proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.914271 |
London housing: is creating "mixed communities" such a great idea?
The evidence supporting a wide consensus about helping the poor through housing and regeneration policy is not particularly strong.
Everyone wants "mixed communities." The breadth and depth of the consensus in London (and elsewhere) is amazing. Labour councils want them, Conservative councils want them. Shelter supports them. Boris Johnson has pledged to "work to deliver them," and his new London Plan and revised housing strategy both refer to promoting them. The desirability of using planning and housing policy to bring about "mixed and balanced" neighbourhoods is rarely disputed. But why, exactly, does everybody think they're such a good idea? And are they right?
The core conviction is that living in a "mixed community" is better for poor and disadvantaged people than living in a poor and disadvantaged one, and that tailoring policy accordingly interrupts patterns of social segregation. This belief informs the prioritising of ex-service personnel and people who have jobs for social housing allocation, the logic being that doing so dilutes prevailing cultures of dependency and antisocial conduct. It also provides a moral rationale for regeneration schemes that entail rebuilding social housing-dominated estates to introduce other tenure types that better-off people can afford or just knocking them down and starting again. The same thinking underpins the view that new housing developments should have a diversity of market and "affordable" homes within them.
There is substantial evidence that areas with more mixed social composition tend to be more popular, more satisfying to live in, and have better services than poorer areas. This provides a rationale for continued intervention in low income neighbourhoods on the grounds of social justice.
To date the evidence is limited that neighbourhood has a large effect on individual outcomes, over and above individual and household factors. Nor is there robust evidence that neighbourhood mix per se or changes to mix (over and above other neighbourhood characteristics) is influential.
There is limited evidence that the new resources that may come with higher income residents (e.g. shops) either materialise or are beneficial to people on low incomes.
There is a strong argument in favour of greater social equality but unless there is evidence that the characteristics of the neighbourhoods in which people live make their life chances worse, independently of what makes them poor in the first place, the case for forcing neighbourhood mixing is at best a distraction or, at worst, plain wrong.
Cheshire points to findings that low income people can benefit from living in low cost areas because the shops are cheaper, the amenities may be better tailored to their requirements and the local job market, notably its informal mechanisms, can work better for them.
If there had to be a crude choice between traditional urban and neighbourhood renewal and mixed communities policies to address the top quarter most deprived local authorities...or even the most deprived 10% or 5% of wards, the evidence suggests the former offer more limited but better-evidenced benefits at lower costs, and are also more achievable during a recession.
It seems there might be better ways to spend money helping poor neighbourhoods in London and other cities than moving people who are less poor into them or moving poor people closer to more affluent ones.
This doesn't destroy the case for doing so in the right way to some degree, or for ensuring that new housing developments contain homes that the least wealthy can afford. Neither does it justify arguments that the poor have no "right" to live in expensive parts of London.
But it does challenge that comfortable consensus about "mixed communities" being the best possible answer to urban social injustice and division. Those who justify knocking down estates where lots of poor people live by saying it will do them good should take note.
|
0.950138 |
The rogue's class skills are Acrobatics (Dex), Appraise (Int), Bluff (Cha), Climb (Str), Craft (Int), Diplomacy (Cha), Disable Device (Dex), Disguise (Cha), Escape Artist (Dex), Interrogate (Cha), Intimidate (Cha), Knowledge (Dungeoneering) (Int), Knowledge (Local) (Int), Linguistics (Int), Perception (Wis), Perform (Cha), Profession (Wis), Sense Motive (Wis), Sleight of Hand (Dex), Stealth (Dex), Swim (Str), and Use Magic Device (Cha).
The following are class features of the rogue.
Uncanny Dodge (Ex): Starting at 4th level, a rogue can react to danger before her senses would normally allow her to do so. She cannot be caught flat-footed, nor does she lose her Dex bonus to AC if the attacker is invisible. She still loses her Dexterity bonus to AC if immobilized. A rogue with this ability can still lose her Dexterity bonus to AC if an opponent successfully uses the feint action (see Combat) against her.
|
0.969947 |
How pedal power could ease Parkinson's: Cycling can improve connections in brain regions linked to the disease Scientists say exercising on a bike is an 'effective, low-cost therapy' for the diseaseUS neuroscientist Jay Alberts started research after noticing positive impact it had on partner who suffers from diseaseScans revealed pedalling boosted connections between brain regions linked to movement | UPDATED: 08:39 GMT, 26 November 2012 Cycling could help ease the symptoms of Parkinson’s disease, scientists believe.
Real lives: We all need some buddy to lean on When you’re going through a life-changing experience, it helps to have someone who knows exactly how you’re feeling.
She's my little hero: Black and white cat saves diabetic owner by alerting sleeping husband after she collapses By Daily Mail PUBLISHED: 16:15 GMT, 13 July 2012 | UPDATED: 16:36 GMT, 13 July 2012 A cat called Charley could scoop a national award after saving the life of her diabetic owner.
Don't dine with your greedy friend say experts, you're likely to eat just as much as they are Mirror eating: Recent research has shown that women in particular copy the eating habits of their companions (Posed by models) If you're struggling to lose weight, here’s one thing you can cut out.
|
0.99998 |
How domestication bottlenecks and artificial selection shaped the amount and distribution of genetic variation in the genomes of modern crops is poorly understood. We analyzed diversity at 462 simple sequence repeats (SSRs) or microsatellites spread throughout the maize genome and compared the diversity observed at these SSRs in maize to that observed in its wild progenitor, teosinte. The results reveal a modest genome-wide deficit of diversity in maize relative to teosinte. The relative deficit of diversity is less for SSRs with dinucleotide repeat motifs than for SSRs with repeat motifs of more than two nucleotides, suggesting that the former with their higher mutation rate have partially recovered from the domestication bottleneck. We analyzed the relationship between SSR diversity and proximity to QTL for domestication traits and observed no relationship between these factors. However, we did observe a weak, although significant, spatial correlation for diversity statistics among SSRs within 2 cM of one another, suggesting that SSR diversity is weakly patterned across the genome. Twenty-four of 462 SSRs (5%) show some evidence of positive selection in maize under multiple tests. Overall, the pattern of genetic diversity at maize SSRs can be explained largely by a bottleneck effect with a smaller effect from selection.
BETWEEN 5000 and 10,000 years ago, humans domesticated virtually all major crop species used by modern agricultural societies (Smith 2001). This feat was accomplished through artificial selection for traits that improved agronomic qualities. As a result of this process, favorable alleles at loci controlling agronomic traits were brought to fixation in the population during the domestication period. After the initial domestication, the continued practice of selective breeding allowed additional favorable alleles to sweep through the crop species, while diversifying selection in response to the different environments encountered during the geographic expansion of the crop caused regional fixation of distinct favorable alleles. As a consequence of this complex history of selection, only a limited portion of the population contributed to each subsequent generation. Some anticipated consequences are a genome-wide loss of diversity at unselected genes because of the genetic bottleneck effect, a severe reduction in diversity at genes under directional selection during domestication, and artificially high diversity at genes under diversifying selection.
These two processes—selection targeted on agronomic genes and drift due to the domestication bottleneck affecting the entire genome—are the principal factors that influence the amount and distribution of genetic variation in crop genomes as compared to their wild progenitors. Studies on isozymes and gene sequences revealed a general reduction of genetic variation in crops as a result of the domestication bottleneck (Doebley et al. 1984; Eyre-Walker et al. 1998; Hilton and Gaut 1998); however, these exploratory studies involved relatively few loci and thus the generality of their results needs confirmation. Our knowledge of the impact of selection on diversity in crops is more restricted since very few agronomic genes have been identified and characterized for their level of genetic diversity (Wang et al. 1999; Whitt et al. 2002; Tenaillon et al. 2004). Thus, our present picture of how drift and selection have sculpted the diversity landscape of crop genomes is fragmentary.
To begin to better define genetic diversity in the maize (Zea mays ssp. mays) genome and to identify the forces that have shaped it, we have constructed a diversity map of the maize genome using microsatellites or simple sequence repeats (SSRs). We scanned the genomes of maize and its close wild relatives, annual teosinte (Z. mays ssp. huehuetenangensis, ssp. mexicana, and ssp. parviglumis), using 462 SSRs. The phylogenetic relationships of these taxa are well known (Doebley 1990; Buckler and Holtsford 1996) and ssp. parviglumis has been shown to be the progenitor of maize (Wang et al. 1999; Matsuoka et al. 2002b). Because of this well-characterized phylogeny, maize and annual teosinte provide a good model for the analysis of the genetic consequences of domestication. The goals of this study are (1) to provide a general picture of genetic diversity for SSRs in maize and teosinte, (2) to determine if there is heterogeneity in diversity among genomic regions, (3) to measure the relative impact of selection vs. drift on the observed pattern of diversity, and (4) to assess the degree to which mutation has allowed SSRs to recover diversity lost from the effects of domestication.
We sampled individual maize plants from a set of 45 landraces covering the entire pre-Columbian range of maize. We also sampled 45 annual teosinte plants representing three wild taxa: Z. mays ssp. huehuetenangensis (1 plant), ssp. mexicana (23 plants) and ssp. parviglumis (21 plants). Passport data for the plants are available at www.genetics.org/supplemental (Table S1).
We used 462 SSRs, representing a variety of repeat types from dinucleotide to hexanucleotide motifs, distributed throughout the genome. These SSRs were divided in two groups, dinucleotide and “other” repeat SSRs, because the mutation rate for dinucleotide SSRs is higher than that for other SSR types (Vigouroux et al. 2002a). Detailed information on the SSRs used in this study including their genetic map position is available at www.genetics.org/supplemental (Table S2). The source of SSRs, whether from expressed sequence tags, known genes, or SSR-enriched genomic libraries, is available at www.maizgdb.org (see also Sharopova et al. 2002). SSR genotyping was done on automated sequencers at Cornell University (Ithaca, NY), Pioneer Hi-Bred International (Johnston, IA), and Celera AgGen (Davis, CA), following procedures that have been published elsewhere (Matsuoka et al. 2002b).
Gene diversity or heterozygosity (H), the number of alleles (N), and Fst between maize and teosinte were calculated using the software program Fstat (Goudet 2001). The significance of Fst was assessed by 10,000 resamplings of the genotypic data. To measure the relative deficit of gene diversity (GD) in maize vs. teosinte, we have defined a parameter ΔGD = 1 − (HM/HT), where HM and HT are genetic diversity in maize and teosinte, respectively. If HM is higher than HT, then we calculated this parameter as ΔGD = (HT/HM) − 1. The relative deficit of the number of alleles is Δallele = 1 − (NM/NT), where NM and NT are the number of alleles in maize and teosinte, respectively. If NM is higher than NT, then we calculated this parameter as Δallele = (NT/NM) − 1. These statistics vary between −1 and 1, positive when diversity is higher in teosinte and negative otherwise. The Wilcoxon signed-rank test (W), Kruskal-Wallis test (KW), and Mann-Whitney test (MW) were performed using SYSTAT (SPSS, Chicago).
The relationship between s, r, and diversity statistics (Δallele, ΔGD, or Fst) is complicated and there is no known function to describe it. Therefore, we took an ad hoc approach. Two different functions (f) were investigated: a linear monotonic decrease f(r) = 50 − r and an exponential decrease f(r) = e−λr. For the latter, we used two different values (1 and 5) for λ. The QTL effect is almost zero for λ = 1 after 10 cM and for λ = 5 after 2 cM. For each particular function, if r > 50 cM, the QTL effect was considered to be zero. Spearman correlation coefficients between QE and diversity statistics (Δallele, ΔGD, or Fst) over all SSRs were calculated. Only SSRs placed on the IBM v3 map were tested (www.maizgdb.org).
where xi and xj are the chromosomal map positions of two SSRs, Z(xi) and Z(xj) are the values of their diversity statistics, and N(h) is the number of pairs of SSRs separated by a distance h or less (Armstrong 1998). Three different values of h were investigated: 1, 2, and 5 cM.
follows a t-distribution with n − 1 d.f. There is no objective criterion for the sample size n, so we chose the five points that were the closest to the location x. Outliers were excluded at the 95% significance level.
To test if a particular value of the semivariance is significantly different from a random effect, we used permutation tests in which the diversity statistics for the SSRs were randomized with respect to chromosomal position. One thousand permuted data sets were generated and the probability of finding a value higher than the observed value for a distance class was then calculated using the distribution of the permuted data.
The Ewens-Watterson test of neutrality enables one to detect deviations from a neutral-equilibrium model as either a deficit or an excess of genetic diversity relative to the number of alleles at a locus (Ewens 1972; Watterson 1978). This test was performed using the program Arlequin (Schneider et al. 2000). The probability that an SSR fits the neutral expectation under this test was assessed using both the homozygosity test (PH) and Slatkin's (1994, 1996) exact test (PE).
The degree of differentiation between populations at a locus as measured by Fst can be used to assess whether SSRs show more differentiation than expected under a purely neutral (drift) model (Bowcock et al. 1991; Beaumont and Nichols 1996). We tested whether Fst between maize and teosinte at SSRs is greater than expected by the domestication bottleneck effect (drift) alone. To do this, Fst was conditioned on the total number of alleles in maize and teosinte to control more effectively for the variable mutation rate among maize SSRs (Vigouroux et al. 2002a). Three different mutation models were investigated (see below). We set the 95% confidence limits for this one-tailed test using coalescence simulations that incorporate genetic drift due to the domestication bottleneck (see below). We refer to this as the Fst test.
Both selection and drift during domestication are expected to reduce gene diversity in maize relative to teosinte. To ask whether SSRs have less variation in maize relative to teosinte than that expected from drift alone, we compared gene diversity in maize vs. teosinte for our observed data with the 95% confidence limits for these parameters established by simulations as a two-tailed test (see below). We refer to this as the GD test.
The Fst and GD tests ask whether divergence between maize and teosinte or gene diversity in maize relative to teosinte deviates from a neutral model that incorporates the domestication bottleneck. To establish 95% confidence limits for these tests, we performed coalescence simulations (Hudson 1990; see also Vigouroux et al. 2002b). The model for the simulations involves a crop (maize) that split at some time in the past from its progenitor (teosinte). The maize population undergoes a “bottleneck” during the domestication period and then expands rapidly to a large size while the progenitor population remains at equilibrium from the time of divergence until the present (Eyre-Walker et al. 1998; Hilton and Gaut 1998). A sample size equivalent to our experimental samples of maize and ssp. parviglumis was used. Separate topologies for maize and ssp. parviglumis were simulated first and then the coalescence times for each node in these topologies were added. The bottleneck in the maize topology was taken into account by rescaling the coalescent times during the bottleneck by the ratio of the effective population size of maize during the bottleneck (Nb) divided by the size after expansion (Nm). The nodes of these two topologies at the time of the split between maize and ssp. parviglumis were then treated as a new sample for another simulation to create a single topology combining maize and teosinte.
of 3.2 determined from a mutation-accumulation study for maize SSRs (Vigouroux et al. 2002a; see also Pritchard et al. 1999).
For the simulations, we must estimate the time of divergence of maize and its progenitor, the effective population size of the wild progenitor, the effective population size of maize during the bottleneck and after its expansion, the duration of the bottleneck, and the mutation rate for SSRs. The time of divergence was set at 7500 years (Iltis 1983). The ssp. parviglumis effective size was fixed to 40,000 (Vigouroux et al. 2002a). The duration of the bottleneck and the effective sizes of maize during and after the bottleneck are unknown, but these parameters are not independent from each other. For estimating the relationship between these parameters, we developed a mathematical model for maize domestication using the GSM (see appendix). Fixing the effective population size of the expanded population of maize to 1 million, we simulated bottlenecks of lengths 100, 200, 500, 1000, and 2500 years and determined their corresponding effective population sizes to be 107, 220, 553, 1117, and 2875. We have used these values for the simulation.
The mutation rate for maize SSRs is variable among loci and the mutation rate for any individual SSR is unknown (Vigouroux et al. 2002a). Therefore, we have chosen for each simulation a value of this parameter by the following approach. First, a value for gene diversity (or number of alleles) was picked at random from between 0 and 1 (or between 1 and 51 for number of alleles). Second, the mutation rate that gives this gene diversity (or number of alleles) at equilibrium in ssp. parviglumis was calculated and used for simulations. Third, we constrained the mutation rate to be >5 × 10−7 in accordance with empirical data (Vigouroux et al. 2002a).
Fst (as described in Weir 1996, pp. 181–182), gene diversity, and the total number of alleles for both maize and ssp. parviglumis were calculated from the results of 500,000 simulations for each mutation model. This information was then used to estimate the median values and the 95% confidence intervals. As gene diversity is a continuous variable, the expected value of the parameter was calculated using a sliding window of ±0.0125. To analyze how well the simulated results fit our actual data, we took two approaches. First, we constructed decile curves with the simulated data and calculated the number of actual SSRs lying between two decile curves for the Fst by the number of alleles' distribution (Bowcock et al. 1991). If the model fits the data perfectly, the number of SSRs lying between two deciles curves should be one-tenth of the total number of SSRs studied. Second, we calculated the mean Fst on the basis of the simulation results for a given number of alleles. Then, we used these mean values to calculate an overall expected mean Fst for a set of SSRs with the same numbers of alleles as observed in the actual data. We then compared this mean Fst for the simulated data with that for the actual data. The same two procedures were used to compare the fit between the actual and simulated data for gene diversity except that the mean expected gene diversity in maize was conditioned on observed gene diversity in ssp. parviglumis.
Maize possesses less variation at SSRs than does teosinte, whether measured as the number of alleles or as gene diversity (Table 1). Over all SSRs, the average number of alleles is significantly lower in maize landraces (9.0) than in teosinte (11.8; W test, P < 0.001). The relative deficit in allele number or Δallele is 0.24, meaning that maize has 24% fewer alleles than teosinte. Gene diversity is also significantly lower in maize (0.64) as compared to teosinte (0.74; W test, P < 0.001) with a ΔGD of 0.12 or a 12% deficit in maize relative to teosinte. The deficit in the number of alleles (24%) is significantly greater than the deficit in gene diversity (12%; W test, P < 0.001).
Our prior work on mutation rates for maize SSRs indicated that SSRs with dinucleotide repeat motifs have a much higher mutation rate than SSRs with trinucleotide or larger motifs (here called “other repeat SSRs”; Vigouroux et al. 2002a). This difference in mutation rates is reflected in the diversity statistics (Table 1). Dinucleotide SSRs have more alleles than other repeat SSRs both in maize (MW test, P < 0.001) and in teosinte (MW test, P < 0.001). They also have a higher gene diversity in both maize (MW test, P < 0.001) and teosinte (MW test, P < 0.001). Therefore, in addition to analyses using all the markers, we performed separate analyses for dinucleotide and other repeat SSRs.
For both dinucleotide and other repeat SSRs, the average number of alleles is higher in teosinte than in maize (W test, P < 0.001 and P < 0.001, respectively); however, the relative deficit in the number of alleles (Δallele) is greater for other repeat SSRs than for dinucleotide SSRs (MW, P < 0.001) (Table 1). Maize shows a relative deficit of 28% for the number of alleles at other repeat SSRs, but a deficit of only 19% for dinucleotide SSRs. Gene diversity exhibits the same trends with a higher diversity in teosinte than in maize for both dinucleotide (W test, P < 0.001) and other repeat SSRs (W test, P < 0.001), but with ΔGD being greater for other repeat than for dinucleotide SSRs (MW test, P < 0.001).
Fst between maize and teosinte is low with an average value of 0.071 ± 0.004. Overall, the differentiation between maize and teosinte is highly significant (P ≪ 0.001). Out of the 462 SSRs, 368 exhibit an Fst that is significantly >0 at a noncorrected P-value of 0.05. Mean Fst is higher (MW, P < 0.001) for other repeat SSRs (0.087 ± 0.005) as compared to dinucleotide SSRs (0.044 ± 0.004). There is no difference between dinucleotide and other repeat SSRs in the proportion showing a significant Fst (G-test = 0.63, P = 0.43). Fis is 0.38 ± 0.010 for maize and 0.43 ± 0.009 for teosinte. Fis is similar for dinucleotide and other repeat SSRs for both maize (MW, P = 0.62) and teosinte (MW, P = 0.13).
The QTL for plant and inflorescence architecture that differentiate maize and teosinte are mostly found on chromosomes 1–5 (Figure 1; Doebley and Stec 1993). Therefore, if selection on these QTL during domestication caused a severe loss of diversity, one might expect some chromosomal effect on diversity. When all the SSRs are considered, we found no chromosome effect for the parameters ΔGD (KW, P = 0.38) and Fst (KW, P = 0.22), but a significant effect for Δallele (KW, P = 0.006). If we considered dinucleotide SSRs (Δallele, KW, P = 0.11; ΔGD, KW, P = 0.12; Fst, KW, P = 0.83) and other repeat SSRs (Δallele, KW, P = 0.08; ΔGD, KW, P = 0.40; Fst, KW, P = 0.37) separately, there are no significant associations. However, if we combined the two probabilities for Δallele for dinucleotide and other repeat SSRs using Fisher's method for combining probabilities (Sokal and Rohlf 1995), we observe a significant chromosome effect (P = 0.049). This result suggests that the chromosome effect is driven by both kinds of repeats. Chromosome 4 has the highest value for Δallele followed by chromosomes 6, 10, 7, 8, 5, 9, 1, 3, and 2 in descending order.
Plot of Fst and ΔGD along the genetic map of maize. Fst and ΔGD are plotted as a function of the distance in centimorgans along the 10 chromosomes of maize. A representation of domestication QTL effect is shown as a shaded area (see text for details).
We can also test if selection on domestication QTL has affected genetic diversity in windows surrounding the individual QTL. If one visually examines the relationship between ΔGD or Fst and QTL effect, there is no obvious correlation (Figure 1). At the large-effect QTL region on chromosome 1, neither ΔGD nor Fst is particularly large. The same is true for the large-effect QTL regions on chromosomes 2, 3, 4, and 5. Indeed, SSRs with exceptionally large values of Fst or ΔGD appear randomly dispersed along the chromosomes.
For a more definitive analysis of the relationship between QTL and SSR diversity, we calculated the correlation between QTL effect and the diversity statistics for the SSRs. If all SSRs are considered together, we observe 1 significant correlation out of 12 between SSR diversity statistics and QTL effect (Table 2). If dinucleotide and other repeat SSRs are analyzed separately, there is also only 1 significant result among 24 tests. We conclude that there is no convincing evidence for a relationship between diversity statistics and QTL effect since single significant tests can readily result by chance alone when doing 24 tests.
In addition to domestication QTL, other spatial factors, such as distance from the centromere, could influence the distribution of diversity. To detect if neighboring SSRs exhibit a similar pattern of diversity, we calculated the semivariance of each of the diversity statistics: Δallele, ΔGD, and Fst. If diversity is spatially correlated along the chromosomes, then γ(h) for the actual data should be lower than that for a data set obtained by permuting SSRs. Using all SSRs and values of 1, 2, and 5 cM for h, we observed significant (P > 0.95) values for γ(h) for all of the diversity statistics (Table 3). The analysis using only other repeat SSRs gives a similar result. For dinucleotide SSRs, only Δallele and ΔGD show significance, perhaps because of the smaller number of dinucleotide SSRs and corresponding reduced statistical power. Thus, there is evidence that diversity at neighboring SSRs is correlated within recombination distances ranging from 1 to 5 cM. We note that significant spatial correlations are observed only when outlier SSRs were removed from the analysis. Outlier SSRs may result from the variability in mutation rate among SSRs or misplacement of SSRs on the genetic map.
To examine further whether the significant correlations in Table 3 are strictly dependent on the exclusion of outliers, we also calculated γ(h) using the P-values from the Fst test and the GD test for SMM (see below). The use of P-values reduces the noise introduced by differences in mutation rates among SSRs. For this analysis, we calculated the odds ratio of the P-value as ln(p/(1 − p)). Using all the SSRs, we found significant (P > 0.95) variogram P-values (with outliers, without outliers) from the GD test at 1 cM (P = 0.981, P = 0.969), 2 cM (P = 0.997, P = 0.995), but not at 5 cM (P = 0.93, P = 0.804). For the P-values from the Fst distribution, we observed significant or near significant associations at 1 cM (P = 0.944, P = 0.904) and 2 cM (P = 0.954, P = 0.949), but not at 5 cM (P = 0.72, P = 0.66). Thus, the exclusion of outliers appears not have biased the observed significant spatial correlation for diversity statistics. Overall, these analyses indicate a significant spatial correlation among SSRs within 2 cM of each other.
The Ewens-Watterson test enables one to detect deviations from a neutral-equilibrium model as either a deficit of gene diversity relative to the number of alleles at a locus (below the curve in Figure 2) or an excess of gene diversity (above the curve in Figure 2; Ewens 1972; Watterson 1978). In maize, the number of SSRs showing excess in gene diversity compared to the number of alleles (P < 0.025) is 36, and the number showing a deficit in gene diversity (P > 0.975) is 12 (supplementary Table S2 at http://www.genetics.org/supplemental/). In teosinte, the number of SSRs showing excess in gene diversity compared to the number of alleles (P < 0.025) is 34, and the number showing a deficit in gene diversity (P > 0.975) is 5. Maize shows more SSRs with a deficit in gene diversity as expected under selection or a bottleneck.
Graphical representation of the Ewens-Watterson test. The 97.5 and 2.5% percentile curves are represented by the solid lines and the expected median value by the dashed line. Circles are dinucleotide and triangles are other repeat SSRs.
The Fst test asks if the degree of differentiation at an SSR exceeds neutral expectations. Figure 3 provides a graphical representation of the Fst test, showing the medians and upper 95% confidence limits for the SMM, GSM, and IAM established by simulation. The three mutation models give similar results for SSRs with five or fewer alleles; however, for SSRs with more than five alleles, the SMM and GSM have a lower median and 95% confidence limit. To analyze the fit between the simulated model and the observed data set, we calculated the mean of the expected Fst for each individual locus given the number of observed alleles. For dinucleotide SSRs, this average is 0.045 (SMM), 0.070 (GSM), and 0.16 (IAM) compared to the observed mean of 0.054. For the other repeats, this average is 0.107 (SMM), 0.138 (GSM), and 0.163 (IAM) compared to the observed mean of 0.097. We also calculated the number of SSRs lying between consecutive decile curves for each mutation model for both dinucleotide and other repeat SSRs. The IAM does not fit the dinucleotide SSR data because of an excess of SSRs with low Fst values (χ2 = 275.4, P ≪ 0.001); the GSM and the SMM models are also rejected, but less markedly (χ2 = 29.3, P < 0.001 and χ2 = 21.2, P < 0.02). For the other repeat SSRs, the SMM (χ2 = 7.18, P = 0.62) is not rejected, but the GSM (χ2 = 27.8, P < 0.001) and IAM (χ2 = 63.2, P < 0.001) are rejected. Thus, our actual data best fit the SMM although the fit is not perfect.
Plot of the Fst by the number of alleles. Curves correspond to the 50 and 95% percentiles based on simulated data for three mutation models: an infinite allele model (solid line), the generalized stepwise model (long-dashed line) and a stepwise model (short-dashed line). The plot is presented for dinucleotide SSRs (circles) and other repeat SSRs (triangles).
With 462 SSRs, the Bonferroni correction threshold would be 0.99989 for the Fst test. To test that a locus shows a departure at this P-value with good precision would require an inordinate number of simulations. So for practical reasons we report here SSRs that exhibit a probability of <0.995 and not the Bonferroni-corrected threshold. Eleven SSRs exhibit higher Fst values than expected for the SMM model and zero for both the GSM and IAM at the P = 0.995 level. At the P = 0.95 level, 46 SSRs are significant for the SMM, 12 for the GSM, and none for the IAM. So with the SMM 10% of the SSRs exhibit a significant value as compared to the 5% expected under a completely neutral distribution.
The GD test asks if there has been a greater than expected loss of gene diversity in maize relative to ssp. parviglumis given the model for the domestication bottleneck used in the simulations. For all models (IAM, GSM, and SSM), if gene diversity at an SSR in ssp. parviglumis is <0.5, then gene diversity in maize can be zero due to loss from the domestication bottleneck alone (Figure 4). To analyze the fit between the simulated model and the observed data, we calculated the mean of the expected gene diversity in maize given the observed gene diversity in teosinte. For dinucleotide SSRs, this average is 0.785 (SMM), 0.768 (GSM), and 0.705 (IAM) compared to the observed 0.787. For the other repeats, this average is 0.541 (SMM), 0.524 (GSM), and 0.495 (IAM) compared to the observed 0.546. We also calculated the number of SSRs lying between consecutive decile curves for each mutation model for both dinucleotide and other repeat SSRs. For dinucleotide SSR data, the IAM (χ2 = 88.7, P < 0.001) is rejected but not the SMM (χ2 = 12.8, P = 0.17) and the GSM (χ2 = 12.7, P = 0.18). For the other repeat SSRs, the SMM (χ2 = 10.1, P = 0.35) and GSM (χ2 = 9.7, P = 0.37) are not rejected, but the IAM is rejected (χ2 = 41.8, P < 0.001). Thus, our data best fit the GSM and SMM, although the fit is not perfect.
Plot of the gene diversity in maize as compared to the gene diversity in ssp. parviglumis. The curves correspond to the 2.5, 50, and 97.5% percentiles based on simulations for three mutation models: an infinite allele model (solid line), the generalized stepwise model (long-dashed line) and a stepwise model (short-dashed line). The plot is presented for dinucleotide SSRs (circles) and other repeat SSRs (triangles).
For the SMM, 25 SSRs exhibit a significant deficit in diversity in maize relative to teosinte (P < 0.025). This represents ∼5.4% of the SSRs where only 2.5% (12 SSRs) would be expected by chance. Thus, if the model and parameters used in the simulations are correct, we are likely detecting some SSRs that have reduced diversity because of positive selection during maize domestication or improvement. Fifteen SSRs (3.2%) show a significant excess of diversity in maize (P > 0.975) under the SMM where ∼12 SSRs would be expected by chance. The expected (12) and observed (15) values are fairly close so there is no compelling evidence for SSRs that are under balancing or diversifying selection in maize.
We summarized the SSRs where two different tests in maize indicate a significant (P = 0.05) deviation from neutrality (Table 4). Twenty-nine SSRs in maize show a significant result for multiple tests, 6% of the total number of SSRs. Of these, 24 SSRs or 5% of the 462 show reduced diversity as expected under positive selection. There are similar numbers of dinucleotide and other repeat SSRs with significant tests (Table 4), and these numbers are not significantly different (G = 3.27, P = 0.07) from a random expectation based on the number in each class of markers in our sample.
Genetic diversity in maize as in other crops has been reduced during domestication as previously shown (Doebley et al. 1984; Hilton and Gaut 1998) and further illustrated in this study. For SSRs, maize has 88% of the gene diversity found in teosinte and 76% of the number of alleles. If we divide the SSR data according to the length of the repeat motif, we observe that maize has 91% of gene diversity of teosinte at dinucleotide SSRs and 85% of that at other repeat SSRs. For number of alleles, these values are 81% at dinucleotide SSRs and 72% of that at other repeat SSRs. This deficit of diversity is less than what has been found at the DNA level for adh1, 75% (Eyre-Walker et al. 1998), or glb1, 60% (Hilton and Gaut 1998), as expected since the higher mutation rate for SSRs relative to that for nucleotide substitutions allows SSRs to recover more rapidly from the bottleneck effect (Vigouroux et al. 2002a).
We observed a relatively low, although significant, level of differentiation between maize and teosinte (Fst = 0.07). Since differentiation is driven mostly by drift and both maize and teosinte have large population sizes, the low level of differentiation is not unexpected. Dinucleotide SSRs show a significantly smaller Fst value than other repeat SSRs; however, these two types of SSRs exhibit a similar proportion of Fst values that are significantly greater than zero. The smaller Fst for dinucleotide SSRs occurs because of their higher mutation rate (Vigouroux et al. 2002a) and the statistical properties of Fst. Fst is the function of two probabilities, the probability of identity of two alleles within a population and the probability of identity of two alleles between populations. As the mutation rate increases, the probability of identity within a population decreases and so does the Fst value (Weir 1996). This smaller Fst value does not mean that the populations are not differentiated, but just illustrates the effect of the mutation rate on Fst. The same phenomenon has been observed elsewhere with empirical and simulated data (Balloux et al. 2000).
Fis is moderately high in both maize (0.38) and teosinte (0.43), but this is likely a function of our sampling strategy. We attempted to maximize the breadth of genetic diversity in our maize and teosinte samples by selecting accessions from maximally divergent geographical locations. This sampling strategy will increase the probability of observing SSRs that have become fixed for alternate alleles in different populations. When multiple plants from single populations are sampled in maize, Fis values are much smaller (Labate et al. 2003).
A study of the inheritance of domestication traits in maize reported a concentration of QTL on chromosomes 1–5 (Doebley and Stec 1993). This suggests that these chromosomes might have experienced a stronger selective force than chromosomes 6–10 and that there may be heterogeneity among chromosomes in genetic diversity. Nevertheless, no chromosomal effect was detected for either the relative deficit in gene diversity or Fst, suggesting a somewhat homogenous genome-wide loss of diversity during domestication (Figure 1, Table 2). The relative deficit of alleles shows some evidence of heterogeneity among chromosomes. Why this effect is observed only for the number of alleles (Δalleles) is unclear. If this effect is due to selection during domestication, it is unlikely that this selection was targeted at the genes (QTL) controlling the differences in plant and inflorescence architecture studied by Doebley and Stec (1993) since the chromosomes that show the most modest losses of alleles (5, 9, 1, 3, and 2) include four of the five chromosomes identified as possessing the largest numbers of QTL.
We asked whether there is a correlation between the location of domestication QTL and genomic regions of lower genetic diversity as expected if selection during domestication had caused regional losses in diversity. Addressing this question is not straightforward since multiple QTL can be linked in a single region and maize has a complex history. Thus, although the interaction of linkage, selection, and gene diversity has been extensively studied (Maynard Smith and Haigh 1974; Ohta and Kimura 1975; Wiehe and Stephan 1993; Kim and Stephan 2000), no clear models can be applied to maize domestication. For these reasons, we have taken an ad hoc approach involving several assumptions: (1) the effect of each domestication QTL on SSR diversity is a decreasing function of the recombination distance to the SSR; (2) the QTL were positively selected; (3) each QTL contributed to the loss of diversity in proportion to the amount of variance it explains (i.e., that selection was stronger for the QTL explaining a higher percentage of the phenotypic variance); and (4) QTL contributed additively to the diversity loss.
Using this approach, we did not observe a significant correlation between QTL effect and loss in the number of alleles (Δallele), gene diversity (ΔGD), or Fst (Figure 1). This result can be explained several ways. First, the method we used may not be sensitive enough given the uncertainty of marker positions on the map. Second, we considered here only QTL for morphological traits and not all the potential traits that differentiate teosinte from maize (e.g., seed quality). Third, forces other than directional selection (drift, mutation, diversifying selection) may have created sufficient noise to obscure much of the signal from directional selection. Fourth, none of the SSRs may be sufficiently close to the QTL to have been affected by selection on the QTL. Finally, SSRs used in this study were developed in maize after screening to eliminate invariant SSRs, giving an ascertainment bias since invariant SSRs, which are the most likely candidates for selected SSRs, were excluded from our sample (see Vigouroux et al. 2002b).
Selective sweeps or background selection can reduce diversity throughout a chromosomal region (Maynard Smith and Haigh 1974; Charlesworth et al. 1993). Therefore, we tested whether linked SSRs are more similar in diversity and we observed multiple significant tests for pairs of SSRs within distances of 2 cM from one another (Table 3).
What mechanisms could produced this correlation? One interpretation is that we are detecting regional variation in the strength of selection during domestication. Where selection was strongest, maize is less diverse (or more differentiated from teosinte) relative to regions that experienced weaker selection. This interpretation, if correct, would appear to contradict prior evidence that the effects of selection on diversity in maize are very narrow (Wang et al. 1999) and that that linkage disequilibrium between loci decreases rapidly (Remington et al. 2001; Tenaillon et al. 2001). Another interpretation may be that there is some bias in the data (or in the parameters) that creates a correlation among neighboring SSRs. For example, if there are regions of high vs. low recombination and if recombination is correlated with SSR mutation rate (see Tenaillon et al. 2001), then a statistic like Fst that is influenced by the mutation rate could show a spatial correlation in the absence of any effect from selection during domestication.
To test whether an SSR exhibits a nonneutral pattern of variation, one needs to know the neutral distribution against which the observed data can be compared. To compute such a distribution, we have used coalescent simulations that incorporate the domestication bottleneck. These simulations were performed using three different models for microsatellite evolution: IAM, SMM, and GSM. The simulations are also based on estimates of the current effective population size of maize, the duration of the bottleneck, and the population size of maize during the bottleneck (Eyre-Walker et al. 1998; Vigouroux et al. 2002a). Error in these estimates could bias the results. Nevertheless, this approach has the advantage of clearly specifying the model used and takes into account some aspects of maize history, although it does not include more complex features like population structure.
We examined the fit between our actual data and the simulated data and found that the mean gene diversity and Fst values from the simulated data were closest to the actual data when the simulations were based on the SMM as opposed to the IAM and GSM. Similarly, the distributions of the gene diversity and Fst values for our actual data were closest to the simulated distributions when the simulations were based on the SMM. Overall, the SMM fit the actual data in three of the four tests performed. Nevertheless, the fit is not exact and the results of the simulations differ from expectations based on our prior empirical work. Notably, our prior work on SSR mutation rates (Vigouroux et al. 2002a) indicates that dinucleotide SSRs should best fit the GSM, while a study of sequence diversity at other repeat SSRs (Matsuoka et al. 2002a) suggests that the IAM might provide the best model for this class of SSR. Other factors not incorporated into the simulations such as population structure or directional evolution (Vigouroux et al. 2003) could be responsible for the imperfect fit between the actual and simulated data. Therefore, caution is advised in interpreting the simulation results and the tests of neutrality based upon them.
We performed two tests of nonneutral evolution for which the expected distribution of the test statistic was determined using coalescent simulations. For the Fst test, 46 SSRs or 10% of the 462 SSRs exhibited a higher Fst value between maize and teosinte than expected under the SMM at the P = 0.05 significance level or twice the expected number (23) under purely neutral evolution (Table S4 at http://www.genetics.org/supplemental/). For the GD test, 25 SSRs or 5.4% of the 462 SSRs exhibit a deficit in diversity relative to teosinte under the SMM at the P = 0.025 significance level or twice the expected number (12) under purely neutral evolution (Table S4). This excess of loci with significant Fst or ΔGD values suggests that some of these SSRs (or sites closely linked to them) may have been under selection during maize domestication. These loci merit further investigation by DNA sequence analysis to better assess whether they have indeed experienced past selection.
We have also investigated the influence of selection on diversity by analyzing individual SSRs for evidence of nonneutral evolution using the Ewens-Watterson test. A large number of SSRs (34 in teosinte and 36 in maize) exhibit excess gene diversity relative to the number of alleles (Figure 2, Table S4). This result may indicate balancing (diversifying) selection or population subdivision (Kreitman 2000). For teosinte, population subdivision is a likely explanation because our sample includes three different clusters, ssp. parviglumis, ssp. mexicana, and ssp. huehuetenangensis, which are highly structured (Matsuoka et al. 2002b). Similarly, our maize sample was chosen to maximize the geographic regions represented and does not represent a single Hardy-Weinberg population, an assumption of the Ewens-Watterson test.
In maize 12 SSRs (2.6%) exhibit a deficit in gene diversity relative to the number of alleles as expected under positive selection or a bottleneck (Figure 2, Table S4). This is about the number of significant tests expected by chance alone given the significance threshold of P = 0.975 for the two-tailed Ewens-Watterson test. Thus, this test did not enable us to identify any likely targets of selection during maize domestication. In a previous article, we identified 7 of 39 maize SSRs with a deficit in gene diversity relative to the number of alleles using the Ewens-Watterson test (Vigouroux et al. 2002b). However, in this prior work, we biased our choice of SSRs to enrich the sample for ones that were likely targets of selection. The failure to identify nonneutral SSRs with the Ewens-Watterson test in the present analysis could also be influenced by ascertainment bias. Since we studied only SSRs that were polymorphic in maize and could thus be placed on the maize genetic map, we systematically excluded low-diversity (invariant) SSRs that are the most likely targets of selection.
Our results enable us to make some tentative interpretations concerning the forces that have sculpted SSR diversity across the maize genome. First, we infer that mutation has allowed dinucleotide SSRs with their high mutation rates (10−3–10−4) to partially recover from the loss of diversity during maize domestication. We make this inference since ΔGD for these SSRs is only 9% as compared to 15% for other repeat SSRs, which have a lower mutation rate (∼10−5) (Vigouroux et al. 2002a). Similarly, we infer that other repeat SSRs have also made a partial, although weaker, recovery since ΔGD for these loci is still smaller than the ΔGD of 33% for nucleotide substitutions that have even a lower mutation rate (∼10−9; White and Doebley 1999). Nevertheless, since SSR gene diversity remains lower in maize than in teosinte at both dinucleotide and other repeat SSRs, we conclude that new mutation over the ∼5000 years since the end of the bottleneck has not produced a complete recovery. Thus, SSR diversity can provide some insights into the relative roles of drift and selection as well.
