proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.997166 |
Do you ever use apple cider vinegar?
Raw apple cider vinegar has been loved for a long time for its multitude of beauty and health uses, and is even used as an acne cure. The Romans used vinegar mixed with various plants and essential oils like lavender, rose and elderflower for cosmetic purposes.
Its effectiveness lies in its ability to promote blood circulation in the tiny capillaries that deliver nutrients into your skin, plus it prevents growth of the bacteria, yeasts and viruses that can cause infections.
Raw apple cider vinegar is a powerful digestion booster, helping to reverse constipation and encourage stomach acid production. Many people even swear by its ability to control appetite and hunger pangs.
Its anti fungal, antiviral and antibacterial powers help to banish nasty candida overgrowths and rebalance your intestinal flora, which helps to reduce cravings for sugar too.
If you have never tried apple cider vinegar, I recommend splashing a small amount on salads to begin with, and then building up to drink a tablespoon in warm water. My favourite brand is Braggs (€6.55), as it is raw, unpasteurised and organic. It also contains the ‘Mother of vinegar’, which occurs naturally as strand-like chains of protein enzyme molecules and has been highly regarded by health experts for centuries.
|
0.999899 |
Question 1: The price of sugar having gone down by 10%, a consumer can buy 5 kg more sugar for Rs 270.
Let the original price of sugar be Rs. p.
more for a rupee. How much wheat could originally be had for a rupee?
(1000 x 9)/20 = 450g in one rupee.
|
0.999977 |
A soil scientist is a person who is qualified to evaluate and interpret soils and soil-related data for the purpose of understanding soil resources as they contribute to not only agricultural production, but as they affect environmental quality and as they are managed for protection of human health and the environment. The university degree should be in Soil Science, or closely related field (i.e., natural resources, environmental science, earth science, etc.) and include sufficient soils-related course work so the Soil Scientist has a measurable level of understanding of the soil environment, including soil morphology and soil forming factors, soil chemistry, soil physics, and soil biology, and the dynamic interaction of these areas.
Classically, a "scientist" is one who is "learned" in a particular field. In Soil Science, the scientist does add to the body of knowledge, but in our new paradigm, the soil scientist is also the practitioner of the body of knowledge that is employed for making judgments and evaluations of the use of soil resources, or impact upon soil by cultural activities (e.g., land-use planning). University graduates with degrees in Soil Science have pursued careers in various basic and applied sciences, and are becoming prominent members of interdisciplinary groups that evaluate both natural resource management and environmental quality issues.
What does the soil scientist do?
Research of soil systems and soil management by public and private research institutions for the enhancement of soils knowledge.
Management of soils for land enhancement such as in landscape design, mine reclamation, and site restoration.Evaluation and investigation of soils as they relate to natural resource management, including forest soils, wetlands, environmental endangerment assessments, ecological evaluations, and archeological sites.Assessment and investigation of soils for application of wastes in a variety of forms, including non-hazardous process wastes (residue and sludge management), and more distinct engineering and suitability of sites for on-site disposal of residential waste. Suitability studies for a variety of land development uses, including soil stability, moisture retention or drainage, sustainability, and environmental impact. Assessment and investigation of environmental hazards, including hazardous waste sites that involve soil investigation techniques, evaluation of chemical fate and transport phenomena, and suitable remediation alternatives.
Regulation of the use of land and soil resources by private and public interests (government agencies).
Management of soils for agricultural purposes, forest products and erosion control. Management includes modification of nutrient and water availability to plants.
These are some of the activities which soil scientists regularly practice. This work is most often conducted in coordination with other professionals with less training and knowledge of soil systems.
Why is there a need for recognition?
In modern professional practice, Soil Scientists are recognized only to a limited extent. Management of soils for protection of human affairs and the environment is often conducted by such licensed professionals as geologists and engineers who sometimes lack sufficient knowledge of soils. The opportunity for advancement of Soil Science in practice is often inhibited by those unable to recognize the application of Soil Science. Thus, the practice of Soil Science is often undertaken by individuals with a poor understanding of soils or soil processes. Soil scientists must be recognized as responsible, accountable professionals amidst other practitioners of science and engineering for the proper management and use of our soil resources. Such promotion will come primarily through the involvement of soil scientists in resource management decisions, certification, registration or licensing of soil scientists, and education of the general public and persons in other disciplines of science and engineering.
Students desiring to be ARCPACS (American Registry for Certified Professions in Soil Science - Federation of Certifying Boards in Agriculture, Biology, Earth and Environment Sciences) certified as a Soil Scientist, Specialist, or Classifier can take the Fundamentals of Soil Science and Professional Practice Examinations at the University of Wyoming.
Most of our graduates are employed by universities, research institutions, mining industries, state or federal conservation services, consulting firms, and regulatory and land management agencies. The mining industry is one of the primary contributors to Wyoming's economy and has been a steady source of employment for our students. Entry level positions open regularly in the Wyoming Department of Environmental Quality as people move up in that organization or move into the mining industry. Similarly, upward mobility will continue to create entry level positions with the federal land management agencies such as the Bureau of Land Management, the Forest Service and the Bureau of Indian Affairs. Students who are willing to leave Wyoming have additional opportunities in surrounding states as County Soil Scientists, with Consulting and Reclamation companies, etc. The USDA Agricultural Research Service also hires Soil Science graduates in support staff positions (M.S. level) and research science positions (Ph.D. level). In the next 5 to 10 years this agency will have a significant part of their staff qualified for retirement.
At the University of Wyoming, several administrative units are involved in soils-related research and, to a lesser extent, teaching of Soil Science. These include the Wyoming Water Research Center, the Western Research Institute, the Departments of Botany, Rangeland Ecology and Watershed Management, Civil/Environmental Engineering, Geography, Geology, Plant Science and Zoology. In particular, the mineralogy classes taught in Geology fill a significant complimentary role to the Soil Science offerings in the Renewable Resources Department. Soil Science faculty serve on graduate committees in all of the above mentioned departments. These interactions strengthen Soil Science education and research on campus; however, maintenance of the basic core curriculum and research must be borne by the Soil Science faculty within the Renewable Resources Department.
Soil Science includes the study of chemical, physical and biological properties of soils, as well as their spatial variability across the landscape. Areas of research, broadly grouped into Atmospheric, Biospheric, Lithospheric (Soils), and Hydrospheric, that the Soil Science Group has been involved in is included in Section VIII.
|
0.943347 |
"Stenography" redirects here. For the process of concealing information in messages, see steganography. For machine stenography, see stenotype.
Shorthand is an abbreviated symbolic writing method that increases speed and brevity of writing as compared to longhand, a more common method of writing a language. The process of writing in shorthand is called stenography, from the Greek stenos (narrow) and graphein (to write). It has also been called brachygraphy, from Greek brachys (short) and tachygraphy, from Greek tachys (swift, speedy), depending on whether compression or speed of writing is the goal.
Many forms of shorthand exist. A typical shorthand system provides symbols or abbreviations for words and common phrases, which can allow someone well-trained in the system to write as quickly as people speak. Abbreviation methods are alphabet-based and use different abbreviating approaches. Many journalists use shorthand writing to quickly take notes at press conferences or other similar scenarios. In the computerized world, several autocomplete programs, standalone or integrated in text editors, based on word lists, also include a shorthand function for frequently used phrases.
Shorthand was used more widely in the past, before the invention of recording and dictation machines. Shorthand was considered an essential part of secretarial training and police work, as well as useful for journalists. Although the primary use of shorthand has been to record oral dictation or discourse, some systems are used for compact expression. For example, healthcare professionals may use shorthand notes in medical charts and correspondence. Shorthand notes are typically temporary, intended either for immediate use or for later typing, data entry, or (mainly historically) transcription to longhand, although longer term uses do exist, such as encipherment: diaries (like that of the famous Samuel Pepys) are a common example.
The earliest known indication of shorthand systems is from the Parthenon in Ancient Greece, where a mid-4th century BC marble slab was found. This shows a writing system primarily based on vowels, using certain modifications to indicate consonants. Hellenistic tachygraphy is reported from the 2nd century BC onwards, though there are indications that it might be older. The oldest datable reference is a contract from Middle Egypt, stating that Oxyrhynchos gives the "semeiographer" Apollonios for two years to be taught shorthand writing. Hellenistic tachygraphy consisted of word stem signs and word ending signs. Over time, many syllabic signs were developed.
In Ancient Rome, Marcus Tullius Tiro (103–4 BC), a slave and later a freedman of Cicero, developed the Tironian notes so that he could write down Cicero's speeches. Plutarch (c. 46 – c. 120 AD) in his "Life of Cato the Younger" (95–46 BC) records that Cicero, during a trial of some insurrectionists in the senate, employed several expert rapid writers, whom he had taught to make figures comprising numerous words in a few short strokes, to preserve Cato's speech on this occasion. The Tironian notes consisted of Latin word stem abbreviations (notae) and of word ending abbreviations (titulae). The original Tironian notes consisted of about 4000 signs, but new signs were introduced, so that their number might increase to as many as 13,000. In order to have a less complex writing system, a syllabic shorthand script was sometimes used. After the decline of the Roman Empire, the Tironian notes were no longer used to transcribe speeches, though they were still known and taught, particularly during the Carolingian Renaissance. After the 11th century, however, they were mostly forgotten.
When many monastery libraries were secularized in the course of the 16th-century Protestant Reformation, long-forgotten manuscripts of Tironian notes were rediscovered.
In imperial China, clerks used an abbreviated, highly cursive form of Chinese characters to record court proceedings and criminal confessions. These records were used to create more formal transcripts. One cornerstone of imperial court proceedings was that all confessions had to be acknowledged by the accused's signature, personal seal, or thumbprint, requiring fast writing.[not in citation given] Versions of this technique survived in clerical professions into the modern day, and influenced by Western shorthand methods, some new methods were invented.
An interest in shorthand or "short-writing" developed towards the end of the 16th century in England. In 1588 Timothy Bright published his Characterie; An Arte of Shorte, Swifte and Secrete Writing by Character which introduced a system with 500 arbitrary symbols each representing one word. Bright's book was followed by a number of others, including Peter Bales' The Writing Schoolemaster in 1590, John Willis's Art of Stenography in 1602, Edmond Willis's An abbreviation of writing by character in 1618, and Thomas Shelton's Short Writing in 1626 (later re-issued as Microscopic Editing Software).
Shelton's system became very popular and is well known because it was used by Samuel Pepys for his diary and for many of his official papers, such as his letter copy books. It was also used by Sir Isaac Newton in some of his notebooks. Shelton borrowed heavily from his predecessors, especially Edmond Willis. Each consonant was represented by an arbitrary but simple symbol, while the five vowels were represented by the relative positions of the surrounding consonants. Thus the symbol for B with symbol for T drawn directly above it represented "bat", while B with T below it meant "but"; top-right represented "e", middle-right "i", and lower-right "o". A vowel at the end of a word was represented by a dot in the appropriate position, while there were additional symbols for initial vowels. This basic system was supplemented by further symbols representing common prefixes and suffixes.
One drawback of Shelton's system was that there was no way to distinguish long and short vowels or diphthongs; so the b-a-t sequence could mean "bat", or "bait", or "bate", while b-o-t might mean "boot", or "bought", or "boat". The reader needed to use the context to work out which alternative was meant. The main advantage of the system was that it was easy to learn and to use. It was popular, and under the two titles of Short Writing and Tachygraphy, Shelton's book ran to more than 20 editions between 1626 and 1710.
Shelton's chief rivals were Theophilus Metcalfe's Stenography or Short Writing (1633) which was in its "55th edition" by 1721, and Jeremiah Rich's system of 1654, which was published under various titles including The penns dexterity compleated (1669). Another notable English shorthand system creator of the 17th century was William Mason (fl. 1672–1709) who published Arts Advancement in 1682.
Modern-looking geometric shorthand was introduced with John Byrom's New Universal Shorthand of 1720. Samuel Taylor published a similar system in 1786, the first English shorthand system to be used all over the English-speaking world. Thomas Gurney published Brachygraphy in the mid-18th century. In 1834 in Germany, Franz Xaver Gabelsberger published his Gabelsberger shorthand. Gabelsberger based his shorthand on the shapes used in German cursive handwriting rather than on the geometrical shapes that were common in the English stenographic tradition.
Taylor's system was superseded by Pitman shorthand, first introduced in 1837 by English teacher Sir Isaac Pitman, and improved many times since. Pitman's system has been used all over the English-speaking world and has been adapted to many other languages, including Latin. Pitman's system uses a phonemic orthography. For this reason, it is sometimes known as phonography, meaning "sound writing" in Greek. One of the reasons this system allows fast transcription is that vowel sounds are optional when only consonants are needed to determine a word. The availability of a full range of vowel symbols, however, makes complete accuracy possible. Isaac's brother Benn Pitman, who lived in Cincinnati, Ohio, was responsible for introducing the method to America. The record for fast writing with Pitman shorthand is 350 wpm during a two-minute test by Nathan Behrin in 1922.
The seeker after high speed should devote himself to obtaining a thorough mastery of the principles of his system of shorthand. Not until the ability to write shorthand without mental hesitation has been acquired, should speed practice begin.
A student observing the note-taking of an experienced stenographer will be struck with admiration at the smoothness of the writing and the perfect regularity of the outlines. An excellent method of practice for the like facility is in the copying of a selection sentence by sentence until the whole is memorized, and then writing it over and over again.
All notes taken at any speed should strictly be compared with the printed matter. It will then be found that many words are taken for others because of the forms they assume when written under pressure. Most of these can be avoided by careful attention to the writing. Experience alone will authorize any deviation from the text-book forms.
Phrasing should be indulged in sparingly on unfamiliar matter. But on familiar matter the student should always be alert for opportunities of saving both time and effort by employing the principles of intersection, elimination of consonants and the joining of words of frequent occurrence.
Nothing less than absolute accuracy should satisfy the student. Conflicting outlines should be carefully distinguished. Where words may be distinguished either by the insertion of vowels or the changing of one of the outlines, the latter should always be the method employed; vowels should freely be inserted whenever possible. The sense of the matter should be carefully preserved by the punctuation of the notes, indicating the full stop and leaving spaces in the notes between phrases.
The best matter of the for the student beginning practice for speed is to be found in the dictation books compiled by the publishers of the system. At first, the dictation should be slow to permit the making of careful outlines. Gradually the speed should be increased until the student is obliged to exert himself to keep pace with the reader; and occasionally short bursts of speed should be attempted as tests of the writer's progress.
The student ambitious to succeed will endeavor to familiarize himself with all matters pertaining to stenography. By reading the shorthand magazines he will keep himself in touch with the latest developments in the art. Facility in reading shorthand will also be acquired by reading the shorthand plates in these magazines. For comparison and suggestion, he will study the facsimile notes of practical stenographers. He will neglect no opportunity to improve himself in the use of his art. And finally he will join a shorthand society where he will come in contact with other stenographers who are striving toward the same goal as himself.
Despite being 175 years old Pitman's shorthand is still relevant today and used by thousands of journalists, executive PAs and secretaries across the world. In Europe, particularly in Great Britain there are thousands of educational institutions teaching Pitman's shorthand.
In the United States and some other parts of the world it has been largely superseded by Gregg shorthand, which was first published in 1888 by John Robert Gregg. This system was influenced by the handwriting shapes that Gabelsberger had introduced. Gregg's shorthand, like Pitman's, is phonetic, but has the simplicity of being "light-line." Pitman's system uses thick and thin strokes to distinguish related sounds, while Gregg's uses only thin strokes and makes some of the same distinctions by the length of the stroke. In fact, Gregg claimed joint authorship in another shorthand system published in pamphlet form by one Thomas Stratford Malone; Malone, however, claimed sole authorship and a legal battle ensued. The two systems use very similar, if not identical, symbols; however, these symbols are used to represent different sounds. For instance, on page 10 of the manual is the word d i m 'dim'; however, in the Gregg system the spelling would actually mean n u k or 'nook'.
Our Japanese pen shorthand began in 1882, transplanted from the American Pitman-Graham system. Geometric theory has great influence in Japan. But Japanese motions of writing gave some influence to our shorthand. We are proud to have reached the highest speed in capturing spoken words with a pen. Major pen shorthand systems are Shuugiin, Sangiin, Nakane and Waseda [a repeated vowel shown here means a vowel spoken in double-length in Japanese, sometimes shown instead as a bar over the vowel]. Including a machine-shorthand system, Sokutaipu, we have 5 major shorthand systems now. The Japan Shorthand Association now has 1,000 members.
There are several other pen shorthands in use (Ishimura, Iwamura, Kumassaki, Kotani, and Nissokuken), leading to a total of nine pen shorthands in use. In addition, there is the Yamane pen shorthand (of unknown importance) and three machine shorthands systems (Speed Waapuro, Caver and Hayatokun or sokutaipu). The machine shorthands have gained some ascendancy over the pen shorthands.
Japanese shorthand systems ('sokki' shorthand or 'sokkidou' stenography) commonly use a syllabic approach, much like the common writing system for Japanese (which has actually two syllabaries in everyday use). There are several semi-cursive systems. Most follow a left-to-right, top-to-bottom writing direction. Several systems incorporate a loop into many of the strokes, giving the appearance of Gregg, Graham, or Cross's Eclectic shorthand without actually functioning like them. The Kotani (aka Same-Vowel-Same-Direction or SVSD or V-type) system's strokes frequently cross over each other and in so doing form loops.
Japanese also has its own variously cursive form of writing kanji characters, the most extremely simplified of which is known as Sōsho.
The new sokki were used to transliterate popular vernacular story-telling theater (yose) of the day. This led to a thriving industry of sokkibon (shorthand books). The ready availability of the stories in book form, and higher rates of literacy (which the very industry of sokkibon may have helped create, due to these being oral classics that were already known to most people) may also have helped kill the yose theater, as people no longer needed to see the stories performed in person to enjoy them. Sokkibon also allowed a whole host of what had previously been mostly oral rhetorical and narrative techniques into writing, such as imitation of dialect in conversations (which can be found back in older gensaku literature; but gensaku literature used conventional written language in between conversations, however).
Shorthands that use simplified letterforms are sometimes termed stenographic shorthands, contrasting with alphabetic shorthands, below. Stenographic shorthands can be further differentiated by the target letter forms as geometric, script, and semi-script or elliptical.
Geometric shorthands are based on circles, parts of circles, and straight lines placed strictly horizontally, vertically or diagonally. The first modern shorthand systems were geometric. Examples include Pitman Shorthand, Boyd's Syllabic Shorthand, Samuel Taylor's Universal Stenography, the French Prévost-Delaunay, and the Duployé system, adapted to write the Kamloops Wawa (used for Chinook Jargon) writing system.
Script shorthands are based on the motions of ordinary handwriting. The first system of this type was published under the title Cadmus Britanicus by Simon Bordley, in 1787. However, the first practical system was the German Gabelsberger shorthand of 1834. This class of system is now common in all more recent German shorthand systems, as well as in Austria, Italy, Scandinavia, the Netherlands, Russia, other Eastern European countries, and elsewhere.
Script-geometric, or semi-script, shorthands are based on the ellipse. Semi-script can be considered a compromise between the geometric systems and the script systems. The first such system was that of George Carl Märes in 1885. However, the most successful system of this type was Gregg shorthand, introduced by John Robert Gregg in 1888. Gregg had studied not only the geometric English systems, but also the German Stolze stenography, a script shorthand. Other examples include Teeline Shorthand and Thomas Natural Shorthand.
The semi-script philosophy gained popularity in Italy in the first half of the 20th century with three different systems created by Giovanni Vincenzo Cima, Erminio Meschini, and Stenital Mosciaro.
Some shorthand systems attempted to ease learning by using characters from the Latin alphabet. Such non-stenographic systems have often been described as alphabetic, and purists might claim that such systems are not 'true' shorthand. However, these alphabetic systems do have value for students who cannot dedicate the years necessary to master a stenographic shorthand. Alphabetic shorthands cannot be written at the speeds theoretically possible with symbol systems—200 words per minute or more—but require only a fraction of the time to acquire a useful speed of between 60 and 100 words per minute.
Non-stenographic systems often supplement alphabetic characters by using punctuation marks as additional characters, giving special significance to capitalised letters, and sometimes using additional non-alphabetic symbols. Examples of such systems include Stenoscript, Speedwriting and Forkner shorthand. However, there are some pure alphabetic systems, including Personal Shorthand, SuperWrite, Easy Script Speed Writing, and Keyscript Shorthand which limit their symbols to a priori alphabetic characters. These have the added advantage that they can also be typed—for instance, onto a computer, PDA, or cellphone. Early editions of Speedwriting were also adapted so that they could be written on a typewriter, and therefore would possess the same advantage.
Shorthand systems can also be classified according to the way that vowels are represented.
Alphabetic – Expression by "normal" vowel signs that are not fundamentally different from consonant signs (e.g., Gregg, Duployan).
Mixed alphabetic – Expression of vowels and consonants by different kinds of strokes (e.g., Arends' system for German or Melin's Swedish Shorthand where vowels are expressed by upward or sideway strokes and consonants and consonant clusters by downward strokes).
Abjad – No expression of the individual vowels at all except for indications of an initial or final vowel (e.g., Taylor).
Marked abjad – Expression of vowels by the use of detached signs (such as dots, ticks, and other marks) written around the consonant signs.
Positional abjad – Expression of an initial vowel by the height of the word in relation to the line, no necessary expression of subsequent vowels (e.g., Pitman, which can optionally express other vowels by detached diacritics).
Abugida – Expression of a vowel by the shape of a stroke, with the consonant indicated by orientation (e.g., Boyd).
Mixed abugida – Expression of the vowels by the width of the joining stroke that leads to the following consonant sign, the height of the following consonant sign in relation to the preceding one, and the line pressure of the following consonant sign (e.g., most German shorthand systems).
Traditional shorthand systems are written on paper with a stenographic pencil or a stenographic pen. Some consider that strictly speaking only handwritten systems can be called shorthand.
Machine shorthand is also a common term for writing produced by a stenotype, a specialized keyboard. These are often used for court room transcripts and in live subtitling. However, there are other shorthand machines used worldwide, including: Velotype; Palantype in the UK; Grandjean Stenotype, used extensively in France and French-speaking countries; Michela Stenotype, used extensively in Italy; and Stenokey, used in Bulgaria and elsewhere.
One of the most widely used forms of shorthand is still the Pitman shorthand method described above, which has been adapted for 15 languages. Although Pitman's method was extremely popular at first and is still commonly used, especially in the UK, its popularity has been superseded, especially in the U.S., by Gregg shorthand, developed by John Robert Gregg in 1888.
In the UK, the spelling-based (rather than phonetic) Teeline shorthand is now more commonly taught and used than Pitman, and Teeline is the recommended system of the National Council for the Training of Journalists with an overall speed of 100 words per minute necessary for certification. Other less commonly used systems in the UK are Pitman 2000, PitmanScript, Speedwriting, and Gregg. Teeline is also the most common shorthand method taught to New Zealand journalists, whose certification typically requires a shorthand speed of at least 80 words per minute.
In Nigeria, shorthand is still taught in higher institutions of learning, especially for students studying Office Technology Management and Business Education.
For a more comprehensive list, see List of shorthand systems.
^ su_yi168,阿原. "(原创)漢語速記的發展及三個高潮的出現 - 阿原的日志 - 网易博客". 163.com. Archived from the original on 2016-03-04.
^ "教授弋乂_新浪博客". sina.com.cn. Archived from the original on 2016-02-08.
^ "NEW WORLD'S RECORD FOR SHORTHAND SPEED" (PDF).
^ Behrin, Nathan (January 1914). "High Speed in Shorthand". The Stenographer. 43 (1): 389. Retrieved 14 August 2018.
^ "Wayback Machine" (PDF). 27 July 2011. Archived from the original (PDF) on 27 July 2011.
^ "Script phonography". archive.org. Archived from the original on 2016-03-06.
^ "Books", Pitman Shorthand, Homestead, archived from the original on 2016-03-04 .
^ Kaneko (PPT), IT: Intersteno .
^ Housiki, Okoshi Yasu, archived from the original on 2016-03-03 .
^ "速記文字文例". okoshi-yasu.net. Archived from the original on 2016-03-03.
^ Sokkidou, JP: OCN, archived from the original on 2013-05-22 .
^ Steno, Nifty, archived from the original on 2016-03-04 .
^ "The Joy of Pitman Shorthand". pitmanshorthand.homestead.com. Archived from the original on 2011-05-15.
