proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.985105 |
I think I might have celiac disease. Should I cut gluten out of my diet?
You should NEVER start a gluten-free diet before you have a blood test and biopsy done to test for celiac disease, since it can interfere with making an accurate diagnosis. This is because the tests will not be accurate if you are not currently consuming gluten.
You need to know if you have celiac disease for a number of reasons. First, if it is celiac, you have to follow a gluten-free diet to the red letter, because the compliances of non-treated celiac disease can range from other nutritional deficiencies like anemia and osteoporosis to other autoimmune diseases and even lymphoma. You must follow the diet perfectly to prevent these complications.
The second reason is that celiac disease is an inherited disease, so if you have been diagnosed with it, your other family members may be taken more seriously if they see a doctor with the symptoms of it.
Shelley Case, RD, is a registered dietitian and a member of the Medical Advisory Boards of the Celiac Disease Foundation and Gluten Intolerance Group in the U.S. and Professional Advisory Board of the Canadian Celiac Association. A leading international nutrition expert on celiac disease, Shelley has been researching gluten-free products for more than 25 years. The latest edition of her book, Gluten-Free Diet, describes more than 3,100 gluten-free products from more than 270 companies in the US, Canada and around the world. The book is viewed as the definitive gluten-free guide, and numerous celiac health experts like Dr. Alessio Fasano, MD and Dr. Peter Green, MD recommend all their patients to use this book. To learn more, visit www.glutenfreediet.ca.
|
0.999254 |
The state of São Paulo is located in the southeastern region of Brazil and its capital is the city of São Paulo. The state is the most populous country representing 22% of the population with more than 44 million inhabitants. Among the attractions in the state, who visit Sao Paulo must know the Paulista Avenue, Ibirapuera Park, the Art Museum of Sao Paulo, the Pinacoteca do Estado de Sao Paulo, the Municipal Theatre of São Paulo, the Museum of the Portuguese Language, the Metropolitan Cathedral of St. Paul, the Cathedral Square, Luz Station which is one of the symbols of the São Paulo power at the height of the coffee with milk Republic. Also the Municipal Market of Sao Paulo and many other charming and historic places. In São Paulo is beaches in some of its municipalities, as in Santos, Bertioga, Guaruja, Ubatuba, Peruibe, Mongaguá, Itanagar and more. One of the very popular places for young people and families is the Hopi Hari Park, located in Vineyard and one of the largest theme parks in Latin America. The main cities of the state are its capital Sao Paulo, Guarulhos, Sao Bernardo do Campo, Campinas, Santos, Osasco, Sorocaba, Ribeirão Preto, Piracicaba, São José dos Campos and ABC, which is traditionally industrial, making it part cities Santo André, São Bernardo do Campo and São Caetano do Sul. The state created the first broadcaster in Brazil, the Tupi TV, created by Assis Chateaubriand in 1950. Since then the major networks are developing in Sao Paulo, achieving projection national and SBT, Band, Rede Record, Gazeta Network, Network TV, TV Globo São Paulo and others. In Sao Paulo are important cultural landmarks such as the Institute of History and Geography of São Paulo and the Paulistana Academy of Letters. Typical state foods are couscous, chicken with brown sauce, polenta tart, wattle-and-daub, the drowned among others, and the food in Sao Paulo influences of people like the Japanese, Italian and Arabic. São Paulo is the most diversified Brazilian state culturally, descended from Italian, Portuguese, Native Amerindians, Africans. Also the Arabs, Germans, Spanish, Japanese and Chinese.
|
0.999861 |
Temperance is defined as moderation or voluntary self-restraint. It is typically described in terms of what an individual voluntarily refrains from doing. This includes restraint from retaliation in the form of non-violence and forgiveness, restraint from arrogance in the form of humility and modesty, restraint from excesses such as splurging now in the form of prudence, and restraint from excessive anger or craving for something in the form of calmness and self-control.
Temperance has been described as a virtue by religious thinkers, philosophers, and more recently, psychologists, particularly in the positive psychology movement. In classical iconography, the virtue is often depicted as a woman holding two vessels transferring water from one to another. It was one of the cardinal virtues in western thought found in Greek philosophy and Christianity, as well as eastern traditions such as Buddhism and Hinduism.
Temperance is one of the six virtues in the positive psychology classification, included with wisdom, courage, humanity, justice, and transcendence. It is generally characterized as the control over excess, and expressed through characteristics such as chastity, modesty, humility, prudence, self-regulation, forgiveness and mercy; each of these involves restraining an excess of some impulse, such as sexual desire, vanity, or anger.
Themes of temperance can be seen across cultures and time, as illustrated here.
Temperance is an essential part of the Eightfold Path. The third and fifth of the five precepts (pañca-sila) reflect values of temperance: "misconduct concerning sense pleasures" and drunkenness are to be avoided.
The concept of dama (Sanskrit: दम) in Hinduism is equivalent to temperance. It is sometimes written as damah (Sanskrit: दमः). The word dama, and Sanskrit derivative words based on it, connote the concepts of self-control and self-restraint. Brihadaranyaka Upanishad, in verse 5.2.3, states that three characteristics of a good, developed person are self-restraint (damah), compassion and love for all sentinent life (daya), and charity (daana). In Hinduism literature dedicated to yoga, self-restraint is expounded with the concept of yamas (Sanskrit: यम). According to ṣaṭsampad, self-restraint (dama) is one of the six cardinal virtues.
The list of virtues that constitute a moral life evolve in vedas and upanishads. Over time, new virtues were conceptualized and added, some replaced, others merged. For example, Manusamhita initially listed ten virtues necessary for a human being to live a dharmic (moral) life: Dhriti (courage), Kshama (forgiveness), Dama (temperance), Asteya (Non-covetousness/Non-stealing), Saucha (purity), Indriyani-graha (control of senses), dhi (reflective prudence), vidya (wisdom), satyam (truthfulness), akrodha (free from anger). In later verses this list was reduced to five virtues by the same scholar, by merging and creating a more broader concept. The shorter list of virtues became: Ahimsa (Non-violence), Dama (temperance), Asteya (Non-covetousness/Non-stealing), Saucha (purity), Satyam (truthfulness). This trend of evolving concepts continue in classical Sanskrit literature, Dama with Ahimsa and few other virtues present in the evolving list of virtues necessary for a moral life (dharma).
Five types of self-restraints are considered essential for a moral and ethical life in Hindu philosophy: one must refrain from any violence that causes injury to others, refrain from starting or propagating deceit and falsehood, refrain from theft of other's property, refrain from sexually cheating on one's partner, and refrain from avarice. The scope of self-restraint includes one's action, the words one speaks or writes, and in one's thoughts. The necessity for temperance is explained as preventing bad karma which sooner or later haunts and returns to the unrestrained. The theological need for self-restraint is also explained as reigning in the damaging effect of one's action on others, as hurting another is hurting oneself because all life is one.
The Greek definition of temperance translates to “moderation in action, thought, or feeling; restraint." Temperance is a major Athenian virtue, as advocated by Plato; self-restraint (sôphrosune) is one of his four core virtues of the ideal city, and echoed by Aristotle. According to Aristotle, “temperance is a mean with regard to pleasures”. In “Charmides,” one of Plato’s early dialogues, the one who possessed ‘sophrosune’ is defined in four ways: (1) one who has quietness, (2) one who has modesty, (3) one who does his own business, and (4) one who knows himself. Plato quickly dismisses the three first definitions and argues against (4) that if ‘sophrosune’ would have been only the property of knowing what one knows or not, then it would be useless without knowledge about other matters.
In the Judeo-Christian tradition, temperance is prolific. The Old Testament emphasizes temperance as a core virtue, as evidenced in both Solomon's Book of Proverbs and in the Ten Commandments, with its admonitions against adultery and covetousness. The New Testament does so as well, with forgiveness being central to theology and self-control being one of the Fruits of the Spirit. With regard to Christian theology, the word temperance is used by the King James Version in Galatians 5:23 for the Greek word ἐγκρατεία (enkrateia), which means self-control or discipline (Strong's Concordance, 1466). Thomas Aquinas promoted Plato's original virtues in addition to several others.
Within the Christian church Temperance is a virtue akin to self-control. It is applied to all areas of life. It can especially be viewed in practice among sects like the Amish, Old Order Mennonites, and Conservative Mennonites. In the Christian religion, temperance is a virtue that moderates attraction and desire for pleasure and “provides balance in the use of created goods”. St. Thomas calls it a “disposition of the mind which binds the passions,”. Temperance is believed to combat the sin of gluttony. Temperance is commonly broken down into four main strengths: forgiveness, humility, prudence, and self-regulation.
Values of temperance are still advocated by more modern sources such as the Boy Scouts, William Bennett, and Ben Franklin Philosophy has contributed a number of lessons to the study of traits, particularly in its study of injunctions and its listing and organizing of virtues.
Wikimedia Commons has media related to Temperance.
↑ Green, Joel (2011). Dictionary of scripture and ethics. Grand Rapids, Mich: Baker Academic. p. 769. ISBN 978-0-8010-3406-0.
1 2 Schwarzer, Ralf (2012). Personality, human development, and culture : international perspectives on psychological science. Hove: Psychology. pp. 127–129. ISBN 978-0-415-65080-9.
↑ Peterson, Christopher (2004). Character strengths and virtues a handbook and classification. Washington, DC New York: American Psychological Association Oxford University Press. ISBN 978-0-19-516701-6.
↑ Harvey, P. (1990). An introduction to Buddhism: Teaching, history and practices. Cambridge, England: Cambridge University Press.
↑ Brihadaranyaka Upanishad, Translator: S Madhavananda, page 816, For discussion: pages 814-821; Quote - "तदेतत्त्रयँ शिक्षेद् दमं दानं दयामिति", translation: Learn three cardinal virtues - temperance, charity and compassion for all life."
↑ Gupta, B. (2006). BHAGAVAD GĪTĀ AS DUTY AND VIRTUE ETHICS. Journal of Religious Ethics, 34(3), 373-395.
↑ Bailey, G. (1983). Puranic notes: reflections on the myth of sukesin. South Asia: Journal of South Asian Studies, 6(2), 46-61.
1 2 3 Niemiec, R. M. (2013). VIA character strengths: Research and practice (The first 10 years). In H. H. Knoop & A. Delle Fave (Eds.), Well-being and cultures: Perspectives on positive psychology (pp. 11-30). New York: Springer.
↑ Peterson & Seligman 2004, M.E.P. (2004). Character strengths and virtues: A handbook and classification. Washington, DC: American Psychological Association.
|
0.986122 |
A 12-year-old boy has been hailed as a hero after he pushed his friend out of the path of a runaway car and took the full force of the collision himself.
Dylan Graves, from Bradford, West Yorkshire, was hit by the vehicle after his quick actions potentially saved the life of 11-year-old friend James Yeadon.
He suffered two broken bones in his spine, a fractured left pelvis and a bruised lung after becoming trapped underneath the car.
The incident happened close to his home, and Dylan's mother Natasha said she feared the worst after James ran to the house to tell her what happened.
'He said Dylan had been hit by a car but when I ran outside I could not find him or hear him. That is when James told me was actually trapped under the car.
'The feeling was horrendous. I just looked up at the sky thinking that he was dead.
'I felt slightly relived that he was conscious as I crouched down beside the car, but he was upside down in such an awkward position under the car.
'Dylan just wanted me to hold his hand and kept telling me he loved me. He is not the type of boy who says that often so I knew he was scared.
Dylan was struck by a driverless black Vauxhall Vectra and the vehicle is believed to have had an issue with its handbrake which caused it to roll backwards down the street.
He had been out playing with James and was on his way home at the time of the incident.
The car picked up speed coming down the hill before reaching Dylan but the youngster still managed push his friend out of the way, before jumping up seconds before impact, which is believed to have saved his life.
However, Dylan still took a nasty hit, causing serious injuries, and was left in the foetal position trapped between the vehicle and a wooden fence.
Emergency services were called and the fire service managed to free Dylan by smashing the car window and lifting the handbrake.
Dylan, who attends Immanuel College, was rushed to Leeds General Infirmary and was released the flowing day.
His recovery is expected to take around 12-weeks but doctors have advised him to remain laid up in bed.
Mrs Graves, who runs a dance academy, has commended her son's bravery and hopes he will be able to make a full recovery, as he still has to have further tests at Leeds General Infirmary.
She said: 'I just can't believe how brave he was to push his friend out of the way and take the hit himself.
'James' mum Rachael has been coming round every day to see how Dylan is and has been calling him her guardian angel for saving her son.
'Dylan is doing a lot better now but he has been in agony from his injuries. He is continuing to see a specialist consultant at Leeds General Infirmary who does not usually see children but was called in due to the extent of his injuries.
Mrs Graves also thanked her neighbours for coming out with blankets and bottles of water immediately after the incident and for their well wishes.
West Yorkshire Police confirmed that inquiries were ongoing into the incident and that the family have been kept informed.
|
0.999999 |
Import bug information to a Trello card.
Bugs 2 Trello is a Chrome extension to add bugs/issues to a Trello board. It currently supports Launchpad, GitHub, SourceForge, Google Code, BitBucket, Debian's BTS, and some Bugzilla instances.
Bugs 2 Trello is open source software. It is released under the MIT license. The code is available on GitHub, and you can report bugs there.
|
0.990824 |
This calculator estimates radiation dose and risk of developing thyroid cancer from fallout exposure from nuclear tests.
During the Cold War in the mid-1940s through early 1960s, the U.S. government conducted about 100 nuclear weapons (atomic bomb) tests in the atmosphere at a test site in Nevada, more than 100 in the Pacific, and one—the first ever—in New Mexico. The radioactive substances released by these tests are known as "fallout." They were carried thousands of miles away from the test site by winds. As a result, people living in the United States at the time of the testing were exposed to varying levels of radiation.
Among the numerous radioactive substances released in fallout, there has been a great deal of concern about and study of one radioactive form of iodine--called iodine-131, or I-131. I-131 collects in the thyroid gland. People exposed to I-131, especially during childhood, may have an increased risk of thyroid disease, including thyroid cancer. Thyroid cancer is uncommon and is usually curable. Typically, it is a slow-growing cancer that is highly treatable. About 98 out of 100 people who are diagnosed with thyroid cancer survive the disease for at least five years after diagnosis.
The thyroid controls many body processes, including heart rate, blood pressure, and body temperature, as well as childhood growth and development. It is located in the front of the neck, just above the top of the breastbone and overlying the windpipe.
Although the potential of developing thyroid cancer from exposure to I-131 from nuclear weapons testing is small, it is important for Americans who grew up during the atomic bomb testing between 1945 and 1963 to be aware of risks.
Because of wind and rainfall patterns, the distribution of I-131 fallout varied widely after each test. Therefore, although all areas of the United States received fallout from at least one nuclear weapons test, certain areas of North America received more fallout than others.
Scientists estimate that the larger amounts of I-131 from the Nevada test site fell over some parts of Utah, Colorado, Idaho, Nevada, and Montana. But I-131 traveled to all states, particularly those in the Midwestern, Eastern, and Northeastern United States. Some of the I-131 collected on pastures and on grasses. Depending on the location, grazing cows and goats sometimes consumed contaminated grasses resulting in I-131 collecting in the animals' milk. Much of the health risk associated with I-131 occurred among milk-drinkers--usually children. From what is known about thyroid cancer and radiation, scientists think that people who were children during the period of atomic bomb testing are at higher risk for developing thyroid cancer.
Scientists are working to find out more about ways to measure and address potential I-131 exposure. They are also working to find out more about other radioactive substances released by fallout and their possible effects on human health.
Congress directed government health agencies to investigate the I-131 problem many years ago, and to make recommendations to Americans who might have related health risks. Gathering information turned out to be very complicated. Record-keeping was incomplete at the time of the bomb testing. Much of the information needed to calculate an individual's dose of I-131 and associated risk is either unreliable or unavailable.
Despite such challenges, government agencies organized expert scientific teams that have devoted many years to learning more about I-131. A number of reports have been published documenting what they have learned (1997, 1999). This information was put together to educate the American people about the potential health risks from exposure to I-131 from nuclear weapons testing.
The "active" in "radioactive" means that unstable substances produced in nuclear reactions break down and change, so that they eventually become stable and no longer release radiation. The rate of breakdown can occur quickly in some radioactive substances, often within a few days. Half of the I-131 released during each atomic bomb test was gone in about 8 days. Almost all of it was gone (less than 1 percent remained) 80 days after the test.
Like all radioactive substances, I-131 releases radiation as it breaks down. It is this radiation that can injure human tissues. But I-131's steady breakdown means that the amount of I-131 present in the environment after a bomb test steadily decreased. Therefore, farm animals that grazed in fields within a few days after a test would have consumed higher levels of I-131 than animals grazing later.
Age and residence during those years are usually known. But few people can recall the exact amounts or sources of the milk they drank as children. While the amount of milk consumed is important in determining exposure to I-131, it is also important to know the source of the milk. Fresh milk from backyard or farm cows and goats usually contained more I-131 than store-bought milk. This is because processing and shipping milk allowed more time for the I-131 to break down.
Some thyroid diseases are caused by changes in the amount of thyroid hormones that enter the body from the thyroid gland. Doctors can screen for these with a simple blood test.
Noncancerous thyroid disease also includes lumps, or nodules, in the thyroid gland that are benign and not cancerous.
Thyroid cancer occurs when a lump, or nodule, in the thyroid gland is cancerous.
Thyroid cancer accounts for a little less than 4 percent of all cancers diagnosed in the United States. Incidence has been going up in recent years, in part due to increased detection. Researchers suspect that rising rates of obesity are also influencing rates. However, these two factors do not fully explain the increases. Typically, thyroid cancer is slow-growing, highly treatable, and usually curable. About 98 out of 100 people who are diagnosed with thyroid cancer survive the disease for at least five years, and about 92 out of 100 people survive the disease for at least 20 years after diagnosis.
The cause of most cases of thyroid cancer is not known. Exposure to I-131 can increase the risk of thyroid cancer. It is thought that risk is higher for people who have had multiple exposures and for people exposed at a younger age. But even among people who have documented exposures to I-131, few develop this cancer. It is known that children have a higher-than-average risk of developing thyroid cancer many years later if they were exposed to radiation. This knowledge comes from studies of people exposed to x-ray treatments for childhood cancer or noncancerous head and neck conditions, or as a result of direct radiation from the atomic bombings of Hiroshima and Nagasaki.
The thyroid gland in adults, however, appears to be more resistant to the effects of radiation. There appears to be little risk of developing thyroid cancer from exposure to I-131 or other radiation sources as an adult.
For more on thyroid cancer, see NCI’s Thyroid Cancer page.
How can people reach a sound decision about their risk of thyroid cancer? When is it time to visit a doctor?
Age—People who are now 50 years of age or older, particularly those born between 1936 and 1963 and who were children at the time of testing, are at higher risk.
Milk drinking—Childhood milk drinkers, particularly those who drank large quantities of milk or those who drank unprocessed milk from farm or backyard cows and goats, have increased risk.
Childhood residence—The Mountain West, Midwest, East, and Northeast areas of the United States generally were more affected by I-131 fallout from nuclear testing.
Medical signs—A lump or nodule that an individual can see or feel in the area of the thyroid gland requires attention. If you can see or feel a lump or nodule, it is important that you see a doctor.
|
0.999802 |
Pityrodia oldfieldii (F.Muell.) Benth. is a nomenclatural synonym.
|
0.999591 |
A spell to bring luck into your life as long as you have gratitude. Must be done on the night of a full moon.
1. On the night of a full moon go outside with the materials listed above.
2. Take the stand or table and put your green candle on top of it.
3. Next, light the green candle.
5. As the spell takes place in the morning say thank you for everything grateful or lucky that happened during that day.
|
0.996629 |
I have a clipart I'd like to modify to use as a logo on some custom clothing. I'd like the white background of my pic removed, and some wording inserted above the pic. Specs from website: "Our preferred formats are EPS, Ai, PDF or Vectors. If this is not possible, please upload a .PNG or .JPG with a resolution higher than 300dpi. This will ensure clarity when we bring your dream designs to life."
Me was friendly, efficient and new exactly how to help me in creating a logo to fit specifications including file types.
Hi there, Im looking for someone to help me with designing a logo for my dad's business. It would be great if you could provide 3-4 different concepts/ideas that I will run past him. I'd also like this to be set-up on: - a business card (I'll print via a local printer) - as letterhead (electronic version) I can give you a design brief to start with and will be available to discuss should you have any queries during the process.
|
0.999945 |
When someone is killed by their partner or family member, the way they’re written about in the press may seem minor compared to the tragedy they and their family have endured.
But as I discovered when it happened to my family, the way domestic homicide is reported – with language like “jilted lovers” or “crimes of passion” – can be painful, inaccurate, and a missed opportunity for future victims.
After my sister Julia and nephew Will were murdered in domestic violence in November 2003, my family successfully campaigned, along with others, to change the law. It means a Domestic Homicide Review is required when an individual is killed or takes their own life because of domestic abuse.
Domestic Homicide Reviews are there, in part, to re-balance the perpetrator’s narrative. Change and improvement often start from knowing the truth and these reviews are supposed to illuminate the past to make the future safer. That is, to fully understand the context, and the steps that lead up to homicide.
This has been a huge win for families who have lost their loved ones in domestic homicides. But while the media still often report domestic homicides as ‘jealous rages’ or ‘crimes of passion’, they are reinforcing the perpetrator’s narrative. And this can lead some to believe that the actions of domestic killers are not without just cause. Revealing a victim’s truth may well save lives, and when two women a week are killed by a partner or ex-partner, we must take every opportunity we can to save lives.
When James Gray murdered Jade Watson in 2013, one report called him a “jilted lover”. That description may not be inaccurate, but it does not describe what happened in its full context and may lead some to consider that the victim was in part, to blame.
The press has to start getting this right. Which is why I am supporting Level Up’s campaign for the Independent Press Standards Organisation (IPSO) to update their editor’s code to regulate how domestic homicides are reported.
Avoid speculative “reasons”, or describing the murder as an uncharacteristic event. Homicides are usually underpinned by a longstanding sense of ownership, coercive control and possessive behaviours – they are not a random event.
Name the crime as “domestic violence” or “domestic homicide” and include the National Domestic Violence Helpline at the end of the article: 0808 2000 247.
Avoid sensationalising language, invasive or graphic details that compromise the dignity of the dead woman or her surviving family members.
Avoid insensitive or trivialising language or images.
Avoid using stock images that reinforce the myth that it’s only a physical crime.
Improved reporting can help build community knowledge of this crime and mean more people feel confident to respond effectively when victims seek help.
We know that next month around seven women will likely be killed as a result of domestic violence. We just don’t know their names yet.
We may learn that some of them predicted it, though. My sister did hers. To raise the status of next month’s victims, of whatever gender, and to hopefully keep them alive, this means truthfully reporting the full context of domestic violence homicides.
It’s time for the press to report more responsibly and to uncover the truth. To reveal the extraordinary difficulties victims of domestic homicide suffer before being killed. Doing so will not only bring justice to families, it may well save lives.
Frank Mullane is the CEO of AAFDA (Advocacy After Fatal Domestic Abuse). His comments are his own. If you are affected by the issues raised in this article, you can call the National Domestic Violence Helpline on 0808 2000 247 for confidential support.
|
0.999668 |
"Lady Bug" redirects here. For oder uses, see Lady Bug (disambiguation).
"Ladybird", "Ladybug", and "Lady beetwe" redirect here. For oder uses, see Ladybird (disambiguation).
Coccinewwidae (/ˌkɒksɪˈnɛwɪdiː/) is a widespread famiwy of smaww beetwes ranging in size from 0.8 to 18 mm (0.03 to 0.71 inches). The famiwy is commonwy known as wadybugs in Norf America, and wadybirds in Britain and oder parts of de Engwish-speaking worwd. Entomowogists widewy prefer de names wadybird beetwes or wady beetwes as dese insects are not cwassified as true bugs.
The majority of coccinewwid species are generawwy considered usefuw insects, because many species prey on herbivorous homopterans such as aphids or scawe insects, which are agricuwturaw pests. Many coccinewwids way deir eggs directwy in aphid and scawe insect cowonies in order to ensure deir warvae have an immediate food source. However, some species do have unwewcome effects; among dese, de most prominent are of de subfamiwy Epiwachninae (which incwudes de Mexican bean beetwe), which are herbivorous demsewves. Usuawwy, epiwachnines are onwy minor agricuwturaw pests, eating de weaves of grain, potatoes, beans, and various oder crops, but deir numbers can increase expwosivewy in years when deir naturaw enemies, such as parasitoid wasps dat attack deir eggs, are few. In such situations, dey can do major crop damage. They occur in practicawwy aww de major crop-producing regions of temperate and tropicaw countries.
The name coccinewwids is derived from de Latin word coccineus meaning "scarwet". The name "wadybird" originated in Britain where de insects became known as "Our Lady's bird" or de Lady beetwe. Mary (Our Lady) was often depicted wearing a red cwoak in earwy paintings, and de spots of de seven-spot wadybird (de most common in Europe) were said to symbowise her seven joys and seven sorrows. In de United States, de name was adapted to "wadybug". Common names in some oder European wanguages have de same association, for exampwe, de German name Marienkäfer transwates to Marybeetwe.
Coccinewwids are often conspicuouswy cowoured yewwow, orange, or red wif smaww bwack spots on deir wing covers, wif bwack wegs, heads and antennae. There is, however, great variation in dese cowour patterns. For exampwe, a minority of species, such as Vibidia duodecimguttata, a twewve-spotted species, have whitish spots on a brown background. Coccinewwids are found worwdwide, wif over 6,000 species described.
Most coccinewwids have round to ewwipticaw, dome-shaped bodies wif six short wegs. Depending on de species, dey can have spots, stripes, or no markings at aww. Seven-spotted coccinewwids are red or orange wif dree spots on each side and one in de middwe; dey have a bwack head wif white patches on each side.
As weww as de usuaw yewwow and deep red cowourings, many coccinewwid species are mostwy, or entirewy, bwack, dark grey, gray, or brown, and may be difficuwt for non-entomowogists to recognise as coccinewwids at aww. Conversewy, non-entomowogists might easiwy mistake many oder smaww beetwes for coccinewwids. For exampwe, de tortoise beetwes, wike de wadybird beetwes, wook simiwar because dey are shaped so dat dey can cwing to a fwat surface so cwosewy dat ants and many oder enemies cannot grip dem.
Non-entomowogists are prone to misidentify a wide variety of beetwe species in oder famiwies as "wadybirds", i.e. coccinewwids. Beetwes are particuwarwy prone to such misidentification if dey are spotted in red, orange or yewwow and bwack. Exampwes incwude de much warger scarabaeid grapevine beetwes and spotted species of de Chrysomewidae, Mewyridae and oders. Conversewy, waymen may faiw to identify unmarked species of Coccinewwidae as "wadybirds". Oder beetwes dat have a defensive hemisphericaw shape, wike dat of de Coccinewwidae (for exampwe de Cassidinae), awso are often taken for wadybirds.
A common myf, totawwy unfounded, is dat de number of spots on de insect's back indicates its age. In fact, de underwying pattern and cowouration are determined by de species and genetics of de beetwe, and devewop as de insect matures. In some species its appearance is fixed by de time it emerges from its pupa, dough in most it may take some days for de cowour of de aduwt beetwe to mature and stabiwise. Generawwy, de mature cowour tends to be fuwwer and darker dan de cowour of de cawwow.
Parapwectana tsushimensis is an Asian spider dat mimics wadybirds.
Brumoides suturawis is wongitudinawwy striped.
Unusuawwy for a Coccinewwid, de mature Rhyzobius chrysomewoides is brown and unspotted.
Coccinewwa transversawis, ewytra in de open position, uh-hah-hah-hah. In dis coccinewwid, de bwack spots are so warge dey meet.
A specimen of Harmonia axyridis in Souf Africa, freshwy out of its pupa. Its bwack spots wiww devewop as its exoskeweton hardens.
Henosepiwachna guttatopustuwata, a herbivore and one of de wargest wadybirds, feeding on a potato weaf. This species is muwticowoured.
This yewwow-shouwdered wadybird (Apowinus wividigaster) feeding on an aphid has onwy two cowour spots. Some species have none.
A yewwow, twenty-two spot wadybird (Psywwobora vigintiduopunctata).
Coccinewwids are best known as predators of Sternorrhyncha such as aphids and scawe insects, but de range of prey species dat various Coccinewwidae may attack is much wider. A genus of smaww bwack wadybirds, Stedorus, presents one exampwe of predation on non-Sternorrhyncha; dey speciawise in mites as prey, notabwy Tetranychus spider mites. Stedorus species accordingwy are important in certain exampwes of biowogicaw controw. They are naturaw predators of a range of serious pests, such as de European corn borer, a mof dat costs US agricuwture industry more dan $1 biwwion annuawwy in crop wosses and popuwation controw.
Various warger species of Coccinewwidae attack caterpiwwars and oder beetwe warvae. Severaw genera feed on various insects or deir eggs; for exampwe, Coweomegiwwa species are significant predators of de eggs and warvae of mods such as species of Spodoptera and de Pwutewwidae. Larvae and eggs of wadybirds, eider deir own or of oder species, can awso be an important cannibawistic food resource when awternative prey are scarce. As a famiwy, de Coccinewwidae used to be regarded as purewy carnivorous, but dey are now known to be far more omnivorous dan previouswy dought, bof as a famiwy and in individuaw species; examination of gut contents of apparentwy speciawist predators commonwy yiewd residues of powwen and oder pwant materiaws. Besides de prey dey favour, most predatory coccinewwids incwude oder items in deir diets, incwuding honeydew, powwen, pwant sap, nectar, and various fungi. The significance of such nonprey items in deir diets is stiww under investigation and discussion, uh-hah-hah-hah.
Apart from de generawist aphid and scawe predators and incidentaw substances of botanicaw origin, many Coccinewwidae do favour or even speciawise in certain prey types. This makes some of dem particuwarwy vawuabwe as agents in biowogicaw controw programmes. Determination of speciawisation need not be a triviaw matter, dough; for exampwe de warva of de Vedawia wadybird Rodowia cardinawis is a speciawist predator on a few species of Monophwebidae, in particuwar Icerya purchasi, which is de most notorious of de cottony cushion scawe species. However, de aduwt R. cardinawis can subsist for some monds on a wider range of insects pwus some nectar.
Certain species of coccinewwids are dought to way extra infertiwe eggs wif de fertiwe eggs, apparentwy to provide a backup food source for de warvae when dey hatch. The ratio of infertiwe to fertiwe eggs increases wif scarcity of food at de time of egg waying. Such a strategy amounts to de production of trophic eggs.
Some species in de subfamiwy Epiwachninae are herbivores, and can be very destructive agricuwturaw pests (e.g., de Mexican bean beetwe). Again, in de subfamiwy Coccinewwinae, members of de tribe Hawyziini and de genus Tydaspis are mycophagous.
Whiwe predatory species are often used as biowogicaw controw agents, introduced species of coccinewwids are not necessariwy benign, uh-hah-hah-hah. Species such as Harmonia axyridis or Coccinewwa septempunctata in Norf America outcompete and dispwace native coccinewwids and become pests demsewves.
The main predators of coccinewwids are usuawwy birds, but dey are awso de prey of frogs, wasps, spiders, and dragonfwies. The bright cowours of many coccinewwids discourage some potentiaw predators from making a meaw of dem. This phenomenon, cawwed aposematism, works because predators wearn by experience to associate certain prey phenotypes wif a bad taste. A furder defence, known as "refwex bweeding", exists in which an awkawoid toxin is exuded drough de joints of de exoskeweton, triggered by mechanicaw stimuwation (such as by predator attack) in bof warvaw and aduwt beetwes, deterring feeding.
Coccinewwids in temperate regions enter diapause during de winter, so dey often are among de first insects to appear in de spring. Some species (e.g., Hippodamia convergens) gader into groups and move to higher ewevations, such as a mountain, to enter diapause.
Most coccinewwids overwinter as aduwts, aggregating on de souf sides of warge objects such as trees or houses during de winter monds, dispersing in response to increasing day wengf in de spring.
Predatory coccinewwids are usuawwy found on pwants which harbour deir prey. They way deir eggs near deir prey, to increase de wikewihood de warvae wiww find de prey easiwy. In Harmonia axyridis, eggs hatch in dree to four days from cwutches numbering from a few to severaw dozen, uh-hah-hah-hah. Depending on resource avaiwabiwity, de warvae pass drough four instars over 10–14 days, after which pupation occurs. After a teneraw period of severaw days, de aduwts become reproductivewy active and are abwe to reproduce again water, awdough dey may become reproductivewy qwiescent if ecwosing wate in de season, uh-hah-hah-hah. Totaw wife span is one to two years on average.
The atwas Ladybirds (Coccinewwidae) of Britain and Irewand pubwished in 2011 showed a decwine of more dan 20% in native species due to environmentaw changes and competition from foreign invaders. The distribution maps, compiwed over a 20-year period wif hewp from dousands of vowunteers, showed a decwine in de numbers of de common 10-spot and 14-spot wadybirds and a number of oder species, incwuding de 11-spot, 22-spot, cream-spot, water and hierogwyphic wadybirds, Cocciduwa rufa, Rhyzobius witura and Nephus redtenbacheri. Conversewy, increases were seen in de numbers of harweqwin, orange, pine, and 24-spot wadybirds, as weww as Rhyzobius chrysomewoides. The kidney spot wadybird was recorded in Scotwand for de first time in recent years, and de 13-spot was found to have recowonised Cornwaww, Devon, and de New Forest. The most commonwy recorded species was de 7-spot, cwosewy fowwowed by de Asian harweqwin — an invader dat arrived from continentaw Europe in 2003 after being introduced to controw pests. An 'expwosion' in de number of orange wadybirds, which feed on miwdew, is dought to have been due to de warmer, damper conditions dat now prevaiw in parts of Engwand.
In de United States, coccinewwids usuawwy begin to appear indoors in de autumn when dey weave deir summer feeding sites in fiewds, forests, and yards and search out pwaces to spend de winter. Typicawwy, when temperatures warm to de mid-60s F (around 18 °C) in de wate afternoon, fowwowing a period of coower weader, dey wiww swarm onto or into buiwdings iwwuminated by de sun, uh-hah-hah-hah. Swarms of coccinewwids fwy to buiwdings in September drough November depending on wocation and weader conditions. Homes or oder buiwdings near fiewds or woods are particuwarwy prone to infestation, uh-hah-hah-hah.
After an abnormawwy wong period of hot, dry weader in de summer of 1976 in de UK, a marked increase in de aphid popuwation was fowwowed by a "pwague" of wadybirds, wif many reports of peopwe being bitten as de suppwy of aphids dwindwed.
The presence of coccinewwids in grape harvests can cause wadybird taint in wines produced from de grapes.
Harmonia axyridis (de harweqwin wadybird) is an exampwe of how an animaw might be partwy wewcome and partwy harmfuw. It was introduced into Norf America from Asia in 1916 to controw aphids, but is now de most common species, outcompeting many of de native species. It has since spread to much of western Europe, reaching de UK in 2004. It has become someding of a domestic and agricuwturaw pest in some regions, and gives cause for ecowogicaw concern, uh-hah-hah-hah. It has simiwarwy arrived in parts of Africa, where it has proved variouswy unwewcome, perhaps most prominentwy in vine-rewated crops.
Ladybirds have wong been of interest to chiwdren, uh-hah-hah-hah. They had many regionaw names (now mostwy disused) in Engwish, such as variations on Bishop-Barnaby (Norfowk and Suffowk diawect) – Barnabee, Burnabee, de Bishop-dat-burnef, and bishy bishy barnabee. The etymowogy is uncwear, but it may be from St. Barnabas' feast in June, when de insect appears, or a corruption of "Bishop-dat-burnef", from de fiery ewytra of de beetwes.
For she has crept under de warming pan.
This poem has its counterpart in German as Marienwürmchen, cowwected in Des Knaben Wunderhorn, and set to music by Robert Schumann as Op. 79, No. 13, and a Powish nursery rhyme, "Littwe Ladybirds' Andem", of which a part ("fwy to de sky, wittwe wadybird, bring me a piece of bread") became a saying.
Many cuwtures consider wadybirds wucky and have nursery rhymes or wocaw names for de insects dat refwect dis. For instance, de Turkish name for de insect is uğur böceği, witerawwy meaning "good wuck bug". In many countries, incwuding Russia, Turkey, and Itawy, de sight of a coccinewwid is eider a caww to make a wish or a sign dat a wish wiww soon be granted.
In Christian areas, dey are often associated wif de Virgin Mary and de name dat de insect bears in de various wanguages of Europe corresponds to dis. Awdough historicawwy many European wanguages referenced Freyja, de fertiwity goddess of Norse mydowogy, in de names, de Virgin Mary has now wargewy suppwanted her, so dat, for exampwe, freyjuhœna (Owd Norse) and Frouehenge have been changed into marihøne (Norwegian) and Marienkäfer (German), which corresponds wif Our Lady's bird. Sometimes, de insect is referred to as bewonging directwy to God (Irish bóín Dé, Powish boża krówka, Russian божья коровка (bozhya korovka), aww meaning "God's [wittwe] cow"). In Dutch it is cawwed wieveheersbeestje, meaning "wittwe animaw of our Good Lord". In bof Hebrew and Yiddish, it is cawwed "Moshe Rabbenu's (i.e. Moses's) wittwe cow" or "wittwe horse", apparentwy an adaptation from Swavic wanguages. Occasionawwy, it is cawwed "wittwe Messiah".
The insects have been used to symbowise Ladybird Books (part of Penguin Group), de Ladybird range of chiwdren's cwoding sowd by de former high street chain Woowworf's in de UK, whiwe de wadybird street tiwe is a symbow against sensewess viowence in de Nederwands, and is often pwaced on de sites of deadwy crimes. Ladybirds have served as de US state insects of Dewaware, Massachusetts, New Hampshire, New York, Ohio, and Tennessee, dough onwy New York has sewected a species native to de United States (Coccinewwa novemnotata); de oder states have aww adopted an invasive European species (Coccinewwa septempunctata). They have awso been adopted as de mascot of Candanchú, a ski resort near Canfranc in de Spanish Pyrenees.
^ a b "Coccinewwidae Latreiwwe, 1807". Integrated Taxonomic Information System. Retrieved 24 Juwy 2012.
^ Seago, A. E.; Giorgi, J. A.; Li, J.; Świpińskia, A. (Juwy 2011). "Phywogeny, cwassification and evowution of wadybird beetwes (Coweoptera: Coccinewwidae) based on simuwtaneous anawysis of mowecuwar and morphowogicaw data". Mowecuwar Phywogenetics and Evowution. 60 (1): 137–151. doi:10.1016/j.ympev.2011.03.015. PMID 21426943.
^ White, R.E. 1983. A fiewd guide to de beetwes of Norf America. Peterson Fiewd Guide Series #29.
^ Society, Nationaw Geographic. "Ladybugs, Ladybug Pictures, Ladybug Facts – Nationaw Geographic". Retrieved 4 October 2016.
^ Brown, L., ed. (2007). The Shorter Oxford Engwish Dictionary. 1 (6 ed.). p. 441.
^ a b Anonymous. "Why are wadybirds so-cawwed?". UK Ladybird survey. Retrieved 15 October 2010.
^ Samaha, John M. "Marian Roots of de Name". Our Lady's Bug. Dayton, Ohio: Internationaw Marian Research Institute. Retrieved 15 October 2010.
^ Roy, Hewen E.; Brown, Peter M.J.; et aw. (15 Apriw 2013). Ladybirds (2nd ed.). Pewagic pubwishing. p. 142. ISBN 9781907807077.
^ Anonymous. "common name: wadybirds, wadybird beetwes, wady beetwes, wadybugs (of Fworida)". Featured creatures. University of Fworida. Retrieved 8 Apriw 2010.
^ Seago, Ainswey E.; Giorgi, Jose Adriano; Li, Jiahui; Swipinski, Adam (15 March 2011). "Phywogeny, cwassification and evowution of wadybird beetwes (Coweoptera: Coccinewwidae) based on simuwtaneous anawysis of mowecuwar and morphowogicaw data" (PDF). Mowecuwar Phywogenetics and Evowution. 60: 137–151. doi:10.1016/j.ympev.2011.03.015. PMID 21426943. Retrieved 14 February 2016.
^ "Everyding Ladybug! The source for Ladybug Stuff!". Everyding-wadybug.com. Retrieved 22 June 2010.
^ "European corn borer - Ostrinia nubiwawis (Hubner)". entnemdept.ufw.edu. Retrieved 13 November 2017.
^ Smart, John (1963). British Museum (Naturaw History) Instructions for Cowwectors NO. 4A. Insects. London: Trustees of de British Museum.
^ Sands, D. P. A. and R. G. Van Driesche. 2000. Evawuating host specificity of agents for biowogicaw controw of ardropods: rationawe, medodowogy and interpretation, pp. 69-83. In Van Driesche, R. G., T. A. Heard, A. S. McCway, and R. Reardon (eds.). Proceedings of Session: Host Specificity Testing of Exotic Ardropod Biowogicaw Controw Agents: The Biowogicaw Basis for Improvement in Safety. Xf Internationaw Symposium on Biowogicaw Controw of Weeds. 4–14 Juwy 1999. Bozeman, Montana. U.S.D.A. Forest Service Buwwetin FHTET-99-1, Morgantown, West Virginia, U.S.A.
^ J. Perry & B. Roitberg (2005). "Ladybird moders mitigate offspring starvation risk by waying trophic eggs". Behavioraw Ecowogy and Sociobiowogy. 58 (6): 578–586. doi:10.1007/s00265-005-0947-1.
^ A. Honek, Z. Martinkova & S. Pekar (2007). "Aggregation characteristics of dree species of Coccinewwidae (Coweoptera) at hibernation sites" (PDF). European Journaw of Entomowogy. 104 (1): 51–56. doi:10.14411/eje.2007.008.
^ "What Is de Life Span of a Ladybug?". Sciencing. Retrieved 24 December 2017.
^ Roy, Hewen; Peter Brown; Robert Frost; Remy Powand (15 June 2011). Ladybirds (Coccinewwidae) of Britain and Irewand. The Fiewd Studies Counciw. p. 204. ISBN 978-1-906698-20-1.
^ Sampwe, Ian (15 June 2011). "Spot check finds Britain's native wadybirds struggwing to compete wif awien invaders". The Guardian. Guardian Newspapers wtd. p. 3. Retrieved 17 June 2011.
^ Anonymous (5 Juwy 2001). "Phew, what a scorcher!". The Nordern Echo. Archived from de originaw on 4 Juwy 2009. Retrieved 8 Apriw 2010.
^ Wainwright, Martin (17 May 2006). "The great drought". London: The Guardian. Retrieved 8 Apriw 2010.
^ Easton, Sawwy (2 February 2012). "Ladybird contamination on de rise". The Drinks Business. Union Press Ltd. Retrieved 21 June 2013.
^ a b Anonymous (5 October 2004). "'Deadwy wadybird' sighted in UK". BBC News. Retrieved 17 June 2010.
^ Anonymous. "The Harweqwin Ladybird has wanded!". The Harweqwin wadybird survey. Retrieved 17 June 2010.
^ "Invasive Species Souf Africa - Protecting Biodiversity from Invasion - Harweqwin wadybird citizen science project". Retrieved 24 December 2017.
^ Timmins, Nichowas (14 October 1994). "The Tories in Bournemouf: Teachers promised support as Shephard cawws truce". The Independent. London, uh-hah-hah-hah.
^ Edward Moor (1823). Suffowk Words and Phrases: Or, An Attempt to Cowwect de Linguaw Locawisms of dat County. J. Loder. pp. 33–.
^ Lewie C. Roache (1960) Ladybug, Ladybug: What's in a Name? The Coweopterists Buwwetin 14(1):21-25.
^ Szkownastrona.pw. "szkownastrona – Przedszkowe Pubwiczne im. Jana Brzechwy w Małomicach – Nasze grupy – BIEDRONECZKI – 4 LATKI -".
^ Born to Kvetch, Michaew Wex, St. Martin's Press, New York, 2005, ISBN 0-312-30741-1.
^ Gani, Aisha (12 October 2015). "Ladybird books introduce Peter and Jane to hipsters and hangovers" – via www.deguardian, uh-hah-hah-hah.com.
^ Seaton, Pauw. "Ladybird Cwoding - a history of Pasowds". www.woowwordsmuseum.co.uk.
^ Anonymous (Apriw 2004). "Speech by Mrs Maud de Boer-Buqwicchio on de occasion of de pwacement of a wadybird tiwe at de Counciw of Europe". Counciw of Europe. Retrieved 21 September 2011.
^ "TITLE 29 - CHAPTER 3. STATE SEAL, SONG AND SYMBOLS - Part . [REFER TO THE BOOK FOR THE PROPER TABLE]". dewcode.dewaware.gov.
^ www.staffmedia.com, StaffMedia Branding Design S.L. ->. "Estación de Esqwí de Candanchú – Ven a esqwiar en Famiwia". Retrieved 15 September 2016.
Look up wadybird in Wiktionary, de free dictionary.
Wikimedia Commons has media rewated to Coccinewwidae.
Nedvěd O., Kovář I., 2012: Appendix: List of genera in tribes and subfamiwies. In: Hodek I., Honěk A., van Emden H.F. (2012) Ecowogy and Behaviour of de Ladybird Beetwes (Coccinewwidae). John Wiwey and Sons Ltd. pp. 526–531.
Ladybird beetwes of Fworida on de UF / IFAS Featured Creatures website.
Ladybird beetwes – recent immigrants to Fworida on de UF / IFAS Featured Creatures website.
Camiwa Domonoske (20 May 2017). "Scientists Sneak A Peek At How Ladybugs Fowd Their Wings". NPR.
This page was wast edited on 26 January 2019, at 06:02 (UTC).
|
0.998977 |
Start the conversation confirming the event time and place. If the bagpiper isn't available on the day or if the location is outside of their service area, you'll immediately know it's time to move on to the next piper. Alternatively, you might also consider asking them for recommendations of other bagpipers in the area.
This topic could cover the timing of the performance (i.e. before, during, or after a service), certain tunes you want played, if you're looking for multiple players/mini-band, or whether it's meant to be a surprise. The more detail you can provide upfront, the greater the likelihood the bagpiper will understand exactly what you're looking for in the performance. Of course, if you're still planning the event and are looking for advice - a truly great piper will have recommendations based on their past experiences.
Most bagpipers will ask for a deposit if the event date is a month or more out. Especially during busy holidays and 'seasons' (such as St. Patrick's Day, weddings, graduations, etc.) bagpipers might get multiple inquiries and use deposits to hold a date.
After the call or email exchange you can always thank them and ask for some time to make a final decision. Alternatively if you're satisfied with their expertise and feel comfortable working with the bagpiper, you can ask to move forward with booking them for the date.
|
0.813226 |
"The old Met" redirects here. For the former sports venue in Minnesota, see Metropolitan Stadium.
Sometimes referred to as "the old Met", the Metropolitan Opera House opened on October 22, 1883, with a performance of Faust. It was located at 1411 Broadway, occupying the whole block between West 39th Street and West 40th Street on the west side of the street in the Garment District of Midtown Manhattan. Nicknamed "The Yellow Brick Brewery" for its industrial looking exterior, the original Metropolitan Opera House was designed by J. Cleaveland Cady. On August 27, 1892, the nine-year-old theater was gutted by fire. The 1892−93 season was canceled while the opera house was rebuilt along its original lines. During that season, the Vaudeville Club, which eventually became the Metropolitan Opera Club, was founded and hosted entertainment in the undamaged portions of the house.
In 1903, architects Carrère and Hastings extensively redesigned the interior of the opera house. The familiar golden auditorium with its sunburst chandelier, and curved proscenium inscribed with the names of six composers (Gluck, Mozart, Beethoven, Wagner, Gounod and Verdi), dates from this time. The first of the Met's signature gold damask stage curtains was installed in 1906, completing the look that the old Metropolitan Opera House maintained until its closing.
In 1940, ownership of the opera house shifted from the wealthy families who occupied the theater's boxes to the non-profit Metropolitan Opera Association. At this time the last major change to the auditorium's interior was completed. The second tier of privately held boxes (the "grand tier") was converted into standard row seating. This enlarged the seating capacity and left only the first tier of boxes from the "golden horseshoe" of the opera house's origins as a showplace for New York society.