Given that SSRs show reduced diversity in maize relative to teosinte, we can ask what were the relative roles of drift and selection in producing this reduction. Our data do not allow an unequivocal answer to this question, but they can be used to suggest that drift was the dominant force. First, the results of our coalescent simulations indicate that diversity at the vast majority of SSRs can be explained by a simple model that incorporates the domestication bottleneck (drift), thereby obviating the need to infer selection. Similarly, we observed no correlation between the chromosomal position of domestication QTL and diversity as expected if selection coupled with hitchhiking had caused strong regional reductions in diversity.
Even if drift during the domestication bottleneck is the major factor influencing SSR diversity in maize, we ask whether some SSRs have reduced diversity because of selection during maize domestication. A conservative approach for identifying SSRs that were likely targets of selection is to consider only SSRs that exhibit significant results with two different neutrality tests in maize. Taking this approach we identified 29 of the 462 SSRs that we consider the best candidates for selected SSRs (Table 4). Under a complete independence of the three tests, the probability to observe at least two tests significant at a 0.05 level is 0.00725. So, under neutrality, the expected number of SSRs with two significant tests for 462 SSRs analyzed is 3.3 compared to 29 actually observed. However, the tests are not completely independent from each other, so the number 29 is somewhat of an upper limit of the number of selected SSRs under the neutral models considered.
Of the 29 SSRs with two or three significant tests, 24 show evidence for positive selection during maize domestication as either a higher than expected ΔGD value or a Ewens-Watterson test indicating a deficit of gene diversity as compared to the number of alleles. Thus, an average value of 5% of the total number of SSRs may have experienced positive selection during maize domestication. This value of 5% “selected” loci may underestimate the actual number of genes that have experienced selection for several reasons. For example, we analyzed only loci that were known to be polymorphic in maize and thereby excluded invariant SSRs, the class most likely to have experienced past selection. Similarly, some SSRs that experienced selection during maize domestication some 9000 years ago may have recovered their loss diversity because of the high mutation rate for SSRs and thereby give nonsignificant neutrality test results. Nevertheless, this 5% value provides a rough first estimate of the portion of the maize genome that was under positive selection during maize domestication.
A5Assuming that the ancestral population was at equilibrium and had the same effective size as ssp. parviglumis today, we can use σ2parvi as an estimate for σ20. Knowing σ2m, Nmaize, T, and Tb, we can estimate the effective population size of maize during the bottleneck (Nb).
over 33 dinucleotide SSRs was estimated using the data from Matsuoka et al. (2002b) as 23.5 and 26.8, respectively. The effective population size of the expanded maize population after the bottleneck in a range from 105 to 109 has only a small effect on the estimated size during the bottleneck (Eyre-Walker et al. 1998 and data not shown), so we have considered only a large effective population size of 1 million for maize after the expansion.
With these values for the parameters, we can estimate Nb for different values of Tb using Equation A5. Archaeological information indicates that the domestication bottleneck was probably within the range of a few hundred to 2000 years (Smith 2001). Therefore, we calculated the effective size for bottlenecks of 100, 200, 500, 1000, and 2500 years in duration and obtained values for Nb of 107, 220, 553, 1117, and 2875, respectively. These values are in good agreement with previous independent estimates using DNA sequence polymorphism (Hilton and Gaut 1998).
We thank Montgomery Slatkin and Jody Hey for advice on the mathematical and simulation models. We thank Marit Haug for technical assistance and Major Goodman and Jesus Sanchez for help in obtaining seeds. This work is supported by National Science Foundation grant DBI-0096033.
↵ 1 These authors contributed equally to this work.
↵ 2 Present address: Diversité et Génomes des Plantes Cultivées, UMR141, Institut de Recherche Pour le Développement, Montpellier, 34394, France.
Armstrong, M., 1998 Basic Linear Geostatistics. Springer-Verlag, Berlin/Heidelberg, Germany.
Balloux, F., H. Brunner, N. Lugon-Moulin, J. Hausser and J. Goudet, 2000 Microsatellites can be misleading: an empirical and simulation study. Evolution 54: 1415–1422.
Beaumont, M. A., and R. A. Nichols, 1996 Evaluating loci for use in the genetic analysis of population structure. Proc. R. Soc. Lond. Ser. B 263: 1619–1626.
Bowcock, A. M., J. R. Kidd, J. L. Mountain, J. M. Hebert, L. Carotenuto et al., 1991 Drift, admixture, and selection in human evolution: a study with DNA polymorphism. Proc. Natl. Acad. Sci. USA 88: 839–843.
Buckler, E. S., and T. P. Holtsford, 1996 Zea systematics: ribosomal ITS evidence. Mol. Biol. Evol. 13: 612–622.
Charlesworth, B., M. T. Morgan and D. Charlesworth, 1993 The effects of deleterious mutations on neutral molecular variation. Genetics 134: 1289–1303.
Doebley, J. F., 1990 Molecular systematics of Zea (Gramineae). Maydica 35: 143–150.
Doebley, J., and A. Stec, 1993 Inheritance of the morphological differences between maize and teosinte: comparison of results for two F2 populations. Genetics 134: 559–570.
Doebley, J. F., M. M. Goodman and C. W. Stuber, 1984 Isoenzymatic variation in Zea (Gramineae). Syst. Bot. 9: 203–218.
Eyre-Walker, A., R. L. Gaut, H. Hilton, D. L. Feldman and B. Gaut, 1998 Investigation of the bottleneck leading to the domestication of maize. Proc. Natl. Acad. Sci. USA 95: 4441–4446.
Ewens, W. J., 1972 The sampling theory of selectively neutral alleles. Theor. Popul. Biol. 3: 87–112.
Goudet, J., 2001 FSTAT, a Program to Estimate and Test Gene Diversities and Fixation Indices, Version 2.9.3 (http://www.unil.ch/izea/softwares/fstat.html).
Hawkins, D. M., 1980 Identification of Outliers. Chapman & Hall, London.
Hilton, H., and B. S. Gaut, 1998 Speciation and domestication in maize and its wild relatives: evidence from the globuline-1 gene. Genetics 150: 863–872.
Hudson, R. R., 1990 Gene, genealogy and the coalescent process. Oxf. Surv. Evol. Biol. 7: 1–44.
Iltis, H. H., 1983 From teosinte to maize: the catastrophic sexual transmutation. Science 222: 886–894.
Kim, Y., and W. Stephan, 2000 Joint effects of genetic hitchhiking and background selection on neutral variation. Genetics 155: 1415–1427.
Kimura, M., and J. Crow, 1964 The number of alleles that can be maintained in a finite population. Genetics 49: 725–738.
Labate, J., K. R. Lamkey, S. E. Mitchell, S. Kresovich, H. Sullivan et al., 2003 Molecular and historical aspects of corn belt dent diversity. Crop Sci. 43: 80–91.
Matsuoka, Y., S. E. Mitchell, S. Kresovich, M. Goodman and J. Doebley, 2002a Microsatellites in Zea—variability, patterns of mutations, and use for evolutionary studies. Theor. Appl. Genet. 104: 436–450.
Matsuoka, Y., Y. Vigouroux, M. M. Goodman, J. Sanchez, G. E. Buckler et al. 2002b A single domestication for maize shown by multilocus microsatellite genotyping. Proc. Natl. Acad. Sci. USA 99: 6080–6084.
Maynard Smith, J., and J. Haigh, 1974 The hitchhiking effect of a favorable gene. Genet. Res. 23: 23–35.
Ohta, T., and M. Kimura, 1973 A model of mutation appropriate to estimate the number of electrophoretically detectable alleles in a finite population. Genet. Res. 22: 201–204.
Ohta, T., and M. Kimura, 1975 The effect of selected linked loci on heterozygosity of neutral alleles (the hitch-hiking effect). Genet. Res. 25: 313–326.
Pritchard, J. K., M. T. Seielstad, A. Perez-Lezaun and M. W. Feldman, 1999 Population growth of human Y chromosomes: a study of Y microsatellites. Mol. Biol. Evol. 16: 1791–1798.
Schneider, S., D. Roessli and L. Excoffier, 2000 Arlequin Ver. 2.000, a Software for Population Genetics Data Analysis. Genetics and Biometry, University of Geneva, Geneva.
Sharopova, N., M. McMullen, L. Schultz, S. Schroeder, H. Sanchez-Villeda et al., 2002 Development and mapping of SSR markers for maize. Plant Mol. Biol. 48: 463–481.
Slatkin, M., 1994 An exact test for neutrality based on the Ewens sampling distribution. Genet. Res. 64: 71–74.
Slatkin, M., 1995 Hitchhiking and associative overdominance at a microsatellite locus. Mol. Biol. Evol. 12: 473–480.
Slatkin, M., 1996 A correction to the exact test based on the Ewens sampling distribution. Genet. Res. 68: 259–260.
Smith, B. D., 2001 Documenting plant domestication: the consilience of biological and archaeological approaches. Proc. Natl. Acad. Sci. USA 98: 1324–1326.
Sokal, R. R., and F. J. Rohlf, 1995 Biometry: The Principles and Practice of Statistics in Biological Research. W. H. Freeman, New York.
Tenaillon, M. I., J. U'Ren, O. Tenaillon and B. S. Gaut, 2004 Selection versus demography: a multilocus investigation of the domestication process in maize. Mol. Biol. Evol. 21: 1214–1225.
Vigouroux, Y., J. S. Jaqueth, Y. Matsuoka, O. S. Smith, W. D. Beavis et al., 2002a Rate and pattern of mutation at microsatellite loci in maize. Mol. Biol. Evol. 19: 1251–1260.
Vigouroux, Y., M. McMullen, C. T. Hittinger, K. Houchins, L. Schulz et al., 2002b Identifying genes of agronomic importance in maize by screening microsatellites for evidence of selection during domestication. Proc. Natl. Acad. Sci. USA 99: 9650–9655.
Vigouroux, Y., Y. Matsuoka and J. Doebley, 2003 Directional evolution for microsatellite size in maize. Mol. Biol. Evol. 20: 1480–1483.
Watterson, G. A., 1978 The homozygosity test of neutrality. Genetics 88: 405–417.
Weir, B. S., 1996 Genetic Data Analysis II. Sinauer Associates, Sunderland, MA.
White, S., and J. Doebley, 1999 The molecular evolution of terminal ear1, a regulatory gene in the genus Zea. Genetics 153: 1455–1462.
Whitt, S., L. M. Wilson, M. Tenaillon, B. S. Gaut and E. Buckler, 2002 Genetic diversity and selection in the maize starch pathway. Proc. Natl. Acad. Sci. USA 99: 12922–12962.
Wiehe, T. H. E., and W. Stephan, 1993 Analysis of a genetic hitch-hiking model, and its application to DNA polymorphism data from Drosophila melanogaster. Mol. Biol. Evol. 10: 842–854.
|
0.980339 |
Think of the roses as a canary in a coal mine. Rose bushes and grapevines have similar needs when it comes to moisture, pH level, and nutrient requirements. They are also both susceptible to some of the same types of fungal diseases. In fact, roses are more susceptible to these diseases than grapevines. This is why they make a great early warning system. If the rose bushes are showing signs of fungal infection, the vineyard manager knows that he or she should take steps to prevent the grapevines from becoming infected as well. If the roses are healthy then the grapevines should be too. This means the vineyard manager can forgo applying chemical sprays, which saves money and the environment. There are two types of fungal diseases that can attack grapevines.
Powdery mildew is a fungal infection that appears as a white, powdery growth of spores on the green parts of the plant. If the infection spreads to the fruit, the fruit will fail to grow properly and it will eventually split open and rot. A plant that has been infected by powdery mildew cannot be cured. However, preventative measures can be taken to stop the infection before it begins. A sulfur spray can be applied to the vineyard to prevent the onset.
Downy mildew is a fungal infection that first appears on the undersides of leaves and causes yellow blotches as it matures. The infection inhibits photosynthesis and eventually causes the leaves to drop off. Like powdery mildew, there is no cure for this disease. However, a spray of copper sulfate and lime can be applied as a preventative measure.
|
0.993373 |
Can I recover deleted files from my hard drive?
Question: I've heard of companies finding data that people thought they had deleted from their work computer. How do they do that? Might be good information in case I accidentally delete some important files from my home computer too!
Answer: Yes, there are several ways to retrieve data that has been deleted from a computer system, even if you've deleted them from the recycle bin or reformatted your hard drive.
I accidentally deleted a year's worth of family photos and financial documents on my wife's laptop, after using the factory restore CD that reinstalled Windows and removed her user folder where all the pictures were stored. Even after that mistake, I was still able to recover all of the files.
When you delete a file, Windows only marks the file as deleted, but doesn't actually remove it from your system.
Those files are only truly deleted (well, replaced actually) when other data is saved to the same location on your hard drive.
If you accidentally delete files from your system, they can usually be undeleted - even if you deleted them from your recycle bin - as long as you attempt to recover the files shortly after you delete them, and before Windows saves other data in those same file locations on your hard drive.
If you've accidentally deleted an important file or erased a folder containing files that you later realize you still need, chances are good that they're still on your system and can be recovered.
The key is to use a good undelete program like iRecover that can find files that have been deleted - even if you've emptied your Recycle Bin.
I've tried a few different programs that claim to be able to do this, but have discovered that some of them are only able to show you what's still in your Recycle Bin (not much help if you've emptied your Recycle Bin).
iRecover will also help you recover data that was lost because of file system corruption, formatting, virus damage, partition deletion, or even just plain user error.
Here's a link to download iRecover. It will tell you what it can recover for free, so you'll know if it's worth paying for the licensed version.
It's also a great idea to frequently backup your hard drive, so that you can still restore important files, even if they can't be recovered using a file recovery program.
I bought a Seagate FreeAgent 320 GB USB External Hard Drive .
This new drive plugs in via USB cable and doesn't require any installation or configuration. Windows automatically recognizes it when you plug in the USB cable, and it has plenty of space for backing up both of my home computers.
I also highly recommend that you backup your hard drive on at least a monthly basis, although weekly is even better.
If you're looking for a good backup program for your home computer, I recommend Genie Backup Manager which I use for my home systems. I consider myself fortunate to have been able to retrieve our family photos and financial documents... and my wife is finally willing to speak to me again.
However, I'm hoping to avoid this whole scenario in the future by making regular backups to this new backup drive (at least weekly).
while reinstalling the OS to my lap top i had the external HD USB plugged in and accidentally deleted the partition to the EHD as well as the partition for the lap top. i already replaced the system to the lap top. how can i get my saved items on the EHD? does it work the same? can i use my pc to do this too? please help...losing my mind!
Same issue here..if anyone knows the answer please let me know too!! im freaking out!
same here... idk what to do?.
same here... idk what to do?.. im actually freak out when accidentally delete the partition on my EHD while installing OS.. all my hardwork and stuff are all gone.. a try to use many applications but, it all fails.. help me please..
if i wanted to permanently delete something so that it can never be found again how can i do that if someone has this? do i have to delete the file then save something with the same name as it? Is that right? if not please tell me!
Some people still believe that when they delete a file, it is gone forever. In reality, even if you remove it from your Recycle Bin, the file may be easily recovered by some ill-inspired people who are secretly snooping on your computer activities.
The only way to be certain that your files have been deleted is to make sure that the entire file is overwritten by blank data.
There's a program called Aevita Wipe & Delete that does just that. It implements eight secure sanitizing methods including the US Department of Defense DoD 5220.22M, RLL, MFM, VSITR, Gutmann and GOST P50739-95.
By utilizing these methods, Aevita can erase any file or folder by overwriting it several times, thus rendering it completely unrecoverable even for the most sophisticated recovery software.
but wouldn't that person be able to see that you have Aevita Wipe & Delete? how could you hide the program so you cannot find it? burn it to a cd?
My niece reinstalled the OS on my Sony Destop PC about 8 months ago. I was devastated, lost so many pictures from my child's life. Recently someone told me that the data may still be there and be recoverable. Is that true? If so how can I recover the and still maintain what I ave on it now. I do have an external hard-drive. I am desperate to know if I can get my pictures back.
It's certainly possible, although after that many months there might only be a few pictures that can be recovered (since between now and then the chances of Windows saving other files over the files marked for deletion increases significantly).
The iRecover program mentioned above is really the best I've seen, and would be able to restore the files if they haven't been over-written.
Alternatively, if you take the computer to a data recovery specialist, ask if they'll only charge you if they actually find deleted photos - not sure if you'll find any who will do that, but it'd be worth asking.
Hi Ricky , I have just read about your recovery program for deleted files. Last night I had an accident and was deleting files from my ext hard drive (classic SE)whilst it was plugged into my work laptop. It was too big for the recycle bin and deleted permanently.
Will I have to recover the files through my laptop (as its due to go back today) or can I do the restore through my PC with the external hard drive? I guess what I'm asking is, are the files i deleted on my external hard drive still sitting on it hidden or will they have been transported to my laptop?
Good question. Since the files were deleted from your external hard drive, you'll need to run iRecover on the external drive. That's where the files will still reside.
They're only marked as deleted, but won't actually be deleted until other data is saved in the same location on that drive.
how do i run irecover on my external harddrive?
So I wanted to delete some documents from my hard drive and I wanted it to be gone forever. From what I have read, I would assume that the way to delete something a hard drive would be the same as an external hard drive... but when I deleted a document out of my external hard drive it went to my computer's recycling bin, so it made me question if it is the same procedure? Does the external hard drive have the same option to retrieve deleted files as a regular computer hard drive? If so, how do I come about retrieving those deleted files?
Go to the recycle bin and use cut and paste,that should work.
I lost lot of files including photos & videos on my External drive -size of data lost around 140 GB. I do not know how all the files deleted and one folder names windows with few system files has appeared.
I am not using for further use as I intend to retrieve the data including Videos. Pls advise.
My half terra with enclosure recently fell on the floor.
I tried using it again..my usb wont read it..I tried putting it directly on my cpu..it wont read the hard disk..tried using another enclosure, wont read either...is there anyway I could save my 300gig files, before I had it replaced?
Thanks a lot! Based on your article, with Irecover, I saved my photos deleted by mistake :).
I lost all my files too on my external hard drive but those aren't accidentally deleted files. It might have fell on the floor. The good thing is that I can still access it. While checking the properties, I noticed that the used space is still 74.2 GB. My question is: could I still recover it even if I didn't accidentally delete all of it?
Hope to hear from you very soon. Thanks!
I’m so glad to see your website.
Some thing has happen to my computer couple days ago. I have the blue screen and unable to do anything with it. I try to reboot and reinstall the Operation System but the system indicated that unable to locate the hard drive.
I took my desktop to the local computer to get it repair, and they said everything in the hard drives is empty. They will able install the OS with a new hard drive.
I have taken out the old hard drives and hope to be able to recovery all the family photos. In my case, the hard drives are shows as empty. Will I be able to use the iRecover to recover all my photos?
I just recently tried to format my usb stick into a patchstick. I accidently chose to format my external hard drive instead of the usb stick. When I noticed, I quickly unplugged the usb hard drive from the computer but was too late. Now all my important files and pictures from years and years ago are al gone. My external hard drive now shows PATCHSTICK and RECOVERY. Will this program recover the files I lost. I am doing the scan right now and it looks like it does see the old files I formatted over. I really don't know what I'm doing as you can tell. Hope you can help.
A couple of days ago I transferred all my information from one of my external harddrives to another external harddrive. After I had completed that, I did a really stupid thing and deleted everything from the original harddrive. Today, I wanted to view something that I thought was supposed to be on the new external, but was not. It was in my pictures folder, where I have a good number of folders. The last 6 folders were completely empty. I don't care about the other folders that were empty, but that one folder; every vacation I have ever gone on, the pictures were in that folder. Please, PLEASE, how do I recover these files? I have Windows XP.
First, unplug the original hard drive so that nothing else gets saved to it. As long as no other files are saved to it, then your pictures are still sitting there - they're just marked as deleted but they are not actually deleted (see the explanation for this in the article above).
Then download and install a copy of the iRecover program described above. Plug in the external drive and point iRecover to it to see what files it will be able to recover.
You should see all of the files sitting there waiting to be recovered, which the program does a very good job of doing.
Hi ricky, any free trial software to retrieve my lost files?
I lost my photos folder after I try to cut and paste to another folder. Could it be found?
I was trying to install a new video card in my pc and i saw some vids on how to do it. one vid i watched talked about changing something on my BIOS. I'm about to turn sixteen so i guess i'm not that well educated in how a computer works fully. I was going through the BIOS and accidentally clicked on something that said SATA:xxxxxxxxxxxxx with some kind of code of the harddrive. stupid me i ended up clicking it thinking it was the best thing to do. Then i saw this other vid that showed how to install a video card without getting near having to deal with my computer's BIOS. So once i rebooted my pc, it came to the state of my pc from 3-4 months ago. i know me hitting that SATA thing was not good. and now all of my lastest files are gone and im stuck regreting what i did. i have a vista 64-bit version and im wondering if theres anyway to get all of my files back. And sadly i didnt back up my files, i've never had. So now i feel like an idiot b/c fiddling with my SATA hard drive now has me at the bad end since i have lost all my files. i'm wondering if theres anyway to get it back, if not well i guess im just another half-witted teenager trying to do something i should've never did.
The files are most likely still there, and are just marked as deleted (but won't actually be deleted until other data is saved to the same location on the hard drive). This is true even if you format your hard drive.
The best thing to do is to stop using your computer until you can install and run iRecover, which will show you what files can be recovered. The more you continue to use your computer, the greater the chances of it saving files on top of the files that are marked as deleted (which makes them unrecoverable).
What if i had a virus on my computer and the only way to get rid of it was to restore my computer and handrive and everything!
Can i still get my pictures, music and work back??
Help - I moved some photos (all my babies pictures - the first 3 years of her life) over to Kodak Easy Share and made sure they were there and then deleted from my pictures file so they wouldn't be on there twice - now when I go into Koday Easy share they state there is an error and the pictures have been deleted - and when I deleted the file was too big to go into recycle bin. When I go into Kodak Easy Share I can see the images for a second but then when I try to open them I get the error. Can I recover these at all... I am computer challenged!!! And of course have never back-up my system!
My cousin deleted all my movies from my external HD. Is there any way I can recover those files from the HD. I am a mac user and saw that irecover is not compatible with Mac. Do you know of any Mac software I could use to recover the deleted files? I currently have MAC OS X version 10.4.11.
I was deleting a file in a folder on my memory stick and it deleted the whole contents of the folder, even the folder is still its empty can I get the other files in that folder back?
last year my husband wiped my computer clean bcuz it had a virus.we never used it since i got a new computer. Now when I say clean I mean he wiped it so clean that he became the owner on the computer and wiped my whole administrative user off the computer which contained extremely important photos. Now is there a way to retrieve photo files from a computer that has been completely wiped out clean like a brand new computer? It dont have anything at all reconizable on it to make me believe something from the old computer is still on it.
will this help to recover deleted emails????
My work computer got infected with a virus (mysearchcorp then security tool) I have to bring it to the IT dept to get fixed.
I was double jobbing for a while (not enough assigned work to keep me busy) and it was convenient to use the same computer. I deleted all the non work related files and removed them from the recycle bin. I also deleted my internet history which showed I had used facebook. (A work prohibited site)I thought happy days until i read your blog Ricky!
When the IT staff are fixing my computer will they find my other work files and photos of people i viewed on facebook? If so I’m fired. I know I deserve it but I just want to know the odds of them finding the files. 50% or 100%. Is it a standard check for IT departments?
They could find it if they looked, but most IT departments are way too understaffed to have time for that level of investigation.
They'll probably just reformat the hard drive and re-image the drive with a company standard set of programs and settings.
I wouldn't worry about it at all.
Hey ricky, thanks very much for all this advice... i understand it and it actually works. I am so grateful to you for not (as seems to be the main aim of many experts) trying to make me feel like an idiot. more power to you mate!
Is it possible to retrieve a program with reports if its been years and I cannot find on the computer but when I type in the search area I see one of the names the report is for and I see that it is multiple files. I am concerned that it was deleted by a prior employee and I need to get the reports back. HELP!!!
Very unlikely if it's been that long, unless that computer has been unused during that time.
So I don't know what happened, but all of a sudden I have no video, and even when I plug in different monitors, they go immediately to sleep. So first, what's needed to repair the video issues? And, if I just buy another computer, is there anyway to pull my files off the "bad" computer when I can't see what's happening? I appreciate your input!
I deleted files from my recycle bin and a few months later they re-appeared. They were completely gone and suddenly one day just showed back up. It should have had time to rewrite as much as my computer is used by everyone saving...projects and things. Has anyone ever had this happen to them? I just don't understand how this happened.
I am able to recover all my data except the folders that were hidden.
Is their any way to recover the hidden folders in my hard drive ?
I recently got a new lap top and saved all my old pics etc on to a portable hard drive. This is the only place these docs were stored. However, today my nero back up thingy saved all my current documents from my new laptop onto it. Shortly after this another member of staff used my hard drive to save an item. Now.......the only things on the portable hard drive are the current backed up documents from my laptop and the document my colleague saved. I basically would love to know if my other documents are retrievable? There were literally thousands of photos that I had not printed plus all my Uni work since 1st year (6 years ago) Aggggggggggggggggh!!! I would ask the technician in my school where I work, only he doesn't speak English....nor Irish. Any advice is much appreciated! Thank you!
I had cut and pasted a folder from my external hard disk drive to my laptop and the hard disk of the laptop eventually crashed. Is there a way to recover the folder from the external hard drive?
I had formatted my hardrive 1 year ago, is it possible now to recover the pictures from that now.
I heard that it is possible to even recover data beyond 15 years is it true.
If there is any process by software or by any specialist, short or even large please tell me. I am very very desperate to get them. I am ready to pay any cost.
I should be highly obelized if mail me the reguarding info.
I can't do anything! Some how ALL my pictures in the RECYCLE BIN are ALL gone.. is there ANYTHING I can do to get them back?
I am not smart when it comes to computers in the least... but about two years when my girlfriend and i split she deleted all of the pics off of my computer and there was alot of family photos that i will never be able to replace. They are not in the recycling bin and i tried undelete plus but that only went back for a month. Is there any way to get pictures back after that long? any help well be greatley appreciated.
Please Help! My high school provided us with laptops which we were able to keep after we graduated. I just graduated and they asked us to hand in our laptops to be re-imaged. I just picked it up from school today but everything on my laptop was deleted such as important documents and A LOT of family pictures. Is there any way to retrieve that data even though my laptop was re-imaged?
|
0.954619 |
My Damon Key colleagues and fellow bloggers, Robert Thomas (inversecondemnation.com) and Mark Murakami (hawaiioceanlaw.com), quickly posted on their respective blogs Judge Sotomayor's decisions on maritime law (Mark's post here) and inverse condemnation (Robert's post here). So . . . , where is the insurance blog's input?
In an effort to keep pace (actually, to catch up), below is a summary of Judge Sotomayor's insurance coverage decisions I have located from her tenure on the Second Circuit. The list is comprised of cases authored by Judge Sotomayor and does not include decisions she merely joined, whether written by another judge or per curium rulings. The results of Judge Sotomayor's decisions are fairly balanced: five in favor of the insurer; three in favor of the insured; and one finding for both the insurer and insured. Although some have questioned whether Judge Sotomayor has the literary flair to contend with a Justice Scalia, the decisions summarized below are well-reasoned, narrowly crafted rulings.
Greenidge v. Allstate Ins. Co., 446 F.3d 356 (2nd Cir. 2006) - Judge Sotomayor's decision affirmed the district court's rejection of a claim for bad faith against Allstate. Because the injury was lead poisoning from a minor's exposure to lead paint for two years, two homeowner's policies were potentially implicated. Allstate offered policy limits of one policy to settle the minor's claim against the insured, but refused to consent to a declaratory judgment action to determine whether the injury triggered the second policy limit. Allstate contended the policies' anti-stacking provision barred recovery under the second policy. The Second Circuit affirmed, finding no bad faith. The insureds failed to show Allstate acted in gross disregard of the insured's interest when rejecting the settlement offer. The insureds could have commenced their own declaratory judgment action to determine the insurer's liability. Result: Decision in favor of Insured.
Palmieri v. Allstate Ins. Co., 445 F.3d 179 (2nd Cir. 2006) - The district court found the insured was entitled to the depreciation value of his dwelling under a flood policy, but was not entitled to the depreciation value of his personal property. The Second Circuit, in a decision by Judge Sotomayor, affirmed. Further, prejudgment interest could not be awarded against Allstate, who was acting as an agent of the federal government in administering the policy pursuant to the National Flood Insurance Act. Result: Mixed decision, granting relief to both Insured and Insurer.
Travelers Ins. Co. v. Carpenter, 411 F.3d 323 (2nd Cir. 2005) - After the claimant was injured in an auto accident while acting within the scope of her employment, Travelers paid workers' compensation benefits. The claimant also settled with Travelers under her underinsured motorist coverage. Travelers contended it was entitled to an offset against its workers' compensation liability. The district court dismissed Travelers' suit on abstention grounds. The Second Circuit, in Judge Sotomayor's decision, held under state law Travelers was not entitled to reimbursement until the claimant received more compensation than the amount of her total damages. Further, the district court erred in dismissing the action on abstention grounds instead of granting judgment in favor of the claimant. Result: Decision in favor of Insured.
Empire Healthchoice Assurance, Inc. v. McVeigh, 396 F.3d 136 (2nd Cir. 2005) - A health plan administrator sued decedent's administratrix for reimbursement following a settlement with third parties who allegedly caused the decedent's injures. The district court dismissed for lack of subject matter jurisdiction because the Federal Employees Health Benefits Act, 5 U.S.C. 8902, did not affirmatively authorize the creation of federal common law in the decedent's case. The plan administrator's claims were breach of contract claims which arose under state and not federal law. The Second Circuit, in a decision by Judge Sotomayor, affirmed. Result: Decision in favor of Insured.
Webster v. Mount Vernon Fire Ins Co., 368 F. 3d 209 (2nd Cir. 2004) - A student injured while attending a privately owned elementary school sued the insured owners. After obtaining a default judgment against them, the student sued Mount Vernon, seeking to force the insurer to indemnify the insureds under their commercial liability policy for the amount of damages awarded by the state court judgment. The district court held that because Mount Vernon had not properly disclaimed coverage as to the wife owner, Mount Vernon was liable for the amount of the judgment. The Second Circuit, through Judge Sotomayor, reversed. Mount Vernon could deny coverage to the owner wife because she had never complied with the notice provisions of the policy. Further, Mount Vernon had timely disclaimed coverage as to the husband owner. Result: Decision in favor of Insurer.
Marcella v. Capital Dist. Physicians' Health Plan, Inc., 293 F.3d 42 (2nd Cir. 2002) - The insured was an independent contractor with a real estate company which was a member of the chamber of commerce. The insured joined the chamber as a sole proprietor of her own business and purchased health insurance from defendant health plan. When defendant refused to pay for the insured's out-of-plan surgery, the insured sued in state court. Defendant removed to federal court, citing ERISA preemption as the basis for federal jurisdiction. The district agreed the insured's claim were preempted by ERISA and granted defendant summary judgment on all claims. The Second Circuit, in a decision by Judge Sotomayor, reversed. The chamber was not an "employer" under ERISA because membership in the chamber was open to sole proprietorships without employees and to individuals. Further, the insured's relationship with the real estate company did not bring her under ERISA. The insured, not the real estate company, paid the premiums. Result: Decision in favor of Insured.
Hugo Boss Fashions, Inc. v. Federal Ins. Co., 252 F.3d 608 (2nd Cir. 2001) - The district court awarded partial summary judgment to the insured, finding that Federal a duty to defend a trademark infringement suit, but denied any recovery for indemnification. The jury also found Federal breached its duty of good faith and fair dealing. The Second Circuit agreed there was no duty to indemnify because of the "intellectual property" exclusion. Nevertheless, the majority determined because it was not certain there was no duty to indemnify at the time the insured sought coverage, the insurer was obligated to defend until the uncertainty was resolved. The uncertainty, however, meant the duty of good faith and fair dealing had not been breached. Judge Sotomayor dissented in part, determining under New York law there was no requirement that the insurer defend if it was "uncertain" of how the court would eventually interpret the exclusion. Result: Judge Sotomayor's dissent in favor of Insurer.
Coregis Ins. Co. v. Am. Health Found., Inc., 241 F.3d 123 (2nd Cir. 2001) - The district court found Coregis had a duty to defend suits charging the insured nursing home failed to repay loans allegedly obtained through fraudulent misrepresentations about their financial health. The Second Circuit reversed in a decision by Judge Sotomayor. The policy excluded claims "arising out of, based upon or related to . . . insolvency." The financial failure of the insured was clearly related to the underlying suit for failure to repay loans. Result: Decision in favor of Insurer.
Maska U.S., Inc. v. Kansa General Ins. Co., 198 F.3d 74 (2nd Cir. 1999) - The district court ordered the insurers to indemnify and reimburse the insured for liability costs and related defense costs associated with environmental contamination at the insured's manufacturing facility. The district court found the policies' pollution exclusions were unenforceable because they contravened the state's public policy. The Second Circuit, in a decision authored by Judge Sotomayor, reversed, finding the absolute pollution exclusions did not violate any established state public policy. Result: Decision in favor of Insurer.
The insured's property was damaged during Hurricane Katrina by wind, wind driven rain, flooding, storm surge and water in Jupiter v. Automobile Club Inter-Insurance Exchange, No. 07-1689, 2009 U.S. Dist. LEXIS 44083 May 26, 2009). Plaintiff recovered $225,500 from Allstate, its flood insurance carrier. The insured also held a homeowner's policy with Automobile Club, who paid a total of $106,079.47. The insured argued this was insufficient because its property was a total loss. Auto Club submitted the wind and rain damage was not substantial. Further, Auto Club contended water damage, a flood exclusion, power failure exclusions, and neglect exclusions precluded further liability under the policy.
Auto Club moved for summary judgment on the issues of bad faith and whether the insured had been fully compensated. On the bad faith issue, the insured contended a factual issue existed regarding Auto Club's failure to timely pay the claim despite evidence of damage being provided.
The Court granted Auto Club's motion on the bad faith issue. Louisiana law provided statutory penalties against insurers for failure to timely resolve claims or pay settlement awards. But the insured had to prove that the insurer knowingly committed actions which were completely unjustified, without reasonable or probable cause or excuse.
Here, Auto Club did not act arbitrarily, capriciously, or without probable cause in resolving the insured's claims. Although the insured asserted there was a factual dispute as to the timeliness of payments, there was no evidence that the payments were not timely made. Further, the contents list provided by the insured did not include receipts, and there remained a dispute as to the extent to which the insured's property was damaged by wind as opposed to flood. The parties dispute over the total coast of repairs caused by a covered peril did not warrant the imposition of statutory penalties for bad faith.
The court denied Auto Club's motion regarding whether the insured had been fully compensated, however, because a factual issue was presented.
|
0.93423 |
Born on 2nd June 1835 his birth name was Giuseppe Melchiorre Sarto.
His Papacy began 5 August 1903 and ended upon his death on 20th August 1914. He died in the Apostolic Palace in the Vatican City.
Pius X's canonisation took place in 1954. A great devotion developed around Pius X and to accommodate the large number of pilgrims seeking access to his tomb, far more than the crypt where he was buried would hold, "a small metal cross was set into the floor of the basilica," which read Pius Papa X, "so that the faithful might kneel down directly above the tomb". Masses were held near his tomb until 1930.
Following this, the process towards beatification began, and investigations by the Sacred Congregation of Rites into miracles performed by intercessory work of Pius X subsequently took place.
The S.C.R. recognised two miracles. The first involved Sr. Marie-Fran�oise Deperras, a nun who had bone cancer and was cured on 7 December 1928 during a novena in which a relic of Pius X was placed on her chest. The second involved Sr. Benedetta De Maria, who had cancer, and in a novena started in 1938, she eventually touched a relic statue of Pius X and was cured.
Pius X received his beatification on 3 June 1951 at St. Peter's Church and 100,000 faithful were in attendance. During his beatification decree, Pius X was referred to as "Pope of the Eucharist", in honor of Pius X's expansion of the rite to children.
On 29 May 1954, less than three years after his beatification, Pius X was canonized, following the S.C.R.'s recognition of two more miracles.
St. Pius X is the patron saint of first communicants.
|
0.978175 |
A Pareto improvement is where you make one party better off and no parties worse off.
Suppose Adam has a rare baseball card. He assigns no intrinsic value to baseball cards. Adam likes Beth, and somewhat values her happiness. Beth collects baseball cards, and would happily pay $100 for Adam's card.
If Adam just gives Beth his baseball card, is that a Pareto improvement? Naively, yes: he loses the card that he doesn't care about, and gains her happiness; she gains the card. Both are better off.
But I claim not, because if Adam has the card, he can sell it to Beth for $100. He would much prefer doing that over just giving her the card. But if Beth has the card, he can't do that. He assigns no intrinsic value to the card, but he can still value it as a trading chip.
Now suppose Adam has the baseball card but Beth also has a copy of that card. Then Beth has less desire for Adam's card, so this situation also isn't a Pareto improvement over the original. By giving something to Beth, we've made Adam's situation worse, even though Adam likes Beth and values her happiness.
And I think situations like this are common. The ability to give someone something they want, is a form of power; and power is instrumentally useful. And the less someone wants, the less able you are to give them something they want1.
The model here is that there are two parties, people who can access the platforms at Liverpool St and those who can't. If Platform 3 is brought back into use, the first group gains something and the second group loses nothing.
But I think that if Platform 3 is brought back into use, the second group loses some power. They lose the power to say "we'll let you bring back Platform 3 if you give us…". Maybe Platform 3 can be made accessible for $1 million. Then they can say "we'll let you bring it back if you make it accessible", but they can't do that if it's already back in use.
And they lose some power to say "if you ignore us, we'll make things difficult for you". Maybe it would take \$1 trillion to make Platform 3 accessible. If Platform 3 remains out of use, people are more likely to spend \$1 million to make their building projects accessible, because they've seen what happens if they don't. Conversely, if Platform 3 comes back, people are more likely to exaggerate future costs of accessibility. "If I say it costs \$1 million, I'll have to pay. If I say it costs \$10 million, maybe I won't."
I haven't researched the situation in question, and I expect that the actual power dynamics in play don't look quite like that. But I think the point stands.
This doesn't mean Pareto improvements don't exist. But I think a lot of things that look like them are not.
Update 2018-02-02: some good comments on reddit and LessWrong. Following those, I have two things in particular to add.
First, that I like /u/AntiTwister's summary: "If you have the power to prevent another party from gaining utility, then you lose utility by giving up that power even if you are allies. There is opportunity cost in abstaining from using your power as a bargaining chip to increase your own utility."
Second, that there is a related (weaker) concept called Kaldor-Hicks efficiency. I think that a lot of the things that look-like-but-aren't Pareto improvements, are still Kaldor-Hicks improvements - meaning that the utility lost by the losing parties is still less than the utility gained by the winners. In theory, that means that the winners could compensate the losers by giving them some money, to reach a Pareto improvement over the original state. But various political and practical issues can (and often do) get in the way of that.
|
0.999869 |
Recently, Japanese prime minister Shinzo Abe expressed "deep repentance" for Japan's actions in World War Two. It was the latest in a long series (20, just counting from the year 2000) of formal apologies the country has offered, and it was expressed - both appropriately and inappropriately - at a joint session of the United States Congress. Appropriately, because America was Imperial Japan's main foe, and as a civilised country it is qualified to receive apologies from another civilised country. Inappropriately, because the United States has more to apologise to Japan for than Japan has to apologise to America for.
First of all, it should be pointed out that Japan owes no apologies whatsoever to any European nation for its actions in WWII. Nazi Germany was but a distant ally of Imperial Japan; the country played no role in the European war theatre. The fact that Japan had friendly relations with Hitler's Germany is beyond the point - fascism at the time was a hugely popular new politics, and there were pro-German fascist political parties everywhere from Ireland to India, including one which came to power in Spain, and one which didn't in Britain. Nearly all of these parties were pro-Nazi Germany. That in itself is not a crime, regardless of the crimes committed by the Third Reich.
The fall of Nazi Germany didn't mean the fall of Imperial Japan, although both were allied against the same enemies. The Pacific War, more accurately called the Asia-Pacific War raged on after Germany's defeat..
There are two versions of the Pacific War, a war fought mostly by Imperial Japan and the United States: the first, and by far the best-known, is the semi-fictional version told by the victors. Due the America's massive worldwide media influence, this is the one most people are more familiar with. It has been re-told through countless Hollywood productions, and it invariably portrays the Japanese as mindless militaristic aggressors, hell-bent on conquering all of Asia and the Pacific. Prior to Clint Eastwood's Flags of Our Fathers in 2006, no American-made feature film had succeeded in portraying the Japanese as normal human beings, and to this day no successful US-made film or book has focused on the true facts of America's participation in WWII.