Look up shorthand in Wiktionary, the free dictionary.
Wikimedia Commons has media related to Shorthand.
|
0.992202 |
How to highlight websites I have visited?
Most browsers have options to bookmark sites you visit for later — in Chrome and Firefox, you can use the star icon in the address bar; in Internet Explorer, you can click on “Favorites” and choose ‘Add to Favorites.’ Hope that helps!
Most browsers have options to bookmark sites you visit for later -- in Chrome and Firefox, you can use the star icon in the address bar; in Internet Explorer, you can click on "Favorites" and choose 'Add to Favorites.' Hope that helps!
|
0.996823 |
Region-based convolutional neural networks or regions with CNN features (R-CNNs) are a pioneering approach that applies deep models to object detection. In this section, we will discuss R-CNNs and a series of improvements made to them: Fast R-CNN, Faster R-CNN, and Mask R-CNN. Due to space limitations, we will confine our discussion to the designs of these models.
R-CNN models first select several proposed regions from an image (for example, anchor boxes are one type of selection method) and then label their categories and bounding boxes (e.g., offsets). Then, they use a CNN to perform forward computation to extract features from each proposed area. Afterwards, we use the features of each proposed region to predict their categories and bounding boxes. Figure 11.5 shows an R-CNN model.
Selective search is performed on the input image to select multiple high-quality proposed regions. These proposed regions are generally selected on multiple scales and have different shapes and sizes. The category and ground-truth bounding box of each proposed region is labeled.
A pre-trained CNN is selected and placed, in truncated form, before the output layer. It transforms each proposed region into the input dimensions required by the network and uses forward computation to output the features extracted from the proposed regions.
The features and labeled category of each proposed region are combined as an example to train multiple support vector machines for object classification. Here, each support vector machine is used to determine whether an example belongs to a certain category.
The features and labeled bounding box of each proposed region are combined as an example to train a linear regression model for ground-truth bounding box prediction.
Although R-CNN models use pre-trained CNNs to effectively extract image features, the main downside is the slow speed. As you can imagine, we can select thousands of proposed regions from a single image, requiring thousands of forward computations from the CNN to perform object detection. This massive computing load means that R-CNNs are not widely used in actual applications.
The main performance bottleneck of an R-CNN model is the need to independently extract features for each proposed region. As these regions have a high degree of overlap, independent feature extraction results in a high volume of repetitive computations. Fast R-CNN improves on the R-CNN by only performing CNN forward computation on the image as a whole.
Fig. 12.6 Fast R-CNN model.
Compared to an R-CNN model, a Fast R-CNN model uses the entire image as the CNN input for feature extraction, rather than each proposed region. Moreover, this network is generally trained to update the model parameters. As the input is an entire image, the CNN output shape is \(1 \times c \times h_1 \times w_1\).
Assuming selective search generates \(n\) proposed regions, their different shapes indicate regions of interests (RoIs) of different shapes on the CNN output. Features of the same shapes must be extracted from these RoIs (here we assume that the height is \(h_2\) and the width is \(w_2\)). Fast R-CNN introduces RoI pooling, which uses the CNN output and RoIs as input to output a concatenation of the features extracted from each proposed region with the shape \(n \times c \times h_2 \times w_2\).
A fully connected layer is used to transform the output shape to \(n \times d\), where \(d\) is determined by the model design.
During category prediction, the shape of the fully connected layer output is again transformed to \(n \times q\) and we use softmax regression (\(q\) is the number of categories). During bounding box prediction, the shape of the fully connected layer output is again transformed to \(n \times 4\). This means that we predict the category and bounding box for each proposed region.
The RoI pooling layer in Fast R-CNN is somewhat different from the pooling layers we have discussed before. In a normal pooling layer, we set the pooling window, padding, and stride to control the output shape. In an RoI pooling layer, we can directly specify the output shape of each region, such as specifying the height and width of each region as \(h_2,w_2\). Assuming that the height and width of the RoI window are \(h\) and \(w\), this window is divided into a grid of sub-windows with the shape \(h_2 \times w_2\). The size of each sub-window is about \((h/h_2) \times (w/w_2)\). The sub-window height and width must always be integers and the largest element is used as the output for a given sub-window. This allows the RoI pooling layer to extract features of the same shape from RoIs of different shapes.
In Figure 11.7, we select an \(3\times 3\) region as an RoI of the \(4 \times 4\) input. For this RoI, we use a \(2\times 2\) RoI pooling layer to obtain a single \(2\times 2\) output. When we divide the region into four sub-windows, they respectively contain the elements 0, 1, 4, and 5 (5 is the largest); 2 and 6 (6 is the largest); 8 and 9 (9 is the largest); and 10.
Fig. 12.7 \(2\times 2\) RoI pooling layer.
We use the ROIPooling function to demonstrate the RoI pooling layer computation. Assume that the CNN extracts the feature X with both a height and width of 4 and only a single channel.
Assume that the height and width of the image are both 40 pixels and that selective search generates two proposed regions on the image. Each region is expressed as five elements: the region’s object category and the \(x,y\) coordinates of its upper-left and bottom-right corners.
Because the height and width of X are \(1/10\) of the height and width of the image, the coordinates of the two proposed regions are multiplied by 0.1 according to the spatial_scale, and then the RoIs are labeled on X as X[:,:,0:3,0:3] and X[:,:,1:4,0:4], respectively. Finally, we divide the two RoIs into a sub-window grid and extract features with a height and width of 2.
In order to obtain precise object detection results, Fast R-CNN generally requires that many proposed regions be generated in selective search. Faster R-CNN replaces selective search with a region proposal network. This reduces the number of proposed regions generated, while ensuring precise object detection.
Fig. 12.8 Faster R-CNN model.
We use a \(3\times 3\) convolutional layer with a padding of 1 to transform the CNN output and set the number of output channels to \(c\). This way, each element in the feature map the CNN extracts from the image is a new feature with a length of \(c\).
We use each element in the feature map as a center to generate multiple anchor boxes of different sizes and aspect ratios and then label them.
We use the features of the elements of length \(c\) at the center on the anchor boxes to predict the binary category (object or background) and bounding box for their respective anchor boxes.
Then, we use non-maximum suppression to remove similar bounding box results that correspond to category predictions of “object”. Finally, we output the predicted bounding boxes as the proposed regions required by the RoI pooling layer.
It is worth noting that, as a part of the Faster R-CNN model, the region proposal network is trained together with the rest of the model. In addition, the Faster R-CNN object functions include the category and bounding box predictions in object detection, as well as the binary category and bounding box predictions for the anchor boxes in the region proposal network. Finally, the region proposal network can learn how to generate high-quality proposed regions, which reduces the number of proposed regions while maintaining the precision of object detection.
If training data is labeled with the pixel-level positions of each object in an image, a Mask R-CNN model can effectively use these detailed labels to further improve the precision of object detection.
Fig. 12.9 Mask R-CNN model.
As shown in 9.9, Mask R-CNN is a modification to the Faster R-CNN model. Mask R-CNN models replace the RoI pooling layer with an RoI alignment layer. This allows the use of bilinear interpolation to retain spatial information on feature maps, making Mask R-CNN better suited for pixel-level predictions. The RoI alignment layer outputs feature maps of the same shape for all RoIs. This not only predicts the categories and bounding boxes of RoIs, but allows us to use an additional fully convolutional network to predict the pixel-level positions of objects. We will describe how to use fully convolutional networks to predict pixel-level semantics in images later in this chapter.
An R-CNN model selects several proposed regions and uses a CNN to perform forward computation and extract the features from each proposed region. It then uses these features to predict the categories and bounding boxes of proposed regions.
Fast R-CNN improves on the R-CNN by only performing CNN forward computation on the image as a whole. It introduces an RoI pooling layer to extract features of the same shape from RoIs of different shapes.
Faster R-CNN replaces the selective search used in Fast R-CNN with a region proposal network. This reduces the number of proposed regions generated, while ensuring precise object detection.
Mask R-CNN uses the same basic structure as Faster R-CNN, but adds a fully convolution layer to help locate objects at the pixel level and further improve the precision of object detection.
Study the implementation of each model in the GluonCV toolkit related to this section.
Girshick, R., Donahue, J., Darrell, T., & Malik, J. (2014). Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 580-587).
Uijlings, J. R., Van De Sande, K. E., Gevers, T., & Smeulders, A. W. (2013). Selective search for object recognition. International journal of computer vision, 104(2), 154-171.
Girshick, R. (2015). Fast r-cnn. arXiv preprint arXiv:1504.08083.
Ren, S., He, K., Girshick, R., & Sun, J. (2015). Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems (pp. 91-99).
He, K., Gkioxari, G., Dollár, P., & Girshick, R. (2017, October). Mask r-cnn. In Computer Vision (ICCV), 2017 IEEE International Conference on (pp. 2980-2988). IEEE.
|
0.964173 |
The Moon is Earth's only permanent natural satellite, as well as the only celestial body besides Earth to have been visited by humans. It is the fifth largest natural satellite in the Solar System, and the largest among planetary satellites relative to the size of the planet that it orbits (its primary). It is the second-densest satellite among those whose densities are known (after Jupiter's satellite Io).
The Moon is in synchronous rotation with Earth, always showing the same face, with its near side marked by dark volcanic maria that fill the spaces between the bright ancient crustal highlands and the prominent impact craters. It is the second-brightest regularly visible celestial object in Earth's sky after the Sun, as measured by illuminance on Earth's surface. Its surface is actually dark (although it can appear a very bright white) with a reflectance just slightly higher than that of worn asphalt. Its prominence in the sky and its regular cycle of phases have made the Moon an important cultural influence since ancient times on language, calendars, art, and mythology.
The Soviet Union's Luna programme was the first to reach the Moon with unmanned spacecraft in 1959; the United States' NASA Apollo program achieved the only manned missions to date, beginning with the first manned lunar orbiting mission by Apollo 8 in 1968, and six manned lunar landings between 1969 and 1972, with the first being Apollo 11. These missions returned over 380 kg (840 lb) of lunar rocks, which have been used to develop a geological understanding of the Moon's origin, the formation of its internal structure, and its subsequent history. After the Apollo 17 mission in 1972, the Moon has been visited only by unmanned spacecraft.
Using a new high-speed camera, lightning researcher Ningyu Liu of the Florida Institute of Technology managed to film a lightning storm in slow motion. The footage, captured on 20 May, was recorded at 7,000 frames per second. For the video, Liu plays it back at 700 frames per second so you can savour every little detail.
Is our Universe one of many? The idea of parallel universes, once consigned to science fiction, is now becoming respectable among scientists – at least, among physicists, who have a tendency to push ideas to the limits of what is conceivable.
The recent film The Theory of Everything tells the story of Stephen Hawking, who managed to become a world-famous physicist despite being confined to a wheelchair by a degenerative disease. It's mostly about his relationship with his ex-wife Jane, but it does find a bit of time to explain what Hawking has spent his career doing.
|
0.99926 |
Organizational redesign is occurring at a rapid rate because of shorter product life cycles, rapidly changing environments, accelerated development of sophisticated information systems, and increased marketplace competitiveness. Because of these factors, more companies are considering project management organizations as a solution.
Why have some companies been able to implement this change in a short period of time while other companies require years? The answer is that successful implementation requires good transitional management.
Transitional management is the art and science of managing the conversion period from one organizational design to another. Transitional management necessitates an understanding of the new goals, objectives, roles, expectations, and employees' fears.
• Transfer of power. Some line managers will find it extremely difficult to accept someone else managing their projects, whereas some project managers will find it difficult to give orders to workers who belong to someone else.
• Trust. The secret to a successful transition without formal executive authority will be trust between line managers, between project managers, and between project and line managers. It takes time for trust to develop. Senior management should encourage it throughout the transition life cycle.
• Policies and procedures. The establishment of well-accepted policies and procedures is a slow and tedious process. Trying to establish rigid policies and procedures at project initiation will lead to difficulties.
• Hierarchical consideration. During transition, every attempt should be made to minimize hierarchical considerations that could affect successful organizational maturity.
• Priority scheduling. Priorities should be established only when needed, not on a continual basis. If priority shifting is continual, confusion and disenchantment will occur.
• Personnel problems. During transition there will be personnel problems brought on by moving to new locations, status changes, and new informal organizations. These problems should be addressed on a continual basis.
• Communications. During transition, new channels of communications should be built but not at the expense of old ones. Transition phases should show employees that communication can be multidirectional, for example, a project manager talking directly to functional employees.
• Project manager acceptance. Resistance to the project manager position can be controlled through proper training. People tend to resist what they do not understand.
• Competition. Although some competition is healthy within an organization, it can be detrimental during transition. Competition should not be encouraged at the expense of the total organization.
• Tools. It is common practice for each line organization to establish its own tools and techniques. During transition, no attempt should be made to force the line organizations to depart from their current practices. Rather, it is better for the project managers to develop tools and techniques that can be integrated with those in the functional groups.
• Contradicting demands. During transition and after maturity, contradicting demands will be a way of life. When they first occur during transition, they should be handled in a "working atmosphere" rather than a crisis mode.
• Reporting. If any type of standardization is to be developed, it should be for project status reporting, regardless of the size of the project.
• Teamwork. Systematic planning with strong functional input will produce teamwork. Using planning groups during transition will not obtain the necessary functional and project commitments.
• Theory X-Theory Y. During transition, functional employees may soon find themselves managed under either Theory X or Theory Y approaches. People must realize (through training) that this is a way of life in project management, especially during crises.
• Overmanagement costs. A mistake often made by executives is thinking that projects can be managed with fewer resources. This usually leads to disaster because undermanagement costs may be an order of magnitude greater than overmanagement costs.
• Proper planning and organization of the transition on a life-cycle basis will facilitate a successful change.
• Training of the executives, line managers, and employees in project management knowledge, skills, and attitudes is critical to a successful transition and probably will shorten the transition time.
• Employee involvement and acceptance may be the single most important function during transition.
• The strongest driving force of success during transition is a demonstration of commitment to and involvement in project management by senior executives.
• Organizational behavior becomes important during transition.
• Commitments made by senior executives prior to transition must be preserved during and following transition.
• Major concessions by senior management will come slowly.
• Schedule or performance compromises are not acceptable during transition; cost overruns may be acceptable.
• Conflict among participants increases during transition.
• If project managers are willing to manage with only implied authority during transition, then the total transition time may be drastically reduced.
• It is not clear how long transition will take.
Transition from a classical or product organization to a project-driven organization is not easy. With proper understanding, training, demonstrated commitment, and patience, transition will have a good chance for success.
|
0.99836 |
Hello, I am 51 and broke my right hip in Jan. After surgery that used 3 screws to fix my hip, I was non weight bearing on that leg for eight weeks. My first day of physical therapy when I was allowed to bear weight, I stumbled and broke my right great toe. I was put in a boot cast and told to bear weight on it as tolerated. The boot did not seem to help much as I still had toe pain, so for four more weeks I continued to use my walker while not bearing weight except when going out in public when I would use the boot and a cane. Finally with the go ahead to bear full weight on both feet, I resumed walking. My feet are very flat and pronate greatly following many years of standing in my jobs. When I got back in my regular shoes with my custom made orthotics, I found them to be very irritating to wear. The bottoms of my feet hurt from them, but I continued wearing them as I thought I just needed to get use to them again. They support my feet and help with foot fatigue, but now I frequently feel vibrations in the bottom of both feet. They vibrate for two seconds, feel fine for two seconds, then vibrate, feel fine, etc. I have read others to describe it as feeling like there is a cell phone vibrating in your foot. Rest alleviates the vibrations eventually, but they start up again when I get up. Going without the orthotics have not helped with the vibrations. I told my orthopedic surgeon about it. He feels it is a nerve irritation or compression. He gave me a prescription for new orthotics. I hate to spend money on them if I don't need to as I already have so many medical bills. What would be your opinion on what to do next? Thank you very much!
It would be very helpful if I could see your old prescription orthotics but obviously that is impossible.
For many of my patients, just having their old orthotics refurbished by my lab is enough to take a poor functioning pair of orthotics and turning them back into a useful pair.
It is safe to say that between your hip surgery, non-weightbearing, broken toe incident that you have done something either to your feet or your lower back.
The two main culprits, but not the only ones, that would cause your foot sensation would either be a nerve impingement in your lower back meaning the nerves that innervate the bottom of your feet, are being irritated as they come out of the spinal canal. The other possibility would be that of a tarsal tunnel in both feet.
Going without the orthotics probably would not improve your symptoms, but the fact that there is no improvement with the orthotics means you either need to have your present orthotics adjusted, or consider a new pair of orthotics particularly if your doctor suspects tarsal tunnel.
I apologize for being so vague, but I really need to see what your old orthotics look like to be more specific.
One intermediate option for you would be to purchase what is known as a "medical grade, off the shelf orthotic" such as the KLM orthotic sold on this site. If your orthopedist feels you do have a tarsal tunnel AND your old orthotics are worn out, the KLM orthotic may very well give you relief without breaking the bank.
So, in summary, the way I see this with limited information available to me is this: your orthopedist feels that whatever is causing your foot pain should be helped by orthotics. He also feels that your present orthotics are worn out.
Your options are these: see if the old orthotics can be refurbished. There will a charge for this but certainly not the cost of new orthotics. If they cannot be refurbished or the cost is too expensive, then consider a "medical grade orthotic", and lastly a new pair of prescription orthotics.
I should also mention that for a tarsal tunnel or a nerve compression in the spine, although an orthotic may help, there is no guarantee that you will be any better with a new orthotic as orthotics are generally not the treatment of choice for either condition.
|
0.999555 |
Something along those lines, although instead of creating a deep "hole" we are basically sticking a pipe in the ground to unlock materials that are otherwise not mine-able.
This is a game concept that I thought would be interesting. I hope it has not already been proposed! How about the ability to "drill" deep into the planet for gas/liquid resources (i.e. hydrocarbons, water). This could possibly involve the introduction of more surface equipment modules for gas processing/refining. Here are a few supporting concepts that come to mind: - seismic exploration to locate suitable drill sites / depths - modular drilling rig which components can be moved with large vehicles and assembled at drill site (derrick, sub-structure, generator, pumps, ...) - pipeline infrastructure to a centralized processing facility or base. Or the player can choose to process the resource at the well site. - gas compressors to boost pipeline pressures? - new resource production can supplement the atmosphere condenser (water, oil, methane, ethane, propane ... hydrogen sulfide?) - Produced Emulsion can be refined into water, liquid hydrocarbon, and solids? I realize this is a pretty complex addition ... but maybe down the line at some point it can be added in if there is enough interest! Thanks for reading.
|
0.999765 |
Democracies have had a bad few years, but that is no reason to tout the virtues of dictatorships and authoritarianism. History shows that, when it comes to prosperity and human wellbeing, societies that defend economic and political freedom come out on top.
Imagine that you, like me, are a typical product of Western liberal democracy, and are invited to give a lecture to a group of Chinese students in Beijing or Shanghai on its benefits. Ignoring the fact that, in reality, the Chinese government would never allow such a lecture, ask yourself: What would you say?
First and foremost, it would be advisable to acknowledge that you do not speak from a position of moral superiority. Western civilization in the first half of the twentieth century was not very civilized. Human rights were trampled. Class war destroyed entire political systems. There were large-scale violent conflicts and much ethnic cleansing. Given this history, Westerners are in no position to lecture on civil liberties or humane values.
It is also worth noting that the global march toward democracy, which seemed nearly inexorable after the fall of the Berlin Wall, now seems to be reversing. According to Stanford University’s Larry Diamond, several countries that were democracies at the beginning of this century have since shifted to different systems.
Then there are the cases when the election of a leader is treated as if it somehow legitimizes the subsequent emergence of dictatorship. This has been the case in Russia, which, since President Vladimir Putin’s first electoral victory in 2000, has become a Potemkin democracy.
This year, another election, neither free nor fair, will give Putin another term in office.
Democracies depend on institutional software, not just hardware. The people who make them work accept a set of norms that often do not have to be codified. The problem comes when the people – or, worse, their leaders – refuse to adhere to democratic norms. That is what is happening today in the United States, as US President Donald Trump challenges some of the foundational rules, norms, and principles of American democracy.
He assaults the freedom of the press, implicitly encouraging supporters to attack journalists, say, by tweeting a (since-deleted) parody video of himself body-slamming a man with a CNN logo on his head. He attempts to subvert America’s system of checks and balances. And he seems to place a higher priority on advancing his family’s own commercial interests than the interests of the American people.
While some parts of America’s democratic political system – for example, the judicial check on executive authority – have proved resilient, others are breaking down. But Trump is a consequence of this breakdown, not its cause.
The real problem is that the Republican Party has, over the years, become a hollow instrument of lobbyists and extremists, and both Democrats and Republicans seem to have abandoned their commitment to governing by consensus. As a result, the constitutional brakes that America’s founders created to prevent the election of a huckster like Trump have failed. Propelled by popular discontent with rising inequality and seemingly self-dealing elites, the political system is spinning out of control.
Economic challenges, together with fears about migration, have created similar pressures in Europe, reflected in sizable support for right-wing populist parties in elections in Germany and France in the last year, as well as the rise of “illiberal democracy” in Hungary and Poland.
Countering such assaults on democracy will require political leaders to show courage and vision – as French President Emmanuel Macron has so far – in defending the values that underpin democratic governance. In the European Union, this means that leaders must not turn a blind eye to elected governments’ assault on the institutions that safeguard freedom. After all, the EU not just a customs union; it is a union of shared values. If it fails to act accordingly, it will crumble.
The bad few years that democracies have had is no reason to tout the virtues of dictatorship and authoritarianism. History shows that, when it comes to prosperity and human wellbeing, societies that defend economic and political freedom come out on top. In the 1930s, some admired Adolf Hitler’s autobahns and Benito Mussolini’s success in getting the trains to run on time. But it was clearly not worth the cost.
The same is true of China today. Yes, the country has become an economic powerhouse in recent decades. But if a system cannot survive basic dissent – from legal challenges to television parodies – can it really be as strong as its leaders claim? And if a crackdown on corruption is carried out by a corrupt dictatorship, can it really be considered legitimate?
Contrast this with India, which may have lost the economic race in the last few years, but has held together since independence, despite vast ethnic, religious, and linguistic differences – without needing to create a Bamboo Gulag. This does not mean that there is no dissent or disagreement. But, no matter how much Indians argue, they are not locking up or “disappearing” dissidents, thanks to the safety valves afforded by their democracy. No society can manage indefinitely without such mechanisms. Even Karl Marx, I think, would not have disagreed.
|
0.994007 |
We need to first identify the conceivable limits of the potential societal consequences of human-caused climate change—the best and worst outcomes that might be plausible due to our greenhouse gas emissions. These don’t have to be likely outcomes. Instead, these limits will help us capture as full a range as possible of what could happen to society. We will consider how likely different outcomes may be, to the extent that we can, in step five.
Critically, human emissions of greenhouse gases are independent of other potential warming and cooling influences on the climate system. For example, it is possible that human-caused warming could occur simultaneously with an independent cooling influence, such as a volcanic eruption, an asteroid impact, or nuclear conflict. If there were a significant cooling influence from another factor, then the warming due to our greenhouse gas emissions might conceivably help offset it. As a result, even a human-induced warming that would be highly damaging if it occurred under otherwise unchanging climate conditions might instead help keep the climate system closer to that of the 20th century.
For the best conceivable outcome let’s imagine that human-caused warming offsets what would otherwise be a catastrophic cooling of the climate system. That is, human emissions of greenhouse gases might plausibly preserve civilization as we know it by counteracting a cooling influence that would otherwise be beyond society’s capacity to handle.
While this outcome does not seem remotely likely because it depends on the co-occurrence of multiple low-probability events (e.g., an unforeseen and low-probability cooling influence that would be sufficiently large to wipe out society but not so large that human-induced warming can’t offset it), it does provide a useful limit for the best possible outcome.
The worst conceivable outcome would be for human-caused climate change to trigger the end of civilization as we know it. That is, for our greenhouse gas emissions to cause changes in climate that exceed society’s capacity to absorb.
Note that we could plausibly expand these limits even further (e.g., to include the preservation or extinction of all life on the planet) but the preservation or destruction of civilization as we know it provides a reasonable and at least somewhat intuitive set of endmembers.
|
0.989769 |
How many times has water played a part in your routine activities today? Maybe you have taken a shower, made coffee, flushed a toilet, or washed your hands. Chances are you’ve already counted on water multiple times today, and probably didn’t think twice about it.