The Met had a seating capacity of 3,625 with 224 standing room places.
While the theater was noted for its excellent acoustics and elegant interior, as early as the 1900s the backstage facilities were deemed to be severely inadequate for a large opera company. Scenery and sets were a regular sight leaning against the building exterior on 39th Street where crews had to shift them between performances. Various plans were put forward over the years to build a new home for the company and designs for new opera houses were created by various architects including Joseph Urban. Proposed new locations included Columbus Circle and what is now Rockefeller Center, but none of these plans came to fruition. Only with the development of Lincoln Center on New York's Upper West Side did the Met finally have the opportunity to build a modern opera house.
The Metropolitan Opera said goodbye to its old house on April 16, 1966, with a sentimental gala farewell performance featuring nearly all of the company's current leading artists. Long-time Met star soprano Zinka Milanov made her last Met appearance that night, and among the many invited guests was soprano Anna Case, who had made her debut at the house in 1909. The final performance at the opera house was given not by the Met, but by the Bolshoi Ballet, which concluded a short run of appearances on May 8, 1966. The theater was purchased by Jack D. Weiler and despite a campaign to preserve the theater, it failed to obtain landmark status and the old Met was razed in 1967. It was replaced by a 40-story office tower, 1411 Broadway, intended to provide a steady income for the opera company. Designed by Irwin S. Chanin and completed in 1970, the building was later sold by the Metropolitan Opera and today it is owned by 1411 TrizecHahn-Swig LLC, a partnership of the TrizecHahn and Swig real estate companies. Since 1966, the Metropolitan Opera House at Lincoln Center has been home to the Metropolitan Opera.
^ "Millionaire Began as a Realty Clerk". The Pittsburgh Press. February 18, 1986. p. A4.
This page is based on the Wikipedia article Metropolitan Opera House (39th Street); it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA.
|
0.998462 |
Format the selected range of cells from the current sheet as a table (with the first row formatted as a header).
As the first row is always formatted as a table header, you need to select at least two rows for the table to be formed correctly.
sRange string The range of cells from the current sheet which will be formatted as a table.
|
0.955593 |
what is your war gaming favorites in the pc game?
Battlefield and Modern Warfare are the best war related game series. I have played all games in both series and all of them are really great.
These games are very best and have the complete thriller of war.
Battlefield3 and Gears of War are my best and most favorite war games which can play anyone. It's background sound and graphic are very impressive. They both war games are simple and interesting.
|
0.916175 |
What are the main benefits of Capsugel® XPress-Fit® and Press-Fit® technologies?
Capsugel®’s proprietary Press-Fit® and XPress-Fit® gelcap technology is difficult to mimic and enables brands to create a new look for their product with minimal effort and without having to reformulate. The result is a product that stands out to consumers and may help generate increased sales.
|
0.980199 |
Who said that the price of football is prohibitive for the average working man?
By chance,eighteen minutes before kick off to be precise, I found out that Pools' second string had a match against Rotherham at Bedford Terrace, Billingham, which is but a ten minute ride away.
Initially I thought that there was a big crowd in attendance as I was unable to gain access to the Billingham car park due to the amount of automobiles crammed in there. It turns out that the cars in question belonged to the players and officials.
I presented my season ticket at the turnstile, which gains the holder free admission, not to mention a gratis team sheet, and I took my place in the main stand, which was in fact the only stand, just as both teams came out. Pools fielded a strong side, eight of whom had first team experience, and collectively they had a fair few league miles on their clocks. Also in the side were three trialists.
I cannot say that I was familiar with any of the Rotherham players but none the less they had some class names in their line up: Fabian Bailey, Bradley Peace- McDonald, Darnelle Bailey- King and a Laurence Bilboe who to my mind with names like these they should have been playing polo and not football don't you know. Also in their ranks they had such Christian/First names as J'Cee, Brandon, Alaster and Trae. Interestingly, there was not one James, John, Tom, Peter, Paul Ian or Joe represented in squad on the day. Where have all the proper boys names gone? The closest we got was that of Billy (Paynter) and Dan (Jones/Smalley). I guess as a certain Mr Dylan once famously said 'The times they are a-changing'.
When you look back at the names of the footballers who played in the fifties they all had names that my football generation of the seventies were not familiar with either, such as Albert, Arthur, Cliff, Dougie Stan, Len, Jackie Ted, Hertbert and the like. I also seem to recollect that most of the players with names such as these always seemed to play for the middling Lancashire clubs ...or should that now read as Greater Manchester!
From the offset Pools dominated the game. Bingham, who had come on as a sub the previous night and scored at Accrington, was very lively as was Paynter, both of whom got first half goals. Paynter despite his long lay off looked fit and it is only a matter of time as to when he will be back on first team duty. Half time, two nil to Pools. Thankfully there was only a ten minute interval as it was bloody cold sat in that stand, plus the ski socks that I had purchased from Aldi the day before had failed miserably, as frost bite had set in after a mere twenty five minutes. (I think these socks were designed for skiing in Dubai).
Second half: a good save from the Millers keeper denied Connor Smith a hat trick. Why he is not involved with the first team is beyond me. Looks lively and has got pace. Adam Bartlett had only one real save to make during the half ...well, the whole game really, and was very vocal throughout. Two things stood out for me during the match: one was the way Pools played which was totally different from their League Two style. They say that in a club whether it be the first/second or youth team that they should all play to the same system so if someone from the reserves progresses to the first team they should slip into the system seamlessly. This did not appear to be the case against Rotherham.
The manner of play was light years away from what we normally witness from the first team. Surprisingly for most of the match the ball was kept on the grass and played to feet instead of being lumped up into the air. There was none of this head tennis from defenders that we see week in week out home and away. It was almost like 'watching football' I was also very surprised at how much space each team had. In some instances it was like, and don't laugh, watching Premiership football. Players carrying the ball and very tappy tappy with nothing like the amount of tackles going in that we see in Division Two.
Secondly, and again please don't laugh, it was well worth the entrance money alone, that I did not have to pay, just to watch Brad Walker's performance. Imperious is not too strong a word to describe his midfield display. Never lost the ball. Totally dominated the midfield, had plenty of time on the ball, superb range of passes, silky skills, made two goals and had one disallowed himself, not to mention making a few decent tackles. To be brutally honest he was a joy to watch. If a visiting manager was casting his eyes over him they would have put in an offer for him before he reached the shower. I think the reason why Walker does not perform as well in the first team is that whilst he can get away with it at reserve level, mainly because of the space that he was allowed, he hardly breaks into a trot let alone a canter at best. Think Ya Ya Toure and Alex Song of Man City and West Ham respectively, both players who are similar in style and are great passers but not the paciest, however they do have other players in their ranks who do their running on their behalf.
Unfortunately at Pools we have no pacy midfielders (ironically Brad Walker might be the quickest of them all) to do Walker's running for him, only passers. I was surprised when Wolves had him on trial recently, perhaps they see something in him that the average Pools fans/management don't. It was noticeable to all when Walker started to warm up in front of the Cyril Knowles against Exeter on Saturday that he was wearing orange boots. Pools want £50k for him. If the deal goes through it will be good business for all parties involved. Would keep the Wolves from the door if nothing else.
A goodly number of Football / Rugby clubs, excluding Pools, provide the armed forces with complimentary tickets for games throughout the season. My son, who is with the RAF, managed to secure tickets for the Sunderland - Bournemouth clash ...on the proviso that the RAF do not drop smart bombs on the Stadium of Light in the near future. No danger of that happening there as they look like imploding in on themselves in any event.
My son was apologetic that it was not a more attractive fixture that we were going to see. "On the contrary" I said "It will be a dog eat dog match with both sides going for a win". Besides, the best three teams that I have seen at the Vic in recent years, in no particular order, have been Bournemouth, Bournemouth and Bournemouth. They always try to play football the right way and what they have achieved both on and off the pitch is nothing short of a remarkable, for which they deserve every credit.
"he was a joy to watch. If a visiting manager was casting his eyes over him they would have put in an offer for him before he reached the shower"
Sunderland's next home game is against Man City which, if it is anything like last season's corresponding fixture, will be like a turkey shoot. I can envisage the Mackems having eleven men behind the ball as is Sam Allardyce's modus operandi. Once City's first goal goes in it will be all one way traffic and and it is not something I want to sit through as a neutral to watch a one sided match. Give me the Bournemouth fixture any day.
Rather than pay the inflated prices within the stadium we picked up a couple of hot drinks from a burger van outside the ground which we supped on the exact spot (near the Bob Stokoe statue) that the miners' picket line was on during the infamous strike in 1984/5. Funny - all the years in the seventies/eighties that I have crossed the Wearmouth Bridge on my way to Roker Park, or a concert or bowling, I did not know of the existence of a colliery below. Perhaps it was due to the fact I used to walk on the east side of the bridge and look over at the shipyards. Sadly ships and coal are no more.
Despite the fact that we did not have crampons karabiners ice picks and ropes and other various climbing equipment we took our seats at the very top of the stand. Our seats were at the top of the very last row and I swear if I stood on my seat I could have touched the stand roof. We were just behind the goal near the corner flag but despite our lofty position we still had a good view. Prior to the kick-off we clubbed together and had a £1 bet on Defoe grabbing a hat trick. For all he contributed he might as well have gone home.and played tricks with his hat.
First five minutes were cagey with Bournemouth lobbing in a few long balls. Son reminds me that I told him Bournemouth were a footballing side. He had not got the words out of his mouth when Bournemouth turned on the style. One nil up in twelve minutes and kept Sunderland pinned in their own half for pretty much the full 45 minutes and playing some delightful football. How Sunderland got an equaliser on the stroke of half time still remains a mystery to me. It has to be said that even before Bournemouth scored the best part of 41,000 fans were on the home team's backs (and forwards as well as midfielders!). At least at 'Pools we have a bit more patience than the Mackems. It is little wonder their players confidence is shot.
Second half Sunderland upped their game a bit and did stray into the Bournemouth half on the odd occasion. In the last ten minutes John O'Shea pushed up, obviously on his own bat, to assist the forwards. Big Sam went apoplectic, we could hear him eighty yards away screaming at his centre half whilst whirling his arms around like an out of control windmill for him to get back into defence. Big Sam was happy with a point and saw the draw as a point gained rather than two lost.
Seven or eight minutes before the whistle went, we made our exit and made a dash for the park and ride, and were back home at 17.25 GMT. I can't afford Sky TV, either monetary-wise or principle-wise. However Son, who is a whizz with technology, rigged up my laptop and next thing you know we are watching live via the TV,courtesy of some American station,The Happy Hammers playing Man City. Another freebie. All in all total spent, excluding fuel, for these two games tallied up to £3.50 which covered our hot drinks and £1 bet. Who said Football is an expensive game for the fans to watch?
In summary,the Sunderland game was a funny one for me as I have a long-standing bet that big Sam will keep them up. On the other hand I would not like to see Bournemouth get relegated either, as, in a sense they are one of ours. A fourth division side made good. Based on their performance against Bourmemouth, unless Sunderland bring in some decent signings they are certainties for the drop. They are woeful. My hope is that if Borer get to the Premiership, Sunderland and Newcastle drop down to the Championship. On the flip side if Borer fail to achieve promotion I would like to see our North East neighbours avoid the drop. Call me mean spirited or what?
I had to laugh out loud about the worldwide coverage and shame that woman from Darlington has heaped on her town by defending her right to bring her children to school whilst wearing her PJ'S. (just record the Jeremy Kyle show or watch it on catch up luv). This got me thinking. It is well documented about how at the end of each season 'Poolies don fancy dress outfits for their last away game of the season. Not only is it an eagerly awaited event not only by those who partake but by the rest of the country/world to see what this year's fancy dress theme will be. The publicity it brings to the town is second to none ...well perhaps second only to John Darwin.
Now that Darlington FC no longer exist the only joy these days when the fixture list first comes out is to see: 1) Are we at home on Boxing day 2) Are we at home at Easter 3) Where will our last away match be for the fancy dress outing.
This year number three was a major disappointment - it could not be any further away. Plymouth. As such I am guessing that there will only be a few dozen Poolies making the journey to the south west. As an alternative I think that Pools fans should take in Darlington 1066's last away game at Rushall Olympic and go in dressed up in our Jim Jams The only problem I can see with this is that the Darlow fans will probably be wearing pyjamas as a matter of course as their normal attire so some of the impact might get lost and we might get mixed up and be classed as Darloids.
Afterthought. I have just found out that Rushall Olympic are based in Walsall which is half way to Plymouth, so we might as well crack on to the south coast in our own nightwear.
On a more serious note, today I was shocked to see a woman in her sixties in Tesco Hartlepool wearing pyjamas at two o clock in the afternoon, not in the store itself but filling up with fuel on the forecourt. Normally I would have something sarcastic to say but I was actually left speechless.
I hope and pray she was on her way back home to Darlington.
|
0.997601 |
Why is there an eyeball on jewelry?
That is what is known as a Wedjat-eye, which is worn as a protective symbol. Also sometimes referred to the Eye of Horus, they are symbols of the restoration of wholeness.
|
0.999999 |
In this step, consider the following key points in your web prototype.
Avoid blinking or moving text: Avoid using the information which starts automatically and only lasts for 5 secs or have other parallel content. People with cognitive and learning impairments need more time to understand the information.
Suppress blinking: Provide options to suppress blinking, flickering and flashing.
Provide options to pause, stop the information: Carousel should have stop and play option so that people with cognitive and learning impairments can stop the screen and read the information.
Give commands for special characters and short keys: Try to provide special characters and short keys options for your application. It would be helpful for people who cannot use mouse.
More time for a task to complete: People with cognitive and learning impairments need more time to understand the information.
Visible indicator: Provide visible indicator of current focus either using different color or a rectangle box or any other indicator.
Use Alt Text: Make sure the code is having alt text for all images on the page.
Support keyboard interaction: A user should navigate the application using keyboard only.
Support customization through the browser: There should be customization like resize text possible through the browser.
Provide Low or no background Audio.
|
0.999993 |
How does traveling affect your life?
There are many different types of people out there, some like to travel, while others prefer to stay nice and cozy at home. It’s all nice and dandy, but hwat about all the research that suggests that in general, people who travel at least twice a year are happier than those who do not.
In my opinion it’s a clear indication that we, as humans need to travel and explore, even if that means to drive outta town for a weekend. Travelling doesn’t have to be long distance, and with out busy lives, it’s no wonder getaways are becoming more and more popular.
|
0.999999 |
This article is about the men's team. For the women's team, see Bosnia and Herzegovina women's national football team.
The Bosnia and Herzegovina national football team represents Bosnia and Herzegovina in association football and is governed by the Football Association of Bosnia and Herzegovina. Until 1992, Bosnian footballers played for Yugoslavia.
Bosnia and Herzegovina achieved their best result when they reached the 2014 FIFA World Cup as winners of their qualifying group. They were eliminated after group stage narrow losses to Argentina and Nigeria and a win over Iran.
The team has appeared in numerous other qualification play-offs, in 2010 FIFA World Cup play-offs loss to Portugal, as well as qualifying play-offs for UEFA Euro 2012 and UEFA Euro 2016, losing to Portugal and Republic of Ireland respectively, preventing the team from reaching their first UEFA European Championship.
Its' two home stadiums are Grbavica (Sarajevo) and Bilino Polje (Zenica). The team's highest FIFA World Ranking was 13th, achieved in August 2013.
Bosnia and Herzegovina have seen a steady rise in their fortunes on the international football stage in recent times. Historically, Bosnia, a war torn and divided nation, has managed multiple playoff appearances and has qualified to one FIFA World Cup. More often than not, the team produces solid results in qualifiers and challenges for a top spot.
From 1920 to 1992, the players lined out for Yugoslavia, but following the outbreak of the Bosnian war and subsequent independence, a new football nation arose from the ashes.
The early period saw Bosnia and Herzegovina have to wait until the 1998 FIFA World Cup qualifiers to compete for a place in a major competition. Bosnia finished fourth in a group that included Greece, Denmark, Croatia and Slovenia. This was then subsequently followed by further disappointment with lackluster campaigns in the UEFA Euro 2000 qualifiers, as well as the 2002 FIFA World Cup.
This early period was followed by Bosnia coming very close to qualifying directly for their first ever major competition, UEFA Euro 2004, narrowly missing out by a single goal against Denmark.
Bosnia failed to make the grade in the 2006 FIFA World Cup qualifiers, despite being unbeaten at home, and the UEFA Euro 2008 qualifiers, which saw their poor home form cost them. Bosnia and Herzegovina then experienced double heartbreak, bowing out twice in the playoffs to Portugal, first 2–0 on aggregate in the 2010 FIFA World Cup decider and then 6–2 on aggregate in the UEFA Euro 2012 decider.
Bosnia and Herzegovina qualified for the 2014 FIFA World Cup, hosted by Brazil, in October 2013 by beating Lithuania, finally breaking their curse and participating in a major tournament.
Bosnian squad at their first ever FIFA World Cup game. (coach: Safet Sušić).
They managed to finish third in a group which included Argentina, and tasted their first victory thanks to a 3–1 win over Iran. Nigeria pipped Bosnia for second place in the group with a 1–0 win marred with controversy following an incorrectly disallowed goal scored by Edin Džeko in the first half.
Bosnia finished third in the UEFA Euro 2016 qualifiers behind Belgium and Wales. After making an unfortunate start to the qualifiers with a surprise 2–1 home defeat against Cyprus and managing just two points through four games, manager Safet Sušić was dismissed and replaced by Mehmed Baždarević.
After the slow start, the Bosnian performance improved dramatically, with five wins in their remaining six matches, including victories over Wales and Israel along with three clean sheets. However, they ultimately failed to qualify after a two legged playoff encounter with Ireland. Bosnia failed to make back-to-back FIFA World Cups after failing to qualify to the 2018 FIFA World Cup.
The following players were called up for Euro 2020 qualifying games against Armenia on 23 March and against Greece on 26 March 2019.
Caps and goals correct as of 26 March 2019 after the game against Greece.
INJ Withdrawn due to injury.
U21 Called-up to U21 squad.
Euro 1996 – Could not enter as the national team was not yet a member of UEFA.
Table does not include results of minor tournaments (reserve players) managed by Husnija Arapović.
Due to one match suspension of Mehmed Baždarević for unsportsmanlike behaviour, assistant manager Dragan Perić took charge of the team on 25 March 2017.
Tables correct as of match played on 26 March 2019.
Emir Spahić captained Bosnia at their first ever FIFA World Cup tournament. This is a list of Bosnia and Herzegovina captains for ten or more official and friendly matches.
Note: Some of the other players to have captained the team include: Mehmed Baždarević (2 caps) 1996, Meho Kodro (5) 1997 to 1998, Vlatko Glavaš (1) 1997, Suvad Katana (2) 1998, Elvir Bolić (6) 1999 to 2000, Bruno Akrapović (4) 1999 to 2003, Hasan Salihamidžić (1) 2004, Zlatan Bajramović (1) 2006, Džemal Berberović (1) 2007, Asmir Begović (5) 2014 to 2017, Haris Medunjanin (4) 2016 to 2018, Vedad Ibišević (1) 2017.
Table correct as of match played on 26 March 2019.
FIFA-ranking yearly averages for Bosnia and Herzegovina.
Their average position since FIFA World Ranking creation is 58.
The Bosnian national team has more recently begun to use Stadion Grbavica, located in Sarajevo, for its' home games, following a renovation in 2018.
The second of the two main stadiums of the national football team of Bosnia and Herzegovina is Bilino Polje, located in the city of Zenica. The stadium was built and opened in 1972, and is used to host matches of a more intimate atmosphere.
On 10 August 2012, the Bosnian Association and the local government of City of Zenica financed the replacement of the old grass surface at the Bilino Polje Stadium.
Another stadium Bosnia has used is City Stadium Koševo, also known as Olympic Stadium Koševo, for some of its' games.
Its' training ground for domestic matches is the N/FSBIH Training Center in Zenica, which was opened in 2013 in conjunction with UEFA.
A popular nickname of all Bosnian sport teams and/or sportsman is "Zmajevi" (Bosnian: zmajevi, lit. 'dragons'), popularized by football TV commentator Marijan Mijailović during Belgium vs. Bosnia (2-4) 2010 WC qualification game on 28 March 2009.
General agreement among Bosnia and Herzegovina sports fans is that nick has historical context, it is considered as an allusion to the famous Bosnian general Husein Gradaščević, who fought for Bosnian independence, and who was known as the "Dragon of Bosnia".
In both local and foreign media, they are sometimes referred to as the Golden Lilies, which was original nickname given to all country's teams and sportsman by fans after independence in reference to official state insignia at the time (flag and coat of arms), which itself referred to the Fleur-de-lis historical state insignia, featured on the coat of arms of the ruling Bosnian medieval Kotromanić dynasty.
The team kit is currently produced by German sports apparel company Adidas. Also sponsoring the team are BH Telecom and Elektroprivreda Bosne i Hercegovine, companies from Sarajevo.
Bosnian fans supporting the national team.
A large number of national team's supporters come from Northern and Western Europe, North America, and some from as far away as Australia. Most of these fans are members of BHFanaticos, Belaj Boys, BHLegion, Armija Zmajeva (Dragons Army) and Ljuti Krajišnici groups.
In the game against Norway, at the Ullevål Stadium in Oslo on 24 March 2007, Bosnian fans caused an hour-long delay due to an unprecedented amount of flares that had been thrown onto the pitch in protest against corruption in the (now former) Football Federation of Bosnia. On 1 June 2008, former Bosnia and Herzegovina players Meho Kodro and Elvir Bolić organised a friendly humanitarian game in Sarajevo called "Kodro, Bola and Friends" between former Bosnian football legends, in order to gain support, to say its time for changes in the Bosnian Football Association. The game was organised to commence at the same time as Bosnia and Herzegovina national side faced Azerbaijan in a friendly in Zenica. The attendance in Sarajevo was 15,000 while in Zenica only about 50. The game in Sarajevo was organised by the Federal TV who broadcast the humanitarian game live. A significant number of Bosnian International players were involved in the game, which ended 11–9 in favour of Team Kodro.
Before every game, during the playing of the Bosnian national anthem, BH Fanaticos sing lyrics from the old national anthem Jedna si jedina, as the current national anthem does not have lyrics in all international sports Bosnia is part of (mainly football, basketball and handball).
The table lists opponents played, sorted by members of FIFA affiliated confederations.
Turkey 3 – 2 Edin Džeko's debut senior cap and first international goal.
^ radiofarda.com (28 May 2014). "تاریخ فوتبال بوسنی و هرزگوین از تهران آغاز شد". radiofarda.com. Retrieved 4 April 2015.
^ wildstat.com (4 April 2015). "Friendly internationals, Bosnia-Herzegovina". wildstat.com. Retrieved 4 April 2015.
^ wildstat.com (4 April 2015). "Friendly internationals, Iran". wildstat.com. Retrieved 4 April 2015.
^ Jonathan Wilson (1 May 2014). "Despite its inescapable past, Bosnia-Herzegovina writes new chapter". sportsillustrated.cnn.com.
^ "San ispunjen: Bosna i Hercegovina na Svjetskom prvenstvu!". sportsport.ba (in Bosnian). 15 October 2013. Retrieved 2 June 2018.
^ "Povijesni bodovi na Mundijalu: Pobjeda nad Iranom za kraj". sportsport.ba (in Bosnian). 25 June 2014. Retrieved 12 November 2018.
^ "Tako blizu, a tako daleko". sportsport.ba (in Bosnian). 18 November 2009. Retrieved 12 November 2018.
^ "Evropsko prvenstvo, ipak, samo pusti san". sportsport.ba (in Bosnian). 15 November 2011. Retrieved 12 November 2018.
^ "Adieu la France: Pali smo u Dublinu bez ispaljenog metka". sportsport.ba (in Bosnian). 16 November 2015. Retrieved 12 November 2018.
^ "Historijski rezultat: Zmajevi 13. na FIFA-inoj rang listi". klix.ba (in Bosnian). 8 August 2013. Retrieved 12 November 2018.
^ Al Jazeera Balkans (15 June 2014). "Naša brazilska priča (Our Brazil Story)". Sabahudin Topalbećirević (in Bosnian). Retrieved 18 June 2014.
^ Uefa.com (12 October 2003). "Denmark do just enough". UEFA. Retrieved 12 October 2003.
^ uefa (8 June 2005). "Spain – Bosnia-Herzegovina Match Report WC Q 2006". Archived from the original on 12 December 2013.
^ fifa.com (16 October 2012). "First-half flurry sees Bosnia-Herzegovina cruise". fifa.com. Retrieved 16 October 2012.
^ "Bosnia-herzegovina qualifies for first world cup". Goal.com. 15 October 2013. Retrieved 16 October 2013.
^ "Veliko slavlje nakon istorijskog uspjeha: Fudbaleri BiH idu u Brazil". slobodnaevropa.org (in Bosnian). 16 October 2013. Retrieved 11 November 2013.
^ "BiH će 2014. godinu pamtiti po historijskom nastupu na Svjetskom prvenstvu". bih.ba (in Bosnian). 30 December 2014. Retrieved 12 November 2018.
^ "Tuga među reprezentativcima BiH: Poništen nam je čist gol, oprostiti se časno od SP". bih.ba (in Bosnian). 22 June 2014. Retrieved 9 November 2018.
^ Chris Greenberg (21 June 2014). "Bosnia-Herzegovina Robbed Of Goal By Offside Call In Loss To Nigeria, Eliminated At World Cup". huffingtonpost.com. Retrieved 21 June 2014.
^ Joe Bernstein (25 June 2014). "Nigeria 1–0 Bosnia-Herzegovina: Peter Odemwingie scores only goal as Edin Dzeko and Co crash out of World Cup". dailymail.co.uk.
^ Jack Davies (17 November 2014). "Susic sacked by Bosnia-Herzegovina". goal.com. Retrieved 17 November 2014.
^ Maja Zuvela (17 November 2014). "Bosnia sack coach Susic after Israel fiasco". uk.reuters.com. Retrieved 17 November 2014.
^ "Fixture List – Centralised friendlies" (PDF). uefa.com. 28 July 2017. Retrieved 5 October 2017.
^ uefa.com (16 November 2015). "Walters double takes Ireland to UEFA EURO 2016". Retrieved 16 November 2015.
^ eurosport.com (16 November 2015). "Walters strikes twice to send jubilant Ireland to Euro 2016". Retrieved 16 November 2015.
^ "Prosinečki i Marinović objavili spiskove igrača". nfsbih.ba (in Bosnian). 11 March 2019. Retrieved 12 March 2019.
^ "Suspendovan Mehmed Baždarević!". sportsport.ba (in Bosnian). 25 December 2016. Retrieved 27 September 2017.
^ "Prvi put u historiji zmajeve će voditi stranac: Stéphane Gilli šef protiv Gibraltara". avaz.ba (in Bosnian). 15 March 2017. Archived from the original on 9 June 2017. Retrieved 2 October 2017.
^ "FIFA-ranking yearly averages for Bosnia and Herzegovina". fifa.com. Retrieved 16 November 2018.
^ "Od ruševine do novog doma reprezentacije BiH" (in Bosnian). sportsport.ba. 5 September 2017. Retrieved 9 October 2016.
^ "BiH dočekuje Belgiju na Grbavici!" (in Bosnian). oslobodjenje.ba. 4 September 2017. Retrieved 9 October 2017.
^ "Portuguese FA director laments pitch condition of Bosnia & Herzegovina Euro 2012 play-off match". goal.com. 8 November 2011. Retrieved 12 December 2012.
^ "Cristiano Ronaldo angry at Bilino Polje surface qualifty in 2011". youtube.com (in Bosnian). 11 November 2011. Retrieved 14 January 2013.
^ "Grass surface replacement Bilino Polje". vimeo.com. 7 August 2012. Retrieved 3 September 2013.
^ "Počela ugradnja travnate površine na Bilino polje" (in Bosnian). sportsport.ba. 7 August 2012. Retrieved 9 September 2012.
^ "Postavljena trava na Bilinom Polju" (in Bosnian). sportsport.ba. 10 August 2012.
^ "Michel Platini otvorio Trening centar NSBiH u Zenici vrijedan 10 miliona KM!" (in Bosnian). klix.ba. 2 September 2013. Retrieved 28 March 2016.
^ "BH Dragons" (website). USA: bhdragons.com. Retrieved 19 January 2014.
^ "Golden Lilies blossoming". FIFA.com. 9 April 2009. Archived from the original on 12 April 2009. Retrieved 10 October 2009.
^ nezavisne.com (17 November 2009). "Bh. telekom zlatni sponzor". nezavisne.com (in Bosnian). Retrieved 30 March 2012.
^ bihsoccer.com (12 November 2006). "Reprezentacija Bosne i Hercegovine". bihsoccer.com (in Bosnian). Archived from the original on 15 July 2012. Retrieved 8 December 2012.
^ a b c d bhdragons.com (21 December 2013). "The History of the Bosnian National Jersey". bhdragons.com. Retrieved 21 December 2013.
^ adidas.com (21 March 2014). "adidas to partner Bosnia and Herzegovina ahead of 2014 FIFA World Cup Brazil™". adidas.com. Retrieved 21 March 2014.
^ BHFProduction (2 October 2010). "BHFanaticos–Gdje Ti Igraš Tu Smo Mi". YouTube. Retrieved 2 October 2010.
^ Albin I. (22 March 2013). "Bosnian fans from Australia (Bosnia–Greece 3:1)". facebook.com. Retrieved 22 March 2013.
^ Vic (28 March 2013). "Bosnia Fans Make the Most of Being Stuck on a Bridge". sportige.com. Retrieved 28 March 2013.
^ Emin D (22 March 2013). "BHLegion fans go to Bilino". zenicablog.com. Archived from the original on 25 March 2013. Retrieved 22 March 2013.
^ Emin D (22 March 2013). "BHFanaticos fans go to Bilino". zenicablog.com. Archived from the original on 25 March 2013. Retrieved 22 March 2013.
^ Rosenborg Trondheim (24 March 2007). "Bosnian supporters–protest including pyro (Norway Bosnia)". YouTube. Retrieved 27 March 2006.
^ Brza zmija (1 June 2008). "Fotogalerija: Kodro, Bola i prijatelji". SportSport.ba (in Bosnian). Retrieved 1 June 2008.
^ Statler (1 June 2008). "BiH–Azerbejdzan". SportSport.ba (in Bosnian). Retrieved 1 June 2008.
^ I. Babic (25 May 2008). "Svi na Kosevo–Spasimo bh fudbal". SportSport.ba (in Bosnian). Retrieved 25 May 2008.
^ Statler (1 June 2008). "Live–Spektakl na Kosevu". SportSport.ba (in Bosnian). Retrieved 1 June 2008.
^ BHFProduction (14 June 2008). "Skenderija pjeva, Jedna si jedina". YouTube. Retrieved 14 June 2006.
^ Ministry of Justice of Bosnia and Herzegovina (4 June 2010). "Proposal of the Text for the National Hymn of BiH Adopted by the Council of Ministers of BiH". Archived from the original on 22 June 2009. Retrieved 10 May 2010.
^ "FIFA Men's Ranking 23 October 1996". FIFA.com. 1996.
^ "FIFA Men's Ranking 20 August 1997". FIFA.com. 1997.
^ "FIFA Men's Ranking 14 March 2013". FIFA.com. 2013.
^ "FIFA Men's Ranking 1 October 2015". FIFA.com. 2015.
^ "FIFA Men's Ranking 3 March 2016". FIFA.com. 2016.
Wikimedia Commons has media related to Bosnia and Herzegovina national association football team.
|
0.999997 |
The lead organization is a Black organization*.
If the lead is not a Black organization, the majority of collaborative members must be Black organizations. Where the lead is not a Black organization, the lead must explain this decision and describe how the collaborative aims to include Black leadership in the design, delivery, and decision-making of the initiative.
Black youth are clearly central to the design and delivery of the initiative. They also play a key role in decision-making.
Initiative is designed explicitly for Black youth with significant input from Black youth.
The collaborative is committed to centering, honouring, and elevating Black culture, histories, narratives, futures, and prioritizes healing.
The collaborative has connections, relationships, trust, and acceptance in the communities in which they work.
The collaborative aims to challenge and transform the status quo through systems change; end anti-Black racism and systemic oppression of Black people; create opportunities for Black youth to be their full selves; and build power and put decision-making in the hands of Black communities.
The lead organization is an Indigenous organization*.
Indigenous youth are clearly central to the design and delivery of the initiative. They also play a key role in decision-making.
Initiative is designed explicitly for Indigenous youth with significant input from Indigenous youth.
Initiative is rooted in Indigenous history and values, and is reflective of Indigenous cultures, narratives, worldviews, traditions, spirituality, and centering Indigenous histories, healing, and futures.
Collaborative aims to challenge and transform the status quo through systems change; end oppression against Indigenous people; create opportunities for Indigenous youth to be their full selves; and build power and put decision making in the hands of Indigenous communities.
|
0.992729 |
Electro (short for either electro-funk or electro-boogie) is a genre of electronic dance music directly influenced by the use of TR-808 drum machines, Moog keytar synthesizers and funk sampling. Records in the genre typically feature drum machines and heavy electronic sounding deprived of vocals in general, although if present, they are delivered in a deadpan manner, often through an electronic distortion such as vocoding. This is the main distinction of electro from previously prominent late-1970s genres such as disco and boogie, in which electronic sound was only part of the instrumentation rather than basis of the whole song.
Bronx, NY based electro funk artist Afrika Bambaataa's "Planet Rock" (1982) is one of the first electro records, using elements of Kraftwerk's Trans-Europe Express and "Numbers" (from Kraftwerk's Computer World album).
In 1983, along came upper Manhattan, NY based Cutting Records' first recording artist Hashim. Hashim, or Jerry Calliste Jr. created the influential electro funk tune "Al-Naafiysh (The Soul)". "Al Naafiysh" became Cutting's first release in November of 1983, and Calliste became the label's vice president (Kellman, 2007)." At the time Hashim was influenced by Man Parrish's "Hip Hop Be Bop", Thomas Dolby's "She Blinded Me With Science" and Afrika Bambaataa's "Planet Rock". "Al-Naafiysh (The Soul)" managed to crossover into the mainstream music markets around the world and is now one of the world's most sought after electro tunes in electro music's history.
Bambaataa and groups like Planet Patrol, Jonzun Crew, Mantronix, Newcleus and Juan Atkins' Detroit-based group Cybotron went on to influence the genres of Detroit techno, ghettotech, breakbeat, drum and bass and electroclash. Early producers in the electro genre (notably Arthur Baker, John Robie, Shep Pettibone, and the Latin Rascals) would feature prominently in the Latin Freestyle (or simply "Freestyle") movement of the early and mid-1980s. Baker and Pettibone would enjoy robust careers well into the house era, and both would elude the "genre trap" to successfully produce mainstream artists.
Los Angeles artists Egyptian Lover and Arabian Prince gave birth to electro-hop a less funky, more bass-heavy West Coast sound, similar to 2 Live Crew and the Miami Bass scene. Other artists in this style include Chris "The Glove" Taylor and World Class Wreckin' Cru.
Detroit also has a unique style sometimes called Techno Bass which is a fusion of Detroit Techno with Miami Bass. On the East Coast electro spawned freestyle, when syncopated rhythms were added to the basic formula. In Miami, a prominent subgenre of Freestyle (best termed "Latin Hip Hop") would emerge as HiNRG and House music elements were thrown into the soup. The most famous example of this style would be studio group Expose, who would eventually be brought to life as a live-singing girl group and would achieve platinum success in the late 1980s with such hits as "Point Of No Return" and "Seasons Change".
Although the early 1980s were electro's heyday in the mainstream, it has enjoyed new popularity in the late 1990s with artists such as Anthony Rother, DMX Krew, Mr Velcro Fastener and Japanese Telecom (Dopplereffekt) and DJs such as Dave Clarke. Some current artists making music in this style have embraced the pseudonyms of Detroit techno pioneers. The renewed interest in electro, though influenced to a great degree by Detroit and New York music, is primarily taking hold elsewhere with electro club nights becoming commonplace again.
A new branch of electro, Skweee, has risen over the last couple of years from Scandinavian countries such as Sweden and Finland, hence its first name "Scandinavian Funk". The outlets and artists of Skweee are still mostly limited to Scandinavia.
Unless indicated otherwise, the text in this article is either based on Wikipedia article "Electro (music)" or another language Wikipedia page thereof used under the terms of the GNU Free Documentation License; or on original research by Jahsonic and friends. See Art and Popular Culture's copyright notice.
This page was last modified 12:23, 5 October 2013.
|
0.954886 |
Kitty Hawk Searching for shipwrecks in the Outer Banks of North Carolina.
Photo 1. One and a half hours into the flight from Richmond, Virginia: the Wright Memorial (at center of circle) and First Flight airstrip running right to left along bottom.
I landed at nearby Dare County Regional Airport (MQI) on Manteo Island (in the sound between the outer banks and the mainland). This is a nice airport with fuel, soda and snack machines, and comfortable couches.
Photo 2. Sun, sand, sound and ocean on the Outer Banks.
Photo 3. About 35 minutes south of Kitty Hawk: the Cape Hatteras lighthouse (barely visible between struts and below cross brace). You can also see where it once stood - closer to the ocean.
Photo 4. A few minutes later: turning final for Billy Mitchell Airport (HSE) in Cape Hatteras (the runway is the smudge visible at center of photo). The beach is a short walk across the runway and over a small dune. The airport has no services but the beach is beautiful and very desolate.
Photo 5. Flying low over a secluded beach somewhere in the outer banks (not within a wildlife refuge!).
Photo 6. A shipwreck in northern Hatteras (visible in right of photo with part of one end just poking above the water). This may be a Civil War steamer called the Oriental.
If you ever look at a map of the shipwrecks in the Outer Banks you will see that they line the entire shoreline in an unbroken string from one end to the other.
N 36 33.612 W 75 52.112 Located in the far northern outer banks (actually into Virginia), past Corolla and Corova (which is accessible by driving on the beach only) and just past the barrier that stops traffic from traveling any farther north. A very complete outline of a large iron ship is visible just beneath the surface. This may be the "Clythia", a 214' long iron-hulled bark that ran aground in 1894 while carrying a load of Italian marble. The marble was salvaged in the 1960's.
N 36 14.940 W 75 46.784 This wreck stuck up above the water. This area is populated by luxury cottages in northern Duck.
N 36 01.885 W 75 39.729 This wreck is right down the runway centerline of First Flight airport. I believe it may actually be two wrecks - the Greek tanker Kyzickes, which foundered in 1927, and the Swedish freighter Carl Gerhard, which came to grief in 1929. These are known locally as the "triangle wreck" because they touch and form a roughly triangular shape.
N 35 47.226 W 75 31.795 This wreck was just north of Oregon Inlet.
N 35 42.939 W 75 29.273 Northern Hatteras island near a parking area. Photo on left. After doing a little research I believe this may be the "Oriental". The Oriental was a Federal iron-hulled screw steamer, lost in 1862 after becoming stranded on a sandbar. The steam engine still sticks up eight feet above the water at low tide! This is amazing when you consider that it's been pounded by the surf for 140 years.
N 35 32.348 W 75 27.837 Further south on Hatteras island.
Finding information on these wrecks was aided by a searchable shipwreck database provided by NOAA http://chartmaker.ncd.noaa.gov/hsd/hsd-3.html.
Here's a nice website with photos of old shipwrecks in the outer banks: http://dragonfantasy.com/OuterBanks/shipwrecks.htm.
Some of the wrecks are so close together that it was difficult to tell which one my GPS coordinates pointed to.
Photo 7. The sun glinting off the lower James River on the return flight.
|
0.976494 |
The traveling salesman problem (TSP) is an NP-hard problem, which has been an interesting problem for a long time in the field of discrete or combinatorial optimization techniques, which are based on linear and non-linear programming. The TSP presents the task of finding an optimum path or route through a set of given locations (cities), such that each location is passed through only once, and the route looped in such a way that it ends at the starting location 1, 2. In Operational Research, TSP problems still remain one of the most challenging problems, which cannot be solved easily by using traditional optimization techniques such as enumeration methods and mathematical programming 3. Solving TSP optimally takes huge computational time and therefore the need for the development of an approximate algorithms or heuristics that gives near optimal solution in a reasonable computational effort 4.
In the last decades, many heuristics based algorithmic strategies were proposed in the quest for finding near-optimum solutions to the TSP problems, among which include tabu search (TS) 5, simulated annealing (SA) 6, genetic algorithm (GA) 7, ant colony optimization (ACO) 8, particle swarm optimization (PSO) 9, artificial immune system (AIS) 10, artificial neural network (ANN) 11, elastic net (EN) 12. All the algorithms listed here draw their inspiration from nature, through the observation of physical processes that occur in nature. They are implemented by mimicking different natural systems and processes using mathematical models and algorithms.
In this paper, the possibility of applying a hybrid symbiotic organisms search (SOS) algorithm with local search simulated annealing (SA) to solve the traveling salesman problem is investigated. The symbiotic organisms search algorithm was first introduced in 12, inspired by the symbiotic relationships strategies, which exist among organisms in the ecosystem. The SOS algorithm was initially proposed to solve continuous engineering optimization problems. Several experimental results from literatures 13-16, which have used SOS algorithm as an optimization tool to find global optimum solutions, indicate that the algorithm shows a considerable robustness in its performance when tested on complex mathematical benchmark problems. Therefore, the potential of SOS in finding global solution to the aforementioned optimization problems makes it attractive for further investigation. In addition, since, SOS has not gained wide recognition in solving discrete problems, such as, routing and assignment problems, we believe that, this could be our motivation to introduce SOS to solve complex discrete problem such as the TSP.
The remainder of this paper is organised as follows: Section 2 presents related works; Section 3 provides a short description of the TSP problem; Section 4 presents the proposed SOS-SA method of solving TSP problem; while Section 5 describes and discusses the simulation results carried out on some benchmarked TSP instances; finally, conclusions and directions for future research are given in Section 6.
|
0.999769 |
Are some breeds more likely to lay away?
The tendency to lay away is not generally breed-specific. Having said that, light breeds that tend to roam, such as Leghorns, Ancona and several of the Game bird breed, may be more likely to find alternative places. But given a good, clean area they will, in most cases, prefer to use the boxes provided.
Getting your hens to lay in the nest box can sometimes be a problem. It is quite common for them to lay elsewhere!
You may not find the eggs at all if they are well hidden … or you may find them so late that they are stale and uneatable – and can smell terrible.
There is no foolproof method, but you can certainly increase the chances that the birds will lay in the right place. Essentially, the nest box has to be place where the hens want to lay their eggs.
Hens that constantly lay away from the nest box may well be doing this for a very good reason – such as an insect infestation in the nest box. Other predators, such as rats, will not generally put the birds off laying but can break and eat eggs, creating an unhealthy environment for the birds.
• The nest boxes need to be in an area that allows both you and your birds easy access.
• They need to be easy to clean (new style plastic boxes are ideal).
• They must be insect-free. Always check the nest box on a regular basis. Look for a greyish dust, a telltale sign of red mite. There are several very good products available to deal with mite, such as Diatom.
• The nest boxes must offer the hens a sense of security, and be somewhere where they feel comfortable.
• Positioning is important. The base should be approximately 2ft above the ground - a suitable height for them to reach without too much effort but hopefully a deterrent to unwanted visitors.
• A darker section of the coop is ideal that is not visible to predators. You can also put a loose cover over the front of the box to make it darker inside, leave a small gap at the side for the hens to get in and out. Sacking or an old towel is ideal.
• There must be enough nest boxes to cover the number of hens - ideally one nest box for every four or five birds.
• Use false eggs, as this will encourage laying in the box. Ceramic, wooden or rubber eggs can be used.
• To encourage egg laying through the autumn and winter, use a timer controlled light to increase the daylight hours; this will help to convince the hens it is still summer.
|
0.999994 |
The Addiction Context: The addiction context consists of the environmental stimuli that were present when the drugs were taken (Uslaner, Crombag, & Robinson, 2007). It is well-known that drug-taking is more rapidly reinstated when the recovering addict is in the drug-taking context (Tsiang, and Janak, 2006). Rapid relapse to drug-taking may be provoked by the experience of abstinence, which may be particularly unpleasant in the presence of stimuli associated with the use of the drug. Heroin addicts, for example, when abstinent in the addiction context, report suffering intense dysphoria. Their bodies are wracked with intolerable pain. For heroin addicts treated in the United States and returned to their homes, relapse rates hover around 90%. Because of the presence of drug-paired contextual stimuli, heroin addicts in the United States typically suffer horrible withdrawal symptoms and this contributes greatly to their tendency to relapse over and over again. The prognosis for most heroin addicts is dismal. Most are doomed to suffer decades of recurring relapses.
A remarkable exception has been documented with United States Military personnel serving in Vietnam (Spiegel, 2015). Based on drug-testing results, approximately 20% of U.S. servicemen in Vietnam were actively addicted to heroin. Upon returning to the United States, these servicemen were expected to require drug rehabilitation services, but the number of soldiers who continued their heroin addiction after they returned to the United States was shockingly low. Over 95% of the soldiers who were addicted in Vietnam did not become re-addicted when they returned to the United States. They reported virtually none of the typical symptoms of heroin withdrawal that have been extensively documented in those who became addicted to heroin in the United States. The obvious suggestion is that heroin addiction and symptoms of withdrawal are specific to the context in which the effects of heroin were experienced.
|
0.999811 |
This article is part of our Buyer's Guide: Investigating Hadoop distributions: Which is right for you?
Examine the key characteristics necessary to evaluate in a Hadoop distribution comparison, focusing on enterprise features, subscription options and deployment models.
For example, a subscription provides technical support and training, as well as access to enterprise features not available to the open source community. While the enterprise editions of vendor Hadoop distributions all provide the core components of the Hadoop ecosystem stack, the key differentiators are what these vendors offer beyond the openly accessible functionality.
Recent changes in the market have thinned the ranks of Hadoop distribution vendors. For example, in 2016, Pivotal Software pulled the plug on its own Hadoop distribution and said it would start reselling the Hortonworks Data Platform (HDP) instead. IBM did the same thing a year later. Then, in 2018, Cloudera Inc. purchased Hortonworks, its former archrival.
But there's still a group of suppliers to consider, including Hadoop specialists Cloudera and MapR Technologies Inc. and the three leading cloud platform providers: AWS, Microsoft and Google. To further complicate things, Cloudera plans to roll out a unified offering that combines features from its own Cloudera Distributed Hadoop (CDH) distribution and HDP in 2019, but said it will also continue to develop and support the two existing platforms at least until the end of 2021.
To determine the right Hadoop provider, a company must be able to perform Hadoop distribution comparisons for specific vendors based on several key characteristics, such as deployment models, enterprise-class features, security and data protection features, and support services.
Note that while the Hadoop big data management ecosystem is engineered to support scalable data storage and high-performance distributed computing, the actual performance may vary for several reasons, including the software implementation. However, many performance issues depend on the planned applications themselves. To address this, buyers should examine how the Hadoop product distributions are targeted to meet the business needs of user organizations.
The Hadoop offerings from AWS, Microsoft and Google deploy solely in cloud environments. AWS uses its Amazon Elastic Compute Cloud, the central part of Amazon's cloud computing platform, and its Simple Storage Service data store to underpin Amazon EMR (Elastic MapReduce), which bundles its Hadoop distribution with the Spark processing engine and various other big data tools and technologies. In addition, Amazon EMR provides the option of using MapR's Hadoop distribution instead of the Amazon distribution.
Microsoft utilizes its Azure cloud infrastructure for HDInsight, a managed service that is currently based on HDP. Likewise, Google offers a managed service on its cloud platform called Google Cloud Dataproc. The service is built around the open source versions of Hadoop and Spark.
The cloud deployment model provides a rapid yet low-effort means of provisioning a Hadoop cluster, and AWS, Microsoft and Google all enable users to resize their environments on demand to handle dynamic computing and storage capacity needs. This elasticity is desirable for organizations with computational and storage needs that may vary over time.
While Cloudera and MapR also offer cloud-based deployments, they aren't limited to that model. These vendors allow users to download distributions that can be deployed on-premises or in private clouds on a variety of servers, including Linux and Windows systems. Cloudera and MapR also provide sandbox versions that can run in a virtual environment such as VMware.