These are the facts of US involvement in WWII: Looking first at the Western Front, the Battle of Britain, in the Autumn of 1940, can be viewed as the first turning point in the Second World War in Europe; Germany was prevented from gaining air superiority over the UK, which was required to launch an amphibious and airborne invasion. At the same time, Britain, supported by Canada (which declared war against Germany several days after Britain), stepped up its operations in the Atlantic against German submarine fleets, and most of the work involved in clearing the sea-lanes of the German threat, which would pave the way for the later Invasion of Normandy, was carried out by the British and Canadian navies.
Looking at the Eastern Front, a week before Japan's attack on Pearl Harbor, and America's consequent decision to enter the war, the Battle of Moscow can be regarded as the second turning point in the war against Germany. It had pushed German troops back by over 320 kilometres, with huge causalities - nearly 900,000 Germans dead, injured, captured or missing in action. Germany's rapid retreat westwards was already underway. At the same time, huge swathes of territory had been won back from Axis troops in North Africa. By the time of American president, Franklin Roosevelt's declaration of war on Japan, Germany's defeat was already a certainty; the only questions remaining pertained to the circumstances of this defeat: would it be total or negotiated, and how much territory would Germany be allowed to keep?
America felt it had - relatively - little to lose by joining the war. It's focus would not be the European theatre in any case, but the Asia-Pacific theatre. On the other hand, it had much to lose by not joining Britain, Canada, and the free forces of the various occupied European nations. It would not be entitled to reap the spoils of war, nor to "win the peace which will follow the war", as Roosevelt put it.
The United States has never had to fight a war for its survival in the same way as many European nations have, and thus it has never - even now, in the 21st century - had to enter a military conflict where it didn't believe the odds were overwhelmingly stacked in its favor. America certainly didn't believe fighting against Japan would be anything remotely like fighting against Germany.
Most Americans at the time of the Japanese attack on Pearl Harbor felt the Japanese to be an inferior people, and few felt any qualms at seeing second- and third-generation Japanese-Americans rounded up and put in what Roosevelt himself called "concentration camps", even as the same thing was happening to Jews in Europe. In fact, the American military top brass didn't even believe the attack on Pearl Harbor could have been devised by the Japanese; they felt the raid had to have been planned by the German military on Japan's behalf. The United States didn't realize how difficult the fighting against Japan in the Pacific would be. (Britain did, as the country had been largely responsible for teaching the Japanese how to build aircraft carriers and fly planes off them, as such technical skills and knowledge were transferred to Japan under the Anglo-Japanese Alliance.) By 1941, Japan's navy was the world's most powerful, and among the aerial weaponry Japan boasted was the Mitsubishi Zero fighter, which would prove superior to any fighter the US had in its arsenal.
Immediately after the raid on Pearl Harbor, America retaliated in a similar fashion to Japan's strategic masterstroke at Pearl Harbor. In what was called the Dolitttle Raid, 16 US Army Air Force bombers attacked military installations in the Japaese home islands. It was one of the few bombing raids deliberately targeting military installations that was in large part successful. Thereafter, as American frustration with lack of progress and unwillingness to risk lives set in, US air raids turned to 'bomb anything' mode, which would later becomes the modus operandi for bombing other Asian nations.
Of course, by the time the Pacific War was entering its final stages, America was only too familiar with the kind of foe it was up against. Even in 1945, Japan was not an enemy which could be taken on on equal terms. To hasten Japanese demoralization, America stepped up bombing raids on civilian population centres in the home islands, one raid of which (Operation Meetinghouse) on the 9th to 10th of March, 1945, was later estimated to be the single most destructive bombing raid in history.
Almost 90% of the bombs dropped on the home islands of Japan were delivered by the B-29 Superfortress strategic bomber, flying at a safe altitude of anything up to 9,000 metres. These bombers were later estimated by The Tokyo Fire Department to have killed 97,000 people, and left 125,000 wounded.
Although indiscriminate bombings of urban areas are not normally – even today - called 'massacres' or 'act of terrorism', that's what they are to the victims. Never was there any controversy over Washington's lack of apologies for the firebombings of Japanese cities; quite the contrary. This style of warfare - aerial mass murder of civilian populations - would come to empitomise the US approach to fighting against resolute enemies like the Japanese; a kind of attempted genocide, born of frustration at not making the land advances the country felt it had to, and unwillingness to risk American lives. Later, in South-east Asia, this frustration drove America to 'carpet-bomb' civilian areas of Vietnam, as well as (neutral) Cambodia and Laos, killing, wounding or making homeless an estimated 6 million people over a 4-year period.
The firebombing of Japanese cities was rounded off with Washington's orders to drop atom bombs on two major Japanese population centres, with full knowledge of the expected results. And also the full knowledge that the Japanese civilian victims would not know what had happened. These particularly massacres would result in tens of thousands of civilians dying painfully slow deaths over the subsequent weeks, months and years.
How can the United States be among the countries receiving these oft-repeated apologies from Japan? Japan had paid the price for its strategic attack on Hawaii dozens of times over by the time the Pacific War ended.
That was the part of the Pacific War which led to Japan's defeat. But Japan's principal victims of aggression were further east on the Asian mainland..
Japan does still owe apologies to its Asian neighbours, particularly China, principally for the Nanjing Massacre and its infamous germ warfare laboratories, of which the largest was Unit 731, in Manchuria. It is estimated that 1,000 staff were employed in these facilities in total, carrying out experiments on hundreds of thousands of human victims, mostly (around 70%) Chinese, but also including men, women and children from Korea, and the occupied states of south-east Asia. 'Experiments' ranged from infecting prisoners with plague, cholera, smallpox and the like to weapons testing on live victims to study the effectiveness of grenades and flame throwers from various distances. Interestingly, the United States, usually so vociferous on the subject of bringing (non-American) war criminals to justice, gave immunity to these Japanese researchers in exchange for their data on human experimentation.
Apart from the Nanjing Massacre, there were also numerous massacres which took place in China and other east Asian countries during WWII. But the victims of these massacres ranged from dozens to several hundreds, more on the same scale, or smaller, that the My Lai and other massacres committed by US troops in Vietnam. Interestingly, the United States, usually so vociferous on the subject of bringing (non-American) war criminals, didn't find it appropriate to follow up investigation of many of the smaller massacres it committed in Vietnam. Even in the case of May Lai, in which over 500 civilians were killed, while 26 men initially were charged, only one, a Lieutenant Calley was convicted, and made to serve the awful punishment of three and a half years under house arrest.
Again, Japan owes no apologies to America. And while it can be argued that it hasn't apologised enough to Asian countries, no apology should be given to China, or in China.
It would be a travesty for what has now long been a free and fair, modern state, with the rule of law and all the other trappings of democracy to apologise to a thuggish regime like the one in power in Beijing, a regime little better now than that of Imperial Japan 70 years ago. While China was once a victim of Japanese aggression, the 21st century scenario could not be more different. Now it is China which throws its weight around in the region, intimidating its neighbours and claiming their territories.
Since the establishment of the Peoples' Republic of China in 1950, China has stolen territories from India, Russia, and Korea, and in 1980 it fought desperately in a failed attempt to steal land from Vietnam. The country has swamped Inner Mongolia, Xinjiang (East Turkestan), and the ethnic minority lands of its south-west with Han Chinese migrants in an attempt to obliterate their distinct identities, and it has invaded and annexed Tibet and is currently in the process of doing the same thing there. Its extravagant maritime territorial claims include territories belonging to Japan, South Korea, Taiwan, the Philippines, Indonesia, Brunei, Malaysia and Vietnam, and it has apparently already succeeded in stealing islands belonging to Vietnam and the Philippines. Its claims to territory in the South China Sea reach to within 100 km of the Indonesian coast and they have soured relations with the ASEAN bloc, but not to the point where the country sees any need to change course, and at the time of writing, China is pushing its policy of brinkmanship with military flight incursions over South Korean, Japanese and Taiwanese airspaces. It poses a constant military threat to Taiwan, which it claims as a PRC province, and has done so for well over half a century. It has also openly reneged on promises made to Britain in the Sino-British Joint Resolution of 1984 to allow democratic politics in Hongkong, and not only imprisons and tortures anyone who openly expresses dissent within the PRC, and persecutes their families, but also outlaws any religious or spiritual movement not under its direct control. It has a shoot to kill policy to counter the flow of Tibetans attempting escape over the Himalayas to India, and regularly uses live fire to quell public demonstrations, the most infamous of which was the internationally televised 1989 Tiananmen Massacre, which to this day it denies even happened.
And some people think Japan should apologise to a regime like this? They cannot be serious.
There are some who believe that Japan should express its apologies to Taiwan for the atrocities committed by Japanese troops against Chinese civilians, as Taiwan is the inheritor of the Nationalist Chinese government in power in China during WWII. But this is also a bad idea. While the Nationalists did flee to Taiwan after the war, the island had long been a part the Japanese empire by that time. Many Taiwanese fought bravely during WWII. But most were fighting FOR Japan; almost 200,000 in total.
South Korea, though also a part of Imperial Japan during the war (but not for as long as Taiwan), is more insistent on receiving Japanese apologies than Taiwan. But, here we have the same problem: any apology made by Japan should be an apology to the Korean people. If any government in Asia is less qualified to receive apologies from Japan than China, it is the barbaric regime in power in Pyongyang. How could Japan apologise to a regime that, even today, values human life so little that it is willing to keep much of 'its' population on the brink of starvation in order to stay in power?
While many of the states of the ASEAN bloc have made huge strides towards becoming free and fair, democratic countries (and Myanmar is at least heading in the right direction), the resistance to political and social reform in China and North Korea has ensured that no more meaningful apologies for Japan's actions during WWII can be given to all of Imperial Japan's Asian victims. Looking at the way things are going, it seems likely that by the time these regimes finally collapse, WWII will have faded from living memory, and relevance.
|
0.949428 |
Police believe a father murdered his young son and daughter then hanged himself on Father's Day during a custody battle with his estranged wife.
Deputies from the Sonoma County Sheriff's Department arrived at the Santa Rosa, California, home of Alvaro Camara, 40, on Monday morning to a horrifying scene as they responded to a welfare check.
'I sought help on numerous occasions and said many many many times my children were in danger in their fathers care and I didn't receive the urgent help I needed to save them' the statement concludes.
Deputies found Camara and his children dead inside the home. Camara hanged himself in a bedroom, the bodies of his daughter and son were nearby.
Camara's two children, six-year-old daughter Juliana and 18-month-old son, Julian, spent Father's Day with him.
Neighbors say he lived in the complex only a few months but the arguments between him and his wife were intense on several occasions.
Officers aren't saying how the children died at this time.
Residents had been getting to know the children, after Camara moved in a few months ago. 'A beautiful little girl and a sweet little boy,' said neighbor Julia Poncia.
'It's an absolute tragedy to see two young children lose their lives in a custody dispute,' Santa Rosa Police Lt. John Cregan.
Detectives were at the scene all day Monday, trying to determine a timeline, and a trigger for the sudden violence. Camara was supposed to hand the kids over to his estranged wife at his apartment Sunday evening at 7pm.
When no one answered her knock she called the Sonoma County Sheriff's Department. Deputies Sunday night found Camara's place dark and quiet as well, and figured he was extending his Father's Day visit with them.
They left, and returned Monday morning, with worried relatives. Climbing through a bathroom window, they were able to find the bodies.
Still, there appeared to be no warning of the violence.
Camara's estranged wife lives outside city limits, so she reported that her kids were unaccounted for to the Sonoma County Sheriff's Department.
Deputies Sunday night found Camara's place dark and quiet as well, and figured he was extending his Father's Day visit with them.
They left, and returned Monday morning, with worried relatives. Climbing through a bathroom window, they were able to find the bodies. 'They took off a screen on the window and were trying to go in there,' described a neighbor who gave her name as Tanya.
She lives above the Camara unit, and thought the commotion at his door was odd, because she is convinced she heard him and his daughter speaking earlier in the day.
Another neighbor said Camara had seemed nervous over the weekend.
The couple had been together about eight years, and filed for divorce only a few months ago.
Police say it's too earlier to know if a more aggressive search for the children might have made a difference.
'We're stilll going to be exploring the timeline to determine when the children were last seen and when the tragedy occurred,' Cregan said.
|
0.95202 |
Here is a list of top 7 ecommerce trends that should be on every retailer's radar for 2017.
1. Mobile, Mobile, Mobile-- The growth of mobile is hard to overstate. In fact, it has gone beyond a trend and has become a key pivot in business, with mobile being used at every stage of the purchasing journey. Marissa Tarleton, CMO of RetailMeNot explains, "mobile content is influencing purchasing decisions on desktop, in-store, and on mobile. The most progressive retailers are now developing their content and marketing strategies with mobile first." Retailers need to move to a mobile-first mentality, rather than simply optimizing their websites for mobile.
2. Mobile Payments -- With the advent of Apple Pay, and with customers generally becoming more comfortable using mobile, the conventional wisdom that customers would browse but not convert on mobile is coming to an end. In Deliotte's 2016 Holiday overview, they found that 78% of smartphone owners planned to use smartphone for holiday shopping. And it's used not just for researching or cost comparison -- 43% made purchases directly on their smart phones. These numbers are only expected to increase in 2017. Brands need to make their check-out process as simple and frictionless as possible for mobile users.
3. Personalization -- This can range from informed targeting, that understands how to reach the right demographic at the right time on the right platform, to breaking away from the one-size-fits all website. Michael Klein, director of Industry Strategy, Retail at Adobe suggests brands take a "crawl, walk, run" approach to personalization. For example, in the crawl phase it can be as simple as "recognizing somebody that's already done business with me vs. somebody that's brand new" and revising the conversation by serving different content on a homepage instead of giving the same thing to everyone. Then gradually breaking customers into more granular personas.
4. Dynamic Automation -- Avoid mass outreach. Jamie Anderson, CMO of SAP Hybris explains: "If the data is outdated, marketing automation is a waste of time, because you're never relevant. It's that relevance that drives better engagement by touching each customer based on their propensity to buy or fulfill the next step in the process -- at that point where they're actually interacting with you."
5. AI -- While brands should meet customers where they are, in recent years, the number of channels and ways of communicating have exploded exponentially. With AI, brands can interact directly on social media platforms, using a combination of chatbots and live support. Mikhail Naumov, President & Chief Growth Officer, DigitalGenius points out, "A contact center reinforced with a layer of artificial intelligence is much more resilient and capable of handling spikes in volume through a combination of human & machine intelligence. Customers get their answers quickly, alleviating their anxiety."
6. Seamless Experiences -- The growth of mobile usage in-store means that retailers need to be more focused than ever on creating seamless shopping experiences. The customer experience online and in-store should feel consistent. For example, Michael Klein, director of Industry Strategy, Retail at Adobe praises Nordstrom's implementation of endless aisles as "really empowering the consumer and the store associate to get access to whatever product is available in the system, whether on the website or in a store." Customers need to feel like they're interacting with the same company and getting the same information across all channels.
7. Delivery Expectations -- Delivery and returns have always been a pain point for online retailers, and customer expectations ever increasing. Beyond free shipping and returns, retailers need to continue explore a range of delivery options, including same-day service or local drop-off. However the pay-off is worth it. Bill Kong,Executive VP of Products and Services at CommerceHub says their data "reveals that on average, order conversion rate (OCR) increases by 4.3% for every day a retailer can shave off of its delivery promise."
Between the tremendous growth of mobile, the ability to increasingly personalize the customer journey, and new technologies, 2017 promises to be an exciting year of growth for online retailers.
|
0.998447 |
Which of the following is the legal term for a severe mental illness that was present at the time a crime was committed and impaired the defendant's capacity to understand the moral wrong of the act?
Insanity is the legal term for a severe mental illness, present at the time a crime was committed, that impaired the defendant's capacity to understand the moral wrong of an act. Insanity is not a medical diagnosis.
Idiocy is any severe mental deficiency present in early childhood. Dementia is a progressive loss of mental function characterized by memory impairment. A psychosis is a mental disorder in which there is a severe loss of contact with reality; it is a common feature of schizophrenia. A neurosis is an unconscious conflict that produces anxiety and leads to the use of defense mechanisms.
How does one define a psychological abnormality?
While this may seem like a very broad definition—perhaps classifying deviant behavior rather than a psychological abnormality—psychological abnormality is defined by this crucial element: the individual suffers due to a reocurring problem or disorder. That is, the individual suffers involuntarily at the hands of the disease and has little control of the symptomatic behavior of the illness. They often want to change their illness as opposed to continuing on how they are.
There are many existing theories on psychopathology and how to diagnose people for disorders. One of the main challenges is putting these theories into practice while many biases, stereotypes, and prejudices against different social sectors of society still persist. Which of the following is a practical example of this dilemma?
Common social biases include gender, race, economic class, ethnicity, and many more. Many are not even conscious that they carry these prejudices, and the best we can hope for improvement is to become aware of and change these biases as a society. Current statistics suggest that African-American males are more likely to be diagnostics as psychotic than Caucasian males in instances of subject abuse. This is an example of stereotype and prejudice intersecting professional diagnosis in an increadibly detrimental and socially dangerous manner; even though the individuals may display the same symptoms, they are given different diagnoses.
Which of the following is a real and practical concern of labelling a person with a certain disorder?
One of the major practical concerns with giving a person an official diagnosis is that it may become hard for a person to escape the label of that diagnosis. For instance, if a person is diagnosed as schizophrenic, observers may already have a preconceived notion of that person and behave differently towards them. If the diagnosed person sees they are treated as different, this may reinforce negative behaviors and perpetuate the stigma. Even if the person diagnosed as schizophrenic shows positive progress, observers may still have trouble thinking of them as a healthy, stable person.
Which of the following is not a symptom of Narcissistic Personality Disorder?
Because narcissists are so focused on themselves and their own needs, they often neglect the needs of others, sometimes even exploiting these others for their own gain.
Recently, Joe has realized that he hasn't been enjoying his hobbies or spending time with his friends as much as he used to.
Anhedonia is defined as the loss of the ability to experience pleasure. Since Joe is no longer enjoying his hobbies (which are, by definition, activities he likes and enjoys), and spending time with his friends (who are, by definition, people he likes), it is reasonable to assume that he is experiencing some degree of anhedonia.
Which of the following is true about the DSM 5?
The DSM (Diagnostic and Statistical Manual of Mental Disorders) 5 is the latest, not only, edition of this guidebook for psychologists. The DSM helps psychologists diagnose their patients and does not offer explanations for the origins of disorders. Homosexuality used to be listed as a disorder in earlier editions of the DSM but is not included in the DSM 5.
Which of the following is NOT an axis of the DSM used for diagnosis?
Even if you didn't know these exact axes, it is important to remember that "insanity" is not a clinical term ever used in the DSM or by therapists.
Although diagnosis is necessary for treatment, what is one possible negative consequence of labeling someone as having a particular disorder?
When someone is diagnosed as having a particular disorder, there is sometimes stigma (shame or disgrace) associated with this labeling, which is the opposite of the answer choice "social acceptance."
As for the other answer choices, comorbidity is the concurrence of multiple psychological disorders in one person. The placebo effect occurs when someone believes that they are being treated for something (when they are really not) and subsequently improves as a function of that belief. The diathesis-stress model explains the interaction of genetic and environmental factors in terms of disorders-- the diathesis is the predisposition to a disorder that is triggered by some sort of stress.
Which of the following does not act as a risk factor for developing a psychological disorder?
Race, gender, SES, and family history all play roles in the development (or non-development) of a disorder. For example, women are more likely to develop most psychological disorders, especially mood and anxiety disorders, but men are more likely to develop substance abuse disorders. Race can also impact vulnerability for certain disorders and low SES is associated with higher rates of many disorders, such as anxiety disorders. Family history is perhaps the most significant risk factor because genetics play a large role in whether someone is likely to develop a specific disorder.
If there is any connection between family size and psychopathology, it has not been researched or documented and is therefore has not been directly indicated as a strong risk factor.
|
0.971567 |
"Europe & Me", a UK online lifestyle magazine for young Europeans, won first prize at the Charlemagne Youth Prize 2011 on 31 May in Aachen. The second prize went to "Balkans Beyond Borders", a short-film project (Greece) and the third to the "Escena Erasmus Project" (Spain), a cultural exchange programme for Erasmus students. The Charlemagne Youth Prize is awarded annually to projects that foster a shared sense of European identity and integration among young people.
The first prize was awarded by EP President Jerzy Buzek, the second by EP Socialists & Democrats Group leader Martin Schulz and the third by Mayor of Aachen Marcel Philip.
United Kingdom - "Europe & Me"
EP President Jerzy Buzek said: "The project we chose is extremely original. If you open its web site you will see this. You are faced with an ideal European "Man" or "Woman" divided into five different parts: the brain, the heart, the diaphragm, the baby and the legs - and each part represents a different idea of what being "European" means".
Europe & Me is an online lifestyle magazine created by young Europeans for young Europeans in 2007. Its motto is to "make Europe personal", because Europe is often identified only with politics and bureaucracy. Today, Europe & Me is a platform that allows people to take the initiative, develop themselves and find like-minded individuals.
"I think the main message of this project is that Europe is, can, and should be "cool". This word itself - "cool" - is becoming more and more popular in politics nowadays", added Mr Buzek.
In his speech on the runner-up, German MEP and leader of the European Parliament's Socialists and Democrats Group Martin Schulz said: "Balkans Beyond Borders seeks to overcome borders by making films and raising awareness that all the Balkan countries will gain through regional co-operation. Balkans Beyond Borders has its finger on the pulse of the times with this year's theme of shooting short films on the crisis."
Finally, the third prize went to the "Escena Erasmus Project" (Spain). Launched in 2009, this is a pioneering European project addressed mainly to Erasmus students, encouraging cultural and linguistic exchanges. It is intended to become a theatrical "net" which promotes exchanges among European university theatre companies. Presenting the third prize, Aachan's Mayor Marcel Philipp, said that "culture is what holds Europe together in its innermost self and culture is inextricably linked with education".
The three winning projects will receive funding of €5,000, €3,000, and €2,000 respectively. Their representatives will also be invited to visit the European Parliament in the coming months.
Representatives of the 27 projects were invited to the award ceremony on 31 May in Aachen.
The award ceremony was co-organised by the European Parliament and the International Charlemagne Prize Foundation and hosted by Aachen University.
Welcoming speeches were given by EP President Jerzy Buzek, International Charlemagne Prize Foundation Chairman Michael Jansen, and Rector of Aachen University Ernst Schmachtenberg.
|
0.998572 |
how about a secret SPLC-type list for gangs?
If the Boston police had been smart, they would have out-sourced the gang database to some private nonprofit group. Let's keep in mind that many police forces and Federal agencies make regular use of the ADL and SPLC lists of "bad people" as well as their training and education programs. Then police agencies can not only point their fingers somewhere else when asked, taxpayers can save money by not having to cough up to multimillion dollar lawsuits whenever innocent people get falsely labeled as violent extremists and likely criminals, which is apparently very common.
|
0.89312 |
The purpose of stretching before exercise is to help prevent injury by lengthening the muscles and tendons, which in turn increases the range of movement. This helps ensure smoother movement and minimises injury.
Stretching after exercise is to aid in the repair and recovery of the muscles and tendons by lengthening the muscles and tendons. Stretching helps to prevent tight muscles and muscle soreness which usually follows after strenuous exercises.
Thus, stretching improves flexibility, minimises muscle pain, and helps prevent muscles injury.
|
0.995916 |
Information hammers vs information saws?
The relationship between people and information is interesting, and often complex. People have to deal with not enough information, too much information, bad information, wrong information, etc.
And, the idea of "good information", or the right information at the right time, or being able to find the info you need when you need it, seems to represent an almost universal ideal.
People have devised many systems to organize information, from alphabetical lists to collaborative tagging to relational graphs. These systems have been used in many varieties of mundane and interesting combinations, and have produced many gradations of failure and success at providing good information to people.
Essentially, these systems to organize information are like tools and construction materials, and, through trial and error, theory and practice, we're learning things not unlike: saws are better at cutting wood than hammers, and screws are stronger fasteners than nails, etc.
Computer technology has given us many tools to work with information. And, many recent information systems have been built on web technology in particular. But, whatever the domain, it's vital to understand that no tool "works" by itself: a tool works when it's useful to people for a specific use in a specific environment.
Understanding this, that the specifics matter, is what separates a strategic, information architecture-informed, approach to good information from a merely technology-informed approach. This latter approach finds validation merely in tools that currently "work", rather than in tools that work in the specific environment and for the specific needs of the specific people who use them.
In each sub-field under the umbrella of web and system design (including IA, web development, etc.), there are people whose enthusiasm for tools turns into a dogma about the tools and their magical ability to practically work by themselves. When these tools are computer programs, this enthusiasm tends to give tools an air of "artificial intelligence"—the tool just gives everyone good information with hardly any effort on their part!
But, no matter how magical a saw, it's not so great for the people who need to drive nails. And, it's not like hammers work and saws don't—they're just different tools that do different things.
Working from the strategic, information architecture-informed approach, we aren't tied to one information tool over another. We get to see firsthand (and, otherwise, we study secondhand) all kinds of different tools in different environments, used by different people for different tasks. And, we get to use this approach to find and design the right tools for specific people to get good information (where "good information" is, in itself, often something specific to those specific individuals).
|
0.999994 |
All in all, the book was quite readable and informative though I kept hearing her voice in my head as I read. I'm not starting with a potpourri of baffling symptoms and trying to arrive at a diagnosis. In this compelling book, she opens the black box of diagnosis and lets us look inside. Sam died of pneumonia, and he had tested positive for Strep A. If you select a health category rather than a specific study, doctors who have active studies in that area may contact you to ask if you would like to participate. Lisa Sanders' work reminds me of a medical file in that it's a disorganized collectio I didn't think it was possible for a book about medical problems to bore me. In this high-tech world of modern medicine, Sanders shows us that knowledge, while essential, is not sufficient to unravel the complexities of illness.
Wainapel and a patient goes, which is basically how every doctors visits go. The normal skittishness of an eight years old was absent in him. A nurse had informed his mother, Megan, that her son had croup. For instance, in this case of Jamal, several diseases could make this problem- we doctors call them differential diagnosis. These books usually mesmerize me. She cites quite a bit of reasearch supporting her contention but is clearly not dismissive of the value of medical testing in conjunction with the physical exam.
She goes on to give an example of another case when people tend to miss something when they are too busy focusing on something else. The doctor treating the patient was able to come up with the diagnoses based on one symptom that they had noticed. The Medical Mystery bits were definitely my favorites. Boredom may not be an illness, but in this review, equating the two seems appropriate. It reminded me of the humanity of doctors.
While it did work and the patient has been symptom free of his thoracic outlet syndrome problem, adson's maneuver is not very well heard of and many doctors question to know if it is worth something. Lisa Sanders is the most acute observer of health care in America. I will never forget the first time a pdeiatrician stood next to me as I looked at a baby's spinal fluid and when I told him there were no white cells in the fluid it looked completely normal he seemed baffled. Through the miracle of FaceBook, after several decades we reconnected. Many of these maneuvers don't work. The This title is far more a memoir than it is a book that is directly focused on the subject matter of the title.
Sure the author throw us a bone here and there, in the form of a very brief patient case, then followed by yet another 50 pages about the physical exam and 10 more pages full of statistics about how doctors don't know how to use a stethoscope. But far more complex than just a story. An illustration of a medical mystery that should not have been the case is that of the patient with pernicious anemia referred to above. The ability to give this unnerving and unfamiliar place a name, to know it—on some level—restores a measure of control, independent of whether or not that diagnosis comes attached to a cure. I think there is a lot in this book that can help doctors become better listeners and diagnosticians. A big part of helping doctors diagnose patients comes from physical exams, although there are a few techniques that overtime have turned out to be useless.
For those interested in the case history type thing I recommend instead Oliver Sachs Awakening and The Man Who Mistook His Wife for a Hat I was a little disappointed in this book. And jumps to various chapter headings which almost randomly center on different aspects or various instruments of the patient physical examination by the medical doctor. Instead, the further I read, the more I felt repulsed by the book. I have the diagnosis: boredom -- so my task is to identify the causes. But what sets her apart is her Holmes-like eye for the clues—and her un-Holmes-like compassion for those who suffer.
The man had an anxious face- definitely for his son. The ability to give this unnerving and unfamiliar place a name, to know it—on some level—restores a measure of control, independent of whether or not that diagnosis comes attached to a cure. Often, I will come to know a patient eventhough I never see their face through their lab resutls. As is made obvious from the breakdown above, the book is really a lot more about diagnosis than about medical mysteries, which disappointed me somewhat as I was rather looking forward to a Sherlock Holmes-esque book, like a collection of stories of strange cases and extraordinary diagnoses made by doctors and subsequently collected by Sanders — in short, I was expecting a book that read like a compilation of House, M. Lung abscess was one of the differential diagnosis and the most probable one. I am so grateful that Amy let me read this book. Medical Schools are trying to imprint the importance of physical exams on their students, but based on what Sanders said, I don't believe that many future doctors will see physical exams as an importance.
Unfortunately, uh, there are hardly any patient stories. Written by a physician I respect and a writer I love, the book is filled with intriguing diagnostic dilemmas that will draw you in, and with human stories that will linger in your mind—and heart—long after you are done. Without an accurate diagnosis it is not possible to provide treatment that works in the large majority of cases. No, I had definitely not seen a gorilla. The tales here crackle with suspense. The chapters on Lyme disease which is uncommon in my country and digital diagnosis are enlightening as well.
Sanders shows how the declining practice of the physical exam, as well as problems in teaching it, have left American doctors lacking a vital skill that could have allowed them to diagnose an illness properly, or sooner While Sanders is quick to clarify that the physical exam is not infallible, she does emphasize the fact that it teaches necessary skills every good doctor should have — not least that of careful observation, which is crucial in figuring out just what is wrong with the patient. When the doctors found out it was the weed that made her feel this way they told the patient. The professor advised him an X-ray and blood test. A bearded-man in a knee long panjabi with his wife peeked through the door. Doctors are human, of course, and one can hardly blame them for making mistakes precisely because they are human, but what this book shows is that sometimes, those mistakes are made due to sheer carelessness. The ability to give this unnerving and unfamiliar place a name, to know it—on some level—restores a measure of control, independent of whether or not that diagnosis comes attached to a cure. And yet, while the human brain is the most powerful analytical tool doctors have when it comes to coming up with diagnoses, it is also potentially the weakest.
|
0.975322 |
A cluster is a group of computers that work together as a single system.
A Kubernetes Cluster is a cluster that uses the Kubernetes container-orchestration system to deploy, maintain, and scale Docker containers, allowing your organization to automate application operations.
Each computing resource in a Kubernetes Cluster is called a node. Nodes can be either bare-metal servers or virtual machines. Kubernetes classifies nodes into three types: etcd nodes, control plane nodes, and worker nodes.
etcd nodes run the etcd database. The etcd database component is a key value store used as Kubernetes storage for all cluster data, such as cluster coordination and state management.
etcd is a distributed key value store, meaning it runs on multiple nodes so that there’s always a backup available for fail over. Even though you can run etcd on a single node, you should run it on multiple nodes. We recommend 3, 5, or 7 etcd nodes for redundancy.
Control plane nodes run the Kubernetes API server, scheduler, and controller manager. These nodes take care of routine tasks to ensure that your cluster maintains your configuration. Because all cluster data is stored on your etcd nodes, control plane nodes are stateless. You can run control plane on a single node, although two or more nodes are recommended for redundancy. Additionally, a single node can share the control plane and etcd roles.
Kubelets: An agent that monitors the state of the node, ensuring your containers are healthy.
Workloads: The containers and pods that hold your apps, as well as other types of deployments.
Worker nodes also run storage and networking drivers, and ingress controllers when required. You create as many worker nodes as necessary to run your workloads.
Now that you know what a Kubernetes Cluster is, how does Rancher fit in?
Rancher simplifies creation of clusters by allowing you to create them through the Rancher UI rather than more complex alternatives. Rancher provides multiple options for launching a cluster. Use the option that best fits your use case.
If you use a Kubernetes provider such as Google GKE, Rancher integrates with its cloud APIs, allowing you to create and manage a hosted cluster from the Rancher UI.
Be provisioned through Rancher’s UI, which calls Docker Machine to launch nodes on various cloud providers.
Be a prior existing node that’s brought into the cluster by running a Rancher agent container on it.
Using Rancher, you can create pools of nodes based on a node template. This template defines the parameters used to launch nodes in your cloud providers. The cloud providers available for creating a node template are decided based on the node drivers active in the Rancher UI. The benefit of using nodes hosted by an infrastructure provider is that if a node loses connectivity with the cluster, Rancher automatically replaces it, thus maintaining the expected cluster configuration.
You can bring any nodes you want to Rancher and use them to create a cluster. These nodes include on-premise bare metal servers, cloud-hosted virtual machines, or on-premise virtual machines.
Users can import an existing Kubernetes cluster into Rancher. Note that Rancher does not automate the provisioning, scaling, or upgrade of imported clusters. All other Rancher features, including management of cluster, policy, and workloads, are available for imported clusters.
|
0.912492 |
(file photo) Mehdi Karrubi has been missing for six weeks, according to the International Campaign for Human Rights in Iran.
Tehran, Iran (CNN) -- Iranian opposition leader Mehdi Karrubi has not been seen for six weeks and may be facing psychological torture by the government, activists claimed Monday, citing sources in the country.
"We are extremely concerned for the health and well-being of Karrubi, who is 74 years old, and no one has heard from him for six weeks, not his wife, any family or associates," said Hadi Ghaemi, the director of the International Campaign for Human Rights in Iran.
His wife said she had not had any contact with him since July 16, the campaigners said, citing the opposition leader's official website.
Ghaemi alleged that Karrubi is "surrounded by a team of psychiatrists working with his captors" to try to manipulate him into a televised confession. He cited "a credible source from inside Iran," without saying who it was.
An opposition website said February that both Karrubi and Mir Hossein Moussavi, another opposition leader, had been detained.
The website, Kaleme, citing "trusted sources," reported that the men and their wives had been arrested and taken to Tehran's Heshmatieh prison.
The semi-official Fars news agency denied the report, citing an unnamed judiciary source, but it had earlier said that the government had restricted the movements and communications of both men.
The two, who are both former government insiders, both ran for president against Mahmoud Ahmadinejad in the disputed 2009 election that led to months of protests and a government crackdown on the opposition.
Iranian authorities rounded up opponents afresh in February, as revolutions swept the region.
Iran media said Monday that that Karrubi was being kept in an unknown location but did not include any comments from Iranian officials.
International journalists have been limited in their ability to gather news in Iran, where the government has squelched the media and maintains tight control over state-linked news organizations.
|
0.99979 |
I have heard parents say, "He ALWAYS gets up early. Winter and summer, he's up at 6 AM." The same parents who say this in despair have successfully changed their child's internal clock twice in the previous year. How do I know? Because twice a year, OUR clocks change - to and from standard time. If we can change a child's internal clock in November and April, we can do it any time of the year. It takes about a week or so to get the change to work. A one day try just doesn't work. The keys to successfully adjusting a child's inner clock are: 1) Don't expect more than an hour's change at a time. 2) Wake the child at the same time each morning for about a week. Soon the child will automatically wake up at or near the target time every day. Of course, if the child is sick, she will need extra rest. If you keep the child out late, she may wake up at the same time anyway, but be VERY cranky. Or, she may wake up fine and get cranky later. It's the same idea when traveling to another time zone - and back again. PLEASE also remember to slightly adjust meal times for the first week of a clock change. More adjustment at the start of the week, gradually changing to less by the end of the week. If the children nap, adjust those times slightly as well. Hungry and tired children are cranky children who can present us with all sorts of (preventable) challenging behaviors.
|
0.949571 |
Trimming the CCC List The latest CCC list (dated 7/31/18) contains 894 stocks.
This month I used the new screener available at Simply Safe Dividends to look for very safe stocks with positive free cash flow in each of the last 10 years. Additionally, I screened for stocks with low or very low betas and stocks that have paid a dividend for at least 20 years.
I added stocks produced by the screener (that also appear in the CCC list) to the dividend growth stocks in my DivGro portfolio. In all, there were 76 candidates.
Collectively, the 76 stocks have a fair value downside of about 3%, but they show a strong one-year return of about 15%. Furthermore, the stocks have outperformed the S&P 500 by about 46% over the last five years.
|
0.997528 |
If I don't have apple cider vinegar to make pickled carrots, can I use a white wine vinegar instead?
Sure. I would use just a touch less and then taste afterwards to see if you want a bit more sweetness. Then you can add a little sugar if you like.
|
0.999998 |
Ask me to name my favorite living writer, and I just might name J. M. Coetzee, formerly of South Africa, now of Australia. I think his best novels are Disgrace , Elizabeth Costello and Slow Man , and I also get a tremendous kick out of his two recent meta-fictional adventures in psychological self-deconstruction, Diary of a Bad Year and Summertime , the latter of which has sometimes been mistakenly assumed to be the third volume of his ongoing memoir, following Boyhood: Scenes From Provincial Life and Youth: Scenes from Provincial Life II . But Summertime, a fragmented third-person narrative about a dead writer named John Coetzee, is no memoir.
Strangely, I'm more likely to recommend his late period works than his most famous novels, which are his earliest ones: Waiting for the Barbarians , Life and Times of Michael K and The Master of Petersburg . These books won the author a Nobel prize, but the stone-faced dead seriousness of these downbeat parables can be hard to take. As he got older and more successful, Coetzee seemed to become lighter or warmer-hearted, and began challenging himself to write more playful, experimental and archly self-referential novels. Word is out that his very latest novel, The Childhood of Jesus , may be the most expansively allegorical, spiritually provocative and magnetically enigmatic of them all.
The temptation, when faced with a book as conceptually rich and as brilliantly wrought as The Childhood of Jesus, is to describe it as a masterpiece. That would be to succumb to a hazy reverence of a kind antithetical to the author’s project. Nowhere since Disgrace have the architectural structure of Coetzee’s fiction, the import and music of his words, been so reverberantly interlinked. Yet Coetzee’s work insists that a too easy submission to myths of romantic creativity is religious mania transposed on to a profane realm.
Indeed, it cannot be this one novel (which won't come out in the USA for another month, and which I haven't yet read or even seen) that is a masterpiece. J. M. Coetzee's entire career is the masterpiece.
In lieu of saying anything about this impressive writer that might pretend to cast light upon his work, I point instead to a recently-created fake Twitter account, @FunnyJMCoetzee, that imagines what the world would be like if J. M. Coetzee ever got on Twitter. This may be as close as we'll ever get to finding out.
The book cover image at the top of this page represents the Polish edition. I chose this because this cover is boring and this one just strikes me as wrong.
2 Responses to "J. M. Coetzee, Master of the Enigmatic Novel"
Yeah Coetzee's one of the greats. Disgrace floored me. It was a book that had me yelling "No not this" out loud as I read. It's just merciless. That, Foe, and Michael K for me. Can't wait for his new one. I hope it's more The Gospel According to Jesus Christ and less The Gospel According to the Son.
I've been reading, at your instigation, Waiting for the Barbarians: stunning stuff. I read Disgrace a few years ago and found it powerful, but then Coetzee got pushed out by other things until now. Thanks for bringing him back into my orbit.
|
0.999857 |
Recommended by Diego Klabjan, Professor at Northwestern Engineering, who said: “Perhaps the biggest news in Q1 was OpenAI and their GPT-2 model. The caveat is that as a non-profit organization they decided not to release the (trained) model due to concerns related to its possible use to create fake text”.
Extract: Our model, called GPT-2 (a successor to GPT), was trained simply to predict the next word in 40GB of Internet text. Due to our concerns about malicious applications of the technology, we are not releasing the trained model. As an experiment in responsible disclosure, we are instead releasing a much smaller model for researchers to experiment with, as well as a technical paper.
About: Trace the development of Machine Learning from the early days of a computer learning how to play checkers, to machines able to beat world masters in chess and go. Understand how large data is so important to Machine Learning, and how the collection of massive amounts of data provides Machine Learning programmers with the information they need to developing learning algorithms.
Simple examples will help you understand the complex math and probability statistics underlining Machine Learning. You will also see real-world examples of Machine Learning in action and uncover how these algorithms are making your life better every day.
Recommended by Jessica Lennard, Visa. Jessi is Director of External Relations for Visa’s Data Science Lab, having previously been Visa’s UK Head of Regulation and Public Affairs. She has been working in lobbying, policy, communications, reputation and crisis for over a decade. During that time, she has worked for political parties, businesses (start-up to FTSE 100), consultancies, think tanks and NGOs. Her particular area of expertise is highly regulated, highly politicised, technology-driven sectors, including telecoms, energy, and Fintech.