As we count down the last few days of National Water Quality Month, I would like to elaborate on the importance of this resource, and urgency of this subject. Water is obviously a crucial resource to sustain life. Not only used for daily consumption, but also for general hygiene, recreational purposes, and as the necessary fuel to propel everyday business operations. Most energy generation sources also heavily depend on high water availability. However, water is not a limitless resource. Yet, most of us continue to take it for granted while it grows in scarcity as the world’s population booms.
Only about three percent of the world’s water supply is drinking water, and more than half of this is unavailable, locked in ice at the North and South poles. The remaining supply is distributed in surface water bodies like lakes and rivers, and in underground repositories as groundwater. According to the United Nations, 783 million people do not have access to clean water. This number is likely to worsen in the future as the demand for clean water is expected to rise 40 percent by 2030.
With water being at such high demand, and such limited availability, it is essential that proper water quality be achieved. This is most important for safety reasons, but water quality issues also pose potential liabilities of billions of dollars to businesses worldwide.
Water is key to the operations and success of many businesses in various industries, such as agriculture, oil & gas, and nuclear. It is the responsibility of these businesses to properly manage this risk, and of all the types of water-related data that companies need, measurements pertaining to water quality stand out in terms of their sheer quantity and complexity.
Existing regulations are largely limited to requiring the monitoring and reporting of the contamination of surface water bodies and groundwater by various industrial processes, spills, and other releases. However, the focus has begun to shift from compliance-based monitoring and reporting, to the scarcity and quality of drinking water supplies, and the impact that energy consumption associated with water activities has on carbon emissions. As detection technology improves and human exposure to low-level contamination is linked to more diseases, more testing will be required for ever smaller and smaller concentration levels. All of this means only more and more information that needs to be captured, stored, managed, and reported.
In order to effectively manage all the data for this critical resource, it only makes sense to use the most up-to-date technology. In this case, it comes in the form of a robust, web-based information management system that allows businesses to manage, organize, and visualize their water quality data from a single access point in near real time.
At Locus, we recognize the importance of this resource and the challenges that accompany water quality management. This is why we continue to mold our software offerings to best help organizations responsibly handle this data, and ensure positive decision making. It’s the decisions we make today that will affect the state of this precious resource in the future.
|
0.999576 |
Develop a Drag King character and explore ways to present him in a burlesque routine , to strip or not to strip , posture, movement and make up. Sarah has been mentoring drag kings for many years and has inspired many of the burlesque bois in the current scene. She often gets invited to teach group classes at regional events and is one of the nations favourite kings.
|
0.94714 |
The Kingfish reconnaissance aircraft design was the ultimate result of a series of proposals designed at Convair as a replacement for the Lockheed U-2 The Kingfish reconnaissance aircraft design was the ultimate result of a series of proposals designed at Convair as a replacement for the Lockheed U-2. "Kingfish" competed with the Lockheed A-12 for the Project Oxcart mission, and lost out to that design in 1959.
In August 1957 these studies turned to examining supersonic designs, as it was realized that supersonic aircraft were very difficult to track on radars of that era. This was due to an effect known as the blip-to-scan ratio, which refers to the "blip" generated by an aircraft on the radar display. In order to filter out random noise from the display, radar operators would turn down the amplification of the radar signal so that fleeting returns would not be bright enough to see.
Returns from real targets, like an aircraft, would become visible as multiple radar pulses all drawn onto the same location on the screen, and produced a single brighter spot. If the aircraft is moving at very high speeds, the returns would be spread out on the display. Like random noise, these returns would become invisible.
By the autumn of 1957 so many ideas had been submitted that Bissell arranged for the formation of a new advisory committee to study the concepts, led by Edwin Land under the designation Project Gusto. The committee first met in November to arrange for submissions. At their next meeting, on 23 July 1958, several submissions were studied.
Kelly Johnson of Lockheed presented the Archangel I design, which could cruise at Mach 3 for extended periods in order to take advantage of blip/scan spoofing, although it was not designed for reduced RCS. Convair proposed a parasite aircraft that was launched in the air from a newer version of the B-58 Hustler that was then being studied. The Navy introduced a submarine-launched inflatable rubber vehicle that would be lifted to altitude by a balloon, boosted to speed by rockets, and then cruise using ramjets. Johnson was asked to provide a second opinion on the Navy design, and the committee arranged to meet again shortly.
At the next meeting, in September 1958, the designs had been further refined. Johnson reported on the Navy concept and demonstrated that it would require a balloon a mile wide for launching; the submission was then dropped. Boeing presented a new design for a 190-foot (58 m) long liquid hydrogen powered inflatable design. Lockheed presented several designs; the Lockheed CL-400 Suntan looked like a scaled-up F-104 Starfighter powered by wingtip-mounted hydrogen-burning engines, the G2A was a subsonic design with a low radar cross-section, and the A-2 was a delta wing design using zip fuel-powered ramjets. Convair entered their parasite design, slightly upgraded and now intended to fly at Mach 4.
Convair's parasite design was derived from the Super Hustler concept which Convair had proposed to the Air Force. The original version had been a two-part design, the rear portion being an unmanned booster powered by a pair of ramjets, and the front portion a manned aircraft with a single ramjet. The Super Hustler could either be launched from under a B-58 bomber or from a ground trailer using a booster rocket. For the air launch, the Super Hustler would be carried to a speed of Mach 2 at 35,000 ft (11,000 m), and released. All three ramjets would fire for "boost", after which the rear portion would fall away. The unmanned booster could also be used as a weapon, if armed.
For Project Gusto, the concept had been simplified and reduced to a single aircraft. Code-named FISH or First Invisible Super Hustler, the aircraft was based on a lifting body design that bears some resemblance to the Asset of a few years later. It differed in having the nose taper down to a flat horizontal line instead of the rounded delta of the ASSET, and the fuselage was not as large at the rear. Two vertical control surfaces were placed on either side of the fuselage at the rear, and a small delta wing covered about the rear third of the aircraft. It was to be powered by two Marquardt RJ-59 ramjets during the cruise phase, providing a cruise speed of Mach 4 at 75,000 ft (23,000 m), climbing to 90,000 ft (27,000 m) as it burned off fuel. In order to handle the intense heat generated by skin friction at these speeds, the leading edges of the nose and wings were built of a new "pyroceram" ceramic material, while the rest of the fuselage was made of a honeycomb stainless steel similar to the material for the proposed XB-70 Valkyrie. After completing its mission, the aircraft would return to friendly airspace, slow, and then open intakes for two small jet engines for the return flight at subsonic speeds.
Lockheed's entry had also changed during the research phase. Their original submission was the Archangel II (A-2), another ramjet-powered design, but one that was ground-launched using large jet engines.
The committee didn't find either entry particularly interesting, and when the B-58B was canceled by the Air Force in 1959, the entire "Fish" concept was put in jeopardy. There was some design work on converting the existing A-model Hustlers as "Fish" carriers, but the aircraft appeared to have limited capabilities for launching the "Fish", and the Air Force was unwilling to part with any of their bombers anyway. The committee asked both companies to return with another round of entries powered by the Pratt & Whitney J58 turboramjet.
After cancellation of the B-58B in mid-1959, Convair turned to a completely new design, similar to their earlier entry in name only. The new "Kingfish" design had much in common with the Convair F-106 Delta Dart, using a classic delta wing layout like most of Convair's products. It differed in having two of the J58 engines buried in the rear fuselage, and twin vertical surfaces at the rear. The intakes and exhausts were arranged to reduce radar cross section, and the entire aircraft had the same sort of angular appearance as the later Lockheed F-117. The leading edges of the wings and intakes continued to use pyroceram, while other portions used a variety of materials selected for low radar reflection, including fiberglass. The new engines reduced the cruise speed to Mach 3.2 compared to the "Fish"'s Mach 4.2, but range was increased to about 3,400 nm (6,300 km).
In August 1959 the teams met again to present their latest designs. Lockheed had produced an aircraft similar to the "Kingfish", the A-11, but it was more "conventional" in layout. Although the A-11 had somewhat better performance than "Kingfish", the panel generally preferred Convair's design due to its much lower RCS. Johnson expressed skepticism of Convair's claimed RCS, and complained that they had given up performance to achieve it: "Convair have promised reduced radar cross section on an airplane the size of A-12. They are doing this, in my view, with total disregard for aerodynamics, inlet and afterburner performance."
In the end it was not performance that decided the outcome; during the U-2 project Lockheed had proven its ability to design advanced aircraft in secret, on-time, and under-budget. In contrast, Convair had massive cost overruns with the B-58 and no secure facility similar to the Skunk Works. Lockheed promised to lower the RCS in a modified version of the A-11 known as the A-12, and that sealed the deal. The A-12 entered service with the CIA in the 1960s, and was slightly modified to become the Air Force's SR-71.
Some small-scale work on the "Kingfish" continued even after the choice of the A-12, in case the A-12 ran into problems. This did not occur, and the "Kingfish" funds soon disappeared.
Ironically, the entire idea of spoofing radars through their blip/scan turned out to not work. It was soon discovered that the high-temperature exhaust was a fairly good radar reflector at certain wavelengths. Lockheed proposed adding cesium to the jet fuel to help mask this effect. Additionally, the entire idea relied on problems in the radar display systems, upgrades to these systems could render the entire concept moot. In the end, the A-12 was considered too vulnerable and was only flown over secondary nations like Vietnam. The failure of the A-12's attempts to avoid radar was proven when the Vietnamese proved able to track the A-12 with some ease, even firing on it on occasion and causing minor damage on one occasion in 1967.
1. ^ McIninch 1971, p. 2.
4. ^ Pedlow and Welzenbach 1992, p. 3.
* McIninch, Thomas. "The Oxcart Story." Studies in Intelligence Issue 15, Winter 1971 (Released: 6 May 2007). Retrieved: 10 July 2009. * Merlin, Peter W. From Archangel to Senior Crown: Design and Development of the Blackbird. Reston, Virginia: American Institute of Aeronautics and Astronautics (AIAA), 2008. ISBN 978-1-56347-933-5. * Pedlow, Gregory W. and Donald E. Welzenbach. "Chapter 6: The U-2's Intended Successor: Project Oxcart, 1956-1968." The Central Intelligence Agency and Overhead Reconnaissance: The U-2 and OXCART Programs, 1954 - 1974. Washington, DC: Central Intelligence Agency, 1992. Retrieved: 2 April 2009. * Scott, Jeff. "Convair Super Hustler, Fish & Kingfish." Aerospaceweb Question of the Week, 31 December 2006. * Suhler, Paul A. From RAINBOW to GUSTO: Stealth and the Design of the Lockheed Blackbird. Reston, VA: American Institute of Aeronautics and Astronautics, 2009. ISBN 1-60086-712-X. * "Super Hustler: A New Approach to the Manned Strategic Bombing-Reconnaissance Problem." Convair, FMZ-1200-20, 26 May 1958. * "Super Hustler SRD-17: TAC Bomber Studies." Convair. FZM-1556B, 27 April 1960.
|
0.999999 |
How long does it usually take for an autopsy report to be completed?
This often depends on the number and complexity of tests that need to be performed on bodily fluid and tissue samples taken at autopsy. Toxicology tests, microscopic analysis, and DNA testing could take weeks or even months to complete, especially if re-testing is needed. Usually, one can expect testing to take at least twelve weeks to get the results and then it can be expected for autopsy reports to be finalized soon thereafter unless there are other factors involved that cause delay.
|
0.999945 |
Why visit the Merced Grove? It's the smallest of Yosemite's three Giant Sequoia groves, with only about twenty of these venerable creatures, but it's also the least crowded. Like the Tuolumne Grove, it's downhill all the way to the grove.
Difficulty: It's a smooth, wide trail (part of it is a former road), and it's not a very long hike. You will have to climb about 600 feet (180 meters) on the way back, though. It rates a 4 out of 10, somewhere on the slippery boundary between easy and medium.
Best time to visit: The trees are fabulous any time there's daylight. You may get some bonus wildflowers in the spring. You should find big clusters of Western Azalea, one of Yosemite's most spectacular flowers, just past the last group of sequoias.
Crowd Factor: The sequoias no longer exhibit surprise at the presence of humans in their midst, regardless of how carefully you sneak up on them. Nonetheless, the Merced Grove is nowhere near so crowded as the lower Mariposa Grove.
Nearest Snacks: at Crane Flat, 3.8 miles (6 km) south. If you did bring food, there are picnic tables at the trailhead, a rarity for Yosemite's trails.
Driving Directions: The Merced Grove trailhead is off highway 120 north of Yosemite Valley. From the valley, take 120 north 13.5 miles (21 km) to the well-marked trailhead, which will be on your left. Here's a Google Street View panorama of the trailhead parking area.
Trail Notes: A little under halfway to the grove, you'll reach a fork in the trail. Turn left to proceed downhill to the grove. The intersection is clearly signed, and you'll have no problem figuring out which way to go.
Hazards: Like just about anywhere else in Yosemite, be prepared for mosquitoes.
|
0.930206 |
This paper presents an experimental code generator that performs intra-block stack scheduling for a stack-based execution model. For small test programs, 91% to 100% of redundant local variable accesses were eliminated using this compiler. Compiled intra-block stack scheduling and hand-performed global stack scheduling show that significant opportunities exist to keep temporary variable values on the expression evaluation stack when compiling conventional languages.
Efficient compilation of conventional languages to stack-based execution models has received relatively little attention. Previous work has focused on using the stack efficiently for expression evaluation (e.g., Bruno & Lassagne (1975), Couch & Hamm (1977), Miller (1987)) and performing peephole optimizations (e.g., Hayes (1986), Hand (1989)). There seems to have been little work on optimizing stack usage at the basic block level (code sequences containing no branches nor labels) or the global level (whole-procedure).
One significant advantage of register-based computation models is that register scheduling algorithms can place temporary variables in registers instead of memory-based variables to improve code efficiency. A common criticisms of stack-based execution is that variables can't be kept on the stack without a lot of wasted stack manipulation. There is data to back this up: Koopman (1989) gives dynamic instruction frequencies for Forth programs indicating approximately 1 operation in 4 is a DUP, SWAP, or other stack manipulation.
The question is, can stack-based computational models use stacks for temporary values as effectively as register-based computational models? While there are not yet any definitive answers, this paper seeks to establish a foundation for performing experiments on stack-based code generation. It does so by using an experimental stack-scheduling compiler and hand-coding techniques to optimize stack usage on several small C programs at both the basic-block level and the global level.
I have developed an experimental stack-based code generator that works as a postprocessor for the GNU C compiler (Stallman 1988). In order to compile a program, GNU C is run on the source code with optimization enabled. A dump of the intermediate code data structures (in LISP-like notation) is generated just before the register assignment pass of GNU C. The resulting dump file is used as input for the stack-based code generator. The output of the code generator is Forth source code augmented with stack comments on every line.
The results reported here are for compiling seven integer benchmark programs from the Stanford Benchmark Suite (Hennessy & Nye). Although significantly larger programs must be used to make conclusive statements about performance, these programs are sufficiently complex and varied at the basic block level to form a starting point for experimentation. The goal of my experiment was to explore the area with limited resources rather than give definitive results.
( 77 --) 77 LOCAL!
A running stack picture is maintained as the code is translated. Each instruction in the stack-code list gets a copy of the stack picture as it is before the instruction's stack effect. The stack is always empty at the end of each GNU C LISP expression.
The example expression above declares the value in register 73 to be "DEAD". This means the value is not needed in subsequent expressions. The "DEAD" attribute is captured as a pseudo-operation in the stack-code list for later use to eliminate unnecessary stores to local variables whose values are not reused.
This is a set of related steps that modifies code details to finish converting from a register-based paradigm to stack operation. Modifications include holding subroutine inputs on the stack instead of in registers, modifying condition code phrases to use stack-based comparisons, and ensuring subroutine return values are placed on the stack.
An initial pass of a peephole optimizer is used to make the code more consistent for processing in later phases. Usually very few changes take place here.
This will be presented in more detail in subsequent sections. The purpose of stack scheduling is to carry values on the stack instead of using local variables.
The stack scheduling step described in the previous section can be performed at two levels: intra-block scheduling, which will be discussed in this section; and global scheduling, which will be discussed in the next section.
Intra-block stack scheduling attempts to remove local variable fetches and stores by maintaining copies of the local variables on the stack. It designates where variables go on the stack for each instruction. The terminology is deliberately similar to "register scheduling", in which variables are assigned to registers in conventional compilers (e.g., Hennessy & Patterson (1990), pp. 113-114).
Generalized stack scheduling is a bit more difficult than register scheduling because stack depth must be uniform and consistent when control passes through branch targets from differing branch sources. For example, in an IF...ELSE...THEN construct, the IF and ELSE clauses must both leave the same temporary variables in the same locations on the stack when control transfers beyond the THEN. The simplest way to ensure that this happens is to adopt a policy of always leaving the stack empty when taking a branch. An obvious way to implement this policy is to employ stack scheduling only within basic blocks intra-block stack scheduling).
I experimented with several intra-block scheduling algorithms while performing compiler research for the Harris RTX 2000 stack CPU. All of the methods I used then were based on ad-hoc sets of transformations that seemed to work, but lacked a unifying approach. However, recent exploration of the problem from a fresh start has yielded a simple heuristic approach that seems to give excellent results.
The algorithm for intra-block stack scheduling has two parts. The first part is ranking opportunities for eliminating local variable fetches and stores. The second part is attempting to actually eliminate the local variable operations in rank order.
( 76 --) 76 LOCAL! \ b !
( 75 --) 75 LOCAL! \ a !
( 77 --) 77 LOCAL! \ c !
where the variable a is assigned to local variable 75, b is assigned to 76, and c is assigned to 77. Note that because of data dependencies, rearrangement of the assignments can't remove the need to keep a temporary copy of the value of a in b for computation of the new value of c. Nevertheless, there is an opportunity to perform stack scheduling on local variables 75 and 76 because they are each used multiple times as operands in the computation.
Variable 76 is reused immediately after it is stored, with a distance measure of 1. Variable 76 is reused again with a single intervening instruction, giving a distance measure of 2. Variable 75 is reused with a distance measure of 2 as well.
After distances are measured, candidates for stack scheduling (use/reuse pairs) are ranked in order of ascending distance. Thus, the algorithm considers nearest pairs before more distant pairs. I chose this ranking method so that nested uses of values on the stack would be scheduled optimally (from the inner usages out).
For each pair of use/reuse stack operations, the following procedure is applied. The register of interest must be able to be copied to the bottom of the stack using: DUP, TUCK, UNDER, or TUCK_2 (see Appendix), otherwise the scheduler moves on to the next use/reuse pair. Also, the stack depth at the reuse instruction must also be 2 or less (so that the register of interest can be brought from its new position on the bottom of the stack to the top with a SWAP or ROT if necessary). If both of these conditions hold, a DUP, TUCK, UNDER, or TUCK_2 instruction is inserted before the "use" instruction to copy the value to the bottom of the stack, and the LOCAL@ instruction at the "reuse" point is replaced with a NOP, SWAP, or ROT as appropriate.
The idea behind the stack scheduling algorithm is to copy a value to the bottom of the stack at the use point, update the stack pictures of the instructions between the use and reuse points, and move the value back to the top of the stack at the reuse point. As successive use/reuse pairs with longer distance measures are scheduled, their values tend to go under the existing scheduled values on the stack.
Access is limited to only the top 3 stack elements at use/reuse points. My previous experience indicates arbitrary-depth PICKs generate poor code because of subsequent DROP operations required to eliminate dead values. Also, many stack CPUs pay performance penalties for deep stack accesses. Note that the stack itself may get deeper than three elements (the small programs I compiled used up to 8 stack elements); it is just access to the stack that is limited to the top 3 values.
( 76 76 --) 76 LOCAL!
( 75 --) 75 LOCAL!
( 77 --) 77 LOCAL!
( 76 75 --) 75 LOCAL!
( 77 --) 77 LOCAL!
Note that since the fetch of local variable 76 was eliminated, the DEAD annotation migrates to the previous variable 76 reference. This shows that the store of local variable 76 is in fact unnecessary (because variable b is only a temporary holding variable).
( 75 76 75 --) 75 LOCAL!
( 76 75 75 --) 75 LOCAL!
The resultant code now has 4 local variable references instead of the original 8 and is two instructions shorter. Further reduction is not possible if we assume that the example is a complete basic code block, because the stack must be empty at the start and end of the block.
Note that there are only two stack operations in this code sequence, and both of them (the UNDER and the DUP) could be combined with other operations to form new primitives: UNDER_+ and DUP_LOCAL! . Both these primitives are typically found on stack-based CPUs. In general this code generation process results in very little wasted manipulating of the stack.
It is well known that basic blocks in C programs tend to be rather short. This limits the effectiveness of intra-block stack scheduling. However, within the single-block constraints my stack scheduling algorithm tends to produce fairly good code. The code is not necessarily the same as that which would be produced by a human programmer, but is usually very close in efficiency (measured by use of the stack instead of local variables). One reason for the difference between generated code and human-written code is that human programmers typically don't attempt to arrange instructions for stack/operation compound instruction creation, whereas my stack scheduling algorithm does.
One way of measuring the success of intra-block scheduling is by counting the number of "reuse" LOCAL@ instructions that were successfully removed by the algorithm as a percentage of all redundant (reuse) LOCAL@ instructions (Figure 1). The results indicate that the algorithm was highly successful, removing between 91% and 100% of all redundant LOCAL@ instructions.
Surprisingly, deep accesses to the stack were not needed to achieve excellent intra-block scheduling results. ROT was the deepest stack movement operation required, and PICK_2 was the deepest stack element copying operation needed (and neither of these were needed often).
Of course, Figure 1 does not tell the whole story. In determining how well intra-block scheduling does, it is important to look at the total number of local variable accesses. Figure 2 shows the number of local variable loads and stores in each program with no scheduling, intra-block scheduling, and global scheduling (discussed in the next section). While intra-block scheduling removes many of the local variable references, many remain because of variable lifetimes that cross basic block boundaries.
Figure 2. The number of local variable instructions in the compiled code reduces dramatically with stack scheduling.
Intra-block scheduling has definite limitations. In particular, it is not possible to eliminate local variables whose lifetimes cross basic block boundaries. In order to assess how much these restrictions affected code generation, I hand-generated code using global analysis.
The hand-generated code starting point was the output of the intra-block stack scheduling compiler. I selected variables to keep on the stack using the distance metric across basic block boundaries. In general I was as aggressive as possible in using the stack consistent with keeping accesses to the stack to the top three elements.
Figure 2 shows that global optimization removed many local variable references beyond those removed by intra-block optimization. For most programs, nearly all references were removed. However, portions of QUEENS and QUICK proved to have too many active values to juggle on the stack. This is not to say that these two algorithms can't be written using entirely stack-resident variables, but rather that the C programs as written in the Stanford Integer Benchmark Suite are difficult to stack-schedule. Although it wasn't entirely successful in eliminating the need for local variables, global scheduling showed significantly improved performance over intra-block scheduling.
I have not created a unified methodology from my experience of hand-performing global stack scheduling -- I just used ad-hoc techniques as necessary. Nonetheless the experience of optimizing several programs in this manner leads to some observations about how a formal methodology might be created.
Keeping loop indices on the Forth Return Stack is a significant advantage. Also, it is usually fruitful to keep one or sometimes two (but not more) frequently used variables resident on the stack for the entire duration of a loop instead of in local variables. Sometimes placing a dummy value onto the Data Stack in one part of an IF...ELSE...THEN leads to significant simplification of stack manipulation in the other part.
The algorithm have I developed for intra-block stack scheduling seems to be quite effective, eliminating 91% to 100% of redundant local variable accesses within basic blocks for the small programs studied. Hand-performed global optimization results indicate that significantly better stack scheduling can be done if variables are kept on the stack across basic block boundaries. Global optimization for stack scheduling is still an ad-hoc process. While stack scheduling can eliminate most local variable references, some programs with large numbers of variables are still difficult to stack-schedule.
The stack scheduler uses primitives not found in many Forth systems. LOCAL@ and LOCAL! are local variable fetch and store operations that take a numeric input (which probably represents an offset into an activation frame) as the "name" of a local variable to be fetched and stored. The following definitions show the behavior of non-standard words discussed. The reader should understand that the intent is for these operations to be provided as quick primitives, not high-level operations.
|
0.999937 |
Teach your dog an important new rule: From now on, he is only touched and petted when he is either sitting or lying down. You won't need to ask him to sit; in fact, you should not. Just keeping him tethered near you so there isn't much to do but stand, be ignored, or settle, and wait until sit happens.