The bottom line: Consider whether the organization prefers to manage its big data environment in-house or use a managed service. In-house management implies oversight and maintenance of the software environment, as well as continuous monitoring of the system, whether that environment is a physical platform on premises or a cluster that runs in the cloud. The on-premises option may be preferable if the company has an experienced IT staff that knows the proper system sizing characteristics or if security concerns warrant managing the system behind a trusted firewall.
The alternative is to use a vendor with a hosted services platform that will help configure, launch, manage and monitor operations. This may be preferable if the organization isn't sure what size system it will need or if it expects the required system size to fluctuate based on changing demand. The benefit of working with a cloud or managed service is that it will provide the necessary elasticity for both storage and processing resources.
Before the merger of Cloudera and Hortonworks, there were some notable differences in the development approaches of those two vendors and MapR that should be factored into a Hadoop distributions comparison.
Cloudera often augmented the Hadoop core with internally developed add-on technologies -- for example, its Impala SQL-on-Hadoop query engine; Cloudera Manager administration tools; and Kudu, an alternative data store to the Hadoop Distributed File System (HDFS) for use in real-time analytics applications. The company eventually open sourced some of those technologies after doing the initial development work itself, but it kept others proprietary.
Hortonworks, on the other hand, touted that it was "innovating 100% of its software in the Apache Hadoop community, [with] no proprietary extensions." Add-on technologies that it was the driving force behind, such as the Atlas data governance framework and Ambari provisioning and management software, were launched as open source projects from the outset. Hortonworks also banded together with IBM and other companies to form a group called the Open Data Platform Initiative (ODPi), an organization devoted to creating a common set of core technical specifications for Hadoop platforms. ODPi members claim that this will improve interoperability and minimize vendor lock-in.
Cloudera hasn't fully clarified how it will harmonize those two approaches. But the company said its unified Cloudera Data Platform (CDP) distribution will be "a 100% open source data platform."
MapR has taken a third path by eschewing some core Hadoop components and developing its own foundational technologies in an effort to support large clusters with enterprise-class performance needs. For example, instead of using HDFS, MapR built a file system that was initially known as MapR-FS and is now the MapR XD Distributed File and Object Store. It also created a NoSQL database, first called MapR-DB and now MapR Database, as an alternative to the HBase system that's tied to Hadoop.
Reflecting a strategic focus on real-time and stream processing applications, the MapR Data Platform also includes an internally developed event streaming technology that was introduced as MapR Streams and is now called the MapR Event Store for Apache Kafka.
From a features standpoint, the enterprise version of Cloudera's existing CDH distribution provides tools for operational management and reporting, as well as supporting business continuity. This includes such items as configuration history and rollbacks, rolling updates and service restarts, and automated disaster recovery. The HDP distribution developed by Hortonworks offers proactive monitoring and maintenance, plus data governance and metadata management tools. The unified CDP offering will blend features from CDH and HDP, with some overlap on functionality to ease migrations, Cloudera said.
MapR's enterprise offering provides tools to better manage and ensure the resiliency and reliability of data in Hadoop clusters, as well as multi-tenancy and high availability capabilities.
While its cloud platform is AWS' primary calling card for Amazon EMR, it also offers tools for monitoring and managing clusters and enabling application and cluster interoperability as part of the Hadoop service.
Amazon EMR collects and utilizes metrics to track progress and measure the health of a cluster. Users gain cluster health metrics through the command-line interface, software developer kits or APIs and can view it through the EMR management console. Additionally, Amazon's CloudWatch monitoring service can be used along with its implementation of the Apache Ganglia performance monitoring component to check the cluster and set alarms on events triggered by these metrics.
Microsoft's Azure HDInsight managed service offers more than 30 Hadoop and Spark applications that the company said can be installed with a single click. The service uses the Azure Log Analytics tool as an interface for monitoring clusters, and it's integrated with various other technologies in the Azure cloud, including Azure Cosmos DB, SQL Data Warehouse, Blob Storage and Data Lake Storage.
Google Cloud Dataproc provides automated cluster deployment, configuration and management, although users can manually configure systems if they prefer. Cloud Dataproc also includes built-in integration with other Google Cloud Platform services, such as Google Cloud Storage and the BigQuery data warehouse.
The bottom line: Choosing a Hadoop vendor that provides value-added components as part of its enterprise subscription may mean committing to a long-term relationship -- especially if these components integrate with its standard stack distribution. If companies are concerned about vendor lock-in, they should consider those vendors that are participating in the OPDi.
Despite the expanding use of open source software for enterprise-class applications, there remain suspicions about its suitability for production use from a security and data protection perspective. However, the Hadoop distribution vendors have taken steps to alleviate some of this anxiety.
For example, before it was acquired by Cloudera, Hortonworks had teamed up with other vendors and customers to launch a Data Governance Initiative for Hadoop, with an initial focus on the Apache Atlas project for managing shared metadata, data classification, auditing and security and policy management for data protection. It also integrated Atlas with Apache Ranger, an open source security tool for enforcing data access policies.
Cloudera provides tools that enable users to manage data security and governance for the CDH platform, supporting an organization's need to meet compliance and regulatory requirements. The company said it plans to build a single stack of security and data governance tools into CDP, but it didn't specify whether that will be based on the CDH stack, the Hortonworks one or a combination of the two.
In addition, Cloudera and MapR provide data encryption. Both CDH and HDP from Cloudera support encryption of data at rest while MapR provides encryption of data transmitted to, from and within a cluster.
Amazon EMR encrypts data at rest and in transit. It also offers identity and access management (IAM) policies to set permissions for individual users and groups in Hadoop systems. In addition, the IAM policies combine with tagging if needed for cluster-by-cluster access control. Other security features include Kerberos authentication and Secure Socket Shell support.
Azure HDInsight includes Enterprise Security Package, a technology bundle designed to help organizations protect their data through the use of Microsoft's Azure Virtual Network service, server-side encryption of data at rest and integration with Azure Active Directory for user authentication. ESP also incorporates Ranger for setting access control policies and searching the audit logs that track access to cluster resources.
Google Cloud Platform's standard security model applies to Cloud Dataproc. That provides a set of authentication, authorization and encryption mechanisms, including IAM permissions and both Secure Sockets Layer and Transport Layer Security encryption. Data can be user encrypted for access by only specified users when a cluster is set up, when the data is in transit to or from a cluster, or when a processing job is submitted.
The bottom line: The Hadoop vendors provide different approaches to authentication, role-based access control, security policy management and data encryption. Buyers should carefully specify security and protection requirements and review how each vendor addresses those needs. Doing a comprehensive Hadoop distribution comparison will help distinguish needs from wants.
The fundamental value proposition for the open source software model is the bundling and simplification of system deployment with support and services. One alternative for deploying Hadoop involves downloading the source code for each component from the open source repository and then building and integrating all the parts together. This takes both skill and effort and is likely to be an iterative process. Open source vendors have already done the heavy lifting, providing preconfigured distributions and maintaining up-to-date integrated stacks.
What differentiates the vendors to a large degree is their support models. For example, Cloudera offers subscriptions with business-day and 24/7 support options for enterprise license holders. In both cases, it promises an initial response within one hour to a total functionality loss on a production system, although support technicians only work on problems from 9 a.m. to 5 p.m. local time Monday to Friday with the 8/5 business-day option. For its 24/7 customers, the company also offers premium support that includes a 15-minute response time on critical issues. Cloudera recommends opening an online support case when technical problems arise, but it said customers can call for help if need be.
All AWS accounts include basic support, which provides 24/7 customer service, access to community forums and documentation, as well as access to the AWS Trusted Advisor application. Developer support includes 12- or 24-hour response times, depending on the severity of the issue, and email access to support engineers during business hours (8 a.m. to 6 p.m. in the customer's country). Business-level support provides 24/7 phone, email and chat access to support engineers as well as shortened response times based on severity. Enterprise-level support adds less than 15-minute response time for critical issues, plus a dedicated technical account manager and a concierge support team.
MapR offers three levels of support. Beyond a free Community Support option that provides a support knowledge base and other information resources, production users can choose between the company's standard support and technical account management support programs. Both include follow-the-sun support and 24/7 phone support with a one-hour initial response time on severe system errors. The TAM service adds a technical account manager to be a single point of contact during a customer's normal business hours, as well as performance and upgrade guidance.
The bottom line: If support services are the source of added value from the vendor, the costs for the different support subscriptions should be aligned with customer expectations. Subscriptions providing one-hour or even 15-minute response times on a 24/7 basis with dedicated support staff will cost a lot more than 24-hour response time from a web-based interface during business hours.
Hadoop and related technologies have transformed the BI, analytics and data management industry since the big data framework was created in 2006. But, as we've examined, the open source Hadoop framework offers only so much, and companies that need more comprehensive performance and functionality capabilities as well as maintenance and support are turning to commercial Hadoop software distributions. Hopefully, this information will help companies make a more informed choice when purchasing a Hadoop distribution.
Which Hadoop distribution product best meets your organization's needs, and why?
Discover the uses of Hadoop distributions and the first steps in evaluating these products, as well as how the merger of rivals Cloudera and Hortonworks affects the market.
Which Hadoop distribution product best meets your organization's needs?
|
0.954008 |
Are your frustrated with the complexity of the Internal Revenue Code and determining what is and is not deductible, who can be claimed as a dependent, what credits are available to you, etc? My firm provides services associated with the preparation of your U.S. Individual Income Tax Return (Form 1040) and associated state tax returns. In addition to the preparation of your Form 1040, my firm's services include projections and quarterly estimates of your federal and state income taxes on an as needed basis. The goal with projections and estimates is to make sure you cover your annual tax liability owed to the federal and state governments while making sure that they are not holding on to too much of your money.
|
0.939082 |
What do Oysters have to do with Rolex?
Rolex was the first company to serially produce a watch that was impervious to day-to-day dust and water. Rolex was able to achieve this feat by patenting a caseback that screwed into the case, a crown that screwed into the case, and a bezel that screwed the then acrylic crystal onto the case. Prior this patent in 1927, watches were vulnerable to simple splashes of water, dust, and other contaminants that would make the oil in watches become less viscous thus reducing timing accuracy and overall reliability of the watch.
Hans Wilsdorf, Rolex’s founder called the watch case an oyster. The term came to Wilsdorf while at a dinner party while trying to pry open an oyster. Rolex Oyster cases requires special tools to open it, not unlike the necessity for special tools at an oyster bar. All Rolex watches, with the exception of the Cellini line, all possess the trademarked and patented Oyster case. Oyster cases are easy to distinguish in a crowd by the bezel that protects the watch crystal where it is pressed onto the case, the bubble caseback that is screwed into the back of the case, and the solid lugs that hold the bracelet to the case. The Oyster watch design is frequently copied yet is it as distinguishable as a Rolex as the five point Rolex crown.
The development of the Oyster case was an important technological improvement to watchmaking. At the time, watches were press-fitted together, a design that was vulnerable to dust and water. Rather than having press fitted crystals, crowns, and casebacks, each one of these components threaded onto a rubber seal preventing water and dust penetration. Additionally, many people believed that wrist watches would not the day-to-day rigors of being on a wrist, unlike a pocket watch that is stored safely in a waist coat. Fortunately, Hans Wilsdorf’s perseverance for a design that would make watches reliable came to fruition.
Soon after Wilsdorf perfected the Oyster case, he had Mercedes Gleitze, a 26 year old typist, wear a Rolex Oyster during her famous English Channel swim. Rather than telling people about the robustness of the Oyster case, Wilsdorf proved it with the English Channel swim. As the Rolex Oyster watch case continued to evolve, it became bigger, included more seals, and now possesses a separate bezel ring for sapphire crystals. Despite the 80 year evolution, Rolex continues to have a successful watch case that is water tight and easy to recognize.
|
0.93931 |
Saint Nestor the Chronicler (1056 – c. 1114, in Kyiv, modern-day Ukraine) was the reputed author of the Primary Chronicle, (the earliest East Slavic chronicle), Life of the Venerable Theodosius of the Kyiv Caves, and Account about the Life and Martyrdom of the Blessed Passion Bearers Boris and Gleb.
In 1073, Nestor became a monk of the Monastery of the Caves in Kyiv. The only other detail of his life that is reliably known is that he was commissioned with two other monks to find the relics of St. Theodosius of Kyiv, a mission which he fulfilled successfully. It is also speculated that he supported the reigning prince Svyatopolk II, and his pro-Scandinavian party disliked Greek influence in Kyiv.
His chronicle begins with the Deluge, as did those of most Christian chroniclers of the time. The compiler appears to have been acquainted with the Byzantine historians; he makes use especially of John Malalas and George Hamartolus. He also likely had other Slavonic language chronicles to compile from, which have since been lost. Many legends are mistakenly attributed to Nestor's Chronicle; the style is occasionally so poetic that perhaps he incorporated bylinas that are now lost.
As an eyewitness, Nestor could only have described the reigns of Vsevolod I and Svyatopolk II (1078–1112), but it is surmised he could have gathered many details from older inhabitants. Two such possibilities are Giurata Rogovich of Novgorod, who could have provided him with information concerning the north of Ruthenia, the Pechora River, and other places, as well as Yan Vyshatich, a nobleman who died in 1106 at the age of ninety. Nestor provided valuable ethnological details of various Slavic tribes.
The current theory about Nestor is that the Chronicle is a patchwork of many fragments of chronicles, and that the name of Nestor was attached to it because he either wrote the majority of it or was responsible for piecing all the fragments together. The name of the hegumen Sylvester is affixed to several of the manuscripts as the author.
St. Nestor died around 1114 and was buried in the Near Caves. He has been glorified (canonized) as a saint by the Russian Orthodox Church. The body of the ancient chronicler may be seen among the relics preserved in the Kyiv Pechersk Lavra. His feast day is celebrated on October 27. He is also commemorated in common with other saints of the Kiev Caves Lavra on September 28 (Synaxis of the Venerable Fathers of the Kiev Caves) and on the Second Sunday of Great Lent.
Web site: Saint Nestor the Chronicler. St. Luke Greek Orthodox Church. 19 March 2017.
Web site: Venerable Nestor the Chronicler of the Kyiv Caves. Orthodox Church in America. 19 March 2017.
This article is licensed under the GNU Free Documentation License. It uses material from the Wikipedia article "Nestor the Chronicler".
|
0.974237 |
Average neighborhood maximum margin (ANMM) is an effective method for feature extraction in appearance-based face recognition. In this paper, we extend ANMM to locality preserving average neighborhood margin maximization (LPANMM) in order to maintain the local structure on the original data manifold in the discriminant feature space. We also combine LPANMM with extreme learning machine (ELM) as a new scheme for face recognition, we train the single-hidden layer feedforward neural network (SLFN) in the ELM classifier with the discriminant features that are extracted by LPANMM, then we use the trained ELM classifer to classify the test data. In the process of training SLFN, ELM can not only achieve the smallest training error in theory, but is also not sensitive to the initial value selection of the parameters for the SLFN. Experimental results on ORL, Yale, CMU PIE and FERET face databases demonstrate the scheme LPANMM/ELM can achieve better performance than ANMM and other traditional schemes for face recognition.
|
0.925098 |
The role of parents in their kids learning cannot be ignored. Parents have got a huge role to play to improve their kids learning when they are at home and they should always motivate their kids to learn better. A lot of people parents believe that they don't want to involve in the studies of their kids and their kids are able to learn themselves. It is a bad thinking because kids always require a push from their parents and if they don't get the push from their parents at home, they will become lazy to study. So, parents should involve in their kids learning in order to bring out the best from their kids.
Parental involvement can result in better academic performance of their kids. A lot of parents consider that their involvement is not imperative in the child's education given that they are going to a top school in their country or state. Whether your kids are going to a good school or poor school, parent's involvement in their child's education is certainly essential as it makes a huge impact on the overall performance of their kids learning. Parental involvement generates a huge difference in a child's academic performance, improving learning, and academic appraisal.
As far as the students are concerned, they used to face many issues in their academic and personal life. They may not be able to tell their ever issue with their teachers in school but they will be ready to share those issues with their parents. Kids generally consider their parents as their role models and they expect the assistance of their parents in their learning. Parents can become an effective and advisor and guide to their kid because parents can solve a lot o issues faced by their kids. With proper guidance and support, parents can help the kids to perform well in their studies.
Parental involvement in their child's education helps a kid in his educational and overall development. When parents create a learning environment at their home for kids, they can focus completely on learning and will also understand that parents give more importance in their academic success. A parent can keenly involve in their child's academic progression, general development, feeding and deal with health concerns more than anyone in the world. Parental involvement in their kids' studies improves interaction and discussion with their children. Parents can become more receptive and aware to their children's social, academic, personal, emotional and intellectual growth needs.
The involvement of parents in their child's academic studies aids the kids to become more productive. Parental involvement in their children's learning develops a child's self-esteem, mind-set, and academic success across all subject areas. It can also boost better behavior and deal with academic stresses with confidence and self-belief. Involvement of parents in education assists children to be productive and also to be more responsible to their studies. When parents are involved at school as well as at home, children used to make enhanced performance in school and result in higher grades and test scores.
Parental involvement in education will bring out many benefits such as improved behavior, great learning experiences, regular attendance, positive attitudes, and better academic performance, increases the chances of doing every day assignments, reduces academic learning stress amid students, keep an eye on what your child loves, tune into how your child learns, and so on. It will also help you to make your kids to understand that you care about your kids' education and schooling.
You can aid the kids to value the importance of education and assist them to realize what they are required to do. Parental involvement makes available a support system for children in their every facet of life. When parents are involved, students accomplish more and better their learning experience irrespective of socio-economic position, ethnic and racial surroundings, culture, customs or religion, the parents' education level, etc.
|
0.999994 |
The researchers at Uppsala University in Sweden and the California Institute of Technology, led by Dr. Reed P. Scherer, analyzed sediments recovered from the area beneath the West Antarctic ice and determined that they contained the remains of tiny marine algae called diatoms, along with a chemical tracer called beryllium-10.
Together, they report in the current issue of the journal Science, these clues ''provide evidence that marine conditions prevailed deep within the West Antarctic interior'' at some time within the last two million years. This, they wrote, suggests that the West Antarctic ice sheet had collapsed to some degree at least once within the same period. The researchers nominate an unusually long interglacial interval about 400,000 years ago as the most likely time for the collapse of the West Antarctic ice sheet.
But others said the new evidence, while not conclusive, was strong. Collapse of the ice sheet is the best explanation for the placement of the diatoms and the beryllium-10, said Dr. Richard Alley, a paleoclimatologist at Pennsylvania State University. Dr. Scherer's ''original result was correct and he has strengthened it,'' Dr. Alley said.
The significance of the finding, he said, is that it ''strengthens the possibility'' that the West Antarctic ice sheet could collapse in the future; having done so once, it could do so again.
The reason the ice sheet is so vulnerable is that alone among the world's big ice sheets (including a much larger one in East Antarctica), it lies largely below sea level. That means it is more open to melting as warming ocean waters lap at its margins; by comparison, warmer air melts the ice much more slowly. The ice sheet's margins consist of vast, floating ice shelves as big as Spain. If these were to melt, they would not cause the sea level to rise, since they are already floating on the ocean.
But they are fed by large, moving rivers of ice that flow from the interior of the West Antarctic ice sheet, and scientists believe that the removal of the shelves could allow the rivers to flow faster, as if a cork were removed from a bottle. This could deplete the interior reservoir of the West Antarctic ice sheet itself, which does not float but is instead grounded on an archipelago below sea level. If the flow of the moving ice streams did speed up, it might deplete the ice faster than freezing precipitation could replace it, leading to a net outflow of fresh water into the ocean.
How long this might take is a critical question. The Scherer study does not shed any light on it. ''He can't demonstrate that it went in a hurry, just that it went,'' Dr. Alley said.
But the die could be cast much earlier, Dr. Oppenheimer calculated. The climate could warm enough by the end of the next century to make an eventual collapse of the ice sheet inevitable, he said. He called the latest Scherer study ''critically important'' because it suggests that the ice sheet disintegrated in global temperatures that could not have been much higher than current levels.
Two other new pieces of research, published in the current issue of Nature, suggest that the speed of the ice streams' flow would be dictated by the underlying geology of Antarctica. The ice streams flow along relatively narrow basins made slippery by a combination of fine sedimentary particles and melted ice water. Several things can slow the flow, including rough protuberances sticking up through the slippery path and friction along the sides of the flow paths.
Moreover, said Dr. Alley, who is a co-author of one of the Nature papers, if the underlying topography contains many sedimentary basins along which more rapidly flowing ice can escape, the ice sheet would deplete faster. But ''if the ice streams can't get somewhere because the geology is wrong,'' he said, ''that essentially buys us time because the ice can't change and move as rapidly.'' The primary authors of the Nature papers are Robin E. Bell of the Lamont-Doherty observatory and Sridhar Anandakrishnan of Pennsylvania State.
|
0.954307 |
An embedded security subsystem, and method for implementing the same, which provide secure controllability of a data security device within a data processing system. The embedded security subsystem of the present invention includes a persistent enable flag for providing control access to the data security device, wherein the persistent enable flag is accessible only in response to a power-on reset cycle of the data processing system. The persistent enable flag is read-only accessible to runtime program instructions. A pending state change flag that is write accessible by runtime program instructions is utilized for setting an intended next state of the persistent enable flag such that control access to the data security device is enabled only during a subsequent power-on reset of said data processing system.
The present invention relates in general to data processing systems, and in particular to data security within such systems. More particularly, the present invention relates to a system and method for setting a persistent data security state in a convenient manner impervious to runtime interference.
Computer security encompasses a number of different aspects, from passwords and permissions, to data encryption, virus protection, firewalls, and VPNs, software bugs, data backup and physical system security. The continued growth in electronic communication and commerce over expansive computer-driven networks has resulted in a dramatic proliferation of potential security data security problems as data is stored and delivered over multiple networked devices.
Specialized security hardware that complements transmission-based security has been developed to address the myriad of potential security threats to stored and/or transmitted digital data. Such complementary hardware security addresses hardening and assuring the integrity of the environment in which digital application data resides. This security hardware can be utilized for a number of purposes including securing storage of confidential information such as security keys, and off-loading of intensive security operations such as Secure Socket Layer (SSL) processing or digital signature operations. So called “smart cards” and hardware tokens are among the most common forms of secured hardware storage. These mechanisms are tamper-resistant, preventing unauthorized access to security keys. security devices can also perform cryptographic operations solely from within a system thus providing both a secure environment to access of confidential data, as well as being able to off-load processor intensive operations from network devices.
One such hardware security device is known as an embedded security subsystem (ESS), which provides system security measures outside the interactive processing environment (i.e. the operating system). An ESS typically includes a protective enablement/disablement mechanism which serves to prevent both unauthorized access to sensitive data stored with the ESS as well as unauthorized enablement of ESS functionality. A major source of security vulnerability occurs incident to initial activation and enablement of an ESS, since such enablement signals or instructions are required when otherwise necessary authorization information (owner authentication, for example) is unavailable. ESS initialization techniques are therefore subject to unintended function disablement and/or denial of service (DoS) attacks.
The currently developed Trusted Computing Platform Alliance (TCPA) specification addresses the vulnerability of ESS enablement/activation by requiring specialized forms of user authorization. These user authorization techniques typically rely on verifying physical presence of a user before ESS enablement/activation commands are allowed to operate. For a personal computer (PC), such verification might be implemented using manual switches or buttons, or using computer startup instructions. Such physical presence verification during initial enablement of an ESS are often cumbersome and preclude remote enablement of access to the features and data associated with the object ESS.
From the foregoing, it can be appreciated that a need exists for a system that provides secure access to ESS functionality while maintaining the flexibility afforded by remote initialization and management. The present invention addresses such a need by providing a system and method that utilizes a power-on reset requirement that avoids the aforementioned problems associated with physical presence verification before a change of enablement/activation status of an ESS can be implemented.
An embedded security subsystem, and method for implementing the same, which provide secure controllability of a data security device within a data processing system are disclosed herein. The embedded security subsystem of the present invention includes a persistent enable flag for providing control access to the data security device, wherein access to the persistent enable flag is gated by a power-on reset of the host data processing system. The persistent enable flag is read-only accessible to runtime program instructions. A pending state change flag that is write accessible by runtime program instructions, is utilized for setting an intended next state of the persistent enable flag such that control access to the data security device is enabled only during a subsequent power-on reset of said data processing system. In one embodiment, the power-on reset gating mechanism is implemented utilizing a sensed power cycle evolution, wherein the embedded security subsystem sets the persistent enable flag in accordance with the current state of the pending state flag in response to detecting a re-application of switched system power to the host data processing system. In an alternate embodiment, the power-on reset gating mechanism is implemented in association with startup program instructions that set the persistent enable flag in accordance with the current state of the pending state flag that was set during a previous power cycle.
FIG. 3 is a high-level flow diagram depicting steps performed for implementing secure controllability of a data security device utilizing the embedded security subsystem depicted in FIG. 2 in accordance with a preferred embodiment of the present invention.
This invention is described in a preferred embodiment in the following description with reference to the figures. While this invention is described in terms of the best mode for achieving this invention's objectives, it will be appreciated by those skilled in the art that variations may be accomplished in view of these teachings without deviating from the spirit or scope of the present invention.
As described with reference to FIGS. 1–3, the present invention provides a hardware security means by which enablement of a hardware security device within an embedded security subsystem (ESS) is gated by a power-on reset requirement as specified herein. The hardware device security means of the present invention is particularly useful within the context of a computer network in which it may be important to ensure that particularly sensitive data is uniquely maintained in a specified location in association with specified users (i.e. within a designated data processing system having designated users).
The hardware security enablement mechanism of the present invention may be executed in a variety of computer systems. The computer may be, for example, a personal computer, a midrange computer, a network computer or a mainframe computer. In addition, the computer may be a stand-alone system or part of a network such as a local-area network (LAN) or a wide-area network (WAN). For the purposes of illustration, a preferred embodiment of the present invention, as described below, is implemented on a personal computer such as the Netvista A40, manufactured by International Business Machines Corporation.
Referring now to the drawings and in particular to FIG. 1, there is depicted a block diagram of a typical personal computer system that may be utilized to implement a preferred embodiment of the present invention. As shown, a central processing unit (CPU) 12, a flash memory 6, a Random-Access Memory (RAM) 14, a non-volatile RAM (NVRAM) 8, and a hardware security device 4, are connected to a system bus 11 of a personal computer system 10. CPU 12, RAM 14, flash memory 6, and NVRAM 8 are also coupled to a peripheral component interface (PCI) local bus 20 of personal computer system 10 through a PCI host bridge 16. Flash memory 6 is a special type of electronically erasable progammable read-only memory (EEPROM) that can be erased and reprogrammed in blocks instead of one byte at a time. PCI host bridge 16 provides a low latency path through which processor 12 may directly access PCI devices mapped anywhere within bus memory and/or input/output (I/O) address spaces. PCI host bridge 16 also provides a high bandwidth path for allowing PCI devices to directly access RAM 14.
Also attaching to PCI local bus 20 are a hard disk drive 5, a communications adapter 15, an expansion bus bridge 29, and a flash memory utility 7. Communications adapter 15 connects personal computer system 10 to a network 17. Expansion bus bridge 29, such as a PCI-to-industry standard architecture (ISA) bus bridge, may be utilized for coupling ISA bus 25 to PCI local bus 20. As shown, a keyboard 26 and a mouse 28 are attached to ISA bus 25 for performing certain basic I/O functions. A graphics adapter 21 is also attached to PCI local bus 20 for controlling visual output through display monitor 22.
In the depicted embodiment, hardware security device 4 includes a combination of hardware, firmware, and software functionality that serves to protect sensitive data stored within hardware security device 4. Alternatively, hardware security device 4 may include requisite processing functionality that provides secure portal access to sensitive data stored elsewhere within computer system 10. As explained in further detail with reference to FIGS. 2 and 3, hardware security device 4 typically includes an enablement mechanism that enables/activates the functionality resident within hardware security device 4.
Conventionally, this enable/disable mechanism consists of an “enablement flag” that is set by a user having preestablished ownership status, or during a boot process of computer system 10 when physical presence of the user is used as the security measure.
A boot process for personal computer system 10 typically includes executing a bootstrap program which performs system initialization and loads an operating system by locating and executing an operating system loader from a partition within hard disk drive 5 into system memory (i.e., RAM 14). Utilizing the operating system loader, the bootstrap program loads operating system components such as device drivers, preferably into RAM 14, and initializes operation thereby.
Preferably, the bootstrap program is stored within flash memory 6. Further portions of the bootstrap program may also be stored in any other suitable machine-readable media such as RAM 14 and other disk and/or tape drive(e.g. magnetic diskette, magnetic tape, CD-ROM, optical disk, or other suitable storage media). While flash memory 6 contains static boot programs, NVRAM 8 and hard disk drive 5 preferably contain configurable settings for the boot program to utilize. Any suitable non-volatile machine-readable media may retain the operating system loader and associated operating system(OS), such as disk drive 5 and/or tape drive(e.g. magnetic diskette, magnetic tape, CD-ROM, optical disk, or other suitable storage media). Any suitable OS such as IBM's OS/2 operating system may direct CPU 12.
In the depicted embodiment, the functionality provided by hardware security device 4 defines a “trusted subsystem” within computer system 10 with which one or more data processing systems within network 17 may communicate sensitive data via communications adapter 15. One such context in which the need for hardware data security arises is in the development and improvement of security key technologies. As part of the security management employed by credit card companies, for example, public/private security key encryption systems are often utilized. In general terms, public/private key technology is utilized for mutual user authentication (via digital signatures, for example) between otherwise unfamiliar parties. Public/private key encryption allows a vendor (a credit card company, for example) to remotely install a private key into a designated user system module in a manner that the vendor is assured that any information intended for the private use of the user is secure.
Implementation of public/private key security systems requires user-side hardware security. The Trusted Computing Platform Alliance (TCPA) is an industry consortium dedicated to improving trust and security on computing platforms. International Business Machines, Inc. (IBM) is included among the companies that founded and continue to develop TCPA specifications and guidelines. The current TCPA specification (incorporated herein by reference in its entirety) defines a subsystem so that it may be trusted to interactively operate with other systems in a pre-defined manner. The subsystem includes an isolated computing engine (e.g. hardware security device 4) whose processes can be trusted because they cannot be altered locally or via network intrusion. One such security subsystem developed in accordance with TCPA guidelines is known as a Trusted Platform Management (TPM) module. The preferred embodiments of the present invention are described herein in FIGS. 2 and 3 in the context of a data processing system employing a TPM. However, one skilled in the art will understand and appreciate that the underlying principles depicted and explained with reference to FIGS. 2 and 3 are more generally applicable to any application in which there exists a need to provide secured controllability of a dedicated hardware security device.
A major source of security vulnerability for sensitive data residing with computer system 10 occurs incident to initial activation and enablement of the security functionality within hardware security device 4, since such enablement signals or instructions are required when otherwise necessary authorization information (owner authentication, for example) is unavailable. The present invention, as implemented within the computer system depicted in FIG. 1, provides secure controllability of the hardware security enablement mechanism that reduces the risks associated with relying entirely on the power-on reset procedure to set or reset the state of a persistent enablement flag within hardware security device 4.
Referring to FIG. 2, there is depicted a block diagram illustrating an ESS 30 implemented within a data processing system in accordance with a preferred embodiment of the present invention. As shown in FIG. 2, ESS 30 includes a TPM module 32 that serves to protect access to sensitive data stored within an internal non-volatile memory device 38. In addition, ESS 30 may be configured to provide secure access to data stored within an alternative data storage medium 42 that resides external to the physical boundaries of TPM module 32. TPM module 32 is typically an integrated circuit chip that is permanently coupled (typically soldered) to a planar (e.g. a motherboard) within computer system 10. Preferably, TPM module 32 is uniquely associated with a specified planar (not depicted) within computer system 10 such that TPM 32 is generally not transferrable to another planar.
A non-volatile memory device 38 and a processing unit 40 are included within TPM module 32 to provide a secure interactive data repository in which, for example, private security key data may be established and maintained within the host data processing platform. In accordance with a preferred embodiment, the secure data stored within nonvolatile memory device 38 may be received from a remote system, such as a network server (not depicted). Processing unit 40 performs requisite data processing functions required for private key establishment and maintenance. The specifics of private key encryption and decryption are well known in the art and are not discussed herein.
The on-board/portal security functionality of TPM module 32 typically depends upon one or more control flags that are utilized to verify various data access parameters. Included among such data access parameters may be ownership authentication, and the enablement and activation states of TPM 32. The setting of such access parameters are determined by processing unit 40 which monitors the setting (i.e. set or reset) of an ownership flag bit 43, a TPM enable flag bit 45, and a TPM activation flag bit 47 (all three flags referred to alternatively as enablement flags). Since the state of persistent flags 43, 45, and 47 is essential to the reliable operation of TPM 32, all three are maintained as persistent, non-volatile bit flags.
In accordance with TCPA convention, ownership flag 43 is a non-volatile bit that which is set or reset to enable/disable the process of taking ownership of TPM 32. TPM activation flag 47 is a non-volatile bit used to activate and deactivate TPM 32 without destroying data protected therein. Activation and deactivation is subtly different from enabling and disabling TPM 32 in that an inactive TPM continues to recognize and execute more commands than does a disabled TPM. In particular, an inactive TPM does not block the enabling/disabling or taking ownership of the TPM.
The process of enabling and disabling TPM 32 uses the setting of non-volatile TPM enable flag 45. It should be noted that although strictly speaking TCPA convention sets forth a TPM “disable” flag, the function of TPM enable flag 45 as described herein is conversely equivalent. Conventionally, the TPM enable/disable flag is set or reset by one of two mechanisms. The first mechanism utilizes an owner-authenticated command that requires inputting and verifying an authorization string. The second mechanism uses commands which must be input in a manner that requires physical presence of the user at the platform. As explained in further detail hereinbelow, the present invention enhances the first, owner-authenticated, mechanism, and replaces the second, physical presence mechanism, with a power-on reset gated enable/disable mechanism.
Processing unit 40 is programmed to recognize that while TPM enable flag 45 is set (signaling enablement), the security of data stored within non-volatile memory device 38 and/or external storage medium 42 is assured, and normal processing and maintenance of the data continues. However, in response to detecting that the state of one or more of the enablement flags has changed (i.e. reset), processing unit 40 “disables” TPM 32 by becoming unresponsive to all external instructions except for a request to change the state of a pending state change flag 41. In addition, processing unit 40 may commence automatic predetermined data protection actions such as denying further access to the object data within memory devices 38 and 42, or removing the data from storage.
With control access to TPM 32 at stake, adequate security must be provided for accessing and manipulating the states of TPM enable flag 45. The present invention provides such persistent flag security with the combined utilization of pending state change flag bit 41 in conjunction with power-on reset procedures of the host data processing system. As explained in further detail hereinbelow, the present invention utilizes pending state change flag bit 41 to implement a power-on reset gating mechanism for setting or resetting TPM enable bit 45. In one embodiment of the present invention, detection of a power cycle evolution (i.e. removal and re-application of switched power to the host system) is utilized directly as the trigger for determining the state of TPM enable flag 45 in accordance with the current state of pending state flag 41. In an alternate embodiment, the power-on reset gating mechanism is implemented in association with startup program instructions that set TPM enable flag 45 in accordance with the current state of pending state flag 41 that was set during a previous power cycle. In this manner, the setting of TPM enable flag 45 does not depend on physical presence of an authorized user at the time of startup, and furthermore the system is impervious to denial of service attacks or otherwise undesirable enablement or disablement by a runtime owner-authenticated command.
As further depicted FIG. 2, ESS 30 receives input from a user input device driver 42. User input (via keyboard, mouse, touchpad, etc.) from input device driver 42 into TPM 33 is used to programmatically control (i.e. set or reset) the state of pending state change flag 41. It should be noted that access from input device driver 42 to pending state change flag 41 must be controlled in accordance with specified authorization parameters, such as verification of user identity, to maintain safeguards required to maintain the status of ESS 30 as a “trusted subsystem” with respect to other network devices. In the depicted embodiment, authorization to change the state of pending state change flag 41, if required, is enforced using an authorization string (password). If a TCPA “owner” has been established, the authorization string is used to authenticate the user as owner having authorized access to change pending state change flag 41. If no owner has been established in accordance with TCPA convention, no ownership authorization string is required to access pending state change flag 41.
As explained in further detail below, the state of pending state flag bit 41 is effectively an “intended next state” for one or more of persistent TPM enable flag 45. The effective utilization of pending state flag bit 41, as set during a current runtime interval, is realized in accordance with a subsequent power-on reset (i.e. reboot) of the host data processing system. In contrast to conventional TPM enablement techniques wherein computer startup instructions (i.e. bootstrap instructions) in conjunction with user input(s) are utilized directly to set or reset TPM enablement flags, the present invention employs a bifurcated mechanism that requires a subsequent power-on reset sequence to determine and implement an intended enablement status as set in the previous runtime interval of the host data processing system. Consequently, the determination of the state of pending state flag bit 41 protectively accessed during runtime operations and is only implemented as part of the subsequent boot process.
A boot process may be categorized as either a “cold boot”, in which the host system is completely shut down and switched power is removed from the system, or a “warm boot” in which the host system is reset (i.e. data or programs in memory are erased) without subsequently removing system power, and the system is returned to a pre-determined initialized state. As explained in further detail with reference to FIGS. 2 and 3, a first embodiment of the present invention is applicable to the system power interruption incident to cold boot evolutions, while a second embodiment is applicable to either a warm or a cold boot process.
As further illustrated in FIG. 2, ESS 30 receives power from the host data processing system via a system switched power input source 46. As utilized herein, “switched power” refers to a removable power source such as that applied to processing and volatile memory devices that is applied and removed from the system during a given power cycle (i.e. period between system startup). ESS 30 further includes a power-on reset state detection latch 48, which receives a signal from system switched power input source 46. Power-on reset detection latch 48 is set in response to receiving an asserted power input signal (Vcc or Vdd) from system switched power input source 46. In accordance with the first embodiment of the present invention, processing unit 40, as part of system initialization, determines the state of power-on reset detection latch 48. In response to power-on reset detection latch 48 being set, processing unit 40 reads the state of pending state flag bit 41 and sets the state of persistent TPM enable bit 45 accordingly. In further response to power-on reset detection latch 48 being set, processing unit 40 performs a latch reset, such that the foregoing steps are performed only in response to an initial reading of power-on reset detection latch 48. In this manner, ESS 30 employs a power-on reset evolution to gate the setting of TPM enable flag 45 in accordance with the setting of pending state flag 41 in the previous power cycle.
A second embodiment of the present invention as implemented within ESS 30 will now be described, wherein the power-on reset gating mechanism is implemented in association with startup program instructions. Referring back to FIG. 1 in conjunction with FIG. 2, during the boot process of personal computer system 10, prior to the operating system (not depicted) taking over, a basic input output system (BIOS) code 36 (i.e. startup instructions) provides computer system 10 with a built-in starter kit to load and operate the rest of the software from hard disk drive 5. BIOS 36 is typically stored in flash memory 6 and is responsible for booting the computer by providing a basic set of startup instructions. The BIOS code performs all the tasks that need to be executed during a computer system startup including: power-on self-test (POST) which boots an operating system from hard disk drive 5, and providing an interface to the underlying hardware (an audio adapter 23 and graphics adapter 21, for example) for the operating system in the form of a library of interrupt handlers.
BIOS 36 first executes the POST code when it boots the computer system. The POST code is a built-in diagnostic program, normally stored within flash memory 6, which checks the hardware interfaces to ensure that all requisite hardware is present and functioning correctly before the BIOS begins the actual boot. During the boot process, POST continues with additional tests (such as memory tests for RAM 14 and NVRAM 8) as the boot process proceeds. In accordance with a second embodiment of the present invention, the POST code within BIOS 36 includes instructions for reading the state of pending state flag bit 41. In addition, BIOS 36 further includes startup instructions responsive to the determined state of pending state flag bit 41 for setting or resetting TPM enable flag bit 45 in accordance with whether or not pending state flag bit 41 is set. POST instruction execution is only performed during system power-on reset.
As described with reference to FIG. 2, the embedded security subsystem of the present invention maybe advantageously applied to subsystems developed under guidelines set forth by the TCPA, and more specifically to protection of data stored on a TPM. However, one skilled in the art will appreciate and understand the extensions necessary to extend the principles underlying the secure control access technique disclosed herein to other hardware security systems.
With reference to FIG. 3, there is illustrated a high-level flow diagram depicting steps performed for implementing secure controllability of a data security device in accordance with alternate embodiments of the present invention. As shown in FIG. 3, the process begins at step 52 and proceeds to step 54 with a determination of whether or not a power-on reset (i.e. reboot) has commenced. As explained with reference to FIG. 2, such a determination is made by either detecting the application of system power to the TPM, or as a natural consequence of access to and initiation of startup instructions such as those contained within BIOS 36. During runtime operations under control of a resident operating system (i.e. no power-on reset underway), the hardware security device (such as TPM 32) within the host data processing system accepts or denies runtime input in accordance with the state of one or more persistent enablement flags (such as TPM enable flag 45) as depicted at step 68.
When a power-on reset is commenced, the state (i.e. set or reset) of a pending state change flag is determined as illustrated at step 56. As previously explained with reference to FIG. 2, the pending state change flag is write accessible with appropriate user authorization by runtime program instructions for setting an intended next state of one or more persistent hardware security enable flags. If, as depicted at steps 58 and 60, the pending state change flag is not set (i.e. reset), the TPM processing unit resets the corresponding persistent TPM enable flag. Next, as illustrated at step 62, the hardware security device is disabled in accordance with the reset state of its enablement flag. If, however, the pending state change flag is set, the TPM processing unit sets the corresponding persistent TPM enable flag, as depicted at steps 58 and 64. As a system-specified reaction to the setting of the persistent enable flag(s), the hardware security device is enabled for runtime operations as illustrated at step 66. Runtime operations with respect to enabled or disabled access to the object hardware security device are then commenced after the power-on reset sequence as depicted at step 68 and the control access process terminates as shown at step 70.
Preferred implementations of the invention include implementations as a computer system programmed to execute the method or methods described herein, and as a program product. According to the computer system implementation, sets of instructions for executing the method and system of the present invention are resident in a storage device such as the ROM or RAM of one or more computer systems. Until required by the computer system, the set of instructions may be stored as a computer-program product in another computer memory, for example, in a disk drive (which may include a removable memory such as an optical disk or floppy disk for eventual utilization in disk drive).
A method and system have been disclosed for providing secure controllability of a data security device within a data processing system. Although the present invention has been described in accordance with the embodiments shown, one of ordinary skill in the art will readily recognize that there could be variations to the embodiments and those variations would be within the spirit and scope of the present invention. Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the appended claims.
a pending state change flag write-accessible by runtime program instructions, for setting an intended next state of said persistent enable flag such that control access to said data security device is enabled only during a subsequent power-on reset of said data processing system.
means for determining the state of said power-on reset detection latch.
determining a next state of said persistent enable flag in accordance with the determined state of said pending state change flag.
4. The apparatus of claim 1, wherein said persistent enable flag and said pending state change flag are non-volatile storage devices.
5. The apparatus of claim 1, wherein said data security device includes memory for receiving and storing data.
6. The apparatus of claim 1, wherein said data security device includes security portal functionality for controlling access to data stored within said data processing system.
7. The apparatus of claim 1, wherein said control access to said data security device includes functionality for enabling or disabling ownership of said data security device, enabling or disabling enablement of said data security device, or enabling or disabling activation of said data security device.
setting or resetting said persistent enable flag in accordance with the state of said pending state change flag.
9. The method of claim 8, wherein said power-on reset steps are preceded by the step of setting said pending state change flag in accordance with user input during runtime operations of said data processing system.
10. The method of claim 8, further comprising, responsive to said pending state change flag being set, setting said persistent enable flag such that control access for said data security device is enabled following said power-on reset.
11. The method of claim 8, further comprising, responsive to said pending state change flag being reset, resetting said persistent enable flag such that control access for said data security device is disabled following said power-on reset.
only in response to execution of said startup program instructions within said non-volatile programmable memory unit, updating said persistent enable flag to said intended state in accordance with the state of said pending state change flag.
13. The method of claim 8, wherein said data security device includes memory for receiving and storing data.
14. The method of claim 8, wherein said data security device includes security portal functionality for controlling access to data stored within said data processing system.
15. The method of claim 8, wherein said control access to said data security device includes functionality for enabling or disabling ownership of said data security device, enabling or disabling enablement of said data security device, or enabling or disabling activation of said data security device.
17. The computer-readable medium of claim 16, said method further comprising setting said pending state change flag in accordance with user input during runtime operations of said data processing system.
18. The computer-readable medium of claim 16, said method further comprising, responsive to said pending state change flag being set, setting said persistent enable flag such that control access for said data security device is enabled following said power-on reset.
19. The computer-readable medium of claim 16, said method further comprising, responsive to said pending state change flag being reset, resetting said persistent enable flag such tat control access for said data security device is disabled following said power-on reset.
responsive only to execution of said startup program instructions within said non-volatile programmable memory unit, updating said persistent enable flag to said intended state in accordance with the state of said pending state change flag.
21. The computer-readable medium of claim 16, wherein said data security device includes memory for receiving and storing data.
22. The computer-readable medium of claim 16, wherein said data security device includes security portal functionality for controlling access to data stored within said data processing system.
23. The computer-readable medium of claim 16, wherein said control access to said data security device includes functionality for enabling or disabling ownership of said data security device, enabling or disabling enablement of said data security device, or enabling or disabling activation of said data security device.
|
0.967061 |
We are running into issues when we launch PySpark (with or without Yarn).
It seems to be looking for hive-site.xml file which we already copied to spark configuration path but I am not sure if there are any specific parameters that should be part of.
WARNING: User-defined SPARK_HOME (/opt/spark) overrides detected (/opt/cloudera/parcels/CDH-5.5.4-1.cdh5.5.4.p0.9/lib/spark).
log4j:ERROR Could not instantiate appender named "WARN".
log4j:ERROR Could not instantiate appender named "DEBUG".
pyspark.sql.utils.IllegalArgumentException: u"Error while instantiating 'org.apache.spark.sql.hive.HiveSessionState':"
We installed Spark 2.1 for business reasons and updated SPARK_HOME variable in safety valve.
(Ensured SPARK_HOME is set early in spark-env.sh so other PATH variables are set properly).
I also learnt that there is no hive-site.xml dependency with spark 2.1 which confuses me more for reasons it is looking into.
By Spark 2.1 do you mean Cloudera Spark 2.0 Release 1 or Apache Spark 2.1 ?
Regarding Cloudera Spark 2.0 Release 1 or Release 2, I would like to tell that minimum required CDH version is CDH 5.7.x but you are on CDH 5.5.4.
The problem seems to be with configuration rather than dependency, I am not sure what configuration is missing.
|
0.999976 |
After a long exhausting week at work, university or taking care of your kids at home, there is nothing better than grabbing a cup of tea or coffee with your friends. Whether you choose pastries, an eclair, a burger or kebab, nothing beats having some carefree time to catch up with your friends. It is unfortunate though, that gossiping or Laghw (any idle talk that is not useful) can instantly become part of these social meetings. Sometimes idle talk becomes normal workplace conversation. It can be a slip of a tongue and unintentional, while at other times, the whole gathering revolves around this kind of talk and this is where it becomes problematic. In this article, I will explain some of the reasons why gossip is such a bad habit and then list some useful tips to avoid it.
Gossip and backbiting are unrestricted and derogatory conversations about other people which can involve spreading lies about someone, exposing their sins or passing hurtful judgements about them. There are many reasons why people resort to this bad practice: jealousy, wanting a sense of belonging or acceptance, out of boredom, to feel superior, to gain attention, or as a result of anger or unhappiness.
Gossip hinders your productivity simply because it consumes time that could be used in other useful matters, whether it is in your personal or professional life. Backbiting, gossiping and negative speech are not only major sins of the tongue, but they can have psychological effects on your wellness and state of mind, as well as impacting relationships socially and in the workplace. This time should be used in nurturing speech that will help build our characters and intelligence, or in quiet reflection and worship to Allah . The time spent in gossip can instead even be used to relax productively!