Diversity and inclusion in modern society faces a new risk: Artificial Intelligence. At its best, Artificial Intelligence can have a significant positive influence our home and work lives — Finding new cures to diseases, helping us manage our time better and finding new music that we’d never have listened to before. Without proper checks and balances, however, there’s no guarantee that we’ll see that positive future for AI, or that this gain will be shared evenly across our society. Instead we may end up with AI that limits freedom, benefits society unfairly and reinforces or amplifies existing biases.
Extract: Visual search is becoming important. One recent report revealed that 27 percent of the searches on major websites like Google, eBay, Amazon and others are now for images. Another study indicates that 75 percent of online shoppers regularly or always search for visual content before making a purchase. The prominence of visual search in retail applications has made it a key component of success — but only if it works.
Extract: Modern machine learning is increasingly applied to create amazing new technologies and user experiences, many of which involve training machines to learn responsibly from sensitive data, such as personal photos or email. Ideally, the parameters of trained machine-learning models should encode general patterns rather than facts about specific training examples. To ensure this, and to give strong privacy guarantees when the training data is sensitive, it is possible to use techniques based on the theory of differential privacy. In particular, when training on users’ data, those techniques offer strong mathematical guarantees that models do not learn or remember the details about any specific user. Especially for deep learning, the additional guarantees can usefully strengthen the protections offered by other privacy techniques, whether established ones, such as thresholding and data elision, or new ones, like TensorFlow Federated learning.
Developed by Dimitri Kanevsky, Research Scientist at Google who spoke at the RE•WORK Deep Learning Summit in San Francisco this January.
Extract: Dimitri has worked on speech recognition and communications technology for the last 30 years. Through his work, Dimitri—who has been deaf since early childhood—has helped shape the accessibility technologies he relies on. One of them is CART: a service where a captioner virtually joins a meeting to listen and create a transcription of spoken dialogue, which then displays on a computer screen. Dimitri’s teammate, Chet Gnegy, saw the challenges Dimitri faced using CART: he always carried multiple devices, it was costly and each meeting required a lot of preparation. This meant Dimitri could only use CART for formal business meetings or events, and not everyday conversations.
That inspired Chet to work with the Accessibility team to build a tool that could reduce Dimitri’s effort spent preparing for conversations. We thought: What if we used cloud-based automatic speech recognition to display spoken words on a screen?
Extract: As AI and machine learning begin to perform ever more impressive feats in image recognition and language comprehension, we may ask: could it also transform the task of finding new drugs?
The problem is that human researchers can explore only a tiny slice of what is possible. It’s estimated that there are as many as 1060 potentially drug-like molecules—more than the number of atoms in the solar system. But traversing seemingly unlimited possibilities is what machine learning is good at. Trained on large databases of existing molecules and their properties, the programs can explore all possible related molecules.
Extract: Language understanding is a challenge for computers. Subtle nuances of communication that human toddlers can understand still confuse the most powerful machines. Even though advanced techniques like deep learning can detect and replicate complex language patterns, machine learning models still lack fundamental conceptual understanding of what our words really mean.
About: Nearly half of all working Americans could risk losing their jobs because of technology. It’s not only blue-collar jobs at stake. Millions of educated knowledge workers—writers, paralegals, assistants, medical technicians—are threatened by accelerating advances in artificial intelligence.
RE•WORK White Paper, contributed to by leading minds in AI from Google, Shell, WeWork, XPRIZE, University of Waterloo, MIT-IBM Watson AI Lab and more.
About: With the rapid advancements and applications of AI, conversations have increased around the intentions of this technology. There are concerns that AI could be used with malicious intent rather than for the benefit of human-kind. This paper explores areas where artificial intelligence can benefit society and tackle global challenges such as the environment, education, healthcare and sustainability. Topics including Global AI Inititiaves, the Challenges of AI, Benefits of AI for Social Good, the Future of AI for Good are covered, as well as case studies from Google, Intuitive AI and GoodAI.
|
0.999807 |
I've stayed in many hotels in many places and I am here to tell you that the best service I have ever received was at this hotel. The staff has been exceptional, the room is clean, the shower is strong, there is a beautiful breakfast buffet and a lovely snack center in the lobby after 4pm with hot soup, bites, and again exceptional service. The staff went out of the way to make sure I knew where I was going and to make sure I had everything I needed. Above and beyond. The room was terrific and insanely quiet with modern features like USB ports and a cell phone available if needed to bring around the city. The little spa and gym was lovey as well. The location is very central but also very quiet. I cannot recommend this place more highly, it was one of the best and most accommodating places I have stayed and at a very fair rate as well.
Nice location, quiet as it's just off the main streets but very accessible.
Great hotel with lots of freebies and awesome spa.
|
0.939935 |
Why do decent people really care about others they barely know?
To be completely honest, I have absolutely no idea. I guess just how we are.
I'm not sure about everybody, but sometimes I feel this strange sort of connection with someone. Crazy, a bit. Somtimes, when/if hanging out with them you see that they aren't as you thought, but at first you don't know that. Sometimes, when you look into someone's eyes, you see that they have so much more than you'll ever know to them. Different type of connection I guess. Some are just really caring people for different reasons. Sometimes it's because the person has been hurt and wishes no one else the same pain. Lots of reasons I guess.
It is easier to imagine the circumstances of strangers because our ignorance leaves a blank slate upon which to project our sympathies. Those people we know, we judge, and are often less generous in our opinion of them.
Because it makes them feel better about themselves.
It's simply called, "Random Acts of Kindness". Some people are just better at it than others.
Do they really care? About someone they barely know? Or maybe decent people just care about people. Humans.
They want to feel loved and important.
Because I care for my mother who has alzhiemers and it makes me upset knowing she is not the person she once was. If I cared for someone I didn't know it would be different because you are not attached.
there is some truth to the statements here that it is easier to "love" those you do not know. that is why I get "hands on" by going to Bali and meeting the people I help. then I know their names, their hopes, their pain.
Personally, I think it's God working through me that makes one reach out to care or reach out to somebody I may not know.
Every kind act we do unto another will benefit both them, us and the world around us. Like the old saying, what goes around comes around. What does it matter if you don't know them. Just as your family and friends, they are living entitys' with a mind and soul and feelings. We are not so different, any of us.
It's human nature to want to reach out and care for others, like WE ALSO want to be cared for. It's just that some people force themselves to look away so often it becomes an aweful ingrained habit.
I call it having a heart.
Empathy. People have the ability to imagine how they would themselves feel if they were in another person's shoes, and then they feel compassion.....not all people, but there are a lot of really nice people out there.
They view everyone the same way,with compassion and understanding.They realize the hopes and problems that others have.
I more surprised that people aren't touched by strangers' plight. How could you NOT care about the suffering of a fellow human. I feel attached to all people, they are all my family in some way. I care for those hurting and sad, I can't help it.
THATS WHAT MAKES PPL DECENT, ITS BECAUSE WE CARE.
i am a bit of a cynic, and i do not LIKE everyone at first sight... however, one of my good friends is really realy kind to EVERYONE he meets... to their face. it's not like he back stabs, but even if he finds someone annoying or if he really doesn't like them very much, he will still be nice to them when he sees them. personally, although i think that many ppl are just generally nice ppl who have the gift of being able to see the good in everyone, i think that a lot of times [as in the case of my friend] he wants everyone to like him and to think that he is a good guy, so i think that is why he is so kind to everyone, even if he doesn't know them very well.
Ultimately, none of us are separate from the whole of humanity -- this is our true nature as beings. Sometimes we're aware of this connectedness, and much of the time we're not. When we're not aware of it -- when we feel separate from others -- it seems strange that we would care about what happens to others. But when we are aware of our true nature, caring about others is quite obviously a natural expression of being ourselves. So there's nothing mysterious or mystical about it at all, and it's not a matter of "if I do good for others, I'll get good stuff", nor is it a matter of obligation or moral rule. It's just who we are, when we're being our true self. It's the notion that we're separate from others which is actually a delusion.
Do people really? I hate to sound cynical here, but most, if not all of it, can be reduced to narcissicm, an unconscious or conscious desire to impress others (including God) with your "goodness", gut emotional reactions as a result of "seeing" or "hearing" something that strikes you, or tax deductions. I'm not saying any of that is bad, and it's a good thing some people are doing this sort of thing, but just because the results are good doesn't mean we should necessarily always ignore the causes, or lie about what they actually are so we can put false motives on pedestals. Also, many (most) "decent" people care but don't give to charity, or actively do anything besides think about these strangers and say "awwww" every now and again. "Caring" without action is useless, especially to those that might benefit from that action. Really, if you get right down to it, can a truly "decent" person who "really" cares about others even life a normal life with the occasional leisure or luxury? The altruistic imperative is to try to work as hard as possible to make as much money as possible, no matter how thankless or joyless, and then subsequently send nearly all of that money to needy causes, keeping only what you need for basic living expenses and work, and also making sure you spend every free moment volunteering, taking downtime only for sleep and nourishment (minimizing both to maximize volunteer time). There are definite and real limits on the "caring" about others "decent" people barely know - they always care about themselves more. Which is good, healthy, natural, and human - let's not forget the value of that too, eh?
This is a good question, indeed, why? Especially in ancient times were people concerned with strangers. The word “hospitality” as used in the Bible is translated from the Greek word phi•lo•xe•ni´a, which is made up of two root words meaning “love” and “stranger.” Thus, hospitality essentially means “love of strangers.” However, this is not just a formality or a point of courtesy. It involves one’s feelings and affections. The verb phi•le´o, according to James Strong’s Exhaustive Concordance of the Bible, means “to be a friend to (fond of [an individual or an object], i.e. have affection for (denoting personal attachment, as a matter of sentiment or feeling).” So, hospitality goes beyond love based on principle, perhaps out of a sense of duty or obligation. It usually is an expression of genuine fondness, affection, and friendship.
Once we realize we are all made of the same sort of flesh, share the same planet and resource, and have common hurts and dreams, it is pretty easy to view strangers as friends we just haven't met yet.
Life is fragile, you do to others, as you would like done unto you.
One of the best parts of being a human being is our commonality with everyone, even those 'we don't know.' In one way or another, each human shares this specific form of universal wisdom, most usually hard-won or well earned, not just by the challenges of hardship, but equally understands the wisdom attained by qualities of any joy being shared. In this view, there are never strangers nor are most people 'unknown' to us. So many phrases pop up into my mind as I write this: 'There but for the grace of ...' '... don't throw the first stone ...' 'Walk in another's shoes ...' 'People who live in glass houses ...' and more. Except for our childhood years, no one really 'needs' another person to take care of them. We may be quite content to reach our own potentials, giving love, affection and care to our 'little world' and receiving these gifts in return. However, the literal world IS a human family! I believe and practice an ideal -- sometimes failing of course because of my own humanity -- that it isn't 'my job' to help others whether known or unknown to me. Its my absolute privilege! In some ways I view this with a sense of irony! Over my years, I have witnessed some people who 'talk' about love. Talk ... about wanting 'to give' and 'I would IF I had something [more] to give! GIVING is its own reward, especially when done either in silence, with no need for reciprocity and accomplished with the 'selfish' understanding that ones very own sense of personal character is on the line! I love the phrase: 'Practice random acts of kindness!' This is a daily 'duty' I take on with a gleaming, inside smile of attitude. Sometimes it may be putting that extra quarter in someone's almost expired parking meter ... sometimes picked flowers from my garden, left on a door step without a note ... sometimes a song sung on someone's answering machine (I don't leave my name) ... sometimes even small amounts of cash for the very least expecting ... some times one of my water paintings given without reward nor need for one ... Maybe its that pot of soup for that old lady down the street whose husband just passed, the children gone after the funeral. (You always meant to meet them ...) Maybe a loaf of home-made bread to a homeless person in the park (I never, ever give that 'spare extra change,' as I believe there is no such thing). Lest you think of me as only 'unrealistically altruistic,' I remember reading somewhere 'In order to get what you want, you must FIRST be willing to give it! And what do I want? A loving, cooperative world.
For me it's the good feeling that comes with being helpful. The smile on their face or a hug means so much...and it doesn't cost a cent to be caring.
Another reason is empathy, the ability to share in another's emotions,thoughts, or feelings. Oops already said. Its worth repeting.
The world is made better for all when even one is lifted from despair.
The altruistic impulse. Dolphins have this too.
Most don't unless they are put on a spot or others know about it. People lie about how much they care.
a natural healthy wired in endorphin response while actively caring.
Because they feel pain, too! I don't want anyone to hurt! Besides they are all my brothers and sisters.
The caring, empathetic hormone oxytocin is released and it makes the carer feel good about helping someone in need.
It is called compassion for others.
Naturally occurring compassion. for me it generates a good feeling inside me.
How much do you care what others think about you?
Be honest non-vegans, do you really care about the welfare of the animals from which you get your meat, milk and eggs?
Does not wearing makeup put me at a disadvantage in some way? Why do other people seem to care about me not wearing makeup?
Why do I care so much about other people, even after they hurt me?
Do you know any evil people?
Why do people have to read something while they poop?
Why would a person care so much about a friend even after finding out the friend wasn't a true friend? Why do some people take friendships more serious than others?
Do you tell some people what they want to hear, just to make them feel better, even when you know its a lie? and do you feel bad about lying, or good about helping them?
|
0.970243 |
What the hell does Che Guevara, the infamous Cuban revolutionary, have to do with Buddhism? I'm guess it's probably never been on the radar for most of you, and I'm also imagining that the very mention of the name sparks powerful reactions for some of you. Freedom fighter. Compassionate doctor. Communist troublemaker. Armed terrorist. Maybe one or more of these phrase fit how you place him. Certainly, the man has been romanticized on the one hand by people on the left who sport t-shirts with his image, and/or have seen movies like "The Motorcycle Diaries" or who have read his writings about the impact of colonialism, capitalism, and the dream of a unified American continent (north and south). Whatever the chosen image, he almost always seems to be larger than life.
Arguelles goes on to say she really didn't know why she had asked him that, of all things, and how her friends wondered, in amazement, why she spoke of the Buddha of all things to this powerful political figure. And then she writes that a few weeks later, her father, who worked closely with Guevara at the time, arrived home one day with a package. It was another book of poetry, with a letter in it that said "Che said to tell you he looked very hard for what you wanted but couldn't find it. He sends you another book of Neruda poems for your collection." What's totally interesting to me is that her father knew nothing of the earlier exchange; he simply brought the message and book home to his daughter.
Now, maybe this is just a nice story, you might say. In fact, some of you might think it's propaganda to support a more positive image of the man. Whatever you think of Guevara, it's worth noting that this story is a great example of how people - especially well known people - are usually much more than we see. The human mind tends to compartmentalize well-known people, or even people we know, by ignoring the whole picture, or assuming there's nothing beyond what we know.
This iconic figure who sought an end to capitalism and injustice globally, and who also relied heavily on violence measures to do so, was also just another person in the world. This simple act of kindness on Che's part, never mentioned in the biographies and love-ographies or hate-ograpies, brings him back down to earth. It's also the case that we could probably easily find stories about the guy making mundane mistakes, which again would temper the dramatic, larger than life character he has become.
It seems to me that it is our job, as Buddhist practitioners, to drop off all pre-conceived stories about both those in our lives, and about those who lived in the past, and to be ready and open to be surprised. This story of Arguelles provided a moment of surprise, an opportunity to shake the story I had about Guevara as solely a sometimes inspirational, sometimes destructive revolutionary. Maybe he had no interest whatsoever in the Buddha and his teachings; that's irrelevant. What is relevant is that he took the time for this young woman, even if that effort was at least partly motivated by ties to her father or to desires that she would support his politics. She wasn't anyone important, so even if his motives were tainted in the ways I just suggested, it really didn't benefit him much. So I see this as an act of caring. Someone asked him about a writer he loved, and he tried to find something else out about that writer for the other. As a writer who loves many other writers, both living and dead, I completely get this act. I've done it myself, without any belief that I would gain by locating information about writer X.
|
0.942482 |
Ctenosaura similis, commonly known as the black spiny-tailed iguana, black iguana, or black ctenosaur, is a lizard native to Mexico and Central America that has been introduced to the United States in the state of Florida. It is the largest species in the genus Ctenosaura and has been recorded as the fastest-running species of lizard.
The black spiny-tailed iguana was first described by British zoologist John Edward Gray in 1831. The generic name, Ctenosaura, is derived from two Greek words: ctenos (Κτενός), meaning "comb" (referring to the comblike spines on the lizard's back and tail), and saura (σαύρα), meaning "lizard". Its specific name is the Latin word similis meaning "similar to", a common description found in Linnean taxonomy when referring to a new taxon.
Black spiny-tailed iguana have distinctive black, keeled scales on their long tails, which gives them their common name. They, along with C. pectinata, are the largest members of the genus Ctenosaura. The males are capable of growing up to 1.3 meters (4 ft 3 in) in length and the females are slightly shorter, at 0.8–1 meter (2 ft 7 in–3 ft 3 in). They have a crest of long spines which extends down the center of the back. Although coloration varies extremely among individuals of the same population, adults usually have a whitish gray or tan ground color with a series of 4–12 well-defined dark dorsal bands that extend nearly to the ventral scales. Males also develop an orange color around the head and throat during breeding season with highlights of blue and peach on their jowls.
Black spiny-tailed iguanas are excellent climbers, and prefer a rocky habitat with plenty of crevices to hide in, rocks to bask on, and nearby trees to climb. They are diurnal and fast moving, employing their speed to escape predators but will lash with their tails and bite if cornered. The Guinness Book of World Records lists this as the world's fastest lizard, with a maximal sprint speed of 34.6 km/h.
They are primarily herbivorous, eating flowers, leaves, stems, and fruit, but they will opportunistically eat smaller animals, eggs and arthropods. Juveniles tend to be insectivores, becoming more herbivorous as they get older. They are known to eat the fruit and live in the limbs of the manchineel, a tree highly poisonous to most other animals.
The black spiny-tailed iguana has been introduced to South Florida and reproduces in the wild in several feral populations. On the southeastern Florida coast, black spiny-tailed iguanas have been found on Key Biscayne, Hialeah, and in Broward County. On the southwestern Florida coast, it has been discovered on Gasparilla Island and in adjacent areas, throughout Lee and Charlotte counties. This iguana has also been introduced to several islands in the Caribbean. As this species will opportunistically feed on small vertebrates, such as fish, rodents, eggs, birds, and even hatchling sea turtles it may pose a threat to endangered native species.
Mating generally occurs in the spring. Males show dominance and interest by head bobbing; eventually the male will chase the female until he can catch her and subdue her. Within eight to ten weeks, the female will dig a nest and lay clutches of up to 30 eggs. The eggs hatch in 90 days with the hatchlings digging their way out of the sand. These juveniles are typically green with brown markings, although all brown hatchlings have been recorded as well.
In some parts of Central America, the black spiny-tailed iguana, colloquially called the "chicken of the trees," is farmed alongside the green iguana as a food source and for export for the pet trade [see iguana meat]. Although it is heavily hunted it does not appear to be endangered in any of its native territory.
^ Pasachnik, S. (2015). "Ctenosaura similis". IUCN Red List of Threatened Species. 2015: e.T174480A73611567. doi:10.2305/IUCN.UK.2015-1.RLTS.T174480A73611567.en.
^ "Ctenosaura similis". Integrated Taxonomic Information System. Retrieved 30 December 2007.
^ a b c d e f g h i j k l Malfatti, Mark (2007). "A look at the genus Ctenosaura: meet the world's fastest lizard and its kin". Reptiles Magazine. 15 (11): 64–73.
^ a b Hollingsworth, Bradford D. (2004). The Evolution of Iguanas: An Overview and a Checklist of Species. Iguanas: Biology and Conservation. University of California Press. pp. 34–35. ISBN 978-0-520-23854-1.
^ a b c d e Köhler, Gunther (1996). "Notes on the systematic status of the taxa acanthura, pectinata, and similis of the genus Ctenosaura". Senckenbergiana Biologica. 30 (1): 33–43.
^ Van Devender, R. W. 1982. Growth and ecology of spiny-tailed and green iguanas in Costa Rica, with comments on the evolution of herbivory and large body size. Pages 162-182 in G. M. Burghardt and A. S. Rand, eds. Iguanas of the world: their behavior, ecology, and conservation. Park Ridge, New Jersey, Noyes Publications.
^ Friedman, Melissa H.; Andreu, Michael G. (24 November 2015). "Hippomane mancinella, Manchineel". edis.ifas.ufl.edu. University of Florida. Retrieved 9 April 2018.
^ a b Krysko, K. L. & King, F. W. & Enge, K. M. & Reppas, A. T. (2003):Sarasota county Distribution of the introduced black spiny-tailed iguana (Ctenosaura similis) on the southwestern coast of Florida.- Florida Scientist, Lawrence, Kansas; 66 (2): 74-79.
^ Sanchez, Alejandro (2007-12-31). "Father Sanchez's Web Site of West Indian Natural History Diapsids I: Introduction; Lizards".
Wikimedia Commons has media related to Ctenosaura similis.
|
0.963874 |
I think I might have gum disease, what can I do?
Gum disease or gingivitis occurs when the delicate gums around your teeth become inflamed. Gum disease progresses painlessly on the whole so you may not notice it until it is at a more severe stage.
The first sign is that your gums may be slightly puffy, read or inflamed. At first this will be very mild and barely noticeable unless you look extremely closely (just as a dentist would during your regular dental health check).
As the gum disease progresses you may find that the gums bleed occasionally during cleaning with a toothbrush. You will also find that if you clean between your teeth with a brush or floss that the bleeding can be worse.
The problem is that people at this stage then tend to layoff cleaning their teeth quite so much as the gums bleed and become tender, however this can mean that the gum disease can progress further underneath the gum.
If the infection spreads below the gum line it can then turn into the more serious periodontitis which affects the bone and can ultimately lead to tooth extraction or loss.
Is it possible to catch gum disease?
No. Gum disease is not an infectious disease and is caused primarily by poor hygiene. However, if you have lower standards of oral hygiene without healthy gums your teeth may be more susceptible to any additional bacteria which are introduced into the oral environment.
because of gum disease is a buildup of plaque over the teeth, this is a sticky substance which if not removed daily can build up into hard tartar. This is where bacteria lurk, these bacteria are producing acid as they digest food and it is this acid which causes tooth decay.
Smoking. Smoking as a tendency to dry out your mouth, this drying out means there is less saliva to wash away food stuff and neutralise the acid attack.
Changes in hormones. Particularly in girls and women, hormone changes can lead to sensitivity in the gums making gingivitis more likely.
Your genetics. Unfortunately some people are more prone to developing gum disease than others.
Diabetes. There are direct links between people with diabetes and gum disease.
Your medications. Any medication which alters the flow of saliva can leave you more susceptible to developing gum disease. There are also some medications which promote abnormal growth of the gums, these can then be difficult to clean.
Yes, it is possible to reverse gum disease. Depending on how severe the disease is and how far it has progressed depends upon the best course of action. The very simplest thing you can do is to start a more thorough oral health care routine ensuring that you are brushing your teeth at least twice per day for 2 min with the fluoride toothpaste (This helps to strengthen your tooth enamel) and that they are cleaned once a day with an incidental brush or floss.
Do people with gum disease die early?
The recent any research to indicate that people with gum disease necessarily die early, however there is research which links gum disease to certain other conditions including heart attacks.
There has been research undertaken which is shown that people with heart conditions have the same bacteria present in their heart as is present with gum disease. More research is needed to establish if there is a causal link between gum disease and heart disease, however what is clear is that there is indeed a link between the two conditions.
Tooth removal. If your gum disease is not kept under control then it can turn into the more serious periodontitis which can then lead to floss.
Strokes. Studies have shown that up to 40% of the bacteria that cause the fatty deposits in People that have had a stroke come from their mouths which have inflamed gums.
Respiratory disease. Because dental plaque harbours a considerable amount of bacteria it is inevitable that some of these could be respiratory pathogens, therefore a complication of gum disease could potentially be pneumonia, emphysema and chronic obstructive lung disease.
Heart disease. Because the body is a complete system connected by its blood supply then any bacteria which gets into the blood in your mouth can make its way to your heart. These bacteria have been shown to lodge inside the walls of the blood vessels causing blood clots to form.
Gastric ulcers. The same bacteria that cause gastric ulcers are also responsible for gum disease, this means that if you have a particularly high bacteria count in your mouth then as you swallow your food these bacteria are transferred to your stomach.
Regular dental checks by your dentist and hygienist to ensure that you are cleaning your teeth adequately.
Being aware of the food and drinks you consume to keep sugar amounts lower.
Ensuring that you have a good daily oral health care regime.
Watch out for the early warning signs like bleeding gums and if it doesn’t clear up contact your dentist.
Previous Previous post: Is there a link between the desire for Botox and Social Media use?
|
0.966412 |
The TP fans in the family (4 of 5) had a good laugh.
>The TP fans in the family (4 of 5) had a good laugh.
> The TP fans in the family (4 of 5) had a good laugh.
I wonder if anyone has told the librarian?
>> The TP fans in the family (4 of 5) had a good laugh.
> I wonder if anyone has told the librarian?
>> I wonder if anyone has told the librarian?
> translations of Pratchett books?
He says "oek" which is pronounced like the English "ook".
heard. It's more like "awk". Maybe "oak with a Scottish accent".
> heard. It's more like "awk". Maybe "oak with a Scottish accent".
> "me too / AOL".
>> heard. It's more like "awk". Maybe "oak with a Scottish accent".
distinct (ignore the minor difference in volume).
when imitating a foreign accent.
to keep my lips stationary.
already knows :) It's quite fitting really.
make), you'd probably be understood in Berlin.
> >> heard. It's more like "awk". Maybe "oak with a Scottish accent".
> > dialects may vary.
> distinct (ignore the minor difference in volume).
I'd go for the former.
second open-mid back. Close, but clearly distinct.
> latter, rather than the former.
Wrong; it's the close-mid back vowel, longish.
name is strictly short and the pure vowel.
>> distinct (ignore the minor difference in volume).
> second open-mid back. Close, but clearly distinct.
Wrong. They're both o. Turned c is *significantly* wider.
both sounds fall very definitely within the range of [o].
> >> distinct (ignore the minor difference in volume).
> > second open-mid back. Close, but clearly distinct.
> Wrong. They're both o. Turned c is *significantly* wider.
> both sounds fall very definitely within the range of [o].
while [turned c] is an equally rounded, equally back, open-mid vowel.
>> both sounds fall very definitely within the range of [o].
> while [turned c] is an equally rounded, equally back, open-mid vowel.
However, it's nowhere near open /enough/ to be turned c.
phonology you might do that, but not in phonetics.
> >> both sounds fall very definitely within the range of [o].
> > while [turned c] is an equally rounded, equally back, open-mid vowel.
> That is all correct.
> However, it's nowhere near open /enough/ to be turned c.
closer to your first vowel.
>> However, it's nowhere near open /enough/ to be turned c.
> I repeat: maybe to your ear, but not to mine.
The second formant, F2, is about 800 Hz for both.
than the first one is!
I don't know how to do the fundamental sound-creating operations.
> closer to your first vowel.
sample of one, but it's a one that I remember distinctly.
> I don't know how to do the fundamental sound-creating operations.
A problem that's all in your head is still a problem.
Brain damage is but one form of mind damage.
|
0.999995 |
how do I get from manuscript to bound book?
1. Copy edit manuscript and prepare for typesetting (plus images/captions, if illustrated).
2. Design cover (or case and jacket, if hardback).
3. Typesetter sets text (reproduces illustrations) and supplies page proofs.
4. Proofreader checks page proofs and marks corrections.
5. Typesetter produces revised proofs for final check and approval for press.
6. Typesetter provides print-ready files to printer (plus images/captions, if appropriate).
8. Print pages (and illustrations).
9. Manufacture case (hardback only).
10. Bind printed text/illustrations in cover (or case and jacket, if hardback).
|
0.999998 |
What are the reasons that could keep humans from living longer than anyone does now?
Scientists are very interested in your question. They're studying what causes our cells to die. Their name for cell death is 'apoptosis.' You could search for that on www.google.com. A big question in science is whether we could live to be very old if we learned how to control the things that kill our cells. There's also some interesting research on why people and animals seem to sometimes live longer if they don't eat very much. There seems to be a vitamin that we use for digesting food that can also protect our cells from dying, but if all gets used up in digesting our food, there's not so much for keeping our cells alive. This research is very new, so it may turn out to be much more complicated than that, but it is quite exciting.
|
0.999985 |
What are the dark colored regions of the moon?
The dark colored areas of the moon's surface are referred to as "maria", the Italian and Latin word for "seas". Long before the arid nature of the moon's surface was known, the early observers of the moon interpreted these areas as oceans on the moon, and referred to them accordingly.
And as for the light areas, they have always been (correctly) interpreted as mountain ranges, and named accordingly.
What color is the moon?
Answer red Answer All colors have the potential to be dark, as there are ways to remove brightness (by layering black on top, in some cases). Dark colors are colors that are closer to black than to white.
The moon, like the Earth, is illuminated on one side by the sun, while the other side is dark.
Why is there a dark side on the moon?
Other then Pink Floyd, says who? :P Fact: There is no dark side of the moon.
What are the dark spots on the moon called?
What is the moons color?
idk it looks gray in pictures i am in science right now learning stuff about moons well ta ta The moon is a canvas yellow and has a tint of grey.
Is it dark on the moon?
Just like here on earth, the moon is light when the sun is shining on the surface and dark when it is not. The moon has a day and night just like on earth, except that days on the moon are much longer than here on earth.
What are the colors of the moon?
What are the dark flat regions on the moon called?
The dark and relatively featureless lunar plains which can clearly be seen are called maria (Latin for "seas"). They were believed by ancient astronomers to be filled with water. They are now known to be vast solidified pools of ancient basaltic lava.
Is there color in the dark?
How dark is the dark side of the moon?
Half the moon is 'dark' at any one time. Every point on the moon isilluminated for roughly 50% of the time, as the first answer said.So there IS a dark side of the moon :). And it is very dark, sothat stars can be seen more clearly than anywhere on earth.
Dark-colored storms and eight moons?
Dark-colored storms and eight moons is quite possible referring tothe planet of Neptune. Neptune is deemed to now be the planet thatis farthest away from the sun because Pluto was downgraded to adwarf planet.
Dark colored fairly flat areas on the moon?
Called maria I searched this in and it wasn't there so I found it in my book for you and me!
What are dark colored relatively flat regions of the moon's surface formed when interior lava filled large basins?
What is the flat dark region on the moon?
Dark regions on the surface of the moon are generally?
Dark regions on the surface of the moon are generally basalt flows. Basalt is a dark rock. The flows have been caused by rock melting due to heat generated by meteor impacts.
Why is half of the moon always dark?
Half of the moon is always dark because there is no sunlight shining on that side. That is called the Dark Side of the Moon.
What are the dark spots on the moon caused by?
either the sun not showing on the moon, causing shadows/Shadows in holes where meteors hit and left craters where the sun does not hit.
Is the other side of the moon dark?
What causes the darkness of the new moon?
The reason a new moon looks dark is that when you view a new moon, you are looking at the side of the moon not lit by the sun.
Is there a permanent dark side of the moon?
No part of the Moon is permanently dark. The "dark side" refers to the side that is away from Earth, that can't be seen from Earth.
When does the moon shine in the dark?
The moon shines when the sun's rays are reflected off the surface and down to the Earth where it is percieved by anything with working eyes. If there is an eclipse of any kind the moon will not shine.
What are dark colored flat regions of the Moon's surface formed when interior lava filled large basins?
Do you have mrs swartzentruber for science? Cuz if u do I have the answer! Meet me in the small commons by where you put your lunch trays!
Is the moon always dark?
What is Transformers Dark of the Moon rated?
PG-13 for Intense Prolonged Sequences of Sci-Fi Action Violence, Mayhem and Destruction, and for Language, Some Sexuality and Innuendo.
What dark - colored rock covers large areas of the moon?
Actually, there isn't a large clump of dark colored rocks on the moon. The dark parts of the side of the moon that we see, are actually craters that are hundreds of thousands of years old, caused by meteorites crashing into the moon.
How does transformers dark of the moon end?
What is the transformers dark of the moon plot?
Who are the new Transformers in Dark of The Moon?
What is the plot of Transformers Dark of the Moon?
Why can you see the moon when its dark?
Light from the sun is reflected off the moon making it visible in the dark.
Why is the Moon dark all of the time?
The moon is not dark all the time. It is dark in a phase called a "new moon." But it only temporarily lasts.
What are the characters in Transformers Dark of the Moon?
What makes part of the moon dark?
You see, that part is the side of the moon that isn't facing the sun. Since it isn't facing the sun, no light touches it. Thus, it looks dark, considering the moonlight is really a reflection of sunlight that bounces of the moon.
Who died in Transformers Dark of the Moon?
Do the moon have dark side?
How do you get sideswipe in transformers dark of the moon?
You have to pay 80 Microsoft points for xbox. I don't know about ps3, I don't play it. On ps3 you have to buy it from the playstation store. hes an add on.
Does unicorn die in dark of the moon?
What are the killstreaks in transformers dark of the moon?
There is a 3 killstreak, where you can activate an orbital beacon. A 5 killstreak, where you jam the enemy's abilities. And a 7 killstreak, where everyone on your team (including yourself) gets an overshield.
How to study the dark region of universe?
The only way we can study distant parts of the universe is through photons emitted from those regions. By definition, if it is "dark" then we cannot study it. W can only study its interactions with light that we can see.
What color is the dark side of the moon?
There is no dark side, the moon is similar in colours all over its surface.
Is the dark side of the Moon cold?
When half of the moon is dark what is it called?
A quarter moon. What we call "full" moon is really only half of the moon shining, so if you take away half of a half, you get a quarter. When people say, "It's a quarter moon," there should only be half of a "full" moon showing.
Is a new moon and dark of the moon the same?
What are the large dark regions on the moon?
Is it dark now in the arctic Region?
Today is the autumnal equinox. It is the last day of sunlight at the north pole for 6 months.
What transformers are in dark of the moon?
Sideswipe, Ironhide, Ratchet, Optimus Prime, The Wreckers(Red Wrecker - Leadfoot, Blue Wrecker - Topspin, Green Wrecker - Roadbuster), Sentinal Prime, Megatron, Barracade, Shockwave(its pet the driller beast), Dino(pronounced Deno and aka Mirage), and many more.
What color is the moon-?
The color of the moon during the day is faint and white surroundedby the blue of the sky while at night it is bright yellow.
|
0.968388 |
I was given a great opportunity to start an exciting new career with a great company. I love that there is a great culture and support.
I love all sports, being outdoors and in the water.
1. Live in Colorado. I have lived on both coasts, I want to live in the mountains.
|
0.999979 |
/ˌkaɪ.əˈhɒɡə/ or /ˌkaɪ.əˈhoʊɡə/) is a county located in the state of Ohio, United States. It is the most populous county in Ohio; as of the 2010 census, the population was 1,280,122. Its county seat is Cleveland. Cuyahoga County is part of Greater Cleveland, a metropolitan area, and Northeast Ohio, a thirteen-county region, joined together in economic development initiatives. The county is named after the Native American word (possibly Algonquian) Cuyahoga, which means "crooked river". The name is also assigned to the Cuyahoga River, which bisects the county. Former U.S. President James A. Garfield was born in what was Cuyahoga County's Orange Township.
Cuyahoga County was organized on June 7, 1807. It was later reduced by the creation of Huron, Lake, and Lorain Counties. It was named after the Cuyahoga River.
According to the U.S. Census Bureau, the county has a total area of 1,246 square miles (3,227.1 km2).458 square miles (1,186.2 km2) is land and 787 square miles (2,038.3 km2) (63.19%) is water. A portion of Cuyahoga Valley National Park is located in the southeastern portion of the county.
As of the census of 2000, there were 1,393,978 people, 571,457 households, and 354,874 families residing in the county. The population density was 3,040 people per square mile (1,174/km²). There were 616,903 housing units at an average density of 1,346 per square mile (520/km²). The racial makeup of the county was 67.35% White, 27.45% African American, 0.18% Native American, 1.81% Asian, 0.02% Pacific Islander, 1.50% from other races, and 1.68% from two or more races. 3.38% of the population were Hispanic or Latino of any race. 12.3% were of German, 9.1% Irish, 8.7% Italian and 7.3% Polish ancestry according to Census 2000. 89.0% spoke English and 3.2% Spanish as their first language.
There were 571,457 households out of which 28.50% had children under the age of 18 living with them, 42.40% were married couples living together, 15.70% had a female householder with no husband present, and 37.90% were non-families. 32.80% of all households were made up of individuals and 12.10% had someone living alone who was 65 years of age or older. The average household size was 2.39 and the average family size was 3.06.
In the county the population was spread out with 25.00% under the age of 18, 8.00% from 18 to 24, 29.30% from 25 to 44, 22.20% from 45 to 64, and 15.60% who were 65 years of age or older. The median age was 37 years. For every 100 females there were 89.50 males. For every 100 females age 18 and over, there were 85.20 males.
The median income for a household in the county was $39,168, and the median income for a family was $49,559. Males had a median income of $39,603 versus $28,395 for females. The per capita income for the county was $22,272. About 10.30% of families and 13.10% of the population were below the poverty line, including 19.40% of those under age 18 and 9.30% of those age 65 or over.
Cuyahoga County had long been led by a three-member Board of County Commissioners. However, on November 3, 2009, county voters overwhelmingly approved the adoption of a county charter form of government, which replaced the three-commissioner form of county government with an elected county executive and an 11-member county council. Each council member represents a single district; there are no at-large districts. Summit County is the only other Ohio county with this form of government.
In the November 2, 2010 election, Lakewood mayor Ed FitzGerald defeated Matt Dolan to become the first Cuyahoga County executive. The first Cuyahoga County Council was also elected, with Democrats winning the majority (8-3) over the Republicans.
Cuyahoga County is heavily Democratic in voter registration.
Cuyahoga County is served by the Cleveland Metroparks system. Its 16 reservations provide more than 21,000 acres (8,500 ha) of green space and recreational amenities. The county is home to part of Cuyahoga Valley National Park, which extends southward into Summit County.
^ a b "Ohio County Profiles: Cuyahoga County" (PDF). Ohio Department of Development. http://www.odod.state.oh.us/research/FILES/S0/Cuyahoga.pdf. Retrieved 2007-04-28.
^ Feran, Tom (2004-02-13). "Shooing the hog out of Cuyahoga". The Plain Dealer. http://infoweb.newsbank.com/iw-search/we/InfoWeb?p_action=doc&p_topdoc=1&p_docnum=1&p_sort=YMD_date:D&p_product=NewsBank&p_text_direct-0=document_id=(%20100B6B280DC46277%20)&p_docid=100B6B280DC46277&p_theme=aggregated5&p_queryname=100B6B280DC46277&f_openurl=yes&p_nbid=E5DN55ITMTE5OTkxMTg3NC41MzY1NTE6MToxMzo2Ni4yMTMuNDEuMTQy&&p_multi=CPDB.
^ Feran, Tom (2006-06-02). "It's a Cleveland thing, so to speak". The Plain Dealer. http://infoweb.newsbank.com/iw-search/we/InfoWeb?p_action=doc&p_topdoc=1&p_docnum=1&p_sort=YMD_date:D&p_product=NewsBank&p_text_direct-0=document_id=(%20112043416CC2CD20%20)&p_docid=112043416CC2CD20&p_theme=aggregated5&p_queryname=112043416CC2CD20&f_openurl=yes&p_nbid=F58P50SOMTE5OTkxMjUxOS4yOTM5NjU6MToxMzo2Ni4yMTMuNDEuMTQy&&p_multi=CPDB.
^ Siegel, Robert; Block, Melissa (2009-06-23). "Letters: Cuyahoga River". All Things Considered (National Public Radio). http://www.npr.org/templates/story/story.php?storyId=105828999. Retrieved 2009-06-23.
^ McIntyre, Michael K. (2009-06-28). "How to pronounce 'Cuyahoga' turns into a national debate: Tipoff". The Plain Dealer. http://www.cleveland.com/tipoff/index.ssf/2009/06/how_to_pronounce_cuyahoga_turn.html. Retrieved 2009-06-29.
^ "Total Population, 2010". Cuyahoga County Planning Commission. 2011. http://planning.co.cuyahoga.oh.us/census/2010population.html. Retrieved March 19, 2011.
^ "Cuyahoga County data". Ohio State University Extension Data Center. http://www.osuedc.org/profiles/profile_entrance.php?fips=39035&sid=0. Retrieved 2007-04-28.
^ "Federal Roster: Counties of Ohio, Derivation of Name and Date of Erection". http://www.sos.state.oh.us/SOS/PublicAffairs/fedRoster.aspx?Section=1585. Retrieved 2007-07-22.
^ "Ohio Genealogy Clickable County Map". Archived from the original on 2007-11-18. http://web.archive.org/web/20071118074514/http://www.rootsweb.com/~usgenweb/oh/1/counties.htm. Retrieved 2007-07-25.