He may pester you a bit, but be stoic and unresponsive. Starting now, when you are sitting down, a sitting dog is the only one you see and pay attention to. He will eventually sit, and as he does, attach the word "sit"—but don't be too excited or he'll jump right back up. Now mark with your positive sound that promises something good, then reward him with a slow, quiet, settling pet.
Training requires consistent reinforcement. Ask others to also wait until your dog is sitting and calm to touch him, and he will associate being petted with being relaxed. Be sure you train your dog to associate everyone's touch with quiet bonding.
|
0.999952 |
Jason Mraz is On Tour!
Jason Mraz (born June 23, 1977) is an American singer-songwriter, born and raised in Mechanicsville, Virginia. Mraz's stylistic influences include reggae, pop, rock, folk, jazz, and hip hop.
Mraz released his debut album, Waiting for My Rocket to Come, which contained the hit single "The Remedy (I Won't Worry)", in 2002 but it was not until the release of his second album, Mr. A-Z that Mraz achieved commercial success. The album peaked at number five on the Billboard Hot 200 and sold over one hundred thousand copies in the US. In 2008, Mraz released his third studio album, We Sing. We Dance. We Steal Things.. The album debuted at number three on the Billboard 200 was a commercial success worldwide, peaking in the top ten of many international charts.
|
0.940209 |
How safe is the money on the deposit account?
Within the European Union (EU) there is a statutory deposit guarantee of 100,000 euros per customer and bank. That is, regardless of the seat of the bank (within the EU), your funds are protected up to this level. If you want to invest larger amounts and spread the risk, it is advisable to split the whole and to conclude several contracts with different banks.
What costs do I have to pay for the deposit?
None, you can firmly plan and calculate the respective interest income and the return on your investment. Only then, if you want to get out early, the bank will charge already paid interest. In this case, many institutes are now showing their approval, at least they guarantee the full payment of the deposited amount. Because under the law, they are free to charge administration fees or additional cancellation fees in the case. And their height is not clearly defined. If you cancel for "important reason", for example as heir or in case of unemployment (Hartz IV), the bank must pay out the capital without notice.
What is the difference between term money and time deposit?
Time deposit is effectively a time deposit, provided that a term and at least a one-month notice period are agreed. The due date has been agreed exactly, will not be canceled in time, the whole thing is prolonged. This means that the investment will continue at the current interest rate. Or it is continued as a classic sight deposit, so it can be ordered daily without observing a notice period. However, this must be differentiated from so-called termination funds. Here, a certain period of notice applies, after which time the capital can be fully disbursed. Until then, it will bear variable interest and will have no maturity, ie unlimited duration. Only then is a fixed rate often agreed.
What tax special features should be considered when making a deposit?
Basically, there are two ways in which interest can be paid out on time deposits. Either "at the end of the year" or "at the end of the term" is paid. The final withholding tax is then always based on the respective interest income. The decisive factor is solely when this interest payment takes place. While you can use the full effect of the saver's lump sum for annual interest payments (801 euro singles / 1,602 euro joint assessment), the second option results in a higher tax burden at one go. Because this saver lump sum can not be stretched over the years – only in the year, what is covered, also be considered. Therefore, it is not recommended, especially for larger amounts and long maturities, to choose the variant with the interest payment at maturity. Because even from the compound interest effect you have nothing in the case.
For which period do I have to invest the money?
The investment period for your money varies considerably among banks. In general, however, it can be said that an investment period of at least 30 days is required. In these steps is also expected to continue: so are often fixed investment periods of 60, 90, 180 or a maximum of 360 days. With a longer term, interest income usually increases as well. For time deposit accounts, such periods are common, with day money accounts they are usually omitted, since you can not invest the money here, but can access it flexibly on a daily basis.
When am I affected by interest rate fluctuations?
In general, you are affected by interest rate fluctuations only with a money market account. These interest rate fluctuations depend on the current market interest rate. To cushion the fluctuations, at least in part, some credit institutions offer fixed interest rates for a certain period of time.
With time deposit accounts, you are disposed to worry about interest rate fluctuations. Because here the interest rates are set from the beginning. When concluding a time deposit account, you usually know very well what interest income you can expect. So pay close attention to how interest rates develop. It's best to talk to an independent, knowledgeable advisor.
Fixing a fixed rate or general guidelines is difficult. Their interest rates always depend on the sum of the deposits as well as the duration of the investment. The differences between the individual providers are large, so that a comparison of the offered conditions in any case worthwhile. In any case, direct banks will keep their interest rates slightly higher than most retail banks do.
How much do I have to invest at least?
The amount necessary to open a time deposit account varies from bank to bank. Especially with time deposit accounts, you should expect higher investment amounts. As a minimum amount, a few banks require deposits of € 2,500, but on average this amount will be higher.
|
0.977811 |
:param text: The text to return.
:param code: The status code of the response.
:param headers: Any optional headers.
:return: A new :class:`werkzeug.wrappers.Response` representing the HTML.
:return: A new :class:`werkzeug.wrappers.Response` representing the text.
:param data: The data to encode.
:param json_encoder: The encoder class to use to encode.
:return: A new :class:`werkzeug.wrappers.Response` representing the JSON.
Wrap up a response, if applicable.
This allows Flask-like `return "whatever"`.
:param args: The arguments that are being wrapped.
:param response_class: The Response class that is being used.
# Return a 204 NO CONTENT.
# We enforce ``tuple`` here instead of any iterable.
# Only body, use 200 for the response code.
# Body and status code.
# Body, status code, and headers.
# Return the bare response, unmodified.
# Otherwise, wrap it in a response.
|
0.999893 |
Develop a "thick skin" and learn how to distinguish between useful and useless criticism.
Responding to your own or someone else's writing is a complex, subjective process. Evaluating your work, your peers' work, and published writing can be extraordinarily difficult. Unlike a math question that has a single correct answer, the criteria for excellence in writing vary according to your communication situation.
What constitutes excellence depends in large part on the writer's audience, purpose, voice, and media. For example, you would use different standards to judge the success of an editorial on the plight of the homeless, a love letter, or a final exam essay for a course on economic theory. Plus, sometimes a document has many problems and you need to be careful that you prioritize your critique, emphasizing major problems with logic and content development, for example, rather than sentence-level issues.
Because the criteria that readers will use to evaluate your work shift according to changes in your communication situation, no ideal standards of excellence can be defined. As a result, your instructors cannot provide you with prose models or formulas that will help you write in all situations. There are no perfect essays that you can mimic.
The process of evaluating manuscripts is doubly complicated by the subjective nature of reading and interpretation. As you have probably noticed when you share your work with teachers and friends, different readers often draw conflicting conclusions about a text's purpose or quality. (Editors of professional journals and magazines often ask three critics to examine a manuscript for publication because they need a third vote to break the tie.) For example, a reader who likes the persona that you project in your prose and who agrees with your opinion on the subject may look for the best in your papers, whereas a reader who disagrees with your thesis or who finds your tone in an essay to be pedantic or condescending may be more inclined to note places where you have failed to provide sufficient evidence. If your ideas are based on theories that your readers hold as self-evident truths, then those readers are likely to think of you as remarkably commonsensical. In turn, readers who have a different theoretical base may be more inclined to dismiss you and your work as misguided.
Regardless of whether they use the input of others before writing, all serious writers share their drafts and completed products with critics. For most writers, accepting criticism is a way of life. Seasoned writers learn to appreciate tough criticism because they know a thorough evaluation means that they are being treated with professional respect.
At first, you may find it painful to receive criticisms of your manuscripts from your peers or instructor, but with practice you will learn what every writer knows: You can develop more original ideas and produce more effective documents by sharing your work with others. With practice, you will learn not to be emotionally distressed by what may seem to be unkind remarks. Remember that constructive criticism is not a personal attack even though it may seem that way when you first hear it. Instead of immediately dismissing people's suggestions or trying to argue with them, thank your readers for being honest and conscientious enough to seriously evaluate your work. With even more practice, you will learn to respond to and benefit from tough criticism.
Of course, sometimes you will need to reject a reviewer's comments. Though well intended, some people just miss the mark when reviewing your work, and others are so overly critical that you are too overwhelmed and defensive to consider their comments seriously. While you should always contemplate the advice of your critics, you need not agree with all of their comments.
|
0.984996 |
Steps on how to hide and view the icons in the Windows notification area The notification area (also referred to as the system tray) contains. Taskbar Hide is a program that as well as being able to hide the tab where you can hide or show any number of icons in the system tray. The notification area is a part of the taskbar that provides a temporary Hide an icon: Drag the icon in the notification area, and then drop it.
So I want to be able to minimize a program, then turn the icon for it on the taskbar invisible(for lack of a better word) but still have the program. The invisible program icon is now pinned to the taskbar. As of the April update, Windows 10 is now able hide windows from view. Hide windows program or Close it. Hide icons from the system tray. Modify application windows order on taskbar. Set any program window stay on top. Minimize.
Remove Application Icons From the Task Bar Windows: Show or Hide Icons in the Taskbar · Windows: Remove Icons From the Notification Area (System Tray). In Windows 7 and 8, you could customize icons in the “system tray” to permanently show on the taskbar, or hide them away in the pop-up. From the new system tray customization menu, click "Turn system icons on or off" to disable some of the icons that Windows itself has added to.
|
0.990565 |
Do refugees have a choice in Israel's continued policy of transferring African arrivals to third countries?
Kampala, Uganda - The sky was still an inky black when the flight from Cairo touched down at Entebbe Airport near Kampala, the capital of Uganda, one morning in mid-January, the fluorescent glow spilling from the small terminal providing the only source of light.
It had been 15 hours since Musgun Gebar left Tel Aviv, and the journey staggered him in its brevity. Four years earlier, when he had travelled the other way - from Eritrea in East Africa to Israel - he had done so on foot, a punishing journey across the Sahara and the Sinai that took more than a month.
Kidnappers stalked the route, food was scarce, and half of the people with whom he had travelled didn't survive. But this time, he simply sat down in a small cushioned seat and waited, snapping selfies and eating salty meals from aluminum tins until, suddenly, he had arrived.
Gebar had no visa to enter Uganda. He wasn't carrying an invitation letter or an application form. In fact, he didn't even have a passport. Though he had crossed many borders in his life, he had never done it through the official channel of queues and customs officials and dated stamps.
He only carried $3,500 in clean, hundred dollar bills in his wallet, a temporary travel document called a "laissez passer", and a creased letter from the Israeli government. "Passengers are asked to follow instructions and regulations to ensure a safe and pleasant departure from Israel," it read, with a signature from the Voluntary Departures Unit.
From friends who had come before him, Gebar already knew what would happen next. The man emerged as he stepped inside the terminal, wordlessly ushering him and the nine other Eritreans on the flight away from the passport control line.
Without a glance from the border patrol officers, he led them around the queue, to the baggage claim where their luggage awaited, and then out of the airport's sliding-glass doors. In the car park, a van waited to drive them to a hotel.
After that, they were on their own.
Human rights organisations have reported that over the past three years this scene has played out hundreds of times in Uganda and neighbouring Rwanda, where more than 3,000 Sudanese and Eritrean asylum seekers from Israel have been "voluntarily" resettled as of 2015.
Often, those who were resettled dispute whether they truly had a choice.
Gebar, for instance, says that he was being held in an immigration detention camp in the Negev Desert called Holot, when, he claims, officials there informed him that he had three options. If he liked, he could stay indefinitely in the camp. A second option was to go back to Eritrea, the country he had fled five years before. Or, he could agree to take $3,500 and depart for a third country of the Israeli government's choosing.
Gebar didn't hesitate. He took the third option.
Andie Lambe, executive director of the International Refugee Rights Initiative (IRRI), an NGO that has conducted extensive research into the departure of East African refugees from Israel, also questions just how much choice these refugees have.
"What does it mean when an unknown third country is someone's best option?" he asks. "To me that says they never really had a choice at all."
Media reports suggest that the three countries have cut a secret, high-level deal in which the African states accept refugees in return for arms, military training and other aid from Israel.
The countries involved have given conflicting responses, however, on their involvement.
Sabine Haddad, Israeli population and immigration authority spokeswoman, told Al Jazeera that Israel does have an agreement with two African countries - which she did not name - for the relocation of unwanted asylum seekers. She did not offer a response regarding the weapons exchange part of the agreement.
Both Uganda and Rwanda, on the other hand, deny they have signed any agreement with Israel. Furthermore, neither country has afforded refugee status to any refugees arriving from Israel.
Ugandan government spokesman Ofwono Opondo told Al Jazeera earlier this year that the reports of a deal were "a rumour circulated by Israeli intelligence".
"I have disputed that we have received these individuals," he said.
Like others around the world, refugees leaving Israel for Rwanda and Uganda find themselves in a precarious position. Their lives straddle two countries, and movement either forwards or backward is nearly impossible.
Tedros Abrahe, an Eritrean midwife who also left Israel under the "voluntary departures" programme earlier this year, says he is "just waiting to be a legal refugee somewhere".
Like most of the estimated 5,000 Eritreans who flee their country each month, Abrahe first left home in 2011 to escape the country's mandatory and indefinite national service programme. After a brief stay in Sudan, he paid smugglers $3,000 to take him to Israel, where he figured opportunities would be better and life easier.
But when he arrived, he found that his Eritrean midwifery qualifications were not recognised in Israel, and that the only work available to him as an asylum seeker was an under-the-table job cleaning the kitchen of a Tel Aviv shawarma restaurant.
Israel did not consider him a refugee. Rather, like nearly all of the approximately 42,000Eritrean and Sudanese refugees in Israel, he was labelled an "infiltrator" - a labelpreviously used to categorise Palestinians entering Israel. The only status Abrahe was allowed was a permit granting him temporary reprieve from being deported, which, he says, he had to renew in person every 60 days.
This system, says Anat Ovadia-Rosner, a spokeswoman for Israeli NGO Hotline for Refugees and Migrants, "puts people in a perpetual limbo, without the right to healthcare, to welfare services, to anything that might help them build a permanent life here".
She thinks that "the whole structure is meant to make people's lives miserable, so eventually, perhaps, they won't want to stay any more".
Between 2009 and 2016, Israel grantedofficial refugee status to 0.07 percent of all its Sudanese and Eritrean asylum seekers - a total of four people.
When, in late 2015, Abrahe went to refresh his Israeli permit, he was informed that it would not be renewed. Instead, he says, he was told that he had 30 days to either report to an immigration detention centre or leave the country for Eritrea or a location of the government's choosing.
Believing that he would not be safe in Eritrea, Abrahe chose the latter option.
By the time he boarded a flight for East Africa in January 2016, thousands of Eritrean and Sudanese refugees had already followed the same path.
According to Interior Minister Gilad Erdan, the voluntary resettlement plan had "encourage[d] infiltrators to leave the borders of the state of Israel honourably and safely".
But just how safe is it really?
According to research by Hotline and IRRI in Rwanda, most of the refugees who arrive in Rwanda are immediately smuggled over the border to Uganda.
Abrahe says that he spent just two days in the country - waiting in a house near Kigali under an armed guard - before being forcibly taken to Kampala.
Those arriving in Uganda are not afforded any further rights. Uganda's Department of Refugees says there is no deal to accept refugees coming from Israel. Douglas Asiimwe, the department's principal protection officer, told Al Jazeera that any refugees arriving from Israel were assessed on the individual merits of their cases.
They shouldn't need Uganda's protection, he explained, because they weren't coming from a war zone, but from a "safe" country that had promised under international law to uphold the rights of refugees.
Haddad, the Israeli population and immigration spokeswoman, insists that Israel "ensures that the process of relocation is conducted according to the agreements and in line with international law".
In her statement to Al Jazeera, she wrote: "Israel makes certain that the refugees are accorded all relevant rights in accordance with the agreements, including receiving the appropriate permits and papers."
But NGOs and human rights lawyers who have reviewed the refugees' cases in both Israel and Uganda say that Israel's official line on the subject is not true.
In late 2015, a coalition of NGOs and human rights lawyers challenged the legality of Israel's third-country deportations before the Israeli Supreme Court. But a decision is still pending and Israel's "voluntary departures" continue.
Even without legal status, life in Kampala was initially a marked improvement over Israel for both Gebar and Abrahe.
Ugandans were more welcoming than Israelis, they said, and the two melted easily into the city's large Eritrean population.
Abrahe had spent some of the money the Israeli government gave him on an iPhone, which he used to send smiling selfies to family and friends in Eritrea, Israel, and Europe.
But the $3,500 wouldn't last forever, and there were few jobs to be had in Uganda, even for someone with medical training like Abrahe. By September, both men had run out of money and were living on handouts from friends and family.
"Time just passes itself," Gebar said. "You just sit home all day waiting, doing nothing."
In late October, however, Abrahe decided that he couldn't wait any longer. He borrowed a passport from a Ugandan friend and flew to Turkey. From there, he made the dangerous journey by boat to Greece, where he is now living in a refugee camp.
"It's better to take a risk than to live this way for my whole life," he says. "This year, I want to be a legal person somewhere."
Ryan Lenora Brown was a fellow of the International Women's Media Foundation in Uganda.
Love spell caster help me bring back my wife..
Situation with refugees isn't very good. As for me - I understand those people, most of them want to save their families. Thanks for your informative post. I get to see more interesting articles from you in future. Don't waste your time on doing boring paperwork - assist it to professionals at custom-paper-writing.org and feel no responsibilities.
|
0.999861 |
Nope, I haven't forgotten. Though I'm probably writing to myself, I'd like to update the blog more than not at all! It's been busy with a wife, 4 kids now, two jobs, a house and family, so give me a break! I haven't been on top of my finances as much as I should be, so perhaps the blog will help again. Talk to me soon!
When choosing high risk home insurance, you'll want to make sure you pick a product that will adequately cover you and your belongings. While this might sound simple enough, here are some tips to ensure you get the protection you need.
The first step in picking a new insurance policy is to think logically about how you search for one. There are many ways you can locate top-quality products these days, so it is important to do your homework and find as many as you can - this way, you can be confident you're getting the best deal available.
You no longer have to settle for insurance from one of leading providers, as you can gain access to many smaller companies that might offer you just as good - or even better - protection by conducting a thorough search. The internet is a great place to start looking, and there are many online comparison sites that can put the latest deals right into your lap - so it is easier than ever to find a huge range of products.
Having access to a large selection of insurance options will definitely help you in finding the right protection; however, the only way to ensure it is the right product for you is by carefully thinking about what you need to be included in the premium.
With high risk insurance, you'll no doubt have a list of expensive items that you wish to put under more secure protection than other objects. These include prestige vehicles, valuable jewellery, one-off pieces of art and other assets.
It is important to think of everything precious that you own and include this when filling out insurance forms, so that the quote you receive is completely accurate to what you need protecting. You don't want to find that you've forgotten about something, and when this is added to your cover, it takes your monthly costs up significantly.
There are lots of things to consider when taking out high value protection, such as weighing up the cost of the product against a larger excess, but it is vital that you take everything into account. Make sure that as well as looking at the overall monthly premium, you think about what benefits you may require most.
What's more, while you might prioritize points such as how much you will be covered if all your precious items get stolen, it is also important to pay attention to other factors, including whether you'll be protected against legal costs, employer liability cover (if you hire in-house staff) or investment property protection.
Before you sign up to any insurance policy, you must read the small print. You won't wish to commit to a provider, only to find out that they don’t full fill what you expected of them when you really need it.
You don't want to find any hidden clauses that mean they won't cover you for certain reasons - but if you do, at least you'll know before signing on the dotted line. If you fail to read all the details of the policy thoroughly, you might end up realizing your most precious items aren't protected when it's far too late!
Know your interest rates. A surprising number of people do not know what interest rates they pay on their credit cards, student loans, money market accounts, and home loans. Interest rates aren't just arbitrary statistics that only matter to banks, they determine how much money you pay to your lender. A high interest rate on your credit card or home load means more of your monthly payment is going toward the bank's pockets. Conversely, a high interest rate on a savings account means you're saving more money. Know your interest rates so that you can look for financial institutions that offer the best deals.
If you invest in stocks, make sure you diversify your portfolio. Many inexperienced and first-time investors throw their money at big name blue chip stocks that may not carry the best risk/reward balance. Especially in this rocky economy, when the market seems to be fluctuating without rhyme or reason, it's important to balance out your investments so that you don't lose everything because of a big hit to a certain industry. Spread your money across multiple industries, and don't scoff at small stocks. Sometimes they can pay the best dividends.
Purchase life insurance. Term life insurance is relatively affordable and will give you peace of mind that your family is taken care of in the event of the unthinkable. Life insurance plans will also frequently offer you additional coverage on things like flight insurance, credit life insurance, mortgage life insurance and others.
These are rough times for the American economy, but there are still practical financial steps you can take to assure yourself of a retirement nest egg and a solid future. Start by assessing your interest rates, investing maturely, and protecting your family with life insurance.
Not many people still have actual piggy banks and I'm not sure why. Not only is it kitsch and fun, it really is a good way to save money. Change isn't regarded the way it used to be. Quarters are the new pennies. In fact, if it weren't for laundry and parking meters it's unlikely we would even use change at all. All the more reason to squirrel that money away into a piggy bank. Let's say you're able to save $5 a week in change. That adds up to a handsome $20 a month that you could easily hedge away into a savings account and watch grow with literal interest. Bank of America took all the fun out of this with their 'keep the change' rigamarole, but maybe they were onto something.
Don't throw away anything except garbage (and even that can be used for a composting worm farm if you really want to get DIY). Cartons, containers, rags, sponges, bags, linens, and jars can all be put to good re-use, eating into ancillary shopping costs. And speaking of eating, cut back on over-consumption. Only put one slice of cheese on your sandwich, stick to just one bowl of cereal for breakfast—and don't use three times the amount of shampoo you actually need to wash your hair. A little bit of frugality and common sense will go a long way toward cutting costs.
Every time you curse you've got to throw in a buck. And, just to make it more relevant to the times, let's go ahead and say that every time you log in to Facebook you've got to throw in a buck as well. That money's going to add up quick and before you know it you've got another savings account, grown simply from your addiction to swear words and social networking.
No matter how much you can't stand people at the grocery store who hold up the entire line with their endless Rolodex of coupons, the fact is if you use them efficiently, coupons can save you a lot of money. However, if you positively can't bear to become 'one of those people', newer services like Groupon and Living Social recreate the coupon experience for the digital age.
There's no end to the advice you can find about saving money and cutting costs, but a lot of it is just a dressed up way to keep you buying stuff. The best way to save money is to do what our grandparents did and count the pennies. We're not in an actual Depression yet, but that doesn't mean we can't act like it.
The cost of owning a cell phone is exceptionally high when compared to other items that we use on a regular basis. In fact, most cell phone bills exceed monthly utility bills. However, the cost of owning a cell phone isn't usually enough to deter everyone from having one. Instead, they just find ways to afford the smartphone of their dreams – even if it means picking up a few extra hours at work.
Many people lose out on receiving discounts on their phones simply because they never ask. If you feel that your cell phone bill is too high, call your service provider. You may find that you are eligible for discounted plans or other services that could reduce your cell phone bill by 15 to 50 percent.
One of the biggest expenses of a cell phone, is the plan the service provider provides itself. Contracts with service providers are often expensive and binding, and charge outrageous fees if you were to ever need to break your contract. To avoid high monthly fees or expensive contracts, consider getting a prepaid phone. Prepaid phones these days are as high-tech as many contracted phones, and are much more affordable.
Apps make owning a cell phone fun, but they can also quickly run up your bill – especially if you've got kids on your plan. While each app may only cost a couple of bucks, downloading multiples can quickly add $20 to your cell phone bill. To avoid having extra high charges to your already high bill, set a budget for your monthly app purchases.
These days, it seems nearly impossible to get by without your cell phone. However, many would be more than happy to get by with a cheaper monthly bill. Be smart when using your phone, and always make sure to look over your monthly bill for accidental charges. Doing so will not only allow you to fully enjoy your cell phone, but it will also keep a few extra bucks in your pocket for savings.
For most bills we get, there’s an accompanying statement. Whether it’s a check at the restaurant, a cell phone bill, or a tuition bill; most will have an accompanying breakdown of charges. Sometimes we read these bills over to check them, when we know exactly how the breakdown should look, but rarely do we exert the same diligence when the situation is reversed.