In social and workplace settings, gossip and backbiting do nothing but generate hostility and distrust in the environment, and is a really strong reflection of yourself and your character, as you portray yourself as untrustworthy, malicious and insecure. Constant gossiping is a sign that you are unable to create strong interpersonal relationships; if you need to resort to it in order to keep a conversation going or to simply ‘fit in’, then the relationship you are trying to maintain has already got weak foundation. If you are unable to attract your listener and engage with them in a knowledgeable, fruitful and nurturing conversation, then unfortunately the person you’re trying to build a relationship with, is most likely not interested in reciprocating friendship or a working relationship, but is more interested in the news and the gossip you transmit. To avoid being ‘radio transmitters’, it is an obligation to maintain morals and good virtue in social and workplace interactions.
On a personal level, gossiping causes internal stress, whether you are a listener or a speaker, because negativity is exhausting! Backbiters inevitably transmit their anger, stress and negative emotions to the listeners, and bad moods can catch easily. Slandering and backbiting rarely make people feel better about themselves, and research has shown that it can cause anxiety and lower self-esteem.
There is always wisdom behind what Allah forbids, and we have just listed a few of them above. I will now give you practical steps to implement in order to ensure that idle talk is permanently eliminated from your speech in sha Allah.
Know your personal weaknesses, whether worldly or religious, and try to work on improving them. Being aware of your own shortcomings will allow you to find the humility in yourself and prevent you to see yourself as better than others. As a result of this self-awareness, you will consciously refrain from gossiping about others to increase your confidence or seek attention, because you know you have a lot to improve within yourself first. Working on your religious weaknesses is the greatest thing you can ever do for yourself. When keeping yourself busy to become a better Muslim, you’ll find yourself automatically censoring your words and watching what you say, because you are aware that Allah is The All-Hearer and The All-Seer.
If you are a book worm – dig for new books, new authors and new topics to read. If you are a sporty person – look for new workouts and meal preparations. If you like Islamic education – read new books, make a to-do list of ‘must-attend’ lectures, and search for workshops and online classes. As you increase your skills, hobbies, and spirituality, share these life experiences and help your friends lead better lives by exchanging useful information. Share stories of your personal experiences: if you’ve lost weight, you went on an exceptional trip with family, completed an application process or even a public speaking event. Having these experiences will give you so much to talk about, and will give you the ability to help others in different situations.
We all have social and professional responsibilities that can wear us out. It is fine for mother to talk about how tired they are from dealing with their teenage kids. It is fine for new mothers to ask for advice about pregnancy and afterbirth tips. It is fine for our mothers to talk about the new recipes of chicken tikka, samosa or pasta they tried the other day which the guests loved. It is absolutely permissible to speak about our worldly affairs, as long as this is not the essence of the social gathering, as it can easily lead to time-wasting and idle talk.
Though we may not be committing backbiting, lying or gossiping, our social gatherings should not lack the remembrance of Allah . Spend a few minutes of discussing new sunnah you revived, a dhikr you learnt or sharing a spiritual struggle you are going through is enough for you not to be from ‘al-ghafileen’ (those who forget to remember Allah and make dhikr). The mere fact that Allah is in your heart and mind at all times even when you do not verbally express it will make you among those who remember Allah , protecting you from the evils of idle talk.
Surat Al Asr, though very short, composed only of three verses, is enough to make us shiver every time we decide to waste time on things that do not add anything to our worldly lives nor our spiritual and religious well-being. When reading the tafseer of this surah, one should think of nothing but how much the value of time is underestimated, that Allah glorified its importance and swore an oath by it in this surah.
Time is not only a glorified created objected by the Creator, but it is also a burden. It will be very hard to argue saying we didn’t have enough time to make dhikr, dua, perform our salah or do hajj. The loss here is like no other, it is the loss of akhirah as well as loss in dunya. If you do not use your time in dunya efficiently and effectively, to earn halal living, seeking knowledge or making dhikr of Allah , then your loss is great, and has no compensation.
However, Allah ends the surah by reminding us of what we can do to ensure we are not among the losers: we should be of those who have faith, do righteous deeds, encourage one another towards truth and patience.
Be righteous, speak the truth, if you have no good speech to say, silence is your friend.
“Whosoever gives me a guarantee to safeguard what is between his jaws and what is between his legs, I shall guarantee him Jannah.” [Al-Bukhari].
“He who believes in Allah and the Last Day, let him speak good or remain silent.” [Muslim].
Remember not to overwhelm your friends with your success stories or problems. If you do speak about your worldly affairs, make sure it does not lead to arrogance. Additionally, remember to try and not to overwhelm your friends and family either; they may have problems of their own and sometimes not talking is so therapeutic.
Remember that any sin, intentional or unintentional, you accumulate by gossiping or backbiting will be only wiped out when the people you hurt have forgiven you. Strive to be from those who Allah described as “servants of the Most Merciful”, those who ignore ill speech with dignity.
g. If you can’t change the subject, busy people away from it. Ask when will the food arrive, or how are they doing in university or work, or talk about the weather or any other subject (be creative!).
I ask Allah to guide me and you to the right path. May He give us the courage and strength to stand and speak against what is not right. May He surround us with the good company that would always remind us of Him and encourage us to do righteous deeds.
How do you avoid gossip and idle talk? Share your ideas in the comments below.
|
0.999913 |
Complete the second sentence so that it has a similar meaning to the first sentence, using the word given. Do not change the word given. You must use between two and five words, including the word given.
d. She had to finish her homework before she went out. (until) She had to stay in ________________ her homework.
I'm having a hard time to grasp the two events rule on this one! "She had to stay in until she finished her homework." Sounds perfectly fine to me! Why do I end up with "She had to stay in until she HAD finished her homework."
The goal of such exercises is to foster precision in the choice of tenses. There are times, especially in writing, when there is a need for perfect clarity in respect to the sequence of events. Unfortunately, the examples chosen in the exercises often do not establish a context where precision is required in order to avoid ambiguity.
I can't party until I do my homework.
intending that sentence to mean "until I have done my homework", and that's exactly how another native speaker would understand it.
The speaker is explaining why he is unable to party now. He has something important to do first.
I can't party until I have done my homework.
I can't party until I've done my homework.
There, have done expresses completion.
I couldn't party until I had done my homework.
I couldn't party until I'd done my homework.
There, the would-be reveler is explaining why she was unable to party yesterday, perhaps, or last week, or at some other time in the past.
Again, the perfect (here, the past perfect) expresses completion.
Both "until she finished" and "until she had finished" are valid sentences. In context, they mean the same thing.
In general, "had [verb]ed" means that the action was completed at some specified time in the past. "I had seen Bob yesterday." This is usually used with respect to some other action. "I had seen Bob before he saw me."
A plain "[verb]ed" means simply, action completed in the past. "I saw Bob."
The difference is often very subtle. Usually we use "had" when we want to indicate that the action is completed, as opposed to an action that might be ongoing.
Not the answer you're looking for? Browse other questions tagged sentence-structure past-perfect or ask your own question.
She did it ALL by herself or She did it by herself ALL?
|
0.962735 |
A fully automated, high-throughput method was developed to profile the fatty acids of phospholipids from human plasma samples for application to a large epidemiological sample set (n > 25,000). We report here on the data obtained for the quality-control materials used with the first 860 batches, and the validation process used. The method consists of two robotic systems combined with gas chromatography, performing lipid extraction, phospholipid isolation, hydrolysis and derivatization to fatty-acid methyl esters, and on-line analysis. This is the first report showing that fatty-acid profiling is an achievable strategy for metabolic phenotyping in very large epidemiological and genetic studies.
The association between the fatty-acid composition of the diet and the development of various diseases has been the subject of many epidemiological studies. It is also recognized that gene-diet interactions may play an important role in the development of chronic disease. The ability to study these associations with sufficient certainty relies on very large sample sets. Most past studies used fatty-acid composition information derived from self-reported dietary questionnaires, which can be prone to substantial measurement error and may contribute to inconclusive results across different studies, for example the association between specific fatty acids and type 2 diabetes [1–4]. This has led to the search for nutritional biomarkers for fatty acids that could be used to validate the data obtained by dietary questionnaires, or to be used to investigate gene-diet interactions directly. Fatty-acid biomarkers are regarded to provide an objective measurement of some types of dietary fat intake , and epidemiological studies can use fatty acids measured in several blood lipid pools as nutritional biomarkers to investigate the association with disease conditions, such as type 2 diabetes [6, 7]. However, the lack of published methods to profile fatty acids in very large sample sets has hampered efforts to combine metabolic information with genetic data to study gene-diet interaction in disease development. Although several studies have combined genetic data with metabolic profiling, most of these studies did not focus on gene-diet interactions in relation to disease development, used only data from healthy individuals [8, 9], did not have sufficient power to allow investigation of the association with diet , or did not find an effect of diet on the association between fatty acid levels and genes.
The application of nutritional biomarkers in large-scale epidemiological studies can be possible only if the analysis of the biomarkers is sufficiently fast, relatively cheap, robust and precise. We decided to to develop an automated method specifically for fatty-acid profiling of the plasma-phospholipid fraction, which would provide the molar percentage of each of the fatty acids in line with previous reports [5–7, 11]. This automated method comprised the following steps: 1) extraction of total lipids from plasma samples; 2) isolation of the phospholipid fraction from the total lipids by solid-phase extraction (SPE); 3) a combined hydrolysis and derivatization step to convert the phospholipids into free fatty acids and then methylate these to form the more volatile fatty-acid methyl esters (FAME); 4) FAME extraction and 5) the final gas chromatographic separation combined with flame ionization detection. The chromatographic separation was developed to resolve different geometric isomers of particular fatty acids such as cis and trans oleic acid (C18:1n9) in an acceptable chromatographic run time. However, these complex sample -preparation procedures for fatty-acid analysis are time-consuming and allow the possibility of errors when performed manually.
Several groups have reported the development of automated or high-throughput fatty-acid profiling of human plasma samples [12, 13]. However, none of these methods automated both the phospholipid extraction and FAME derivatization and applied this to very large sample sets . Since fatty-acid profiling by gas chromatography (GC) using FAME derivatization first became established, improvement in sample throughput has been sought, and this is still an active area of research [15, 16]. This study is the first report of an automated method for fatty-acid analysis of the phospholipid fraction of human plasma, which includes both phospholipid extraction and FAME derivatization, and has been successfully applied to date to more than 28,000 samples of the InterAct project (detailed information about the subjects can be found in the cohort description ). The InterAct project aims to measure the plasma-phospholipid fatty-acid profile in 12,403 verified diabetes cases and 16,154 subcohort participants within the European Prospective Investigation into Cancer study, in eight European countries . Achieving this aim is not practical with standard manual sample preparation , therefore, our aim was to develop a completely automated, high-throughput method that would give results comparable with those of previous studies that used manual methods. This automated method should enable conduct of large epidemiological studies such as the InterAct project, covering 28,000 samples .
In this report, we focus on aspects of method development, validation, and quality control (QC). The method has been validated on different batches of QC samples. The actual analysis is carried out on three parallel systems, each consisting of two robots and a GC system, which work in parallel using exactly the same equipment and methods. This system is unique in its ability to run very large sample sets, and in this paper, we report the method validation and the results obtained for the QC material used for the first 860 batches analyzed by the method, which demonstrates the ability of the apparatus to maintain the same quality over many samples using the three independent systems. This report is a quintessential first step in the process of applying metabolic phenotyping to study gene-diet interaction in the development of type 2 diabetes .
Comparison experiments were conducted using 52 identical QC2 (horse plasma) samples divided randomly into two groups. The aim of this experiment was not to revalidate the approach of using SPE extraction in combination FAME analysis by GC to determine the fatty-acid composition of the phospholipid fraction; this approach, which can have qualitative and quantitative limitations, has already been widely used in nutritional and epidemiological studies . Our aim was to determine if the automated method could deliver results that are comparable with manual methods. Extraction of total lipids and isolation of the phospholipid fraction were performed by both conventional (n = 26) and automated (n = 26) methods. The mean, standard deviation (SD) and percentage coefficient of variation (%CV) of 19 major phospholipid fatty acids (for peaks over 0.1%, horse-plasma phospholipids are less diverse than human plasma phospholipids) in the QC2 samples were calculated from the two methods (Figure 1; see Additional file 1, Table S1). The mean values for the 19 fatty acids obtained with the automated method showed high correlation (r = 0.9999) with those performed with the manual method, indicating a significant linear relationship (P < 0.001) (Figure 1A). However, the precision of the automated method was better than that of the manual method with SDs of less than or equal to those of the manual method (Figure 1B). The Bland-Altman plot showed good agreement between the two methods, with an average difference of 0.03%. shows The automated method had smaller %CV values than those of the conventional manual method for most of the fatty acids, indicating that the analytical precision was improved by the use of the newly developed automated method (see Additional file 1, Table S1).
The flame ionization detector (FID) is a sensitive detector for FAMEs, and shows linearity over a wide range of concentrations . In this particular experiment, the dynamic range stretched from 0.15% to 40%. The response for the 37 FAME components showed good linearity (all R2 values between 0.991 and 1.00) (see Additional file 1, Table S2). The long-term inter-instrument precisions (%CV) of the 37 FAME standards have been validated by daily monitoring of two different levels of calibration standards analyzed on three different instruments between 56 runs, shown in Supporting Information (see Additional file 1, Table S2). The detection limits from 0.3 to 1.8 ng per injection for the 37 FAMEs were calculated (see Additional file 1, Table S2), based on a signal-to-noise ratio of 3:1. The limit of quantification (LOQ) for plasma samples with a volume of 125 μl (2 μl GC injection) or 250 μl (1 μl GC injection) were also calculated (see Additional file 1, Table S2). The 250 μl volume was selected for routine analysis of plasma samples and the 125 μl volume was used when repeats were required.
The analytical accuracy and intra-assay %CV within batches were examined by analyzing the six plasma replicates (250 μl) spiked with known concentrations of C15:0 (330 μmol/l) and cis C18:2n6 (570 μmol/l) phosphatidylcholines. The recoveries ranged from 77.1% to 89.3% with a %CV of 5.5 for C15:0, and from 83.3% to 100.8% with a %CV of 10.0 for cis C18:2n6 (for detailed results, see Additional file 1, Table S3).
Not all of the 37 fatty acids were present in the QC material at sufficient levels to be reproducibly measured (Table 2). All fatty acids present at levels of less than 0.15% showed insufficient reproducibility (CV > 20%). The precision for these low-level fatty acids was not an issue, as the standards mixture held sufficient amounts of these fatty acids for reproducibility to be satisfactory (CV < 5%). As a general rule, all measurements with a level of less than 0.15% were assessed as being below LOQ. Although a splitless injection could have increased the LOQ, it would also have decreased the throughput because it would have required a different temperature program to ensure adequate resolution of the solvent peak from the shorter-chain FAMES.
Analysis of this very large sample set took place over several months. It required a rigorous internal QC (IQC) system to ensure that the measured fatty-acid results were reliable and that data across the whole study were comparable. IQC was conducted by inserting QC1 and QC2 materials into each batch of analysis. After preliminary replicated QC1 and QC2 results in 60 successive batches were collected, the estimated mean and SD between batches were used to build the QC charts for each of the fatty-acid components. The QC1 and QC2 materials were successively analyzed daily over a 20-month period. The QC1 and QC2 measurements within these 860 batches were obtained from three parallel automated systems. Shewhart control charts were used , which include an average line (Avg), a lower control limit (LCL) and an upper control limit (UCL) to determine if data obtained within a batch were comparable with previously obtained data. An example of the Shewhart control chart with individual measurements of DHA (C22:6n3) and EPA (20:5n3) in human plasma (QC1) is shown in Figure 2. There were no batches for which the obtained data were outside the QC limits for either the DHA or EPA results over 860 batches. The long-term reproducibility and stability of the control materials were verified over a period of 20 months and presented as %CV. For instance, over 860 analyses of the human plasma QC1 sample, the mean DHA percentage was 2.15% with CV = 2.8%, and the mean EPA percentage was 0.47% with a CV = 6.8%. These DHA and EPA results were divided into 10 monthly subgroups. The monthly means were compared bysingle-factor ANOVA (Table 1). There were no statistically significant differences (all P > 0.05) between the monthly means, and no evidence for any trend towards difference over a period of 10 months for both DHA and EPA measured in human plasma QC1.
Comparison of the monthly mean percentages of the docosahexanomic acid (DHA) and eicosapentaenoic acid (EPA) profiles.
bn is the number of batches in the month.
Measured levels of all fatty acids across 860 batches analyzed on three independent systems.
aMixture of fatty-acid methyl ester standards; fresh batches of mixtures were prepared every 1 to 2 months, and mean values were calculated for each batch (see Methods section).
bNormal pooled human plasma (PLH-123-F; Sera Laboratories International).
cNormal pooled horse plasma (S-121-F; Sera Laboratories International).
dMean level determined over 860 batches using three independent systems.
eStandard deviation determined over 860 batches using three independent systems.
fCoefficient of variation (100% × SD/mean).
gNot detected (level below 0.01%).
hBelow limit of quantification (level below 0.15%). Mean values are given, but precision is insufficient.
The aim of automating the method was not only to improve analytical precision, but more importantly to increase throughput and reliability, and to reduce the cost per sample. Analysis of fatty acids from the different fractions of human biological fluids is a laborious task. In previous projects, in which sample sets were analyzed using conventional manual methods, it was found that a team of two people could maintain a throughput of around 300 to 350 real samples per month. With the automated method running on three parallel systems, we achieved an average throughput of approximately 1,200 samples per month (including maintenance of the system, and reanalysis of failed samples). To run and maintain these three systems and cover all aspects from sample reception to manual checking of the chromatograms, we need a team of at least four people. This means that the actual throughput per person doubled by changing to the automated method, which significantly reduced the cost per sample. The systems proved to be adequately reliable in a research environment, with very limited downtime (less than 10%) and limited error rate (in almost all cases, the sample or extract could be recovered and useful results could be obtained after diagnosis of the reason for failure, modification of the method to accommodate the failure, and repeat analysis). However, the systems demanded constant preventive maintenance to maintain this level of reliability. As a result, the cost of spares for the sample-automation robotics was a significant contributor to the cost of ownership of this equipment. Nevertheless, this throughput allowed us to analyze 860 batches covering over 20,000 samples in 24 months.
We have developed a convenient, high-throughput determination of phospholipid fatty acids, using a robot-based automated system combined with GC. Use of this method resulted in the reduction of the analytical burden and time. This method promises significant advantages for completing large sample numbers in major epidemiological studies.
Three parallel automated systems, which have proved to be both robust and user-friendly, are currently performing analysis of 90 samples plus standards and QC samples per day. The analytical method described here has sufficient reproducibility and long-term stability to be suitable for fatty-acid determination in plasma phospholipids for both epidemiological research studies and routine analysis. Furthermore, this method can easily be adapted to other samples, such as cell extracts, tissue homogenates, and food samples.
Sequential multipurpose sampler (MPS) systems (Gerstel GmbH & Co. KG, Mülheim an der Ruhr, Germany) were used for sample preparation, subsequent phospholipid hydrolysis, FAME production, and injection of the sample into the GC for chromatographic analysis. The MPS systems were equipped with appropriately sized motorized syringes and accessories suitable for the tasks to be performed. The function of the MPS systems was controlled either by stand-alone Maestro software (Gerstel GmbH & Co. KG) for sample extraction and solid-phase cleanup, or Maestro software integrated within Agilent ChemStation software (Agilent Technologies, Inc., Wilmington, DE, USA) for FAME preparation and subsequent analysis. GC analysis was performed using a gas chromatograph (7890N; Agilent Technologies), equipped with an FID and split/splitless injector system. The separation was performed on a capillary column 30 m in length, with internal diameter of 0.25 mm, and film thickness of 0.2 μm (J&W HP-88; Agilent Technologies). A multi-tube vortexer (IKA Werke Gmbh & Co KG, Staufen Germany) and a refrigerated centrifuge (MSE Ltd, London, UK) were used for the manual liquid-liquid extraction. A vacuum manifold was used to assist the manual SPE, and a vacuum evaporator (AES2010; Savant Instruments Inc., Holbrook, NY, USA) was used to evaporate the solvents for the conventional method.
We used analytical reagent-grade chemicals and solvents: sodium chloride, chloroform, n-hexane, and 14% boron trifluoride (BF3)/methanol solution (Sigma-Aldrich,, St Louis, MO, USA). Methanol and acetone were HPLC grade (Thermo Fisher Scientific Inc., Rockford, IL, USA). All FAME standards (for complete list of fatty acids analyzed with full IUPAC names, see Additional file 1, Table S2) were were commercial grade (Supelco, Bellefonte, PA, USA). Aminopropylsilica 100 mg SPE cartridges (BondElut; Agilent Technologies) were used for the conventional method and Na2SO4 50 mg/NH2 100 mg SPE cartridges (BE Gerstel; Agilent Technologies) were used for the automated method. The QC samples used in this study were QC1, which was normal human plasma (mixed gender, pooled; PLH-123-F; Sera Laboratories International Ltd, Haywards Heath, West Sussex, UK) and QC2, which was normal pooled horse plasma (S-121-F; Sera Laboratories International). The QC1 sample was chosen to represent the samples of the application study , while the QC2 sample was chosen to be significantly different from QC1.
A series of working standards containing 37 FAMEs were prepared by accurately transferring 0.01, 0.05, 0.1, 0.5, and 1.0 ml each of the following individual standards and mixture of standards to glass vials: 37 mix FAME standard (47885-U; Supelco), C22:5n3 FAME (0.6 mmol/l), C22:4 FAME (0.75 mmol/l) and C22:5n6 FAME (0.6 mmol/l). C4:0 and C6:0 FAMEs presented in the mixture of 37 FAME standards overlapped with the solvent peak, and C22:3n3 and C20:4n6 did not separate under the chromatographic conditions used, leaving 37 FAMEs for quantification. The contents of the vials were evaporated to dryness under a stream of nitrogen, and then reconstituted in n-hexane (1 ml) to yield a series of the 37 FAME mixtures as the standards for GC calibration (for the complete list of all 37 fatty acids analyzed, see Additional file 1, Table S2).
Sufficient volumes of each QC material were homogenized, and aliquots of QC materials were transferred into cryo-tubes and stored at -80°C before analysis. QC1 and QC2 samples were analyzed in each batch to monitor inter-assay variation.
The Folch extraction for total lipids and the isolation of phospholipid fraction (based on Burdge et al.), performed by both the conventional and automated methods, are described below.
Aliquots of thawed plasma and QC samples (125 or 250 μl) were transferred to disposable glass tubes (16 × 100 mm). All sample volumes were made up to 0.5 ml with saline (0.9% w/v), then 1.0 ml methanol and 2.0 ml chloroform were added to extract total lipids from samples. The tubes were placed in a multi-tube vortex mixer, and mixed for 10 minutes at 1,200 rpm. Following this, 0.5 mlsodium chloride solution (1 mol/l) was added to the sample mixture, which was mixed by vortex for a further 2 minutes at 1200 rpm. Subsequent centrifugation at 2,500 rpm (1000 g) for 10 minutes was used to separate the organic and aqueous phases. The bottom chloroform layer was quantitatively transferred to another disposable glass tube (11 × 75 mm), then the tubes were placed in a vacuum evaporator for 45 minutes at 40°C to evaporate the solvent to near dryness.
Total lipid extract was dissolved in1.0 ml dry chloroform, and mixed by vortex. The sample was loaded on to a 1 ml aminopropyl SPE cartridge and allowed to slowly pass through the cartridge under gravity. Once the liquid meniscus reached the top of the SPE cartridge, the remaining liquid in the adsorbent bed was removed under vacuum. The SPE cartridge was then washed under vacuum with 2.0 ml chloroform. The phospholipid fraction was eluted into a 4 ml sample-collection vial with 2.0 ml of methanol chloroform (40:60 v/v) under vacuum, and the eluate was evaporated to dryness in a vacuum evaporator at 40 C. The 4 ml vials were capped and stored at -20°C until required for derivatization and analysis.
The automated sample extraction and SPE method was constructed to replicate the existing manual method as far as possible, within the limitations of the robotic system,. The main limitation of the automated system was the ability to control only a single syringe, which necessitated extra syringe wash steps and the use of acetone as a co-solvent when changing between immiscible solvents, typically chloroform and water. In addition, vials of sizes appropriate for the hardware and the liquid volumes used at each stage were substituted for the disposable glass tubes used in the manual method. The plasma, saline, and methanol/chloroform mixtures were prepared off-line in 6 ml crimp-cap sealed vials. and the intermediate and finished products in 4 ml crimp-capped sealed vials (Chromacol; Esslab UK, Hadleigh Essex, UK).
Set out below is a brief, step-by-step representation of the automated SPE procedure using the MPS system (numbers in brackets correspond to those in Figure 3a).
Accuracy and precision of the automated sample-preparation method compared with the conventional manual method. (a) Correlation of mean values (%) of 19 fatty acids (Table S1) measured by conventional (n = 26) and automated (n = 26) methods. (b) Scatterplot of the fatty-acid average against the standard deviation for both methods, showing the differences in precision (n = 26 both groups; based on Van Batenburg et al. ).
The Shewhart quality control (QC) chart of 20-month individual measurements for phospholipid docosahexaenoic acid (DHA) (C(22,6n3)) and eicosapentaenoic acid (EPA) ((C(20,5n3)) in the QC material (QC1).
Multipurpose sampler (MPS) systems for automated sample preparation and derivatization of fatty acids of the phospholipid fraction from human plasma samples. (a) MPS single beam for phospholipid extraction. 1) Solid-phase extraction (SPE) MPS Beam; 2) syringe holder; 3) 1 mol/l saline reservoir; 4) solvent reservoirs; 5) three-position tray holder, 6) SPE cartridge tray; 7) SPE/blowdown; 8) vortex/centrifuge. (b)) Dual-beam MPS system for phospholipid hydrolysis, derivatization and injection. 1) Derivatization MPS beam; 2) derivatization syringe holder; 3) injection MPS beam; 4) injection syringe holder; 5) heated zone; 6) wash vials; 7) SPE/blowdown; 8) solvent reservoirs; 9) four-position tray holder; 10) agitator.
Pipette 250 μl thawed plasma into a vial. Add 250 μl 0.9% saline, 1.0 ml methanol, and 2.0 ml chloroform, then cap the vial. Repeat for 28 samples.
Pipette 500 μl 0.9% saline into a vial. Add 1.0 ml methanol and 2.0 ml chloroform, then cap the vial. This vial forms the process blank.
Pipette 250 μl thawed pooled human plasma into a vial. Add 250 μl 0.9% saline, 1.0 ml methanol, and 2.0 ml chloroform, then cap the vial. This vial is the QC1 sample.
Pipette 250 μl thawed horse plasma into a vial. Add 250 μl 0.9% saline, 1.0 ml methanol, and 2.0 ml chloroform, then cap the vial. This vial is the QC2 sample.
Shake all vials for 10 minutes in an orbital shaker .
Add 500 μl saline 1 mol/l by from .
Shake for 30 seconds on .
Centrifuge at 2,700 rpm (500 g) for 5 minutes to promote phase separation on .
Aspirate 1,600 μl of the lower chloroform layer, and transfer to a clean vial by from .
Dry the crude extract under a stream of nitrogen at 55°C on .
Reconstitute the crude extract in 2.0 ml dry chloroform by from .
Pass the crude extract through a 1 ml aminopropyl silica cartridge on .
Wash the cartridge with 2.0 ml dry chloroform by from .
Remove excess solvent from the sorbent bed by flushing with 4 × 2.5 ml aliquots of air on .
Elute the plasma-phospholipid fraction using 2.0 ml methanol/chloroform 40% v/v by from .
Recover remaining elution solvent from the sorbent bed by flushing with 4 × 2.5 ml aliquots of air by from .
Blow the phospholipid fraction dry under a stream of nitrogen at 55°C on .
Store the vials containing the phospholipid fraction at -20°C until required.
A schematic diagram of the timeline of the SPE analysis is shown (see Additional file 1, Figure S4).
A dual-rail preparation station (Gerstel MPS Prepstation; Gerstel GmbH & Co. KG) was located on a GC (7890N; Agilent Technologies). The lower rail was configured to perform the on-line phospholipid hydrolysis and FAME-derivative preparation, and the upper rail was configured to perform sample injection. For each experiment, 32 vials (4 ml each; comprising 29 dried phospholipid extracts, process blank, QC1 & QC2) were manually loaded on the Gerstel automation platform. Derivatization reagent (500 μl of 14% BF3/methanol solution), which both hydrolyses the phospholipids and forms the methyl esters of the liberated fatty acids, was added to the vials. The vials were incubated at 75°C for 45 minutes to yield the crude FAME derivatives. After the addition of 1 ml hexane to extract the FAMEs and 1 ml water to decompose any unreacted boron trifluoride and to scavenge any polar impurities, the vial was shaken to complete the FAME extraction. A portion (600 μL) of the upper hexane layer was transferred to a 1.5 ml high-recovery GC vial and evaporated to dryness. FAMEs were reconstituted in hexane 100 μL as the final sample solution. A 1 μL aliquot of this sample solutionwas injected into the GC split injector (split ratio 20:1) for GC analysis, using the following conditions: helium carrier 1.5 ml/min, oven temperature profile initially 120°C for 1 minute, then ramped to 170°C at 10°C/min, held for 6 minutes, and finally raised to 210°C at a rate of 3°C/min and held for 1 minute. The injector temperature was maintained at 250°C and the detector temperature maintained at 300°C. A post-run period (235°C for 3.5 minutes at 2.5 ml/min) was used to eliminate possible interferences. The total run time was approximately 30 minutes.
Separation of the 37 FAME standards was carried out using a GC capillary column (HP-88; Agilent Technologies). In the chromatogram, all compounds in the standard mixture were well resolved (see Additional file 1, Figure S1) with the exception of C20:3n3 and C20:4n6, which co-eluted, however, the level of C20:3n3 in human samples is negligible, and therefore we annotated this peak as C20:4n6 . A representative plasma chromatogram separated on the HP88 column (see Additional file 1, Figure S2) showed that the cis/trans isomers and highly unsaturated fatty-acid mixtures were fully separated from the sample. A process blank chromatogram (see Additional file 1, Figure S3) was used to monitor any fatty acids contamination from chemicals, glassware, and the sample-preparation process. The process blank values (mainly trace levels of C14:0, C16:0, and C18:0) were deducted from the calculation of the plasma phospholipid fatty-acid results. Data collection and integration were performed with Agilent ChemStation software on a desktop computer.
Set out below is a brief, step-by-step representation of sample hydrolysis and derivatization by the automated method using the MPS dual-beam system (numbers in brackets correspond to Figure 1b).
Add 500 μl 14% BF3/MeOH solution to a vial containing the dried phospholipid fraction by from .
Transfer vial to heated zone at 75°C and allow to react for 45 minutes .
Remove vial from heated zone and allow to cool to room temperature .
Add 1 ml hexane and 1 ml water by from .
Shake for 5 minutes .
Stand for 2 minutes to allow phases to separate .
Remove 600 μl of the hexane layer containing the FAMEs, and transfer to a vial from which the injection is to be made by from .
Dry the FAME extract under a stream of nitrogen at 35°C .
Reconstitute the extract in 100 μl hexane by from .
Inject sample into GC by .
A schematic diagram of the timeline of sample hydrolysis and derivatization is shown (see Additional file 1, Figure S5).
FAMEs in the samples were identified by comparison of their retention times with those of individual FAME standards. The palmitic acid methyl ester (C16:0) was used as a reference FAME. We measured the relative quantities of the 37 fatty acids, with each of the 37 analytes being measured as a percentage of the total fatty-acid signal.
Linear regression, mean, and SD were calculated(Excel™ 2010; Microsoft Corp., Redmond, WA, USA). The precision of the assay was defined as the CV of at least six repeats of the QC sample across as many batches. For direct comparison, the Student's t-test was used. Single-factor ANOVA) was used for comparing more than two mean values.
This study received financial support from the EU FP6 funded InterAct project (grant number LSHM_CT_2006_037197). It also research support from the Medical Research Council (Cambridge Lipidomics Biomarker Research Initiative G0800783) and financial support for the additional funding for equipment (MC_U106179471). We thank Dr Julian Griffin for his critical comments and suggestions on the manuscript.
LW, KS, and AK developed the study methodology; LW, KS, CC, IM, SY, and AK were responsible for data acquisition; AK, PP, ME, SY, and NF conceived of the study and participated in its design; SY, NF, and AK coordinated the study; LW drafted the manuscript; and KS, NF, and AK revised the manuscript. All authors read and approved the final manuscript for publication.
|
0.999992 |
The village of Valdarca belongs to the municipality of Pergola, in the province of Pesaro Urbino, region Marche.
The village of Valdarca is 6,70 kilometers far from the same town of Pergola to whom it belongs.
To the municipality of Pergola also belong the localities of Barbanti (2,38 km), Bellaluce (2,14 km), Bellisio Alto (4,15 km), Bellisio Solfare (4,10 km), Ca' Fulvi (5,27 km), Ca' Ghilardi (4,47 km), Ca' Montegherardello (8,20 km), Caiolite (5,83 km), Campiferro (4,76 km), Canneto (7,70 km), Capuccini (7,76 km), Cartoceto (6,93 km), Case sparse (-- km), Casello (4,75 km), Castelrotto (7,31 km), Cerqueto (5,62 km), Certino (3,27 km), Cicula (4,95 km), Fenigli (6,96 km), Fontebona (8,30 km), Ganga (5,45 km), Grifoleto (1,07 km), La Rota (2,87 km), Lanaro (4,85 km), Luchino (3,53 km), Madonna del Piano (7,98 km), Madonna del Sasso (5,33 km), Mezzanotte (3,14 km), Montaiate (6,60 km), Monterolo (5,18 km), Montesecco (7,05 km), Montevecchio (7,61 km), Osteria del Piano (2,71 km), Pagino (3,33 km), Pantana (2,07 km), Pantana Serralta (2,13 km), Passo Monterolo (4,33 km), Percozzone (4,37 km), Pian dell'Abate (7,10 km), Ponte della Simonetta (1,57 km), San Pietrello (1,80 km), Serraspinosa (3,47 km), Traforato (7,34 km), Vallerea (2,36 km).
The number in parentheses following each village name indicate the distance between the same village and the municipality of Pergola.
The banks in Valdarca, when available.
The parishes in Valdarca, when available.
The pharmacies in Valdarca, when available.
Weather and weather forecast for the municipality of Pergola, to whom Valdarca belongs.
Hotels in Valdarca and its surroundings.
Free ads in Valdarca and in its province and region too.
Map and road map of Valdarca.
A selection of videos about Valdarca.
In the hamlet of Valdarca there is no bank.
Please look at the closest banks in the town of Pergola, to whom Valdarca belongs.
There is no pharmacy in the hamlet of Valdarca.
Please look at the closest pharmacies in the town of Pergola, to whom Valdarca belongs.
There are no parishes in Valdarca.
Please look at the closest parishes in the town of Pergola, to whom Valdarca belongs.
Weather and weather forecast for Pergola, to whom Valdarca belongs.
Hotels, Resorts, B&B in Valdarca and its neighborhoods.
Most recent free ads in Valdarca, municipality of Pergola, province of Pesaro Urbino, Marche region, updated at 15:03:22, 18 April 2019. Place your free ad on Valdarca: no registration needed. Place your free ad.
Look at the interactive map of Valdarca and get the road maps, the satellite maps and the mixed ones too. Interactive maps of Valdarca also allow an immediate view of: bar,restaurants,pubs,pizzerias,dancing,night clubs,banks,jewellers,beauty centers,hair stylists,supermarkets,pharmacies.
Several videos about Valdarca, Pergola, Pesaro Urbino, Marche.
|
0.999984 |
167 sysheaderopt = "" # how do we indicate that a header is a system header. Use "" for no action.
171 cc_flags = "-fPIC -ansi -wd161 -w1 -vec-report0 -DBLOCKTIMER -DCORE_ID1"
172 cc_optim = "-O3 -ftz -IPF_ftlacc- -IPF_fma -fno-alias"
173 cc_debug = "-g -O0 -DDOASSERT -DDOPROF -DBOUNDS_CHECK"
174 omp_optim = "-openmp -openmp_report0"
175 omp_debug = "-openmp -openmp_report0"
182 cc_flags = "-pedantic -Wall -fPIC -ansi -ffast-math -Wno-unknown-pragmas -DBLOCKTIMER -Wno-sign-compare -Wno-system-headers -Wno-long-long"
185 cc_debug = "-g -O0 -DDOASSERT -DDOPROF -DBOUNDS_CHECK"
189 pedantic = "-pedantic-errors -Wno-long-long"
191 sysheaderopt = "-isystem "
194 cc_flags = "/FD /EHsc /GR /wd4068 -D_USE_MATH_DEFINES -DDLL_NETCDF"
195 cc_optim = "/O2 /Op /MT /W3"
196 cc_debug = "/Od /RTC1 /MTd /ZI -DBOUNDS_CHECK"
467 if env['useumfpack'] and not conf.CheckFunc('daxpy'): env['useumfpack'] = 0 # this does not work on shake73?
552 print "Summary of configuration (see ./config.log for information)"
553 print " Using python libraries"
554 print " Using numarray"
555 print " Using boost"
556 if env['usenetcdf']: print " Using NetCDF"
557 else: print " Not using NetCDF"
558 if env['usevtk']: print " Using VTK"
559 else: print " Not using VTK"
560 if env['usemkl']: print " Using MKL"
561 else: print " Not using MKL"
562 if env['useumfpack']: print " Using UMFPACK"
563 else: print " Not using UMFPACK"
564 if env['useopenmp']: print " Using OpenMP"
565 else: print " Not using OpenMP"
566 if env['usempi']: print " Using MPI"
567 else: print " Not using MPI"
568 if env['useparmetis']: print " Using ParMETIS"
569 else: print " Not using ParMETIS (requires MPI)"
570 if env['usepapi']: print " Using PAPI"
571 else: print " Not using PAPI"
572 if env['usedebug']: print " Compiling for debug"
573 else: print " Not compiling for debug"
575 if ((fatalwarning != "") and (env['usewarnings'])): print " Treating warnings as errors"
576 else: print " Not treating warnings as errors"
|
0.808687 |
Maharashtra is the third largest state of India. It is known as the land of saints, educationists and revolutionists, teachers, doctors, actors, actresses, film makers, notable among them being Mahadev Govind Ranade, Swatantraveer Savarkar, Savitribai Phule, Bal Gangadhar Tilak, Dadasaheb Phalke, Dada Kondke and many others. It has a long history of Marathi saints of Varakari religious movement, such as Dnyaneshwar, Namdev, Chokhamela, Eknath and Tukaram which formsthe one of bases of the culture of Maharashtra or Marathi culture. Maharashtra is also known for its purogami culture which translates as reformist or forward culture which was started by earlier saints and led by Mahatma Phule, Shahu Maharaj, Babasaheb Ambedkar in modern times. Maharashtra has huge influence all over the world of 17th-century King Chatrapati Shivaji Maharaj of Maratha Empire and his concept of Hindavi Swarajya which translates to self-rule of people.
The state of Maharashtra spans multiple cultures which includes cultures related to Hindus, Muslims, Buddhists, Sikhs, Christians, etc. Lord Ganesha and Lord Vitthal are the traditional deities worshipped by Hindus of Maharashtra.
Maharashtra is divided into various regions, such as Marathwada, Vidarbha, Khandesh, and Konkan. Each has its own cultural identity in the form of different dialects of Marathi language, folk songs, food, and ethnicity.
About 79% of Maharashtrians are Hindu, and there are significant Muslim, Christian and Buddhist minorities. The Maharashtrian culture consists of people from all a vast majority of religions. Due to it being huge areawise, many sub-regional cultures also exist in Maharashtra. The sub region of Vidarbha, was earlier a part of Madhya Pradesh, hence it has that influence upon its culture. There are many temples in Maharashtra, some of which are thousands of years old. These temples are constructed in a fusion of architectural styles borrowed from North and South India. The temples also blend themes from Hindu, Buddhist and Jain cultures. The temple of Vitthal at Pandharpur is the most important temple for the Varkari sect. Other important religious places are the Ashtavinayaka temples of Lord Ganesha, Bhimashankar which is one of the Jyotirling (12 important Shiva temples).
Near Aurangabad are UNESCO World Heritage Sites and famous tourist attractions. Mughal architecture can be seen in the tomb of the wife of Aurangzeb called Bibi Ka Maqbara located at Aurangabad. Mumbai is the capital of Maharashtra and has humid climate throughout the year. The Gateway Of India, Chhatrapati Shivaji Terminus, Shaniwar Wada, Agakhan Palace and Deekshabhoomi are some of the historical monuments.
Maharashtra has a large number of hill, land and sea forts. Forts have played an important role in the history of Maharashtra since the time of the Shivaji Maharaj. Some of the important forts in Maharashtra are Shivneri, Raigad, Vijaydurg, Pratapgad, Sinhagad. The majority of the forts in Maharashtra are found along the coastal region of Konkan and the adjoining Sahyadri ranges.
Marathi Hindus revere many religious figures. Among the figures who originated in the region are Banka Mahar, Bhagu, Damajipanth, Kanhopatra, Karmamelam, Nirmala, Sadna, Sakhubai, Satyakam Jabali and Soyarabai.
The people of the state wear different colorful types of costumes, and there is variation in dance and music according to people's specific localities. Dance forms like Powada, Banjara Holi Dance, Lavani, and Koli are popular in Maharashtra.
Traditional clothes for Maharashtrian males include the dhoti, also known as Dhotar, and pheta, while a choli and nine-yard saree locally known as Nauwari saadi or Lugda is for women. Traditional clothing is famous in rural areas while traditional people from cities also wear these clothing. These clothes are worn by Maharashtrians while performing various festivals.
Vada Pav is one of the original dishes of Maharashtra.
Sweet foodstuffs like Puran Poli and Shrikhand are considered to have originated from Maharashtra.
The Konkan and Varadi cuisines are popular with tourists. The specialty dishes of Maharashtran cuisines are often strong in pepper and spice; well-known dishes include vada pav, misal pav and Mumbai chaat and puneri missal, selucha chana.
^ "Sant Bhoomi Maharashtra". Retrieved 21 November 2015.
^ "Maharashtra forward culture". Retrieved 21 November 2015.
^ "Shivaji Maharaj, Founder and an Ideal ruler of Hindavi Swarajya". Retrieved 21 November 2015.
^ "Maharashtra latest caste/religionwise population demographics". July 2016. Retrieved 15 September 2017.
^ "Important facts about Vidarbha".
^ "Temples of Maharashtra". Retrieved 15 September 2017.
^ "Top 12 Shiva temples in Maharashtra". Retrieved 15 September 2017.
^ "Ajanta Caves". Retrieved 15 September 2017.
^ "Ellora Caves". Retrieved 15 September 2017.
^ "Bibi Ka Maqbara". Retrieved 15 September 2017.
^ "Top 25 monuments in Maharashtra". Retrieved 15 September 2017.
^ "Folk dance forms of Maharashtra". Retrieved 15 September 2017.
^ "Vidhi Jhaveri" (August 2017). "Traditional Maharashtrian dresses". Retrieved 15 September 2017.
^ "Food diaries: Maharashtra food and cuisine". Retrieved 15 September 2017.
This page was last edited on 25 March 2019, at 16:57 (UTC).
|
0.999457 |
If you are not already aware, AI stands for Artificial Intelligence. It has long become part of our everyday lives and looks set to have an even greater impact in the near future. There are even other applications of AI such as machine learning and deep learning which has paved the way for many of the opportunities which we are now presented with. For example, in 1997, the world chess champion Garry Kasparov was defeated by an AI under tournament conditions. This proves to us just how advanced an AI can potentially be. Here are just some of the ways in which an AI can actually better our lives and working environment.
AI has brought so much ease to our daily lives and become such a common phenomenon that often we do not even realise its presence. An obvious example of this would be the automated Global Positioning System (GPS) system which we have in cars. These have proven to be extremely useful in helping us find our way around unfamiliar estates and neighbourhoods. Recent advancements have even equipped programmes such as Siri with speech recognition, allowing them to detect our voices and execute technological commands accordingly.
Robots enhanced by machine learning can be programmed to conduct security patrols and surveillance checks autonomously. These security robots such as the ones developed by Knightscope can even be deployed in more dangerous terrains for military reconnaissance purposes. This helps to greatly reduce the number of human casualties associated with such dangerous missions. In addition, these robots are even able to perform humanly impossible tasks such as exploring the ocean floor and conducting mining operations.
Another salient benefit which an AI brings would be its ability to perform monotonous tasks with flawless accuracy. Human errors resulting from the performance of repetitive tasks can be completely eliminated. This also helps to free up manpower which can instead be used to perform more complicated tasks, increasing our work efficiency. Digital assistants also have been created through deep learning. An inherent benefit of such an assistant would be their lack of emotions which allows them to “think” rationally and make the right programme decisions.
The technological prowess of AI has improved by leaps and bounds over the years providing us with endless possibilities. Rather than resent them for taking away our jobs, we should instead embrace the benefits which it can bring to us. We could use this as an opportunity to upgrade our skills and take on more cognitively challenging tasks.
|
0.996218 |
Generate names for your tour business below.
Hey, I’m Ashley (Branding Expert) and I’m going to guide you through our four steps to name your tour business. Below you’ll find twenty example names I created in this process and next, I’ll show you how you can create your own. To get started try our tour business name generator above and then scroll below to find the first step in the naming process.
This four-step process will help you name your tour business. In this example, I’m creating a name for a tour business that provokes curiosity, suggests a wide range of options and appeals to those who already have the travel fever.
Start by brainstorming what words could fit into your business name. In my name ideas, I used words exploration, globe, nomad, conquest, planet, magical and dazzling. These aren’t used to describe the beauty of a destination. Rather, the aim of the adjectives is to highlight an experience, a memory people could form by opting for the respective service.
You’ll now have a list of 3-6 great tour business names and you can start to ask potential customers or people working in the industry for feedback (your target audience). Avoid feedback from family and friends. These people are more likely to praise all your ideas and they aren’t your customer.
Does it sound like a professional business or service?
This name conveys a sense of community and comradery – both very important for travelers.
This name conveys beauty, excitement and a chance to form memories via a service.
This name conveys a sense of adventure and a desire to explore the world.
This name conveys fun and exciting experiences, a range of portfolio options that everyone would want to explore.
At this point, it’s good to have at least three great tour business names on your list, in case your any of your names are already taken. You can do a quick Business Name Search online to find out if you’re name is available within your country/state, also be sure to search if the name is also available for Trademark and Domain name Registration.
To help you brainstorm potential business names, let’s take a look at three successful Tour businesses and break down why and how they’ve chosen to name their business and why it works for them.
CostSaver adopts a pretty unique approach towards name selection. This company makes it clear right from the start that it offers value tours. Because the nature of the service is clear right from the start, the name benefits the company by attracting a targeted crowd to the message.
MacBackpackers is another unique name that adopts a distinctive approach towards the establishment of a tour brand. To give you a bit of context – this is a travel company that offers backpacking tours throughout Scotland. The name is casual, fun, different and relevant at the same time.
Absolute Africa tells the world the company’s biggest strength and the area of specialization. This is one of the leading tour operators that organize African adventures for customers. The name has a confident, definitive sound to it that establishes the company’s authority in the area.
A typical pitfall most businesses run into is describing their business name too literally, relying on overused tour words like adventure, trip, experience and luxury. A more effective business name should convey to customers your businesses and product values at a deeper level. Try name your business in a way that has a story behind it.
Let’s take for example a real tour business named Kompas.
The immediate link to the travel industry is easy to understand. Anyone who’s interested in adventures and trips knows what a compass is and how important such a device can be.
On a deeper level, however, the compass has become a symbol of freedom. It belongs to those who can’t settle in one place. The creative spelling adds even more to the originality of the message without having to describe what the business is all about.
Another mistake business owners typically make is creating bad word combinations when they find out that their business name idea is already taken. For example, John names his business Planet Explore and finds out it’s already taken. Because he’s decided this is what he’ll name his business he tries to opt for similar sounding names like PlanetXplore, PlXplore and Explo Planet.
Here’s the ultimate list of Tour related words you could use in your business name. Below is a list of trending, descriptive and action words that are often related to Touring.