^ Byrne, Brian (November 3, 2010). "Ed FitzGerald is first Cuyahoga County executive". The Plain Dealer (Cleveland, Ohio). http://www.cleveland.com/sun/all/index.ssf/2010/11/ed_fitzgerald_is_first_cuyahog.html. Retrieved November 16, 2010.
^ Garrett, Amanda (November 2, 2010). "Three Republicans heading toward victory on Cuyahoga County Council; Dems likely to take other 8 seats". The Plain Dealer (Cleveland, Ohio). http://www.cleveland.com/politics/index.ssf/2010/11/cuyahoga_county_council_5_race.html. Retrieved November 16, 2010.
^ "Cleveland Metroparks: Plan Your Visit". http://www.clemetparks.com/visit/. Retrieved July 5, 2011.
This page uses content from the English language Wikipedia. The original content was at Cuyahoga County, Ohio. The list of authors can be seen in the page history. As with this Familypedia wiki, the content of Wikipedia is available under the Creative Commons License.
|
0.998834 |
Acknowledge receipt of the sympathy card and show how the gesture helped you.
Thank you so very much for the lovely sympathy card you sent me on the passing of my brother. Your kind words were both encouraging and comforting as we were going through those trying times. It was so soothing to know that you were thinking of us as we bid him goodbye.
I am so thankful to have you as my friend. Once again, thank you for your kindness and support.
Thank you letter for sympathy card.
|
0.998556 |
What is the best way to keep a dog happy in Orlando apartments?
Many apartments in Orlando are dog friendly and will allow your beloved pet to live in your apartment alongside you. If you're the proud owner of a beloved pooch keeping him/her happy in an apartment can seem like a daunting task. With a few changes to your routine and living space you can keep your doggie happy as ever.
Several apartments in Orlando cater to not only their residents, but their resident's pets as well. Numerous Orlando apartments offer dog walks, perfect for keeping your pooch active and healthy. Many even have waste bags along the walks so cleaning up after your pooch is ridiculously easy. If you're lucky you might even find an apartment that offers a dog play area, with hurdles and slides for your dog to play on.
One of the best ways to keep your dog happy in Orlando apartments is to keep them active. Even a three or four bedroom apartment can seem cramped for an active dog. Try taking your dog to a dog park or somewhere they can roam free off-leash. Daily walks, games of fetch, and play time with other dogs can be vital to your dog's happiness. If you spend plenty of time keeping your dog active they're less likely to get bored and lonely throughout the day.
Keeping your dog happy even when you're not at home is essential. To achieve this try keeping a basket of toys out that are available to your pooch at all times. Fill it up with bones, ropes, treat dispensers, chew toys, and more to keep your pet preoccupied while you're out at work or school. With these toys to keep them busy while you're away your less likely to come home to chewed up shoes, or trash strewn throughout your home.
Creating open spaces in your home can greatly assist in keeping your dog happy. Keep furniture placed up against the walls, your TV mounted, and doorways free of clutter. The more room your dog has, the happier they'll be. Try keeping whatever rooms you can open while you're away so your dog has more room to pace and play throughout the day.
Orlando apartments can be a wonderful place to live with your pooch if you know how to take care of them properly. Effort to keep your dog happy is definitely required when living in Orlando apartments, but as a pet owner I'm sure you're willing to take a few extra measures to keep your dog happy and healthy. Making just a few changes can greatly increase your dog's happiness in Orlando apartments immensely. The most vital role in keeping your dog happy is just paying as much attention to them as you can and giving them all the love you can give. If you follow these few steps both you and your pet can be incredibly happy in your home.
|
0.999608 |
Need an insulated jacket but not sure if you should get a down or synthetic jacket? Both down and synthetic jackets will keep you warm and toasty by holding the warmth in but are suited to different conditions. One is not strictly better than the other, but one may suit your needs more than the other.
This article can help direct you to the right insulated jacket for your needs.
Down insulation is made from goose or duck plumage - the lofty, fluffy stuff underneath the feathers. It is an undercoating, or a natural mid-layer. The structure of down provides warmth by trapping thousands of tiny air pockets. Down is also incredibly breathable, which allows unwanted moisture to escape.
Down is measured by 'Fill power'. Fill power measures how many cubic inches 1 oz. of down can fill inside a lab container. Typically, fill power will range from 450 to 900, with 900 being the warmest and lightest, but also the priciest. The quality of the down is directly related to its fill power rating, the higher the fill power, the better the down will insulate, because there is less chance of cold spots forming.
In recent years, water-repellent down has become available, this is down treated with a molecular-level polymer that can withstand mist or light moisture. That's a big plus, but you still shouldn't let it get soaked.
Natural down is also incredibly resilient and if properly cared for it can be used for many years.
Cleaning down gear requires special care. Harsh detergents and other chemicals will break down its natural loft and lustre. Only very mild detergents or down-specific cleaning products should be used. Down-insulated items should never be put in the drier.
Down is not hypoallergenic. Lower quality down can harbor dust particles, debris or other non-down materials, causing a reaction in sensitive people. However, high-quality down is cleaned very well according to strict industry standards, and is less likely to cause issue.
Down insulation can be significantly more expensive than synthetic.
Synthetic insulation is designed to replicate the qualities of down, but retain them even when wet. Synthetic insulation is essentially polyester threading that is moulded into long single threads or short staples to mimic lofty down clusters. Thinner and lighter threads fill voids and trap warm air more effectively, while thicker strands sustain the loft and durability.
In addition synthetic insulation has a slightly higher weight-to-warmth ratio than down, meaning it needs to be heavier to achieve the same warmth as down. The upside to synthetic insulation is that it is much more resistant to moisture, and when it does get wet it dries faster. Synthetic insulation also tends to be friendly on the wallet and is naturally hypoallergenic.
Down is Mother Nature's best insulator. It works well for almost everyone providing incredible warmth with minimal weight. It's also highly compressible and has good longevity if properly cared for. Down is great in cold, dry conditions however, if you expect wet weather synthetic insulation may be a better option.
Synthetic insulation is better in wet conditions and is easier to clean. It is a good choice for casual outdoor enthusiasts who only use their gear a few times a year.
|
0.94284 |
A town in Massachusetts, scene of the first conflict between the Americans and British troops in the American Revolution, on 19 April 1775.
The second Concord (PG-3) was built by Delaware River Iron Works; launched 8 Mar. 1890 by N. F. Palmer, Jr., and Co., Chester, Pa.; sponsored by Miss M. D. Coates; and commissioned 14 Feb. 1891, Cmdr. O. A. Batcheller in command.
Concord operated on the New England coast, and sailed from New York 17 November 1891 on a cruise to the West Indies and South America with her squadron, then arrived at New Orleans 27 April 1892 and cruised up the Mississippi River as far as Cairo, III., visiting various ports en route.
Returning to New York 13 June 1892, Concord made another cruise to the West Indies late that year, and arrived back at Norfolk 5 December. She participated in International Naval Reviews held at Norfolk and New York in March and April 1893, and in June sailed from Norfolk for the Far East, calling at the Azores, Gibraltar, Malta, Port Said, Bangkok, and Saigon before arriving at Hong Kong 30 October. She cruised on the Asiatic Station showing the flag and protecting American interests until 29 May 1894 when she arrived at Unalaska. She cruised in the North Pacific to carry out the provisions of the treaty between the United States and Great Britain, which empowered her to seize all vessels violating the laws protecting valuable fur seals. She gathered hydrographic information to correct Bering Sea charts and conduct scientific observations of the fur seals.
Concord returned to the Asiatic Station in September 1894 and continued to serve in the Far East until returning to San Francisco 3 May 1896. She was placed out of commission for repairs between 27 May 1896 and 22 May 1897. After a cruise to Alaskan waters (1 July-29 November), she sailed from Mare Island 8 January 1898 for the Asiatic Station. With the declaration of war between Spain and the United States in April, Concord joined Admiral Dewey's squadron at Mirs Bay near Hong Kong on the 24th and sailed for the Philippines. On 1 May the squadron entered Manila Bay and won the resounding victory that resulted in American control of the Philippines and renewed interests and responsibilities in the Far East.
Concord resumed her patrol on station in August 1898, but returned to the Philippines 19 December to assist in putting down the insurrection. Her duty consisted of patrolling the coast to restrict insurgent movements and shipping; bombarding various guerrilla strongholds; and aiding Army operations. Except for a voyage to Guam in March 1900 to deliver stores, and a brief voyage to Hong Kong for repairs, Concord remained in Philippine waters until June 1901, when she sailed by way of Alaskan waters to San Francisco, arriving 28 September 1901. She cruised with the Fleet in Mexican waters, then went out of commission 26 February 1902 at Mare Island.
Recommissioned 15 June 1903 Concord operated along the North American coast from Alaska to Panama and to Hawaii and Alaska until decommissioned at Bremerton 25 August 1904. Concord was recommissioned again 16 September 1905, sailed from Bremerton 24 December 1905, operated in the Philippines until March 1906, then sailed to China. Until 1908 she remained in the Far East serving at times on the Yangtze Patrol and as station ship at Shanghai and Canton.
Concord served as station ship at Guam from 2 January to 10 September 1909, then sailed to Puget Sound Navy Yard arriving 11 October, decommissioning 4 November 1909, and assigned as barracks ship for the Naval Militia of Washington at Seattle. She was transferred to the Treasury Department 15 June 1914 and served as quarantine station vessel for the Coast Guard at Astoria, Oreg. Returned to naval custody 19 March 1929, she was sold 28 June 1929.
|
0.972849 |
Australia's estimated resident population at June 2006 was 20.7 million people4. The three most populous states recorded the largest population growth in the five-year period to June 2006. Queensland experienced the largest growth (462,600 people), followed by Victoria (323,600) and New South Wales (242,000). The fastest population growth in the five years to June 2006 was in Queensland, with the population increasing by 2.4% per year on average. Western Australia also experienced fast growth, recording an average population increase of 1.6% per year over the five years to 2006.
At 30 June 2006, capital cities were home to over 13.2 million people, making up almost two-thirds (64%) of Australia's population. The combined population of capital cities increased by 815,600 people in the five years to June 2006, accounting for 63% of Australia's total growth since June 2001. In the five years to June 2006, Melbourne recorded the largest growth of all capital cities, increasing by 272,700 people. Brisbane recorded the second largest growth, increasing by 191,300 people, followed by Sydney (up 156,100) and Perth (up 126,500).
Capital city growth outpaced growth in the state balances (those areas outside of capital cities) in all states and territories except Queensland and South Australia in the five years to June 2006, although the growth rate in the balance of New South Wales almost equalled that of Sydney. In the five years to June 2006, as in the previous five-year period, the largest state balance growth occurred in the balance of Queensland, which increased by 271,300 people. This growth was over three times larger than that of the next largest state balance growth in New South Wales (85,900 people) and over five times larger than the third largest state balance growth in Victoria (50,800 people).
The state balance population increased by 472,700 people during the five years to June 2006 to reach 7.53 million, making up 36% of Australia's population at June 20065. The state balance population grew by 1.3% per year on average in the five years to June 2006, which was slightly higher than the 1.1% average annual growth rate in the preceding five years.
Trends vary across Australia. Outer suburbs continue to grow. Inner Sydney is experiencing movement away to other regions, particularly South East Queensland coast (including Brisbane). This is probably a reflection of the growth in housing prices in Sydney. There is general movement to coastal areas as part of the sea change, particularly to the Hunter to Sunshine Coast and Wide Bay areas of Queensland.
Generally speaking, non-coastal regions are seeing the lowest levels of net population growth, but the population growth is positive. Exceptions include areas of severe drought such as western New South Wales and south-central Queensland. Flow on effects from increased property and rental prices in coastal areas may see lower income residents displaced to inland country centres, although this is not yet apparent in the data.
4 Access Economics, 2008. Population projections.
5 Australian Bureau of Statistics (ABS), 2007. Regional Population Growth Australia, 1996-2006.
|
0.96481 |
May 21st is celebrated in Bulgaria as the church feast of St.St.Constatine and Helena. The day is also popular in various places around Bulgaria as the traditional feast of Kostadinovden.
Name day of everyone named Konstantin, Kostadin, Kostadinka, Koycho, Dinko, Elena, Elen, Eli, Elitsa.
May 21st is celebrated in Bulgaria as the church feast of St.St.Constatine and Helena. The day is also popular in various places around Bulgaria as the traditional feast of Kostadinovden. It is celebrated as the last feast of spring and its rituals remind of the coming summer. According to the traditional beliefs, ?Elenka is carrying hail up her sleeve?, or that ?Kostadin and Elena are carrying the hail in a sack?. Therefore, the feast is celebrated against hail.
Throughout the country the feast is celebrated predominantly as a church feast, dedicated to the Emperor Constantine the Great, and his mother Helena. During his reign (306-337) the Milan edict was released (313) declaring Christianity the official state religion. According to the legend, Helena visited Palestine and found the cross of Christ there.
|
0.943092 |
During the period 1918 to 1940, Lithuania was one of the newly restored states that had formed in Central and Eastern Europe on a national-territorial basis after the First World War. Vilnius, its historic capital, had been lost in 1919, and Kaunas became the new capital city. Formerly a modest Imperial Russian garrison town, it suddenly acquired a new importance on the map of Europe. Its status as capital provided an impulse to accelerate its integration into the political, social and cultural context of interwar Europe, through material and non-material forms, such as architecture, diplomacy, culture and education.
During a short but very intense period, Kaunas lived through the most important phase in its historical development. The years from 1919 to 1939 were a time of revolutionary cultural breakthroughs for Kaunas, which was especially evident in architecture. Its status as a capital city provoked a huge construction boom, aiming to create all the necessary infrastructure: government institutions, museums, educational institutions (a university, academies and schools), business offices, hotels, industrial premises, housing, and the general infrastructure of the city (water supplies, the sewerage system, a new transport system, roads and parks). The architectural landscape of multicultural Kaunas was enriched by the buildings of various ethnic communities, such as churches, banks and schools, with distinctive forms of expression (in 1937 the population of the city was 61% Lithuanian, 25.5% Jewish, 3.9% Polish, 3.3% German, and 3.3% Russian). In 1938, it attracted 68% of all Lithuanian investment in the construction of towns and cities. The area of the city expanded more than seven times (from 557 hectares in 1919 to 3,940 hectares in 1939). More than 6,000 buildings from this period have survived till today.
For political and economic reasons, the main construction work in Kaunas lasted less than two decades. The most intense period of construction was from 1927 to 1940. This corresponds with huge changes in architecture. In the 1930s, in a very short period of time, Modernism became the international style. The revolutionary seeds sown by Le Corbusier, Walter Gropius, Mies van der Rohe, and other world-class architects and schools of architecture, found fertile soil in thousands of places all around the world. Modernism is expressed in different local architectural languages. The urban and architectural development of Kaunas during the 1930s is one the most significant manifestations of the early stage of the Modern Movement, where the style is represented not as a distinct urban and architectural monument, but as a place inspired by the Modern Movement.
The limited financial means of this small East European state predetermined not the revolutionary but the evolutionary character of its architectural and urban development. The need for a public face for the capital, and the inspiration of the modern world (cleanliness, hygiene and social infrastructure), in Kaunas correspond with the delicate scale, the careful adaptation of the 19th-century urban grid, and the creative use of the natural environment (for example, one of the most distinctive urban features of Kaunas is the Resurrection Church, which was constructed at the top of the slope surrounding the city, as if illustrating the concept of Stadtkrone, the City Crown, formulated by the renowned German architect Bruno Taut). Therefore, Kaunas can be characterised by its small scale and disparateness, rather than by clear functional zones, by the consistent development of the townscape, rather than by dramatic restructuring, and by the development of the local character and topographical elements, rather than by a clearly recognisable Bauhaus architectural look (Functionalism).
The generation of architects who were educated in Western Europe, and graduates of the University of Lithuania (Vytautas Magnus University from 1930), brought international ideas, but they expressed them in a different way compared to the classic concepts of “heroic modernism”. The architectural style of Kaunas reflects various stylistic tendencies of the interwar period, and expresses a general tendency towards the steady evolution from Eclecticism to Modernism. This architecture was defined accurately by Vytautas Landsbergis-Žemkalnis, one of the most famous architects of the period, as “a classical rhythm of monumental construction in a modern form”. However, the intimate scale and the organic incorporation of elements of national art ensure the distinctive local architectural character of these buildings.
|
0.999427 |
Each table is positioned perfectly to enjoy the beautiful surroundings outside. There's also plenty of spacing in between tables so every seat is the best seat in the house. From the amazing and innovative dishes that will delight your eyes and taste buds to the impeccable and personable service that paid attention to the tiniest detail like who among the diners is a leftie, this restaurant has earned every right to call itself a 3-Star restaurant and a whole lot more! The service is impeccable. There are only a handful of tables so you have plenty of space for a romantic dinner. The food is delicious and beautifully presented.. The owner is so nice and lovely. You will have an excellent time and would recommend coming here if you're looking for a high-end dining experience! Staff: attentive and knowledgeable about all the dishes. Inquiries as to our likes/dislikes and were more than happy to mix the menu to accommodate. Setting: discrete but not stuffy plenty of room between tables. Food: Outstanding flavours and originality. The service, food, and presentation is absolutely amazing! Every dish is very good and have a light note of the vegetable or salt being used to flavor the butter.
|
0.999999 |
Let’s make a diet recipe using tofu!
Generally, tofu is suitable for dieting because it is well known that it is a low calorie food. One of the reasons for using tofu for dieting is that the amount of protein contained in tofu is very good. Soy is a necessary ingredient when making tofu, but it is said to have the effect of reducing the amount of subcutaneous fat and neutral fat.
Ingestion of tofu promotes the metabolism of body fat accumulated in the body and has the effect of facilitating consumption as energy. By eating tofu, you can also use the soy isoflavones, which are similar to female hormones. Tofu is a very good food so that female hormones can be active in the body, even during food restrictions.
Extreme diets that completely replace the diet are not recommended. In order to avoid overloading the body, the diet is a step-by-step process, in consultation with the physical condition. You may want to actively use tofu when you want to increase the volume or when you want to increase the bulk and keep the calories low.
For example, when making a hamburger, the method is to reduce the minced meat and add tofu instead. You can also make hamburgers that are soft and easy to eat rather than meat-only hamburgers. By using tofu for cooking, you can make a well-balanced, well-balanced diet that fills your stomach while reducing calories.
|
0.999923 |
What is the title of your book about Australia collfrog ?
I'm currently reading The Girl Who Played with Fire the second book of the Millenium trilogy by Stieg Larsson, a Swedish writer which is becoming a post-mortem star in Europe.
oh its a dutch book claled "australia: Reisverhalen" So i think it is somewhere ine nglish but i really expect it not to be caled the same, but the author is "Pandora Atlas"
Oh i got a great book called Huiver from Bari Wood, its in dutch but i beleive there is a english version of it to maybe its called shiver?
I'm currently reading a great book: Traveller: Observations from an American in Exile.
It is a collection a letters and journal entries of Michael Katakis, an American who has been travelling all around the world for many years. His insight on various cultures and people is a true happiness to experience.
Please read it if you have the time !
I've just finished Fulgrim, fifth book of The Horus Heresy saga which gives keys about the world of Warhammer 40,000 as we known it in the game and RPG.
I think I've already spoken about that saga which has been a very good surprise regarding its quality.I didn't expected much of it but I've already read the five first book and think I'll continue till the end (I already own the next two books in my "to read pile" (TRP)). In this book Chaos makes its entrance for real, showing itself to its new "allies" now that it is too late for them to stand back from it.
Anyway I'm making a new break in the saga to start a really BIG book which Blunt was ending some weeks ago and about which he made a really good promotion: Homicide by David Simon, the creator of the eponym TV series and of The Wire.
is it good then ?
Ithil wrote: is it good then ?
So that explains why I haven't yet finished Homicide. Because this book is indeed very good and I'm still on it !!
As soon as I've finished Torchwood I'll get back seriously to the reading as I've got the two book of Drew Karpyshyn around Mass Effect awaiting for me.
|
0.989568 |
What does the word vampire mean?
The word vampire has its roots in the Mediterranean languages. The earliest reference to the word arises in the slavonic Magyar from vam, meaning blood, and pir for monster. Blood monster does describe the vampire on a general meaning. Of course, their is more to it.
|
0.963839 |
Disney's ground-breaking animated feature-length "concert" film milestone, with great works of Western classical music, was an outgrowth of the "Silly Symphony" series.
An ambitious experiment to try to popularize classical music, especially by accompanying it with animation. It integrated eight magnificent classical musical compositions interpreted with enchanting, exhilarating, and imaginative, artistically-choreographed animation.
The film, with a production cost of more than $2 million (about four times more than an average live-action picture), initially failed at the box-office, partially due to the expensive installation of "Fantasound" sound reproduction equipment in theatres. The "Fantasound" 'stereo-like', multi-channel soundtrack was an optical 'surround-sound' soundtrack printed on a separate 35mm reel from the actual video portion of the film. It was the first American film to use stereophonic sound as well as the first and only film recorded in Fantasound.
The film received a special certificate at the 1941 Academy Awards for its revolutionary Fantasound (early stereo).
Originally, the film was to consist of only the classic Mickey Mouse segment: "The Sorcerer's Apprentice."
The only Walt Disney animated feature film that was two-hours long, at 124 minutes.
Often imitated or duplicated - e.g., Disney's own 'unofficial' sequel Make Mine Music (1946), Bruno Bozzetto's Allegro non troppo (1976), parts of The Land Before Time (1988).
A fresh, sophisticated, and classic masterpiece, and probably the world's most famous and highly-rated film, with its many remarkable scenes and performances, cinematic and narrative techniques and experimental innovations (in photography, editing, and sound). Often considered the "greatest film ever made" on most 'best of' lists.
A prime example of the director-centric auteur theory before it was clearly defined decades later - it showcased the achievements of a maverick director-cowriter-producer-star in one film, 25 year-old independent wunderkind Orson Welles, who was the controlling author of the film (not the studio, screenwriter, producers, or others) - it was his debut feature film over which he was given total freedom by RKO. With his four Academy Awards nominations (Best Picture-producer, Best Actor, Best Director, and Best Original Screenplay), Welles became the first individual to receive simultaneous nominations in those four important categories.
The innovative, bold film is an acknowledged milestone in the development of cinematic technique, with many advances in cinematic movie-making. It brought together and consolidated everything in 'film-language' up until that time, and then broke some new ground with deep focus photography, unconventional lighting, including chiaroscuro, lengthy takes, low-angled shots revealing ceilings in sets, sophisticated directional sound editing, overlapping dialogue, the sound technique termed "lightning-mix," elaborate camera movements, and flashbacks, flashforwards and non-linear narrative story-tellin (shot from various viewpoints).
The film began with just a title screen - no performer names - an unprecedented thing in the early 1940s, although common place today.
Welles was a trailblazer for future film-makers who wanted to expand the boundaries of film, such as Francis Ford Coppola, Martin Scorsese, and Quentin Tarantino.
A great example of how external forces can ruin (or help) a film's chances - i.e., publishing tycoon William Randolph Hearst accused the film of wrongly portraying him as a ruthless, publishing tycoon who died alone in the castle.
d. John Huston, 100 minutes, Warner Bros.
One of the most popular, stylistic and best classic detective mysteries ever made - a mixture of mystery, romance, and thriller.
Many film historians consider it the first major dark film noir production in Hollywood - although it had antecedents. Some of the other most influential noirs of the time period included Double Indemnity (1944) and The Blue Dahlia (1946) (with Alan Ladd).
The low-budget film reflected the remarkable directorial debut of John Huston (previously a screenwriter) who efficiently and skillfully composed and filmed this American classic for Warner Bros. studios, with great dialogue, deceitful characters, a great femme fatale, and menacing scenes.
B-movie lead character Humphrey Bogart, now introduced as a 'good guy', presented the definitive anti-hero Sam Spade - a cynical, cool San Francisco sleuthing private-eye who lived by his own code of ethics.
There were only two of the lead-based, bejeweled Maltese Falcon statuettes originally created by the Props Department for the film. Each lead figurine was 45-pounds and 12 inches tall. The only known film-used Falcon sold at auction for almost $4.5 million in late 2013 - making it one of the rarest and most important movie props or memorabilia ever offered for public sale.
The black bird served as the film's McGuffin, a plot device that propelled the story forward but was proven ultimately worthless - although it wasn't termed that at the time. Detective Spade famously called the worthless fake statuette: "the stuff that dreams are made of" (cribbed from Shakespeare's The Tempest).
When originally considered for release, the censorial Hays Code office was concerned about the amount of drinking, cursing, and sexual innuendos in the risque film, especially the amoral and promiscuous Mary Astor character. Also, they considered the homosexual references unacceptable (Peter Lorre's effeminate homosexuality, and young homosexual "gunsel" Elisha Cook, Jr.), and they had to be toned down.
A delightful, classic, nostalgic, poignant, and romanticized musical film - and one of the greatest musicals ever made - a gem of cinematic, picture-postcard Americana and youthful romance. A favorite Christmas-time holiday film classic.
The Technicolor film marked the beginning of the golden age of MGM musicals (and legendary producer Arthur Freed's unit), and ultimately became the second most successful film for MGM (behind Gone With the Wind (1939)).
The film abandoned the 'put-on-a-show' mentality of so many other backstage song/dance films, or the Busby Berkeley-style of show-stopping production numbers. Its songs and wonderful performances were carefully and naturally integrated into the story of the close-knit family's day-to-day life, and served to thematically advance the action and plot from one season to the next.
The film was composed of a series of coming-of-age vignettes (four in number): different acts representing the seasons from summer 1903 to spring 1904 that conclude in the year of the St. Louis World's Fair/Exposition. Each segment marked changes and rites of passage - and was introduced by a filigreed tintype from the Smith family album - each static, initially sepia-toned image turned into color and came to life.
This film marked the first significant film role, and probably her career-best effort, for beautiful actress Judy Garland since The Wizard of Oz (1939).
|
0.987337 |
explain the difference between heterolytic and homolytic bond breakage, and between heterogenic and homogenic bond formation.
state the two reaction types involved in symmetrical and unsymmetrical processes.
Upon first reading first four key terms, it is easy to be puzzled. The ending of the word tells you whether a bond is being formed (‑genic) or broken (‑lytic), while the root of the word describes the nature of that formation or decomposition. So hetero (meaning different) reactions involve asymmetrical bond making (or breaking) and homo (meaning same) involve symmetrical processes.
Because one pair of electrons constitutes a single bond, the unsymmetrical making or breaking of that bond in a hetero processes are described as polar reactions. Similarly, symmetrical homo processes of bond making and breaking are called radical reactions. Radicals (sometimes referred to as free radicals) are highly reactive neutral chemical species with one unpaired electron. In later sections we discuss radical and polar reactions in more detail.
The use of these symbols in bond-breaking and bond-making reactions is illustrated below. If a covalent single bond is broken so that one electron of the shared pair remains with each fragment, as in the first example, this bond-breaking is called homolysis. If the bond breaks with both electrons of the shared pair remaining with one fragment, as in the second and third examples, this is called heterolysis.
Chemists also use arrow symbols for other purposes, and it is essential to use them correctly.
The products of bond breaking, shown above, are not stable in the usual sense, and cannot be isolated for prolonged study. Such species are referred to as reactive intermediates, and are believed to be transient intermediates in many reactions. The general structures and names of four such intermediates are given below.
A pair of widely used terms, related to the Lewis acid-base notation, should also be introduced here.
Nucleophile: An atom, ion or molecule that has an electron pair that may be donated in bonding to an electrophile (or Lewis acid).
Using these definitions, it is clear that carbocations ( called carbonium ions in the older literature ) are electrophiles and carbanions are nucleophiles. Carbenes have only a valence shell sextet of electrons and are therefore electron deficient. In this sense they are electrophiles, but the non-bonding electron pair also gives carbenes nucleophilic character. As a rule, the electrophilic character dominates carbene reactivity. Carbon radicals have only seven valence electrons, and may be considered electron deficient; however, they do not in general bond to nucleophilic electron pairs, so their chemistry exhibits unique differences from that of conventional electrophiles. Radical intermediates are often called free radicals.
The importance of electrophile / nucleophile terminology comes from the fact that many organic reactions involve at some stage the bonding of a nucleophile to an electrophile, a process that generally leads to a stable intermediate or product. Reactions of this kind are sometimes called ionic reactions, since ionic reactants or products are often involved. Some common examples of ionic reactions and their mechanisms may be examined below.
The shapes ideally assumed by these intermediates becomes important when considering the stereochemistry of reactions in which they play a role. A simple tetravalent compound like methane, CH4, has a tetrahedral configuration. Carbocations have only three bonds to the charge bearing carbon, so it adopts a planar trigonal configuration. Carbanions are pyramidal in shape ( tetrahedral if the electron pair is viewed as a substituent ), but these species invert rapidly at room temperature, passing through a higher energy planar form in which the electron pair occupies a p-orbital. Radicals are intermediate in configuration, the energy difference between pyramidal and planar forms being very small. Since three points determine a plane, the shape of carbenes must be planar; however, the valence electron distribution varies.
|
0.930124 |
Intel is changing the PC into a 'personal contribution platform, says Bryant.
Intel has shown its plans for the near future of microprocessors, with a focus on five key vectors of performance, connectivity, battery life, adaptability and intelligence.
At the Computex expo in Taiwan, Intel showed a number of updates in computing power, including the eighth generation Intel Core processor, with speeds up to 5GHz.
Other developments include a new Intel Low Power Display Technology, which can halve the power consumption of a typical screen, and 5G connected laptops.
Greg Bryant, senior vice president and general manager of the Client Computing Group at Intel Corporation presented the new innovations at Computex under the banner of "PC to Personal Contribution Platform".
The new advances included the 8th Gen Intel Core processor family - the Whiskey Lake U-series and Amber Lake Y-series - which featuring up to double-digit performance gains and integrated gigabit Wi-Fi. The company also announced a new X-series release for desktop processors, and the next Intel Core S-series processor.
To mark the 40th anniversary of Intel's x86 architecture, Intel announced a limited the limited edition 8th Gen Intel Core i7-8086K processor, the first Intel processor with a 5.0 GHz turbo frequency. The company also announced that it will give away 8086 of processors in a sweepstake.
Intel announced that the first laptops and 2-in-1 devices with 5G connectivity are expected in 2019, and that it is working with leading OEM's including Acer, Asus, Dell, HP, Lenovo and Microsoft on 5G connected devices.
In power consumption, Intel showed a new Low Power Display Technology, featured in a one watt panel manufactured by Sharp and Innolux, which can cut LCD power consumption by half. Intel says that its expect to deliver an additional four to eight hours of local video playback, enabling battery life of up to 28 hours on some devices.
The company also showed an Intel Optane SSD, a slim M.2 form factor M.2, which will enable greater efficiency.
Intel partners showcased a range of devices in new form factors like dual screen, along with designing platforms for specific usage scenarios. Intel also showed a number of what it calls ‘Creator PCs', PCs with differentiated aesthetics and peripherals, upgradable form factors, and end-to-end technology optimized for different job roles in creative, compute-intensive roles such as design or animation.
The company has also introduced the AI on PC Developer Program, to provide tools and training for developers - including the OpenVINO toolkit and Windows ML - to fully utilize hardware capabilities to unlock AI innovation.
|
0.997431 |
Tzvi Ganel, Eran Chajut, Daniel Algom; Weber's law in action. Journal of Vision 2009;9(8):1165. doi: 10.1167/9.8.1165.
According to Weber's law, a fundamental principle of perception, sensitivity to changes in magnitude along a given physical dimension decreases when stimulus magnitude increases. In other words, the increment needed in order to detect a change - the Just Noticeable Difference (JND) - is smaller for weak stimuli compared to stronger stimuli. Although Weber's law governs human perception for visual dimensions, including visual length, there have been no attempts to test its validity for visually-guided action rather than for perception. Based on the notion that visually-guided action and perception are mediated by distinct neuroanatomical systems, we hypothesized that Weber's law does not necessarily hold for visually-guided action. In order to test this idea, we asked observers to either grasp or make perceptual estimations of length for objects varying in length. These measurements served to assess resolution with these two functions of vision. We found that the JND increased with object size for perceptual estimations in accordance with Weber's law. For grasping, however, the JND remained invariant across different sizes of objects, violating Weber's law. In a series of follow-up experiments, we tested the presence of Weber's law in online grasping as compared with that in memory-based grasping as well as under open-loop conditions in which vision was occluded during the grasping movement. Collectively, our findings reinforce the presence of a basic dissociation between the way object size is computed for perception and for action.
|
0.999878 |
Do retellings count as fanfiction?
Hi, I was wondering what the exact definition of fanfiction is? For instance, would the rewriting or retelling of classic tales be considered as such? How about sequels and prequels? Alternate universe retellings?
I'm not sure about the legality involved (I'm not a lawyer), but I think this kind of thing doesn't really qualify as fanfiction. If retellings were fanfiction, then all the film versions of Dracula, Frankenstein, Sherlock Holmes, James Bond, Hercules, etc. etc. etc. would be fanfictions. John Gardner's novel Grendel (the Beowulf story retold from the monster's point of view) would be fanfiction. John Steinbeck's The Acts of King Arthur and his Noble Knights would be fanfiction.
I think fanfiction is telling new stories about characters and a world that someone else created and made famous. Retelling classic stories is simply retelling, not fanfiction, because the stories aren't new.
If it's made by a third-party that identifies him/herself as a fan, I would say fanfiction regardless of "Re-telling".
|
0.999907 |
Directions on how to get photos from facebook to your computer.
1. Log in to facebook and find the photo you want.
3. Directly underneath photo you will see some choices. Choose "Options"
4. Left click once and you will see more choices. Choose "Download"
6. Click on the drop down arrow next to save. You will see a "Save As" option. Click on it.
8. Make sure it says "Desktop"
9. Change numbers to a name you will recognize like "family 1".
Save each additional photo with a different name. Do not duplicate names of photos.
If you have more than one photo to save, create a file on your desktop. (right click on desktop and choose new folder and name). You can save directly to that folder or drag and drop photos into new folder after downloading all the photos.
|
0.999999 |
What does a high gain 3G or LTE antenna do?
A good high gain mobile antenna will improve the signal to noise ratio, which will help you to get better data rates than was previously possible.
Keep in mind that your signal strength is also influenced by other factors, such as the walls and other buildings between you and the signal source, the length and quality of the cabling to the antenna and even things such as the number of users that your service provider has allowed to share a certain bandwidth with you.
|
0.961477 |
Hu Yaobang (20 November 1915 – 15 April 1989) was a high-ranking official of the People's Republic of China. He held the top office of the Communist Party of China from 1981 to 1987, first as Chairman from 1981 to 1982, then as General Secretary from 1982 to 1987. Hu joined the Chinese Communist Party in the 1930s, and rose to prominence as a comrade of Deng Xiaoping in the 1970s. During the Cultural Revolution (1966–1976), Hu was purged, recalled, and purged again by Mao Zedong.
The General Secretary of the Central Committee of the Communist Party of China is head of the Communist Party of China and the highest-ranking official within the People's Republic of China. The General Secretary is a standing member of the Politburo and head of the Secretariat. The officeholder is usually considered the "paramount leader" of China.
After Deng rose to power, following the death of Mao Zedong, Hu was promoted to a series of high political positions. Throughout the 1980s Hu pursued a series of economic and political reforms under the direction of Deng. Hu's political and economic reforms made him the enemy of several powerful Party elders, who opposed free market reforms and attempts to make China's government more transparent. When widespread student protests occurred across China in 1987, Hu's political opponents successfully blamed Hu for the disruptions, claiming that Hu's "laxness" and "bourgeois liberalization" had either led to, or worsened, the protests. Hu was forced to resign as Party general secretary in 1987, but was allowed to retain a seat in the Politburo.
The Eight Great Eminent Officials, abbreviated as the Eight Elders, were a group of elderly members of the Communist Party of China who held substantial power during the 1980s and 1990s. In the English-speaking world, these men are often called The Eight Immortals as an allusion to the Taoist deities commonly known as the Eight Immortals.
Student demonstrations took place in a number of Chinese cities from December 1986 until mid-January 1987. The demonstrations started in the city of Hefei before spreading to other cities such as Shanghai and Nanjing. The movement was heavily influenced by the Chinese intellectuals Fang Lizhi and Wang Ruowang, who were critical of the Chinese government’s lack of political reforms. The demonstrations quickly dissipated by mid-January before achieving any of its stated goals. The lack of response from Hu Yaobang, who was General Secretary of the Communist Party of China at the time, would result in his removal from power on January 15, 1987 and his replacement by Zhao Ziyang.
Hu's position as Party general secretary was taken by Zhao Ziyang, who continued many of Hu's economic and political reforms. A day after Hu's death, in 1989, a small-scale demonstration commemorated him and demanded that the government reassess his legacy. A week later, the day before Hu's funeral, some 100,000 students marched on Tiananmen Square, leading to the Tiananmen Square protests of 1989. This was a part of the Chinese Democracy Movement. Following the government's violent suppression of the 1989 protests, the Chinese government censored the details of Hu's life within mainland China, but it officially rehabilitated his image and lifted its censorship restrictions on the 90th anniversary of Hu's birth, in 2005.
Zhao Ziyang was a high-ranking statesman in China. He was the third Premier of the People's Republic of China from 1980 to 1987, Vice Chairman of the Communist Party of China from 1981 to 1982, and General Secretary of the Communist Party of China from 1987 to 1989. He lost power in connection with the reformative neoauthoritarianism current and his support of the Tiananmen Square protests of 1989.
Hu Yaobang's ancestors were Hakkas from Jiangxi. During the Ming dynasty (1368–1644) they migrated into Hunan, where Hu was born. Hu Yaobang was born into a poor peasant family, and received little formal education. As a child he never attended school, and he taught himself to read. Hu participated in his first rebellion when he was twelve, left his family to join the Chinese Communist Party when he was only fourteen, and became a full member of the Party in 1933. During the factional struggles that polarized the CCP during the 1930s, Hu supported Mao Zedong and opposed the 28 Bolsheviks.
Jiangxi is a province in the People's Republic of China, located in the southeast of the country. Spanning from the banks of the Yangtze river in the north into hillier areas in the south and east, it shares a border with Anhui to the north, Zhejiang to the northeast, Fujian to the east, Guangdong to the south, Hunan to the west, and Hubei to the northwest.
Hunan is a province of the People's Republic of China, located in the middle reaches of the Yangtze watershed in South Central China; it borders the province-level divisions of Hubei to the north, Jiangxi to the east, Guangdong and Guangxi to the south, Guizhou to the west, and Chongqing to the northwest. With a population of just over 67 million as of 2014 residing in an area of approximately 210,000 km2 (81,000 sq mi), it is China's 7th most populous and the 10th most extensive province-level by area.
The Long March was a military retreat undertaken by the Red Army of the Communist Party of China, the forerunner of the People's Liberation Army, to evade the pursuit of the Kuomintang army. There was not one Long March, but a series of marches, as various Communist armies in the south escaped to the north and west. The best known is the march from Jiangxi province which began in October 1934. The First Front Army of the Chinese Soviet Republic, led by an inexperienced military commission, was on the brink of annihilation by Generalissimo Chiang Kai-shek's troops in their stronghold in Jiangxi province. The Communists, under the eventual command of Mao Zedong and Zhou Enlai, escaped in a circling retreat to the west and north, which reportedly traversed over 9,000 kilometers over 370 days. The route passed through some of the most difficult terrain of western China by traveling west, then north, to Shaanxi.
Tan Yubao was a Chinese communist. He was born in Chaling County, Zhuzhou, Hunan Province. He was chairman of the communist base (Soviet) on the border of Hunan and Jiangxi Provinces. He once intervened to save the life of Hu Yaobang. He was a delegate to the 3rd National People's Congress.
Mount Lu or Lushan, also known as Kuanglu (匡庐) in ancient times, is situated in the northern part of Jiangxi province in Central China, and is one of the most renowned mountains in the country. It is located primarily in Lushan county-level city in Jiujiang Prefecture, although the northern portions are found in Lianxi District which was formerly known as Lushan District and until 2016 covered the majority of the Mount Lu. The oval-shaped mountains are about 25 km long and 10 km wide, and neighbors Jiujiang city and the Yangtze River to the north, Nanchang city to the south, and Poyang Lake to the east. Its highest point is Dahanyang Peak (大汉阳峰), reaching 1,474 m above sea level, and is one of the hundreds of steep peaks that towers above a sea of clouds that encompass the mountains for almost 200 days out of the year. Mount Lu is known for its grandeur, steepness, and beauty, and is part of Lushan National Park, a UNESCO World Heritage Site since 1996, and a prominent tourist attraction, especially during the summer months when the weather is cooler.