Restaurant checks and cell phone bills are a case in point. When my wife and I go out to eat, even if it’s just the two of us, I almost invariable glance over the tab before adding a tip and signing my name at the bottom. I check to make sure that each of our entrees are listed, that our drinks are there, if there were any, and that nothing extra has been tacked on. That last point is the most important, because it’s the only reason most people read through their bills – to make sure that they are not being overcharged.
It’s the same thing with my cell phone bill, although I look over the statement less frequently because I never remember every call I made that month. Without a recollection of the details, I’ve always figured, why bother looking the bill over? After all, there’s no way to double-check the phone company’s records if I don’t know what I’m looking for in the first place. As a result, I only find myself looking over phone bills when the total balance seems unusually high. Maybe there will be some suspicious and random long-distance call, which I can then use a reverse phone lookup to track. Or maybe I simply failed to pay the full balance last month.
But there’s something to be gained from looking at a statement even when the bill looks right, and when there’s no suspicious long distance calls, and when there’s no remaining balance from the previous month. You probably know what I’m getting at here.
It's about that time of the month to break out the aspirin and calculator, and crunch the numbers. I was actually quite satisfied with the first net worth calculator in about two years. I thought it would've been worse. In the past two years, we bought a house, had about two children, and put a lot of money into the house. But it seems the value of the house is really helping out. You can see a detailed view by clicking on the picture on the left.
Liquid Assests: We could improve on savings verses spending on unnecessary items, but it feels good to be a little safe and spend a little more. But overall we've done a decent job of preserving our emergency fund cash supply. Unfortunately our cash is only earning under 2%. I've been very lazy with the finances in the past couple of years. I think I could've done a better job with that money.
Retirement: I have a 401K that I contribute 6% of my before tax salary. Unfortunately, my company is going through hard times and isn't matching any of it at this time. We also have a ROTH and Traditional IRA that we've made small and regular contributions to on an annual basis. But since the market hasn't been doing well for the past year or two, it's been reflected in all of the retirement funds.
Immediate Liabilities and Long Term Debt: Most of the credit card debt is our new furnace and central air. That part of the debt is interest deferred for the time being. The other part is a combination of necessary and unnecessary spending on our main credit card. I received our tax refund today, it's going to that today.
About a year after we bought our house, we took advantage of the low mortgage rates and went from a 6% to 5%, helping us out with tens of thousands of dollars in interest. We make little payments towards our principle with reward money from our credit card. That pretty much sums it up. Next I'd like to write up a post comparing out very first net worth 4 years ago, to today's. Climbing the financial ladder, slowly but surely.
Good thing I wasn't at work on Friday. Our company dropped the axe yesterday. 175 people in the I.T. department alone. Many people who I knew and worked with lost their job and were laid off. Some people that have been with the company for over 40 years. It looks like they went after the people with the higher range salaries. Time to update the resume and make sure I have an escape plan myself. What to do when you're laid off? Here are"30+ websites to visit when you're laid off."
What? You want to save me money?
About two years ago when we moved into our new home, we signed up for cable TV, cable internet and voice over IP. The cable co. was offering all 3 services for $99 per month for a year, which is a pretty decent deal. I was able to squeeze one more year out of them by trying to cancel my voice over IP service. We don't really use our land line phone since we already have two cell phones that we use and pay for.
I recently canceled the VOIP, and was now paying regular price for all of the services which comes to about $130 per month. I was pretty bummed. That's an extra $360 per year. Until one day, well several days actually of getting calls from a strange phone number. I actually picked up one day and found it was cable company offering the 3 package deal again for $99 per month.
It's really been over 4 years since I started this blog?! I suppose it doesn't really mean much since I only updated it on a regular basis for a little over a year and a half after it was started. But, we're still making and spending money, so I guess we still have much to write about.
My wife and I are still with the same companies in the same positions. We still live in our house we recently purchased in mid 2008. The big addition to our family occurred 4 months ago today, with the arrival of our daughter. It seems we've become a typical middle class American family. A marriage, house, two children and a dog. Oh, and a picket fence in the backyard.
My wife has been on maternity and family leave for the past 4.5 months, so we haven't been saving any money. In fact, we're losing ground on the savings front. We've built up a good amount of credit card debt in the past year, but that includes a new furnace and central air unit. I've been doing our taxes for past 2 years using turbo tax, and it seems this is a good year. Last year we had to pay almost 3k between federal and state. Most likely due to my wife's job not taking enough out. They got hit by the feds for all kinds of tax violations last year.
We're looking to get a little over 5k this year. That return is much needed! Our net worth has been stagnate for the past year and a half or so. Hm, I think that's most of the more important financial info for now. I'll have to calculate our current net worth soon, but I'm afraid to do it. Adios for now.
|
0.966777 |
of the S+P500, Nasdaq 100, Russel 2000 or Dow Jones!?
I really mean a REAL realtime calculation that comes with the feed of a Data Vendor!!
Unfortunately, these indexes are under license from the respective owners of the index. Some of our customers have made their own re-production of the indexes on their own based on the streaming data, but I don't think you will find a data provider that will do it due to the licensing restrictions. In addition, keeping up with the weighting of the various stocks in the indexes may well be more than a data vendor would want to take on. These formulas are often proprietary specifically so people can't reproduce the actual index value easily. The data for these indexes are actually not created by the data vendors, thus the timing of the updates are out of the data vendors control.
Calculated indexes /stats /market breadth indicators are usually value-add symbols that individual data vendors create (Tick, Trin, SP-Premium, etc) and in these cases the update intervals are up to the vendor (and are calculated more frequently by DTN than most others I might add).
Is anyone aware of a commercial tool to reproduce them?
|
0.999998 |
Find the value(s) of x such that 8xy - 12y + 2x - 3 = 0 is true for all values of y.
Given that "true for all values of y" take y as 1.
For 8xy - 12y + 2x - 3 = 0 to be true for all value of y, the constant term should be 0 and the y terms should be 0 too.
The y terms y(8x - 12) will be 0 too when x = 3/2.
|
0.99995 |
Conspiracy theorists began claiming that the parents of the dead children were “actors in an elaborate scheme to enact stricter gun control laws.” The conspiracy theorists asserted that the grief-stricken parents, were, hoaxers; that there had been no slaughter; that the story was fake.
One of the loudest voices promoting this cruel theory has been Alex Jones, “a right-wing conspiracy theorist,” who is a popular radio host, and operates the “conspiracy theory website Infowars.” According to the New York Times, he “has long claimed the shooting was ‘completely fake’ and a ‘giant hoax’ perpetrated by opponents of the Second Amendment.” He “has questioned for years whether 20 children and six adults died in the school massacre in Newtown, Conn.” Haag, M. “Sandy Hook Parents Sue Alex Jones for Defamation”, NY Times, April 17, 2018.
Last year, some of the parents of the murdered children sued Jones for defamation.
Well, the story continues. And check this out – The Court has ordered that Alex Jones must appear and testify at at a deposition in the defamation lawsuit filed by the parents.
A deposition is sworn testimony, given under oath, in preparation for a trial. Jones is not happy – he has previously moved to dismiss the lawsuit (unsuccessfully), and has objected (unsuccessfully) to a previous order that he turn over financial records of Infowars.
And now, he’ll be questioned, under oath, about his statements that the slaughter of these children was faked and a hoax. Good. Let’s see what he has to say when he has to tell the truth.
Here’s an article about the case: “Judge Rules Sandy Hook Families Can Depose Alex Jones In Defamation Case,” by Owen Daugherty, February 13, 2019.
We’ve all heard about them – frivolous lawsuits – that are allegedly plaguing the courts, bedeviling the civil justice system, making jurors skeptical.
First, let’s be clear: The fact that a lawsuit is lost does NOT mean that the case was frivolous. Lawsuits are adversarial, meaning that when a case goes to trial, one side wins and the other sides loses, based upon the the jury’s decision of right and wrong. So the fact that someone loses a lawsuit does not mean that the case was frivolous; only that the jury disagreed with one side of the other. No, the term “frivolous cases” means something crazy, or something with no legal merit, something that is not legally justifiable.
First, in a tort case lawyers are paid on a contingent fee. That means they only get paid out of the money that is collected from the wrongdoer. So, why would a lawyer file a frivolous lawsuit? How does it make any sense for a lawyer to file a case that he or she knows will be lost? There will be no fee.
Second, judges have the power to throw frivolous cases out of court, well before trial.
So, in tort law, at least, frivolous cases shouldn’t really be a problem. And even cases that people think might be frivolous, like Liebeck v. McDonalds (the hot coffee case), turn out to be good cases, where the lawsuit was NOT frivolous, and the jury system worked just exactly the way it should have.
And yet – Everyone knows (or think they know) about frivolous cases; and this widespread, but erroneous belief has weakened our faith in our court system, and tort law, and the entire system of civil justice. And sometimes lawsuits are filed that do seem frivolous. But why? What sense does it make?
Could it be a deliberate effort to undermine trust in our system of law?
A Florida trial attorney recently filed a consumer class action lawsuit against McDonald’s claiming that the burger giant was charging consumers the same amount for a quarter pounder as it charges for a quarter pounder with cheese.
To John Uustal, a fellow Florida trial lawyer, the case sounded like a frivolous lawsuit – the kind that corporate lobbyists use to mock and undermine the civil justice system. . . .
It is an interesting, and audacious move. And it’s certainly thought-provoking. Could these worthless and frivolous lawsuits be part of a deliberate strategy to weaken and undermine trust in our system of law? Perhaps Attorney Uustal’s strategy will pan out, and we can learn who or what is behind this smokescreen of frivolous lawsuits.
To read the entire article about this, see 34 Corporate Crime Reporter 24(12), Monday June 11, 2018, (print edition only).
In 2012, the unspeakable happened. A madman, armed with rifle designed for war, slaughtered little children in a school in Sandy Hook, Connecticut. Butchered them. Left their small lifeless bodies bleeding. An act of horror.
The horror deepened when conspiracy theorists began claiming that the parents of the dead children were “actors in an elaborate scheme to enact stricter gun control laws.” The conspiracy theorists asserted that the grief-stricken parents, were, hoaxers; that there had been no slaughter; that the story was fake.
One of the loudest voices promoting this cruel theory has been Alex Jones, “a right-wing conspiracy theorist,” who is a popular radio host, and operates the “conspiracy theory website Infowars.” According to the New York Times, he “has long claimed the shooting was ‘completely fake’ and a ‘giant hoax’ perpetrated by opponents of the Second Amendment.” He “has questioned for years whether 20 children and six adults died in the school massacre in Newtown, Conn.” Haag, M. “Sandy Hook Parents Sue Alex Jones for Defamation, NY Times, April 17, 2018. (All quotes herein are from the Times article).
Now some of the parents are fighting back. On Tuesday, April 17, 2018, three parents whose children were murdered in the school sued Alex Jones for defamation. The tort of defamation is “the offense of injuring a person’s character, fame or reputation by false and malicious statements.” Black’s Law Dictionary, De Luxe Fourth Ed. (1951).
By all means, let us protect, defend and preserve our Constitutional right of free speech. But let persons like conspiracy theorists beware of making false, malicious and defamatory statements of such cruelty.
|
0.906992 |
The statement that “knowledge is power” is not new, but it still holds true today. What’s the best way to gain knowledge? The answer is to collect information which is gained by putting together small pieces of data. Data is the rudimentary source for information, and with information, you can build knowledge. And as we stated before, knowledge can be very powerful, depending on how you choose to use it.
Tableau helps you do just that. It facilitates the gathering of smaller pieces of data, sometimes from multiple sources, and helps you to mold them into one cohesive data story. Let’s look at some of the Tableau skills that are needed to create visually appealing, highly informative reports and data visualizations.
It’s necessary to have a basic understanding of how data can be linked together as well as how to compile that data into a structure that’s easily understood. Some basic knowledge of databases and spreadsheets, as well as how to gather and query data, will help you to get started. Experience with data insight can come from the use of tools like Microsoft Excel, Google Sheets, and other data compiling programs.
Next, you’ll need to know how to analyze data objects and their relationships as this is important to the collection and organization of your data. The knowledge of how different types of data fit together is essential to presenting it in an easily consumable format. The cleaner the data, the easier it is to work with. Having ETL (Extract, Transform, and Load) skills help to clean, massage and mold data into a form that can be easily analyzed.
Basic and comprehensive math skills are required to develop objectives using your compiled data. Using these skills, you’ll have the power to process the data into something much more valuable than just a list of numbers or information. Then enhancing that data with calculations, forecasting, trending, statistics and other methods of data manipulation will help you to build better visualizations.
The ability to accurately and effectively translate business requirements into functional specifications is an extremely valuable skill to have. This ensures that you’ll be able to produce the requested results efficiently and persuasively. The ability to feed analytic data into charts, graphs and other types of visual reports is especially important. If your audience can quickly and easily consume the information that’s being presented, then they’ll be able to make knowledgeable and informed decisions based on the presented data.
After you’ve translated the data into the requested specifications, you can filter the data and then sort it so that the most important or freshest data is easily accessible. Finally, you can group it into sections that make sense to your office or client. The ability to find a way around obstacles, provide results and then effectively communicate those results with clarity will help you to maintain your place and provide proof of your value to your company and clients.
Finally, a knowledge of how to use the different pieces of Tableau software will help you amass all the skills mentioned above into an applicable, visual composition. Tableau Desktop, Tableau Server, Tableau Public and the other products provided by Tableau give you the power to become the data scientist that you aspire to be. Using these tools, you can compile, organize and display your data to suit any audience with a visually impressive presentation.
The best way to strengthen your Tableau skills is to obtain training from a certified training center. Contact ONLC today to find out how to become a professional data scientist by utilizing the extensive Tableau training provided at one of our 300 remote classroom sites.
CEH vs. CISSP – Which Security Certification Do You Need?
|
0.993234 |
The principal technique that you ought to consider is to stop using papers in your work. As much as you are bound to save a lot of cost with going paperless, you also get to enjoy efficiency in your work and better productivity. Furthermore , your company will take part in conserving the environment by using green technology and such activity will give your company a better reputation in the market.
When you realize that you are struggling too much to get quality results in your business, it is sensible to outsource some of the services or products to avoid monotony tasks. Be cautious when outsourcing so that you don’t have conflicting products from your brand. Some of the services that you can consider to outsource include delivery services or call center services. This makes your business to perform better since every department is being highly productive.
Additionally, you should consider treating your employees well as it is a better way of improving your company’s performance. This is on account that your employees are the ones engaged with conveying results to the firm thus they may have better thoughts on the best way to accomplish better outcomes. Listening to your employees and using the strategies that they suggest is a way of showing them that their opinion matters and so it builds loyalty and appreciation for your work.
|
0.997173 |
How to create an Amazon EC2 image from a running instance in the U.S., and make it available in the E.U. region.
Who are you? You are running a VPS server (AMI, image, running as an instance) in the US location, of the Amazon EC2 service. And you want to perform a simple task: have the instance run in the EU (European Union) location.
Why are you here? Because this 'simple task' can drive a normal person insane. There are bits of answers that are scattered all over the Internet, and you can't find your head from your tail in all that noise.
So, this user guide/ manual gives the needed stages for transferring a web server from the Amazon u.s. servers to the e.u. servers.
- Some knowledge in managing a GNU/Linux server.
- A working instance of GNU/Linux, on which you will be performing all the work.
- The ElasticFox addon for Firefox.
- The S3 Organizer addon for Firefox.
- The Amazon API tools. You CAN use only the API tools, without the Firefox extensions, but why would you want to do that?
The buckets are folders in the Amazon S3 service. Yes, the guys and girls at Amazon sure don't like making things simple for you.
The easiest way to manage buckets and their content, is with the Firefox add-on called: S3 Organizer.
You'll need 2 'keys', that can be found in the AWS website, under 'Your account > Access identifiers'. Copy the Access Key and the Secret Key to the preferences, and that's that.
Download the Amazon API tools. I suggest you deploy them in your home folder.
You need to have 2 files on your server: a private key (the file that starts with pk), and a certificate (the file that starts with cert). The private key can only be issued once! So when you create your certificate (only 1 per account), make sure that you save the PK file in a safe place. The cert file can be re-downloaded from the above-mentioned 'Access Identifiers' page.
- The AMI size is limited to 10GB. Bare it in mind, and use EBS volumes for high-storage mounting points, such as /home and others. Don't be tempted to use the default /mnt that is given, since it can't be duplicated like an EBS can.
-u is the Amazon account number that you see on the top-right corner after you log-in to the AWS site.
-p is the name of the AMI. This has to be unique.
-j is not an option, but it's nice to see that you're reading... Lighten up, you're almost there!
The ec2-register command will register your AMI as a private image.
You can now activate (launch) your new AMI from the list of available images.
One extremely important notice: do not halt, shutdown or terminate your original AMI, until you're 100% sure that the newly copied AMI is working flawlessly. Once an AMI is terminated (halt and shutdown terminate it as well...), it can not be recovered. It is lost for ever and ever. No regrets.
That's it. Congratulations! Relax, and enjoy the extra-super-ordinaire song Yeah Yeah by Salsedo. You've earned it.
|
0.999991 |
The Angular CLI is a command line interface for Angular developed by Angular Team. This tool helps us quickly get started with the creating the Angular Application. In this tutorial, we will learn how to create & Manage the Angular app using the Angular CLI commands. We will be covering the commands like ng new, ng generate component, ng generate directive & ng generate pipe etc.
Once you make a choice, then you have set up a lot of libraries and packages. Each of these libraries comes with their own configuration files. For instance, you need to create Package.Json file and add all the required libraries. Create Webpack or SystemJS configuration files. Configuration files are also required for Typescript & Typings etc. You need to configure the Testing Framework also.
Instead, you can install Angular CLI and get started right away.
The Angular CLI creates the Angular Application and uses Typescript, Webpack ( for Module bundling), Karma ( for unit testing), Protractor ( for an end to end testing).
The first step is to install the Angular CLI. This can be done by using the following command.
The above command installs the latest version of Angular CLI in your machine. Note that we have used the -g flag, (which stands for global) installs the Angular CLI system-wide so that you can use it in your all projects.
Since, the Angular Version 6, the Angular CLI follows the same Version No as the Angular. Hence for Angular 7, the corresponding version of the Angular CLI is 7.
The latest version as of writing this article is 7.0.6. The command above also gives the version of node installed in your system.
help Help message shows the List of available commands and their short descriptions.
add Adds the npm package to the workspace and configure the default app project to use that library.
generate g Generates and/or modifies files based on a schematic.
serve s Builds and serves your app, rebuilding on file changes.
test t Runs unit tests in a project.
e2e e Builds and serves an Angular app, then runs end-to-end tests using Protractor.
doc d Opens the official Angular documentation (angular.io) in a browser, and searches for a given keyword.
lint l Runs linting tools on Angular app code in a given project folder.
The ng new command is used to create new folder and creates an App with the provided name.
What name would you like to use for the project?
Would you like to add Angular Routing?
Answer this as Yes unless you do not want to add Angular Routing.
Which stylesheet format would you like to use?
--dry-run -d Run through without making any changes.
--collection -c Schematics to use. For more info on Schematics click here.
--inline-template -t Does not create an external template file for the component. Specifies if the template will be in the ts file.
ng generate or (ng g) is used to generate component, module, class, pipes & directives etc. The following tables shows the list of artifacts that can be generated.
--dryRun=true|false -d false When true, run through and report activity without writing out results.
true|false|json|JSON false Shows a help message for this command in the console.
--interactive=true|false false When false, disables interactive input prompts.
The following command generates the component.
Run these commands from the root folder of the application.
ng g component --flat Hello does not create the hello folder. The component is created in the src/app folder.
ng g component --export hello adds the component to the exports metadata array of the module.
ng g component --prefix=myapp hello uses the CSS selector as myapp-hello.
--changeDetection= Default|OnPush -c Default Specifies the change detection strategy.
--entryComponent= true|false false Specifies if the component is an entry component of declaring module.
--export=true|false false Specifies if declaring module exports the component.
--flat= true|false false Flag to indicate if a directory is created.
--inlineStyle= true|false -s false Specifies if the style will be in the ts file.
--inlineTemplate=true|false -t false Specifies if the template will be in the ts file.
--lintFix= true|false false Specifies whether to apply lint fixes after generating the component.
--module= module -m root module Allows specification of the declaring module.
--prefix= prefix -p The prefix to apply to generated selectors.
--project= project The name of the project.
--selector= selector The selector to use for the component.
--skipImport= true|false false Flag to skip the module import.
--spec= true|false true Specifies if a spec file is generated.
Emulated| Native| None| ShadowDom -v Emulated Specifies the view encapsulation strategy.
The above command does not create the folder. You can use the ng g directive directive/Some, which will create the directive under the folder directive.
Use the--module flag to add the directive to a module other than the root module.
Use the --prefix or --selector flag to change the CSS Selctor.
--flat= true|false true Flag to indicate if a directory is created.
The above command does not create the folder. You can use the ng g pipe pipes/Date, which will create the pipe under the folderpipes.
Use the--module flag to add the pipe to a module other than the root module.
--export=true|false true Specifies if declaring module exports the component.
The above command does not create the folder. You can use the ng g service services/Data, which will create the service under the folderservices.
Use the command ng g class class/customer to create the class under the class folder.
You can add component, directive, pipe & services to module by using the flag --module=[ModuleName] and naming the component as [ModuleName]/[ComponentnNme].
--module=module -m Allows specification of the declaring module.
--routing=true|false false Generates a routing module.
--routingScope=Child|Root child The scope for the generated routing.
The Angular CLI helps to increase productivity by helping us to quickly create the app and add the component, pipes, services & directives etc to the module. The Angular CLI has lot more commands like serve, build, test, lint, e2e etc, which help us to build and distribute the applications. We will cover those in one of the future tutorial.
|
0.930746 |
In cryptography, Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but makes it harder for the would-be interceptor to access the content. It is also used to protect data in transit.
Encryption has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. Types of Encryption include symmetric-key and public-key encryption. In response to Encryption, cyber-interceptors and adversaries have developed new types of attacks, including: cryptographic attacks, stolen ciphertext attacks, attacks on Encryption keys, data corruption or integrity attacks, data destruction attacks, and ransomware attacks.
|
0.691792 |
Does the good of conditioning outweigh the bad?
The decision to purchase a water softener for your home can come with some pretty persuasive monetary and personal benefits. For most people, the issue is not should they buy a water softener but rather how to choose a water softener to purchase.
Allows the use of less soap or detergent, saving you money. It makes smaller amounts work more efficiently.
Reduces soapy residue on clothes and skin.
Helps free skin's pores of dirt and bacteria, reducing itchy dryness.
Leaves less soap scum and scale buildup on showers and sinks, making for easier and less costly cleaning.
Reduces scale deposits in pipes and water-using appliances, lengthening lifespan and reducing frequency of cleaning.
Reduces water-heating bills by allowing water heaters to work more efficiently - over 20 percent more efficiently in most cases.
The first thing you'll probably want to know when deciding to purchase a water softener, especially if it's a first-time installation, is what is hard water? You likely know it contains more minerals than soft water, but you may want to know why there is so much debate on whether hard water is better than soft.
How do you know if your water is hard?
You'll need to test your water supply to see if hard water is what you've got (unless annoying scale and soap scum buildup have already clued you in) and, if so, just how hard it is. If you have municipal water, the utility company can provide you with hardness information. If you're on a well, a water softening company will be more than happy to conduct a test for you.
Do you need a softener?
Hard water is measured in grains per gallon (gpg) or parts per million (ppm). It can cause problems when levels are above 6 or 7 gpg or 100 to120 ppm. Some say soft water is unneccessary and provide reasoning against their use, so check out both sides of the story before you commit.
Certain water softeners may also help in removing radium, barium and low concentrations of manganese and iron, but most only to a very low extent. A separate system would likely be needed to make any significant reductions.