Here are the top trending words used in Tour Company names.
You can use a verb in your Tour business name to create business names like ‘All Arranged Tours‘ or ‘Begin Tours!‘.
Don’t forget to give our tour company name generator a try!
|
0.999997 |
Not quite sure how to celebrate New Year's Day this year? Well, in that case, you need to make it a good one and an excellent way to do just that is by taking a trip to Charleston, SC.
What makes Charleston, SC such a wonderful location to visit for this holiday is the fact that there is such a wide array of things to both do and see throughout the city. It is one of the most historical places in not only the south, but the United States and some of the sights that you can take in while visiting this location is the USS Yorktown, the Civil War Walk, Charleston Waterfront Park, and if you want to see some wonderful homes and sights without having to drive or walk to them yourself, you can always go on a guided carriage tour.
You can pass the time too by enjoying a nice meal at any of the local restaurants and if you just want to take it easy, there are many spas to visit as well. Ultimately, Charleston is a great place to visit, especially on New Year's Day.
|
0.871041 |
Change build script to generate different BIOS ID to differentiate Minnow3 and Benson Glacier board.
echo "Usage: BuildBIOS.sh Build_Flags [PlatformName] Target_Flag"
+ echo " Build_Flags: /MN Minnow3 Board (default: MN)"
+ echo " Build_Flags: /BG Benson Glacier Board"
echo " Build_Flags: /A Set FabId to A (default: FAB_B)"
@@ -178,7 +191,11 @@ echo. & echo -- Setting compiler to %Compiler% -- & echo.
@@ -7,6 +7,7 @@ set "Build_Flags= "
@@ -139,8 +151,8 @@ echo.
echo Error - Unsupported PlatformType: !Platform_Type!
- copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_B\SpiChunk1.bin .
- copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_B\SpiChunk2.bin .
- copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_B\SpiChunk3.bin .
- copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_A\SpiChunk1.bin .
- copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_A\SpiChunk2.bin .
- copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_A\SpiChunk3.bin .
+ copy /y /b ..\..\Binaries\IFWI\BensonGlacier\FAB_A\SpiChunk1.bin .
+ copy /y /b ..\..\Binaries\IFWI\BensonGlacier\FAB_A\SpiChunk2.bin .
+ copy /y /b ..\..\Binaries\IFWI\BensonGlacier\FAB_A\SpiChunk3.bin .
+ copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_B\SpiChunk1.bin .
+ copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_B\SpiChunk2.bin .
+ copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_B\SpiChunk3.bin .
+ copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_A\SpiChunk1.bin .
+ copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_A\SpiChunk2.bin .
+ copy /y /b ..\..\Binaries\IFWI\MinnowBoard3\FAB_A\SpiChunk3.bin .
|
0.998402 |
You are the monkey prisoner in the zoo, your task is to catch every banana that the zookeeper throws at you. If you miss it the banana will hit the floor and if you run on it you’ll slide and lose one life. You need to try to dodge the red pepper because it will burn you and you’ll die.
|
0.937027 |
Died On: September 12, 2013(2013-09-12) (aged 80)\nSan Francisco, California, U.S.
Ray Dolby was bornon January 18, 1933 in United States, is Founder and director emeritus, Dolby Laboratories Inc. (Cl A)Founder and director emeritus, Dolby Laboratories Inc. (Cl A). Audio tech titan Ray Dolby died on Sept. 12, 2013 after suffering from Alzheimer's Disease and acute leukemia. He was 80.The founder of Dolby Laboratories, he played clarinet as a child and became fascinated with reed vibrations. Audio and video company Ampex hired him at age 16 to develop electrical components of its tape recording system. He earned a Ph.D. in physics at the University of Cambridge. In 1963, Dolby took up a two-year appointment as a United Nations adviser in India, and then returned to London to found Dolby Laboratories in 1965. He made his fortune with audio-processing systems that eliminate background noise. The first inception of the system was used on the soundtrack of the 1971 hit "A Clockwork Orange." He took Dolby public in 2005. He is survived by wife Dagmar, who assumed control of the family's Dolby shares after Ray's death, and two sons.
Dolby was born in Portland, Oregon, the son of Esther Eufemia (née Strand) and Earl Milton Dolby, an Inventor. He attended Sequoia High School (class of 1951) in Redwood City, California. As a teenager in the decade following World War II, he held part-time and summer jobs at Ampex in Redwood City, working with their first audio tape recorder in 1949. While at San Jose State College and later at Stanford University (interrupted by two years of Army service), he worked on early prototypes of video tape recorder technologies for Alexander M. Poniatoff and Charlie Ginsburg. As a non degree-holding "consultant", Dolby played a key role in the effort that led Ampex to unveil their prototype Quadruplex videotape recorder in April 1956 which soon entered production.
In 1957, Dolby received his B.S. in electrical engineering from Stanford. He subsequently won a Marshall Scholarship for a Ph.D (1961) in physics from the University of Cambridge, where he was a Research Fellow at Pembroke College.
After Cambridge, Dolby acted as a technical advisor to the United Nations in India, until 1965 when he returned to England, where he founded Dolby Laboratories in London with a staff of four. In that same year, 1965, he officially invented the Dolby Sound System, a form of audio signal processing. His first U.S. patent was not filed until 1969, four years later. The filter was first used by Decca Records in the UK.
Dolby died of leukemia on September 12, 2013, at his home in San Francisco at the age of 80. Dolby was survived by his wife Dagmar, two sons, Tom and David, and four grandchildren. Kevin Yeaman, President and chief executive of Dolby Laboratories, said "Today we lost a friend, mentor and true visionary." Neil Portnow, President of the National Academy of Recording Arts and Sciences, said Dolby had "changed the way we Listen to music and movies for nearly 50 years" and that Dolby's "technologies have become an essential part of the creative process for recording artists and filmmakers, ensuring his remarkable legacy for generations to come."
In his will, Dolby bequeathed more than $52 million to Pembroke College at the University of Cambridge, the largest single donation received by the University's current fundraising campaign. In December 2017 it was announced that his family has donated a further £85m from his estate to Cambridge University's Cavendish Laboratory.
|
0.957593 |
2) Highly nutritional foods help to feed the joint and reduce inflammation.
You might not think it but being over weight can cause many joint issues, especially your knees. It’s simple when you think about it, the more weight you’re carrying the more your joints have to carry and that extra stress soon accumulates to pain. In regards to your knees in particular, it’s been medically proven that losing weight can eliminate knee pain as it’s thought that for every pound (lbs) lost, equates to 4 pound less load going through the knee with EVERY step, which is huge considering we are recommended to walk 10,000 steps everyday!
There is no secret ingredient to improving your joint health, the main thing to keep in mind is to eat healthy. Eating foods that are beneficial for joint health are generally the foods you’d eat if you were aiming to lose weight anyways. These are foods that are packed with nutrients to feed your body correctly while losing weight in the process which reduces the loading on the joint.
Oily fish like tuna, salmon, and mackerel are rich in omega-3 fatty acids, which help fight inflammation. This is especially good for arthritis suffers or any other inflammatory related issues. To get the full benefits I’d recommend adding fish to your diet 2-3 times a week.
Tart cherries are what we call a super food! These little gems have some of the highest anti-inflammatory and anti-oxidant levels out of all fruits. This basically means they help towards preventing pain occurring through inflammation and inhibits oxidation in the body, which is essentially an ageing process. These can be consumed as a snack or made into a drink, whichever you prefer.
Green vegetables are packed with vitamins K & C and are full of a compound called sulforaphane, which can help slow cartilage damage in the joints and prevent osteoarthritis. Broccoli is also rich in calcium, which is known for assisting bone health. Ideally, green vegetables should be consumed every day with at least one meal.
Chia seeds have the highest levels of omega 3 fats of any seeds, I’ve already touched on how omega 3 fights inflammation. Chia seeds are also rich in calcium and magnesium which promote healthy bones. Chia seeds are perfect to have with morning porridge and can be eaten every day.
Garlic contains a compound called diallyl disulfide which limits cartilage damaging enzymes. Studies have also shown that this compound reduces signs of early osteoarthritis. You can easily include garlic in most meals.
Tumeric is not necessarily a food but a spice. It contains an anti-inflammatory compound called curcumin which has been proven to be beneficial in the management and prevention of chronic inflammatory-related joint disease. I recommend using this spice liberally when cooking, it is used predominately in Indian type dishes.
3) Foods that are high in salt.
These foods/drinks contain substances that increase inflammation and cause you to gain unwanted weight which are detrimental to joint health.
|
0.978657 |
This review is from: On Modern Jewish Politics (Studies in Jewish History (Oxford Paperback)) (Paperback) The Litvaks (Litwaks, LITVAKES in Yiddish) were long the objects of not only Endek but also Jewish preoccupation: "...in the Jewish world of Eastern Europe these Litvaks were celebrated--or damned--for their well-known tendencies toward modernization, secularization, radicalism, and the logical extension of all this, namely, modern nationalism." (p. 42).
Although Mendelsohn devotes much of his work to condemning Polish anti-Semitism, he comes to a point where he cuts the Poles some slack: "How could a Polish state successfully cope with a huge non-Polish population comprising something in the nature of 40 percent of all its citizens?" (p. 131). Before touching on the state of Israel, Mendelsohn senses a bit of hypocrisy in Jews attacking Poland when they never were in a position of having to deal with recalcitrant minorities: "It is easy to accuse certain Poles--and even the interwar Polish state--of chauvinism...But Jews of the national persuasion--Bundists...or Zionists...can hardly be accused of such crimes and misdemeanors as they ruled over no one." (p. 112).
Interestingly, the author sees the use of Yiddish, by religious as well as secular Jews, not so much an end in itself as a means by which Jews enforced their aggressive separatism (or what I call self-imposed apartheid): "The famous Chinese wall separating Jew from gentile...at least in Eastern Europe, a devotion to Yiddish, not because this language was regarded as a basis of modern secular Jewish nationalism but because its preservation reduced the likelihood of close contacts with the non-Jewish world." (pp. 23-24).
The author prefers the term integrationism to assimilation. Mendelsohn believes that Jews failed to integrate more into Polish society not only because of Polish hostility and Jewish separatism, but also because of Poland's situation: "A backward social structure dominated by remnants of the old aristocracy, the established church, and the peasantry is not one that will facilitate Jewish integration." (p. 39). However, Mendelsohn tacitly agrees with the Endek premise that integration into Polish society does not necessarily make a Pole out of a Jew: "But this was usually a case of acculturation without integration--the worst of all worlds, and no victory for the Poles and Romanians of the Mosaic faith." (p. 117). Interestingly, Mendelsohn contends that Jewish nationalists generally agreed with Dmowski and the Endeks that Jews were not, and could never, become Poles. (p. 19).
As in many of his other works, Mendelsohn shows that Jewish support for Communism went far beyond membership in the tiny, outlawed Communist party. Isaac Bashevis Singer is quoted as calling Poale Zion Communist. (p. 53). In 1920, the Poale Zion split into pro-Communist and anti-Communist factions (p. 69), and the Bund, which Mendelsohn identifies as a Marxist organization (p. 72), lost some of its members to Communism. (p. 69).
Antisemitism by itself cannot be the main reason that Jews found Communism appealing. After all, the political left had been anti-Semitic in its hostility to Jews as a capitalist class. (p. 96). Karl Marx was one of the left-wing heroes and martyrs of Jewish origin, "...whose blatant and inconvenient anti-Semitism was ignored or explained away." (p. 32).
As for combatting bigotry, Jewish Communists found bigotry by Jews as objectionable as bigotry against Jews. The author quotes Sydney Hook, who saw Jewish Communists as, "`...a vanguard, liberated from the exclusionist and chauvinistic principles of their forefathers...'" (p. 97). Mendelsohn (pp. 98-99) elaborates on this theme, and adds, "Hatred in this context means, among other things, hatred of the gentile, the drunken and violent GOY of the Jewish imagination. Judaism, at least the Judaism as shaped by the rabbis, meant despising the non-Jew..." (p. 99).
Was it, in the end, all about the Jewish acquisition of power and influence? Mendelsohn thinks so, albeit in a positive sense: "The alliance with the gentiles signified not only comradeship but also power...For Jews on the left the longed-for alliance with the international working class signified their transformation from a despised and powerless minority into an integral part of a mighty force, potentially the majority of mankind." (p. 100).
|
0.933717 |
Are You an Investment Fox or Hedgehog?
Do you invest like a fox or hedgehog?
The book that I am reading now, Invest Like a Fox... Not Like a Hedgehog by Robert Calson, has an interesting idea that how you invest depends on whether you have a fixed mindset or if you have an adaptable methodology to investment.
One thing that struck me when reading the book is that there has been a popurri of methods and hypothesis which investors have clung to despite it being no longer true or effective. Like the January effect.
Once the methods become widely known, any advantages in being able to predict market movements will become useless as everyone in the know will know and act on it.
But what if it is an indicator of cyclical trend? Like the leading economic indicators are a good predictor of impending recession and a market crash. Even if people know about it, the recession will still come and stock markets will still fall.
For an indicator of an general up trend, the price earnings ratio of the entire market under study will be a good gauge. When it is near or below 10, it is a good time to think of buying in. If you have the gumption to do so. That's a big "if".
Then you keep buying in small amounts no matter what indicators are saying. As indicators could fail, so hedge your bets.
|
0.975443 |
Zak Hardaker is once more facing an uncertain future after being charged with drink driving.
The 2015 Man of Steel has yet to play a game for his new club but his career could be thrown into jeopardy after Wigan announced on Thursday that he will appear in court on October 11.
Hardaker, who is still serving a 14-month ban for cocaine use, has been charged with driving while under the influence of alcohol, driving while uninsured and driving without an MOT.
A statement issued by West Yorkshire Police said: “Police have charged a 26-year-old man from Pontefract with driving whilst under the influence of drink, driving whilst uninsured and driving without an MOT.
The hearing is just two days before the Grand Final, for which Wigan are in contention, and will provide a stark reminder of Hardaker’s plight 12 months ago when he was stood down by Castleford on the eve of their Old Trafford showdown with Leeds.
That followed a positive drugs test in September which led to his sacking by the Tigers and eventually suspension by UK Anti-Doping.
Wigan announced in May that they had signed the former Leeds and England player on a three-year deal, with chairman Ian Lenagan pointing out that Hardaker, who has a history of misbehaviour, was being given one last chance.
Wigan parted company with Joel Tomkins following a breach of discipline earlier this year and Hardaker, who has started training with his new club, must be fearing for his future.
It is not the first time that Hardaker, who has been signed as straight replacement for Sam Tomkins, has been in trouble.
He was thrown out of England’s World Cup camp in 2013 for a breach of discipline and in 2015 agreed to pay £200 in compensation and write a letter of apology to a 22-year-old man under a “community resolution” after admitting assault.
|
0.999996 |
David Bisbal Engaged to Novia Rosanna Zanetti — "She Said Yes!"
Spanish Singer David Bisbal Is Engaged to Longtime Girlfriend Rosanna Zanetti!
Congratulations are in order for David Bisbal — or should we say "enhorabuena." The Spanish singer just announced his engagement to longtime girlfriend Rosanna Zanetti! David shared the exciting news on Instagram — along with a photo of the stunning ring.
"Estoy feliz de compartir con vosotros que llegó un día muy especial… le hice la pregunta y… ¡me contestó que sí" he wrote, which translates to, "I am happy to share with everyone that a very special day has arrived… I asked her the question and she said yes!" The Venezuelan model also shared the good news on her personal page, adding, "This and a thousand more lives I would tell you yes." Rosanna, 29, made her social media debut with the "Buleria" singer in early 2016 — and the couple has been inseparable ever since.
"Congratulations, I'm very happy for you, you are a super cute couple," one fan commented following the announcement. Another wrote, "Much happiness for you both, you deserve it." Previously, David opened up about his now-fiancée and revealed he was happier than ever. "She is very hardworking, very intelligent, and above all, a very good person," he said on the Spanish TV show ¡Qué Tiempo tan Feliz! "I have had a lot of luck. She is a woman who makes the best version of me present."
While this is a happy time for the newly engaged pair, Rosanna recently spoke out the ongoing crisis in her home country of Venezuela and revealed she was kidnapped eight years ago. "I suffered a so-called 'express kidnapping', and it was the four most eternal and horrible hours of my life," Rosanna said in a viral video clip. "A lot of people ask me if the situation in Venezuela is as bad as it is portrayed in the newspapers and on TV, and my answer is always ‘no, it is not that bad, it is worse, it is much worse.'"
David, 38, has never been married before, but he does share a daughter Ella with ex-girlfriend Elena Tablada, whom he dated for six years before calling it quits in 2011. He has also been linked to singer Chenoa and actress Eugenia Suárez. Congrats again to the happy couple!
Mexican Telenovela 'Rebelde' Rumored to Be Making a Comeback in 2018!
|
0.981827 |
Irish security policy : neutrality, non-aligned or 'sui generis'?
In this century the Irish have claimed, at critical moments, that they were neutral and that they have established a policy of traditional neutrality. In the last generation they have also claimed, on occasion, to be nonaligned. These claims are tested by identifying the true nature of neutrality and variables by which a state's claim to be neutral can be assessed, and by identifying the essence of nonalignment. That essence is inapplicable to developed European states. Given that neutrality per se can only apply in time of war, the variables are adjusted to reflect a peacetime policy 'for neutrality' in the event of war. For this purpose the model presented by three European neutral countries is examined and used to generate variables against which to test the Irish claims. The identified variables are: (i) due diligence with respect to neutral rights and duties; (ii) the extent to which Irish claims have been recognised by others; (iii) the disavowal of help by them and; (iv) the extent of their freedom of decision and action. In addition, and partly reflecting the claim to non-alignment, two other variables are used: (v) lack of isolationism, willingness to ameliorate world problems, and impartiality and; (vi) the attitude to identity, nation- building, unity, stability and self-determination. Ireland has consistently failed to meet the criteria associated with either 'of' or 'for' neutrality, whilst its record on variable (v) is mixed. Its concern with variable (vi) has been pervasive, but ineffectual. Nonetheless, Ireland has not been committed to co-belligerency, although neither non-aligned, neutral nor an alliance member. It is in a ‘sui generis’ position, particularly, but not only, within the European Community.
|
0.924492 |
Stephen Douglas Kerr (born September 27, 1965) is an American professional basketball coach and former player who is the head coach of the Golden State Warriors of the National Basketball Association (NBA). He is an eight-time NBA champion, having won five titles as a player (three with the Chicago Bulls and two with the San Antonio Spurs) as well as three with the Warriors as a head coach. Kerr has the highest career three-point percentage (45.4%) in NBA history for any player with at least 250 three-pointers made. He also held the NBA record for highest three-point percentage in a season at 52.4% until the record was broken by Kyle Korver in 2010.
On June 2, 2007, the Phoenix Suns named Kerr the team's president of basketball operations and general manager. Kerr helped managing partner Robert Sarver buy the Suns in 2004 and became one of Sarver's trusted basketball advisors. Kerr announced his retirement from the Suns in June 2010. Afterwards, Kerr returned as a color commentator for NBA on TNT until 2014, when he pursued a career in coaching.
On May 14, 2014, the Golden State Warriors named Kerr the team's head coach. On April 4, 2015, with a win over the Dallas Mavericks, Kerr broke the NBA record for the most regular-season wins for a rookie coach. The Warriors went on to win the 2015 NBA Finals, making Kerr the first rookie coach to win a championship since Pat Riley in the 1982 NBA Finals. On April 13, 2016, the Warriors broke the record for the most wins in an NBA season, breaking a record previously held by Kerr's 1995–96 Chicago Bulls. The Warriors returned to the Finals for three straight years, losing in 2016 and winning again in 2017 and 2018.
Kerr was born in Beirut, Lebanon to Malcolm H. Kerr, an American academic who specialized in the Middle East, and his wife, Ann (Zwicker). He has three siblings. His grandfather, Stanley Kerr, volunteered with the Near East Relief after the Armenian Genocide and rescued women and orphans in Aleppo and Marash before eventually settling in Beirut. Kerr spent much of his childhood in Lebanon and other Middle Eastern countries. He attended Cairo American College in Egypt, the American Community School in Beirut, Lebanon, and Palisades High School (now Palisades Charter High School) in Los Angeles.
Malcolm Kerr was killed by members of the Shia Lebanese militia called Islamic Jihad on the morning of January 18, 1984 at the age of 52 while he was serving as president of the American University of Beirut. He was shot twice in the back of his head, by gunmen using suppressed handguns, in the hallway outside his office. Kerr was 18 years old at the time, and a college freshman; regarding his father's death, he has said: "Before my father was killed, my life was impenetrable. Bad things happened to other people." The Kerr family sued the Iranian government under the Antiterrorism and Effective Death Penalty Act of 1996. While warming up with the Arizona Wildcats for a game at arch-rival Arizona State in 1988, Kerr had to deal with many ASU Sun Devil fans in the crowd chanting "PLO" and "your father's history." Though tearful, Kerr led the Wildcats to victory, scoring 20 points in the first half, making all six of his three-point attempts. The athletic director of Arizona State, Charles Harris, sent a letter of apology to Kerr a few days later.
Kerr graduated from the University of Arizona in 1988 with a Bachelor of General Studies, with emphasis on history, sociology and English.
Minimally recruited out of high school, Kerr played basketball for the University of Arizona from 1983 to 1988. In the summer of 1986, Kerr was named to the USA Basketball team that competed in the FIBA World Championship in Spain. The team was the last American Men's Senior Team composed strictly of amateur players to capture a gold medal. He blew out his knee in the tournament, usually a career-ending injury, forcing him to miss an entire season (1986–87) at Arizona. After returning to the team, Kerr became a fan favorite due to his leadership, his ability to triumph in adversity, and long-range shooting. Virtually every time he got the ball, the Arizona fans would chant "STEEEVE KERRRR." It became a rallying cry. He helped the Wildcats reach the Final Four of the NCAA Division I basketball tournament in 1988 along with fellow All-American teammate Sean Elliott. Kerr also set an NCAA record for 3-point percentage in a season (114–199, 57.3%).
Kerr was selected by the Phoenix Suns in the second round of the 1988 NBA draft. He was traded to the Cleveland Cavaliers in 1989. He spent over three seasons (1989–1992) there and then part of the 1992–93 season with the Orlando Magic.
In 1993, he signed with the Chicago Bulls. The Bulls made the playoffs in the 1993–94 and 1994–95 seasons, but without Michael Jordan's presence for all of 1994 and much of 1995, the team could not advance to the Finals. However, with Jordan back full-time for the 1995–96 season, the Bulls set a then NBA-record of 72–10 and defeated the Seattle SuperSonics in the 1996 NBA Finals.
Kerr played a major part of the Bulls' championship victory in the 1997 NBA Finals against the Utah Jazz. In the final seconds of Game 6 with the score tied at 86, he took a pass from Jordan and hit the title-winner. The Bulls won, earning the franchise's fifth title. Kerr also won the 3-Point Shootout at the 1997 All-Star Game.
In the last minute of Game 2 of the 1998 NBA Finals against Utah, Kerr missed a 3-pointer, grabbed his own rebound and made a pass to Jordan who made a crucial three-point play, putting them in the lead for good. The play helped Chicago win the game and tie the series at 1. The Bulls won the series in 6 games.
In January 1999, Kerr was acquired by the San Antonio Spurs in a sign-and-trade deal with the Bulls, whereby Chuck Person and a first-round pick in the 2000 NBA draft was sent to Chicago. The Spurs reached 1999 NBA Finals and won their first NBA Championship with a 4–1 series victory over the New York Knicks. Kerr became one of two players to win four straight NBA titles without being a part of the 1960s Boston Celtics dynasty—the other being Frank Saul, who won four straight with Rochester and Minneapolis from 1951–54. Kerr and Saul are also the only two players in NBA history to have won two championships with two different teams in consecutive seasons.
Kerr was traded to the Portland Trail Blazers alongside Derek Anderson on July 24, 2001 in a deal that brought Steve Smith to the Spurs. He would remain in Portland for the 2001–02 season, playing in 65 games.
After his brief stint in Portland, he was traded back to San Antonio, along with Erick Barkley and a 2003 2nd-round pick, in exchange for Charles Smith, Amal McCaskill, and Antonio Daniels on August 2, 2002. He supported the Spurs from the bench in nearly every game (75) the following year, in what would be his final season in the league. In Game 6 of the 2003 Western Conference Finals against the Dallas Mavericks, Kerr made four second-half three-pointers that helped eliminate Dallas. The Spurs eventually won the NBA championship by beating the New Jersey Nets in the 2003 NBA Finals, 4–2.
Kerr announced his retirement after the 2003 NBA Finals. He played 910 regular-season games but started only 30 of them, 20 of those games coming in the 1991–92 season. His career totals are: 5,437 points (6 ppg), 1,060 rebounds (1.2 rpg), and 1,658 assists (1.8 apg). He also retired as the league's all-time leader in three-point shooting percentage for a season (.524 in 1994–95) and career (.454).
In 2003, Kerr became a broadcast analyst for Turner Network Television (TNT), offering commentary alongside renowned analyst Marv Albert. During his tenure, he performed a segment sponsored by Coors Light called Steve's Refreshing Thoughts in which he brought up interesting facts in NBA history. This segment continued through sponsorship, and became known as Steve Wonders, sponsored by Sprint. In the same time period, Kerr also contributed to Yahoo! as an NBA commentator.
He has provided his voice for the in-game commentary of EA Sports video games NBA Live 06, NBA Live 07, NBA Live 08, NBA Live 09 and NBA Live 10 with Albert. He has also provided his voice as a color analyst for NBA 2K12, NBA 2K13, NBA 2K14 and NBA 2K15. He remains a commentator in NBA 2K15 despite becoming the Golden State Warriors coach for the 2014–15 season several months prior to the game's release.
Kerr left broadcasting in 2007 to work as a general manager for the Phoenix Suns, but it was confirmed on June 28, 2010 that he would return as an NBA analyst for TNT starting with the 2010–11 NBA season. Since 2011, Kerr has also called the NCAA Men's Division I Basketball Championship on Turner Sports and CBS, teaming up with lead broadcasters Jim Nantz and Clark Kellogg for the First Four and Final Four games, and with Albert in other rounds.
Kerr was a regular contributor to the website Grantland from 2011 until it closed in 2015.
On April 15, 2004, Kerr was announced as a member of a potential group of buyers that would acquire his old team, the Suns, from Jerry Colangelo for $300 million. He became part of Suns management, acting as a consultant. During the 2006 NBA All-Star Weekend, he was a member of the San Antonio team that won the Shooting Stars Competition.
On June 2, 2007, Kerr announced his departure from his broadcasting position at TNT and his commentating position at Yahoo! to assume duties as the general manager of the Phoenix Suns beginning with the 2007–2008 season. On February 6, 2008, reports surfaced that Kerr was planning to trade Suns forward Shawn Marion and guard Marcus Banks to the Miami Heat in exchange for Shaquille O'Neal, which he did. The Suns were eliminated by the San Antonio Spurs in five games in the first round of the playoffs.
On December 10, 2008, Kerr continued to remake the Suns roster by trading away Boris Diaw, Raja Bell, and Sean Singletary to the Charlotte Bobcats in exchange for Jason Richardson, Jared Dudley, and the Bobcats' 2010 second-round draft pick, which was used to draft Gani Lawal of Georgia Tech. On June 25, 2009, Kerr traded O'Neal to the Cleveland Cavaliers for Ben Wallace, Sasha Pavlovic, a future second-round draft pick and cash.
On May 5, 2010, the Suns wore Los Suns jerseys in Game 2 against the Spurs to be united against the controversial Arizona immigration law. Kerr himself compared the law to Nazi Germany.
On June 15, 2010, Kerr stepped down as president and general manager of the Suns, but still owned a 1% share of the Suns' organization that he kept until 2014.
On May 14, 2014, Kerr reached an agreement to become the head coach for the Golden State Warriors, succeeding Mark Jackson. Kerr coached in the 2014 Summer League for the Warriors. During the 2014–15 season, the team's offense employed elements of the triangle offense from his playing days in Chicago under Phil Jackson, the spacing and pace of Gregg Popovich in San Antonio, and the uptempo principles Mike D'Antoni and later Alvin Gentry used in Phoenix when Kerr was the GM.
After the Warriors beat the Houston Rockets to win their 14th consecutive game, Kerr became the first coach to start his career with a 19–2 record. This beat out Al Cervi and his 18–2 start with the Syracuse Nationals. On December 10, 2014, Kerr became the first NBA rookie head coach to win 21 of his first 23 games. He was named the head coach of the Western Conference team for the 2015 NBA All-Star Game after Golden State had the best record in the conference. On April 4, the Warriors beat the Dallas Mavericks 123–110 to clinch home-court advantage throughout the playoffs, and Kerr got his 63rd win of the season to become the highest winning rookie head coach in NBA history, passing Tom Thibodeau and his 62 wins with the Chicago Bulls in the 2010–11 season. In the NBA Coach of the Year voting, Kerr was runner-up to Mike Budenholzer.
The Warriors ultimately finished with one of the best regular seasons in NBA history, and the greatest in the team's 69-year history. Golden State ended with an overall record of 67–15, becoming the 10th team to win 67 or more games in a single season. It was the first time the Warriors had ever won as many as 60 games in a season; their previous high was 59 in the 1975–76 season. The Warriors also ended with a 39–2 home record, which is tied for the second best home record in NBA history. The Warriors were first in defensive efficiency for the season and second in offensive efficiency, barely missing the mark that the Julius Erving–led Sixers achieved by being first in both offensive and defensive efficiency. They became the first team in NBA history to have two win streaks over 15 at home (18 and 19).
In the opening round of the playoffs against the New Orleans Pelicans, Kerr led the Warriors to their first four-game playoff sweep since the 1975 NBA Finals. Afterwards, the team surpassed the Memphis Grizzlies (4–2, in the second round). Down 2–1 in the series, Kerr made an unconventional adjustment in Game 4 to leave the Grizzlies' Tony Allen open and have his defender, center Andrew Bogut, guard the interior. His strategy was lauded after Allen, Memphis' best wing defender, was benched and limited to 16 minutes after missing wide open shots. The Warriors then defeated the Houston Rockets (4–1, in the Western Conference Finals), making the NBA Finals for the first time in 40 years.
The Warriors faced the Cleveland Cavaliers in the Finals. Kerr and rival coach David Blatt were both in their first season as NBA head coaches, and this was the first time a pair of rookie head coaches faced each other in the NBA Finals since the NBA's first year of existence, in 1947 with Eddie Gottlieb of the Philadelphia Warriors and Harold Olsen of the Chicago Stags competing. After the Warriors went down 2–1 to Cleveland, Kerr started swingman Andre Iguodala in place of Bogut, jump-starting their stagnant offense for a 103–82 road win that evened the series. It was Iguodala's first start of the season, and the small unit came to be known as the Death Lineup. After the game, Kerr admitted to lying to the press in response to pregame questions about potential changes to his starting lineup. The Warriors went on to win the championship in six games, defeating the Cavaliers, 4–2, in the series, to give Kerr his sixth championship and first as a head coach.
After the first two days of the defending champion Warriors' training camp, Kerr took an indefinite leave of absence to rehabilitate his back, which had caused problems since the 2015 NBA Finals. Around this time, assistant coach Luke Walton assumed Kerr's coaching duties. Kerr missed all of 2015 and most of January 2016, although technically the NBA credited Walton's win-loss record to Kerr. Kerr said "I think it's ridiculous", when asked about getting all of Walton's wins. On January 22, 2016, Kerr returned to coaching after missing 43 games, but warned he might need to miss games occasionally if there was a recurrence of the headaches and pain related to the spinal fluid leak that sidelined him. The Warriors went 39–4 with interim coach Luke Walton. The Warriors went 34-5 after Kerr returned to coaching. Golden State broke the 1995–96 Chicago Bulls 72–10 record by winning 73 games. Kerr became the first person in NBA history to be a part of 70-win teams as a player and head coach. He was named 2015–16 NBA Coach of the Year. Kerr would lead the Warriors to the 2016 NBA Finals where they would again face the Cleveland Cavaliers. The Warriors lost in seven games.
On November 20, 2016, the NBA announced that Kerr had been fined $25,000 for public criticism of officiating during a radio interview with KNBR 680 on November 17. Kerr missed time during the 2017 playoffs due to recurring back issues. Associate head coach Mike Brown has acted as acting head coach during periods of Kerr's absence, and Brown continued head coaching into the playoffs leading the Warriors to a 12–0 record in the postseason. Kerr returned for the 2017 NBA Finals where he led the Warriors to victory over the Cleveland Cavaliers in five games. The Warriors finished the playoffs with a 16–1 record, the best postseason winning percentage in NBA history. Kerr is the fourth coach in NBA history to win two championships in his first three seasons of coaching. Kerr won his third championship as a head coach when the Warriors defeated the Cleveland Cavaliers in the 2018 NBA Finals in four games to give Kerr his eighth championship of his career.
Kerr is third on the Warriors' all-time wins list behind Don Nelson and Eddie Gottlieb, and only Nelson has won more games in the West Coast portion of Warriors history.
He married Margot Kerr, his college sweetheart, in 1990. They have three children: Nick, Maddy and Matthew.
Since the conclusion of the 2016 U.S. presidential election, Kerr has been critical of Donald Trump and his election victory. In an interview following the election, Kerr voiced the opinion that Trump's rise to power was based on insults against women and minorities. He compared Trump's campaign performances and the crude responses of his supporters to The Jerry Springer Show. Although he expressed hope that Trump would be a good president, he made clear his "disgust" with Trump's disrespectful public discourse and his disappointment with the election results.
Kerr has been a strong supporter of gun control, expressing disappointment with the government’s response to school shootings.
^ a b "A Separate Peace". tribunedigital-chicagotribune.
^ a b "Despite pain of dad's murder, Kerr became a champion – New York Post". New York Post.
^ "The Inside Story Of Steve Kerr And His Family's Little-Known History Of Altruism In The Middle East". UPROXX. May 25, 2016. Retrieved June 3, 2016.
^ a b "Steve Kerr and David Blatt Reached N.B.A. Finals on Unconventional Paths". The New York Times. June 5, 2015. Retrieved April 14, 2016.
^ a b Los Angeles Times (June 1, 2015). "Bill Dwyre: Steve Kerr is defined as a person by much more than basketball". latimes.com.
^ a b "The assassination of Steve Kerr's father and the unlikely story of a champion – For The Win". For The Win.
^ a b "Warriors coach Steve Kerr guided by his father's life and lessons". mercurynews.com.
^ "NBA Finals' Rookie Coaches: Golden State Warriors' Steve Kerr and Cleveland Cavaliers' David Blatt". ABC News.
^ "Steve Kerr and David Blatt Reached N.B.A. Finals on Unconventional Paths". nytimes.com.
^ a b "Golden State Warriors' Steve Kerr is tough enough for NBA coaching". ESPN.
^ Dodds, Tracy (March 1, 1988). "Arizona St. Apologizes to Kerr: Arizona Guard Was Target of Taunts by Fans Before Game". Los Angeles Times. Retrieved July 19, 2016.
^ "Arizona Daily Wildcat – Steve Kerr ready for grad speech, tortillas". arizona.edu. May 12, 2004. Archived from the original on September 15, 2006.
^ "Steve Kerr Player Profile". RealGM.com. Retrieved November 19, 2017.
^ Hudson, Jr., David L. (February 2007). Basketball Championships' Most Wanted. Potomac Books, Inc. p. 41. ISBN 1-59797-014-X.
^ "Steve Kerr career highlights". mercurynews.com. May 14, 2014. Retrieved November 19, 2017.
^ basketball.realgm.com, accessed May 16, 2015.
^ "Suns land Richardson from 'Cats". December 10, 2008. Archived from the original on December 11, 2008.
^ Coro, Paul (May 4, 2010). "Phoenix to wear 'Los Suns' jerseys for Game 2 vs. Spurs". The Arizona Republic. Retrieved May 2, 2017. It's hard to imagine in this country that we have to produce papers," Kerr said. "It rings up images of Nazi Germany. We understand that the intentions of the law are not for that to happen, but you have to be very, very careful. . . . It's important that everyone in our state and nation understands this is an issue that needs to be explored. So, we're trying to expose it.
^ "Warriors Reach Agreement in Principle for Steve Kerr to Become Team's Head Coach – THE OFFICIAL SITE OF THE GOLDEN STATE WARRIORS". nba.com.
^ "Steve Kerr accepts Golden State Warriors' coaching position". ESPN.com.
^ "Warriors' Steve Kerr off to best start in history for first-year coach". December 11, 2014. Retrieved June 13, 2017.
^ "Rockets at Warriors". NBA.com.
^ "Steve Kerr to coach West All-Stars". www.espn.com. ESPN. Retrieved February 16, 2015.
^ Kawakami, Tim (May 16, 2015). "The playoff evolution of Steve Kerr, in real time, through the ups, downs, struggles and eventual triumph in this series". San Jose Mercury News. Archived from the original on May 28, 2015.
^ Scott, Nate (May 12, 2015). "The Warriors' crazy defensive adjustment won them Game 4". USA Today. Archived from the original on May 28, 2015.
^ "Steve Kerr and David Blatt meet again, this time as rookie coaches in the NBA Finals – ProBasketballTalk". nbcsports.com.
^ Deveney, Steve (June 12, 2015). "Steve Kerr lied, and the Warriors took advantage in Game 4". Sporting News. Archived from the original on June 13, 2015.
^ "Warriors Head Coach Steve Kerr to Take a Leave of Absence to Focus on Back Rehab". NBA.com. October 1, 2015. Retrieved October 1, 2015.
^ "NBA reportedly considers crediting Luke Walton with Warriors' wins". Sporting News. Retrieved December 1, 2015.
^ "Luke Walton, the Warriors' winless wonder". ESPN.
^ Shelburne, Ramona (February 10, 2016). "Kerr battles lingering spinal-fluid issues, but coaches through pain". ESPN.com. Archived from the original on February 11, 2016.
^ Amick, Sam (April 14, 2016). "Warriors notch NBA-record 73rd win to surpass 1995-96 Bulls". USA Today. Retrieved April 14, 2016.
^ "Warriors' Kerr named 2015-16 NBA Coach of the Year". NBA.com. April 26, 2016. Retrieved April 26, 2016.
^ "Kerr fined $25K for publicly criticizing officials". ESPN.com. Retrieved November 20, 2016.
^ Boren, Cindy (May 7, 2017). "Steve Kerr had procedure to repair spinal cord leak, Warriors owner says". Washington Post. Retrieved May 10, 2018.
^ "Warriors (16-1) Record Best Postseason Winning Percentage in NBA History". Bleacher Report. June 14, 2017. Retrieved May 10, 2018.
^ "Steve Kerr's wife Margot Kerr - PlayerWives.com". May 15, 2014. Retrieved June 13, 2017.
^ Tsuji, Alysha (November 9, 2016). "Steve Kerr goes on pregame rant about presidential election: 'I thought we were better than this'". USA Today. Retrieved August 4, 2017.
^ Johnson, Thomas (February 15, 2018). "'Children are being shot to death day after day': Steve Kerr criticizes government's response". Washington Post. Retrieved August 6, 2018.
^ a b c Steve Kerr, basketball-reference.com, accessed March 20, 2010.
Wikimedia Commons has media related to Steve Kerr.
|
0.947275 |
who died on 25th September 1915.
Arthur was born at Barrow Hill and lied about his age to join the army. He was still only 17 when he was killed at the 2nd Battle of Bellewarde.
Edgar Moorcroft lived in Lowgates and worked for the Great Central Railway.
|
0.999996 |
It’s been a year since we first heard rumours that a triple-lens iPhone is coming, and while these rumours gained steam with reports that Apple is testing prototypes with the new camera design as well as leaked renders of what it may look like, most have assumed that Apple would simply be adding the new camera system to the standard lineup of 2019 iPhone models, which are widely expected to be direct successors to the iPhone XS, iPhone XS Max, and iPhone XR.
However, a new report from Mac Otakara has now turned that assumption on its head with the suggestion that Apple may in fact be releasing two entirely new models in addition to refreshed versions of the iPhone XR, iPhone XS, and iPhone XS Max. In other words, if this report is accurate, Apple could be coming out with five iPhone models this year.
According to the report, which cites “trustworthy sources” from suppliers in China, Apple is planning to release two new iPhone models with the triple-lens camera, a 6.1-inch and 6.5-inch version, both with OLED screens. The 6.1-inch variant is said to be between the iPhone XS and iPhone XR in size, which seems unusual considering that 6.1 inches is the size of the iPhone XR, although the use of an OLED screen could allow it to be slightly smaller due to less of a need for bezel space. The 6.5-inch version would presumably be around the same size as the current iPhone XS Max.
Mac Otakara is predicting that both models will be slightly thicker than their current iPhone XS counterparts in order to accommodate the lens unit, which it says will be “larger than the rear camera of the iPhone XR.” The 6.1-inch model is said to gain 0.15 mm in thickness, but the rear camera bump will be reduced by 0.5 mm, while the larger 6.5-inch version will only gain 0.4mm of thickness, offset by a 0.25 mm reduction on the camera protrusion.
Sources are also saying that this may be the year that Apple will finally include 18-watt USB-C chargers and USB-C to Lightning cables in the box — something that was heavily rumoured last year as well, but never materialized. The report also confirms recent rumours that the new iPhones will be able to deliver wireless charging; it’s unclear, however, if this would only apply to the triple-lens camera versions or would be done across the entire 2019 iPhone lineup.
While Mac Otakara has a pretty solid track record when it comes to iPhone rumours, this information is far enough out there that it should probably be taken with at least some skepticism, especially in light of conflicting information from other sources. For instance, last week OnLeaks revealed that they had been told by sources that the triple-lens camera will in fact be available on all of the 2019 iPhone models, although other rumoured features such as frosted glass may only come to the higher-end “iPhone XI” and “iPhone XI Max.” Either way, at this point it’s looking like this fall’s iPhone lineup may still have some surprises in store.
|
0.991081 |
Hello Friends, Can anyone help me to resolve printer problems in Windows 10 issue because I searched solution for this issue in many sites but I did not get it. So, please guide me how can i resolve it.
Step 1: Click on the Start menu and then click on the Settings.
Step 2: In the Settings window, you have to click Update & security and then click on the Windows Update option present in the left pane.
Now, check for the updates, and wait while Windows searches for the latest updates available for your system.
Step 4: Click on the updates link if available, in case the link is not available then Windows Update is unable to find out any updates for your system.
Step 5: Choose the driver that you want to install, click OK, and then install the updates.
Step 1: Open the Control Panel and select the view by Small icons. Then click on the Device Manager.
Step 2: From the Device Manager window, find out the printer device to update the driver. On the problematic device, you will see a yellow mark next to the device name.
From the pop-up window, you have to choose the first option, you need to Search automatically for the updated driver software and then follow the on-screen instructions to install the drivers.
|
0.948221 |
"Unification" is a two-part episode of the syndicated American science fiction television series Star Trek: The Next Generation, from the fifth season, which features Leonard Nimoy as Spock. It earned a 15.4 household Nielsen rating, drawing over 25 million viewers, making it one of the most watched episodes in all seven seasons of The Next Generation's run.
Hearing that legendary Starfleet officer Spock may have defected to the Romulan Empire, Picard travels to Vulcan to talk to Spock's father, former ambassador Sarek, who is near death from the ravages of Bendii Syndrome. In a rare lucid moment, Sarek discloses that Spock has long harbored hopes of peacefully reuniting the Vulcan and Romulan peoples, who once were part of the same civilization. Rather than committing treason, Spock actually may be initiating steps to achieve that peaceful goal. Determined to find the truth, Picard and Data, disguised as Romulans, set out for the Romulan homeworld. Upon finding Spock, Picard learns that the Vulcan is indeed on an unauthorized mission to reunify his people with the Romulans. Spock counts among his allies a Romulan senator named Pardek and the Romulan proconsul Neral.
Starfleet Admiral Brackett informs Captain Picard (Patrick Stewart) that Ambassador Spock (Leonard Nimoy) has gone missing and an intelligence scan has placed him on Romulus, raising fears that he may have defected. Picard orders the Enterprise to Vulcan to speak to Spock's ailing father, Sarek (Mark Lenard), with whom Picard shares a close bond. Sarek gives Picard the name of Pardek, a Romulan Senator that he knew Spock had been maintaining a dialogue with for several decades. Lieutenant Commander Data (Brent Spiner) discovers a visual record of Pardek from a trade conference and confirms him as being the figure seen on the intelligence scan of Spock on Romulus.
Picard calls in a favor from Chancellor Gowron (Robert O'Reilly), speaking to one of his aides and convincing him to lend them a Klingon ship that could take them to Romulus while cloaked. Picard and Data board the ship, with Picard ordering Riker to investigate the T'Pau and try to find a link to the Romulans.
The Enterprise crew find the remains of a decommissioned Vulcan ship, the T'Pau, in the debris of a Ferengi ship which crashed in the Hanolin asteroid belt. On Romulus, Picard and Data (surgically disguised as Romulans) locate the spot where the record of Pardek and Spock was taken, which Data determines is an intelligence bureau building. They wait until Pardek arrives, but when they approach him, they find themselves met by soldiers and taken to an underground cavern. Pardek arrives, explaining that Romulan security knew they were on-planet and they've been brought underground for their safety. Picard states that he is looking for Ambassador Spock, who emerges from a nearby tunnel.
Spock demands that Picard leave Romulus, while Picard informs him of the Federation's concern over his "cowboy diplomacy" that he has engaged in, as well as the death of Sarek. Predictably, Spock takes the news of his father's death stoically. He explains to Picard that during the peace negotiations with the Klingons decades earlier (Star Trek VI: The Undiscovered Country), he felt responsible for putting Captain Kirk and his crew at risk. Working alone to avoid similar issues, Spock is now engaged in a "personal mission of peace": the reunification of the Vulcan and Romulan people. He is working with an underground movement to achieve that aim. Pardek has asked Spock to come to Romulus to meet with the new Proconsul of the Romulan Senate, a young idealist who has promised reforms. Picard expresses concern that the willingness of the Romulans may be part of a larger ploy; Spock agrees but points out that if a larger plot is at work, it is best they play out their roles within it to uncover it.
Picard, Data, and Spock are soon captured by Commander Sela, who is planning a Romulan conquest of Vulcan. The stolen Vulcan ship and two others are carrying a Romulan invasion force, under the guise of escorting a peace envoy. Spock refuses to deceive his people by announcing the false news, even after Sela threatens to kill him, and she locks the three in her office and leaves to order the ships on their way. By the time she returns, Data has hacked into the Romulan computer system and created a holographic simulation that distracts her long enough for the three captives to incapacitate her and her officers.
Meanwhile, the Enterprise arrives at Galorndon Core, discovering the three Vulcan ships, and moves to block their approach to Vulcan. A medical distress signal comes in - a distraction created by Sela - but as Riker orders the ship toward its source, they receive a broadcast from Romulus in which Spock reveals the true nature of the Vulcan ships. A Romulan Warbird uncloaks, destroys the ships, and recloaks. Riker suspects that the Romulans would rather kill their own troops than allow them to be captured.
On Romulus, Data and Picard bid farewell to Spock. The Ambassador is intent upon his goal, realizing that it cannot be achieved through diplomacy or politics. Picard offers Spock a chance to touch what Sarek shared with him, and the two mind-meld.
This episode was aired in the weeks before the release of Star Trek VI: The Undiscovered Country. Spock makes reference to the events of the movie when he asks Picard if he was aware of Spock's role in the first peace overtures to the Klingons. Picard is aware of the public history of Spock's role, but not the whole story. Spock says that he forced Captain Kirk to accept the mission, and that he felt responsible for what happened to Kirk and his crew. This time, Spock only wants to risk his own life, which is why he came to Romulus on his own.
Leonard Nimoy had previously requested $1 million to cameo in the series, but he took minimum SAG pay to reprise the role of Spock to publicize Star Trek VI: The Undiscovered Country, on which he was executive producer.
This episode is one of four times that an original series character reprised his role in The Next Generation; the other three being "Encounter at Farpoint" (DeForest Kelley), "Sarek" (Mark Lenard), and "Relics" (James Doohan).