Zunyi is a prefecture-level city in northern Guizhou province, People's Republic of China, situated between the provincial capital Guiyang to the south and Chongqing to the north, also bordering Sichuan to the northwest. Along with Guiyang and Liupanshui, it is one of the most important cities of the province. The built-up area made of three urban districts of the city, Huichuan, Honghuagang, and Bozhou, had a population of 1,095,189 people; and the whole prefecture, including 14 county-level administration area as a whole, has a population of 6,127,009 at the 2010 census.
The Zunyi Conference was a meeting of the Communist Party of China (CPC) in January 1935 during the Long March. This meeting involved a power struggle between the leadership of Bo Gu and Otto Braun and the opposition led by Mao Zedong. The result was that Mao left the meeting in position to take over military command and become the leader of the Communist Party. The conference was completely unacknowledged until the 1950s and still no detailed descriptions were available until the fiftieth anniversary in 1985.
In 1949, the CCP successfully defeated Nationalist forces on mainland China, and the communists founded the People's Republic. In 1952, Hu accompanied Deng to Beijing, and Hu became the leader of the Communist Youth League from 1952–1966. Hu rose rapidly up the Communist Party hierarchy, until Mao sent Hu to work as First Party Secretary of Shaanxi in 1964, saying: "He needs some practical training". Hu may have been assigned to work outside of Beijing because he was judged as being not sufficiently enthusiastic about Maoism. Unlike many of his colleagues, Hu was able to keep his membership within the Party Central Committee until the 9th Party Congress in April 1969.
On April 22 1989, 50,000 students marched to Tiananmen Square to participate in Hu's memorial service, and to deliver a letter of petition to Premier Li Peng. Many people were dissatisfied with the party's slow response and relatively subdued funerary arrangements. Public mourning began on the streets of Beijing and elsewhere. In Beijing this was centred on the Monument to the People's Heroes in Tiananmen Square. The mourning became a public conduit for anger against perceived nepotism in the government, the unfair dismissal and early death of Hu, and the behind-the-scenes role of the "old men", officially retired leaders who nevertheless maintained quasi-legal power, such as Deng Xiaoping. The protests eventually escalated into the Tiananmen Square protests of 1989. Hu's promotion of the ideas on freedom of speech and freedom of press greatly influenced the students participating in the protests.
The Tiananmen Square protests of 1989 eventually ended in the violent suppression of protesters on 4 June 1989, in which hundreds of civilians were killed. Because the protests had been sparked by the death of Hu Yaobang, the government determined that any public discussion of Hu and his legacy could destabilize China by renewing debate about the political reforms that Hu supported. Because of the public association with Hu and the "Tiananmen Massacre", Hu Yaobang's name became taboo on the mainland, and the Chinese government censored any mention of him in the media. In one example of government censorship, printed media which commemorated the anniversary of his death in 1994 were withdrawn from publication.
The official three-volume biography and a collection of Hu's writings were slated for release in China. The project was originally begun by a group of Hu's former aides, led by Zhang Liqun (who died in 2003). After the government learned of the project, it insisted on taking control of it. One of the main issues that government censors identified was the concern that details of Hu's relationship with Deng Xiaoping (especially details of Hu's removal from power after resisting orders to crack down on student demonstrators in 1987) would reflect poorly on Deng's legacy. The authors of Hu's biography subsequently rejected offers from the government to released a censored version. Only one volume (dealing with events up to the end of the Cultural Revolution) of the biography written by Hu's former aides was eventually published, with the other two volumes held by the government and remaining unpublished.
Although magazines publishing commemorative articles were initially stopped from being released, the ban was lifted in 2005 and these magazines were publicly issued. Yanhuang Chunqiu , a reform-minded magazine, was allowed to publish a series of articles in 2005 commemorating the birthday of Hu Yaobang, but the government acted to limit the availability of the magazine. The issue commemorating Hu sold 50,000 copies, but the remaining 5,000 copies were destroyed by propaganda officials. This was the first time since his death that Hu's name appeared publicly.
On 20 November 2015, the 100th Anniversary of the birth of Hu Yaobang, Communist Party General Secretary Xi Jinping held a high profile commemoration ceremony for Hu Yaobang in Beijing. In contrast to the event held by the previous leadership ten years earlier, the 100th anniversary event was deliberately high-profile and attended by all members of the Politburo Standing Committee. Xi lavished Hu with praise for his accomplishments, and said that Hu "dedicated his life to the party and to the people. His led a glorious life, a life of struggle... his contributions will shine in history." Hu appeared as a character in the 2015 historical drama Deng Xiaoping at History's Crossroads .
Li Peng is a retired Chinese politician. Li served as the fourth Premier of the People's Republic of China from 1987 to 1998 and the Chairman of the Standing Committee of the National People's Congress, China's top legislative body, from 1998 to 2003. For much of the 1990s Li was ranked second in the Communist Party of China (CPC) hierarchy behind then Party General Secretary Jiang Zemin. He retained his seat on the CPC Politburo Standing Committee until 2002.
The Premier of the State Council of the People's Republic of China, sometimes also referred to informally as the "Prime Minister", is the Leader of the State Council of China, who is the head of government and holds the highest rank in the Civil Service. This position was originally known as Premier of the Government Administration Council of the Central People's Government from 1949, but changed to its current name in 1954.
Yang Shangkun was President of the People's Republic of China from 1988 to 1993, and was a powerful Vice Chairman and Secretary-General of the Central Military Commission under Deng Xiaoping. He married Li Bozhao in 1929, one of the few women to participate in the Long March, as did Yang.
Wan Li was a Chinese Communist revolutionary and politician. During a long administrative career in the People's Republic of China, he served successively as Vice Premier, Chairman of the Standing Committee of the National People's Congress (NPC), and a member of the Communist Party of China (CPC) Secretariat and its Politburo.
Hu Qili is a former high-ranking politician of the Communist Party of China (CPC). He was a member of the Politburo Standing Committee and a member of the Secretariat between 1987 and 1989. In 1989, he was purged because of his sympathy toward the students of the 1989 Tiananmen Square protests and his support for General Secretary Zhao Ziyang. However, he was able to get back into politics in 1991. In 2001, he was named chairman of the Soong Ching-ling Foundation.
Song Renqiong, born Song Yunqin, was a general in the People's Liberation Army of the People's Republic of China (PRC) and one of the Eight Elders of the Communist Party of China.
Chen Xitong was a member of the Politburo of the Communist Party of China and the Mayor of Beijing until he was removed from office on charges of corruption in 1995.
Wang Zhaoguo is a retired Chinese politician who came to prominence during the era of Deng Xiaoping. An automobile factory technician by trade, Wang had a long and varied political career, known for having acquired a ministerial-level position at the age of 41. He successively served as the First Secretary of the Communist Youth League, the chief of the party's General Office, Secretary of the Central Secretariat, Governor of Fujian, Head of the United Front Work Department and Vice-Chairman of the CPPCC.
The 13th Central Committee of the Communist Party of China was in session from 1987 to 1992. It held seven plenary sessions. It was preceded by the 12th Central Committee. It was securely succeeded by the 14th Central Committee.
Qin Jiwei was a general of the People's Republic of China, Minister of National Defense and a member of the Chinese Communist Party Politburo.
The Critical Moment – Li Peng Diaries is a book issued in 2010 in the United States by West Point Publishing House, a small publisher established by Zheng Cunzhu, a former 1989 pro-democracy activist. The book contains entries from a diary believed to be written by the former Chinese Premier, Li Peng, covering the events leading up to and shortly after the Tiananmen Square protests of 1989.
The Beijing Workers' Autonomous Federation (BWAF), or Beijing Workers’ Autonomous Union was the primary Chinese workers' organization calling for political change during the Tiananmen Square protests of 1989. The group was formed in the wake of mourning activities for former General Secretary Hu Yaobang in April 1989. The BWAF denounced political corruption, presenting itself as an independent union capable of "supervising the Communist Party," unlike the Party-controlled All-China Federation of Trade Unions (ACFTU).
Yan Mingfu is a retired Chinese politician. His first prominent role in government began in 1985, when he was made leader of the United Front Work Department for the Chinese Communist Party (CCP). He held the position until the CCP expelled him for inadequately following the party line in his dialogues with students during the 1989 Tiananmen Square protests. Yan returned to government work in 1991 when he became a vice minister of Civil Affairs.
Deng Liqun was a Chinese politician and theorist who was one of the leading figures of the Communist Party of China during the 1980s, most well known for his involvement with the party's propaganda work. Deng was born in Guidong County, Hunan province, and joined the Communist Party in 1936. He came from an intellectual family and joined the party out of intellectual commitment. He was often referred to as "Little Deng", to be distinguished from Deng Xiaoping, the "Old Deng".
The Tiananmen Square protests of 1989 were a turning point for many Chinese officials, who were subjected to a purge that started after June 4, 1989. The purge covered top-level government figures down to local officials, and included General Secretary Zhao Ziyang and his associates. The purge took the form of a massive ideological campaign that lasted 18 months. At least 4 million party members were under some sort of investigation. The government stated that the purge was undertaken for the purpose of “resolutely getting rid of hostile elements, antiparty elements, and corrupt elements" as well as "dealing strictly with those inside the party serious tendencies toward bourgeois liberalization” and purify the party.
1 2 3 4 5 6 7 Encyclopædia Britannica.
↑ 习近平纪念胡耀邦诞辰100周年讲话(全文). Duowei (in Chinese). 20 November 2015.
"China Braces for Tiananmen Square Massacre Anniversary". The Australian. 13 April 2009.
Becker, Jasper. "Zhao Ziyang: Chinese Leader Who 'Came too Late' to Tiananmen Square". The Independent. 18 January 2005. Retrieved 20 October 2011.
"Hu Yaobang". Encyclopædia Britannica Online. 2011. Retrieved 21 October 2011.
Fan, Maureen. "In China, Media Make Small Strides". Washington Post. 28 December 2008. Retrieved 23 October 2011.
Forney, Matthew. "Speed Read: Hu Yaobang", TIME Magazine . 20 November 2005. Retrieved 23 October 2011.
Gladney, Dru C. Dislocating China: Muslims, Minorities, and Other Subaltern Subjects. Chicago: Chicago University Press. 2004. ISBN 0-226-29776-4.
Kristof, Nicholas D. "Hu Yaobang, Ex-Party Chief in China, Dies at 73" (Obituary), New York Times , 16 April 1989. Retrieved 23 October 2011.
Lee, Khoon Choy. Pioneers of Modern China: Understanding the Inscrutable Chinese. Singapore: World Scientific Publishing. 2005. ISBN 981-256-464-0.
MacFarquhar, Roderick. "Foreword". In Zhao Ziyang, Prisoner of the State: The Secret Journal of Premier Zhao Ziyang . New York, NY: Simon and Schuster. 2009. ISBN 1-4391-4938-0.
Pan, Philip P. "China Plans to Honor a Reformer". Washington Post. 9 September 2005. Retrieved 22 October 2011.
"Glorious Life of Hu Yaobang Marked". People's Daily . 19 November 2005. Retrieved 22 October 2011.
Vogel, Ezra F. Deng Xiaoping and the Transformation of China. Cambridge, MA: The Belknap Press of Harvard University Press. 26 September 2011.
Wen Jiabao. "Recalling Hu Yaobang When I Return to Xingyi". [Chinese: 再回兴义忆耀邦]. People's Daily. 15 April 2010. Retrieved 23 October 2011.
Wu Zhong. "Hu, Wen, and Why". Asia Times Online. 21 April 2010. Retrieved 26 October 2011.
"Birth Anniversary Marked for Late Leader Hu Yaobang". Xinhua . 18 November 2005. Retrieved 23 October 2011.
Wen Jiabao. "Premier Wen Jiabao's article on Hu Yaobang's Visit to Tibet".People's Daily. 15 April 2010.
|
0.933302 |
Why I should learn German ?
Whatever plans you may have for the future, knowledge of German will increase your options. When you learn German you acquire a range of skills which can improve the quality of both your work and private life.
|
0.999624 |
What is perseverance and is it a valuable quality to attain?
Within the Journey of Life, perseverance is the ability to continue the journey despite the obstacles that will emerge. A perseverant individual possesses a persistent spirit and is willing to endure the diverse experiences that life offers them.
With the mentality to proceed, an individual character is retained when deciding to persevere. Perseverance serve as a positive energy determined to reach success and a concentrated focus. With a strong conviction to proceed, a bold courage is demonstrated in all circumstances.
A perseverant spirit is encouraging in nature and consistently resilient. Working with determination, adamant actions will convey their beliefs and ambition. Perseverance is a necessary spirit to acquire for the continuance of life.
Perseverance is a valuable quality to attain because it is an individual confidence to pursue. Through the practice of perseverance, an everlasting belief in life is established. The focus to continue will never prevent or limit our ability to develop and advance. Perseverance, a confident and persistent spirit that emanates energy to motivate our person and the people that surround us.
|
0.90249 |
MPC is widely adopted in the process industry as an effective means to deal with large multivariable constrained control problems. The main idea of MPC is to choose the control action by repeatedly solving on line an optimal control problem. This aims at minimizing a performance criterion over a future horizon, possibly subject to constraints on the manipulated inputs and outputs, where the future behavior is computed according to a model of the plant.
MPC has been used in industry for more than 30 years, and has become an industry standard (mainly in the petrochemical industry) due to its intrinsic capability for dealing with constraints and with multivariable systems. Most commercially available MPC technologies are based on a linear model of the process. For processes that are highly nonlinear, the performance of an MPC based on a linear model can be poor. This has motivated the development of Nonlinear Model Predictive Control (NMPC), where a more accurate (nonlinear) model of the plant is used for prediction and optimization.
PID type controllers do not perform well when applied to systems with significant time-delay. Perhaps the best known technique for controlling systems with large time-delays is the Smith Predictor. It overcomes the debilitating problems of delayed feedback by using predicted future states of the output for control. Currently, some commercial controllers have Smith Predictors as programmable blocks. There are, however, many other model-based control strategies have dead-time compensation properties. If there is no time-delay, these algorithms usually collapse to the PID form. Predictive controllers can also be embedded within an adaptive framework.
Most processes require the monitoring of more than one variable. Controller-loop interaction exists such that the action of one controller affects other loops in a multi-loop system. Depending upon the inter-relationship of the process variables, tuning each loop for maximum performance may result in system instability when operating in a closed-loop mode. Loops that have Single Input Single Output (SISO) controllers may therefore not be suitable for these types of applications. These types of controllers are not designed to handle the effects of loop interactions.
A multivariable controller, whether Multiple Input Single Output (MISO) or Multiple Input Multiple Output (MIMO) is used for systems that have these types of interactions. A model-based controller can be modified to accommodate multivariable systems. Loop interactions are considered as feed-forward disturbances and are included in the model description. Following SISO designs, multivariable controllers that can provide time-delay compensation and handle process constraints can also be developed with relative ease. By incorporating suitable numerical procedures to build the model on-line, adaptive multivariable control strategies result.
Model-Based Predictive Control technology utilizes a mathematical model representation of the process. The algorithm evaluates multiple process inputs, predicts the direction of the desired control variable, and manipulates the output to minimize the difference between target and actual variables. Strategies can be implemented in which multiple control variables can be manipulated and the dynamics of the models are changed in real time.
Dynamic Matrix Control (DMC) is also a popular model-based control algorithm. A process model is stored in a matrix of step or impulse response coefficients. This model is used in parallel with the on-line process in order to predict future output values based on the past inputs and current measurements.
Statistical Process Control (SPC) provides the ability to determine if a process is stable over time, or, conversely, if it is likely that the process has been influenced by "special causes" which disrupt the process. Statistical Control Charts are used to provide an operational definition of a "special cause" for a given process, using process data.
SPC has been traditionally achieved by successive plotting and comparing a statistical measure of the variable with some user defined control limits. If the plotted statistic exceeds these limits, the process is considered to be out of statistical control. Corrective action is then applied in the form of identification, elimination or compensation for the assignable causes of variation.
|
0.999767 |
To answer the question of how weed affects the brain, you must first discern the age of the brain in question. Pot use affects older brains differently than it does younger ones. That’s because while the adult brain is fully formed, the teenage brain is still developing, so even if your body has stopped growing, your brain will continue to change until your mid-twenties. Substances such as marijuana can cause alterations in brain structure, function and neurocognition in the developing teen brain. And because your brain is still maturing, any changes to its structure could be permanent.
The way weed affects the brain's structure starts with its active ingredient, THC, which scientists believe affect the brain’s endocannabinoid system. This is the part of the brain that respond to THC and, according to the American Psychological Association, it’s “important for cognition, neurodevelopment, stress response and emotional control.” Teens who smoke weed on a regular basis can experience “dialed down cellular activity in the endocannabinoid system,” which can be problematic for developing brains. This may explain why teenagers are more susceptible than adults to long-term side effects, like a decline in IQ, of repeated marijuana use.
What does this all boil down to? Smoking weed in your teens, and doing so frequently, can affect your brain development in a negative way.
Video of How does weed affect the brain?
|
0.999991 |
please contact me via my profile.
Then open the assets/css/style.css file using any text editor. I recommend Brackets Text.
Now look for the following code and replace highlighted text with your (imageName.extension) like (photo.png or photo.jpg).
To edit the text in the 'header' replace the highlighted text in the following code.
To edit the text in the 'About Section' replace the highlighted text in the following code.
⊚⊚ You can use <br/> tag to make a new line.
⊚⊚ You can also edit an image and change your personal information.
⊚⊚ You can get more icons here.
Now you can replace the highlighted Text in the following code with your (imageName.extension).
⊚⊚ the image in the <img> tag is the same in the <a> tag.
Replace the following code with the categories of the images.
⊚⊚ the image can have more than 1 category.
To edit the text in the 'Testimonials Section' replace the highlighted text in the following code.
then (inside index.html file) replace the highlighted text in the following code.
To edit the text in the 'Blog Section' replace the highlighted text in the following code.
If you want to change the icons replace the highlighted text in the following code.
To edit the text in the 'Contact Section' replace the highlighted text in the following code.
if you want to Put an image as a logo. put your images (recommended size 100px * 100px) in 'assets/images' folder.
Then add this <img src="assets/images/logo.jpg" alt="logo"> as shown in the following code.
⊚⊚ You can get more icons here And Text.
⊚⊚ put the URL link of each website inside the href attribute as shown in the following code.
|
0.965651 |
I have a hard time calling myself a caregiver because I always think of people who have had it so much worse.
You are definitely not alone in this - 50% of caregivers don’t identify as a caregiver.
Even if we do know we are a caregiver, many of us think of friends and family who have gone through much worse as “the real caregivers”. However it is important to see ourselves as caregivers and to consider the impact that caregiving is having on our mental and physical health. When we do this, it is easier to notice what types of things we could use help with and to get that help through resources that are available nearby.
If we are short term caregivers, it’s still important to acknowledge that we are caregiving so that we can be kind to ourselves and remember that there is additional stress and responsibilities and that life isn’t normal right now.
Research has shown that caregivers are twice as likely of developing a chronic illness, they have twice the rate of depression, and they are spending far more time and resources on caregiving than they realize. Caregiver stress is real. Caregiver loneliness is real. Caregiver burnout is real. We aren’t weak when we experience these things. We are all doing our best.
Caregiving isn’t a contest to see who can handle the most without needing help.
Caregiving resources are available as a part of any form of caregiving, to make it manageable.
Research has also shown that caregivers often feel deep meaning in caregiving and a profound sense of love. There is strength in caregiving. We can love something and find it deeply meaningful and also be experiencing doubt, stress, fear, and even anger.
The more we access resources to help us with caregiving and connect with others around caregiving, the more we will be able to experience the positive sides of caregiving - more of the good stuff, which can often be hard to feel.
By recognizing that you are a caregiver in whatever situation you are in, you are empowering yourself to take action for yourself. There are resources to help you in your caregiving - from food and transportation, to help with medical issues and in-home care.
Receiving care is a way to do an even better job at caring for those you love.
|
0.981116 |
A triangle is a polygon which consists of three sides (sometimes also called a trigon). Normally the vertices of the triangle are labeled counterclockwise by the uppercase letters A, B, and C. Each vertex has a vertex angle which is labeled by the corresponding greek letter, α, β, γ, respectively. The sides of the triangle are labeled by lowercase letters, corresponding to the particular opposite vertex.
There are several special triangles: acute triangle, obtuse triangle, equilateral triangle, isosceles triangle, right triangle, and isosceles right triangle.
acute A triangle is said to be acute if all three angles are acute (i.e. have values less than 90°).
obtuse A triangle having an angle α which is greater than 90° is said to be obtuse. The other two angles are necessarily acute.
equilateral An equilateral triangle is a triangle with all sides being equal.
isosceles If two sides of a triangle are equal but different to the third side, this triangle is called an isosceles triangle.
right A right triangle has one angle with exactly 90°. The sides of a right triangle have special names: the side opposite the right angle is called hypothenuse, the other two are called legs.
isosceles right An isosceles triangle having an angle of 90° is called an isosceles right triangle.
|
0.971438 |
Microsoft Azure is over 7 years old today and it is currently the flagship along with Office 365 for Microsoft’s Cloud platform. In 2010 when Azure first launched it was viewed as having limited documentation and was second or third class in comparison to Amazon Web Services. Amazon Web Services had managed breakthrough the barriers and would be myths about hosting data in the ‘cloud’ space.
The cloud is typically data centers around the country with a lot of NASs, SANs, and servers which are capable of housing insurmountable amounts of data. These data centers or “cloud storage” facilities grew by reducing client equipment costs of reducing the need for on-premise equipment and allowing the data to be managed at these data centers.
Most data centers typically have an availability time of about 99.9% and cost a fraction of the maintenance or upfront cost of purchasing servers, NAS, and SANs. For that reason, the cloud concept was an easy decision, which is rapidly becoming mainstream as the way to do business.
In 2011 Scott Guthrie, whom was the Vice President of the .Net platform transformed Azure. Guthrie and his team transformed Azure from using Silverlight into an HTML5 web portal. The moment that happened, Azure began to grow and expand its use to the variations of Microsoft users.
The ease and flexibility of using a web interface to manage and manipulate data is what has given Azure the edge since 2011 above other cloud platforms. Three important aspects of any use or migration into the cloud is ease of use, performance, and scalability. Microsoft has managed to combine all three necessities into one product and expounded upon that.
Since 2014, Microsoft Azure has moved into a variety of platforms since its expansion. Azure now accounts for IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service), and SaaS (Software-as-a-Service) as its incorporated services that clients and users can utilize. The integration of these platforms in Azure gives the ability for virtual environments and apps to be created in seconds, scaled, and billed based on utilization. Billing by usage as opposed to physical hardware and maintenance is a huge reduction in cost for organizations today. This is the major attraction to the Azure cloud space is its ability to quickly integrate and expand networks, then significantly cut costs of doing business immediately.
Azure has grown to expand past Microsoft products to incorporate IIS, BizTalk, SQL Server, Linux, Hadoop (HDInsight), including support of non-Microsoft databases that include SQL and no-SQL. The Azure platform is capable of not only integration and support, but also design of key infrastructure products. This integration of non-Microsoft products and features shows that the Azure platform is capable of much more than its original design. These are key features that businesses seek out when looking to move to the cloud.
Data security and risk of breaches is what has kept most companies and organizations away from the cloud in the past due to the fear of moving their data. This fear was not due to data breaches or security issues in the cloud, but due to data breaches that did take place with on-premise equipment. Many on-premise equipment due to high costs to maintain and replace have had out-of-date software, poorly written code, and low network infrastructure entry points. The reality is for most functions when handling security and maintenance of networks, it takes teams of people to handle the demands. These teams of people come at a cost including equipment costs as well which is what most companies have tried to push of as much as possible. Now with Azure, the answer to hand off the security and maintenance without equipment costs is all yet appealing.
Site to site replication to create redundancy and backups of VMs including critical data is the key function of site recovery. This recovery is based on Microsoft’s Hyper-V Replica. The data center version which is keeps the data is maintained with System Center Virtual Machine Manager.
Originally designed to be distributed by Microsoft, quickly moved to having 3rd party ISP’s distributing the service. The ISPs provide the data pipeline; however, Microsoft provides the secure private link. This pipeline provided by the ISP and link by Microsoft directly connects clients straight into Microsoft’s data centers. This pipeline and link does not travel over the internet. The data pipe has specs that range between 1Gbps to 10Gbps. 3rd Party ISPs that provide this service are AT&T, Equinix, Verizon, BT, Level 3, TelecityGroup, SingTel, and Zadara.
Virtual machines including new extensions for the VMs allows the manipulation, housing, and separation of critical data to include applications. Azure VMs not only support Windows, but also Puppet, Chef, and Linux. Antivirus protection for the VMs can be installed from a variety of providers such as Symantec, Trend Micro, or Microsoft. While other vendors charge for their antimalware, while in preview, Microsoft’s Antimalware is free and can be used on Worker and Web Roles.
Cloud App Discovery allows Azure to cipher through applications utilized in an environment and find the appropriate Cloud App to use in the Azure Cloud space which does the same functionality of the on-premise application. Cloud App discovery utilizes an agent installed on user machines which not only discovers new applications, but also monitors the use of these applications to determine which apps can be decommissioned or replaced for underutilization. This is the same functionality which is utilized by FlexNet Manager to determine license and application use.
and XenDesktop for Windows 10 (Replacement for RemoteApp) Delivery of Azure apps to any device, securely, and remotely. This combined with XenDesktop which does VDI (Virtual Desktop Interface) distribution allows Azure to deliver Windows 10 desktop solutions to users in a completely virtual environment. This combination of desktops, virtual apps, data, and networking bring the full desktop experience from any laptop or mobile device.
IT GURUS OF ATLANTA is a Microsoft Partner which specializes in Azure Active Directory Premium from architecture and design to implementation and support. Our certified and experience engineers coordinate with our seasoned architects to ensure that every project receives optimal attention with successful delivery. Migrating or managing an infrastructure into the Microsoft Cloud space can be a cumbersome project, however, collaborating with IT GURUS OF ATLANTA ensures that your project moves with ease by professionals that are trusted by Microsoft.
Let us collaborate to implement or support your company’s next efforts in projects towards the Microsoft Cloud space.
Through the new portal, intense monitoring tools that monitor VMs and analyze Azure websites can be found within the new portal through the “Monitor” option. Devops capabilities that include Visual Studio Online, project management, and source control.
Site-to-site connections that increase network connectivity between various internal and external. These virtual network connections are capable of encompassing Azure regions instead of just an LAN. Public IP capabilities without utilizing Azure’s endpoint control.
Azure AD Premium which integrates with Office 365, InTune, and is a solid part of the Enterprise Mobility Suite that combines all three segments. Enterprise Mobility Suite combines Azure Active Directory, InTune, and RMS (Rights Management Suite). The capabilities of Azure AD allow for single-sign on, multifactor authentication, reporting of malicious access attempts, group-based application access, and self-service password reset. Support of over 1,200 SaaS applications, from Citrix GoToMeeting, Salesforce.com, Microsoft apps, and Google Apps.
|
0.999998 |
The million dollar question everyone is asking is, where did summer go? In just a few days, it will be time to get back in the groove of packing lunches, scheduled bed times, and that age old question of what to make for dinner. Making dinner is great, but what's even better is when dinner from the night before can transform into a fresh lunch the next day, or another dinner with a new touch for another night. Here are 10 meals that go from dinner to lunch (and even breakfast) any night of the week.
For Dinner: Roasted Corn Salad The Remix: Bring corn salad to room temperature and add to a green salad, or top it on tacos for the next night's dinner.
For Dinner: Cilantro, Mint, and Basil Yogurt Dip The Remix: Spread this dip on a sandwich to add flavor instead of regular mayo.
For Dinner: Grilled Leg of Lamb The Remix: Slice this leg of lamb thin, add thick cut tomatoes and leafy greens, and make sandwiches for lunch the next day. Lamb gyros are a great dinner option, adding a warm fluffy pita, fresh vegetables and classic tzatziki sauce.
For Dinner: Firecracker Crab Cakes The Remix: Reheat these crab cakes and flatten them to make a crab cake sandwich for lunch, or add a small green salad and have the sandwich with dinner.
For Dinner: Black and White Sesame Crusted Salmon The Remix: This salmon is great as a stand out dish for dinner, but it's also great the next day, flaked and tossed in a salad for lunch.
For Dinner: Roasted Pork Loin with a Pistachio Crust The Remix: Slice this pork loin into thick slices, quickly sear and make a great sandwich for lunch.
For Dinner: Chicken Thighs with Meyer Lemon Salsa The Remix: Extra salsa can be made and added on top of eggs, a garnish for hummus, or a topping to steak or fish.
For Dinner: Pork Shoulder 2 Ways The Remix: Pork shoulder is so versatile. One pork shoulder can make 3 or 4 different meals. Slice for sandwiches, shred and mix with your favorite barbecue sauce and have pulled pork, and if the bone is in, it can be used to make a rich and hearty soup.
For Dinner: Lentil Salad The Remix: Lentil salad is great with a piece of protein for energy all day long. Sauté the lentils and top with a piece of seared salon for a quick and easy lunch or dinner.
|
0.967273 |
Improve your routine habits for better sleep: Getting engaged in social activities, being optimistic with thoughts, exercising regularly, exposing to early morning sunlight, and limiting caffeine and alcohol intake encourages better night sleep.
Better your sleeping environment at nights: Avoid artificial lights like sitting in front of computer or TV or reading from back lit lights from an ipad for longer hours especially before retiring to bed. Artificial lights at night can suppress your body’s production of melatonin, the hormone that makes you sleepy. Spend time outdoors as often as you can before bed time.Use your bedroom only for sleep.Make sure your bedroom is quiet, dark, and cool, and your bed is comfortable. Noise, light, and heat can cause sleep problems.
Maintain a routine bedtime schedule: Go to bed and wake up at the same time every day. Adjust your bedtime to match when you feel like going to bed, even if that’s earlier than it used to be.
Develop bedtime rituals: If your mind is too active when you get into bed you will not be able to fall asleep, no matter how tired you are. Follow relaxation techniques that disengages your thoughts. A ritual like taking bath or playing music helps you wind down. Relaxation and stress management techniques, such as deep breathing and progressive muscle relaxation, benefits substantially.
Limit your use of sleeping aids and sleeping pills: Many sleep aids have side effects and are not meant for long-term use. Sleeping pills don’t address the causes of insomnia and can even make insomnia worse in the long run. Therefore, it’s best to limit sleeping pills to situations where your health or safety is threatened.
Improve day time nap if your sleep at nights is hampered: People are biologically programmed to sleep not only for a long period in the middle of the night but also for a short period in the middle of the day. So, if you don’t feel fully alert during the day, a nap may be just what you need. For many people, taking a brief nap can provide the needed energy to perform fully for the rest of the day.Naps as short as five minutes can benefit health in old age. Try to nap in a comfortable environment preferably with limited light and noise.
|
0.989091 |
Use an encyclopedia or other reference source(s) to help you answer the questions.
1. How many representatives serve in Iowa’s state legislature, the General Assembly?
2. Where did the name of the state come from?
3. Who was the president of the United States when Iowa became the 29th state?
4. What state will you first enter if you travel south from Iowa?
5. What industry uses about 90% of Iowa’s land?
6. Did Iowa ever have any forests?
7. The state’s very independent and thoughtful citizens cannot be taken for granted by any political party. Which party does the majority tend to favor?
8. What is the state nickname?
|
0.999627 |
Today, many vendors are offering big data analytics solutions for service provider networks. If you’ve done some research on analytics, you know the basic processes involved – data collection and processing, identifying data patterns, making sense out of these patterns, and then using these insights to take actions that address a business need.
In response to today’s increasingly complex services ecosystem where network operators are under significant pressures to cater to the fast-changing needs of their customers’ service demands, an intelligent automation approach is appealing to a growing number of network operators.
But if the goal is to use analytics to enable network automation, what important features and attributes should you consider before selecting an intelligent automation solution? In order to answer this question, let’s walk through the various steps involved in the analytics process.
Have you heard of the ‘three V’s’ of big data analytics? These are 3 important factors needed to understand and act on data collection and processing. They are: Volume, velocity, and variety. Volume is the V most people associate with big data because the size of the data is many orders of magnitude larger than traditional datasets. This usually means multiples of terabytes or petabytes. Velocity refers to how fast the data is added to the dataset. Variety refers to the different types of data that need to be collected and managed. For network operators, that data can come from multiple sources and arrive in multiple formats like location data (mobile users, for example), OSS billing data or network telemetry. This data must be efficiently collected and stored somewhere for processing.
Key Considerations: Data can be very different depending on where it originates, and much of it is unstructured. This means it will not fit neatly into fields on a spreadsheet or in a database. The vast volumes of data are stored in what are known as data lakes, which keep the data in its raw format under a flat hierarchy until needed for analysis. To perform an analysis, the data is read directly from the data lake and transformed on the fly using distributed processing frameworks like Apache Spark and Hadoop. Bottom line, given the inherent difficulties associated with managing the velocity, volume, and variety of that information, the analytics solution should provide a robust data clustering framework with the capacity to rapidly ingest, normalize, categorize, store, and analyze data.
Big data by itself are meaningless. In order to unlock its true value and use them to drive smart business decisions, network operators need efficient tools to translate heterogeneous data into meaningful insights. This involves advanced machine learning algorithms that can do predictive or prescriptive analytics, using a variety of techniques ranging from classical probability and statistics to modern deep learning.
Key Considerations: An effective analytics solution should support a rich library of advanced analytics algorithms that allow network operators to extract various levels of information – ranging from hindsight all the way to foresight. However, successful implementation of analytics to solve a business problem also depends on combining expertise from multiple fields, including data science, software engineering, storage, network operations, and systems integrators. The ideal solution will foster an environment for effective collaboration among all these professionals. An ideal solution would use a DevOps approach to network analytics with a robust ecosystem and framework for collaboration among experts and cross-functional teams.
Successful implementation of analytics to solve a business problem also depends on combining expertise from multiple fields, including data science, software engineering, storage, network operations, and systems integrators.
After extracting meaningful information from the network, the final and most important step is to take action. For the action to be automated, the intelligence from the network must be fed directly back into the operational and functional processes.
Key Considerations: Intelligent automation requires an extensible and open architecture that enables gathering and translation of network intelligence into specific actions. This means the analytics solution should allow for easy integration with policy systems that govern the integrity of the network and actionable systems like multi-domain service orchestration systems.
The analytics solution should allow for easy integration with policy systems that govern the integrity of the network and actionable systems like multi-domain service orchestration systems.
Ciena’s Blue Planet software suite and Blue Planet Analytics (BPA) solution provides a unique combination of the above attributes and more. If you’d like to explore further, please download this white paper, Making Intelligent Automation a Reality with Advanced Analytics. In this paper, you will also find examples of real-world network analytics use cases that take advantage of these powerful attributes.
Thank you for this information. It will be really helpful.
|
0.999801 |
I need a freelance content writer to help out with a project i'm working on. It would...content writer to help out with a project i'm working on. It would include drafting newsletters, brochures, developing image direction and copywriting for social media, emails for mass marketing, SMS and digital content. Would prefer a freelancer close to location.
|
0.99996 |
In this article, you will learn about how to use loyalty programs for growing loyalty with customers by giving you 1) a short introduction to loyalty and rewards programs, 2) tips how you can increase your customer’s loyalty by using reward programs, and 3) a short conclusion.
A loyalty program is a rewards program that is offered by a business to their customers. Loyalty programs serve two purposes: to provide customers with a reward for being loyal to a brand and to provide valuable customer information to the issuing business. Loyalty programs are valuable to both businesses and customers because businesses are able to procure a fuller and more informative evaluation of the kinds of products customers purchase and which products are often purchased together. In this way, businesses can serve their customers better by offering incentives that customers are interested in.
There are several different types of loyalty programs, and most businesses choose one to participate in. One of the most common loyalty programs for retailers is a points-based program. A points-based program will award customers points for engaging with the company. Often times, customers are awarded loyalty points for their purchases. This is a simple service but the downside for customers is that many programs do not offer rewards in the short term. Businesses like airlines and hotels often offer a different kind of program called tiered programs. By offering a tiered loyalty program, they can separate their most loyal clients from the more casual users. Tiered loyalty programs often have few benefits for those in the lowest tiers, but the rewards can be very lucrative for the most loyal customers. These types of programs cost a lot of money for both the customer and the business. The final major loyalty program is a coalition or partnership program. These programs work on an open system where customers can earn rewards points by shopping with participating businesses. While customers delight in this kind of open system, it is not advantageous for most businesses because it does not stress loyalty like other programs do.
A loyalty program should benefit both the customer and the business but in many cases the loyalty program begins to cost the business more money than it is worth. Businesses should use loyalty programs to increase customer loyalty and retain regular customers because by retaining just 5% of their customers, businesses can increase their profits by nearly 100%. According to a report by Manta, repeat customers spend as much as 67 percent more on purchases than new customers do. Large and small businesses can use loyalty programs to increase their customer retention rates and grow their profits by targeting their customer group, creating programs their customers are interested in and utilizing the valuable feedback that a good rewards program can provide them.
Loyalty programs are a great way for both small and large businesses to increase their customer loyalty and improve their customer retention. By creating a focus on a target group and providing them services they are interested in, businesses can avoid the pitfalls that plague many loyalty programs in the market today.
Identifying a target market is one of the most important tools in business, and this includes loyalty programs. Segmenting customers into defined groups helps businesses to make sense of data and make more informed decisions regarding their customers. By segmenting customers, businesses can easily identify their most profitable customers as well as focus on customers who are most likely to engage with the business. Loyalty programs do not benefit from casting a wide net and by identifying a target audience, businesses can use their resources wisely. This does not mean that a business should only focus on its most profitable customer base, but it does allow businesses to adjust their marketing for specific groups. To most effectively market to their customers, businesses should work with a manageable number of segments rather than trying to meet the needs of several customer groups with one target.
Once customers have been broken up into manageable groups according to their behaviors, businesses can identify the types of behavior that they want to encourage through their loyalty program. To begin, businesses must identify the behaviors that are most important to them. Some businesses may want to reward the big spenders while others may way to reward the frequent visitors, and they should recognize the difference between the two. For example, Delta Airlines recently changed its Skymiles program to reflect the amount of money spent on each ticket purchase so that customers who routinely buy expensive tickets can earn the similar rewards as those who regularly take long-haul flights. By prioritizing the kind of behavior they want to encourage, businesses can reach out to their customer bases more easily and reward them fairly for their loyalty.
The best thing that a business can do to run an effective loyalty program for their customers is to keep it simple. Running an easy to use rewards program at launch provides many benefits for the program and the business. Loyalty programs should begin with simple spending rules.
The most effective loyalty programs do not include a long list of rules and restrictions for the rewards program. Customers that read the rules will often find them confusing or too exclusive, and they will lose their initial excitement over the possibility of rewards. Starting out simple also allows businesses to make changes that have been suggested by customer feedback. Instead of launching complicated rewards programs, businesses should consider implementing the ideas for the rewards programs slowly and over time. This will show the customers that the loyalty program is evolving and taking on new functions that may benefit them.
As the loyalty program evolves, some businesses choose to form partnerships or coalitions with others to cast a wider net for their customers. They do this because research and customer surveys show that many consumers crave the flexibility that affiliate programs offer. Partnership programs also create excitement for customers as they are able to earn rewards through normally mundane tasks such as paying the electricity bills or filling their cars with petrol. When businesses run these partnership programs correctly, they are able to exhilarate customers without endangering customer loyalty. There are many benefits to running a service that works alongside other businesses. The first is that the program is more likely to be often used because the rewards ID, card or token is more likely to be carried in the customers wallet or purse, and it serves as a regular reminder of the business. A second benefit is that the customer database is usually larger and includes the data of many different target markets. With a broader availability for data collection, businesses will experience higher penetration rates as well as a more detailed analysis of customer trends and data.
The coalition loyalty program is most commonly found in the travel industry. Airlines have become infamous for offering rewards to customers who spend money through their affiliate programs on their websites. By offering these services, airlines drive more traffic to their websites, and they learn more about consumer shopping and travel habits. Several airlines also offer partnerships with hotels. This is an excellent example of a partnership program because consumers who are regularly flying usually require hotel rooms. Since airlines and hotels are natural allies rather than a competing partner, they can work in tandem to provide greater rewards to loyal customers. In 2013, Delta Airlines and Starwood Hotels introduced their innovative Crossover Rewards program where customers could earn 1 Starpoint for every dollar spend on Delta fligths and customers earn 1 mile for every dollar spent at 1,100 Starwood hotels. Customers who had earned top-tier rankings with either company also gained additional benefits, with SPG Platinum members enjoying the elite benefits on Delta flights and Platinum Medallion members at Delta earning access to elite perks at Startwood hotels.
It may seem easier for both big and small business to offer products as rewards to customers who are loyal to their business. But consumer analysis may show that the business’s customers are interested in a wide variety of things. Businesses like supermarkets often offer these cash rewards for customers to spend in store so that they can purchase the items that they want or need. Offering cash rewards and incentives offers customers the freedom of choice while still driving them back to the business that they earned rewards from.