If you decide in favor of soft water, you will have to choose one of several water softener types. Whether it uses solar salt, rock salt or no salt at all, is an upright cabinet or a twin tank, or utilizes ion exchange or magnets, there are benefits and drawbacks to all. Look at factors such as cost of use, water softener maintenance and brand reliability to make the best choice for your home.
|
0.999951 |
If you own a cat, you're most likely going to need a litter box. Sure, you can let your cat go outside, but this is against the recommendations by the American Veterinary Medical Association. While you may like to give kitty freedom, indoor cats live longer than outdoor cats (17+ years versus 2-5 years) as they are less likely to be hurt by wildlife, cars, or contract certain diseases. A good litterbox can help keep your home clean from messes. Generally, the recommendation is to have one litterbox for each cat in your home. Covered boxes can result in less litter being kicked out by your cat which means less mess on your floor. They can also reduce odors outside the box. It is important to remember to clean these boxes regularly though, as it could be easy to forget (out of sight, out of mind). There are a number of self-cleaning boxes on the market now, however these can be subject to clogging and malfunction. When choosing a box, decide if you want an open or closed design. The size may change depending on how big your cat is or if you have multiple cats. The litter box should be durable and not crack or leak, and it should be easy to clean.
You should place your cat's litter box someplace that is accessible yet will still offer your cat some privacy. It should not be near their food and water bowls. If you keep the litter box in a bathroom, remember to keep the door open so your cat can get in. Ideally, most litter needs to be cleaned out once a day. If your cat for some reason does not use the litter box, you may want to make an appointment with the veterinarian as this can signal something else going on medically versus a behavior problem.
The Catit Jumbo Hooded Cat Litter Pan is a good litter box for households with multiple cats or with a large cat. Some reviewers noted cats weighing 20 pounds being able to use this box. Keep in mind this litter box will take up a lot of space. It measures 22.4 inches by 18.3 inches by 17 inches. It has a flap door, with the opening measuring 10.4 inches by 9.6 inches. The back of the litter box is raised to prevent leaks at the seam, as cats typically turn to face the front of the litter box when urinating. There is a carrying handle in case you need to transport the box and slider locks keep the hood on securely. The swinging door took a little getting used to for some cats.
The Modkat Flip Litter Box is a covered litter box that comes with a scoop and reusable liner. While Modkat also offers top-entry litter boxes, we prefer this front-entry box as there have been reports with cats not liking (and therefore not using) top-entry models as much. The Modkat Flip Litter Box measures 20 inches by 15 inches by 16.75 inches. The entry is 6.75 inches from the floor and 8 inches wide. Unlike most covered litter boxes, this one doesn't have a hood. Instead, it has a fold-back double-hinged lid for easy access to cleaning. The patent-pending reusable liner hooks at each corner so that the liner stays put in the box. They are manufactured from durable tarpaulin to resist tearing by kitty. Each liner is good for up to 3 months.
For open litter boxes, it was important to us to choose one with high sides. That's a big reason why we like the Nature's Miracle High-Sided Litter Box. Litter is less likely to get kicked out of the box by enthusiastic cats burying their waste, which means less mess for humans to clean up. It has a low entrance so it is easy for cats to get in and out of, even elderly or less mobile cats. Even large cats are ok using this box. The material felt durable and like it would stand up to cat scratching. Cats and humans alike appreciated this box!
The Nature's Miracle Advanced Corner Hooded Litter Box comes in the perfect shape to fit into a corner, so won't be quite as in the way as typical rectangular litter boxes. It is hard to accurately convey the measurements due to the triangular shape, but it's basically 26 inches by 23 inches by 20 inches. The opening is 12.6 inches by 12.2 inches. It has a nonstick surface to make it easier to clean. You do have to remove the hood in order to clean this box thoroughly which some testers found annoying. We couldn't find any liners that fit this unique shape, so keep that in mind if you are passionate about using kitty litter liners. Additionally, if your cat has a habit of urinating higher, they could hit the latch area in the back of the box, resulting in leakage.
When deciding upon a litter box for your feline friends, you need to think about whether your prefer and open or closed design. Both have their benefits and disadvantages. We personally like closed designs but make sure you remember to clean the box every day. If you cannot remember this, an open box would be a better option since you're more likely to get a visual and olfactory reminder that it needs to be cleaned daily. The size will vary depending on whether you have a kitten, large cat, or multiple cats. Ideally, for multiple cats, you should have one box for each cat. Our favorite litter box for large cats or multiple cats (if you don't have space for two boxes) is the Catit Jumbo Hooded Cat Litter Pan. We also really like the Modkat Flip Litter Box thanks to its foldable lid that makes it very easy to clean. Nature's Miracle High- Sided Litter Box is our open design pick, since it's high sides helps to prevent scatter, it felt durable, and it had a lower entry point. Finally, Nature's Miracle Advanced Corner Hooded Litter Box, while sizable, can still be a space saver since it can fit into corners.
24 Items Reviewed, Best 4 Selected!
|
0.984825 |
Eating dumplings is the custom of most Chinese people in the winter solstice. Of course, there are exceptions, such as the custom of drinking mutton soup on the day of the winter solstice in Tengzhou, Shandong, to dispel the cold. Every year on the winter solstice of the lunar calendar, dumplings are a necessary holiday meal, regardless of the rich and the poor.
During the winter solstice, the diet should be varied, with a reasonable mix of valley, fruit, meat and vegetables, and proper selection of high calcium food. There are different customs in the winter solstice. In most parts of northern China, there is the custom of eating dumplings in winter solstice. The winter solstice after thousands of years of development, formed a unique food culture festival.
Why the winter solstice eat dumplings? Someone said Boiled dumplings called bait dumplings, eat Boiled dumplings is cold in the winter in order to illnesses, not frozen ears. It is said that this custom is due to commemorate the "medical" Zhang Zhongjing solstice left up medicine.
The winter solstice eat dumplings, is not forget the "medical" Zhang Zhongjing "Quhan Jiao ear soup". So far, there are still "dumpling bowls in winter solstice" in Nanyang. The main thing is to eat dumplings in the future. "Dumplings are shaped like treasure. They are rich and meaningful. This is the most reasonable explanation I think personally." so, eating dumplings is a hope of making money.
In many areas of the north of China, there is a custom of eating dumplings on winter solstice every year. According to legend, Yisheng Zhang Zhongjing retire see cold people, with mutton and some cold medicine and skin, imaging the ears when a package, called a "Quhan Jiao ear soup" of drugs, give people eat. Later, during the winter solstice, people mimic eating and forming a custom.
In the 12th day of the twelfth month of the Chinese lunar calendar of each year, we have been selected as the winter solstice festival. At the same time, it also followed the ancient customs. Eating dumplings has become an essential delicacy in the winter solstice festival in the north.
|
0.929519 |
We ascended to a step that had a blue and white trail marker painted on it, and turned right to approach the wall of a structure. The structure was completely festooned with prayer flags and enclosed what was referred to as the 'secret cave'. The doorways of the structure were very low and narrow, and led to a clearing of sorts that had long drops off to the sides. There was a small 'room' off the clearing that contained some offerings of money, a small statue, a bunch of candles, and a small window that led to the cave itself. As I peered into the window, I caught some glimpses of the silhouettes of jagged rocks, but other than that the cave was almost completely engulfed in darkness.
As we made our way out of the structure, we spotted a large Himalayan griffon (Gyps himalayensis) that was perched on the edge of the rock. We watched each other inquisitively for a few minutes, before the vulture suddenly launched itself up into the air and began circling the thermal currents ever upwards. The Himalayan griffon is a very large vulture, and with a wingspan that can reach 3.1 metres-long and a weight of up to 12 kilograms, is the largest and heaviest bird found in the Himalayas. These vultures used to regularly feed on human corpses during sky burials.
Another vulture that was seen soaring above was the bearded vulture (Gypaetus barbatus), which is also known as the Lämmergeier (lamb-vulture). Like the Himalayan griffon, the bearded vulture is near-threatened , their numbers having dropped significantly in the past as people used to believe (without any justification whatsoever) that these birds carried off their children, pets, and livestock. Bearded vultures however are the only known animals to have a diet that is made almost entirely out of bone. They have developed several traits that allow them to live off this diet, which include a stomach acid concentration that is estimated to be around pH 1, as well as the learning of skills such as the dropping of bones from great heights in order to expose the bone marrow within.
A bearded vulture (Gypaetus barbatus) on the left, and a Himalayan griffon vulture (Gyps himalayensis) on the right.
The unusual lozenge-shaped (rhombus, ◊) tail of the bearded vulture is one of the easiest ways to identify it from a distance.
We then dropped back down the slope and followed the ridge-line until we could see stone stupas lining the top above us. As we approached the stupas, great whirlwinds of alpine choughs (Pyrrhocorax graculus) were seen haphazardly circling around above us--the flock (I refrain from using antiquated veneries such as a 'murder' of crows, or an 'unkindness' of ravens) easily numbering 70 or more individuals. The flock would occasionally dip low and almost skim the ground, and their shadows would make their numbers appear twice as much.
Just beyond the ridge, looking far off to the west, was the Chulu waterfall. A trail could also be seen that followed the sides of the arid, almost Upper-Mustang-like, slopes before descending into the distance. We made our way over to the left of the ridge and cut down the slopes to the main trail that ascended to Kang La Pass (elevation : 5306m). The clouds still obscured the peaks, so we could see neither Chulu East (elevation : 6429m) nor Thorong Peak (elevation : 6144m) to the north-west.
We eventually reached a rise of sorts that had a small stone hut that was surrounded by cultivated plants. Pikas (Ochotona macrotis) were ubiquitous here, and could be seen as they bounded from patches of alpine grass. We sat there for a while watching them--perhaps seeing ten that morning--and as we did, a horse trotted over from above and stopped in its tracks just staring at us. The horse was probably just as surprised to see us as we were it, but it relaxed after a while and began to graze on grass. We continued on after it had trotted away.
|
0.991418 |
Witnessed 3 golden orbs in western sky hover in a triangular formation, then they moved into a diagonal line. then one of the orbs dimmed to a small red dot that would blink red as it flew off to the south west. the second orb did exactly the same as the first one. the third orb did the same as the first two, and in the same interval.
|
0.999816 |
I've read that the most efficient solar/photovoltaic cells can reach efficiencies of around 30%. How does that compare to what leaves of typical plants can do?
I've read that the most efficient solar/photovoltaic cells can reach efficiencies of around 30%.What sort of efficiency is really important for solar panels? In space it is weight of panels and deployment apparatus verses power output. I recall the use of some lens arrays on the panels to increase the amount of light falling on them. This would not have been practical on earth because it is cheaper to add more panels. On earth I would say total power output for the life of the panel verses cost of alternatives. It is more efficient to directly heat water then use solar panel electricity.
How does that compare to what leaves of typical plants can do?
(leaves cannot be 100% efficient, or they'd be black)I do not know what percent of light falling on a leaf is used to make food and oxygen by the plant. There are other issues to consider though. The food is a more efficient energy source for the plant than electricity is for people. So how do you really compare the two? Plants us a great deal of the no visible spectrum do solar panels as well?
Hopefully somebody with more expertize can help you, but for starters, I'm not sure if the efficiency of a solar cell and that of plants doing photosynthesis is directly comparable. I don't know if a leaf would have to be black to be efficiency, because it may be that the process is not the same, i.e. they are not simply using sunlight for it heating potential. It may be acting as a catalyst in the reaction. Also, it may be that the main constraining factor for photovoltaic cells is sunlight, but it's possible that for photosynthesis, there are other constraining factors that are more important, like need for carbon dioxide or water or whatever. So it may be that the efficiency wouldn't be measured in quite the same way.
Only light within the wavelength range of 400 to 700 nm (photosynthetically active radiation, PAR) can be utilized by plants, effectively allowing only 45 % of total solar energy to be utilized for photosynthesis. Furthermore, fixation of one CO2 molecule during photosynthesis, necessitates a quantum requirement of ten (or more), which results in a maximum utilization of only 25% of the PAR absorbed by the photosynthetic system. On the basis of these limitations, the theoretical maximum efficiency of solar energy conversion is approximately 11%. In practice, however, the magnitude of photosynthetic efficiency observed in the field, is further decreased by factors such as poor absorption of sunlight due to its reflection, respiration requirements of photosynthesis and the need for optimal solar radiation levels. The net result being an overall photosynthetic efficiency of between 3 and 6% of total solar radiation.
That's somewhat higher than numbers I remember reading ages ago. I'm sure it depends on what exactly you count, and this is certainly not my area of expertise, so I can't vouch for accuracy. But, yes, there are a number of steps in photosynthesis, just as there are a number of steps from PV to storing the energy chemically for applications such as running a car.
|
0.969957 |
The results showed that 84 per cent of people who had dementia were detected as having the condition (sensitivity value) while 87 per cent of people without dementia had been correctly acknowledged as not having the condition (specificity value), according to the data.
These results indicate that the model can detect those with underlying dementia with an accuracy of 84 per cent. This suggests that the machine-learning model could, in future, significantly reduce the number of those living with undiagnosed dementia – from around 50 per cent (current estimated figure) to 8 per cent*.
April 12, 2019 - Archibald Prize finalist Melissa Beowulf and sons accused of murdering grandmother found not guilty ABC NewsAcclaimed portrait artist Melissa Beowulf and her sons Bjorn and Thorsten are found not guilty of murdering their elderly family matriarch Katherine Panin.
April 8, 2019 - This Popular Supplement Can Make Women 7 Times More Likely to Get Dementia Reader's DigestCalcium supplements may be good for your bones, but the pills may pose a risk if you fall into this category.
April 9, 2019 - Murder-accused Beowulf trio 'continuously' protest their innocence in secret recordings, court hears ABC NewsThe murder trial of prominent artist Melissa Beowulf and two of her sons is told secret recordings of their conversations by police support their innocence.
|
0.999998 |
How important is it for me to have a property power of attorney in place?
A property power of attorney is used when you can no longer act on your own behalf in making decisions about your property, which also includes your investment accounts. The inability to make decisions can be due to an accident or short-term illness as well as long-term health conditions. The importance of this document is often overlooked.
If you have investments, a bank account or other accounts in your name alone and you are not mentally or physically capable of making decisions, the person you have chosen to act on your behalf will need a power-of-attorney document to access your accounts. This includes brokerage accounts, IRAs, 401(k) accounts, credit cards and bank accounts.
Without this document in place, numerous problems can occur. For example, lack of access to your IRA account may lead to missed required minimum distributions. If no one has access to your bank account and you become incapacitated, bills may go unpaid or a lack of funds may affect the ability to continue needed health care.
Many people name a spouse, a family member or a trusted friend. Choosing the right person to act for you is sometimes difficult, but making sure you have a property power of attorney in place is vital to a sound wealth management plan.
Because a power of attorney for property is a legal document, it is important to consult an attorney.
|
0.97472 |
In order to upgrade a MariaDB Galera Cluster 5.5 to MariaDB Galera Cluster 10.0, the following steps need to be performed.
First, take a look at Upgrading from MariaDB 5.5 to MariaDB 10.0 which documents the settings in the regular MariaDB server that have been removed or been changed. You will need to make sure that your settings are compatible with 10.0 before upgrading.
Next, make sure that the Galera version numbers are compatible. If you are upgrading from the most recent MariaDB Galera Cluster 5.5 release to MariaDB Galera Cluster 10.0, then the versions will be compatible. If you are running an older MariaDB Galera Cluster 5.5 release that still uses a Galera 25.2.x provider, then it is recommended to first upgrade to the latest MariaDB Galera Cluster 5.5 release that uses a Galera 25.3.x provider. See What is MariaDB Galera Cluster?: Galera wsrep provider Versions for information on which MariaDB releases uses which Galera wsrep provider versions.
Make any desired changes to configuration options in option files, such as my.cnf. This includes removing any options that are no longer supported. Also, until all the nodes are upgraded, you will want to set read_only=ON. This will to prevent the upgraded MariaDB Galera Cluster 10.0 nodes from replicating to the existing MariaDB Galera Cluster 5.5 nodes, which is not supported. The final node being upgraded does not need to set read_only=ON.
|
0.999998 |
Time for US to adopt formal, explicit cyberwarfare policy?
The US' ability to engage in cyberwarfare is quickly outstripping its ability to determine when it's appropriate to do so. That's the conclusion of a report by the National Academies of Science, which evaluated the nation's cyberwarfare capacity. The report suggests that, although international law provides some rough guidelines about when it may be appropriate to loose the virtual weaponry, offensive computer weapons have properties that make them distinct from those of traditional warfare, and the US hasn't engaged in any sort of national debate or set a coherent policy that would regulate their use.
The report was prepared by two groups within the NAS: the Committee on Offensive Information Warfare and the Computer Science and Telecommunications Board. Both are populated largely from the academic world, but also include retired military officers and people in the private sector, such as employees of Google, Microsoft, and Sun. Funding for their evaluation was provided by the National Research Council (a branch of the NAS), Microsoft, and the MacArthur foundation.
The scope of the report was largely limited to offensive measures, as security and defensive measures have received widespread attention and should be default behavior, rather than require a policy for deployment. The authors also don't spend a lot of time evaluating the current state of the art in cyberwarfare, as the capabilities of the military and espionage communities are classified, and it's a quickly-moving target anyway. The authors work under the assumption that "they are at least as powerful as those demonstrated by the most sophisticated cyberattacks perpetrated by cybercriminals and are likely more powerful."
So, the US has the tools; how should it decide when to deploy them? The report's authors lay out a few principles that should help guide any policy on the matter. One is that, although our capabilities may be good, they're not likely to be that much better than the rest of the world's: "enduring unilateral dominance in cyberspace is neither realistic nor achievable by the United States." Since the US economy is heavily dependent upon information exchange, it's got a lot to lose if cyberwarfare capacity and use proliferate, so it has a vested interest in limiting its use. Given the nation's central role in international finance, there's also a very real risk of what the report terms "blowback"—the US deploys offensive cyberweapons, only to harm its national interests in the process.
Finally, cyberwarfare won't be like traditional warfare. It's relatively easy for non-state actors to engage in asymmetric, disruptive activity, and states that engage in a cyberattack will find it easy to use misdirection to hide their tracks and/or shift the blame to other nations or non-state groups. As such, the US' traditional means of deterrence, a "threat in-kind response," simply won't work. Even identifying a threat can be a challenge, as the authors note, asking, "given that any large nation experiences cyberattacks continuously, how will the United States know it is the subject of a cyberattack deliberately launched by an adversary government?"
For all of these reasons, the authors conclude, it's imperative that the US not only think carefully about engaging in an offensive use of its capabilities, but work within the international community to discourage the use of cyberwarfare generally. And that will be a real challenge, given that the relatively low cost of virtual weapons, meaning that the temptation to use them will be high.
If the US is to lead the international community by example, though, it's in a terrible shape to do so. "Neither government nor society at large," the authors write, "is organized or prepared to handle issues related to cyberattack, let alone to make broadly informed decisions." Not only does it lack any sort of policy on the use of offensive cyberweapons, it hasn't even started the sort of national discussion that would enable it to formulate this sort of policy. The authors make an explicit comparison to the status of nuclear weapons in the 1950s, when planners assumed that the next war would be nuclear, but there was no national dialog about what that would involve—an era that Omar Bradley derided as "a world of nuclear giants and ethical infants."
The report's recommendations can be broken down along national and international lines. The authors suggest that existing international treaties that govern the commencement and conduct of war would be a good place to start. These have a few assumptions that limit their applicability to cyberwarfare—there's an emphasis on territorial integrity of nations and an assumption of conflict between military forces, for example—but the ethical considerations that produced these rules are likely to extend into virtual realms. The integrated global economy also means that the US is likely to share interest with a variety of other nations that can form the basis for a cooperative effort to upgrade existing treaties.
At home, part of the emphasis should be on setting up a mechanism for the government and business community to interact. As the report notes, the US could easily come under cyberattack without any of its own computers being targeted. Business will need the ability to alert the government and work with it to identify the source, defend against it, and, if deemed appropriate, respond to these events.
Determining whether to respond through the use of offensive virtual weaponry while in the middle of a cyberattack or international incident isn't the best way to go about things, so the authors argue that basic policy guidelines on the use of this weaponry need to be put in place while there's ample time for rational consideration. "The US government should conduct a broad, unclassified national debate and discussion about cyberattack policy, ensuring that all parties—particularly Congress, the professional military, and the intelligence agencies—are involved in discussions and are familiar with the issues," the report suggests. Once in place, the policy should not remain static: "the US policy should make it clear why, when, and how a cyberattack would be authorized, and require a periodic accounting of any attacks that are conducted, to be made available to the executive branch and to Congress."
It's hard to fault the report's conclusions, but it might be a bit optimistic to call for a national debate at a time when the level of political discourse on policy issues is so poor.
As with all reports from the National Academies, this one can be read free online.
|
0.972961 |
Solve the equation by multiplying each side by the least common denominator.
I know the answer is 5, but I do not know how to solve the problem.
[2/(h-2)] + [4/(h+1] = 0 but I don't get 5 for an answer. If you will put parentheses to show the correct problem perhaps we can help.
SOLVE THE SYSTEM (2D+3)(x)-(D+3)(y) = 5 (D+1)(x) - (2D+5)(y) = 7+4t STEPS 1) eliminate x by mulitplying equation 1 with -(D+1) and equation 2 with -(2D+3) After multiplying, what exactly happens to the D and t on the right side?
|
0.999251 |
Rebecca Ferguson claims she has been racially abused throughout her career, as well as being ''oppressed'' by people she thought were on her side.
Rebecca Ferguson claims she has been racially abused throughout her career.
The 31-year-old singer shot to fame when she finished as a runner-up on the 2010 series of 'The X Factor', but has said in a lengthy statement on Twitter that her life has not been as glamorous as it might seem, as she has allegedly been the subject of racial hate comments and ''oppression''.
In part of a lengthy message entitled 'Statement of truth', Rebecca said: ''The oppression had reached it's absolute worst when I was called and told I had to do something that compromised my integrity I was requested to do a gig and told.
''on a separate occasion it was said by the same person at an event in London.
The 'Nothing's Real But Love' singer - who has Lillie, 15, and Karl Jr., 13 - also claims in her note that her ''oppression'' began when she was ''forced'' to sign a contract she didn't want to after competing on 'The X Factor'.
Rebecca says she was given an accountant and a solicitor to handle her finances when she entered stardom, but alleges they were not ''acting to my best interests at all'' and had stolen money from her.
The star also claims she was ''targeted'' by a man and a woman who claimed they could help her fight back against her oppressors, but were working behind her back to liquidate her companies and steal more money from her.
Rebecca insists she is ''unable to stay silent'' and says her decision to speak out comes as she wants the music industry to ''wake up'' and make changes.
She wrote: ''I have written this statement today unable to stay silent anymore however still fearful and also at a great risk to my future career in music but choosing to exercise my human right of freedom of speech and human expression, this is something I cannot continue to run away from I refuse to operate in fear.
''I'm still living this, and I know there are many others too!
''I have not spoken completely on all of the abuses I have suffered yet.
''I'm doing this statement to support all victims of systematic abuse in every field of work and who are currently living in fear and that have had their stories silenced with an NDA.
''But the music industry needs to wake up there is unchecked abuses of power none of the above will come as a surprise to most in the industry we cannot allow people to misuse their position.
''Artists need to come together as one and demand their be a governing body that protects us from fraud and criminality.
''as humans we do not evolve if we stay silent I have been brave today although I have not named my oppressors I have made the first move in fighting back against them.
''And maybe they will come for me even more now.
|
0.999186 |
while I-70, I-270, and later I-68 linked central Maryland with western Maryland, and I-97 linked Baltimore with Annapolis. The Origin and Resolution of an Urban Crisis: Baltimore, (1977) Argersinger, Jo Ann. Ritchie, elected to his first of five terms in 1918, is probably the most popular governor in state history. Archived from the original on June 3, 2010. No one appears to be happy. In 1608 John Smith entered the bay 16 and explored it extensively. The Tribune Almanac and Political Register, Volume 1861. "The Spanish in the Chesapeake Bay". Many of the Union troops were said to enlist on the promise of home garrison duty.
Right to Life, pAC National, right to Life, victory Fund National. Right to Life, convention NRL News Today Pro-, life. Perspective Association for Interdisciplinary Research in Values Social Change. Org Has a TON of Scholarship Opportunities. Spoiler: college is crazy-expensive.
The 126 seats on the council were filled by appointment. According to the best extant records, up to 25,000 Marylanders went south to fight for the Confederacy. Pritzker 441 Durham, Raymond (February 29, 2012). The battle was the culmination of Robert. "Restore Handsell « History of Handsell in the Chicone Indiantown, Dorchester County, Maryland ". Here are some sample claims for the "health benefits of soy" paragraph: Claim based on a fact or event (weak Soy milk contains healthy isoflavones and nutrients. Citation needed The British next marched to Baltimore, where they hoped to strike a knockout blow against the demoralized Americans. American Slavery:, New York: Hill and Wang, 1993,. New York: Tribune Association.