The episode was dedicated to the late Gene Roddenberry, who had died shortly prior to its broadcast.
In 2017, Den of Geek included "Unification" as one of their 25 recommended episodes to watch of Star Trek: The Next Generation.
A novelization of this episode was published by Pocket Books, it was one of five novelizations to be made of The Next Generation episodes, alongside "Encounter at Farpoint", "Descent", "Relics" , and "All Good Things...".
^ "Star Struck". Entertainment Week.
^ Harvey, Sven (January 29, 2016). "Star Trek: The Next Generation's 25 must-watch episodes". Den of Geek. Archived from the original on January 30, 2016. Retrieved March 11, 2019.
Wikiquote has quotations related to: "Unification"
|
0.999914 |
Induction cooktops are the future! They're efficient, sleek, and have a cool factor that goes through the roof. Here's a look at the best built-in induction cooktops in 30-inch and 36-inch sizes . For quick recommendations, read the next section. To learn about what makes an induction cooktop great, read What to Know Before You Buy. For the detailed reviews, scroll down or click in the table of contents.
This article, Induction Cooktops: We Review the Best Built-ins of 2017, was last updated January, 2018.
Induction works by magnetism. It needs an electric current and a magnetic pot or pan to complete the circuit. Without the pan, the burner won't get hot. (This is also why you need induction-compatible cookware to use with an induction cooktop.
If you've been using conventional electric, switching to induction is a no-brainer. Induction gives you the precision and instantaneous control of gas without the mess. It's also more efficient than conventional electric, cooler, and safer (the burners don't get nearly as hot).
If you have a gas cooktop, then you have a more difficult decision to make. It's not all that difficult to install the wiring for an induction cooktop, but gas cooking is cheaper than electric cooking and many people who've switched to induction from gas miss the "feel" of it. However, gas is messier than induction, and is also actually less responsive.
Our suggestion is to try induction out. You can buy a portable induction burner for less than $100, and most people find it a nice addition to their kitchen for having company or cooking outdoors on a hot day. Check out our article on portable burners. A portable won't quite replicate the experience of a full-sized cooktop, but it will give you an idea of how induction works.
There are three main factors to consider when buying induction cooktops (or any cooktop, for that matter): size/installation considerations, power, and budget. Pretty much everything else is a matter of personal preference.
Built-in induction cooktops in the US come in two standard sizes: 30-inch and 36-inch. Make sure you're shopping for the right size for your space!
30-inch cooktops typically require a 40 amp hookup, while 36-inch cooktops require a 50 amp hookup. If you're set on a 36-inch top, be sure your electrical hookup is 50 amp. This usually isn't a problem in newer homes, but may be in older ones.
If you have 30 amp wiring and want to buy a 40 or 50 amp cooktop, don’t despair. You can have wiring upgraded or even do it yourself if you’re handy. Just know that you have to get this right, because if you use the wrong wiring, your circuit breakers will cut power in your kitchen when you try to draw too much--or worse, it could be a fire hazard.
Also: if you plan to install the cooktop over an oven, make sure the model you buy is compatible. Most, but not all cooktops, will fit over an oven. Check the specifications (in the reviews below) to make sure.
Don't worry too much about installation requirements. If you're replacing an old cooktop, you should be fine, and if you have new construction or are doing a remodel, your contractor will know what to do!
Power is a measure of how much heat induction cooktops can produce. Most people want as much power as they can get. It’s a little more complicated than that, though. Different manufacturers divide power up differently, and it can sometimes be confusing to understand how much power you have available in different situations. And in fact, these stats are sometimes simply not listed, or listed in such a way that they are difficult to interpret. Total power is good to know, but power per burner and power boost are what you most need to understand when it comes to induction cooking. We include these specs in all of our reviews.
Power per burner is a measure of the maximum wattage a burner can produce. The more wattage, the more heat, so it’s an important factor in choosing induction cooktops. The thing is, nearly all electric stoves (not just induction) have a maximum power output which, when divided by four or five (the number of burners), can’t possibly output to all the burners simultaneously. The math makes it impossible.
For example, most 30-inch stoves have a total wattage somewhere around 7400, with the max wattage on the biggest burner or bridge element at or near 3600--almost half the total. This means that the other 3800 watts must be divided among the other three (or four) burners. So they can’t possibly all operate at their maximum simultaneously.
The good news is that you rarely need to use all four burners at the same time. And if you do, you don’t need them to be going at full capacity. You might have a marinara sauce simmering on low while the pasta is boiling, and maybe some cauliflower steaming on a third burner. Rarely do you have all the burners operating at the same time, and even more rarely would you want them all at max output.
Therefore, while total power is nice to know, the most important spec is max power per burner. If you know this, you can make a more informed decision about which cooktop will work best for how you cook.
Does a max wattage of 3600 make a huge difference over a max wattage of 3200? Eh. The truth is, you can probably do everything you need to do on a 3200W max burner. You just won't be able to do it as quickly. So if you want to amaze your friends by boiling water in three minutes or less (or even if you just want to get in and out of the kitchen ASAP), go for the higher wattage per burner.
Power boost is a feature exclusive to induction cooktops, and it’s pretty cool. It allows a burner to pull an extreme amount of power for short periods of time. This is how induction cooktops can boil water so quickly (typically in less than half the time of conventional electric). You can’t sustain power boost for very long for the same reason you can’t run all the burners at maximum output: the math doesn’t work. But being able to pull a huge amount of power for even a short time is a useful feature. Once you’ve experienced it, it’s hard to live without.
Many induction cooktops offer power boost to the largest burner only. But some (such as the Bosch we review below) offer power boost to all the burners. This is a great feature because you aren’t limited to using a certain burner or pan size. (On some induction cooktops, pans have to fit within an inch of the burner size or the burner won't work.) But keep in mind that you probably won't be able to use power boost on more than one burner at a time.
Note that if a model has power boost, the max power listed by manufacturers is the power boost power. In our reviews, we list power boost and regular power for all models that have this feature.
If you are considering induction cooktops, then budget may not be a major issue for you (lucky you!). Even so, you still have to ask yourself the age-old question, “How much do I want to spend?” Induction cooktops come in a wide price range, starting somewhere around $1000 and going up into the several-thousand-dollar range.
If you buy on the low end, you’re going to sacrifice something. You may get decent power, but have to deal with a terrible interface. Or you may get a great bridge element (another feature unique to induction that allows you to use two burners as one for large cookware), but without the power of a pricier unit. This is why it’s important to know how much you want to spend, and what you’re willing to live without.
How much do you have to spend to get what you really want? As with so many things, it depends. Top of the line is going to run over $3000--but you can get a very nice cooktop for about half that price. Our reviews for all the induction cooktops get into a lot of detail on available features.
Once you understand the broad strokes, it's time to consider the details. Here are the ones we think are most important.
For some, controls may be more than a detail; they may be a deciding factor.
The big advantage is that induction cooktops are one smooth surface--no knobs to clean! And when you’re done cooking, you can just wipe the whole thing down and you’re done--this is so easy because the cooktop surface doesn't get hot like with other cooking methods. People love this feature of induction cooking, and dread the possibility of ever going back to the greasy, grimy, stuck-on, splattered-on mess of conventional electric or gas cooking. Also, because the controls are embedded in the glass, there’s no danger of them being damaged by spills or breaking.
The big disadvantage is that many of these interfaces are slower to operate than conventional knobs. Because you’re basically selecting from a menu (like a software program), there can be a lot of pressing of buttons to achieve a setting--without a mouse to simplify matters. (If you're old enough to remember using a computer without a mouse, you know what I mean--and if you're not, just try to imagine using drop-down menus for everything).
For example, you typically have to turn the power on (then sometimes wait for the cooktop's computer to power up, which can take 15-30 seconds). Then you have to adjust the burner setting, which may be several key presses. Then you have to press again when you want to turn the setting down to medium or low.
Some people don't mind this, and say it takes just a few seconds at most. But some people hate it. So when choosing an induction cooktop, you may want to figure out which camp you're in before you buy.
We explain the control pads in enough detail for you to understand the pros and cons of each unit. Reading the reviews on Amazon can also give you an idea of what daily usage of the unit is like.
As a general rule, all induction cooktops have electronic controls, or at least a combination of electronic and manual. So all of them will require more input than turning a knob. Another general rule is that you will pay a premium for a better interface. But what makes it a better interface, you ask? Well, the Bosch reviewed here senses the pot so you don’t have to select a burner, and it has a “swipe” type pad for selecting a setting. And the GE Cafe has a pad that simulates turning a knob with just your fingertip (very slick). Both options dramatically reduce the amount of tapping. But no electronic interface has gotten to the point of good old knob-turning simplicity.
You may not think this is all that important, but keep in mind that this is something you will use every day, sometimes several times a day. So make sure you can live with the controls on the unit you buy.
The “bridge” feature is unique to induction cooktops (and ranges). Different manufacturers give it different names, but basically, it allows you to operate two burners as one. This is incredibly useful for oversized pans, particularly oblong ones like griddles. How is it different than just turning on two burners? For one, the heat going into both burners will be exactly the same because they’re controlled as one burner. And on some higher-end cooktops, one entire side is a heating element, so there are no cold spots whatsoever--and this large cooking zone can be used for several small pots as well as one large one. It’s one of those things that might sound cool, but unnecessary--however, people who have it love it, and tend to use it a lot.
This will never happen with induction.
All induction tops have several safety features that make them faaaaar safer than conventional electric and gas. First of all, the burners themselves don’t get hot (the pans do), so this safety feature is a by-product of the technology. Residual heat can remain after removing a pot, however, and most models have indicator lights to alert you of this. Most models have auto shut-off, too, which turns the burner off after several seconds when a pot is removed. Most also will not turn on without proper cookware in place: they can sense the difference (usually by weight) between, say, a metal spatula and a pot.
Design is, of course, a personal preference. The truth is, though, that beyond the control panel, there aren’t a lot of differences between the overall look and feel of induction cooktops. Most cooktops are black or stainless/gray, with gray or off-white burners and controls. Indicator lights are either red or blue. On many models, you can pay a little extra for a stainless steel edge (this offers some protection against chipping, but can also be a place for food particles to lodge). The controls are in the front of the unit, usually under the glass.
Your choices are pretty much limited to these options. Because of this, you should focus on functionality, as this is where your money will be best invested. Not that aesthetics aren’t important; they are. But any model you choose should look good in any modern kitchen.
If you've done any research on induction cooktops, you probably know by now that you need special cookware. Because an induction coil is a magnet, you need magnetic cookware--or at least, cookware that has a magnetic bottom. Cast iron works well, as is clad stainless steel (newer clad stainless should all work with induction, but older clad stainless--prior to the mid-1990s or so--may not). As induction cooking gets more and more popular, most manufacturers have special lines of induction cookware, and state whether their cookware will work with induction cooktops. Some portable induction burner manufacturers, such as Duxtop, also make a line of inexpensive induction cookware that will work with all induction cooktops.
Clad stainless is the best induction cookware.
Other than cast iron and enameled cast iron, don't be surprised if your pans don't work on an induction stove. Aluminum, copper, and many types of stainless (especially older stainless) are non-magnetic metals. Before investing in an expensive induction cooktop, test your pan bottoms with a magnet. If it sticks, you're good. If it doesn't, you'll need to invest in some new pots and pans if you decide to go with induction.
For more information on induction cookware, see our Guide to the Best Induction Cookware.
What Makes This Cooktop Great?
Bosch is one of the most respected names in induction cooktops. In 2015, Bosch was ranked “Highest in Customer Satisfaction” by J. D. Power. Consumer Reports and Yale Appliance both named Bosch as one of the best appliance makers, with a low percentage of service calls and a high rate of customer satisfaction.
The Benchmark Series is Bosch’s premier cooktop because of its “FlexInduction” technology. It comes in two styles, one all black (the “UC”) and one with stainless steel trim (the “SUC”). The stainless trim looks offers some protection against chipping and a different aesthetic. Otherwise, the two models are identical.
Pros: FlexInduction, intuitive controls, and 3600W of power makes this induction top usable and powerful.
Cons: Expensive, unable to apply power boost to all 4 burners at a time (although this is true for all cooktops).
Flexinduction does something incredibly cool: it makes the whole flex zone a burner. This differs from the “bridge” element of other brands because not only can two burners be controlled as one, but the entire surface of the flex area is a burner. Thus, the flex zone can not only accommodate large pans, it can also heat several small pans simultaneously. The "PotSense" feature senses the pan size and adjusts automatically--wherever you place it in the flex zone.
The technical (or marketing) term for this feature is "zoneless" induction. Currently, it is available only from high-end manufacturers such as Bosch and Thermador (Thermador is owned by Bosch). No doubt, it will become more widely available as the demand for it grows.
This sleek cooktop is black with gray lines to indicate burners and controls. It has a large center burner, a small burner to the right, and the flex zone to the left. The flex zone is denoted as a large rectangle rather than two round burners, so you’ll never forget that basically the whole left side of the top is a burner. The control is a touchpad on the glass surface in the front center of the unit. The display is easy to read and intuitive to operate.
Burner Size (in.): 11, 9.8, 8.9, 6.
Number of Heat Settings on Burners: 17.
Both the center burner and the flex burners (when used together) can draw an impressive 3600 watts. The small burner draws a max of 1800 watts. The precision of this cooktop is also phenomenal. Each burner has 17 settings. This makes Bosch one of the most precise induction units on the market.
Unlike many other brands, which offer power boost to only the biggest burner, Bosch’s “SpeedBoost” is available on all four burners. Although they can’t all be used simultaneously, this is still a really cool feature: it allows you to power boost any size or shape of pan. So if you got a late start on dinner, no problem: the Bosch SpeedBoost makes induction cooking even faster!
Max Output per Burner (Watts): 3600 (largest burner and flex zone), 1800 to smallest burner.
The many control features are what give this unit its immense cool factor. And this goes beyond the FlexInduction, which is enough in and of itself to make this guy special. The controls are incredibly easy to use. You just put the pot down, turn on the power, and select a setting. Bam! Now you’re cooking, and no burner selection needed. I’m not sure if this “PotSense” feature is worth the extra money, but it does make this unit dead simple to use.
All four burners also have timers, so you can “set and forget” whether you’re frying bacon on a griddle, boiling pasta, simmering stock--or all of the above. You may not use this feature; after all, you’ve gotten by this far in life without timers on your burners. But it’s nice to know it’s there if you need it.
Auto shutoff: turns the burner off if a pan is removed.
Safety lock: prevents unwanted activation.
Temperature lock on burners: the temp on burners in use cannot be changed.
"SafeStart": prevents activation without cookware in position.
The Bosch Benchmark is one of the few induction cooktops in the 30-inch category that requires only a 30 amp circuit (most require 40). This makes it a particularly good choice if you live in an older house. It means that if you are replacing an existing electric cooktop, it’s unlikely that you will have to upgrade your wiring. This could save you a great deal of time and money on installation.
Not all 30-inch cooktops have the same drop-in sizes, so this is an important consideration as well. Verify that the cutout sizes below will work in your kitchen.
Install over an oven? The short answer seems to be no, but check specifications and/or consult with the manufacturer for a definitive answer.
Bosch warrants that the Product is free from defects in materials and workmanship for a period of three hundred and sixty-five (365) days from the date of purchase.
What Makes This Unit Great?
The GE Profile series of appliances is popular for its durability, reliability, and affordability. Profile induction cooktops are no exception. It is highly rated by consumers for its power, ease of use, safety features and more. There are two 30-inch models, one with stainless steel (the SJSS) and one without (the DJBB). You’ll pay about a hundred dollars more for the stainless steel edge; otherwise, the models are identical.
GE also has a higher end Cafe series of cooktops, which has the same power but a different appearance and a few more features, including the “Glide Touch” control pad, which is one of the best touchpads on the market. We review the 36-inch Cafe model below.
Pros: Has the highest power rating (3700W/burner) available in the 30-inch category, Burner-Sync capability for large cookware, excellent safety features, and is more affordable than the Bosch Benchmark.
Cons: Lacks power boost, smaller burner size may limit the number of large pans you can use at one time, controls are clunky.
The GE Profile is black with gray burners and controls. It has red indicator lights. The control touchpad is in the front center of the unit. It has a symmetrical, very usable burner layout. The largest burner is on the right, the smallest burner is in the rear center, and the two synced burners are on the left, and clearly indicated in the layout. Having the largest burner off to one side makes using large pans easier and safer.
Burner Size (in.): 11, 7, 7, 6.
The controls are the big drawback on this model, and if it weren't for its high power rating, this cooktop would not have made our list.
While many people--most of them probably a generation younger than me--don’t mind touchpad controls, I find that they can be slow and inconvenient if they involve repeated pressing. Unfortunately, this unit has one of the worst interfaces in its class. As you can see in the photo, the controls at first look like a confusing mess, with pluses and minuses all over the place that you have to make sense of. And once you do make sense of them, you’ll realize that you have to press the plus or minus repeatedly to reach the setting you want.
Many people don’t mind this, or at least are content to live with it if they like the other features of the unit and don’t want to pay hundreds of dollars more for alittle added convenience. And frankly, most induction tops we review here have similar controls; this one just happens to be one of the least intuitive. Since this is otherwise a very powerful, reliable cooktop with a huge number of positive reviews, I can recommend it despite its less-than-stellar interface. But if you are like me and prefer a better interface, this may not be the cooktop for you.
At 3700W, the Profile’s largest burner has the most powerful capacity in this class, comparable to more expensive brands such as Bosch. Like most units in the 30-inch category, it requires a 40 amp hookup.
Number of Heat Settings on Burners: Ranges from Low to High, including Melt setting for delicate heating.
Limited 1 year parts and labor GE warranty.
The GE Profile, with a 3700W max burner, offers as much power as some more expensive brands. It has the basic safety features, an impressive 10-minute power boost, an excellent low heat option, and Burner-Sync for large cookware. This impressive feature more than makes up for a less-than-optimal control pad.
Can be safely installed above a wall oven.
Cons: Not the most powerful unit on the market, lacks bridge elements for large cookware, safety lock feature only usable when unit is off.
Control Location/Type: Touchpad along front edge of unit.
The interface on this unit is simple and straightforward. Each burner has separate Up/Down arrows to adjust the setting and an On/Off indicator light. The power button, timer, warm feature, and autolock are in the center. Some people dislike the Up/Down arrows, but the press-and-hold feature makes them fairly easy to use. The layout is intuitive and makes this cooktop easy to operate.
The largest burner draws 3400W, which makes this unit a middle-of-the-road performer. However, most owners are happy with its power. One very cool power feature is that all four burners have power boost. This makes fast cooking incredibly convenient. Keep in mind that the max outputs listed here are for power boost; max at normal operation will be a couple of hundred watts lower.
Max Output per Burner (W): 3400, 3200, 2600, 2000.
1-UL Listed, ADA Compliant, CSA Listed.
One year Frigidaire limited warranty on parts and labor.
The Frigidaire Gallery 30-inch induction cooktop is a top pick for its power, ease of use, sleek styling, reliability, and affordable price. The bridge element that allows you to control two burners as one for large pans makes gives it the flexibility of some higher-end brands. However, its maximum power capability is only 3400W, which is 300W below the 3700W max in this category.
There is cool induction technology, then there is Thermador. This cooktop takes cool over the top. If money were no object, this would be the cooktop that I’m sure pretty much everyone would own.
What’s so cool about it, you ask? How about that it has the largest burner by far, the most powerful burner by far, and the fastest power boost of any unit in its class? Or how about that the burners can adjust to three different pan sizes (no more fitting the right-sized pan to the right-sized burner to make sure the cooktop comes on and stays on)? Or its spill protection, which detects liquids, shuts off the burner, and sounds an alarm to let you know there’s a mess to clean up?
Pan recognition: Burner won't come on if non-pan objects are placed on cooktop, even if they are magnetic.
Pros: Most powerful unit on the market, gorgeous design.
Cons: Sticker shock, some complaints about poor customer service.
Some people would argue that Thermador sets the standard for cooktop design, and this cooktop supports that argument. This unit is a lovely stainless-gray color, designed to fit seamlessly into a modern stainless steel kitchen. The burners are laid logically as well as attractively: the gigantic 13-inch burner is in the center, with the others in each corner, forming an "H" around the controls. This allows for easy reach to all pots.
Control Location/Type: Trapezoidal pad front center of unit, offset in black. Blue LED display.
Thermador calls their control pad the “2-Step Digital Touch” panel. What this means is 1) Touch a burner, then 2) Select a setting. This seems straightforward enough, however, some reviewers have said that this is not as speedy a process as it may sound. First of all, it can take a few seconds for the cooktop to respond, particularly when you first turn it on. Secondly, you have to scroll through the settings to select one, which means more than two steps. Even so, this is a quicker, simpler interface than most induction cooktops have.
Max Output per Burner (Watts): 4600, 3700, 2500, 2500, and 1800W on power boost; 3300, 2200, 1800, 1800, and 1400W not on power boost.
Indicator lights for hot and very hot surfaces.
Here are the power and cutout requirements for these induction cooktops. Installation requirements can vary even among same-sized units, so even if you are replacing a 36-inch cooktop, make sure this one will fit your space, or that you make the proper adjustments.
Limited 2 year Thermador warranty on entire appliance, parts, and labor.
The Thermador CTK365KM is one of the best induction cooktops available. If offers the best available in design, power, and reputation. If you're willing to pay for it, this is an outstanding cooktop.
The GE Cafe is a state-of-the-art induction cooktop. It has many of the features of more expensive brands, including a powerful 3700-watt burner, at a more affordable price. Its controls "swipe" controls make it one of the easiest-to-use electronic cooktops on the market. It is attractive, functional and reliable. It is also a consumer favorite.
Pan presence and size detection and auto shut-off if pan is removed.
This model has a modern flagstone finish with black burners and stainless controls. The burner layout is symmetrical, attractive, and functional. The Sync-Burners are of equal size and on the left; the largest burner is in the middle (behind the control pad), and there are two smaller burners on the right.
Control Location/Type: Stainless (off-white) touchpad in the front center of surface, blue LED display.
GE Cafe induction cooktops have one of the most attractive and usable touchpads on the market. The attractive blue LED display has On/Off, Hot Surface, and Setting Level indicators. Its “Glide control” functions like an old-fashioned knob, allowing you to simply slide your finger to adjust the setting on each burner. The Sync-Burner, locks, and timers are also easy to understand and use, making this one of the most intuitive, easy-to-operate cooktops available.
The largest (11”) burner draws 3700W, which makes this a powerhouse performer. The smallest burner has a Melt setting for very low-temperature heating that won’t burn delicate items like chocolate and cream.
This unit lacks a power boost feature, which means you can pull 3700W for an extended period of time, which is actually good functionality. However, you can’t pull max wattage on more than two burners at a time.
Max Output per Burner (Watts): 3700, 3200, 2500, 2500, 1800.
Number of Heat Settings per Burner: Varies according to burner and pan size, but runs from Melt to High Heat.
Here are the power and cutout requirements for this cooktop. Installation requirements can vary even among the same-sized units, so even if you are replacing a cooktop, it is important to make sure the new one works with your space and power supply.
Install over an oven? Yes, it's possible. But you should always check specifications and/or consult with the manufacturer for a definitive answer.
UL Listed, ADA Compliant, CSA Listed, ETL Listed.
One year limited GE warranty on parts and labor.
The GE Cafe 36-inch induction cooktop is a top pick for its power, styling, reliability, and affordable price. The Sync-Burner element allows you to control two burners as one for griddles or oversized pans. The Glide touch control pad is one of the best on the market. For all of these reasons, consumers love this cooktop. Highly recommended.
The GE Profile is a consumer favorite in the 36” category. It has the same power as its more expensive sister product, the GE Cafe (reviewed above), for a few hundred dollars less. However, it has the same clunky, non-intuitive touchpad as the 30-inch GE profile cooktop (also reviewed above).
Cons: Lacks power boost, clunky controls.
The surface is black with stainless gray burner markers and red LED display on the control panel. The layout is similar to the Cafe model: attractive and easy to use, with the Sync-Burners on the left, the largest burner is in the middle back, and the other two burners on the right. This forms a functional U-shape around the control panel that makes pans easy to place, work with, and remove.
Control Location/Type: Touchpad on front center of unit.
For some people, the controls on this unit might just be a deal breaker. They are the same controls as on the 30-inch Profile, which is to say they are not very pretty and not very functional. They require repeated pressing to achieve or change settings. As I said, many people don’t mind this, but if you do, you may want to pay the hundred or so dollars more for the Profile (reviewed below). After all, you use your stove pretty much every day, so it should be functional and aesthetically pleasing. But if neither of these things bothers you, then this cooktop has enough other features to make it a good choice.
The largest (11”) burner draws 3700W, which puts this unit at the top of the power heap. In order of size, the burners max out at 3700W. The smallest burner has a Melt setting for very low temps that won’t burn or scald delicate items.
Here are the power and cutout requirements for this cooktop. Keep in mind that installation requirements can vary even among 36-inch units, so if you are replacing an existing cooktop, it is still important to make sure this one works with your dimensions and power supply (or to make the necessary modifications).
Install over an oven? Yes, but make sure this installation will work in your kitchen.
Shipping Weight (lb): 44 (on Amazon).
One year GE limited warranty on parts and labor.
An induction cooktop is a big purchase. Buying the right one will make a huge difference in your satisfaction level and make or break your time working in your kitchen. There are a lot of great options available, but we believe these picks are the cream of the crop.
|
0.95438 |
The saying “You are what you eat.” is very accurate for this post. Why? Because your gut health contributes a lot to your overall health. 70% of the cells that make up your immune system lives in your gut wall! And that 90% of the body’s serotonin is made in the digestive tract?
If you noticed that you have been getting sick a lot lately, feeling lethargic or getting brain fog and the main reason could be that you haven’t been eating well. When your digestive tract is impaired, you are susceptible to a lot of physical ailments.
If you check the label and you find ingredients that you can’t pronounce, it is probably packed with additives, preservatives, chemicals and refined sugars. These can disturb the balance of bacteria in the gut and may lead to inflammation and other digestive disturbances such as constipation, cramps, bloating and weight gain.
Be wary, because not all processed foods are microwaveable meals and other ready meals. Processed food can be any food that has been altered in some way during preparation such as freezing, baking, canning, and drying.
However, not all processed foods are unhealthy because other foods need processing to make them suitable for consuming such as pressing seeds in order to make oil. But the majority of them may contain high levels of salt, sugar, and fat.
The world gluten is derived from the Greek word “glue”. If that doesn’t scare you, I don’t know what will. Gluten is a protein that is mostly found in barley, wheat, rye and other grains. It’s a glue-like sticky protein that gives food that chewy and satisfying texture. It can also be very hard to digest that can lead to intolerance. If you have gluten intolerance, your immune system goes into attack mode and can damage your gut wall. It can start triggering other gastrointestinal symptoms such as diarrhea, constipation, headache, skin rashes, fatigue, and in serious cases, vomiting and severe stomach pain.
Even if you don’t have a severe reaction, gluten could be responsible for your brain fog and lethargy.
I’ve already made quite an argument about how toxic sugar can be. Artificial sweeteners and high fructose corn syrups aren’t any different. These types of sugar and sweetening substitutes can encourage an overgrowth of bad bacteria that can cause allergies, inflammatory bowel, leaky gut, thrush, hormone disruption and nutrient depletion. It’s mostly present on junk food, juices, breakfast cereals, soft drinks, and condiments.
If you walk into a grocery store, you’ll find this toxic sugary goodness everywhere. Most products that contain them are those that are labeled as “diet” or “reduced sugar”.
Do you use candles and incense sticks at home?
Can you catch diseases on toilet seats?
This is why eating healthy is important. Also, having a lot of fiber in your diet is very crucial as well. You need to make sure that you’re cleansing your gut by getting a lot of fiber to sweep away those unwanted waste.
I thought being gluten intolerant is only for those who are rich because they’re picky with food. ?
Processed food usually gives me allergies. Probably because of the amount of preservatives in them. Even canned goods give me allergies! Such as those tuna flakes that even claim to have Omega 3 in them. Just imagine that those foods are meant to last longer than your average fresh food. Whatever is in that can that doesn’t make it easily go stale is scary.
I’ve had the same experience. Even with sardines. Sometimes I just have no time to cook and I just keep them in my cupboard.
The 3 ingredients are very hard to avoid. Food manufacturers usually remove one of the unsafe ingredients only to replace it with another unsafe ingredient that most people don’t know about. It’s like everywhere you look, you’ll find unhealthy things in the grocery store. This is why people’s lifespan nowadays are so short compared to how it was back in the days.
It’s really safer to just eat food that aren’t in packages and cans. Just the regular vegies and all.
Oh no..! What do I do.. I love teriyaki sauces!
It’s almost impossible to avoid the 3 of this. Especially the sugar. Food companies are so tricky!! ?
You guys know what’s scary, most of the things here can be found in kid’s food.
I know! Even those crackers with fruit fillings already contain 2 out of 3! So frustrating.
Welcome to my blog, where I do my best to make healthy lifestyle options easy and fun. Here's who I am. If you want to partner up - cool! Just shoot me a message.
|
0.999998 |
The fringes are the most important part of the prayer shawl.
The prayer shawl (Hebrew: "talit," also pronounced "talis") symbolizes the commandments of the Torah. The fringes that hang from the four corners are made up of twists and knots that have the numerical value 613, which the ancient rabbis understood as the total number of positive and negative commandments in the Hebrew scriptures. By donning the talit, the wearer is surrounded by the fringes on all four sides, reminding one of the requirements for ethical and ritual behavior.
The source for the prayer shawl is Numbers 15:38.
The fringes of the prayer shawl are described in Numbers 15:38-39: "Speak unto the children of Israel, and bid them that they make them fringes in the borders of their garments throughout their generations, and that they put upon the fringe of the borders a ribband of blue. And it shall be unto you for a fringe, that ye may look upon it, and remember all the commandments of the Lord, and do them and that ye seek not after your own heart and your own eyes, after which ye use to go a whoring." This King James translation, while it may seem a bit stilted to modern ears, is actually pretty close to the original. The fringes are meant as a reminder and a restraint against illicit behavior.
Was the 'hilazon' a snail?
The fringes are actually made up of four long threads that are looped though a hole in the corner of the garment. One of those four threads was originally dyed a shade of blue, but the source for that specific color ("tekhelet") was lost in the medieval period, so most prayer shawls today are made with white fringes only. Some groups, notably several Hasidic sects, believe that they have identified the "hilazon" species described in the Talmud which was used to make the dye (possibly a type of squid or even a snail) and have been manufacturing prayer shawls with the blue thread on each corner. The color of the thread is intended as a reminder of the color of the sea, which in turn is a reminder of the color of the sky, which is a reference to the Kingdom of Heaven.
The talit comes in two varieties: the prayer shawl proper ("talit gadol" or "big talit") and the small version which is more like a poncho, often worn as an undershirt ("talit katan" or "small talit"). Observant Orthodox Jewish men wear the talit katan at all times, and the larger version during morning prayers. The size of the larger version should ideally fall to the small of the back when worn with two corners over the shoulders, although some Jews wear much smaller versions that are folded and worn around the back of the neck with four corners hanging approximately to the belt line. Women in non-Orthodox congregations sometimes wear a prayer shawl; they are typically designed with more feminine motifs and colors than the traditional white with black or blue stripes favored by men.
Traditionally, only grown men wore the large prayer shawls. In German Jewish and some Sephardic traditions, the talit gadol was worn by boys after the age of Bar Mitsvah (13); in other Ashkenazic traditions, it was worn only by men who were engaged or married. Although the small prayer shawl may be worn into the restroom, large prayer shawls are not.
Since the essential meaning of the prayer shawl resides in the fringes ("tsitsit," also spelled "tzitzit"), care must be taken while wearing the tallit gadol. The fringes often get snagged in folding seats, and snapping them off can make the prayer shawl invalid. In fact, the wearer may be required to remove the entire shawl, since rabbis have ruled that a four-cornered garment that does not have the appropriate tsitsit may not be worn.
Almoni, Ploni. "What Is the Meaning of the Jewish Prayer Shawl?" Synonym, https://classroom.synonym.com/what-is-the-meaning-of-the-jewish-prayer-shawl-12080931.html. 29 September 2017.
|
0.999995 |
Is there a better place to experience all that Kansas has to offer than a county just near the bustling Kansas City? Cass County boasts an amazing location just under an hour away from downtown Kansas City and thus offers you access to countless urban amenities. Still, this charming county is the perfect place to call home – you can find large, tightly knit suburbs here, as well as rural towns with good family vibes! Despite the diversity, Cass is a united community striving to serve its citizens in the best possible way.
Visit the bustling street market in Kansas City, where you can buy anything from flowers, fruit and veggies, to clothing and crafts from around the world. The market is a whirlwind of color and activity, especially exciting early in the morning as the city is waking up. You could also do First Fridays! On one side of the street you can find numerous established art exhibitions, live music clubs and traditional places to eat, whilst the other side hosts less well-known music, buskers, street performances, and edgier art. The little ones will love the toy museum which is crammed full of delights for boys and girls; doll houses, soldiers, star wars, rocking horses, and other adventures await them here! Both kids and adults will love the Paradise Park with lots of thrilling rides, a petting park, and several water features.
After a tiring day, go for a challenging round of golf at the Hoots Hollow or simply relax at the Harrisonville City Park. Sit by the pond or enjoy a quiet walk along the park’s trails. Additionally, they say that firework displays here are simply breathtaking! When you go to Kansas City, pay a visit to the Union Station, an amazing piece of architecture with beautifully painted tall ceilings and huge open spaces. You might also like the Kansas City Zoo, or the Nelson- Atkins Museum of Art. For a bit of fun, try the Kansas City Breakout, an escape room where you have to solve the clues to get out – this is both mentally challenging and a lot of fun!
|
0.992776 |
I find the stories in regards to the California Gold Rush era fascinating as a result of at few other instances across the course of human history, may a person of modest means doubtlessly achieve great wealth. Money market news and varied other finance news channels have been flooded with immense response from the anxious as well as curious traders concerning safety of their funds or tips on how to save their money. As threat factor seems to rule the minds of the furious traders, share brokers and financial advisers, they are desperate to know if fund investing in India will see a doomed or brighter fate.\n\nThe company would only must make certain minor rules with the political parties of some international locations where Compaq was flourishing more than HP. It is determined by whether the company would now be regarded a s a make to stock or a make to order company.\n\nWhile traders have been bailing out of mutual funds as fast as attainable, an extra $44 billion has flowed into money market funds with their brokers. The herd has moved into secure money markets in a giant means. Once the markets start to show some signs of life, a giant part of those money market funds will come back into stocks.\n\nThe question here is of what intensity and/or intersectoral spread should a financial disturbance be to be able to be thought of a crisis. This has most likely been initiated by some exogenous shock to the macroeconomic system (“displacement”) which ends up in new profit opportunities.\n\nIt is seen with recession hitting the economic system lots of the internationally primarily based business had been enforced to reorganize their operations. Tens of millions of working folks had been required to stop their jobs as a result of ongoing crisis.
|
0.988053 |
I have seen this discussed on Bitcointalk, but how does one prove they sent XMR to the receiver of the transaction if the recipient claims they never got it?
Is this where a viewkey comes in? What tools exist to help me use the viewkey in this situation and what information will I need to provide?
It's an interesting question, and yes there is a way to prove a specific transaction.
TL;DR with the transaction private key you can prove it was made by you. Since it's a random number generated by the sender at the time of transaction creation, it must be saved locally as it can't be recreated. There's another option without this requirement but it is not currently in use.
First, let's understand how transactions are created. Every transaction will have a transaction key-pair R = rG created by the sender. The r is just some random number rolled by the sender and is used as the transaction private key. The R is the transaction public key. This key-pair is specific to a transaction and the public part is published with the transaction.
So, if everyone can see R of any transaction, and only the sender knows r, then someone knowing r must be the sender of some transaction R. The sender can prove he knows r by simply disclosing r, which is the current mechanism to prove payments - you give your r to the recipient and he checks if it's a match with some transaction R in which he received some funds. A 3rd party arbiter will also need to know the receiving address to assert it all ties together. The recipient's view key is never required.
However, if anyone else also would know the r, then he could then claim he was the one sending the funds and it would be a plausible claim. It would be better for the sender to instead sign a message using r which would let him prove he knows r without disclosing it.
where A and B are recipient public view and spend keys. Since r is random, the one-time keys are non-deterministic and you can't tell 2 apart. This means that they can never be linked to a specific address and the sender can't prove a given output was created by him unless he knows the r.
But what if the sender lost his r? Can he still prove that some payment came from him? Yes, by using the other end of transaction (the input).
He can't prove that he created the output in question because he lost the r but he can prove that the input used in that transaction came from him. He can do this by signing some message using the key image(s) of input(s) in that transaction. To be able to generate this signature, the sender must use his private spend key. This method is not currently in use.
the view key of the receiving wallet, apparently you can also use the TX private key here, however, I don't know what this means... Someone can fill in here?
How does inner key generation work?
|
0.999732 |
Question: Pinto says, "The horse is not Black."
Sandy says, "The horse is either Brown or Grey."
Andy says, "The horse is Brown."
At least one is telling truth and at least one is lying.
Can you tell the color of the horse?
The color of the horse can be any color other than Black and Brown.
If the color of the horse is Black - all are lying.
If the color of the horse is Brown - all are telling truth.
Thus, the horse is neither Black nor Brown.
If the color of the horse is Grey - Pinto and Sandy are telling truth whereas Andy is lying.
If the color of the horse is other than Black, Brown and Grey - Pinto is telling truth whereas Sandy and Andy are lying.
You must have noticed that for the given conditions, Pinto is always telling truth whereas Andy is always lying.
|
0.999999 |
If you are backpacker, you know how important it is to pack your backpack properly. It is a task that makes or breaks your trip. There some proven best practice that makes your journey easier. For example, you should put your heaviest gear, such as tent and electronics near your back, and put the light gear such as sleeping bags and coats at the bottom.
|
0.952007 |
Archibald Atkinson, nicknamed Tommy, served aboard the light aircraft carrier USS Bataan (CVL-29) from her commissioning on November 17, 1943, through the end of World War II. According to his son and this novel's author William Illsey, his father Tommy had started to sketch a fictional account of his life as far back as the mid-1990s, but no explanation is provided as to why he favored fiction over a biographical memoir. His son, a science writer and columnist who has authored several novels, completed his father's fictional sketch and turned it into a well-written novel with realistic crisp dialog and interesting plot turns. Tommy covers from his childhood in California and Oregon through the return of Bataan from Japan to Boston Naval Shipyard on October 30, 1945.
With a unique perspective in comparison to most war fiction, the hero is an accomplished mathematician. Tommy excels in his mathematics and science courses at the U.S. Naval Academy, where he graduates in 1934 but does not enter the Navy due to a dearth of positions during the depression. He next completes the MBA program at MIT's Sloan School, where he meets Feathers Mason, who becomes a good friend and also serves aboard Bataan with Tommy as a fleet liaison for CINCPAC (Commander in Chief, Pacific Command) Intelligence. Japan's attack on Pearl Harbor puts Tommy back into the Navy but not where he expected. He becomes a professor of mathematics and navigation at the University of Michigan to teach classes to Navy men.
When he gets assigned to the light aircraft carrier Bataan, he uses his mathematical genius to create anti-aircraft protocol to protect the ship from incoming enemy planes by solving differential equations for minimum risk and maximum protection. When the chief navigator gets arrested for misconduct including being drunk on duty and uttering physical threats, the captain asks Tommy to replace him and also to assist with the training of the gun crews. He quickly becomes an expert at gunnery even though that is not his specialty, and his anti-aircraft defense ideas and his intense training of the gun crews lead to Bataan's surviving unscathed from enemy attacks.
In this fictional account, the Japanese kamikaze aircraft do not start to attack the American fleet until Okinawa. Atkinson explains that he made some changes in historical dates and sequences of events in order to create a more readable narrative. On April 1, 1945, the first day of the Allied invasion of Okinawa, Bataan shoots down several kamikaze attackers. A Judy dive bomber misses Bataan's stern by only 18 inches as Tommy takes over steering the ship to avoid the Japanese kamikaze when the young helmsman freezes at the incoming plane. The Bataan crewmen witness the bombing of the carrier Franklin, and one of the CAP (Combat Air Patrol) fighters from Bataan chases and shoots down the Japanese plane that dropped the bomb. During the battle with Japanese planes, an American cruiser's gunfire hits Bataan by mistake and kills seven men, including Tommy's friend Feathers, who Atkinson explains in the Afterword is a totally fictional character. The rest of the book blends fact and fiction, so the reader cannot tell where the truth about Tommy's feats ends and the fiction begins.
Feathers describes the kamikaze suicide operations of the Japanese as "fanaticism" and "crazy hate." He incorrectly explains that Ten-Go refers to the Japanese strategic term for the kamikaze aircraft operations. Ten-Go actually refers to the Japanese naval operation on April 6-7, 1945, when the battleship Yamato and nine other ships headed from Japan's Seto Inland Sea toward Okinawa on a special (suicide) attack mission. Feathers also mistakenly says that Ten-Go literally means "floating chrysanthemums" when it actually means "operation heaven." The Japanese word kikusui means "floating chrysanthemums" and was used by the Japanese to name the ten mass kamikaze attacks made against the Allied fleet between April 6 and June 22, 1945. The author incorrectly gives the date that planes from Bataan assisted in the sinking of the battleship Yamato as April 6 rather than the correct date of April 7, 1945, which cannot be attributed to his desire to create a more readable narrative.
|
0.983774 |
A 43 year old male sustained a full thickness burn on both of his upper extremities and dorsum of the hands. To begin occupational therapy treatment, what would be the safest exercise to complete with this patient?
It is important to keep safety in mind first when working with a patient who has a full thickness burn. The therapeutic position for the wrist is slight extension with burns. It will be safest to start distal to proximal with a small joint and initially placing the patients wrist in slight extension will give the new graft some slack and then the OT can provide ROM one joint at a time.
|
0.998621 |
can te give me a mostra recommendation based on what I like?
New York has a long history with delivering some very funny Televisione shows starring some very big personalities. Think “Seinfeld,” “30 Rock,” “Friends,” and tons of others that have brought big laughs as they offered up crazy stories about The Big Apple. And, they’ve also dato opportunity for hundreds of actors to mostra off their comedy chops.
Who doesn’t Amore a tasty meal o good laugh?
Sometimes we want to forget who we are and just disappear. But, imagine if this really happened to te due to a traumatic event.
This is the storyline behind a recente episode of NBC’s long-running drama series “Law & Order: SVU.” In ‘Exile,’ actress Aimée Spring Fortier stepped in the shoes of an assault victim suffering from such a disorder – and she’s completely unaware of it when she wakes up in a hospital with no memory.
Today you’re chasing down bad guys and tomorrow te are the bad guy. That’s the life of make-believe that every actor enjoys.
One such actor is Scott Subiono, who recently portrayed good guy DEA Agent Tony Marino leading the hunt for drug dealers in the secondo season of John Singleton’s FX series “Snowfall.” Set in the 80’s, the mostra sets forth a gritty and dangerous tale of the rise of crack cocaine in Los Angeles.
Some Televisione shows depict “normal” life, while others are out to redefine what that word even means.
The recently released Season Two takes a strong approach to showcasing just how normal a person living with autism can be. From creator Robia Rashid, this family dramedy follows a teenager (Keir Gilchrist) on the autism spectrum longing for Amore and independence.
It’s getting hot in here -- and do te know why? It’s because Tyler Perry’s original hot and steamy drama ‘The Haves and The Have Nots’ for OWN is back.
That’s right! All the sizzle and romance has returned for the secondo half of Season Five, including the newest character Derrick David – played da actor Keith Burke.
The new original Starz drama “Vida” has been gaining momentum since launching on May 6th. Created da Tanya Saracho, the buzz for the series mainly emphasizes its Latinx focused, female-driven, queer storyline. But, it would be a shame if the solid supporting cast were to go unmentioned as part of the reason for its success.
|
0.933196 |
Slavery, generally absent any modern conception of race, had long been common practice around the world and usually involved the enslavement of war captives. For centuries before European settlement, American Indian tribes had enslaved other Indians as a cultural practice—but not as a means of recruiting a dominant labor source. The Spanish, in turn, enslaved Indians to work on North American sugar plantations, using the repartimiento and encomienda systems to apportion Indians and land, and to govern their use, respectively. Only when mistreatment decimated whole indigenous populations did the Spanish government, in 1542, outlaw Indian slavery, at least in name. The practice continued in deed.
Neither the Spanish nor the English immediately sought to enslave the Indians they encountered. Indian slavery did not become official Spanish policy until 1503, or eleven years after first contact. It is clear that the English wanted to mimic Spanish efforts at creating indigenous tributaries for a labor force, but it took them even longer. The tributary relationship involved the exchange of Indian goods and labor for colonial protection against enemy tribes. Upon their arrival in 1607, the English initially sought to establish this kind of tributary trading relationship with the Algonquian-speaking Indians of Tsenacomoco, a paramount chiefdom of twenty-eight to thirty-two small chiefdoms and tribes stretching from the James to the Potomac rivers. The Indians had food the English needed and the English provided tools, weapons, fabric, and copper-made items the Indians considered to be spiritually valuable. Indians labored for the English as indentured servants without clearly defined rights or lengths of service. Conflict soon weakened such relationships.
An early mention of an Indian slave appears in the context of the First Anglo-Powhatan War (1609–1614). In his Trewe Relacyon, George Percy recounts an English march on an Indian town guided by an Indian named Kempes, who was "led in a hand locke" and is described as a slave working under the threat of beatings and beheading. The war, meanwhile, resulted in English expansion outside Jamestown, which helped create another use for forced Indian labor. With the subsequent development of tobacco as a cash crop came the need for an abundant and cheap labor supply to work the fields. Then, on March 22, 1622, Indians under the leadership of Opechancanough attacked settlements along the James River, killing nearly a third of the English population and initiating the Second Anglo-Powhatan War (1622–1632). With the friendly tributary approach decaying, a new English policy toward the Indians was born of this violence and found expression in the official Virginia Company of London report of the 1622 attack, A Declaration of the state of the Colonie and Affaires in Virginia. Describing Virginia's Indians as "a rude, barbarous, and naked people" who worship the devil, the report's author argued that "the Indians who before were used as friends may now most justly be compelled to servitude and drudgery." As the historian C. S. Everett has explained, the enslavement of Indians from 1610 to 1645 tended to be a form of "punitive retribution."
Animosity and distrust was growing between the English and the Indians. Indians continued to provide labor under circumstances that, while legally unclear, often amounted to slavery. Everett has argued that deeds and wills from this time period indicate that Indians were inherited within white families and that they "were not indentured servants … Indisputably, and by 1661 at the latest, Indians could be—and were—lifelong servants." In other words, they were slaves.
Only after the Third Anglo-Powhatan War (1644–1646) did Indian slavery become a lucrative part of the Virginia economy. The treaty ending the war defined the tribes and chiefdoms of Tsenacomoco as a tributaries and subject to English rule, requiring yearly payment to the crown and dictating where Indians could live, hunt, and trade. To coerce Indians to comply with the treaty, the English also demanded that Indian children "shall or will freely or voluntarily come in and live with the English"—serving as hostage-servants in English households. The English claimed they were educating and converting the children to Christianity as part of the tributary system, but many Indians complained that these children were subsequently sold on the slave market.
By 1649, the enslavement of children in English households and the stealing of Indian children for the slave market was so common that the General Assembly enacted two laws: one stipulating that no tributary children could be sold as slaves, the other that they could not be kept in households after the age of twenty-five. The assembly passed similar prohibitions in 1655, 1656, and in 1657, outlining punishments for anyone stealing and enslaving Indian children. Despite these laws, by the late seventeenth century many Indians refused to bring their children to English households due to the threat of enslavement. And even as Virginia prohibited the enslavement of Indian children, the government sometimes encouraged it. Officials in Accomack County, for instance, on June 16, 1670, commissioned a man they called "Mr. John" to find Indian children to sell to the settlers.
Not only were children being enslaved after the 1646 treaty, but the treaty's provisions for English dominance led to the practice of enslaving Indians for legal violations and even as a means of financing war. For instance, when John Powell appealed to the General Assembly in 1660 for damages caused by Indians in Northumberland County, the assembly responded with a retribution act compensating him with the sale of Wicocomoco Indians, who would be "apprehended and sold into a fforraigne country." The historian Edmund S. Morgan has explained that the casual nature of this act "speaks volumes" about the acceptability of enslaving Indians by this period.