Sainsbury’s is a UK supermarket and retailer that runs one of the most popular rewards systems in the UK. The format is simple: customers can earn 1 Nectar point for every £1 spent in a store, online or on fuel. Sainsbury’s also features events where shoppers can earn double points on their purchases or where their points are worth more in cash or vouchers. Typically, 500 Nectar points are worth £2.50 in vouchers that can be used in store or online. These cash rewards allow customers to spend their vouchers in anyway they see fit including fuel. It is the fuel benefits that drive many customers to the Nectar card program.
To run a loyalty program, rewards should be given out strategically. While it may seem easy to offer rewards that come from excess stock, businesses should think outside the box and offer customers rewards that are worth working for. It is important to remember that loyalty programs do not just give free products away, customers are earning them through spending money and time on the company.
Offering valuable rewards is an opportunity to offer personal rewards. By owning a database of consumer data that has been well segmented, it is easy to see what matters to each group. By offering relevant rewards to customers, they will feel that the program offers a more personal service, and they are more likely to continue to use the loyalty program after they have earned their first reward. Marks and Spencer, a European retailer, offers a loyalty program that rewards its customers through a variety of ways. While most loyalty customers are offered vouchers in the post each quarter, the biggest spenders are invited to the store for exclusive events involving personal shoppers, manicurists, fashion shows and free products. These events drive customers to the store and offer customers a personal service. Because Marks and Spencer is a full-service retailer, loyal customers are also offered preferred rates on travel money, and this has been one of the leading contributors to the popularity of the program.
The best way to promote a business or service is through word of mouth and today, word spreads faster than ever through social media. Implementing a social media strategy has become critical for the success of a loyalty program. In addition to significantly increasing organic word of mouth mentions, businesses can reward customers for mentioning them by attaching a currency value to online interactions. Marriott recently piloted a program where they gave away 5 points to customers who mentioned one of their branches or used a prescribed hashtag in a Tweet. Using this program, dedicated travelers could earn 100 points each day by mentioning Marriott online.
To use social media effectively, sharing should be made easy. To start, make it easy for customers to reach the business through social media and be certain to respond. Lead conversations that are important to customers through social media but also share funny and relevant content to encourage interactions. Finally, do not forget to ask the customers to share on social media. Businesses who do not ask, do not receive, and customers should be encouraged to share as soon as their order has been placed.
Businesses should never waste opportunities to learn about their customers, and a loyalty program will often lead customers to answer questions more honestly as they believe that the answers will benefit them. A customer loyalty program is a treasure trove of data that can be analyzed and used to improve a business overall. This data can tell business more about the motivations of its customers, especially its top customers. Since 20% of customers often generate 80% of the sales, this new interaction can provide a new way to communicate with customers. A loyalty rewards program will help a business conduct research that does not feel intrusive. There can also be space for customers to be rewarded for their feedback to be reminded that their feedback is valuable.
Like any part of a business, it is crucial to track accurately the performance of a loyalty program. There are several ways that you can track how successful your program is and the method chosen should reflect the stated goals and intentions of the program. To begin, a business can track the customer retention rate. Customer retention is the underlying goal of most loyalty programs and by running an A/B test, businesses can see if their loyalty program members are more active than non-members.
Businesses can also calculate their negative churn. This is a measurement of people who purchase additional services such as upgrades from the business. The growth of the negative churn can help offset the natural loss of customers from the business. This metric is very informative particularly in tiered loyalty programs.
The net promoter score is a metric that measures how satisfied your customers are by your service. It can be calculated by subtracting the number of people who would not recommend your business from the number of people who would recommend your business. This measurement is an ideal way to measure the progress of your loyalty program.
A final metric that may be useful to your business is the customer effort score. This metric measures the actual experience of a customer by asking the customer how much effort they invested in solving a problem with the company. When tracking customers, it is just as important to track the unhappy ones as the happy ones because 48% of customers who had a bad experience with a company told at least 10 people.
A customer loyalty program can help your business retain customers and provide valuable insight into the motivations and habits of your customers. By taking advantage of the opportunities provided by the access to customer data through these programs, businesses can both learn about their customers and work to orient their loyalty programs to retain top customers. By providing valuable rewards in exchange for valuable information, businesses can reach out and touch customers like never before.
|
0.999744 |
For the football player, see Sergei Belov (footballer).
Sergei Alexandrovich Belov (Russian: Серге́й Алекса́ндрович Бело́в; January 23, 1944 – October 3, 2013) was a professional basketball player, most noted for playing for CSKA Moscow and the senior Soviet Union national basketball team. He is considered to be one of the best European basketball players of all time, and was given the honor of lighting the Olympic Cauldron with the Olympic flame during the 1980 Summer Olympics opening ceremony, in Moscow.
In 1991, Belov was named by FIBA as the Best FIBA Player ever. He became the first international player to be inducted into the Naismith Memorial Basketball Hall of Fame on May 11, 1992. He was also inducted into the FIBA Hall of Fame in 2007 and was named one of the 50 Greatest EuroLeague Contributors in 2008.
Sergei Belov was born in the village of Nashchyokovo, Shegarsky District, Tomsk Oblast, Soviet Union. In 1968, he became an Honored Master of Sports of the USSR. He became an Honored Coach of Russia in 1995, and served as President of the Russian Basketball Federation (1993–98).
At the age of twenty, Belov made his debut in the USSR League, with the team of Uralmash Sverdlovsk, where he played from 1964 to 1967. He then played with CSKA Moscow for twelve years. With CSKA, he won the USSR League championship eleven times (1969, 1970, 1971, 1972, 1973, 1974, 1976, 1977, 1978, 1979, 1980), the USSR Cup twice (1972, 1973), and the EuroLeague twice, in 1969 and 1971.
As a member of the senior Soviet Union national basketball team, for nearly fourteen years (1967–1980), Belov helped them win a Summer Olympic Games gold medal in 1972, and three bronze medals in 1968, 1976, and 1980. He also helped them to become the FIBA World Cup champions in 1967 and 1974, and the EuroBasket champions in 1967, 1969, 1971, and 1979. He also won the Summer Universiade, in 1970, as well.
In the gold medal game of the 1972 Summer Olympics, Belov scored 20 points against the United States national basketball team, as the Soviet Union controversially defeated the USA, by a score of 51–50, to win the gold.
Belov was the head coach of CSKA Moscow, with whom he won the USSR League championship in 1982 and 1990. He was also the head coach of Ural Great Perm. With Ural Great Perm, he won the Russian Championship title in both 2001 and 2002, the Russian Cup in 2004, and the North European League championship in 2001.
As the head coach of the senior men's Russian national basketball team, he won silver medals at both the 1994 FIBA World Championship and the 1998 FIBA World Championship, and the bronze medal at the EuroBasket 1997.
Sergei Alexandrovich Belov died on October 3, 2013, in Perm, Russia.
^ Yardley, William (October 3, 2013). "Sergei Belov, Star Guard Who Led Soviet Upset of U.S., Dies at 69". The New York Times. Retrieved October 5, 2013.
^ Sergei Belov FIBA Profile. Fibaeurope.com (1972-09-09). Retrieved on 2011-11-02.
^ FIBA Hall of Fame page on Belov Archived 2008-09-10 at the Wayback Machine. Halloffame.fiba.com. Retrieved on 2011-11-02.
^ a b Great Russian Encyclopedia (2005), Moscow: Bolshaya Rossiyskaya Entsiklopediya Publisher, vol. 3, p. 227.
^ "Умер олимпийский чемпион по баскетболу Сергей Белов". Lenta.ru. 3 October 2013. Retrieved 3 October 2013.
The 1980 Summer Olympics, officially known as the Games of the XXII Olympiad, was an international multi-sport event held in Moscow, Soviet Union, in present-day Russia. The 1980 Games were the first Olympic Games to be staged in Eastern Europe and they were the first Olympic Games to be held in a socialist country, and the only Summer Games to be held in such a country until 2008 in Beijing, China. These were the final Olympic Games under the IOC Presidency of Michael Morris and this prompted the Soviet-led boycott of the 1984 Summer Olympics. The only two cities to bid for the 1980 Summer Olympics were Moscow and Los Angeles, the choice between them was made on 23 October 1974 in the 75th IOC Session in Vienna, Austria. Los Angeles would eventually host the 1984 Summer Olympics, eighty nations were represented at the Moscow Games – the smallest number since 1956. Six nations made their first Olympic appearance in 1980, Botswana, Laos, cyprus made its debut at the Summer Olympics, but had appeared earlier at the 1980 Winter Olympics in Lake Placid, New York.
Sri Lanka competed for the first time under its new name, Benin had competed previously as Dahomey and Zimbabwe competed for the first time under that name. The Soviet invasion spurred Jimmy Carter to issue an ultimatum on January 20,1980,65 countries and regions invited did not take part in the 1980 Olympics. Many of these followed the United States boycott initiative, while others cited economic reasons for not coming, under Ayatollah Khomeini hostile to both superpowers, boycotted when the Islamic Conference condemned the invasion. Many of the boycotting nations participated instead in the Liberty Bell Classic, known as the Olympic Boycott Games, in Philadelphia. However, the nations that did compete had won 71 percent of all medals, competitors from three countries – New Zealand and Spain – competed under the flags of their respective National Olympic Committees. Some of these teams that marched under other than their national flags were depleted by boycotts by individual athletes. The impact of the boycott was mixed, some events, such as field hockey and equestrian sports, were hard hit, while others such as boxing, rowing, swimming and field and weightlifting had more participants than in 1976.
The Opening Ceremony of the 1980 Summer Olympics was the official opening ceremony held in the afternoon at 16,00 Moscow Time on 19 July 1980 in the Grand Arena of the Central Lenin Stadium. It was attended by the Chairman of the Presidium of the Supreme Soviet of the USSR, Leonid Brezhnev, countdown of Kremlin Clock chimes at 16,00 Moscow Time. Fanfare by the Herald Trumpeters, Moscow Fanfare by Soviet musician and composer A. Golovin Introduction of the Soviet leader, playing of the national anthem of the Soviet Union. The card stunt displays the coat of arms of the USSR, Parade of Greek chariots in the stadium, followed by red flags with the emblem of the Moscow Olympics on them. The song Stadium of my Dreams was heard, greece enters first, the Soviet Union last. Other delegations enter in Cyrillic alphabetical order Welcoming remarks by the chairman of the Moscow Olympic Organizing Committee OCOG-80, speech by the President of the International Olympic Committee, Lord Killanin, his final Olympic Opening Ceremony speech.
Soviet leader Leonid Brezhnev announced the opening of the Olympic Games, the flag was carried by eight Masters of Sports of the USSR accompanied by 22 others. The flag was raised to the Olympic Anthem sung in Russian, the flame was carried into the stadium by triple jumper Viktor Saneyev. The last runner was Sergei Belov, member of the Soviet Union national basketball team, Belov ascended to the cauldron through a path of cards created by the card stunt. Olympic Oath, taken by gymnast Nikolai Andrianov Judges Oath, taken by wrestling referee Alexander Medved, salyut 6 crew Leonid Popov and Valery Ryumin sent their greetings to the Olympians and wished them happy starts in the live communication between the station and the Central Lenin Stadium. They appeared on the scoreboard and their voices were translated via loud speakers. Artistic performance Friendship of the Peoples, A dance suite featuring the traditional dances of the 15 Soviet republics, the Russian finale featured troikas and a final performance by the performers from all the republics.
The 1976 Montreal Summer Olympics, officially called the Games of the XXI Olympiad, was an international multi-sport event in Montreal, Quebec, in 1976, and the first Olympic Games held in Canada. Montreal was awarded the rights to the 1976 Games on May 12,1970, at the 69th IOC Session in Amsterdam, over the bids of Moscow and it is so far the only Summer Olympic Games to be held in Canada. Calgary and Vancouver hosted the Winter Olympic Games in 1988 and 2010, the vote occurred on May 12,1970, at the 69th IOC Session in Amsterdam, Netherlands. Los Angeles was eliminated after the first round and Montreal won in the second round, Moscow would go on to host the 1980 Summer Olympics and Los Angeles the 1984 Summer Olympics. One blank vote was cast in the second and final round, toronto had made its third attempt for the Olympics but failed to get the support of the Canadian Olympic Committee, which selected Montreal instead. Robert Bourassa, the Premier of Quebec, first asked Prime Minister Pierre Trudeau to advise Canadas monarch, Elizabeth II, Bourassa became unsettled about how unpopular the move might be with sovereigntists in the province, annoying Trudeau, who had already made arrangements.
The Oxford Olympics Study estimates the outturn cost of the Montreal 1976 Summer Olympics at USD6.1 billion in 2015-dollars and cost overrun at 720% in real terms. This includes sports-related costs only, that is, operational costs incurred by the committee for the purpose of staging the Games. The competition venues, the Olympic village, international broadcast center, and media and press center, the cost overrun for Montreal 1976 is the highest cost overrun on record for any Olympics. The cost and cost overrun for Montreal 1976 compares with costs of USD4.6 billion, average cost for the Summer Games since 1960 is USD5.2 billion, average cost overrun is 176%. The ceremony marked the opening of the Games of the XXI Olympiad, the queen entered the Royal Box with her consort, Prince Philip, Duke of Edinburgh, and her son, Prince Andrew. The parade of athletes began moments with the arrival of the Greek team, All other teams entered the stadium according to French alphabetical order. Although most would eventually boycott the Games in the days to follow, much of the music performed for the parade was arranged by Vic Vogel and was inspired by late Quebec composer, André Mathieu.
PBC CSKA Moscow is a Russian professional basketball team that is based in Moscow, Russia. The club, currently owned by Norilsk Nickel, is a member of the VTB United League and the EuroLeague. It is often referred to in the West as Red Army or the Red Army team for its past affiliation with the Armed Forces sports society, which was associated with the Soviet Army. In their second most recent EuroLeague championship in 2008, they defeated Israeli powerhouse Maccabi Tel Aviv, 77–91, CSKA lost in the 2007 final 93–91 to Panathinaikos on the Greens home floor, the Nikos Galis Olympic Indoor Hall in Athens. In 2008, they won a rematch of the 2006 final against Maccabi 91–77 in Madrid, in 2009, they lost a rematch of the 2007 final against Panathinaikos 73–71 in Berlin. The club competed in 8 consecutive EuroLeague Final Fours from 2003 to 2010, over many years, CSKA has the reputation for being one of the richest clubs in Europe. CSKA was founded on 29 April 2013, known as OPPV, OPPV, which means Опытно-показательная военно-спортивная площадка всевобуча, a department in the General military education service, was the first central sports deparment of the Red Army.
It was based on the pre-revolutionary Community of Amateur Skiers, the first success of the basketball department came at the 1924 Soviet Championship, which was played between cities, not clubs. Two more titles followed in 1928 and 1935, in 1938, the Soviet Championships were played between clubs, and CSKA under the name CDKA debuted there. By the end of the Great Patriotic War, CSKA established itself as one of the most respected Soviet basketball teams. In 1953 and 1954, the club was renamed CDSA, between 1955–60 it was known as CSK MO, and finally in 1960 it received its current name CSKA, CSKA has had a long history of success. They won the European Cup in 1961,1963,1969, and 1971, won the Soviet Championship 24 times, and won the Russian League title every year from 1992 through 2000, and 2003 through 2013. CSKA made the Final Four of the EuroLeague in 1996,2004, though CSKA eventually lost in the semifinals on their home court to Spanish League club Tau Cerámica and to Panathinaikos of the Greek League in the third-place game.
Jānis Krūmiņš was the FIBA European Champions Cup Finals' Top Scorer 3 times (1958, 1959, 1960).
Bob Morse was the FIBA European Champions Cup Finals' Top Scorer 2 times (1975, 1976).
Arvydas Sabonis was the EuroLeague Finals' Top Scorer 2 times (1986, 1995).
Dejan Bodiroga was the FIBA SuproLeague Finals' Top Scorer (2001), and the EuroLeague Finals' Top Scorer (2003).
Chess Grandmaster Nona Gaprindashvili, a recipient of the Medal "For Distinguished Labour"
Cosmonaut Georgy Grechko, a recipient of the Medal "For Distinguished Labour"
Kevin Durant won the MVP in 2010.
Kyrie Irving won the MVP in 2014.
Oscar Furlong won the inaugural award in 1950.
The official basketball ball of the North European Basketball League (NEBL).
|
0.999993 |
I was asked recently what 3 SEO tactics I would recommend for increasing rankings. I have been asked this question many times over many years and while the answer differed each time was a short answer. The answer I gave today however was much longer and had many factors.
While the answer is a long one, the factors can be summarized by three groups: relevance, trust & performance.
Improve Page Authority through internal linking and external link signals. Make it easy for users to share your content via widgets to increase social signals. Pay attention to the content infrastructure to improve site speed & optimize delivery while monitoring the site for malware/hijacking and add SSL.
Increase rankings through the newest category of tactics around user signals. Start with ensuring an optimal content experience by cleaning up broken links and images. Improve CTR by optimizing the title and meta description. Diversify the page content formatting to include images and page headings to better engage the visitor preventing bounce/pogo sticking. Leverage email and remarketing to bring return visitors back to the site. Add clear CTAs to satisfy query intent.
|
0.996088 |
Why are the stops so close together?
Did the like once connect with the present day "D" branch of the green line?
When was the last time a train rode the rails passed the current end of the line?
The stops are close together now because the line is short so it can handle many stops while still being a very fast way downtown and because lots of pax live within walking distance of each station. The line is almost substituting for rapid transit (planned, never done).
At least some of the stops were probably always close together because this was always mostly a commuter operation (Hersey and the Needhams) and/or because they date from the early days of the RR when stops were close together because the RR was providing local transportation (Roslindale-West Roxbury, old Boston and Providence Dedham line).
Back in the days when trains were made out of wood, you could have really close stops, because lighter trains meant higher acceleration. On the Boston & Providence, there were stops approximately where each of the Orange Line stations is now. On the Boston & Worcester there were stations every mile inside the (now) 128 belt).
What we now know as the Needham Line is a comglomeration of two separate railroads. Built in 1850, the B&P's Dedham Branch (loop) (later New York & New England) split at Forest Hills, ran through West Roxbury to Temple Street, then turned south over a now-abandoned ROW, then turned east at Dedham and returned to the mainline (via an 1834 branch) at Readville. The Norfolk County later built a branch (now the Route 1 ROW) from Dedham to Islington to connect to their own railroad.
Meanwhile, the Charles River Railroad was built from the B&A (ex-B&W)'s Brookline Branch (now the D line) to Newton Upper Falls in 1850 and to Needham in 1852. (Most of the gravel that they filled in the Back Bay area with was hauled from Needham over the CRR.) The NY&B later extended it southwest to Woonsocket and sold out to the NY&NE. The B&A bought the line to Cook Street Junction (just east of Eliot) in 1883 and extended to Highland Branch to Riverside as a loop service. In 1906, the NY&NE built the stretch from Needham Junction to West Roxbury so they could run their trains in on their West Roxbury Branch rather than over the B&A. I believe that ended passenger service over the Cook Street Junction, but I cannot say for sure.
So, only in 1906 do we see the beginning of the modern service pattern: Needham, via Back Bay, Forest Hills, West Roxbury, and Needham Junction. Even then, though, most trains turned southwest at Needham Junction. Service that direction was discontinued in 1967. The Newton Upper Falls branch was used for industry until relatively recently, and rails are in place up to just a short distance from the D Line. The lines were disconnected at Cook Street Junction at least as early as 1946, although I believe a siding there may have been used by the MTA during construction in 1958-59 or even later.
So, short answers: old lightweight wooden trains, yes, and probably 1906 for passenger service.
Good responses guys. Eggey, that was great ! I'd only add to his post that a big advantage that was enjoyed by the steam locomotive was it's ability to start off at a brisk pace and get up to speed. During the transition years, company's liked the convenience of the diesels but they tried to find a diesel that would match this ability that the steamers had. You probably already know it, but the Needham Branch has an old history that predates both the MBTA and the Highland Branch ("D" Line). Any junction would have been a New York Central (Boston & Albany) junction on what is now the Highland Branch. The Boston & Providence, New England, and New Haven Railroads had set up their commuting lines with stations very close together. Just in Roslindale, there are two stations, about 3/4 mile apart, with two more in West Roxbury (there used to be more), about 1/3 of a mile apart. Both have a dominant station but three still carry their load.
Did the ROW towards Dedham branch off around where Shaws/Star Market is now and run along Bell Ave towards the Dedham mall?
If so, I've been looking for information on that ROW for a very long time. I grew up with that ROW literally in my backyard and could never find any information about ever.
The junction was just a few feet westerly of the south end of Perham St. in between Perham and Temple Sts. The Needham branch still makes a jog towards the west there. Then down past Shaws, over the Spring St. Overpass, then paralleling Belle Ave. and eventually entering Dedham opposite Crosstown Ave. I believe that there are still tracks in the Toys R Us parking lot almost to the Dedham Mall lot in that fenced in area, however they are often covered by tall grass. The municipal parking lot in Dedham Center accross from CVS is where the railroad station was. There are tracks all around there, most if not all which are paved over, around the streets off Rte. 1 and some of the parking lots.
In addition to the Rail's info, on the other side of rte 1 to that municipal parking lot, which would be on the eastern side of rte 1 north,there was a freight railhead. From what i remember, altho I never picked stuff up from there,it was just a concrete slab that railcars sided up to, and you could transfer the load to trucks. This area is just a grassy field that I can detect from G Earth. From this railhead, the tracks went south, across the little stub of Eastern ave,to an oil company miniture terminal, Churchill Oil if i recall right.This was basically right off rte ! give or take 100'. not sure if the tracks continued south from the oil company, if this was a spur , doubled track , or what.The memory is rusty from here.
Isn't there still one of those massive stone abutments on Spring Street? Right across from the Shaws?
Yes; Street View shows a pair of large abutments on the south side of the street.
Nice pic Paul, do you happen to know where that is?
Yesiree- I took the pic a few years ago. In the photo above, we're standing in the Arnold Arboretum "Daisy Field" and looking easterly at the granite overpass/subway towards Arboretum Road in Roslindale on the Needham Branch. This is how we entered the Arboretum when I was growing up, walking in through the subway, then turning right and walking up towards the South Street Gate. This is the companion overpass to the infamous Bussey Bridge, the scene of a terrible 1887 train wreck, about 1/4 mile south. Here's a photo looking from the other (Arboretum Road) side. That's an ancient blacksmith shop boarded up on the right. Sorry for failing to include the location the first time around.
Nice job getting it from both sides. Have gone under just as a trains passes over? Id imagine it would be pretty loud since passing under bridges with a train going over it is pretty loud.
Teamdrive in that goggle earth pic, the municipal parking lot I think ur talking about is on the west side of rt1. If anyone is confused rt1 is the road in the middle that goes from the bottom to the top of the pic while curving over a new bridge. West is to the left and east is to the right.
|
0.93709 |
(CNN) - The grandson of civil rights activist Malcolm X, Malcolm Shabazz, died in a Mexico City hospital after suffering an apparent beating, police told CNN.
Prosecutors are investigating the death as a homicide, police spokesman Octavio Campos said.
Police were called to the scene of an injured man at 3:30 a.m. Thursday one block south of Plaza Garibaldi, a rough but famous patch of Mexico City known for its mariachis.
Shabazz appeared to have been beaten, but had no wounds from other weapons, Campos said.
The 29-year-old was transported to Mexico City's Balbuena General Hospital, where he died later Thursday morning because of his injuries, he said.
(CNN) - A body found Tuesday in Rhode Island's Providence River has been identified as that of Sunil Tripathi, a Brown University student who had been missing since mid-March, police said.
No foul play is suspected, police said, citing the state medical examiner's office.
His relatives' search for Tripathi was detailed on a Facebook page, "Help us find Sunil Tripathi." They had temporarily taken down the page after they were inundated by ugly comments when he was falsely identified on social media as a possible suspect in last week's Boston Marathon bombings.
|
0.999278 |
I have a ,about 16 maybe 17 yr old jack. I rescued her from a shelter and they said she was bout 9 at the time. I did not want to get a dog that old but once I seen her it was love at first site, she has taught me so much about love and loyalty.
Every year around August she starts chewing away at her stomach stomach and ripping out chunks of hair , I have read some ways to make it a bit better, I put about 1 1/3 of hydrogen peroxide and the rest water and spray that on her and it seems to work.. But if I miss one day it gets worse , I want to know if what I am doing is ok and if there is any other home remedys?
You are to be commended for rescuing an older dog, not many people are willing to do that!
A few things to try: Since you know that the itching happens in the summer, try to keep your Jack from grassy areas. Give him a bath with an Oatmeal based product or epsom salts to help ease the itching. You may want to ask your vet for a recommendation for an antihistamine. There is also a product called soft paws that will help her from hurting her skin.
|
0.984555 |
Step into any lecture on financial aid for college or even college financial aid offices themselves and the following will likely occur: The acronym FAFSA will be pronounced in ten different ways. The FAFSA, which stands for the Free Application for Federal Student Aid, is the federal formula designed to determine the Expected Family Contribution or EFC.
While filling out the FAFSA is a requirement to receive any Federal need-based grants and/or loans, it is not the determining factor for the EFC at all of America’s colleges.
Another formula with an easier acronym to pronounce, known most commonly as the CSS Profile is a methodology used at Ivy League schools as well as many of the nation’s most prestigious colleges and universities.
The first point to note is that the Profile, just like the FAFSA is a detailed financial aid application that determines an EFC. This EFC due to several factors can be similar or completely different than the FAFSA EFC. The Profile for instance looks at some financial information in a different way than the FAFSA and some information is included in the Profile that is not factored into the FAFSA formula. Examples include consideration of any family businesses as well as the family’s primary residence.
Another key difference between the two is that while the FAFSA is a free government formula, the Profile costs money and is administered by and submitted through The College Board. The initial fee is $25 which includes one report for one college and any subsequent report costs $16 per university.
Also unlike the FAFSA, the Profile can be submitted as early as October 1st while the FAFSA cannot be filed until January 1st.
|
0.999987 |
“Now that you’ve had a home inspection” in Spanish – Ahora que ya recibió su Inspección de la Vivienda.
InterNACHI Trainer and Certified Well and Water Sampler, Joe Farsetta, discusses well and water quality for consumers.
Every real estate agent should be able to find a qualified inspector who knows how to inspect stucco on a house. Is your inspector an InterNACHI Certified Stucco/EIFS Inspector?
|
0.998881 |
In 5th grade, students continue their study of long division by working with larger numbers. To give your child extra practice at home, you can create your own long division problems modeled after the samples below.
How Is 5th Grade Long Division Different Than 4th Grade Long Division?
Long division is the process of breaking down a division problem into smaller division problems, thus making it easier to solve. Though long division can be used for simple problems, such as 24 ÷ 3, it's more often employed for problems involving multi-digit divisors (the number by which another number is being divided).
Kids typically are introduced to long division in 4th grade with problems that have 1-digit divisors and 2-digit dividends (the number being divided), such as 32 ÷ 8. This problem isn't too difficult to solve because the divisor (8) evenly divides into the dividend (32), so the answer, or quotient, is 4.
Long division problems for 5th graders can be much more challenging because they typically include 2-digit divisors. In addition, students learn to estimate quotients to the nearest hundredths place. For example, a typical 5th grade long-division problem might look like this: 74 ÷ 12. The answer, rounded to the nearest hundredth, is 6.17.
If you want to write long division problems for your 5th grader to practice at home, be sure to include both numerical problems and word problems. The latter are important because they require your child to think independently about how to solve the problem. In addition, be sure that the problems are formatted correctly. The dividend goes under the long division sign, and the divisor goes on the outside.
The answer is 3. One way your child can check his or answer is to use multiplication (31 x 3 = 93).
Because 11 doesn't evenly divide into 101, there's going to be a remainder with this problem. The answer is 9 with a remainder of 2, which is often written as 9 R2.
Students may be intimidated when they see large numbers in a long division problem. However, you can help your child gain confidence by starting with simple problems like this one, which can be evenly divided. The answer is 300.
4. Mary wants to learn 100 new words by the end of the month. If there are 28 days in the month, how many words does Mary have to learn each day? Round your answer to the nearest hundredth.
To solve, divide 100 by 28 (100 ÷ 28), which, rounded to the nearest hundredth, is 3.57. So, Mary would have to learn about 4 words every day to reach her goal.
|
0.997196 |
Would you like to pay less for insurance? Many people pay way too much for their policies. By following these quick and easy steps, it is possible to pay less for your insurance needs. Paying less for insurance, and getting better rates, is something that many people would like to do. Follow these steps to reduce your costs.
As you can see, it is extremely possible to lower your insurance rates quickly and easily. By following these steps you will be excited see your insurance costs going lower and lower, and you will be able spend the money you are saving on insurance in more productive ways.
|
0.631931 |
Throughout history humans have observed stars turning supernova. There was an instance in AD 185 recorded in Chinese records, and an astronomer Tyco Brahe witnessed it happening in the Cassiopeia constellation in 1572. Most recently, one occurred in the Milky Way only 30 years ago. In honor of these cosmic events, scientist have created a map where each visible supernova took place in human history. Overall, there were six.
|
0.999866 |
If you have ever visited one of Indiana's private colleges, you already know that schools, colleges, and universities in the "Hoosier State" manage to excel both in and out of the classroom. With some of the best college sports programs, music conservatories, and science departments, Indiana is the ideal place for any person who is serious about securing a well-rounded college education.
Indiana private colleges and universities offer a wide range of education programs with degrees and certificates up to the doctoral level, as well as professional degrees such as law and medicine.
There are 69 colleges in Indiana, 30 public and 39 private, offering a wide range of programs and majors. These Indiana private colleges are diverse in character, academic emphasis, and origins. Some private colleges or schools have a religious affiliation; others are secular. Private colleges and universities may be profit or non-profit institutions. Typically, Indiana independent colleges or private schools give weight to personal characteristics and activities in addition to considering GPA and test scores.
The largest being Indiana Wesleyan University with 14,172 full time students. University of Notre Dame is the most expensive with an in-state tuition of $42,464. On average, how much does it costs to attend private college in Indiana? The average annual in-state private college tuition in Indiana is $22,255 in 2013.
Independent Colleges of Indiana is the collective voice for excellence and choice in higher education for all students.
Became the merged entity of Independent Colleges of Indiana in 2005, when the Independent Colleges of Indiana Foundation legally became part of ICI.
|
0.998977 |
The number of deaths of infants under one year old in a given year per 1,000 live births in Guam is 5.51 while in The United States it is 6.17.
The life expectancy at birth in Guam is 78.82 while in The United States it is 79.56.
The annual number of births per 1,000 people in Guam is 17.01 while in The United States it is 13.42.
With its 161,001 people, Guam is the 185th largest country in the world by population. It is the 190th largest country in the world by area with 544 square kilometers.
|
0.923911 |
It is difficult to answer this kind of question. I watch a lot of TV shows. I sometimes download my favourite TV shows. Mostly, I get my favourite (and sometimes other) TV shows from other people.
I like TV shows the focus on police and investigation. I think the first one of these kinds of TV shows (which I started to watch) were NCIS: Naval Criminal Investigative Services. I also enjoy watching the two spin-off series: NCIS: Los Angeles and NCIS: New Orleans. I also like the modern Hawaii 5-0. Four other series that are related to police and investigation, that I also used to watch, are CSI: Crime Scene Investigation, CSI: New York, CSI: Miami and CSI: Cyber.
I am also a big superhero fan. And I like DC Television and Marvel Television series. It seems to me that there are currently more DC superheroes than Marvel superheroes on television. I like Arrow, Flash, Legends of Tomorrow and Supergirl series. I also like Agents of S.H.I.E.L.D.. I also enjoy the The Defenders-related series, which include The Defenders itself, as well as Jessica Jones, Luke Cage, Iron Fist, Daredevil and The Punisher.
The Law & Order-series are sometimes very scary and sad, but I do like it as well. The two spin-offs, Law & Order: Criminal Intent and Law & Order: Special Victims Unit (which is still showing) also include among my favourites. Shows that were created by the same creators are the series that are set in Chicago: Chicago Fire, Chicago P.D., Chicago Med and Chicago Justice. I like all four of these Chicago-series. It is unfortunate that Chicago Justice has been cancelled.
These are some of my favourite (current) TV shows. What are your favourite (current) shows?
|
0.937641 |
Officers from South Ribble Neighbourhood Policing team uncovered a bike 'chop-shop' on Howick Cross Lane, Penwortham.
Former Army captain Colin Johnson was left devastated when his hand-made bike was stolen in June – just as he was given the go-ahead to get back on the bike after spinal surgery.
He went to get his Moda Intro road racing bike from his garage in Cypress Grove, Lostock Hall, only to find the building had been broken into and the bike stolen.
Speaking at the time he said: “I was devastated. I’m 48 and I stood in the garage and was close to tears.
“I’d washed it and polished it _ I was like a kid at Christmas.
He believed that someone had watched him unload the bike, worth around £2,000 from his car and put it away.
However police have raised another possibility - that sophisticated bike thieves are using the data from exercise apps to target expensive specialist bikes.
Lancashire police this week revealed that £1,813,511 worth of bikes were stolen in the county in the last year alone.
Sgt Dave Sherrington said: “In 2015, 3,852 bicycles were reported stolen across Lancashire with a value of £1,813,511. This is only the thefts which were reported to police – we actually believe there are more thefts which remain unreported.
“It appears that the recent rise in the purchase of expensive high-tech bikes is fuelling the thefts – the most expensive bike stolen last year was worth over £10,000.
Sgt Kirstie Whyatt, based at Bispham Police station, said: “We are looking closely at the apps and phoning victims to see if they might have been using them.
“This is a big problem across Lancashire and we are no different on the Fylde coast,” she said.
“What has become clear is the way criminals are changing their behaviour.
“They are not taking any old bike.
“They are after cycles of high value.
“In the town centre we’re still seeing people cutting chains and taking any bike.
In February last year, police investigating a spate of bike thefts across South Ribble uncovered a hoard of rare and valuable bike parts in a professional style ‘chop shop’ in Penwortham.
Dozens of bikes had been stripped down and sold for parts, or refurbished for sale as complete cycles. Among the haul, discovered in two lock ups in the Howick area of Penwortham, were rare bikes and parts from two antique bikes, and a number of high value high performance components.
One of the lock-ups had been converted into a workshop for working on the pedal bikes.
Officers called in an expert from a local cycling shop who said some of the frames were worth upwards of £1,000 and a wheel discovered in the lock-up was worth over £700.
Sgt Whyatt said it was difficult to trace bikes once they had been taken and said most were never found.
She said thieves were not advertising large numbers of bikes for sale on online aution or car boot sites but made clear officers were constantly monitoring the selling community.
She said: “We are constantly trying to disrupt the thieves in their operations.
In January this year a bike worth £1,200 was stolen after several garages were ransacked in Poulton overnight.
In the past police have recommended bike owners take pictures of their cycles and have them valued.
The most expensive bike stolen in Lancashire last year was worth more than £10,000.
In February, nearly £17,000 worth of suspension mountain bikes and parts was stolen from Bounce Rivington Leisure in the Coppull Enterprise Centre.
Owner Frank Spear said it “opened his eyes” to the extent of bicycle crime in Lancashire, and the business has since relocated for security reasons.
Mr Spear said: “There’s a very organised criminal world in Lancashire - they all know one another and know how it works.
“Stolen bikes get broken up quickly and parts swapped around, so you might see your frame on a bike on eBay, but the rest would be different.
“An average high-end bike would cost about £3,500 - it’s virtually the norm and with 0 per cent finance people don’t even bat an eyelid.
He added: “The biggest threat to bicycle security is Facebook. People are proud of what they have and put their bikes as profile pictures, take pictures by their car with the registration clearly visible, and have an open profile.
“Strava’s another one, but there are privacy settings where you can block out locations so people can’t see where you’re setting off from or returning to.
|
0.999999 |
TL;DR Jitbit's hosted help desk app is fully compliant.
GDPR is the new data protection law in the EU that strengthens the protection of personal data. The law regulates "processing" of personal data, which includes storage, collection and transfer of personally identifiable information. Any company that sells a software app or a digital service on the EU market (not just an EU company) has to comply with it starting May 2018.
Data protection by design - practical measures to prevent loss, destruction of damage of data.
New requirements for profiling and monitoring - this mostly affects marketing companies and AD-platforms that keep track of user demographics and similar data, that allows showing more relevant ads to users.
The key changes are listed on the official website and we highly recommend visiting it. Unlike most "official" websites, this one is actually very neat and user-friendly.
Does GDPR require EU data to be stored in the EU?
No. The GDPR does not require EU personal data to be physically stored in the EU, nor does it place any new restrictions on data transfer other than the ones that already existed.
Jitbit welcomes the GDPR and is fully compliant. GDPR is an important step towards protecting private data. Both our founders have been very vocal about the terrifying dangers we all face in light of rapid technological developments, such as AI, face-recognition, the rise social networks etc.
Note from Alex, our founder: "I'm personally very happy about the GDPR and don't get all the whining. First thing I'm going to do in May 2018 is request a copy of my personal data from Google just for kicks. I'm really interested of what's going to happen next. I'd also like to request Google to remove any personal data from my Google Photos family archive, like our names, social graph, locations, people present on the photos etc. Will blog about the results."
1. First of all, Jitbit's cloud-hosted helpdesk app collects no personal data other than full name and email of helpdesk app users (both end-users and administrators or helpdesk-agents). We do not even store our paying customers' addresses, VAT numbers, company names, locations or credit card numbers when they make a purchase - this data simply does not exist on our servers, it stays at the payment gateway, and we have no access to it. We do not use the data for any marketing research or "machine learning".
2. Jitbit already has the "right to be forgotten" procedure in place, implemented and operational. We physically delete the clients' data once they cancel their account and/or the account expires. In addition, we don't use any personal data for marketing, profiling or similar purposes. The "data portability" part works too - any Jitbit customer can request an actual copy of their account data, this has been working for years.
3. Jitbit is already HIPAA-compliant (HIPAA is an American thing that protects medical patients' private healthcare information, which is even more strict than GDPR). Which means we already have all the policies and procedures in place: we do have a Data Protection Officer, we do encrypt all the data both when storing AND transferring it, we do have a breach notification procedure, we also perform regular in-house training for all our employees.
4. Jitbit has less than 250 employees (way less, in fact), which means we don't have to keep records of data processing activities.
5. Jitbit is a "data processor". Our clients - the companies that use our hosted helpdesk solution - might add one or more "custom fields" to their helpdesk tickets, that can store personal data. For example "taxpayer ID" or "address" or something similar. In this case the client does have to perform some extra steps to comply with the GDPR, like: provide Jitbit with an SSL certificate if they use a custom domain and inform their customers about collecting this data and the purposes ("consent"). While Jitbit will take care of the safety of the data and implementing the "right to be forgotten" and "data portability".
6. Jitbit takes all reasonable steps to ensure the reliability of any personnel who have access to personal data. Jitbit has in place all reasonable technical and organisational measures to keep all personal data confidential and secure and to protect personal data against accidental loss or unlawful destruction, alteration, disclosure or access.
7. Jitbit does not allow any subcontractors to access our client's (or our client's clients) data without permission.
8. Helpdesk is hosted in Amazon's "private cloud" (as in "not visible from the Internet"), only 3 people have access to the database. And we have a DPA signed with Amazon.
More technican details can be found in our KB.
We also have our own Data Processing Agreement template which we will provide and sign upon request. Contact our support to get started.
|
0.942904 |
Which Came First: Epistle or Gospel?
There seems to be an unnecessary division between those who claim to follow Paul and those who claim to follow Jesus, which, I believe, fails to appreciate the historical interaction between the material included in the teachings of Jesus and the material contained in the writings of the Apostles. It is a little like the argument over which came first in creation: The chicken or the egg? However, the implications of the answer to this more theological question have farther-reaching effects.
The general impression one gets from so much that is taught in the churches today is that the Apostle Paul (and perhaps some other New Testament writers) were attempting, in their epistles, to correct or moderate the extremes of the teachings of Jesus in the Gospels. As the New Testament is laid out (and as the incidents occurred historically), it is easy to make such an assumption. After all, the four gospels come first in the layout of the New Testament, and then we read what Paul had to say to the early followers of Jesus. The idea that Paul is challenging what we have just read in the gospels is an easy one to accept. Added to that, we also know that Paul came AFTER Jesus historically, persecuting Christians after the resurrection, and then converting to Christianity himself, before rising to a position of high esteem amongst the Christians, and writing his many letters.
But in reality, most experts agree that the Gospels were not written until AFTER the epistles. When the two classes of New Testament scripture are seen as having been written in that order, it could be argued more easily that the Gospels were compiled as an attempt to alter misconceptions associated with the writings of the apostles, rather than the other way around.
Even though the gospels were written after the epistles, there is compelling evidence that there was a deep interest in the teachings of Jesus before and during the time that the epistles were being written. I would like to consider the implications of this with regard to things Paul and others wrote in those epistles.