Did we spoil it? To build a strong defense and fight criminal charges, seek the experienced legal counsel and advocacy.
|
0.975179 |
Following are calls reported by the Burleson Police Department Aug. 1-7. An arrest should not be construed as a conviction of guilt. Subjects have a presumption of innocence until convicted in a court.
12:31 a.m. – Harassment, 100 block Country Vista Circle.
8:26 a.m. – Vehicle burglary, 2700 block SW Wilshire Boulevard.
9:31 a.m. – Vehicle burglary, 200 block S. Hurst Road.
12:00 a.m. – Assault, 500 block Marybeth Drive.
1:05 p.m. – Theft, $100 to $750, 400 block Blaze Court.
2:33 p.m. – Criminal mischief, $750 to $2,500 loss, 3200 block S. Burleson Boulevard.
3:19 p.m. – Theft, $100 to $750 loss, 900 block N. Burleson Boulevard.
8:05 p.m. – Vehicle burglary, 1300 block Hearthstone Drive.
8:25 p.m. – Debit or credit card abuse, 1700 block S. Burleson Boulevard.
10:42 p.m. – Assault, 400 block Irene Street.
12:08 a.m. – DWI, 1200 block N. Interstate 35W.
3:08 a.m. – Possession of controlled substance, less than 1 gram, 400 block SW Wilshire Boulevard.
1:34 p.m. – Fraudulent use or possession of identifying information, 2700 block Lakeside Drive.
1:10 p.m. – Theft, $100 to $750 loss, 2300 block S. Burleson Boulevard.
3:31 p.m. – Harassment, 900 block Misty Oak Trail.
7:31 p.m. – Manufacture and delivery of a controlled substance, 4-200 grams, 1500 block Houston Road.
9:33 p.m. – Vehicle burglary, 100 block SE Tarrant Avenue.
8:34 p.m. – Animal ordinance violation, 700 block Flamingo Circle.
12:37 a.m. – Auto theft, $2,500 to $30,000 loss, 1000 block Stockton Drive.
12:45 a.m. – Criminal mischief, $100 to $750 loss, 1500 block SW Wilshire Boulevard.
4:28 p.m. – Possession of marijuana, 4 oz.-5 pounds, 500 block E. Hidden Creek Parkway.
8:28 p.m. – Shoplifting, $100 to $750 loss, 1000 block SW Wilshire Boulevard.
3:06 a.m. – Assault, 300 block SW Wilshire Boulevard.
10:50 a.m. – Theft, $100 to $750 loss, 500 block SW Wilshire Boulevard.
11:30 p.m. – Possession of marijuana, less than 2 oz., 300 block S. Burleson Boulevard.
1:25 a.m. – DWI, 200 block SW Wilshire Boulevard.
8:20 a.m. – Auto parts theft, $2,500 to $30,000, 900 block N. Burleson Boulevard.
10:40 a.m. – Shoplifting, $100 to $750 loss, 1100 block N. Burleson Boulevard.
11:06 a.m. – Fraudulent use or possession of identifying information, 300 block Garrett Street.
1:14 p.m. – Shoplifting, $100 to $750 loss, 900 SW Wilshire Boulevard.
1:32 p.m. – Home burglary by force, 100 block NE Rosamond Street.
1:52 p.m. – Crash involving damage, less than $200 loss, 400 block S. Interstate 35W.
5:25 p.m. – Warrant arrest, 1900 block Coleman Road.
1:12 p.m. – Debit or credit card abuse, 1000 block Rock Springs Drive.
3:41 p.m. – Fraudulent use or possession of identifying information, 1300 block Erin Court.
9:53 p.m. – Criminal mischief, $100 to $750 loss, 400 block E. Renfro Street.
1:35 a.m. – Assault, 700 block Lynnewood Avenue.
2:20 a.m. – Assault, 100 block NE Johnson Avenue.
6:27 a.m. – Theft$100 to $750 loss, 600 block NW Lorna Street.
2:58 p.m. – Purse snatching, $100 to $750 loss, 900 block SW Wilshire Boulevard.
4:55 p.m. – Aggravated assault with a weapon, 500 block NW King Street.
1:00 p.m. – Jeramy Feronti, 1100 block SW Wilshire Boulevard.
3:00 a.m. – Jerry Russell, 200 block S. Main Street.
9:57 a.m. – Mitzi Seyler, 500 block Marybeth Drive.
12:25 a.m. – Carlos Romero, 1200 block N. Interstate 35W.
3:55 a.m. – Joe Tucker, 400 block SW Wilshire Boulevard.
8:53 p.m. – Johnny Ford, 1500 block Houston Road.
9:33 p.m. – Mitzi Seyler, 700 block SW Wilshire Boulevard.
2:33 p.m. – Benton Skelton, 900 block SW Wilshire Boulevard.
4:28 p.m. – Jordan Bellah, 500 block E. Hidden Creek Parkway.
4:28 p.m. – Fernando Duran Cubias, 500 block E. Hidden Creek Parkway.
3:43 a.m. – Ronnie Welch, 300 block SW Wilshire Boulevard.
9:40 a.m. – Britain Gentry, 300 block Springwillow Road.
10:18 a.m. – Christopher Guerrero, 200 block Elk Drive.
11:47 p.m. – Samuel Rodriguez, 300 block S. Burleson Boulevard.
1:37 a.m. – Joshua Cabrera, 200 block SW Wilshire Boulevard.
1:14 p.m. – Jason Odom, 900 block SW Wilshire Boulevard.
4:19 p.m. – Jeramy Feronti, 900 block SW Wilshire Boulevard.
5:25 p.m. – Shawn Dean, 1900 block Coleman Road.
1:04 a.m. – Christian Angeles, 200 block S. Main Street.
12:06 a.m. – Kenneth Fitch, 900 block Irene Street.
1:35 a.m. – Ren Shelton, 700 block Lynnewood Avenue.
|
0.981088 |
Before I begin, I’d like to mention that I have some surprising news that you may want to stand up for. That’s right, stand up; because what you are currently doing can be severely harming your health.
Years ago, our ancestors’ average day consisted of hunting (or running from) wild animals, gathering foods to eat, or tending to crops. As our species evolved, our society has shifted to a much more sedentary lifestyle. Gone are the days of working the fields and cultivating crops. Today, the majority of North Americans spend their day sitting behind a desk in front of a computer screen or on a couch watching TV; this has been an inevitable shift caused by the digital revolution.
The result of this shift has us sitting for a large portion of our day. On average, people spend over eight hours a day sitting; that’s more time than the average person spends sleeping. Unfortunately, many studies are now suggesting that sitting can be one of the worst activities (or lack thereof) that contributes to many of the health issues we currently suffer from.
The problem with sitting is that humans were not built to do it for extended periods of time. The concept of sitting for hours on end has only taken root in the last half-century or so, and the impact on our health is widespread. A study conducted by the American Cancer Society found that people who sat for more than six hours a day had a 40 percent higher chance of dying in the next 15 years, compared to someone who sat for three hours a day or less. A similar study found that people who sit for more than six hours a day see a decrease in their quality of life by seven years.
Many people are aware that a sedentary lifestyle is unhealthy and can lead to weight gain or cardiovascular problems. However, contrary to popular belief, exercising seems to have very little impact on a person’s health if the majority his or her time is spent sitting. As your doctor, it’s important that I explain to you the consequences of sitting for too long, and how you can reverse these effects.
Scientists have spent many years establishing what happens to a person’s body when they sit. They found that sitting ultimately affects every part of a person’s body, both internally an externally.
Back Pain: Almost every person has complained of back pains after sitting for too long.
Scientists have found that the connective tissue that coats our muscles tends to take the shape our bodies most commonly hold.
By sitting for an extended period of time, we force our backs to conform to an uncomfortable hunched position that severely hinders our posture.
Sitting also forces our hips and pelvis to tilt forward, which puts an immense amount of stress on our lower spine.
Hip Pain: If you’ve ever experienced discomfort in your hips, it’s largely a result of sitting for too long.
Sitting causes the muscles above your thighs (hip flexors) to contract unnaturally, forcing them into a bent position.
The overall result is a joint and hip pain that leads people to hunch over uncomfortably.
People who cross their legs while sitting can experience hip imbalances, which impact both posture and agility.
Weight Gain: Perhaps the most obvious part of our bodies—the one on which the sitting happens—is the one that suffers most.
The gluteus muscles are the largest muscle group of your body.
Sitting prevents your gluteus muscles from firing and burning calories.
The lack of calorie burning can lead to weight gain, as well as weakened muscles that prevent you from exercising, lifting, or even walking properly.
Headaches: Unfortunately, the upper body is not spared from the side-effects of sitting at a desk.
When people sit in front of a computer their back and shoulders hunch over the keyboard as they type.
The International Headache Society has linked sitting and poor posture as a lead cause of tension-type headaches, the most prevalent headache complaint amongst Americans.
If you’re starting to shift in your seat, it might be time for a stretch. However, while the physical effects of sitting can be uncomfortable, the hidden effects are far more dangerous.
The British Journal of Sports Medicine notes that the moment your posterior hits the chair, the electrical activity in your legs turn off.
The enzyme lipoprotein lipase (LPL)—an enzyme responsible for breaking down fat in your bloodstream—drops significantly upon sitting, which can lead to weight gain.
Shortly after sitting your insulin levels (and their effectiveness) drop by 40 percent, which leads to an increased risk of developing Type-2 diabetes.
Cardiovascular: Perhaps even more alarming is the long-term effect that sitting has on cardiovascular health.
When we sit, our muscles relax, which leads to a decrease in enzyme activity.
This drop in enzyme activity leads to a significant increase of LDL (“bad” cholesterol), and a 20 percent decrease of HDL (“good” cholesterol).
A study conducted by the Pennington Biomedical Research Center found that those who sat for the majority of the work day were 54 percent more likely to suffer from cardiovascular disease than those who were active.
Taken into perspective, these effects are a catalyst to change our behaviors. After explaining the consequences of sitting to my patients, many of them point out that they exercise regularly after work, believing that they are “safe” from the dangers. Unfortunately, countless studies have shown that exercise cannot reverse the effects of a sedentary lifestyle. That solution would be akin to putting a band-aid on your head to heal a headache; the two are not related. In order to mitigate the effects of extended sitting, there are a number of practical changes that must be made.
Instead of sitting, stand. Standing helps to increase energy levels, burn more calories, improve metabolism, and increase blood flow through the body. Standing at every chance you have (while at the computer, watching TV, talking on the phone, etc.) will help counter the effects of sitting.
Take frequent breaks. Studies have shown that taking frequent, measured breaks to stand and move around throughout the day is the easiest and most effective way to fight a sedentary lifestyle. Set a reminder on your computer to go off every hour, forcing you to get up, move around, and stretch for at least two minutes.
Every step counts. Many people complain that they don’t have enough time to get the minimum 30-minutes of exercise recommended. An effective solution is to break these exercises into small chunks. Some easy ways to implement this include: getting off the bus or train a stop early and walking the rest of the way; parking as far as you can from your office; taking the stairs instead of the elevator; walking to speak to a colleague instead of emailing them; increasing your fluid consumption to encourage more walks to the washroom; and even getting up and performing chores during TV commercial breaks.
Stand to work. Implement a work environment that’s more conducive to standing. Ask your employer to institute standing workstations instead of the traditional desk and chair. Institute “walking meetings” in which meetings are held while employees walk outside. Take stretch breaks with a colleague and encourage one another to move throughout the day.
Put Up Your Feet. The standard office chair does not offer enough hip, spine, and neck support. However, sitting at a 135º incline is the best posture to put less strain on your body—even better than sitting straight.
While you may now be worried about the effects that sitting has had on your body, remember that you are sitting in the driver’s seat and you hold the key to your health. Make sure to reverse the effects of sitting by adopting a more active lifestyle, take more frequent breaks to stand, walk, and move more to improve your overall health.
|
0.999947 |
If you love the great outdoors and would like to find a new way to connect with nature, consider paddleboarding or kayaking! Kayaking and paddleboarding are two of the fastest growing sports, offering outdoor enthusiasts a great time to consider testing their skills on the water. While both sports are a lot of fun, you need to know some important information to determine which one is best for you.
Are you an adrenaline junkie? Kayaking is right up your alley! Kayaking allows you to go faster than you can on a paddleboard, and you can eventually work up your skills to hit some whitewater rapids. Kayaks can be used to get from one side of a lake to another in a faster time compared to a paddleboard. A double-sided kayak paddle allows you to paddle much faster from a single paddle that a paddleboard comes with. If you have the need for speed, you’ll want to spend time taking at least one kayaking course to learn how to perform an Eskimo roll and other movements when you are hitting the whitewater rapids.
A paddleboard is essentially the same look and feel as a surfboard, which means you will not be able to store anything on the board. Most kayaks include a bungee cord storage area for the sit-on kayaks, and the sit-in kayaks often include a dry storage area. If you plan to be out on the water for several hours, or days, a kayak makes it much easier to take your gear around with you. As kayak fishing has grown, so has the variety of accessories to choose from.
If you enjoy fishing and want to be able to keep your gear with you at all times, a kayak is a smart choice. Several kayaks are designed specifically for fishing, allowing you to have a place for your fishing pole and the rest of your gear. You can even purchase a small trolling motor and attach it to the kayak or purchase a wind sail to have some help moving around on the water.
A great benefit to kayaking versus paddleboarding is the ability to enjoy the sport year-round. In the winter, a lot of kayakers grab a wetsuit or drysuit to stay warm. Sit-in kayaks will keep you warmer from the sit-on kayaks as the sit-in kayak can include a spray skirt to keep the water out, allowing you to stay warm and dry. Paddleboarding normally involves standing, and it can get cold quickly in the cooler months. If you have balance issues, paddleboarding will be much harder to manage if you intend to stay dry!
Paddleboarding is a great activity for a few hours or a day trip, but it can cause a lot of people to burn out their muscles quickly. Kayaking is designed for comfort and long-distance movement over water. It’s more comfortable to sit in a kayak to travel compared to standing on top of a board for a long paddle trip. We have also found it’s much safer in a kayak when you hit rough waters compared to trying to keep your paddleboard stable in choppy water. Kayaks are usually easier to control due to the way their hulls are shaped whereas a paddleboard can be harder to turn and move as it is flatter and wider.
If you want a fun way to workout, you need to go paddleboarding! A paddleboard is a great workout as it does work your entire body. You are standing up on the board, and you are using your entire body to push yourself across the water. Depending upon how far you want to go, you’ll find it won’t be long before your muscles are feeling the workout. A lot of people see a significant improvement in balance issues thanks to paddleboards. Paddleboards are designed to help improve your core strength and you will also see your leg muscles tone up in a hurry!
What makes paddleboarding a great workout is the fact that it allows you to get outside and enjoy nature in a different way. It is a low impact sport, so you won’t cause damage to your body like other sports can cause. People with joint and ligament pain find paddleboarding to be an excellent way to get in a good cardiovascular workout without leading to additional strains and health concerns.
Paddleboarding might feel hard initially as you need to learn how to hold your balance on the board, but it is an easy sport to learn. The paddleboards are difficult to tip over and you can easily get right back on if you do fall off. The way they have been designed makes them like a large lily pad for humans, so they really do give you the ability to glide on the water easily. Unlike kayaking, you won’t need to learn how to do certain movements like you do if you were whitewater kayaking. Paddleboarding is a relaxing sport designed for day-time use.
Unlike a kayak, a paddleboard allows you to change positions whenever you like. Kayaks are designed to allow you to sit and travel around the water for a long period of time. A paddleboard lets you stand, sit, or lay down for awhile! A lot of paddleboarders prefer them because there is so much versatility with the sport. Some people even take their boards out to catch small waves and surf!
A new fitness craze is to really test your core strength by performing yoga on the paddleboard. Paddleboard yoga not only gives you a chance to connect with nature, it offers a unique experience to paddleboarding. You can easily find your own “spot” on the lake to get in a good yoga session, and then paddleboard around and enjoy the sites for awhile. The sound of water has long been used to help people relax, what better way to relax than ON the water!? You will want to opt for calmer water when you are paddleboarding as these boards aren’t designed to go over large rapids, at least they aren’t designed to keep you ON the board during those rapids! Calm, flat water is the best option for effective paddleboarding.
What Sport is Best for Me?
How can you decide between the two sports? It really comes down to your goals and your body’s abilities. If you want to be out on a lake for a few days and even camp along the way, consider a kayak. If you want to just go out for a leisure float, opt for the paddleboard. Both sports are fun, you might find you can do both sports year-round based on the climate, but we recommend warmer weather for paddleboards over kayaks.
|
0.804623 |
I am looking to upgrade my CPU from an i5 6600k to i7 8700k. How significant will this upgrade be? I know it's an i7 but want to know if it's going to be worth it.
What do you generally tax the system with?
SSD/HDD: 2x samsung evo 500gb.
Chassis: CoolerMaster Mastercase Pro 5.
I like to game but also multitask from time to time.
So how is your performance now? Is it not satisfying you? Are you encountering CPU bottlenecking?
If performance is fine, I'd wait for 3rd Gen Ryzen or 10th gen Core CPUs from Intel.
you will get better performance of course, but the boost you will get depends on what you currently do and if your CPU is the limiting factor. Monitor your CPU usage and see how often its hitting 100, look online and look at benchmarks for the tasks you do.
If money isn't a concern than sure why not, but if you are looking for best bang for your buck and aren't in dire need of more speed, I would consider holding out a little while to see how ryzen 3000 shakes up the market.
i7 8700k or ryzen 2700x upgrade for streaming & content creation?
|
0.966951 |
Takeaway: Data science is one of the hottest fields in tech, but how can you get into the field? Here are some fundamentals that you can learn on your own.
Data science is a complex discipline that identifies significant information drawn from gigantic amounts of structured and unstructured data. Probably the hardest part of this field of knowledge is to learn how to make sense of all this data, and transform this immense amount of scattered info into meaningful, actionable insights. A competent data analyst knows how to spot those patterns that enable organizations to devise effective strategies, find new opportunities, and enhance their marketing efforts.
Plain and simple, first things first. You cannot become a data scientist unless you understand what data science really is, and an introductory course that provides you an overview of this discipline is the first step you should take. Core concepts include why and how data science is so important for business and how it can be applied. You must be able to understand what regression analysis is, and how the process of mining a data set works, as well as what tools and algorithms you are going to use on a daily basis to master this discipline.
The best courses are those which also focus on methodology, so you can be sure that the data that you will collect is used for hands-on problem-solving in a relevant way. The basics should include understanding how to properly manipulate it in order to tackle the most common issues, and how to make sense of the feedback after a model is built and deployed.
An introductory course that teaches you statistics by application is the best place to start learning data science, and Python programming represents the most basic skill required to understand this field. Before working with data, you need to understand how to extract it in its rawest form, and Python represents the most basic instrument for manipulating and refining it.
The first courses you need to take should teach you the fundamentals of the Python programming environment needed to make sense of CSV files and to find your way through complex data structures. Core concepts include understanding t-tests, sampling and distributions, how to query a Pandas DataFrame structure, and how to extract, clean and process tabular data.
The vast majority of data is mined from databases, and at least a portion of it exists in a structured form. SQL stands for “Structured Query Language” and it’s the most powerful language to “speak” with databases in order to understand them, explore every nook and cranny, and extract all the meaningful data you need for the problem at hand. Knowing how to work with SQL, create database instances in the cloud, run SQL queries, and access databases and real-world data sets from Jupyter notebooks is a must-have skill set for any data scientist.
You need to combine theory with practice by learning core concepts such as distribution, hypothesis testing and regression, as well as the fundamental Bayesian probability theory. Most machine learning modules are, in fact, built on Bayesian probability models. The Bayesian approach is an intuitive one that moves from probability to the analysis of data and allows for better accounting of uncertainty as well as providing actionable statements of assumptions that can be used in practice.
To master data science you need to learn how to solve various computational problems with algorithmic techniques. Algorithms are used to manipulate data through efficient data structures. You need to learn how to implement these structures in different programming languages, what to expect from them, and how to break large problems into more granular pieces. There are many strategies that must be learned to design an efficient algorithm, such as how to keep a binary tree balanced, how to resize a dynamic array, and how to solve problems recursively.
Machine learning is the science that allows computers to act outside the boundaries of the scripts they’re programmed to run. It’s a pervasive science that has a lot of applications in the real world, and data mining is one of them. But to approach machine learning you need to possess all the skills mentioned above. Machine learning algorithms need to be programmed with Python, and statistical approaches are the most effective ones to “teach” a machine how to become smarter.
The whole field of machine learning is extremely vast, and includes various subtopics such as supervised and unsupervised learning, model evaluation and deep learning. Although you do not necessarily need to dive as deep as learning how to program the most advanced neural networks, the more you know about the many applications of machine learning in data science, the better.
It doesn’t matter whether you’re a university student looking for new ways to broaden your horizons, or a professional wanting to enhance his or her resume. Learning these key data science concepts is all you need to give yourself a competitive advantage in the industry.
|
0.959973 |
How do I address people who use foul language in front of my kids?
Foul language can mean anything from vulgar words to racist, homophobic, and other statements that are hurtful or damaging to a specific group. Regrettably, foul language seems to be so ingrained with some people that they don’t even realize why or how their words are offensive.
Kids today see and hear a great deal of questionable language. Consequently, parents and responsible adults must be alert and proactive about the information children are receiving. For example, if you are uncomfortable with the language you hear coming from the television, make that show off-limits in your house. Similarly, if kids come home with a “new” word learned from peers, discuss with them what words are okay and which are not okay in your family.
Although addressing people – whether they be relatives, friends or strangers – who use foul language in front of your kids is not easy, as a parent and/or responsible adult, it is within your rights to ask people to avoid the use of certain words (give concrete examples) in front of your children. Always remember that because the foul words used may not seem offensive to that person, your request must begin by clarifying that you are not accusing them of being insensitive, rude or obnoxious. Then, make your request.
|
0.999707 |
What is the difference between full-grain, top-grain, and split leather?
Cowhides, in their natural state, are too thick to be used for most conventional purposes. They first must be split into thinner layers.
Full Grain Leather is outermost layer of the hide. It is leather that has not been corrected or modified outside of removing the hair. Full grain leather is often seen as the most authentic type of leather because it maintains all of the texture from the original cowhide.
When the hide is split into layers, Split Leather is taken from the inner layer of the hide. It is typically more delicate than full-grain leather, and is often used to create suede.
Top-Grain Leather is the same as full grain leather but the cowhide that is used is most often severely defective. To remedy this, top grain leather is typically sanded and then a finish coat is added to the surface. It is usually less expensive and has higher resistance to marks and blemishes than full-grain leather.
|
0.999923 |
Triceratops was a herbivore (plant-eater) that lived in the late Cretaceous period, about 72 to 65 million years ago, Triceratops was one of the dinosaurs that died out in the Cretaceous-Tertiary extinction 65 million years ago.
Triceratops was about 30 feet (9.1 meters) long, 10 feet (3 meters) tall, and weighed up to 11 tons. Its skull alone (including the neck frill) was over 6 feet (1.8 meters) long.
Hundreds of Triceratops fossils were first found in the late 19th century by famous American fossil-hunters, Othniel C. Marsh and Barnum Brown. Marsh chose the name Triceratops in 1889, and it means "three horned face". Because of the number of fossils found, and the fact that they are often found together, Triceratops is thought to have been a common dinosaur, that lived in herds.
The three horns on its face were probably used for protection. The neck frill, being solid bone, gave further protection. There were at least 15 different species of Triceratops, and some species had bony knobs set around the frill, which offered further protection still.
Many Triceratops skulls show damage to the horns or the frills. This has led some scientists to suggest that Triceratops may have had sparring contests by locking horns and pushing with the head shield, in a similar way to how male deer spar today. The use of the horns as a weapon, would probably have limited to use against real enemies such as Tyrannosaurus Rex.
Triceratops has been designated the official state dinosaur of Wyoming, since 1994.
North American Dinosaurs - Triceratops lived in North America.
Triceratops was a genus of dinosaur.
"Triceratops" means "three horned face". This name was chosen by Othniel C. Marsh in 1889.
Triceratops was a member of the Ornithischia ("bird-hipped") order of dinosaurs. What this means, is that although Triceratops was not closely related to birds, it did have similarly shaped pelvic bones.
