumed that individuals experiencing peer victimization in their childhood and adolescence are more likely to develop an avoidant attentional and emotional processing style. If this attentional bias persists during development, it may enhance an inappropriate processing of relevant environmental emotional information. As a consequence, peer victimized subjects may be more vulnerable to the development of psychopathology [71, 73–81]. This effect may be even bigger if individuals have experienced multiple adverse events [57, 146]. Hence, a better understanding of the specific characteristics in the processing of emotional and neutral stimuli in the wake of peer victimisation could help to address short and long term consequences for victims. For instance, treatment of peer victimization related psychiatric disorders may implement cognitive modules targeting attention. Accordingly, attentional bias modification has been proposed to be the first of a two-step treatment approach for people at risk for developing psychiatric disorders . Here, victims of peer victimization would run an attentional bias modification training first before traditional cognitive behavioral therapy is offered. However, future studies on the efficacy of attentional bias modification in peer victimized individuals and its consequences on psychopathology and other negative outcomes are needed. Lastly, the current study provided evidence that experiences of childhood emotional maltreatment are associated with attentional biases to emotionally stimuli in adulthood. Therefore, the implementation of measures of childhood maltreatment in future studies on attentional biases in clinical as well as healthy samples is strongly suggested.
We would like to thank the Hans-Peter-Kitzig-Institut (Gütersloh, Germany) for the co-operation in this project and enabling the recruitment of the sample of psychiatric patients.
BI participated in the conception and design of the study, collected data, performed the statistical analyses and interpretation of findings, and drafted the manuscript. AW participated in data collection, performed the statistical analyses and interpretation of findings, and helped to draft the manuscript. NW participated in the conception and design of the study, collected data, performed the statistical analyses and interpretation of findings, and helped to draft the manuscript. FN participated in the conception and design of the study, made substantial contributions to the statistical analyses and interpretation of findings, helped to draft and revised the manuscript. All authors read and approved the final manuscript.
The study was performed in accordance with the declaration of Helsinki and approved by the Ethics Committee of Bielefeld University. All participants signed an informed consent form.
|
0.997073 |
Would you recommend Rockies to others?
Why stay in a hotel when you can stay at The Rockies Condominiums? The Rockies, at the base of the Steamboat Ski Area, has a reputation in Steamboat not only as a familiar landmark for family vacations, but as the best lodging value in all the Yampa Valley. Featuring various floor plans, The Rockies offers a unit style to suit your needs. Travelers love the self-catering apartments with fully-equipped kitchen plus all the linens and towels that make them feel right at home without being in a cramped hotel room. The Rockies Condominiums are within walking distance to the Ski Time Square, the indoor Tennis Center, and Strings in the Mountains Tent in the Summer.
|
0.999667 |
Can rare lymphocytes combat rheumatoid arthritis?
Immunologists at Friedrich-Alexander-Universität Erlangen-Nürnberg have demonstrated that ILC2, a group of rare lymphoid cells, play a key role in the development of inflammatory arthritis. ILCs have several functional similarities to T-cells and are important agents of our congenital immune system. The FAU researchers' findings could form the basis for new approaches for treating rheumatoid arthritis. The findings have now been published in the renowned journal Cell Reports.
Rheumatoid arthritis is the most common form of inflammatory joint conditions. In contrast to osteoarthritis, where patients' joints degenerate, the symptoms of arthritis such as overheating, swelling and redness, occur in flare-ups and are frequently caused by disturbances in the immune system. The disease mainly affects the fingers and toes, but also knees, shoulders and hip joints. Around one percent of the population suffer from the condition and women are three times more likely to suffer from it than men. Treatment usually focuses on easing pain and slowing down the progression of the disease as there is no cure for rheumatoid arthritis.
Immunologists at FAU have now proven that ILC2, a rare form of lymphocyte, plays a key role in the development of rheumatoid arthritis. Although ILCs, so-called 'innate lymphoid cells', do not have the T cell and B cell receptors nor cell type markers that are otherwise typical for lymphocytes, they are pivotal in defending the human body from pathogens. They are often the 'first aiders' who alarm the immune system before the actual immunisation begins. 'From earlier research, we know that ILC2 can initiate the suppression of chronic inflammation by producing the cell signal molecule IL-9', says project manager Dr. Mario Zaiss from the Department of Medicine 3 – Rheumatology and Immunology at Universitätsklinikum Erlangen. 'In our current study, we specifically examined the role of ILC2s in the early stage of rheumatoid arthritis'.
Further research is set to find safe methods of increasing the number of ILC2 in the body in a targeted manner. Researchers must also find new and reliable methods of detecting signs of arthritis before the onset of the disease as this is the only time when these rare lymphocytes can be used as a treatment.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.