Similarly in 1666, Governor Sir William Berkeley presided over the General Court and declared that hostilities with the tribes of the Northern Neck be revenged by "utter destruction," and that taking "their women and children and their goods"—i.e., selling them—would compensate the colony for the costs of the expedition. Although a 1670 law indicated that captives should be servants who are freed at age thirty and not slaves bound to a lifetime of forced labor, the law was largely ignored.
After 1646, Indian labor was more common in many forms, from child hostages to indentured servants to slaves. These enslaved Indians worked in the fields and as house servants, interpreters, hunters, and guides. English colonists preferred enslaved Indian women and children as domestic laborers, rather than African or white laborers, because they were considered easiest to train and control. Indian men were perceived to pose a greater risk of obstinacy and escape, and so they were often profitably sold to American buyers as far away as New England or to the sugar plantations in the West Indies (where they could not escape). The historian Everett has argued that when these external markets became available, financial incentive overtook vengeance as the primary driver of Indian enslavement. When the English colonists began to participate in an existing Indian trade that involved slaves and guns, Indian enslavement briefly became an important part of the colonial economy.
By the middle of the seventeenth century, labor-intensive tobacco dominated the Virginia economy, requiring a large and steady workforce. In addition to mostly white indentured servants and African slaves, English colonists also relied on enslaved Indians. They were purchased often from other Indians, who captured their enemies and traded them to English dealers for English guns. Once some tribes began to be well-armed from the gun trade, others were often compelled to enter the market: if they didn't arm themselves with European weapons and enslave other Indians, they would themselves become targets of slavers. As the English increasingly wanted to trade for slaves, and Indians increasingly wanted to trade for guns, the market focused more on slaves while also becoming more violent.
Several Indian tribes became prominent slavers in Virginia, including the Ricahecrian tribe. Originally from the area around Lake Erie, in New York, the tribe had been displaced by the Iroquois during the Beaver Wars, a series of Indian conflicts during the mid-1600s. In 1656, the Ricahecrian Indians abandoned their settlements in New York and moved south, seeking trade at the falls of the James River in Henrico County. After settling in Virginia and becoming known as the Westo, they became feared raiders. Initially, Colonel Edward Hill was charged by the General Assembly with nonviolently removing the Westo Indians from the region. However, Hill's militia, aided by Pamunkey and Chickahominy forces, fought the Westo at the Battle of Bloody Run (1656), in Richmond, which resulted in the death of Totopotomoy, weroance, or chief, of the Pamunkey. The assembly subsequently suspended Hill and charged him with paying for an agreement of peace with the tribe. The Westo then secured arrangements with English traders to barter guns for slaves. The colony was less concerned with forcing the Westo Indians into tributary status and more interested in profitable trade.
The Westo built an arsenal and began overpowering local tribes in Virginia and North Carolina, enslaving captives for the marketplace. The trade was so successful that, by late 1656, the Westo had expanded their influence, moved farther south out of Virginia to the Savannah River (in what would become Georgia), and began raiding as far south as the Spanish mission towns in the Florida. They raided communities, killing and enslaving for the English market. By 1659, the Spanish reported that these raiders were armed with guns and assisted by traders from Jamestown, such as the preeminent English trader Abraham Wood, who fed the newly enslaved Indians into the Virginia marketplace. In early 1662, Governor Berkeley placed Wood in charge of all trade with Indians like the Westo.
When the Westo vacated their place on the Virginia Piedmont trading path, members of the Occaneechi tribe, living on the falls of the Roanoke River, established themselves as the dominant Indian slave brokers in Virginia. As this trade in guns and slaves became larger and more profitable, conflict among tribes increased. Violence erupted on small and large scales. In 1670, for instance, Occaneechi Indians responded to Westo raids, killing Westo Indians aligned with Wood. The Westo and the Occaneechi raids spurred tribal conflict throughout the entire Southeast, and many Indians were killed, enslaved, or otherwise scattered.
There were sporadic attempts in Virginia to regulate the Indian slave trade, often motivated to ensure that the government retained part of the profits. These regulations ultimately had little influence on the trading economy. Laws allowing Indian war prisoners to be enslaved were enacted in 1660, 1668, and 1676. A law requiring Indian war captives to be servants and not slaves was passed in 1670 but largely ignored. The General Assembly required licenses to engage in trade with the Indians, but many traders easily participated outside of these regulations.
While trade between colonists and Indians grew, so did conflict and animosity. King Philip's War (1675–1676) was a violent but failed attack on the New England colonists by allied area tribes that struck fear of hostile Indians into even Virginia colonists, who were not only increasingly suspicious of Indians but also cognizant that Indian conflict increased their access to slaves for the booming international market.
Laws that sometimes contradicted one another and were only sometimes enforced, combined with local anxieties and government policies that varied from brokering peace to encouraging warfare helped create instability. This, in turn, served as a backdrop to Bacon's Rebellion, which began in 1676.
William Byrd I, a former militia captain, operated a successful trading business at his Falls Plantation, on the James River. He traded in guns, rum, tools, cloth, and Indians. In 1676, warfare between Potomac River Valley tribes and English settlers led to a raid by Susquehannock Indians that killed several of Byrd's employees. Byrd did not believe the General Assembly acted strongly enough in avenging his losses, and his dissent, combined with trading partner Nathaniel Bacon's longstanding disputes with the governor over when and how he could wage war against the Indians, sparked the failed rebellion. By its end a year later, colonists had routed both the Susquehannock Indians and the allied Occaneechi.
Byrd eventually reaffirmed his loyalty to the General Assembly and reestablished his trade in enslaved Indians and, later, Africans. Still, the question of how to legislate Indian enslavement had not been settled. Colonists benefited from the hostilities with and among Indians by gaining captured slaves and land, and they successfully pressed for government-sanctioned violence against Indians. The General Assembly subsequently passed a 1682 act confirming the legality of enslaving Indians. For reasons unclear to scholars, the assembly then passed a 1683 act reversing this position and stating that no Indian could be a slave.
While the assembly exhibited indecision about enslaved Indians, vacillating between the benefits of peaceful co-existence and the profits of trade in enslaved laborers, Indians suffered extensively in the late 1600s from warfare and enslavement. Records cannot provide exact numbers, but scholars estimate that up to 50,000 Indians were sold into slavery from the southeast during this period, many of them presumably ending up in the West Indies. Virginians became more and more suspicious of local Indians and the increased violent conflicts had taken a serious toll on Indians. The raiding Westo and Occaneechi Indians had helped instigate growing intertribal warfare, decimating or enslaving Indian populations all over the Southeast. As a result, Indian tribes began refusing to engage in trade with settlers, but there also were many fewer people left to enslave.
By late in the seventeenth century, African slaves were overwhelming the colonial market, providing more abundant labor with less internal conflict than enslaved Indians. Indentured servants, which had served as a primary labor source, were even less available and more expensive than slaves. The General Assembly still found a use for Indian enslavement however, when it punished the Nansiattico Indians in 1705 for a single murder by exporting the entire surviving Nansiattico community to Antigua for sale as slaves. This was the same year that the assembly passed a comprehensive slave code solidifying the shift of the colonial economy from one based on indentured servitude to a slave-labor system remaining until the American Civil War (1861–1865): it declared all slaves, African or Indian, "real estate." Enslaved laborers became de-humanized under the law, ushering in the southern economic system that protected the rights of white planters and viewed enslaved laborers as property to be exploited.
While Indian slaves and servants continued to appear throughout Virginia in the eighteenth century, by 1800, Indian slavery as an economy was completely overtaken by the influx from the African slave trade. Scholars disagree on the exact reasons for the fall of Indian slavery in the colonies, with some suggesting that the Indians' poor health and ease of escape made them harder to control than imported Africans who had little knowledge of the terrain or language; while others point to strict economic factors, citing the cheap and abundant labor market available through African slave trade, and the ease with which black people could fit into the ever-solidifying concept of a white versus black racial system in the early United States. Virginia court cases in the early 1800s including Hudgins v. Wright (1806) finally provided a lasting declaration that Indians would be a free class of people, and that freedom would be based upon proof of Indian maternity. This ruling followed the legal precedent from 1662 that servitude follows "the condition of the mother." Many enslaved Indians filed petitions for freedom, and won. Many others did not have access to courts or the ability to file a suit. Over time, several states followed Virginia's precedent and legalized the freedom of Native peoples. Enslaved Indians did not disappear from Virginia after this ruling, but they did become a less visible issue, with the larger focus turning towards legislating the African chattel slavery that fueled the South's exploding plantation economy.
At this time, many countries internationally protested the Atlantic slave trade, and it was halted England in 1807 and the United States in 1808. In response, the former colonies established a robust interstate slave trade to meet their continued agricultural labor needs.
October 1646 - The General Assembly confirms the Treaty of Peace with Necotowance, a peace treaty ending the Third Anglo-Powhatan War and creating Native tributaries.
1656 - The Ricahecrian Indians, later known as the Westo, arrive at James River Falls and become a dominant trader in enslaved Indians.
November 1676 - The most bitter and intense fighting of Bacon's Rebellion comes after the death of Nathaniel Bacon the previous month. Rebels retain control of nearly all of Virginia outside the Eastern Shore.
December 25, 1676 - Forces loyal to Governor Sir William Berkeley rout a garrison of rebels on the Southside during Bacon's Rebellion. Over the course of the next week, the two main rebel commanders (based on the York River) are persuaded to switch sides.
October 1705 - In "An act concerning Servants and Slaves," the General Assembly compiles and revises more than eighty years of law regarding indentured servants and enslaved Africans.
Everett, C. S. "'They shalbe slaves for their lives': Indian Slavery in Colonial Virginia." In Indian Slavery in Colonial America, edited by Alan Gallay, 67–108. Lincoln: University of Nebraska Press, 2009.
Morgan, Edmund S. American Slavery, American Freedom: The Ordeal of Colonial Virginia. New York: W.W. Norton and Company, 1975.
Rice, James D. Tales from a Revolution: Bacon's Rebellion and the Transformation of Early America. Oxford, United Kingdom: Oxford University Press, 2012.
Shefveland, Kristalyn Marie. "The Many Faces of Native Bonded Labor in Colonial Virginia." Native South 7 (2014): 68–91.
Snyder, Christina. Slavery in Indian Country: The Changing Face of Captivity in Early America. Cambridge, Massachusetts: Harvard University Press, 2010.
Shefveland, Kristalyn. "Indian Enslavement in Virginia." Encyclopedia Virginia. Virginia Foundation for the Humanities, 7 Apr. 2016. Web. READ_DATE.
Contributed by Kristalyn Shefveland, assistant professor of American History at University of Southern Indiana, and author of several essays related to Indians in Virginia.
|
0.997886 |
A white knight is an individual or company that acquires a corporation on the verge of being taken over by an unfriendly bidder/acquirer, otherwise known as a black knight. Although the target company does not remain independent, acquisition by a white knight is still preferred to a hostile takeover. Unlike a hostile takeover, current management typically remains in place in a white knight scenario, and investors receive better compensation for their shares.
The white knight is the savior of a company subject to a hostile takeover. Often, company officials seek out a white knight to preserve the company's core business or to negotiate better takeover terms. An example of the former can be seen in the movie "Pretty Woman" when corporate raider/black knight Edward Lewis, played by Richard Gere, had a change of heart and decided to work with the head of a company he'd originally planned to ransack.
Some notable examples of white knight rescues are United Paramount Theaters 1953 acquisition of the nearly bankrupt ABC, Bayer's 2006 white knight rescue of Schering from Merck KGaA, and JPMorgan Chase's 2008 acquisition of Bear Stearns that prevented their insolvency.
A few of the most hostile takeover situations include AOL's $162 billion purchase of Time Warner in 2000, Sanofi-Aventis' $20.1 billion purchase of biotech company Genzyme in 2010, Deutsche Boerse AG's blocked $17 billion merger with NYSE Euronext in 2011, and Clorox's rejection of Carl Icahn's $10.2 billion takeover bid in 2011.
Successful hostile takeovers, however, are rare; no takeover of an unwilling target has amounted to more than $10 billion in value since 2000. Mostly, an acquiring company raises its price per share until shareholders and board members of the targeted company are satisfied. It is especially hard to purchase a large company that does not want to be sold. Mylan, a global leader in generic drugs, experienced this when it unsuccessfully attempted to purchase Perrigo, the world's largest producer of drugstore-brand products, for $26 billion in 2015.
In addition to white knights and black knights, there is a third potential takeover candidate called a gray knight. A gray/grey knight is not as desirable as a white knight, but it is more desirable than a black knight. The gray knight is the third potential bidder in a hostile takeover who outbids the white knight. Although friendlier than a black knight, the gray knight still seeks to serve its own interests. Similar to the white knight, a white squire is an individual or company that only exercises a minority stake to aide a struggling company. This aide provides the company with enough capital to improve its situation while allowing the current owners to maintain control.
A gray knight is a friendlier alternative to a hostile black knight in corporate takeover situations where a white knight cannot make a deal.
White-shoe firm is a slang term for the most prestigious firms in professions such as law, investment banking and management consulting.
|
0.997294 |
The phrases "center" and "periphery" are rather correct to anthropologists, for the reason that ordinarily they appear outward from institutional "centers"-universities, museums, executive bureaus-to know about humans at the "peripheries." but anthropology itself, in comparison with economics, politics, or historical past, occupies an area a bit at the margins of academe. nonetheless, anthropologists, who keep watch over esoteric wisdom concerning the gigantic variety of human edition, frequently locate themselves in a theoretically relevant place, capable of critique the "universal" truths promoted by way of different disciplines.
Central websites, Peripheral Visions provides 5 case stories that discover the dilemmas, ethical in addition to political, that emerge out of this targeted place. From David Koester's research of the way ethnographic descriptions of Iceland marginalized that country's inhabitants, to Kath Weston's account of an offshore penal colony the place officers combined felony paintings with ethnographic ambitions; from Brad Evans's reflections at the "bohemianism" of either the Harlem fashion and American anthropology, to Arthur J. Ray's research of anthropologists who function specialist witnesses in criminal situations, the essays within the 11th quantity of the historical past of Anthropology sequence give some thought to anthropology's consistently problematical prestige as centrally peripheral, or peripherally central.
Finally, George W. Stocking, Jr., in a contribution that's nearly a e-book in its personal correct, strains the pro trajectory of yankee anthropologist Robert Gelston Armstrong, who used to be unceremoniously expelled from his position of privilege due to his communist sympathies within the Nineteen Fifties. by way of taking on Armstrong's unfinished company a long time later, Stocking engages in a longer meditation at the dating among middle and outer edge and provides "a form of posthumous reparation," a web page within the heritage of the self-discipline for colleague who may well differently have remained within the footnotes.
What's a meme? First coined by way of Richard Dawkins within the egocentric Gene, a meme is any concept, habit, or ability that may be transferred from one individual to a different by way of imitation: tales, models, innovations, recipes, songs, methods of plowing a box or throwing a baseball or creating a sculpture. The meme is usually some of the most important--and controversial--concepts to emerge because the foundation of the Species seemed approximately one hundred fifty years in the past.
For many years the is still of fossils present in Piltdown, England have been believed to come back from a "missing link," a creature with a human skull and an ape's jaw. Dr. Weiner exhibits how he found the reality approximately those is still, and went directly to divulge one of many world's maximum medical frauds.
Towards the instant, within the political autobiography he wrote for Tax and Eggan he recommended that there have been no “serious increase in Marxist inspiration because the ebook of Lenin’s Imperialism,” and “the entire highbrow constitution” was once now “obsolescent” (Armstrong 1953). It took no account of “the improvement of worldwide economic system in the course of and after international wars” and “almost no account of twentieth century technology, which has deeply replaced our thought of matter—a easy element for materialist philosophy. ” notwithstanding Marxists may have Marx’s books on their cabinets, they now not learn him. The “great majority of energetic communists” had a “religious instead of a systematic angle in the direction of the Communist circulate mostly and in the direction of Russia in particular,” and an identical non secular perspective “had deeply permeated Russian considering. ” for that reason, Armstrong had determined that “neither the Soviet nation nor the Communist occasion represented a sufficiently excellent excellent to warrant taking the punishment that persisted club entailed” and that his “best contribution to the hopes of mankind” lay in his “continued medical paintings, the result of which i will be able to, after all, no longer warrantly to anyone. ” during this context Armstrong later recalled having embarked “on a theoretical learn that also pursuits me”—presumably, the incomplete draft that survives in his scholar dossier entitled “Society and subject” (1950a). modern correspondence shows that Armstrong all started writing “Society and topic” within the fall of 1949, whilst he used to be “about prepared” to begin writing his dissertation yet discovered that, after years away, his Africa venture “looked very chilly certainly. ” meanwhile he had turn into “real ” in a “lot of theoretical sidelines,” which he needed to “get off my chest,” it sounds as if simply because he felt that his “basic correct to a materialist standpoint have been known as into 122 George W. Stocking, Jr. query” (JMP:10/4/49, 1/6/52; DAP:RA/RR 2/15/2l, RA/FE 4/30/51). yet after a “five-months expedition into theoretical eco-friendly pastures” he positioned “Society and subject” apart unfinished at a time whilst his curiosity within the Africa venture were revived (JMP:10/4/49, 1/6/52). even supposing the draft that survives in his pupil dossier is unmarked, one could simply think that it can no longer were good bought. Politically, the timing used to be, to assert the least, unpropitious, and, fairly apart from its Marxist orientation, its boundary-stretching content material could most likely were considered as “not anthropology. ” yet as an strange if no longer particular attempt to maneuver past Steward’s “matter-of-fact materialism” and the Marxish orientations of the “Columbia gang” towards an explicitly (if idiosyncratically conceived) Marxist theoretical framework for anthropological study in a political second of burgeoning McCarthyism, “Society and subject” turns out priceless of significant ancient attention (cf. Stocking 2002d). Armstrong’s typescript opens with a twenty-four-page prologue within which he stated how, during gathering “data” from the monographic literature for “a thesis approximately African state or country structures,” he had run into unspecified difficulties that took him “far into the actual and organic sciences.
|
0.999928 |
The Canon PowerShot G1 X was announced recently, and took a lot of people by surprise. While Nikon have launched their mirrorless, large sensor cameras in the Nikon 1 series, not many rumors existed about Canons mirrorless competitor. It turns out that their answer was a large sensor compact camera, without interchangeable lenses.
The sensor size was also a bit surprising: Larger than Four Thirds, but smaller than APS-C. This sounds like an odd sensor format. But is the sensor format really that odd? Let's try to have a closer look at it.
We know that the Canon G1X sensor is reported to be 18.7mm x 14mm. The Four Thirds sensor size, on the other hand, is somewhat smaller at 17.3mm x 13mm.
But the Panasonic GH1 and GH2 have employed oversized Four Thirds sensors. This design choice was implemented to get the same diagonal field of view in the 16:9 and 4:3 modes, utilizing the full image circle also for video. The Panasonic GH1 has 4000x3000 pixels in 4:3 mode, and is 4352 pixels wide in 16:9 mode. This means that the width of the sensor must be 17.3mm x 4352 / 4000 = 18.8mm. Which is rather close to the reported width of the Canon G1X sensor. The differences in reported size might be due to rounding off differently.
What about the vertical size? The GH1 sensor is reported to have 14 megapixels in total, which corresponds to a vertical resolution of 3217 pixels. Hence, the vertical size must be 13mm x 3217 / 3000 = 13.9mm. Again this is very close to the reported height of the Canon G1X sensor.
Both sensors are of the CMOS type, and both have a base ISO of 100.
My conclusion is that the specifications of the Canon PowerShot G1 X sensor are remarkably similar to the Panasonic GH1 sensor. This doesn't mean that they are identical, though. But given that there are not that many sensor manufacturers out there, and certainly not for the Four Thirds sensor size, I would say this is a good indication that Panasonic do in fact produce the sensors for the Canons G1X. As you understand, this is of course purely speculation.
A fundamental difference between the two cameras is that the Panasonic GH1 only gives you a maximum resolution of 12 megapixels for one single exposure, with the option of changing the aspect ratio with the same image circle.
The Canon G1X, on the other hand, gives the full sensor resolution output for a single exposure. However, when using video (16:9 aspect ratio), only a smaller image circle is used, meaning that the effective focal length changes.
- Who made the sensor for Canon EOS-1D?
I personally don't think it is the same sensor or is made by Panasonic, but rather it is a convenient size and resolution. Mostly because Panasonic still lags behind Canon in terms of noise performance.
Anyways, G1 X is pretty interesting, I hope it would get wider auto-ISO range and some bits of feature that is already on older cameras like 5D MK2 (Like highlight priority...).
Oh, just one early complaint, the AF-assist beam is crap, all it does is blind whoever you are shooting, and not really helping anything. I think it is because when you shoot in dark area, the sensor is already cranked way up so that you can see something in the LCD. When the AF assist beam shows up, the scene became way over-exposed from the bright beam. Of course the camera would need time to stop down and do this and that. It just makes it even slower.
What can we expect from the GH3?
|
0.99771 |
What is a doorway page for SEO?
Doorway pages are simple web pages that are customized to a few particular keywords or phrases, and they are programmed to be visible only by specific search engines and their spiders. The purpose of these doorway pages is to trick the search engines into giving these pages higher rankings; this sounds okay until you realize that they are not static destinations. Instead, doorway pages are specifically aimed towards search engine spiders - once a searcher lands on a doorway page, they are instantly redirected to the "real" website.
These sort of pages are, in a nutshell, bad SEO. The basic philosophy of search engine optimization is very simple, and it does not include building invisible (at least to users) pages full of keyword gobbledygook in the hopes of getting ranked just a bit higher in the search results. Plus, search engines spiders are becoming more intuitive, and these pages can be ignored, or even banned altogether.
Most if not all search engines have guidelines prohibiting the use of doorway pages, or at least the general idea of them. This sort of content is considered "spammy", and spammy SEO practices might work in the short-term but in the long run, they can get your site flagged for review and censure. Plus, using these kinds of techniques tends to bring down the general trustworthiness of your site.
Will they help my site?
Unfortunately, many, pseudo-SEO consultants will tell you that doorway pages are the “only” way to get your site to the top of the heap; and will recommend you buy costly software that will churn these pages out, and fast.
However, all these pages just create useless clutter in the search engine results, making the search process even less effective. In addition, these magical software packages expect a lot of work from you, the user. You have to come up with keywords, key phrases, keyword density, fill out templates, Meta tags, etc. Honestly, if you’re willing to do that for doorway pages, an unethical and short-sighted way to approach search engine optimization, then you might as well optimize your site for search the right way.
Perhaps you are facing the unique dilemma of a site that does not have any keyword-dense content or effective Meta tags. You might be thinking that the only way for your site to get ranked is to buy that expensive software and start cranking out pages and pages of content. To this particular situation, I would say this: Fix Your Site. Don’t settle for the so-called “easy” solution. Every page of your site needs to be optimized for search, which means that it needs to appeal to searchers and what they are looking for.
Search engines and search engine users all are looking for the same basic thing, which are good sites filled with good content. Simple. It’s not rocket science. There’s really no need for tricks that redirect users to the “real” site. If you have a site with thoughtfully placed keywords and key phrases, well-written content, and effective Meta tags, then you don’t need a doorway page.
If you have a site, and this site is on the Web, and you’ve done your SEO homework, it eventually will be found. Every well-optimized site already has a natural entryway; which is just the main page. Of course, (if you have more than one page) you will have an efficient navigation system that users can use to get to the rest of your site.
Doorway pages are tempting to use since they actually do attract both more search engine spiders and search engine users. However, search engine optimization is best viewed in the long term, and these pages are not part of a successful, long-term, search engine optimization strategy.
Where Should You Put Keywords in Your Copy?
How Do You Choose Beneficial Keywords for Your Site?
|
0.946672 |
Summary: An under-the-weather Elle gets some new orders.
Bob Bishop is frowning. Contrary to his appearance, which is well-suited to frowning as a default moue, he isn't always frowning. The office that he's forced in, a far cry from his former office full of rich antiques and things that belonged to him alone, and instead filled with shades as drab as Primatech Paper and a small, cramped desk, makes Bob Bishop frown. The headlines on the issue of the New York Times sitting on said desk, detailing a virus outbreak in the city, make Bob Bishop frown. The lukewarm coffee he sips at from a complimentary Yamagato Industries cup makes Bob Bishop frown, but he drinks it anyway, seemingly out of habit as he glowers down at the newspaper, the black receiver of a phone pressed to his ear, listening to voice messages.
If she had known before coming this far that he was in this kind of mood, Elle might have stayed away. She might not have bothered him with what she has to say right this second, and instead kept it for a better time. But she doesn't know what kind of a mood he's in, and, well, she's frustrated. So it is that she rounds the corner and knocks on the doorframe, waiting there to be asked in.
She looks like death - or very nearly, anyway. Her fair skin is paler still, dark circles have formed beneath her eyes, and she looks like she might have lost weight. She's dressed too warm for the temperature of the building, but she doesn't seem to notice. Still, she's here, standing in the doorway, waiting. Her voice is ragged when she asks, "Got a minute?"
Bob takes a sip of his slowly chilling coffee before giving an answer. He first makes a foul face, not looking away from the newspaper, or moving the phone away from his ear, then says, "Come in, Elle." He doesn't look up until he hears the door open. And lo, another cause to frown. "You look horrible. Close the door behind you."
The door is closed with a quiet click, and Elle crosses the room to sit in one of the chairs facing his desk. The minute she's seated, she sinks down some and wraps her arms around herself, hunching her shoulders. "I don't look that bad," she protests, though even she knows it's a lie. She doesn't insult him with the suggestion that it's just the flu that's been travelling through the office. Fixing a level stare on her father, she pauses for a second, watching his face. "I haven't been given an assignment for a week that wasn't just desk work. Thought maybe you might know why."
Bob, who calmly presses a button on the rather high-tech phone sitting on his desk, finally hanging up on the voicemail system, regards Elle steadily. His glower has not left. He folds his hands one on top of the other. "You ought to know why, Elle. Just look at you." There is, if one listens closely, a rivulet of concern in those words rather than flat-out insulting the young woman for looking like hell cooled over. "Realistically, I should have relieved you of desk duty also, days ago. Where you should be is a hospital bed."
"And I'm glad, the information you gained from Ms. Hanner may prove to be invaluable, but you weren't at your best then and you're only getting worse. You have a serious virus, Elle." Let's not beat around the bush. Behind his glasses, Bob's eyes never stray from his stubborn offspring. "I can't have you out on the field while you're off your game. Especially not with Sylar still at large. You're a walking target. Furthermore, you could be putting others at risk if you're not careful."
Clenching her jaw tight, Elle regards her father with a strangely patient sort of irritation. She tenses when he mentions Sylar's name, but it slowly eases out of her muscles as she leans back in the chair again. "I could still take him," she says, her voice lowered, knowing she shouldn't even say it. Tempting fate, and all of that. After taking a moment to pout childishly, she composes herself, changing her tone now to a more familial one. Less employee-to-boss, more girl-to-father. "I know I'm sick, Daddy, but I'm not going to sit around in a hospital bed waiting to get worse. Let me do something."
Bob's mouth straightens into a thin, tense line as he listens to Elle. He's clear that he's considering something, which at least indicates he's taking her plea seriously, but he's silent for some time before revealing his inner workings. Finally, he sits back further against his office chair. "The people Suresh are working with," that is, that aren't of this company, "Are trying to devise a cure. Now, I don't entirely trust his judgment when it comes to sharing results in full. These people have tendencies to go against our Company. However, they could be endeared a little by a face of desperation." Elle may not be at her physical best, but Bob has faith in her acting skills. "There's just one problem."
As Bob speaks, there are several thoughts running through Elle's mind, including the knowledge that the group he speaks of has cured at least one person. She'd already considered going to them and asking them to cure her; being relegated to desk work, however, she opted against doing anything that might have gotten her reprimanded even further. Now, she sits forward in her seat, listening more attentively than she had before. "Problem?"
"Let me rephrase. Two problems." Bob steeples his fingers, tapping them together and pointing the closest pair, his pointer fingers, at Elle. "One, while you were away on assignment, your… replacement… had some less-than-flattering encounters with a key member of this little medical team, not to mention one of those in their homemade quarantine. Two…" The man sighs, his gaze darkening on Elle, weighed down. He leans over the desk — this second problem must be important — and underneath the unflattering light from the ceiling lamp. He looks tired all of a sudden, the furrows in his brow and wrinkles on his face seeming deeper, or maybe it's just the light shining down on his bald head and creating shadows. Whatever the case, Bob actually appears reluctant to continue along this line of thought. He lays it down all the same. "There is no cure for this virus. I know that. The Company knows that. If Suresh, the Aldrics and the others think they've found one, they either do know something we don't, or they're deluding themselves."
"Encounters?" If Elle is aware of the stories her father heard, she's certainly putting on a convincing act otherwise. Her own frown returning, she tilts her head to one side, both suspicious and concerned. Her opinion of the woman who took her place is clear as day as she snorts derisively, just barely resisting the urge to roll her eyes. "Is there anything my 'replacement' did that wasn't a mistake? What did she do?"
"She certainly took your less becoming attributes to extremes, and got into a good bit of trouble, I might add," Bob answers sourly. "You should be familiar with Cassandra Aldric, you met her recently? Did she harbour any ill will? Your replacement did a number on her bookstore. She also attacked Elena Gomez, who has contracted the virus. I'm honestly not sure the extent of the trauma that occurred, but suffice to say they won't trust you at first. However, I have faith in your ability to show them a…" He pauses to choose the perfect phrasing. "Softer side of Elle."
"Fantastic." This is Elle's sarcastic voice. (It sounds a lot like her normal voice.) Shifting in her seat, she pulls her sweater tighter around herself, a chill overtaking her for a few seconds. "It'll work," she says, sounding quite sure of herself. "Peter is worried about me. If I show up begging for help, he'll do it." But it triggers another thought: if he really did have a cure, and it worked for others, would his girlfriend still be sick? A frown flashes across her face, but half a second later it's gone. She plants both hands against the arms of the chair and shoves up from the seat. "I'll see what I can find out."
If not, she's probably going to die. Elle can do the math, and she doesn't need any help reading the expression on her father's face. "I won't," she says, nodding her head slowly. It's all the reassurance he's going to get from her, of course; to offer any more would be admitting that she's as sick as he suggests. At first, she turns away, prepared to leave. Before even taking a step, however, she looks back to Bob with a quick, wavering smile. "Thank you, Daddy." And then she's gone, the door closed behind her.
|
0.999993 |
Context. Magnetic fields are invoked to launch, drive, and shape jets in both low- and high-mass protostars, but observational data on the spatial scales required to assess their role in the protostellar mass-loss process is still scarce.
Aims. The Turner-Welch (TW) object in the W3(OH) high-mass star-forming complex drives a synchrotron jet, which is quite exceptional for a high-mass protostar, and is associated with a strongly polarized H2O maser source, W3(H2O), making it an optimal target to investigate the role of magnetic fields on the innermost scales of protostellar disk-jet systems.
Methods. We report full polarimetric VLBA observations of H2O masers towards W3(H2O). Their linearly polarized emission provides clues on the orientation of the local magnetic field (on the plane of the sky), while the measurement of the Zeeman splitting provides its strength (along the line-of-sight). The linear scales probed by H2O masers are tens to hundreds of AU (at the W3(H2O) distance, ~2 kpc), inaccessible to other star-formation tracers.
Results. We identified a total of 148 individual maser features and we measured their physical properties. Out of 148, we measured linear polarization in 34 features, with a fractional percentage varying in the range 0.9−42%, making W3(H2O) the highest-polarized H2O maser source observed with VLBI known in the Galaxy. The H2O masers trace a bipolar, biconical outflow at the center of the synchrotron jet. Although on scales of a few thousand AU the magnetic field inferred from the masers is on average orientated along the flow axis, on smaller scales (10s to 100s of AU), we have revealed a misalignment between the magnetic field and the velocity vectors, which arises from the compression of the field component along the shock front. We also detected circularly polarized emission toward ten maser features, with a fractional percentage varying in the range 0.2–1.6%. In the gas shocked by the synchrotron jet, we estimate a total field strength in the range ~100−300 mG (at densities of 109 cm-3). We conclude that fields of this order of magnitude are expected if the observed polarized water masers emerge behind magnetically supported shocks which, propagating in the W3(H2O) hot core (with an initial density of order of 107 cm-3), compress and enhance the field component perpendicular to the shock velocity (with an initial field strength of a few mG). We constrain the magnetic field strength in the pre-shock circumstellar gas (which is dominated by the component parallel to the flow motion) to at least 10–20 mG (at densities of 107 cm-3), consistent with previous estimates from a synchrotron jet model and dust polarization measurements.
Conclusions. In W3(H2O), the magnetic field would evolve from having a dominant component parallel to the outflow velocity in the pre-shock gas, with field strengths of the order of a few tens of mG, to being mainly dominated by the perpendicular component of order of a few hundred of mG in the post-shock gas where the H2O masers are excited. The general implication is that in the undisturbed (i.e., not-shocked) circumstellar gas, the flow velocities would follow closely the magnetic field lines, while in the shocked gas the magnetic field would be reconfigured to be parallel to the shock front.
|
0.961464 |
Although Co-Ops are not very common in Los Angeles, one of my agents asked me this question and I thought I would post it here in case somebody else also would like to know.
Basic Structure: Just like buying a house, a condo is when a buyer purchases a part of a building. It’s basically like owning an apartment, but instead of paying rent, the buyer is paying a mortgage. A condo owner also has an undivided interest in certain common elements of the building, such as the lobby, lounge, and/or gym facilities.
Pros: The assessed value of a condo is usually higher than a co-op that is of similar size, design, etc. Applying for a mortgage is typically easier than for a co-op because the owner of the condo will own it outright. It is also easier to make deductions on taxes for condo mortgage payments.
Cons: Because the assessed value is usually higher than a similar co-op, property taxes are also usually higher. Condos often cannot acquire financing as an entity for large capital improvement projects, thus making it difficult to do major remodeling projects or other similar ventures. Condo boards have little power to prevent the transfer of property to other (possibly undesirable) owners.
Basic Structure: Without getting too deep into all the legalities, basically a co-op is when a buyer purchases a share (or shares) of a corporation that actually owns that building/residence, and the shares reflect his equity in that corporation.
Pros: Property tax is generally lower for a co-op than for a condo, and the taxes are usually included in monthly payments. The building’s corporation can acquire capital for large projects, and the repayments can be spread among the many co-op residents. For celebrities, the transfer of ownership can be kept hidden because it’s technically a transfer of stock and not real estate and therefore not on the public record. Co-op boards have legal power to prevent the sale of shares to others for a variety of reasons, such as concern over someone being able to make payments or celebrities who might tarnish the co-ops reputation.
Cons: First and foremost, you have to deal with co-op review boards that determine if you’re a good “fit” for the residence. Because the property is really owned by a company, some financial institutions will not provide mortgages for co-ops, which leads to smaller lender selection pools and overall higher mortgage costs. Monthly fees are generally higher because they include taxes, mortgage payments, and fees for maintaining common areas and facilities. Co-ops are usually assessed at lower values than similar condos, so bragging rights usually lag compared to your condo neighbors. And if you want more information on condos and co-ops, you can always turn to good ol’ reliable Wikipedia to continue your journey of real estate edification.
|
0.999992 |
As you are planning your Walt Disney World Vacation, one of the things that you must decide is whether you want to include the Disney Dining Plan as a part of your package. But, is the Disney Dining Plan worth it?
The short answer to this question is, it depends on how you plan to eat on your vacation. If you know that you want to do several character meals or sit-down meals, then I highly recommend the Disney Dining Plan and possibly even the Deluxe Dining Plan. If you prefer to eat on the go, without any sit-down meals, then the Quick Service Dining Plan may be the way to go for you!
So, what is included with the dining plan? There are three options when looking at dining plans for your Walt Disney World vacation package.
The Disney Quick Service Dining Plan consists of two Quick Service (QS) meals and two snacks, per person, per night of stay. Each person on the dining plan will also receive a refillable resort mug. A quick service meal consists of a meal ordered at a counter, or via the mobile app and includes one entrée and one beverage including specialty beverages such as a milkshake, hot chocolate, and coffee. For those over 21 years of age, alcoholic beverages are also included. The cost of this dining plan per night is approximately $52/adult and $24/child.
The Disney Dining Plan consists of one Table Service (sit-down) meal, one Quick Service meal and two snacks per person, per night of stay. There are over 50 table service restaurants and many only require one meal credit, including many character meals. There are also options that require two meal credits, known as Signature Dining. The table service meals also include your choice of dessert and beverage, alcoholic for those over 21 years of age or non-alcoholic. The cost of this dining plan per night of stay is approximately $75/adult and $28/child.
The Deluxe Dining Plan consists of three meals and two snacks per person, per night of stay. It is important to note that there is no distinction between quick service and table service meals with this meal plan. Therefore, guests can choose to use these credits as they want. With the Deluxe plan, guests are also eligible to receive appetizer, entrée, and dessert with each table service meal. The cost of this dining plan per night of stay is approximately $116/adult and $44/child.
Another important thing to remember about any of the dining plans is that you are not restricted to using a certain number of meals each day. You will notice when you use the dining plans that there will be a total number of credits available on any receipts that you get. This is also available to view on the My Disney Experience app. If, for example, you want to go to breakfast at a character meal that is 1 table service credit, use a snack credit for lunch and have another table service meal for dinner, you are able to do so!
So, given this information, is the Disney Dining Plan worth it?
I mentioned above that it depends on how you plan to eat during your vacation. The dining plans are not the best option for everyone. If you are traveling alone or know that you prefer to get snacks throughout the day, then this may not be the option for you.
The biggest factor in my opinion is – do you want to eat any sit-down meals? When visiting Walt Disney World, one of the best dining options, in my opinion, is character dining, which is considered a table service meal. These meals allow you to dine and meet some of your favorite Disney characters without waiting in line. The average cost for one of these meals is approximately $50/adult, depending on the meal. The average quick-service meal with a drink is approximately $12-15/adult and the average snack is $4-5 each. This adds up quickly throughout the day, especially if you want to do more than one, or two, character meals throughout your vacation. If you want to grab some cold bottles of water, ice cream, iced coffee at Starbucks or Joffrey’s or some of the fabulous new treats that are available as part of Mickey’s Birthday Celebration, many of these count as snack credits! Just look for the purple and white symbol indicating that an item is a snack credit on the dining plan (see the picture below). Personally, I also like the convenience of having all of my food paid for ahead of time. It’s nice to just scan my MagicBand and not have to worry about anything except gratuity at the table service restaurants.
Check out just a few examples of snack credits below!
Any of the dining plans can also be used when taking advantage of the mobile ordering feature throughout Walt Disney World. Mobile ordering is one of the newer features on the My Disney Experience app and is very convenient when you are looking to grab a quick service meal. To use the meal plan, you simply order your food and the appropriate dining credits will be applied. A balance of credits will also be given.
Whether you are going alone, on an adults-only trip or the whole family, there is a meal plan that will work for you. For my family, the Disney Dining Plan is the perfect option. We like going to the character meals and will often use snack credits to get a quick breakfast on the go. If you are a foodie and enjoy exploring all the different dining options available, you may want to consider the Deluxe Dining Plan. This is also a good option if you would like to experience several signature dining restaurants since these meals require two dining credits each. This was a perfect option while on my honeymoon! The Quick Service Dining Plan is a good option if you still want to pre-pay for all of your food but prefer to eat on the go. There are so many great restaurants throughout Walt Disney World that are considered quick service and you will not be disappointed!
|
0.945132 |
For the village in Bosnia, see Kuge, Bosnia and Herzegovina.
The kuge (公家) was a Japanese aristocratic class that dominated the Japanese imperial court in Kyoto. The kuge were important from the establishment of Kyoto as the capital during the Heian period in the late 8th century until the rise of the Kamakura shogunate in the 12th century, at which point it was eclipsed by the bushi. The kuge still provided a weak court around the Emperor until the Meiji Restoration, when they merged with the daimyō, regaining some of their status in the process, and formed the kazoku (peerage), which lasted until shortly after World War II (1947), when the Japanese peerage system was abolished. Though there is no longer an official status, members of the kuge families remain influential in Japanese society, government, and industry.
Kuge (from Middle Chinese kuwng-kæ 公家, "royal family") originally described the Emperor and his court. The meaning of the word changed over time to designate bureaucrats at the court. During the Heian period, the relative peace and stability provided freedom for the noble class to pursue cultural interests, and the kuge became leaders and benefactors of arts and culture in Japan. Most of the Kuge resided in the capital city of Kyoto.
Later, in the Kamakura period (1185–1333), kuge became an antonym to buke (warriors' house), that is, samurai who swore loyalty to the shogunate. At this point, kuge began to be used to describe those who worked in the Court; both aristocratic noblemen and commoners.
Two classes formed the kuge: the dōjō (堂上) noblemen who sat on the floor with the Emperor; and the jige (地下) who were unable to sit with the Emperor. Although kuge included those two classes, mainly this word described the dōjō, the noblemen.
The highest offices at the court were called kugyō and eligibility was limited to members of dōjō kuge. During the Edo period there were about 130 families of dōjō kuge. The most prominent members of the kuge became regents to the emperor (sesshō or kampaku). These daijō-kan offices were restricted to members of the Fujiwara family.
Though they lost most of their political power, they sustained the court culture and maintained a cultural influence. In particular, after the Sengoku period they lost most of their financial basis and were no longer in a position to act as patrons of culture, but they passed on their knowledge as masters of particular fields such as writing waka poetry and playing instruments such as the biwa, and they had disciples among the daimyō and sometimes rich commoners. As masters of a certain field, kuge gave their disciples many licenses certifying that the disciples had learned a certain field and allowed them to perform in public or sometimes to teach others. Disciples were expected to pay their master a fee for each issued license. During the Edo period, this was an important source of income for the kuge.
In 1869 during the Meiji Restoration the kuge merged with the daimyō to form a single aristocratic group, the kazoku.
Others associated with the kuge included Buddhist priests, Kyoto cultural patrons, geisha, and actors.
Sekke (摂家): could be appointed as Sesshō and Kampaku: This was the highest class of kuge. Only five families belonged to this class, all descended from Fujiwara no Michinaga.
Seigake (清華家): could be appointed daijin (minister), including daijō-daijin (chancellor), the highest of the four ministers of the court. They were descended from the Fujiwara clan or Minamoto clan, descendants of the emperors.
Daijinke (大臣家): could be appointed naidaijin, if this office became vacant. In reality, the highest office they could normally achieve was dainagon.
Urinke (羽林家): was a military class; they could be appointed dainagon or rarely to naidaijin.
Meika (名家, also pronounced "Meike"): was a civilian class; they could also be appointed dainagon.
Hanke (半家): was the lowest class among the dōjō, created in the late Sengoku period. They could only be appointed to lower ranks than sangi or chūnagon.
Jigeke (地下家):This class is not a part of all the classes above. Their status is lower than Hanke and they may not enter certain important places in the imperial palace. They are in charge of miscellaneous business in the palace such as cooking and sanitary services. Like other Kuge classes, their positions and ranks in the imperial court are hereditary.
Most of the highest-classed kuge belonged to the Fujiwara clan and Minamoto clan, but there were still other clans like the Sugawara clan, the Kiyohara clan, and the Ōe clan.
^ Louis Frédéric. (2005). "Kuge" in Japan Encyclopedia, p. 570.
^ Lebra, Above the Clouds: Status Culture of the Modern Japanese Nobility.
|
0.999999 |
To paraphrase an old tv theme song, "Tattnall County is the place for me. Farm livin' is the life for me. Land spreadin' out so far and wide, keep the big city just give me that countryside."
Welcome to Tattnall County, where you will find a unique blend of progressive leadership, small town charm, wide open spaces, clean fresh air and good old Southern hospitality.
Our residents enjoy friendly neighbors, low taxes and many interesting and entertaining community activities. Tattnall County and its five towns have much to offer residents of all ages, from hunting and fishing, community activities, progressive leadership and good old friendly people.
The dedicated employees of our county government strive to make this a special place to live by providing residents, visitors and potential new businesses with friendly, courteous and professional service and honest leadership. This is the perfect place to call home.
Tattnall County is a friendly place with lots of things to do, if you like the simpler things in life. Our beautiful county is rich in history and culture, with historical sites and places and events of interest for just about everyone. The pace is refreshingly slower here. People are friendly. Here you can find everything you need to live a comfortable, low stress life. We invite you to visit, but be warned ... you might want to stay.
|
0.937694 |
Gilligan's ongoing effort (Gilligan et al., 1988; Gilligan et al., 1989; Brown and Gilligan) to characterize the moral reasoning of girls and women in terms of care has occurred in tandem with important developments in feminist ethics. It is useful, however, to distinguish between the care ethic that Gilligan describes, which has been called a feminine ethic, and the development of feminist ethics. According to Susan Sherwin, the primary concern of feminine ethics is to describe the moral experiences and intuitions of women, pointing out how traditional approaches have neglected to include women's perspectives.
In addition to Carol Gilligan, both Nel Noddings and Sara Ruddick have made important contributions to feminine ethics. Whereas Gilligan emphasizes the unique form of moral reasoning that caring engenders, Noddings focuses on caring as a practical activity, stressing the interaction that occurs between persons giving and receiving care. From this perspective, she identifies two distinctive features of caring: engrossment and motivational shift. Engrossment refers to a receptive state in which the person caring is "receiving what is there as nearly as possible without assessment or evaluation"; motivational shift occurs when "my motive energy flows towards the other and perhaps ... towards his ends" (Noddings, 1984, p. 33, 34). Critics of Noddings's approach raise the concern that her interpretation of caring may lead to exploitation (Houston) or complicity in the pursuit of evil ends (Card, 1990).
Unlike Gilligan and Noddings, Ruddick emphasizes maternal thinking, which she says develops out of the activity of assuming regular and substantial responsibility for small children. Although Ruddick acknowledges that the work of mothering falls under the more general category of caring labor, she argues that it cannot simply be combined with other forms of caring because each form of caring involves distinctive kinds of thinking arising from different activities (Ruddick). Ruddick delineates maternal thinking as a response to the small child's demands for preservation, growth, and acceptability. These demands elicit in the mothering person the responses of preservative love, fostering growth, conscientiousness, and educative control, which Ruddick identifies as the hallmarks of maternal thinking.
In contrast to feminine ethics, the primary concern of feminist ethics is to reject and end oppression against women. Susan Sherwin defines feminist ethics as "the name given to the various theories that help reveal the multiple, gender-specific patterns of harm that constitute women's oppression," together with the "diverse political movement to eliminate all such forms of oppression" (p. 13). By oppression, Sherwin means "a pattern of hardship that is based on dominance of one group by members of another. The dominance involved ... is rooted in features that distinguish one group from another" and requires "exaggerating these features to ensure the dominant group's supremacy" (p. 24). Feminism aims, in this interpretation, to show that the suffering of individual women is related because it springs from common sources of injustice. According to Rosemarie Tong, feminist ethics is typically far more concerned than feminine ethics with making political changes and eliminating oppressive imbalances of power (1993).
In many respects, however, feminine and feminist ethics are interrelated. The careful study of women's lives and moral reasoning that feminine ethics undertakes can contribute substantially to dismantling habits of thought and practice that enable women's oppression to continue. Both feminine and feminist ethics share the goal of adding women's voices and perspectives to various fields of scholarly inquiry. Finally, as Ruddick notes, feminist ethics can lend important support to the ideals that feminine ethics upholds. For example, feminist ethics can help to ensure "women's economic and psychological ability to engage in mothering without undue sacrifice of physical health and nonmaternal projects" (p. 236).
|
0.976911 |
Visually think of the path to fulfillment as a personal sphere, where fulfillment resides at the center of it.
The act of balancing ones life will put them at the center of this sphere.
Action and Discipline toward being balanced are what maintain you in this center.
Addiction is the antithesis to fulfillment. It can be seen as an external sphere that pulls you towards its own center, and will influence you to falter from your balanced path.
Addiction has uncountable spheres, some of which seem insignificant and are deceivingly normal, but those sphere's can be the hardest to identify and the most distracting.