Word for word similarities in the various gospels are taken as strong evidence that early Christians memorised literally hundreds of the sayings of Jesus and regularly tested themselves on their knowledge of these teachings. It was only possible, decades after the death and resurrection of Jesus, for people to record with such accuracy what Jesus had taught, because they had, through all those decades, been diligently repeating those same teachings and incidents over and over again. Just as we might read the Bible as part of our religious discipline, they would recite passages from the Bible that had not yet been written down, with those recitations serving as the repository for the construction of the gospels when the decision was later made to put them into writing.
If that was the case, then it would not only help to explain the incredible consistency in what the first three gospel writers in particular had to say about the life and teachings of Jesus, but it would also explain why the writers of the epistles did not take the time to reiterate what it was that Jesus taught. With the exception of James, who addressed his epistle to those who had been "scattered abroad"... possibly so much so that they had not received the oral traditions of the other more established local churches, the other epistle writers were more inclined to make general theological statements with regard to what those memorised teachings of Jesus meant for us as believers. They would remind us about such things as forgiveness and eternal life, adding that the sacrificial death and resurrection of Jesus served as further evidence of his authority to make the demands that are contained in his teachings.
When it became clear that the original eye witnesses were dying out, and that Jesus was not likely to be returning in the immediate future, THEN the early Christians started to compile (in written form) narratives incorporating the teachings of Jesus as well as important incidents in his life. It may even be possible that they were motivated to correct distortions that had come in from things that people had heard Paul saying. Peter commented that there were many who had twisted the things Paul had said, to their own destruction. (It sounds so much like what we see being done with some of the teachings of Paul today.) The appearance of not just one, but FOUR versions of the life and teachings of Jesus, steered the early Christian communities back to a greater emphasis on the Cornerstone, which Peter had noticed many builders foolishly setting aside.
Some epistles dealt with specific pastoral problems as well, suggesting that they were not written with the same sense of eternal and universal authority that went into the writing of the gospels. When Paul says something like, "Don't forget to bring the cloak that I left there when you come," he was writing very much like we ourselves would write to one another (or even to a group of people) today. If such a letter was lost or destroyed, it would not represent anywhere near the disaster that would have happened if they had lost their official record of what it was that Jesus taught and, by implication, what it meant to be a disciple of Jesus. One was just some very powerful (albeit "inspired") comments from a great religious leader, while the other were the words of eternal life, spoken by the only begotten Son of God.
With this concept of the relationship between the two classes of biblical writings, it makes perfect sense that Paul would say, as he did in the opening chapter of his letter to the Galatians, "If I, or an angel from heaven should teach you contrary to the gospel which I [previously] delivered to you, let them be accursed." That "gospel" which he had previously delivered to them was not the epistle that he was only just starting to write at the time, nor was it the four gospels exactly as we have them in writing today. However it would probably have been an oral tradition which was very similar to those four gospels, given that the teachings of Jesus (when transcribed onto parchments) were referred to as "the gospel" by the leaders of those same early churches.
So, in answer to the question about which came first: The epistles seem to have been the first bits of the New Testament to have appeared in writing; but the gospels apparently preceded the epistles in oral tradition, and, in addition, they followed the epistles in official writing. This before-and-after emphasis on the teachings of Jesus is, in my opinion, vital to our understanding of the subordinate role that Paul's comments would have played, sandwiched as they were, between the teachings of Jesus as studied both before and after Paul wrote his epistles.
position of high esteem amongst the Christians, and writing his many letters.
implications of this with regard to things Paul and others wrote in those epistles.
later made to put them into writing.
of those same early churches.
teachings of Jesus as studied both before and after Paul wrote his epistles.
Home > Teachings > Recent Articles > Recent Churches & Theology Articles > Which Came First: Epistle or Gospel?
|
0.997239 |
Write Kmart asking them to discontinue inappropriate Joe Boxer commercial.
Christian engagement of culture must include discerning content, criticizing it when it is bad and praising it when it is good. Also, Christians with talent should engage in culture making and the rest of us should promote their efforts. We will try to help in all these ways at Engage Daily.
Today is a day for criticizing bad content. Tomorrow will be dedicated to Christian culture making.
Though this is from OneMillionMoms.com, you don't have to be a mom to send this email. I won't describe the offensive commercial here, but you can view it from the link above. Their sample letter text is excellent as is.
From their website: "Our goal is to stop the exploitation of our children, especially by the entertainment media (TV, music, movies, etc.). OneMillionMoms.com is the most powerful tool you have to stand against the immorality, violence, vulgarity and profanity the entertainment media is throwing at your children. It is time to fight back!"
|
0.93126 |
Dan Simmons (born April 4, 1948) is an American science fiction and horror writer. He is the author of the Hyperion Cantos and the Ilium/Olympos cycles, among other works which span the science fiction, horror, and fantasy genres, sometimes within a single novel. A typical example of Simmons' intermingling of genres is Song of Kali (1985), winner of the World Fantasy Award. He also writes mysteries and thrillers, some of which feature the continuing character Joe Kurtz.
Born in Peoria, Illinois, Simmons received a B.A. in English from Wabash College in 1970 and, in 1971, a Masters in Education from Washington University in St. Louis.
He soon started writing short stories, although his career did not take off until 1982, when, through Harlan Ellison's help, his short story "The River Styx Runs Upstream" was published and awarded first prize in a Twilight Zone Magazine story competition. Simmons' first novel, Song of Kali, was released in 1985.
He worked in elementary education until 1989.
Summer of Night (1991) recounts the childhood of a group of pre-teens who band together in the 1960s, to defeat a centuries-old evil that terrorizes their hometown of Elm Haven, Illinois. The novel, which was praised by Stephen King in a cover blurb, is similar to King's It (1986) in its focus on small town life, the corruption of innocence, the return of an ancient evil, and the responsibility for others that emerges with the transition from youth to adulthood.
In the sequel to Summer of Night, A Winter Haunting (2002), Dale Stewart (one of the first book's protagonists and now an adult), revisits his boyhood home to come to grips with mysteries that have disrupted his adult life.
Between the publication of Summer of Night (1991) and A Winter Haunting (2002), several additional characters from Summer of Night appeared in: Children of the Night (1992), a loose sequel to Summer of Night, which features Mike O'Rourke, now much older and a Roman Catholic priest, who is sent on a mission to investigate bizarre events in a European city; Fires of Eden (1994), in which the adult Cordie Cooke appears; and Darwin's Blade (2000), a thriller in which Dale's younger brother, Lawrence Stewart, appears as a minor character.
Soon after Summer of Night (1991), Simmons, who had written mostly horror fiction, began to focus on writing science fiction, although in 2007 he returned with a work of historical fiction and horror, The Terror. In 2009, he published another book, Drood, based on the last years of Charles Dickens' life leading up to the writing of The Mystery of Edwin Drood, which Dickens had partially completed at the time of his death.
The Terror (2007) crosses the bridge between horror and historical fiction. It is a fictionalized account of Sir John Franklin and his expedition to find the Northwest Passage. The two ships, HMS Erebus and HMS Terror, become icebound the first winter, and the captains and crew struggle to survive while being stalked across an Arctic landscape by a monster.
The Abominable (2013) recounts a mid-1920s attempt on Mount Everest by five climbers—two English, one French, one Sherpa, and one American (the narrator)—to recover the body of one of the English characters' cousin.
His 1989 novel Hyperion, winner of Hugo and Locus Awards for the best science fiction novel, deals with a space war and is inspired in its structure by Boccaccio's Decameron and Chaucer's Canterbury Tales.
The last story in Hyperion, “The Consul’s Tale”, is a futuristic retelling of Shakespeare's Romeo & Juliet.
The Hyperion Cantos take their titles from poems by the English Romantic John Keats.
In The Fall of Hyperion, John Keats himself appears as one of the main characters, with references to characters in Forbidden Planet and The Time Machine.
Simmons' collection of short stories, Worlds Enough & Time, takes its name from the first line of the poem To His Coy Mistress by British poet Andrew Marvell: "Had we but world enough, and time"
In 2009, Scott Derrickson was set to direct "Hyperion Cantos" for Warner Bros. and Graham King, with Trevor Sands penning the script to blend the first two cantos "Hyperion" and "The Fall of Hyperion" into one film. In 2011, actor Bradley Cooper expressed interest in taking over the adaptation. In 2015, it was announced that TV channel Syfy will produce a mini-series based on the Hyperion Cantos with the involvement of Cooper and King.
The Terror (2007) has been adapted as an AMC TV 10 episode-mini-series in 2018 and received generally positive reviews upon release.
Entropy's Bed at Midnight (1990). Limited edition of story, later collected in Lovedeath.
Best Novelette (1994): "Dying in Bangkok"
Best Short Story (1993): "This Year's Class Picture"
Best Novelette (1991): "Entropy's Bed at Midnight"
Best Novelette (2000): "Orphans of the Helix"
Best Foreign Short Story (2010): “La foto de la clase de este año” (This Year's Class Picture).
Best Foreign Short Story (1999): "This Year's Class Picture"
Dan Simmons has been nominated on numerous occasions in a range of categories for his fiction, including the Arthur C. Clarke Award, Bram Stoker Award, British Fantasy Society Award, Hugo Award, Nebula Award, and World Fantasy Award.
^ a b c "1986 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ a b c "About Dan: Biographic Sketch". dansimmons.com. Retrieved June 14, 2018.
^ "Review: Darwin's Blade". Publisher's Weekly. October 30, 2000.
^ Simmons, Dan (2000). Darwin's Blade. William Morrow. ISBN 978-0-380-97369-9.
^ Gwinn, Mary Ann (February 15, 2009). "Q&A: Dan Simmons, author of "Drood"". The Seattle Times.
^ Robbins, Michael (October 20, 2013). "Review: 'The Abominable' by Dan Simmons". Chicago Tribune.
^ a b c d e f g h "1990 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ Feeley, Gregory (September 27, 1992). "The Hollow Man". The Washington Post.
^ Stableford, Brian (March 1, 2009). News of the Black Feast and Other Random Reviews. Wildside Press LLC. pp. 73–74. ISBN 9781434403360.
^ Owchar, By Nick. "Book review: 'Flashback' by Dan Simmons". latimes.com. Retrieved December 11, 2018.
^ Fleming, Michael (January 29, 2009). "Scott Derrickson to direct 'Hyperion'". Variety. Archived from the original on December 10, 2012. Retrieved December 10, 2012.
^ Falconer, Robert (May 27, 2011). "Bradley Cooper Anxious to Adapt Dan Simmons's Hyperion for the Screen". Cinemaspy.com. Archived from the original on December 10, 2012. Retrieved 2012-12-10.
^ Goldberg, Lesley (June 10, 2015). "Bradley Cooper, Graham King, Todd Phillips Adapting Dan Simmons' 'Hyperion' for Syfy". The Hollywood Reporter. Retrieved August 5, 2015.
^ "The Terror: Season 1 (2018)". Rotten Tomatoes. Retrieved April 10, 2018.
^ "The Terror Reviews". Metacritic. Retrieved April 10, 2018.
^ a b "1992 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ a b c "1991 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ "1997 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ a b "1998 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ a b "2004 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ "2006 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ "Seasons of Horror series by Dan Simmons".
^ "2003 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ "1993 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ Rafferty, Terrence (March 18, 2007). "Ice Men". The New York Times. Retrieved March 31, 2010.
^ "2008 Award Winners & Nominees". Worlds Without End. Retrieved July 16, 2009.
^ "Dan Simmons The Abominable cover art reveal!". Upcoming4.me. March 14, 2013. Archived from the original on March 19, 2013. Retrieved 14 March 2013.
^ "Dan Simmons To Release 'The Fifth Heart', His Next Book After 'The Abominable'". Kernel's Corner. March 10, 2014. Retrieved April 6, 2014.
^ Works in the WWEnd Database for Dan Simmons.
|
0.997298 |
What general tips do you have for golfing in The Shakespeare Programming Language? I'm looking for ideas which can be applied to code-golf problems and which are also at least somewhat specific to SPL (e.g. "remove comments" is not an answer).
Yeah, yeah, yeah, that's pretty standard to code-golf, you just use one-letter-length variable names, no news here. Or is there? Because the chaps that created SPL were wacky enough not to allow any name for their language's variables: they must come from Shakesperian plays which, in terms of character length, is a pain in the royal tush - but, if you're coding in SPL, you already know that. So, my advice would be to use characters with short names, like Ajax, Ford, Page or Puck, instead of The Archbishop of Canterbury, per instance.
That's all I got, I'm afraid.
1- since my Java skills are equivalent of those of a newborn.
An example, to try and explain what this mean.
You are as warm as a big red rich fair cute bold cat!
Thou art as blossoming as an embroidered trustworthy bottomless peaceful charming handsome chihuahua!
produce the exact same result, which is make the character being spoken to assume the value 64 (since, assuming you read my long battle with SPL, you know that both lines are equivalent to 2*2*2*2*2*2*1); however, the first one has 59 bytes, while the second one has a bytecount of 107.
Puck:You is a big big cat!
Ajax:Be you worse than I?
If so, let us return to Scene V!
If not, you is a cat.
If so, let us Scene V!
Be X [op] than Y? -> Be X [op] Y?
If I come across any others I'll add it to the list.
Add Page and Ford as extra characters as necessary.
Use a instead of an or the, except the expressions the sum of and similar, since they won't work with a.
Use am, be or is instead of are or art.
Use I instead of me or myself.
Use you instead of thee, thou, thyself or yourself.
Use cat for positive numbers.
Use pig for negative numbers.
Use worse for A < B (instead of smaller or punier).
Use nicer for A > B (instead of better, bigger, fresher, friendlier or jollier).
If you really need more, you definitely should consider using the stack of each character.
Puck:Am I as fat as the sum of a big big big big big big cat and a cat?
Ajax:If not,let us return to scene III.
Ajax:You is a big big big big big big cat.
Ajax:If not,let us return to scene III.You is a big big big big big big cat.
and basically any multi-word tokens.
Note: This does not work with the Perl interpreter. It's probably just an unintended effect caused by Flex's parsing behavior. The "language standard" is not clear about that.
You don't have to switch people in conditionals.
Ajax:Is you better than the sum of a fat fat fat fat cat and a fat cat?
Puck:If so,let us return to Scene I.
Ajax:Is you better than the sum of a fat fat fat fat cat and a fat cat?If so,let us return to Scene I.
Let us proceed to Scene X.
Let us return to Scene X.
Thy and thyself are shorter than your and yourself.
Is is shorter than are.
You is the difference between I and a big cat.
You is the sum of I and a big pig.
Ajax:Are you as good as or better than me?If so,let us return to Scene I.
Ajax:Are you worse than me?If not,let us return to Scene I.
Ajax:You is a fat fat fat fat fat fat fat fat fat fat cat!
Ajax:You is the sum of the difference of me and thyself and a fat fat fat fat fat fat fat fat fat fat cat!
Ford,a fat fat fat fat fat fat fat fat fat fat cat.
Puck:You is the sum of thyself and Ford.
Ajax:You is the sum of the difference of me and thyself and Ford.
Am I as big as you?If so,you is the sum of you and a big big cat.If not,you is the sum of you and twice I.
If (so|not) does not have to immediately follow the comparison.
Am I as big as you?You big big big big big cat.If so, you is the sum of you and a big big cat.
Puck:Is I as bad as you?
4 bytes shorter for both!
Normally, you can't reuse the first scene of an act, since it always has [Enter Ajax and Puck] first thing. However, you can preface this with [Exeunt] to be able to reuse the first scene of a play. [Exeunt] is one byte shorter than declaring a new scene, and jumping to an Act is two bytes less than jumping to a Scene.
,.Ajax,.Page,.Act I:.Scene I:.[Enter Page and Ajax]Scene V:.Ajax:Open mind!Speak thy!Let usScene V!
,.Ajax,.Page,.Act I:.Scene I:.[Exeunt][Enter Page and Ajax]Ajax:Open mind!Speak thy!Let usAct I!
You don't need the ending . or !.
|
0.999988 |
Where can I find a coupon code and how do I use it?
Step 1. Use Search or go to the list of All Stores and refer a specific Store.
Step 2. Click on a specific store that you are interested in.
Step 3. Have a look at the coupon codes and offers available for this store.
Step 4. Click on “SHOW CODE” or “SHOW OFFER” for the code/offer you desire to get revealed.
Step 5. Once you click the code, a pop-up will show on screen that would reveal the promo code & copy the same and will also redirect you to your chosen store in another tab.
Step 6. Paste this code into the appropriate field at the store check-out. This should be before you complete your transaction and make payment. Ensure that discount is applied and updated in cart value.
Step 7. Enjoy your discount!
A Coupon code (or popularly known as discount coupons, promotion code etc.) is a special number / character or code that shoppers can enter at the final checkout of an online store in order to receive a discount.
|
0.999999 |
The inflation rate in Indonesia between 1980 and today has been 2,831.91%, which translates into a total increase of Rp2,831.91. This means that 100 ruphias in 1980 are equivalent to 2,931.91 ruphias in 2019. In other words, the purchasing power of Rp100 in 1980 equals Rp2,931.91 today. The average annual inflation rate has been 8.81%.
|
0.964185 |
Do you work for one of the 25 best companies in Britain?
Travel company Expedia has been named the best place to work in the UK, according to a ranking of employee satisfaction across companies with more than 1,000 employees.
Expedia was praised by staff for its generous compensation package, inclusive work environment and good company ethics.
Google, which took the crown last year, fell to eighth position this year's list put together by jobs website Glassdoor, based on employee insight and feedback given to the site over the past year.
|
0.9901 |
$a == $b Igual TRUE si $a es igual a $b después de la manipulación de tipos.
$a === $b Idéntico TRUE si $a es igual a $b, y son del mismo tipo.
$a != $b Diferente TRUE si $a no es igual a $b después de la manipulación de tipos.
$a <> $b Diferente TRUE si $a no es igual a $b después de la manipulación de tipos.
$a !== $b No idéntico TRUE si $a no es igual a $b, o si no son del mismo tipo.
$a < $b Menor que TRUE si $a es estrictamente menor que $b.
$a > $b Mayor que TRUE si $a es estrictamente mayor que $b.
$a <= $b Menor o igual que TRUE si $a es menor o igual que $b.
$a >= $b Mayor o igual que TRUE si $a es mayor o igual que $b.
$a <=> $b Nave espacial Un integer menor que, igual a, o mayor que cero cuando $a es respectivamente menor que, igual a, o mayor que $b. Disponible a partir de PHP 7.
$a ?? $b ?? $c Fusión de null El primer operando de izquierda a derecha que exista y no sea NULL. NULL si no hay valores definidos y no son NULL. Disponible a partir de PHP 7.
Ver la documentación de float para más información.
Otro operador condicional es el operador "?:" (o ternario).
Nota: Por favor note que el operador ternario es una expresión, y que no evalúa a una variable, sino al resultado de una expresión. Esto es importante saberlo si se desea retornar una variable por referencia. La sentencia return $var == 42 ? $a : $b; en una función con retorno-por-referencia no funcionará por lo que se ha mencionado y una advertencia es generada en versiones posteriores de PHP.
It works just as expected, returning the first non-false value within a group of expressions.
note: the behavior below is documented in the appendix K about type comparisons, but since it is somewhat buried i thought i should raise it here for people since it threw me for a loop until i figured it out completely.
The second is more readable, but will throw an ERR_NOTICE is $some_variable is not set. Of course, this could be overcome by suppressing the notice using the @ operator.
In other words, using the long-form ternary operator with isset($some_variable) is preferable overall if $some_variable may not be set.
Be careful when using the ternary operator!
This will evaluate to the expected result: "a string that has a true condition in. "
"11" < "a" < 2 < "11"
like you would think to find out if they are equal or not. This is more complicated when you have multi-dimensional arrays. Here is a recursive comparison function.
* Compares two arrays to see if they contain the same values. Returns TRUE or FALSE.
* prior to setting a "date_last_updated" or skipping updating the db in the case of no change.
elseif (!($val === $a2[$key])) // compare entries must be of same type.
Note that typecasting will NOT prevent the default behavior for converting two numeric strings to numbers when comparing them.
As far as I can tell the only way to avoid this is to use the identity comparison operators (=== and !==).
# It is an old fashioned way.
The second block obviously does not work what one expects.
Beware of the consequences of comparing strings to numbers. You can disprove the laws of the universe.
Note: The ternary shortcut currently seems to be of no use in dealing with unexisting keys in an array, as PHP will throw an error. Take the following example.
PHP will throw an error that the "Unexisting" key does not exist. The @ operator does not work here to suppress this error.
if you want to use the ?: operator, you should be careful with the precedence.
This make "'Hello, ' . isset($i)" the sentence to evaluate. So, if you think to mix more sentences with the ?: operator, please use always parentheses to force the proper evaluation of the sentence.
for general rule, if you mix ?: with other sentences, always close it with parentheses.
With respect to using the ternary operator as a 'null-coalescing' operator: expr1 ?: expr2, note that expr1 is evaluated only once.
For converted Perl programmers: use strict comparison operators (===, !==) in place of string comparison operators (eq, ne). Don't use the simple equality operators (==, !=), because ($a == $b) will return TRUE in many situations where ($a eq $b) would return FALSE.
// string types has no effect.
// a string happens to be valid scientific notation.
Note that the "ternary operator" is better described as the "conditional operator". The former name merely notes that it has three arguments without saying anything about what it does. Needless to say, if PHP picked up any more ternary operators, this will be a problem.
"Conditional Operator" is actually descriptive of the semantics, and is the name historically given to it in, e.g., C.
With Nested ternary Operators you have to set the logical parentheses to get the correct result.
Anyway don't nest them to much....!!
If you need nested ifs on I var its important to group the if so it works.
A note on null coalescing operators with arithmetic as it may not be obvious for some people.
- Contrary to the notes above ("Example #2 Transcription of standard array comparison"), it does *not* return null if the left-hand array contains a key that the right-hand array does not.
- Because of this, the result depends on the order you do the comparison in.
var_dump($a <=> $b); // int(1) : $a > $b because $a has the 'c' key and $b doesn't.
var_dump($b <=> $a); // int(1) : $b > $a because $b has the 'd' key and $a doesn't.
I think everybody should read carefully what "jeronimo at DELETE_THIS dot transartmedia dot com" wrote. It's a great pitfall even for seasoned programmers and should be looked upon with a great attention.
For example, comparing passwords with == may result in a very large security hole.
The workaround is to use strcmp() or ===.
The difference between == and === is that === never does any type conversion. So, while, according to documentation, ("+0.1" === ".1") should return true (because both are strings and == returns true), === actually returns false (which is good).
(and) and (&&) have a slightly different behavior when it comes to comparison.
Please note that (or) act the same as (and).
make your own eor combos !
Please be careful when comparing strings with floats, especally when you are using the , as decimal.
not the float is cast to a string and then string-compared, but the string is cast to a float and then float-compared.
to compare as strings use strval!
Do note, using the ternary operator shorthand (since 5.3), omitting the 2nd expression the first expression will only be called once.
Maybe i am overlooking something but it seems to me that using unset(string) inside a ternary operator creates an error.
using the traditional form of IF...ELSE works normal.
Most of the time, you may be content with your conditionals evaluating to true if they are evaluating a non-false, non-zero value. You may also like it when they evaluate to false when you use the number 0.
However, there may be times where you want to make a distinction between a non-false value and a boolean true. You may also wish to make a distinction between a boolean false and a zero.
The identity operator can make this distinction for you.
As you can see, in the first two cases, $a and $b are considered true, while $c is considered false. If this wasn't the case, neither of the first two conditionals would have echoed "True."
In the last case, I've cleverly used the || operator to demonstrate that both $a and $b do not evaluate to true with the identity operator, nor does $c evaluate to false.
The === operator can be used to distinguish boolean from non-boolean values.
number == null - it converts both types of comparisons to a boolean or numeric type? In the table the author pointed out that to a boolean. But elsewhere I read that to a numeric type.
No error is thrown and $c is set with correct value.
Benefit: no need to use isset.
from the specs I get it that it attempts a conversion - in this case the string to number.
I prefer writing (!$a == 'hello') much more than ($a != 'hello'), but I wondered about the performance.
We have seen that PHP does a lot of type-juggling on its own -- which can wreak havoc in unexpected ways -- but it is still up to us to produce code that is clear, maintainable AND follows the rules we want to follow.
When creating a PHP Object, it is sometimes unclear what makes two of them the same. But the good part is that we can say what is equal and what is not equal. For example, let's say we have a Student class that includes an equals() method which defines what is equal for this type of object.
* from tampering with them.
* only evaluates two integers that we set in __construct().
return 'Student [id=' . $this->getId() .
With this class, the protected variables cannot be tampered with by outside code. Also, the __construct() function casts the variables to the PHP primitives WE WANT, while the equals(Student $student) function, requires an argument of type Student -- which eliminates the need for an IDENTITY '===' check AND prevents any other data types from coming in. One other note: notice how the equals() function only evaluates the $student_id, this allows for two students to have the same name -- which is totally possible.
Here's a short example -- we'll do it correctly AND try to screw it up!
echo ($s1->equals(122) ? 'EQUAL' : 'NOT EQUAL'); // Catchable fatal error: Argument 1 passed to Student::equals() must be an instance of Student, integer given... etc, etc.
See what I mean by writing code that follows OUR RULES? The Student class does the kind of type-juggling we want (and when we want it done) -- NOT when, where, or why PHP does it (not that there's anything wrong with it).
Here is some ternary trick I like to use for selecting a default value in a set of radio buttons. This example assumes that a prior value was known and that we are offering a user the chance to edit that prior value. If no prior value was actually known, no default value will be set.
When a "=" directly follows a "<?" (no space allowed in between -- the trick does not work with "<?php"), the right side of the operand (here, the result of the ternary operation) is printed out as text into the surrounding HTML code. If using "<?php" form, you will need to do "<?php echo exp1?exp2:exp3 ?>" instead.
When the comparison rules for the spaceship operator say that for "object<=>anything" the object is always greater, and for "array<=>anything" the array is always greater.
The rules should be used in the order they are listed. In the latter case, "anything" means "anything except an object".
The former rule says that "object<=>array" will always decide that the object is greater (and evaluate to a positive integer); to be consistent, the comparison "array<=>object" must also always decide that the object is greater (and evaluate to a negative integer).
Hello, my friend: Me, how are you doing?
BUT, you DON'T get that result!
my friend: Me, how are you doing?
So.. Please, don't be dumb and ALWAYS use the priority-signs (or.. How do you call them?), ( and ).
By using them, you won't get unneeded trouble and always know for sure your code is doing what you want: The right thing.
Replying to the comment on Aug 6, 2010, the comparisons return TRUE because they are recognized as numerical strings and are converted to integers. If you try "abc" == " abc", it will return FALSE as expected. To avoid the type conversions, simply use the identity operator (===).
echo isset($a->test) ? $a->test : 'nothing'; // "nothing"
echo $a->test ?? 'nothing'; // "a value", isset() is not called!
echo isset($b->test) ? $b->test : 'nothing'; // "nothing"
echo $c->test ?? 'nothing'; // "nothing"
"Array with fewer members is smaller, if key from operand 1 is not found in operand 2 then arrays are uncomparable, otherwise - compare value by value (see following example)."
If you're doing loose comparisons in PHP, note that they differ from checking each value individually like $value1==$value2 by adding what amounts to an empty($value1)==empty($value2) check into the mix. I found this out by investigating some (to me) bizarre behaviour.
I was also pleasantly surprised to see PHP recurse. Also clear if you keep in mind that the example implies another function call to itself with > and < if both operands are arrays, but IMO definitely worth stating.
It might also be worth noting that the order of array keys doesn't matter, even if a foreach() would see a 'different' array. Again, covered by the example, but might be worth stressing.
I wanted to see if two arrays carry the same information even if they are technically different, so I created the following function. Hopefully this is useful to somebody.
Note: This is a different approach than "rshawiii at yahoo dot com" has taken.
// complicated 3 (same values and same keys): key => value different?
|
0.954025 |
The symbol of Chianti Classico is the black rooster. Why? The legend says that in the 13th century Florence and Siena decided to use a horse race to end their land dispute over the Chianti region. The point at which two knights - one from Florence, one from Siena - met at dawn when the rooster crowed would mark the new borders of their territories. Florence cheated a bit by selecting a black rooster and keeping it unfed for a few days. So, on the appointed day, he crowed much earlier than dawn allowing the Florentine knight to leave much earlier than the knight from Siena, meeting him only 12 km from the Sienan walls. Since then, the black rooster has been the symbol of Chianti.
Wine has been produced in the Chianti region since Etruscan times, over 2000 years ago. The earliest incantations of “Chianti” as a wine dates back to the 13th century when it was produced as a white wine. In the middle ages, the villages of Gaiole, Castellina and Radda formed the “League of Chianti” which created an area that would become Chianti Classico. As the wines of Chianti became popular, other villages wanted to get in on the act and have their lands known as Chianti as well. Therefore, the region's boundaries have changed over the years. As the boundaries changed so did the composition of the wine.
Baron Bettino Ricasoli (future Prime Minister of the Kingdom of Italy) created the first “Chianti recipe” in 1872. His formula consisted of 70% Sangiovese, 15% Canaiolo and 15% Malvasia bianca. In 1967, the Italian government altered the formula to Sangiovese plus 10 - 30% Malvasia and Trebbiano. The late 19th century saw oidium and phylloxera epidemics take its toll on the vineyards. Chaos and poverty followed the Risorgimento and heralded the Italian diaspora that would take Italian vineyard workers and winemakers abroad as immigrants. Those that stayed behind replanted with hearty clones of Sangiovese and Trebbiano. World War II brought other problems including a world wine market looking for cheap, easy drinking wines. By the late 20th century, Chianti was associated with basic mass-marketed wines wrapped in a straw basket, called fiasco.
In 1967, the government established the DOC (Denominazione di origine controllata) regulations for the production of Chianti.
However, around the same time, a group of ambitious producers began working outside the boundaries of the DOC regulations. These producers were renegades and wanted to produce a wine that did not conform the DOC standards. They made “Chianti” as they wished but were prevented from labeling under the DOC nomenclature. They sold their wines under the name vino da tavola. Despite this lower level classification, the wine grew in popularity. They began to add international varieties such as Cabernet Sauvignon or Merlot. The DOC classification was upgraded to DOCG in 1984 which added a guarantee of place and quality to the mix. The marchese Piero Antinori was one of the first to create a "Chianti-style" wine that ignored the DOC regulations, releasing a 1971 Sangiovese-Cabernet Sauvignon blend known as Tignanello in 1978.
The ever increasing popularity of these wines encouraged the government to reconsider the regulations and allow some of the vino da tavola wines to be labeled as Chianti. The evolution of these “international styled” wines developed into the term “Super Tuscans.” Today, these Super Tuscans are entitled to the DOC Bolgheri or the generic IGT label and, are among the most sought after wines in the world. These innovations have lead to higher ratings and price increases for DOCG Chiantis with many matching the prices of premium Super Tuscans. Listen carefully, can you hear the roar of the black rooster.
800,000 hectolitres of Chianti are produced.
7,200 hectares (17,290 acres) of vineyards entered on the DOCG Register for the production of Chianti Classico.
The Chianti Classico region is one of the most important appellations in Italy.
The classic red grape of the region is the Sangiovese.
Some famous white grapes for Tuscany include the Vernaccia di S. Gimignano, Trebbiano, and Moscato.
Cabernet, Merlot and other red grapes blend well with the Sangiovese.
The three top importers are Germany, the UK, and the US, respectiively.
|
0.999997 |
Have you been shopping at your local businesses? Here's 3 Reasons to stay local!
1. Community well-being - Locally owned businesses help build strong communities by linking neighbors of different backgrounds together. They build economic and social relationships within the community while also supporting local causes!
2. Keeping your money in the local economy - Small businesses are able to recycle much more of their revenue than chain stores back into the local economy which helps it grow and prosper!
3. Decision making stays local - Your local business owners are able to feel the direct impact of their business decisions within the community. They are well-suited to make choices that positively affect everyone.
|
0.94234 |
The U.S. fuel economy CAFE standards of 34.1 MPG by 2016 and 54.5 MPG by 2025 were an important step in the right direction after decades of near-stagnation, and other countries are starting to follow suit. The Chinese government, through 5 different official bodies, has announced that passenger cars in the country will have to reach an average fuel consumption of 6.9 liters per 100 kilometers by 2015 (equivalent to 34 MPG US) and 5.0 liters/100 km by 2020 (47 MPG US). And since China is now the biggest car market in the world, foreign carmakers will have to match at least that if they want to sell their vehicles in the country.
Hopefully by the 2020s electric cars will get about double the range for half the price and these goals will seem quaint, but for now they provide pressure for automakers to improve their vehicles and spend the R&D dollars necessary to keep moving forward on plug-in technologies.
The U.S. fuel economy CAFE standards of 34.1 MPG by 2016 and 54.5 MPG by 2025 were an important step in the right direction after decades of near-stagnation, and others are starting to follow suit.
|
0.916076 |
Watch the video and answer some questions.
1. When were fjords formed? How?
2. Find on the map the mountains and seas in Norway.
3. What's the difference between ice and glaciers?
4. Why are Stavkirhe not like other Christian churches?
5. Name three things that make Norway one of the richest countries in Europe.
|
0.946999 |
Prominent political leader, U.S. senator, SECRETARY OF STATE, vice president, and eighth president of the United States, Martin Van Buren led the nation during its first major economic crisis. The New York native built a career based on machine politics—the control of local political power by a well-disciplined organization. Van Buren held top positions in his home state before entering national politics, where his instinct for party building helped create the DEMOCRATIC PARTY in the 1820s. Elected vice president in 1832 and president in 1836, he sought to protect federal monetary reserves during the depression that began shortly after he took office.
Born in Kinderhook, New York, on December 5, 1782, Van Buren was the third of five children born to Dutch working-class parents. He began to study law at the early age of fourteen and gained admission to the New York bar four years later in 1803. He was elected to the New York legislature in 1812 and continued to be reelected until 1820. From 1816 until 1819, he also served as the state attorney general.
opposed a strong federal government. During the early years of his career in New York, Van Buren controlled the so-called Albany Regency, a political machine that was very influential in state politics. Later, in the 1820s, he joined forces with ANDREW JACKSON and helped to forge the political alliances that would lead to the formation of the Democratic Party.
"LET THEM WORRY AND FRET AND INTRIGUE AT WASHINGTON. SIX WEEKS HENCE THEY WILL FIND THEMSELVES AS WISE AS THEY WERE WHEN THEY BEGAN."
administration paid off: in 1832 Jackson chose Van Buren as his vice presidential running mate over the incumbent JOHN C. CALHOUN, and the two were elected.
Van Buren's own election as president in 1836 was precipitated by crisis. Under the Jackson administration, land speculation had run rampant nationwide. When Congress failed to intervene, banks issued great numbers of loans without backing them up with security. The speculation continued until Jackson ordered the government to accept only gold or silver as payment on land. The result was the so-called Panic of 1837, a devastating financial crash that led to the first large-scale economic depression in U.S. history. By 1840 Van Buren had convinced Congress to pass the Independent Treasury Bill. It provided for federally controlled vaults to store all federal monies; transactions were to be conducted in hard currency. The independent treasury protected federal deposits until 1841, when it was abolished. President JAMES K. POLK brought it back in 1846.
Van Buren sought reelection in 1840, running as the only presidential candidate without a vice presidential candidate in history. Defeated by WILLIAM HENRY HARRISON, he attempted to gain the Democratic nomination again in 1844 but was unsuccessful. His popularity had deteriorated both because of the depression and because of his positions on other domestic issues. He opposed the annexation of Texas, which he feared would precipitate a war with Mexico, and an expensive war against Seminole Indians in Florida. He tried once more to win the Democratic presidential nomination in 1848 but was defeated again. He died on July 24, 1862, in Kinderhook, New York.
|
0.909074 |
Your roof is a very important part of your home. A damaged roof can lead to major problems throughout your home. Because of this, replacement is needed once your roof becomes old or damaged to where it cannot be repaired. The average lifespan of a roof is 20 to 40 years for asphalt shingles and over 50 years for materials such as metal, tile, and slate. It's unlikely that you will need to replace your home's roof more than once so you will want to consider roof replacement carefully. Here are three things to keep in mind when replacing your home's roof.
The first thing that you should consider when replacing your roof is what material you want to use. Roofing is available in different materials including metal, asphalt shingles, slate, wood shingles, concrete or clay tile, and more. The type of material that will work best for your roof will depend on factors such as the pitch of your roof, the local climate, and your budget. Talking to a roofing contractor will give you a better idea about which type of roofing will work best for your home.
When replacing your roof, it's important to choose your roofing contractor carefully. Your new roof will be an integral part of your home and proper installation is key. Shopping around for a contractor can be beneficial. You want to go with a contractor who has a good reputation and a solid track record of successful roof replacements. Getting bids from multiple contractors can help you determine which one is right for your home. You will also want to make sure that the contractor you choose is properly licensed and insured. Make sure that you have a signed contract in place before your contractor starts work.
The cost of a new roof can vary widely depending on the material used and the size of your roof. A new roof can cost as little as $5,000 for a basic roof replacement to over $100,000 for a high-end roof replacement. When choosing a new roof, it's important to keep your budget in mind. The larger and steeper your roof, the more installation will cost. Certain materials, such as metal, slate, and tile, tend to be more expensive than asphalt shingles.
Replacing your roof is something that you may find yourself doing. When it's time to replace your roof it's important to determine which material will work best for your roof and for the climate you live in. Shopping around and choosing your roofing contractor carefully is also very important. The cost of a new roof can range from a few thousand dollars to tens of thousands. Sticking with a budget is also key when it comes to roof replacement.
|
0.958381 |
"The wine that is used in the most sacred celebration of the Eucharistic Sacrifice must be natural, from the fruit of the grape, pure and incorrupt, not mixed with other substances.
Great care should be taken so that the wine intended for the celebration of the Eucharist is well conserved and has not soured."
Like many religious tracts, those paragraphs are open to interpretation. As soon as I read them, I wondered, is the Pope endorsing no-sulfite wine? The first paragraph might read that way, but then the second says the wine should be "well conserved."
I don't know how much wine is used for Eucharist celebrations, but the Catholic church celebrates the ritual in every country. From churches alone the demand for no-sulfite wine would be immense. Plus, the papal influence would extend far past sacramental wine. You would expect to see no-sulfite wine on every wine list. In the wine world the Pope would be, dare I say it, bigger than Drake.
Here is the fact check: sulfites are not, according to church authorities, what the Pope was talking about in the phrase "not mixed with other substances."
"The word that seems to cause the most confusion is 'substances.' The majority of experts and those who write these rules have concluded that this is to mean that wine used for Communion cannot be a mix of several different liquids. A priest cannot mix the wine with grape juice to dilute it, or club soda, or any other sort of liquids or additives which would result in something that was not purely wine. My understanding is that most makers of Sacramental Wine often do add small amounts of sulfites as part of the fermentation process which stabilize and preserve the wine, but that is not objected to since it is part of the process and certainly does not taint the wine or make it something other than wine."
"Sulfides [sic] are added in such small amounts that the Holy See has had no objection to them, since their presence does not corrupt the wine."
If only the U.S. National Organic Standards Board was as sensible as the Holy See, but it is not, and so "organic wine" in this country cannot contain sulfites. Really, though, we should expect savvy wine guidance from the church, because the Vatican has the highest per-capita wine consumption in the world. At the Vatican, they drink 30% more wine per capita than Italy and nearly six times as much as the United States.
"Any good house wine is fine and there are many good wines available in boxes or cubitainers [bag-in-box], these have the advantage of lasting several weeks after opening because air is expelled and spoilage is retarded. Bottom line: the finer quality of wine, the better it is. This is an important consideration since the wine selected will become the Body and Blood of Christ."
Sorry, no-sulfite partisans: wines with sulfites are officially "pure and incorrupt."
I don't know what His Holiness thinks of native yeast, but if I ever get an audience with him, I'll ask.
The Vatican's acceptance of added sulfites in winemaking doesn't surprise me.
During my student days at Santa Clara University, Thomas Terry was the Jesuit president of the university who also oversaw the sacramental winemaking at Novitiate Winery in Los Gatos (a town in the Santa Cruz mountains south of Silicon Valley).
Terry (a student of Joe Heitz at Fresno State's viticulture & enology program) was also a chemistry professor who well understood the preservative properties of sulfur in winemaking.
|
0.999917 |
What's the difference between a resort spa and a destination spa? If you're being extremely strict the difference would be that a destination spa offers a regime of treatments whereas a resort spa, with often the same facilities, offers these à la carte, i.e. you pick and choose.
There's often no difference at all between a resort spa and a hotel spa (if it's a nice hotel), although in some places, particularly Florida, as soon as a hotel starts calling itself a resort you may find an extra resort fee added to your bill.
As many so called destination spas can also offer à la carte services is there really any difference?
See also Destination Spa, Hotel Spa and Day Spa.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.