If you find your self pulled or centered into a distracting sphere, you can always ask for guidance from others within their balanced spheres but remember; Only you can make the change toward centering back into the path of fulfillment.
The longer you have been in the path to fulfillment, the more likely you will be centered in it and the different gravities of addiction will be weak against you.
The healthier your body, the more rich the experience, the greater your sphere will grow.
One example of personal fulfillment is being one with the moment and continually feeling the transcendent beauty of all things without the distraction of addiction.
Examples: The gigantic painting inside the dome of the Duomo in Florence Italy is a good visual representation of this path through medieval Catholic eyes. The farther from the center of the dome, the farther into hell one goes. A visual for a group of balanced spheres is our solar system, (which owes its continued existence to balance) where the sun represents the most experienced sphere and each planet is a unique stepping-stone inward to the more experienced, and most balanced, center. They each have an individual path yet rely on each other for stability. If one goes outside the solar system's sphere, they become lost and in a void. This model is also seen with a single cell or atom where the nucleus represents balanced fulfillment and the outer parts are the spheroid path to it. It would seem the stable parts of our universe would not exist without this fundamental balance. These are all reasons why we should seek balance within the paths of our own lives.
|
0.998486 |
Get real estate lawyer help now for many of the following issues.
The majority of your rights and liabilities, in addition to those of landlords, are governed by the laws of the state where the property is established. Because of this, it is important to check with the specific laws in your state. It is often much more beneficial to receive legal assistance from an experienced real estate attorney regarding renter rights since laws can be complex and overwhelming.
Additionally, real estate lawyers can be helpful to renters when it just comes to signing routine paperwork, such as a lengthy lease. As a tenant, it is imperative to know what exactly you are getting into before it becomes official.
Q: What is the purpose of deeds?
A: Deeds specify, and are normally needed to transfer, possession of real estate. A deed comprises the names of the previous and current owners and a legal description of the real estate and is signed by the individual transferring the real estate. The various types of deeds, such as the quitclaim deed, warranty deed, and grant deed, transfer various interests in real estate.
A: A disclosure statement is a form that certain states require a real estate seller to fill out and give to the purchaser, unveiling specific faults and other facts about the real estate. The disclosure requirements differ by state.
Q: What are some standard limitations enforced on property owners?
A: Property owners are not permitted to do anything they want on their estate. Federal laws specify environmental limitations, while local ordinances regulate everything from fence height to noise levels. Local law is also the typical source of zoning regulations, which restrict the uses of real estate in specific locations. State laws usually control who can access real estate and how boundaries are established and altered. Private agreements and additional boundaries may also regulate real estate use. For instance, a development may encompass restrictive agreements regarding architectural design, lot size, vehicle parking, and other specifics.
Q: What is joint tenancy?
A: Joint tenancy is an agreement in which more than one individual owns a piece of real estate. Many spouses own their real estate as joint tenants, with equivalent portions in the real estate.
Q: What comes next after a deed is signed and notarized?
A: A signed deed should be filed, or recorded, in the correct land records office, often in the county in which the real estate is located.
Q: What happens during foreclosure?
A: If a property owner neglects to make timely mortgage payments, the lender may foreclose on the home. Depending on state law and the conditions of the mortgage contract, the lender may choose a statutory foreclosure. State laws define stern protocols concerning appropriate notices and chances to pay before the real estate is sold in a foreclosure sale. In many states, a homeowner may remain in his or her property during the foreclosure process. A lender may want to evade foreclosure and its expenses by working out an arrangement with the property owner. A real estate lawyer can assist with these types of arrangements.
|
0.945702 |
All across America, home prices are increasing faster than income. Do you qualify?
There are rules when applying for a mortgage, and there are "no rules."
Assuming you have a solid credit history, a down payment, and the lender likes the house you're buying, it comes down to monthly income. Not your after-tax income, but your gross income.
The infamous debt-to-income ratio measures what percentage of your monthly income is used to pay your debts.
Actually, there is not one ratio, but two. One is called the front ratio and the other is called the back ratio. The front ratio counts only the debts that apply to your housing costs. Principal, interest, insurance, property taxes, HOA fees, and mortgage insurance, if applicable.
For most loan programs, your housing costs should be no more than approximately one-third your monthly income.
The back ratio includes your housing costs plus your other monthly debt like car payments, credit cards, credit union loans, student loans and so on. It does not include your automobile insurance, life insurance, and items like that.
For most loan programs, your monthly obligations to debt should be approximately 38% of your monthly gross income. Or less.
If you earn annual bonuses or commissions, those can be taken into account, too, but they will be averaged over the last two years.
If you qualify under these rules, cool. You have no problem.
If you don't, you still have options, especially if you have absolutely great credit, a lot of money, or parents.
These are called "compensating factors."
Suppose you have a great FICO score, above 700 or so.
People with really high FICO scores almost always pay their debts, no matter what. Lenders will stretch their debt-to-income ratios to fit you in, provided they aren't stretching too much.
You are a good risk.
If the lender is stretching you too far and you have a great FICO, you might qualify for a "stated income" loan with a lower down payment than those who merely have a "good" credit score.
You still have to make a down payment, usually at least ten percent.
With a stated income loan, you simply state your income on the loan application. Because of your good credit and down payment, the lender "trusts" you and does not verify your income.
"Ahem." Lenders don't want you to lie, of course. They review your bank statements to see if the cash flow through your account matches the income you claim. They check your "assets" and personal property to see if it jives with that income.
If you need a stated income loan, figure it out before you fill out your application.
If you have a good FICO (or a great one) and still need the lender to stretch your qualifying ratios a bit, they generally will do so if you can put twenty percent down.
If that doesn't help by itself, 20% down and a good FICO will normally let you into the "stated income" loan, too (see above).
First, they can give you money. Lenders call it a "gift." Maybe you pay it back, maybe you don't. "Ahem." If you do intend to pay it back, don't tell the lender.
Parents can also be "non-occupying co-borrowers." Lenders will usually add about five points to your qualifying ratios if you have qualified family members who are non-occupying co-borrowers.
|
0.999964 |
How to get the Dataset Field into a Table?
You can create and manage table datasets if you use Splunk Enterprise and have installed the Splunk Datasets Add-on, or if you use Splunk Cloud.
Table datasets, or tables, are a type of dataset that you can create, shape, and curate for a specific purpose. You begin by defining the initial data for the table, such as an index, source type, search string, or existing dataset. Then you edit and refine that table in the Table Editor until it fits the precise shape that you and your users require for later analysis and reporting work.
After you create your table, you can continue to iterate on it over time, or you can share it with others so they can refine it further. You can also use techniques like dataset cloning and dataset extension to create new datasets that are based on datasets you have already created.
You can manage table datasets alongside other dataset types that are available to all users of Splunk Enterprise and Splunk Cloud, like data model datasets and lookups. All of these dataset types appear in the Datasets listing page.
The Splunk Datasets Add-on is preinstalled for all users of Splunk Cloud.
This table explains what all Splunk Enterprise and Splunk Cloud users can do with datasets by default.
View dataset contents Check a dataset to determine whether it contains fields and values that you want to work with. For example, you can view lookup table files directly instead of searching their contents in the Search view.
Open datasets in Pivot With Pivot you can design a visualization-rich analytical report or dashboard panel that is based on your dataset. Pivot can also help you discover data trends and field correlations within a dataset.
Extend datasets in Search Extend your dataset as a search, modify its search string as necessary, and save the search as a report, alert, or dashboard panel.
Read an overview of the of the dataset types that you can explore, manage, and create. See Dataset types and usage.
Learn about the Datasets listing page. See View and manage datasets.
Learn about dataset extension. See Dataset extension.
Splunk Enterprise users who install the Splunk Datasets Add-on gain the following datasets functionality. Cloud users get this functionality by default.
Use the Table Editor to create tables You can design sophisticated and tightly-focused collections of event data that fit specific business needs, even if you have minimal SPL skills.
Share and refine tables over time After you create a table you can give other users read or write access to it so they can curate and refine it. For example, you can create a simple dataset, and then pass it to another user with deep knowledge of the source data to shape it for a specific use. You can also extend your dataset and let other people refine the extension without affecting the original dataset.
View field analytics The Table Editor offers a Summarize Fields view that provides analytical information about the fields in your dataset. You can use this knowledge to determine what changes you need to make to the dataset to focus it to your needs.
Extend any dataset as a table Dataset extension enables you to create tables that use the definition of any dataset type as their foundation. This enables you to create tables that are based on lookups and data model datasets and then modify those tables to fit your specific use cases.
Clone tables You can make exact copies of table datasets and save the copy with a new name. Only table datasets can be cloned.
Accelerate tables You can accelerate table datasets in a manner similar to report and data model acceleration. This can be helpful if you are using a very large dataset as the basis for a pivot report or dashboard panel. Once accelerated, the table returns results faster than it would otherwise.
Install the Splunk Datasets Add-on. See Install the Splunk Datasets Add-on in Install the Splunk Datasets Add-on.
Define initial data for a new table dataset (requires add-on). See Define initial data for a new table dataset.
Edit a table dataset (requires add-on). See Define initial data for a new table dataset.
Accelerate a table dataset (requires add-on). See Accelerate tables.
|
0.996651 |
In its heyday, Level 9 was one of the foremost British adventure game companies. It dominated the early 8-bit market, managing to squeeze large adventures into tiny amounts of memory. It was a family company which was started by Pete Austin and eventually employed Pete's two brothers, his sister, and his father.
Pete Austin began working with computers while a student at Cambridge University. After graduation he worked for a year and a half as a programming consultant, programming business packages for banks and other companies. Eventually tiring of this, he took a job with Perkin-Elmer, a manufacturer of mainframe computers. It was there that he discovered Colossal Cave . He loved it, spending his lunch hours playing it.
In 1982, while still working for Perkin-Elmer, Pete formed Level 9 with his brothers Mike and Nick. Level 9's first product wasn't an adveture game; rather, it was an extension to BASIC for a small computer known as the NASCOM.
It wasn't long before the Austins turned their hands to adventures, however. They decided to create a version of Colossal Cave for the BBC micro and Sinclair Spectrum. It took them a year to make Colossal Cave fit in 32k of memory and on a cassette tape, but they were so successful that they had enough space left over to expand the endgame, adding some seventy-odd locations to the original game. They called the result Colossal Adventure .
Along the way Michael Austin created a language known as a-code, and Pete wrote a recursive text compression engine which shrunk the game text over multiple passes. While the compression engine allowed Level 9 to fit large games into a small amount of space, it also meant that the first Level 9 games displayed text rather slowly.
Colossal Adventure was a huge success. The three brothers, soon joined by their sister Margaret who handled marketing, followed Colossal Adventure with two sequels set in Tolkein's Middle Earth: Adventure Quest and Dungeon Adventure . Together the three games formed the Middle Earth trilogy, later known as the Jewels of Darkness trilogy.
Between Adventure Quest and Dungeon Adventure , the Austins wrote Snowball , in which you played Kim Kimberly, secret agent. You had to keep "Snowball 9", a colony ship, from crashing into its destination, a planet known as Eden. Level 9 proudly boasted that Snowball had 7,000 rooms. The boast was true, even if 6,800 of those rooms formed a color-coded maze with minimal descriptions.
From there Level 9 took off. The Austins created a compression method for line drawings, letting them add pictures to their adventures. Their games became known for their size -- all had over 200 rooms -- and for their detailed worlds, as well as for the occasional spelling mistake. The Austins worked on extending their two-word parser and improving the graphics capabilities of their engine to take advantage of the newly-available 16-bit machines.
During this time adventures continued to pour out of Level 9. Sequels to Snowball were written, creating the Silicon Dreams trilogy. The final game, The Worm in Paradise , featured the new graphics engine and an ambitious plot which tackled politics and government. By 1986 all of the games in the Silicon Dreams and Jewels of Darkness trilogies were spruced up, given graphics, and re-released.
Level 9 also created games based on pre-existing movies and books. Although a planned Dr. Who adventure fell through, in 1984 Level 9 released an adventure based on Terry Jones' book Erik the Viking . They also created Choose-Your-Own-Adventure-style games based on the popular children's book The Secret Diary of Adrian Mole Aged 13 3/4 and on the British soap opera The Archers .
After re-releasing their early games in 1986, the Austins made one last version of their adventure engine. The new engine used bitmapped graphics, had an improved parser, and allowed the creation of independent non-player characters (NPCs). It also implemented a GO TO command which would allow you to move about the game world quickly. This last enhancement required that the map for adventures using this engine be laid out on a square grid, reducing the charm of the Level 9 adventures in the eyes of many game players.
The adventures written with this engine were so large that they were broken up into three consecutive parts. The best known of these was Knight Orc , in which you played an orc who had to deal with NPCs who were trying to kill him. Many of the NPCs were parodies of various players on British Telecom's MUD2 online game.
Level 9 produced several adventures with this engine in 1987 and 1988. In 1989 Level 9 released Scapeghost , in which you played the ghost of a slain police officer and had to find out who betrayed you and your partner. It was to be Level 9's final adventure.
Level 9 made one other game after that: Champion of the Raj , which was published in 1991 to bad reviews. Shortly thereafter, the company ceased operations.
Since then, fans of Level 9 games have kept them alive. Though the game are no longer available legally, there are FTP sites available which have versions of the early games for the Spectrum and Spectrum emulators for modern computers. But you don't have to use a Spectrum emulator: Glen Summers and David Kinder have written a Level 9 interpreter which runs on everything from Amiga to Windows to Linux to Mac.
|
0.998148 |
Programmable interval timer Intel 8253. Intel 8254 has the same pinout.
The Intel 8253 and 8254 are Programmable Interval Timers (PITs), which perform timing and counting functions using three 16-bit counters. They were primarily designed for the Intel 8080/8085-processors, but later used in x86-systems. They (or an equivalent circuit embedded in a larger chip) are found in all IBM PC compatibles. The Intel 82c54 variant handles up to 10 MHz clock signals.
The 8253 was used in IBM PC compatibles since their introduction in 1981. In modern times, this PIT is not included as a separate chip in an x86 PC. Rather, its functionality is included as part of the motherboard's southbridge chipset. In some modern chipsets, this change may show up as measurable timing differences in accessing a PIT using the x86 I/O address space. Reads and writes to such a PIT's registers in the I/O address space may complete much faster.
Newer motherboards also include a counter through the Advanced Configuration and Power Interface (ACPI), a counter on the Local Advanced Programmable Interrupt Controller (Local APIC), and a High Precision Event Timer. The CPU itself also provides the Time Stamp Counter (TSC) facility.
The timer has three counters, called channels. Each channel can be programmed to operate in one of six modes. Once programmed, the channels can perform their tasks independently. The timer is usually assigned to IRQ-0 (highest priority hardware interrupt) because of the critical function it performs and because so many devices depend on it.
There are 3 counters (or timers), which are labeled as "Counter 0", "Counter 1" and "Counter 2". Each counter has 2 input pins – "CLK" (clock input) and "GATE" – and 1-pin, "OUT", for data output. The 3 counters are 16-bit down counters independent of each other, and can be easily read by the CPU.
In the original IBM PCs, the first counter (selected by setting A1=A0=0, see Control Word Register below) is used to generate a timekeeping interrupt. The second counter (A1=0, A0=1) is used to trigger the refresh of DRAM memory. The last counter (A1=1, A0=0) is used to generate tones via the PC speaker.
This block contains the logic to buffer the data bus to / from the microprocessor, and to the internal registers. It has 8 input pins, usually labelled as D7..D0, where D7 is the MSB.
The Read/Write Logic block has 5 pins, which are listed below. Notice that "/X" denotes an active low signal.
Operation mode of the PIT is changed by setting the above hardware signals. For example, to write to the Control Word Register, one needs to set /CS=0, /RD=1, /WR=0, A1=A0=1.
This register contains the programmed information which will be sent (by the microprocessor) to the device. It defines how the PIT logically works. Each access to these ports takes about 1 µs.
To initialize the counters, the microprocessor must write a control word (CW) in this register. This can be done by setting proper values for the pins of the Read/Write Logic block and then by sending the control word to the Data/Bus Buffer block.
The control word register contains 8 bits, labeled D7..D0 (D7 is the MSB).
x x 0 0 x x x x Counter Latch, value can be read out in the way RW1, RW0 was set before. The value is held until it is read out or overwritten.
1 1 0 1 x x x 0 Counter(C0..C2) value(s) can be read out.
When setting the PIT, the microprocessor first sends a control message, then a count message to the PIT. The counting process will start after the PIT has received these messages, and, in some cases, if it detects the rising edge from the GATE input signal.
On PCs the address for timer0 (chip) is at port 40h..43h like described and the second timer1 (chip) is at 50h..53h.
The Status Byte is read like an 8 bit counter value (port 40h..42h R).
x 0 x x x x x x The value of the latch is loaded into the counter.
A new value can be written to the latch.
x 1 x x x x x x Counter value is 0.
The D3, D2, and D1 bits of the Control Word set the operating mode of the timer. There are 6 modes in total; for modes 2 and 3, the D3 bit is ignored, so the missing modes 6 and 7 are aliases for modes 2 and 3. Notice that, for modes 0, 2, 3 and 4, GATE must be set to HIGH to enable counting. For mode 5, the rising edge of GATE starts the count. For details on each mode, see the reference links.
Mode 0 is used for the generation of accurate time delay under software control. In this mode, the counter will start counting from the initial COUNT value loaded into it, down to 0. Counting rate is equal to the input clock frequency.
The OUT pin is set low after the Control Word is written, and counting starts one clock cycle after the COUNT programmed. OUT remains low until the counter reaches 0, at which point OUT will be set high until the counter is reloaded or the Control Word is written. The Gate signal should remain active high for normal counting. If Gate goes low, counting gets terminated and current count is latched till Gate pulse goes high again. The first byte of the new count when loaded in the count register, stops the previous count.
In this mode 8253 can be used as Monostable Multivibrator. GATE input is used as trigger input.
OUT will be initially high. OUT will go low on the Clock pulse following a trigger to begin the one-shot pulse, and will remain low until the Counter reaches zero. OUT will then go high and remain high until the CLK pulse after the next trigger.
After writing the Control Word and initial count, the Counter is armed. A trigger results in loading the Counter and setting OUT low on the next CLK pulse, thus starting the one-shot pulse. An initial count of N will result in a one-shot pulse N CLK cycles in duration.
The one-shot is retriggerable, hence OUT will remain low for N CLK pulses after any trigger. The one-shot pulse can be repeated without rewriting the same count into the counter. GATE has no effect on OUT. If a new count is written to the Counter during a oneshot pulse, the current one-shot is not affected unless the counter is retriggered. In that case, the Counter is loaded with the new count and the oneshot pulse continues until the new count expires.
In this mode, the device acts as a divide-by-n counter, which is commonly used to generate a real-time clock interrupt.
Like other modes, counting process will start the next clock cycle after COUNT is sent. OUT will then remain high until the counter reaches 1, and will go low for one clock pulse. OUT will then go high again, and the whole process repeats itself.
Note that the values in the COUNT register range from to 1; the register never reaches zero.
This mode is similar to mode 2. However, the duration of the high and low clock pulses of the output will be different from mode 2.
high for counts, and low for counts, if is even.
high for counts, and low for counts, if is odd.
After Control Word and COUNT is loaded, the output will remain high until the counter reaches zero. The counter will then generate a low pulse for 1 clock cycle (a strobe) – after that the output will become high again.
This mode is similar to mode 4. However, the counting process is triggered by the GATE input.
After receiving the Control Word and COUNT, the output will be set high. Once the device detects a rising edge on the GATE input, it will start counting. When the counter reaches 0, the output will go low for one clock cycle – after that it will become high again, to repeat the cycle on the next rising edge of GATE.
On x86 PCs, many video card BIOS and system BIOS will reprogram the second counter for their own use. Reprogramming typically happens during video mode changes, when the video BIOS may be executed, and during system management mode and power saving state changes, when the system BIOS may be executed. This prevents any serious alternative uses of the timer's second counter on many x86 systems.
The timer that is used by the system on x86 PCs is Channel 0, and its clock ticks at a theoretical value of 1193181.8181... Hz, i.e. one third of the NTSC color subcarrier frequency, which comes from dividing the system clock (14.31818 MHz) by 12. This is a holdover of the very first CGA PCs – they derived all necessary frequencies from a single quartz crystal, and to make TV output possible, this quartz had to run at a multiple of the NTSC color subcarrier frequency.
As stated above, Channel 0 is implemented as a counter. Typically, the initial value of the counter is set by sending bytes to the Control, then Data I/O Port registers (the value 36h sent to port 43h, then the low byte to port 40h, and port 40h again for the high byte). The counter counts down to zero, then sends a hardware interrupt (IRQ 0, INT 8) to the CPU. The counter then resets to its initial value and begins to count down again. The fastest possible interrupt frequency is a little over a half of a megahertz. The slowest possible frequency, which is also the one normally used by computers running MS-DOS or compatible operating systems, is about 18.2 Hz. Under these real mode operating systems, the BIOS accumulates the number of INT 8 calls that it receives in real mode address 0040:006c, which can be read by a program.
As a timer counts down, its value can also be read directly by reading its I/O port twice, first for the low byte, and then for the high byte. However, in free-running counter applications such as in the x86 PC, it is necessary to first write a latch command for the desired channel to the control register, so that both bytes read will belong to one and the same value.
According to a 2002 Microsoft document, "because reads from and writes to this hardware require communication through an IO port, programming it takes several cycles, which is prohibitively expensive for the OS. Because of this, the aperiodic functionality is not used in practice."
1 2 3 "Intel 82c54 PIT Datasheet" (PDF).
↑ "Guidelines For Providing Multimedia Timer Support". 20 September 2002. Retrieved 2010-10-13.
↑ "8254/82C54: Introduction to Programmable Interval Timer". Intel Corporation. Retrieved 21 August 2011.
↑ "MSM 82c53 Datasheet" (PDF).
|
0.922588 |
The Harvard Society of Fellows is a group of scholars recognized for their extraordinary academic potential, upon whom are bestowed distinctive opportunities for individual growth and intellectual collaboration. Appointed by senior fellows, junior fellows receive a stipend for three years, during which they conduct independent research at Harvard University in any discipline, without being required to meet formal degree requirements. The only stipulation is that they remain in residence at Cambridge, Massachusetts, for the duration of their fellowship. Membership in the society is for life.
As early as 1925, Harvard scholars Henry Osborn Taylor, Alfred North Whitehead and Lawrence Joseph Henderson met several times to discuss their dissatisfaction with the conditions of graduate study. They believed that the most able men required ample scholarships, as to not be distracted by financial worries, fewer formal requirements, and the ability to freely choose whatever object of study attracted them in order to produce great research.
They soon found an ally in then Harvard president Abbott Lawrence Lowell, who in 1926 appointed a committee, with Henderson as chairman, to examine the nature of an institution that might improve the quality of graduate education. The committee recommended establishment at Harvard of a Society of Fellows, modeled partly after the Fondation Thiers in Paris and partly on the Prize Fellowship at Trinity College, Cambridge, with the hope that such a society would encourage not only "isolated geniuses, but men who will do the work of the world".
After years of trying to attract outside donations, Lowell funded the Society himself – his last major institutional act before his resignation in November 1932. "There being no visible source of necessary funds," he later wrote, "I gave it myself, in a kind of desperation, although it took nearly all I had."[citation needed] Though it was an open secret that Lowell was the source of the anonymous donation, this was never acknowledged in his presence. After Lowell's death in 1943, the donation was officially made public; it is known as the Anna Parker Lowell Fund in memory of Lowell's wife.
The society had its first meeting at the beginning of the 1933–34 academic year, as an alternative to the Ph.D system, granting fellows freedom to pursue lines of inquiry that transcended traditional academic disciplinary boundaries. Because the core belief in the importance of informal discussions between scholars in different academic fields, both senior and junior fellows have met for dinner every Monday night during term-time. They are frequently joined by visiting scholars and fellows are encouraged to bring guests.
Originally headquartered in a two-room suite at Eliot House, one of the university's twelve residential colleges, the society was closed to women until 1972, when Martha Nussbaum was selected as the first female junior fellow.
The society has contributed numerous scholars to the Harvard faculty. Among the original senior fellows of the society were biochemist Lawrence Joseph Henderson, philosopher Alfred North Whitehead, literary critic John Livingston Lowes and legal scholar Abbot Lawrence Lowell, who remained in the society after he resigned as president.
Some of its best-known members over the years have been philosopher W. V. Quine; behaviorist B. F. Skinner; double Nobel laureate John Bardeen; sociologist George C. Homans, economist Paul Samuelson; historian Arthur M. Schlesinger, Jr.; presidential adviser McGeorge Bundy; historian and philosopher of science Thomas Kuhn; linguist Noam Chomsky; biologist E. O. Wilson; cognitive scientist Marvin Minsky; former dean of the Harvard faculty, economist Henry Rosovsky; philosopher Saul Kripke; Fields Medal-winning theoretical physicist Ed Witten; and writer, critic, and editor Leon Wieseltier.
^ "About the Society of Fellows". sites.fas.harvard.edu. Retrieved 2018-11-20.
^ a b c d Homans, George Caspar (1984). Coming to My Senses: The Autobiography of a Sociologist. New Brunswick & London: Transaction Publishers. p. 119. ISBN 9781412819879.
^ Bloom, Samuel William; Bloom, Samuel W. (2002). The Word as Scalpel: A History of Medical Sociology. Oxford: Oxford University Press. p. 299. ISBN 9780195149296.
^ Henderson, Lawrence Joseph (1970). Barber, Bernard, ed. L. J. Henderson on the Social System: Selected Writings. Chicago: University of Chicago Press. p. 7. ISBN 978-0226326894.
^ a b Brinton, Crane, ed. (1959). The Society of Fellows. Harvard University Press. p. 21.
^ a b "Harvard University Society of Fellows". Harvard University. Retrieved 20 November 2018.
^ Homans, George C.; Bailey, Orville T. (1949). "The Society of Fellows at Harvard University". American Scientist. 37 (1): 91–106. JSTOR 29773658.
|
0.994639 |
The sum of n,2n,3n terms of an A.P. are S1 S2 S3 respectively. Prove that S3=3(S2-S1).
|
0.999915 |
Find article about how to invest in small growth ETFs. This small growth stock exchange trade funds provide high risk and high reward opportunities for investors.
For growth seeker investors, small growth funds provide a right risk and reward. These small growth funds utilize their assets to purchase stocks of small size companies with high growth potential. These companies are fast growing and often richly valued. The stocks may be volatile and easily swing up/down.
Exchange traded funds or ETFs are used by investors to seek investing in this small growth stocks. Investor can buy or sell the ETFs through your brokerage. These ETFs are traded like stocks through variety of stock exchange/market such as NASDAQ, NYSE, or AMEX. Most of the small growth ETFs are index ETFs (i.e. passively managed & tracking their benchmark).
From this best performing funds list, you may find each individual fund review. You can find the fund performance, expense ratio, and yield or dividend from the table below. The list is sorted based on its 1 year total return up to May 19, 2014.
Ranked with 4 stars rating, this Guggenheim S&P SmallCap 600 Pure Growth ETF has a 1 year total return of 16.81%. This index ETF is tracking S&P SmallCap 600 Pure Growth Index. The current share price is $74.26. This exchange traded fund has an expense ratio fee of 0.35%.
This top small growth ETF has returned 13.25% over the past 3 year, and 21.99% over the past 5 year. The total net assets are $107 million. Top 3 sectors are financials, information technology, and health care. Top 4 stocks in its portfolio are US Silica Holding, Questcor Pharmaceuticals, Matrix Service Co, and Repligen Corp.
SPDR S&P 600 Small Cap Growth ETF is another index exchange traded fund. The current dividend yield is 0.68%. This ETF holds about 362 stocks. It is trading at NYSE Arca Exchange. This fund has a weighted average market cap of 1.8 billion.
Morningstar has ranked this best fund with 5 stars rating. This small growth ETF has a 52 week range price of $141.20 & 184.53. For the past 1 year, it has returned 15.24%. Top 5 stocks in its holdings are Questcor Pharmaceuticals Inc, Enersys, Belden Inc, West Pharmaceutical Services Inc, and MAXIMUS Inc.
iShares S&P Small-Cap 600 Growth is a 4 star ETF. This ETF provides exposure to small public U.S. companies whose earnings are expected to grow at an above-average rate relative to the market. With total net assets of $2.6 billion, this fund has expense ratio fee of 0.26%.
Vanguard S&P Small-Cap 600 Growth Index ETF is the smallest ETF among this list. With $54 million of assets, this top small growth ETF has the lowest expense fee of 0.20%. The current SEC yield is 0.63%. It has a share price of $95.79.
This Vanguard ETF is ranked with 5 stars rating by Morningstar. It has a 3 year average return of 12.92%. Top 2 sectors in its holdings are technology, and industrials.
|
0.97981 |
I am a native English speaker. I have a Bachelor’s degree, and I have more than five years of experience proofreading and copy editing for a newspaper. Previously, I worked as a teacher at a high school where I used those skills daily. In addition to my experience proofreading newspaper content, I have experience editing business correspondence and documents; as well as, creative writing such as various stories and articles. My specialties include proofreading and editing documents for spelling, grammar, punctuation, correct style and ensuring consistency and continuity of the work. I am an avid reader of a wide range of material, and I have a genuine understanding that well-presented material can make all the difference in how it is received. I am qualified, and I will work quickly and efficiently without sacrificing accuracy and thoroughness. I maintain the highest standards, and I believe that I would be an excellent choice to help ensure the integrity of your work.
I am a native English speaker. I have a Bachelor’s degree and more than five years of experience proofreading and copyediting for a newspaper. I have experience editing and proofreading a wide variety of materials, including short stories, articles, business correspondence, business documents, and screenplays. My specialties include proofreading and editing documents for spelling, grammar, punctuation, correct style and ensuring consistency and continuity of the work.
|
0.999999 |
Please tell me about Mario Lanza, my favorite tenor. Where was he born? How did he die?
Lanza was born Alfred Arnold Cocozza in Philadelphia in 1921 to Italian immigrant parents. He started singing along to Enrico Caruso's opera records when he was still a child. At 16, he declared his intention to become a professional singer. His mother, born Maria Lanza, had once dreamed of a singing career and encouraged her talented son to pursue his dream. After years of singing lessons and a scholarship to Berkshire Music School, he made his operatic debut in a production of The Merry Wives of Windsor in 1942, changing his name to Mario Lanza in honor of his mother. His career was put on hold when he entered the service during World War II. During his time in the Army, he sang in shows to entertain the troops and got married soon after leaving the service. He picked up his opera career and was discovered by Hollywood. Appearances in films throughout the 1950s, and the popularity of the song Be My Love from one of those films, gave him worldwide fame. He suffered a massive, fatal heart attack in 1959. He and his wife had four children.
|
0.998593 |
You are a IT consultant, a client company wants to mass produce a PC for a gaming lounge. What should you recommend?
B) Processor and RAM that meets Window 7 requirements.
Gaming computers MUST have a powerful processor, graphics card, and as much RAM as possible. All other components are not as important in this situation.
|
0.993888 |
What can you do to improve your travel security when away on an international business trip? There are many simple steps that you can take to aid your safety and by being aware of these you can greatly increase your chances of returning without serious incident. Adhere to these travel security tips to reduce the likelihood of an incident.
A fascinating true story told for the first time that identifies the risk of kidnap on the streets of London and throughout the world.
Hostile surveillance detection is one of the few security techniques that preempts danger. As the name suggests it is the art of identifying an individual or group that is attempting to obtain intelligence by placing your client under surveillance. Its main advantage as a security tool is that it is proactive rather than reactive.
|
0.956826 |
How do I control the temperature of burnt sugar?
I made a burnt sugar caramel sauce tonight that turned out beautiful. It is just what it sounds like; you make a normal caramel sauce but cook the sugar until it is past amber and getting almost black. Making this is such a high-wire act though, especially in a small batch. The difference between not dark enough, just right, and actually completely burned is just seconds. Much too fast to manage with a thermometer, especially because the temperature isn't even throughout the pan. So my question is, is there a way to slow this process down towards the end so that picking the right moment isn't so difficult?
To get the sugar caramelized to that perfect dark brown, I start the sugar on the stove top and finish in the oven.
I start by adding a bit of water and some corn syrup (the fructose makes the brown more intense, but one can skip it) to the sugar and keep it on a medium burner until it reaches the first caramel stage, at 155°C/311°F. As Michael notes, the sugar can go very fast from this stage to burnt. To avoid this, I place the pan in an oven that has been pre-heated to 180°C/356°F, just above the dark caramel stage. Checking every two minutes with an infrared thermometer (more often as it gets closer to 177°C/350°F), it's easy to get the sugar to the right temperature.
This post describes the method in more detail.
There's a bit of misinformation in the answers and comments here I'd like to clear up.
Tobiasopdenbrouw's suggestion in his comment that a thinner pan may work better is a good one. A thin aluminum pan is an excellent conductor of heat which is precisely why it would help in a situation like this. It is far more responsive to taking the pan on and off the heat. A heavy pan has a higher thermal mass and is thus slower to respond to changes in temperature, and it will have more carryover heat.
A thinner pan will require more attention from you as it gets near your target temperature, but it's a lot easier to put the brakes on. As you approach your desired temperature take the pan off the heat frequently to check it's temp As soon as you take it off it will quickly stop heating -- there is only minimal carryover heat from the pan, and no magic carryover heat from an other source.
Additionally, adding more sugar will lower the temperature. There is no "solution" that can crystallize. A solution requires a solute and a solvent. There is only one substance present in molten sugar -- sugar.
Spraying water on it is a terrible idea and I advise against it. At best it simply vaporizes instantly to steam. At worst it spatters molten sugar on you, not fun.
In short, treat it like you would a pot of water that you were trying to maintain at a specific temperature. If the water gets too hot, you'd add more water or take it off the heat. The same applies concept to molten sugar.
Ok, as my first answer started without really reading the question , I will give it another go.
As you want to minimize the temperature fluctuations, you will want to use a heavy saucepan.
As the entire thing is experimental, you will want to minimize the variables. Do all your testing and development with a fixed quantity of sugar that you do not want to vitiate at least until you figure out how to get consistent results.
Start making your caramel as normal.
As soon as the sugar starts to melt, move the sauce pan on low / very low heat. Pick a heat setting and do not vary it during the experiment. The Aim is to be able to reproduce the result at first, not to get the it right the first time.
Start a timer as soon as you lowered the heat.
It is best to sit besides it and check at regular intervals .. or even better continually, and take notes (time-stamp is very important here ). Continue the process until it actually burns and becomes unusable.
Now, with the help of the notes and the timer, repeat until the point where it still was as you wanted it.
If the time window in that your desired result is to short, try using less heat. If that is not possible, try using more sugar.
I'm guessing here and I don't know if this will work, but could you try adding some more sugar to the nearly cooked sugar to 'thin' it out a bit and so make it less likely to burn so quickly?
The best way will require some effort and repetition.
First you need to figure out what your target temperature is.
Then you need to figure out how long the heat keeps climbing in the syrup after you remove from the heat.
Subtract one from the other, and you should be able to remove from the heat before it's done and allow carry over cooking to do the rest. Along the same lines as roasts climbing another ten degrees after removing from the oven.
1) Provide a cooling effect by introducing a lower temperature component directly and uniformly into the pan.
2) Slightly increase the hydration of sugar solution, thereby lowering its boiling point and temporarily retarding the rising temperature and caramelization.
I presume that with a spritz or two, you would buy yourself a bit of time to evaluate the result and remove the heat if necessary.
Not the answer you're looking for? Browse other questions tagged sugar caramel or ask your own question.
How to brown the sugar for pumpkin flan?
How do you control the caramelization of sugar?
How much brown sugar should I substitute for white sugar?
Why did my almonds burn instead of caramelizing?
I always burn my fudge. Why?
|
0.79481 |
Robert Sandvick was born on October 30, 1931, in Glasgow, Montana. After graduating from Montana State College in Bozeman, Montana, with a bachelor's degree in Agriculture, he enlisted in the Aviation Cadet Program of the U.S. Air Force on September 17, 1953, and was commissioned a 2d Lt in the U.S. Air Force and awarded his pilot wings at Bryan AFB, Texas, on December 18, 1954. Lt Sandvick next attended F-86 Sabre Combat Crew Training from January to June 1956, followed by service as an F-86 pilot with the 386th Fighter Bomber Squadron at Clovis AFB, New Mexico, from June to September 1956. He attended F-100 Super Sabre conversion training from September to November 1956, and then served as an F-100 pilot with the 387th Fighter Bomber Squadron at Clovis (renamed Cannon AFB in June 1957) from November 1956 to October 1957. His next assignment was as an F-100 pilot with the 477th Tactical Fighter Squadron at Cannon AFB from October 1957 to February 1959, followed by service as an F-100 pilot with the 481st Tactical Fighter Squadron at Cannon from February 1959 to February 1961. Capt Sandvick served as an F-100 and then F-105 Thunderchief pilot with the 67th Tactical Fighter Squadron at Kadena AB, Okinawa, from February 1961 to July 1964, and then as an F-105 pilot and instructor pilot with the 561st Tactical Fighter Squadron at McConnell AFB, Kansas, from July 1964 until he deployed to Southeast Asia in July 1966. He served as an F-105F pilot with the 454th Tactical Fighter Squadron at Takhli Royal Thai AFB, Thailand, from July 1966 until he was forced to eject over North Vietnam and was taken as a Prisoner of War on August 7, 1966. After spending 2,402 days in captivity, Lt Col Sandvick was released during Operation Homecoming on March 4, 1973. He was briefly hospitalized to recover from his injuries at Sheppard AFB, Texas, and then attended Air War College at Maxwell AFB, Alabama, from August 1973 to August 1974. Col Sandvick's final assignment was as Deputy Commander for Resources with the 64th Flying Training Wing at Reese AFB, Texas, from August 1974 until his retirement from the Air Force on July 1, 1977.
Captain Robert J. Sandvick distinguished himself by gallantry in connection with military operations against an opposing armed force near Kep Airfield, North Vietnam on 7 August 1966. On that date, Captain Sandvick was the pilot in the lead F-105 of a two-ship hunter-killer team assigned to patrol the heavily defended Kep Airfield in search of hostile surface-to-air missile sites. Despite encountering adverse weather and heavy hostile defenses, Captain Sandvick courageously pressed the attack with complete disregard for his personal safety. By his gallantry and devotion to duty, Captain Sandvick has reflected great credit upon himself and the United States Air Force.
|
0.999738 |
When developing an app, security should be the number one priority. Review these tips for ensuring rock-solid security for your enterprise mobile app.
it's often difficult to find a process that targets each one.
Few organizations conduct business these days without the help of mobile apps, many of which store, display or transmit sensitive data. A business app that does not include proper security protections can put corporate resources and personal information at risk, potentially resulting in fines, lawsuits and tarnished reputations. Here are five points of a mobile app security checklist that development teams should use when building business apps for their organizations.
By prioritizing security from the start, an app is more likely to avoid security issues later in its lifecycle, when fixes can be costly and resource-intensive.
Developers should treat mobile app security as one of the project's top priorities from its inception. All other considerations are built on the premise that security will play a central role throughout each phase of the development process. Consider designating at least one individual to oversee a mobile app security checklist during the development and deployment stages.
By prioritizing security from the start, an app is more likely to avoid security issues later in its lifecycle, when fixes can be costly and resource-intensive. When a team tries to retrofit security into a poorly designed app, it can result in performance issues, disrupted business processes and a degraded user experience.
Most mobile apps now run on either Google Android or Apple iOS devices, with relatively few running on Windows devices and fewer still on BlackBerry devices. Organizations often need to build apps that target more than one of these operating systems. Developers should fully understand how security works in each targeted OS and the risks that come with using device features such as the camera or GPS.
Development teams should also research and evaluate any other technologies used to build their apps, including software libraries, application programming interfaces (APIs), software development kits (SDKs) and cross-platform frameworks. Consider whether the technologies have known security issues, how widely they've been implemented and what the development community is saying about them.
What's your mobile app security strategy?
This is the first article of a two-part mobile app security checklist. The second article discusses factors such as back-end systems, third-party services and built-in protections.
One of the most important steps on a mobile app security checklist is to implement strong authentication and authorization mechanisms that take privacy, session management, identity management and device security features into account. The app should also enforce multi-factor authentication, rather than rely on usernames and passwords alone.
When setting up these mechanisms, the team should use proven technologies such as the OAuth 2.0 authorization framework or the OpenID Connect protocol, and it should implement the most current versions. In addition, the team should protect authentication data such as passwords at every stage of the authentication process. If an app handles highly sensitive data, developers should require users to log in for each new session.
Business apps routinely communicate with other systems such as back-end servers, cloud-based services or other applications. When completing a mobile app security checklist, make sure that the app protects all sensitive data while in motion, even if all communication takes place inside the corporate firewall. Where appropriate, the app should use technologies such as the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol, and have a process to validate security certificates. The development team should consider certificate pinning, if possible, or another layer of encryption on top of SSL or TLS.
In addition, the development team should secure all APIs that the app uses. The team might also consider such technologies as virtual private networks (VPNs), JSON Web Tokens or platform-specific security features. For example, iOS includes App Transport Security, a feature that forces apps to use Hypertext Transfer Protocol Secure when connecting to back-end services. The team must also ensure that no sensitive data is exposed through push notifications, text messages or other forms of communication.
Developers should assume that IT can recover any data written to a device. When possible, they should avoid storing sensitive data on the device. If it's necessary, developers and IT should encrypt it wherever it resides, whether in files, databases or other data stores. Developers should use the latest and most proven encryption technologies available, such as the 256-bit Advanced Encryption Standard symmetric-key algorithm. Developers should also factor encryption key management into the app security strategy.
When the app needs to display sensitive data, developers should mask the data where appropriate, exposing only what is necessary, such as the last four digits of a credit card or Social Security number. The team should protect personal information and factor in industry regulations and standards such as the Health Insurance Portability and Accountability Act (HIPAA) or Payment Card Industry Data Security Standard.
How does your organization ensure a mobile app is secure during development?
|
0.959493 |
How does this relate to Elon Musk? When he came to me in 2001, he knew nothing of rockets or space exploration but he was deeply passionate about them. In fact, he was so passionate about the need to ‘make humanity a multi-planetary species’ that he was willing to spend a very large portion of his fortune on it. But because he was intelligent, he knew that he needed rockets to launch probes into space. To prolong his money supply, he needed to buy the cheapest rockets available. Hence his interest in Russian launch vehicles. Once he understood the space market a bit better, he saw that there was also an enormous opportunity to disrupt the launch vehicle market. He was thus led to the conclusion that his time and money might be better spent ‘solving the launch problem’ as he put it back then, than ‘throwing away my fortune in some Russian warehouse’.
SpaceX was born after Elon spent some time with John Garvey (a co-founder of my new company Vector) who was building amateur liquid launch vehicles in his garage at the time. While this seemed like an insane endeavor and John’s neighbors worried about him, Elon saw the brilliance in it and decided that John’s small rockets were an existence proof of something much bigger. Elon knew that if a small band of Space Cowboys like John could build a 30 foot tall liquid rocket with left over beer money and regular machine tools, great things were possible with big money, a great team and lots of hard work. This is where SpaceX was born.
SpaceX was not an obvious success in the early days. Clearly Elon and the team he recruited were passionate about building a low cost launcher. Clearly we were good at it. And clearly there was a market. However, most of the world was betting against Elon from the outside. This skepticism was born of a bit of conceit on the part of the big aerospace concerns who thought that ‘nobody can do better than us and especially not a band of Space Cowboys like SpaceX’. There were also questions of Elon’s motivations and basic honesty brought up by the skeptics. Others in the industry confided in me at the time that they thought Elon was fundamentally dishonest and making promises that he couldn't keep.
I left SpaceX after about a year because I too doubted SpaceX’s ability to succeed with the amount of money they had raised (and I could not conceive of raising more). I also did not share Elon’s passion for colonizing Mars as I regarded it to be a fool’s errand as it would never happen in my lifetime. I was wrong on both counts. Elon did succeed in the end and it was because he never counted himself out. He never gave up. He kept going. He knew that he had the three ingredients and he kept upping the ante every time he faced an obstacle or failure.
This leads me to what I personally think is the most important personal attribute for success. Its not intelligence. It’s not being educated. It’s not even experience. It’s simply a determination to never ever give up. That is the most important element of success: dogged determination. One of my favorite quotes along these lines is from Garth Stein, author of the book Racing in the Rain.
Elon Musk: How did Elon Musk learn enough about rockets to run SpaceX?
SpaceX: How much does SpaceX save by reusing a Falcon rocket?
Mechanical Engineering: What are the books that Elon Musk used to self-study rocket science?
|
0.990313 |
Thomas Frost (16 December 1821 – 16 July 1908) was an English radical writer, journalist, printer and Chartist.
Thomas Frost was born in Croydon in Surrey (now part of Greater London) on 16 December 1821, the son of a tailor who had read William Cobbett's Political Register and took part in the agitation to secure the Reform Act 1832. Apprenticed to a printer (his cousin Cornelius Chapman) in Norwood, London, Thomas started his own printing firm in the same town after Chapman's business became bankrupt.
In 1846 he took over the publication of John Goodwyn Barmby's Communist Chronicle, a monthly paper which had been discontinued for financial reasons. Frost revived the Chronicle as a weekly publication and reduced the price from 3d. to 1d. with Barmby retaining editorial control. Differences between Barmby and Frost on their aims caused publication to cease. Frost then started a short-lived Communist Journal. From 1847 to 1848 he was associated with the Fraternal Democrats.
From 1859 Frost was a leader writer for the Liverpool Albion weekly newspaper, on foreign politics and social questions. The newspaper maintained a political viewpoint independent of the main political parties until 1872, when a new proprietor, a member of the Conservative Party, recast the paper as a morning daily. Frost's terms of employment were now changed so that he was only paid for articles that were published; he was contracted to provide two articles per week, but many were not published, being politically incompatible. His income falling by one-third he left the Albion.
Frost subsequently settled in Barnsley, South Yorkshire, and worked as a reporter for the Barnsley Times and the Barnsley Chronicle. He wrote a number of books, mostly by his own admission "potboilers". He estimated his annual income from journalism and other literary undertakings to have been less than £200 per year. He died in 1908.
Frost claimed it was not until he read the poetry of Mary Shelley that he learned of "the connexion between the influence of circumstances in the formation of character and the new organization which Owen desired to give society". Frost became an active Chartist and Owenite and although he believed in revolution he stopped short of taking part in a revolutionary conspiracy to avoid arrest. He above all desired independence and wrote that "the assumption by Mr. Gladstone of the leadership of the Liberal party in the House of Commons seemed to promise the inauguration of a new era".
Frost wrote three books on the history of magic. His Lives of the Conjurers (1876) is considered to be the first significant history of magic. M. Thomas Inge described the book as "a full-fledged chronicle of magic and an invaluable reference work".
The magician Harry Houdini wrote that they were the "best books of their kind up to the time of their publication, but they are marked by glaring errors, showing that Frost compiled rather than investigated."
Frost's book Lives of the Conjurers is said to contain errors in relation to the magician Wiljalba Frikell. Magic historian Walter B. Gibson noted that "the information offered by Mr. Thomas Frost and his successors, concerning Frikell, is in the main incorrect and unreliable."
Thomas Frost died 16 July 1908.
^ "FROST, Thomas". Who's Who. Vol. 59. 1907. p. 643.
^ a b c Peter Gurney, 'Frost, Thomas (1821–1908)', Oxford Dictionary of National Biography, online edn, Oxford University Press, Oct 2007. Retrieved 18 April 2010.
^ E. F. Biagini, Liberty, Retrenchment and Reform. Popular Liberalism in the Age of Gladstone, 1860–1880 (Cambridge University Press, 1992), p. 385.
^ Coleman, Earle Jerome. (1987). Magic: A Reference Guide. Greenwood Press. p. 6. ISBN 978-0313233975 "Thomas Frost' s The Lives of the Conjurors was the first book-length history of magic and is understandably required reading for the would-be historian of magic."
Reminiscences of a Country Journalist London: Ward, 1886.
Peter Gurney. (2006). Working-class Writers and the Art of Escapology in Victorian England: The Case of Thomas Frost. Journal of British Studies 45: 51–71.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.