Triceratops was a Ceratopsian - a member of a group of related herbivorous (plant-eating) dinosaurs with beaks, many of which had neck frills and horns as well.
Triceratops lived between about 72 million years ago and 65 million years ago, during the late Cretaceous period.
Triceratops was one of the dinosaurs which died out during the Cretaceous-Tertiary mass extinction at the end of the Mesozoic Era.
Triceratops was a herbivore (plant-eater).
Triceratops was about 30 feet (9.1 meters) long, and about 10 feet (3 meters) tall.
Triceratops weighed about 11 tons.
Triceratops is one of four titles in Barron's series about a little boy who has a vivid imagination and a lot of interest in dinosaurs. In this whimsical tale, he makes friends with a Triceratops and discovers how this dinosaur differs from all others. At story's end, he wakes up in his bed and finds himself cuddling a stuffed toy dinosaur. His adventure has been a dream! A pair of two-page spreads at the back of the book presents realistic line art, one illustration depicting the Triceratops as it looked in life, and the other showing its skeleton. In this series' other three storybooks, the little boy makes friends with a Stegosaurus, a Brachiosaurus, and a Tyrannosaurus Rex. Funny and fanciful full-page color illustrations on all pages.
Welcome to the world of Triceratops! Though a plant eater, this dino could pack a punch with its sharp horns and giant body. Learn all about this mighty dinosaur―where it lived, what it ate, and how it become one of the last dinosaurs to become extinct!
The Triceratops are coming over for lunch. Do you serve them plants or fish? That's what Buddy and his dinosaur siblings need to figure out before Tank and Trudie Triceratops arrive at the train station. This Little Golden Book retells an episode of the new PBS Kids animated series Dinosaur Train. It explains to young readers the difference between herbivores and carnivores—so that the next time you're dining with a dino, you'll know what to expect!
This book takes a very simple look at the Triceratops dinosaur, examining what it looked like, what it ate, how it behaved, and its special skills and features such as the horns on its head. The book also discusses how we know about Triceratops today, showing where fossils are found and how scientists put them together.
A new ninja school just opened, and Millie the Triceratops is ready to enroll! It can’t be that hard to be quiet, sneak around, and kick hard, can it? Millie might be in for quite the surprise! Discussion questions, an interactive look-and-find fact section, and dinosaur facts complete this energetic picture book from the Dinosaur Dreams series.
HIGH-QUALITY CONSTRUCTION. This Walking Triceratops Dinosaur is expertly crafted using durable plastic construction to provide long-lasting strength and endless hours of fun for boys and girls alike.
REALISTIC SOUNDS. Dinosaur roars and Godzilla-like sound effects are sure to be enjoyed by any dinosaur lover. Children will feel like they're back in prehistoric times or watching a great dinosaur movie.
GREAT GIFT IDEA. A perfect toy for any boy or girl who loves large, extinct reptiles, this WolVol Walking Triceratops Dinosaur will make a great gift for birthdays, holidays and other special occasions.
The WolVol Walking Dinosaur Triceratops Toy gives the kids all the sounds and action of a real Triceratops Dinosaur. Run after the Triceratops while he walks away by himself. Very attractive and interesting. Great gift idea for children who love Dinosaur toys.
Get ready for dino-mite action and adventure when all-new Jurassic park 2 roars into theaters on June 22, 2018. This assortment of dinosaur action figures is inspired by the movie and feature push button sound activation and a signature attack move iconic to its respective species.
|
0.970564 |
My great grandfather was PW Dawkins. I am interested in finding out when and why he resigned from the company. I realize that is was rather early in the development of the company, however, I would appreciate any information that is available.
North Carolina Mutual Insurance Co. was established in 1898 as the North Carolina Mutual and Provident Association by John Merrick, Dr. AM Moore, PW Dawkins, DT Watson, WP Pearson, EA Johnson, and Dr. James E Shepard. This coalition of men appears to have grown out of the Grand United Order of the True Reformers, a mutual-benefit society founded in 1881 by William Washington Browne. John Merrick, a member of the True Reformers, helped form the Royal Knights of King David with John Wright, WA Day, JD Morgan, and TJ Jones. As was common in the 19th and early 20th century, fraternal organizations and 'friendly societies' were the source of life, burial, and health insurance. Although the sources I've looked at seem unclear, the Royal Knights of King David were evidently not financially successful in the insurance business, but the relationships therein formed the seed of the establishment of the North Carolina Mutual and Provident Association.
John Merrick had been a successful barber in Raleigh, and was evidently, in part, persuaded to move to Durham by Washington Duke, Julian Carr, and WT Blackwell. Once in Durham, he established a successful barbershop business as well as a real estate business - evidently assisted by a loan from Julian Carr. Dr. Aaron Moore had moved to Durham in 1888 to begin his medical practice - the first African-American physician in Durham. CC Spaulding was a nephew of Dr. Moore and became first an agent for the company, and then, quickly, chief of agents.
The company struggled initially, and the first death claim of $40 necessitated an additional capital infusion from the stockholders to keep the company afloat. The initial financial troubles of the company caused all organizers except for Merrick, Spaulding, and Moore ("The Triumvirate") to resign. However, the three men were successful in keeping the business afloat, and "using sound scientific principles" building a prosperous company.
The insurance company was first located in Dr. Moore's office on Main St., at the site of the "old courthouse". Parrish St. was transitioning from tobacco warehouses to commercial structures.
In 1906, the NC Mutual and Provident Assn. built their own office building, just to the right of the Christian-Harward building in the above picture.
Looking northeast from Parrish St., 1911.
The insurance company offices were located on the second floor, while the first floor was rented to a shoe store and a clothing store. By 1907, the principals had started Mechanics and Farmers bank, located in the same building.
Both the insurance company and bank were quite successful. John Merrick was the first president; after his death in 1919, Dr. Aaron Moore became president. In 1921, the company had grown to such an extent that the existing building on Parrish St. was not large enough. It was demolished, and an impressive neoclassical revival building - similar in style to the First National Bank building at W. Main and Corcoran - was errected in its place. The six-story structure was designed by local architects Rose & Rose.
A view of Parrish Street, looking northwest, 1924.
A view of the North Carolina Mutual building, looking northeast, 1920s.
Mechanics and Farmers Bank was located on the first floor, Bankers Fire Insurance Company (organized as a separate division in 1920) on the second floor, and NC Mutual the remaining four floors and the basement.
After Dr. Moore died in 1923, CC Spaulding became president, a post he would hold for the following 29 years.
Above, two views of the building - the one on the left from the 1920s, the one on the right from the 1930s. Note in the second that the Christian-Harward building next door has added a third story.
CC Spaulding built an ever more successful company, as did the presidents following his death in 1952. By the 1960s, the insurance company had outgrown its Parrish St. building as well.
Above, a view of the first floor of the NC Mutual building, 1963. The original windows had been replaced by jalousie windows.
NC Mutual purchased Four Acres, BN Duke's former mansion, and constructed a 12-story international-style structure in its place in 1965. While the insurance company moved to this large new structure, Mechanics and Farmers Bank remained in the original building on Parrish St. The "North Carolina Mutual Life Insurance Co." lettering on the facade was replaced by "Mechanics and Farmers Bank." The original awnings and entrances were removed - the two side entrances were filled, and a modern, single canopy entrance was put on the building.
At some point later - I'm not sure when, the building underwent restoration, including replacement of the jalousie windows with more historically appropriate sash windows. Unfortunately, the restoration did not include the original entrance.
|
0.999145 |
How do I change the battery without losing data?
The data in pack A: is held in RAM, which means that without electricity, the data will be lost (data on Datapacks and Rampacks will not be lost however). It is possible to swap batteries fast enough that there is enough charge to keep the data, but this is not 100% reliable (don't get paranoid: it works 99.9% ).
The best thing to do is to connect the organiser to a mains adapter while you carry out the switch.
Remove sliding case and battery cover.
Put the replacement battery as near as possible, and in the correct orientation (smaller plus pole closer to the organiser).
As quickly as possible flip out the old battery and insert the new one.
Be careful not to touch the ON key while you swap batteries, as this would force a cold boot.
If this happened while the battery was out, it would have the same effect as accidentally pressing the ON key.
The best thing to do if you need to change the battery without external backup of either power or data, is put the organiser ready with the covers open and a new battery with it, beside you during some quiet moment, and as soon as you hear that quiet click, wait a second, and then you will have more than enough time to do it without haste.
After shutdown, the next click event will be exactly 34 minutes and 8 seconds later.
And try to remember if you have set a (diary) alarm! If so: don't change the battery when the alarm is due!
Someone told me that he didn't find the battery!
The battery is inserted at the bottom of the organiser. The battery compartment is hidden by the sliding cover. To remove the cover, just keep pulling after the first stop (when the keyboard is exposed). You'll see the battery cover then.
|
0.991102 |
What is the primary cause of suffering?
1. The primary cause of suffering is that we have lost sight of our innate divinity, our spiritual origin. We have forgotten that each one of us is a spiritual being, a son of God, an heir to all the ideas that inhere in God-Mind.
We have forgotten that, as spiritual beings, we have dominion and authority over our thoughts and feelings. We have used our formative power of thought in wrong ways and have based our thinking on negative reports that were the result of wrong use of the five senses. Because of this we have built up negative beliefs in our consciousness, such as fear of old age, lack, and sickness, and we are suffering the effects.
Sometimes, in our ignorance, we have believed that it is God's will for us to suffer, and have hoped thereby to discipline ourselves into being good. What we need to know is that as spiritual beings we are already "good," being of the same nature as our Father. If we have been guilty of thoughts and acts unworthy of our true nature, we must voluntarily make the change and begin to think and act in accord with our divine nature.
(a) Primary cause: Forgetfulness of our divine nature as a son of God.
(1) Wrong thinking, which has built up a belief in separation from God. This has led to fear that we stand alone, and the feeling that our ability to meet the challenges of our daily life is inadequate.
(2) Our unwillingness, because of ignorance, fear, and indifference, to make a determined effort to release the wrong mental beliefs that bind us and produce unhappy conditions.
The remedy for suffering is to realize that we are spiritual beings; then to do all that is necessary to base the activities of thinking and feeling (our formative power of thought) on Truth, so that only true words, actions, reactions, and conditions may result.
There are those who have felt, and still feel, that suffering of itself turns us to God. This is not true. It is rather our desire to be free from suffering that can cause us to turn to God. On the other hand, if we do nothing about the desire to be free, the suffering may cause us to be filled with feelings of bitterness, frustration, discouragement, so that we continue to suffer in mind, body, or affairs, resigning ourselves to what we believe is God's will.
The lessons that follow will show us the steps that we need to take in order to come into the realization of our true nature, so that we may free ourselves from the suffering that many human beings experience. Then we can express all the loveliness, beauty, and dignity of our own divine nature, here and now.
Following Entry: What is the Fountainhead from which we draw all our good, such as joy, strength, peace, health, and abundance?
|
0.973811 |
Define and explain statistics terms used in quality control.
Estimate the likelihood of samples falling within one, two, or three standard deviations of the mean given a normal distribution caused by random factors.
Quality is a relative term, which means that something is of high or low quality compared to what it is required to be. According to the International Organization for Standardization (ISO), quality is “the degree to which a set of inherent characteristics fulfill requirements” (International Organization for Standardization, 2005; Project Management Institute, 2008). The requirements of a product or process can be categorized or given a grade. The quality is determined by how well something meets the requirements of its grade. Consider the following examples.
Petroleum refiners provide gasoline in several different grades based on the octane rating because higher octane ratings are suitable for higher compression engines. Gasoline must not be contaminated with dirt or water, and the actual performance of the fuel must be close to its octane rating. A shipment of low-grade gasoline graded as 87 octane that is free of water or other contaminants would be of high quality, while a shipment of high grade 93 octane gas that is contaminated with dirt would be of low quality.
John has antique furniture that is in excellent condition that was left to him by his grandmother. The pieces are important to John for sentimental reasons and they are also valuable. John decides to hire movers (high-grade professionals) to load his furniture into the truck using appropriate padding and restraints to prevent dents and scratches during the long trip to Atlanta and then to unload the truck in Atlanta. John’s standard for high quality is that no observable damage occurs to his large pieces of furniture, especially the antiques. If the furniture arrives in his new apartment without a single dent, scratch, or other damage, the activity will be of high quality.
John’s standard for packing his kitchen is lower. His dishes are old and cheap, so he decides to trust his inexperienced friends (low-grade amateurs) to help him pack his kitchen. If a few of the dishes or glassware are chipped or broken in the process, the savings in labor cost will more than make up for the loss, and the dishes can be easily replaced. If John has a few chipped dishes and a broken glass or two by the time he is unpacked in Atlanta, he will consider the kitchen packing to be of high quality.
For most people, the term quality also implies good value—getting your money’s worth. For example, even low-grade products should still work as expected, be safe to use, and last a reasonable amount of time.
Determining how well products meet grade requirements is done by taking measurements and then interpreting those measurements. Statistics—the mathematical interpretation of numerical data—is useful when interpreting large numbers of measurements and is used to determine how well the product meets a specification when the same product is made repeatedly. Measurements made on samples of the product must be between control limits—the upper and lower extremes of allowable variation—and it is up to management to design a process that will consistently produce products between those limits.
A petroleum refinery produces large quantities of fuel in several grades. Samples of the fuels are extracted and measured at regular intervals. If a fuel is supposed to have an 87 octane performance, samples of the fuel should produce test results that are close to that value. Many of the samples will have scores that are different from 87. The differences are due to random factors that are difficult or expensive to control. Most of the samples should be close to the 87 rating and none of them should be too far off. The manufacturer has grades of 85 and 89, so they decide that none of the samples of the 87 octane fuel should be less than 86 or higher than 88.
If a process is designed to produce a product of a certain size or other measured characteristic, it is impossible to control all the small factors that can cause the product to differ slightly from the desired measurement. Some of these factors will produce products that have measurements that are larger than desired and some will have the opposite effect. If several random factors are affecting the process, they tend to offset each other most of the time, and the most common results are near the middle of the range. This idea is called the central limit theorem.
If the range of possible measurement values is divided equally into subdivisions called bins, the measurements can be sorted, and the number of measurements that fall into each bin can be counted. The result is a frequency distribution that shows how many measurements fall into each bin. If the effects that are causing the differences are random and tend to offset each other, the frequency distribution is called a normal distribution, which resembles the shape of a bell with edges that flare out. The edges of a theoretical normal distribution curve get very close to zero but do not reach zero.
A refinery’s quality control manager measures many samples of 87 octane gasoline, sorts the measurements by their octane rating into bins that are 0.1 octane wide, and then counts the number of measurements in each bin. Then she creates a frequency distribution chart of the data, as shown in Figure 10.1 “Normal Distribution of Measurements of Gasoline Samples”.
If the measurements of product samples are distributed equally above and below the center of the distribution as they are in Figure 10.1 “Normal Distribution of Measurements of Gasoline Samples”, the average of those measurements is also the center value that is called the mean and is represented in formulas by the lowercase Greek letter µ (pronounced mu). The amount of difference of the measurements from the central value is called the sample standard deviation or just the standard deviation. The first step in calculating the standard deviation is subtracting each measurement from the central value and then squaring that difference. (Recall from your mathematics courses that squaring a number is multiplying it by itself and that the result is always positive.) The next step is to sum these squared values and divide by the number of values minus one. The last step is to take the square root. The result can be thought of as an average difference. (If you had used the usual method of taking an average, the positive and negative numbers would have summed to zero.) Mathematicians represent the standard deviation with the lowercase Greek letter σ (pronounced sigma). If all the elements of a group are measured, it is called the standard deviation of the population and the second step does not use a minus one.
The chart shows that the most common measurements of octane rating are close to 87 and that the other measurements are distributed equally above and below 87. The shape of the distribution chart supports the central limit theorem’s assumption that the factors that are affecting the octane rating are random and tend to offset each other, which is indicated by the symmetric shape. This distribution is a classic example of a normal distribution. The quality control manager notices that none of the measurements are above 88 or below 86 so they are within control limits and concludes that the process is working satisfactorily.
The refinery’s quality control manager uses the standard deviation function in his spreadsheet program to find the standard deviation of the sample measurements and finds that for his data, the standard deviation is 0.3 octane. She marks the range on the frequency distribution chart to show the values that fall within one sigma (standard deviation) on either side of the mean. See the figure below.
Most of the measurements are within 0.3 octane of 87.
For normal distributions, about 68.3 percent of the measurements fall within one standard deviation on either side of the mean. This is a useful rule of thumb for analyzing some types of data. If the variation between measurements is caused by random factors that result in a normal distribution and someone tells you the mean and the standard deviation, you know that a little over two-thirds of the measurements are within a standard deviation on either side of the mean. Because of the shape of the curve, the number of measurements within two standard deviations is 95.4 percent, and the number of measurements within three standard deviations is 99.7 percent. For example, if someone said the average (mean) height for adult men in the United States is 5 feet 10 inches (70 inches) and the standard deviation is about 3 inches, you would know that 68 percent of the men in the United States are between five feet seven inches (67 inches) and six feet one inch (73 inches) in height. You would also know that about 95 percent of the adult men in the United States were between five feet four inches and six feet four inches tall, and that almost all of them (99.7 percent) are between five feet one inches and six feet seven inches tall. These figures are referred to as the 68-95-99.7 rule.
The refinery’s quality control manager marks the ranges included within two and three standard deviations, as shown below.
Some products must have less variability than others to meet their purpose. For example, if one machine drills a hole and another machine shapes a rod that will slide through the hole, it might be very important to be sure that if the smallest hole was ever matched with the widest rod, that the rod would still fit. Three standard deviations from the control limits might be fine for some products but not for others. In general, if the mean is six standard deviations from both control limits, the likelihood of a part exceeding the control limits from random variation is practically zero (2 in 1,000,000,000). Refer to Figure 10.4 “Meaning of Sigma Levels”.
A new refinery process is installed that produces fuels with less variability. The refinery’s quality control manager takes a new set of samples and charts a new frequency distribution diagram, as shown below.
The refinery’s quality control manager calculates that the new standard deviation is 0.2 octane. From this, he can use the 68-95-99.7 rule to estimate that 68.3 percent of the fuel produced will be between 86.8 and 87.2 and that 99.7 percent will be between 86.4 and 87.6 octane. A shorthand way of describing this amount of control is to say that it is a five-sigma production system, which refers to the five standard deviations between the mean and the control limit on each side.
Quality is the degree to which a product or service fulfills requirements and provides value for its price.
Statistics is the mathematical interpretation of numerical data, and several statistical terms are used in quality control. Control limits are the boundaries of acceptable variation.
If random factors cause variation, they will tend to cancel each other out—the central limit theorem. The central point in the distribution is the mean, which is represented by the Greek letter mu, µ. If you choose intervals called bins and count the number of samples that fall into each interval, the result is a frequency distribution. If you chart the distribution and the factors that cause variation are random, the frequency distribution is a normal distribution, which looks bell shaped.
The center of the normal distribution is called the mean, and the average variation is calculated in a special way that finds the average of the squares of the differences between samples and the mean and then takes the square root. This average difference is called the standard deviation, which is represented by the Greek letter sigma, σ.
About 68 percent of the samples are within one standard deviation, 95.4 percent are within two, and 99.7 percent are within three.
According to the ISO, quality is the degree to which a set of inherent characteristics fulfill ___________.
The upper and lower extremes of acceptable variation from the mean are called the __________ limits.
The odds that a sample’s measurement will be within one standard deviation of the mean is ____ percent.
How is quality related to grade?
If the measurements in a frequency distribution chart are grouped near the mean in normal distribution, what does that imply about the causes of the variation?
If you have a set of sample data and you had to calculate the standard deviation, what are the steps?
If a set of sample measurements has a mean of 100, a normal distribution, a standard deviation of 2, and control limits of 94 and 106, what percentage of the samples are expected to be between 94 and 106? Explain your answer.
|
0.988739 |
OPTION A. From 8 AM to 10:30 AM.
OPTION B. From 9 AM to 11:30 AM.
You end taking all the time you need for your breakfast.
|
0.963653 |
The Rice Owls football team represents Rice University in NCAA Division I college football. The Owls have competed in Conference USA's Western Division since 2005. Rice Stadium, built in 1950, hosts the Owls' home football games.
The Owls played in the eighteenth Cotton Bowl Classic against the Crimson Tide of Alabama. The game featured one of the most famous plays in college football history when Rice's Dickey Moegle (later Maegle) burst free on a sweep play, and on his way down the sideline, was tackled by Tommy Lewis, who had come off the Alabama sideline without his helmet to tackle Moegle. Referee Cliff Shaw saw Lewis come off the bench and gave the Owls the 95 yard touchdown. Rice would win the game 28–6, with the only Crimson Tide score coming from Lewis. The yardage added to Moegle's 265 yards rushing, a Cotton Bowl Classic record that would stand until Tony Temple's effort in 2008. This would be the Owls' last bowl win until the 2008 Texas Bowl, a win which also secured the Owls their first 10-win season since 1949.
Rice Stadium also hosted a speech by John F. Kennedy on September 12, 1962. In it, he used the Rice football team to challenge America to send a man to the moon.
But why, some say, the moon? Why choose this as our goal? And they may well ask why climb the highest mountain? Why, 35 years ago, fly the Atlantic? Why does Rice play Texas? We choose to go to the moon. We choose to go to the moon in this decade and do the other things, not because they are easy, but because they are hard, because that goal will serve to organize and measure the best of our energies and skills, because that challenge is one that we are willing to accept, one we are unwilling to postpone, and one which we intend to win, and the others, too.
† 15–27–2 overall per NCAA due to 1975 forfeit win over Mississippi State.
Rice has won seven conference championships, four outright and three shared.
Rice has participated in twelve bowl games, garnering a record of 7–5.
Rice Stadium was built in 1950, and has been the home of Owls football ever since. It hosted the NFL Super Bowl in January 1974. It replaced the old Rice Field (now Rice Track/Soccer Stadium) to increase seating. Total seating capacity in the current stadium was reduced from 70,000 to 47,000 before the 2006 season. The endzone seating benches were removed and covered with tarps, and all of the wooden bleachers were replaced with new, metal seating benches in 2006, as well. The stadium is also currently undergoing further renovations.
Rice and SMU were members of the same conference from 1918 through 2012, and have played each other 90 times as of 2012 with SMU leading the series 48–41–1. The rivalry is because Rice and SMU were two of four private schools in the Southwest Conference (Baylor and TCU were the others). Rice and SMU were also the two smallest schools in the conference, were located in the two largest cities of any teams in the conference (Houston and Dallas, respectively), and have historically been considered the two best private universities in Texas.
SMU leads the series 48–41–1 as of 2017.
Rice participates in a crosstown rivalry with Houston. UH and Rice play annually for the Bayou Bucket, a weathered bucket found by former Rice guard Fred Curry at an antique shop. Curry had it designed into a trophy for $310. The two universities are separated by five miles in Houston. The Cougars lead the series 32–11.The Cougars' 2013 move from Conference USA to the American Athletic Conference has jeopardized the status of the series.
Houston leads the series 31–11 after a win in September 2018.
Rice and Texas have maintained a largely one-sided rivalry beginning in the early days of the Southwest Conference. Texas' 28 consecutive victories from 1966–1993 represents the sixth longest single-opponent winning streak in college football history. In 1994, in a nationally televised ESPN game, Rice scored a major upset win over Texas, but since then Texas has resumed series dominance. Despite the dissolution of the Southwest Conference, Texas and Rice still play on a "near annual" basis, allowing the Longhorns to keep a high profile in the state's largest city and the fourth largest city in the United States.
Texas leads the series 72–21–1 as of the conclusion of the 2017 season.
Eight former Rice players and coaches have been inducted in the College Football Hall of Fame.
Weldon Humble Guard 1941–1943, 1946 1961 He was a consensus All- America choice. Like most athletes of his time, Weldon was required to suspend his career for military service during World War II.
As of 2017, the following 18 players have been named All-America with 6 selection being consensus.
Announced schedules as of July 5, 2018.
^ Color Palette (PDF). Rice Athletics Official Brand Book. Rice Owls. April 11, 2017. Retrieved April 13, 2017.
^ Dickey Moegle in the 1954 Cotton Bowl Classic. Article. Retrieved on December 29, 2008.
^ Associated Press (2008-12-30). "Rice rolls Western Michigan for first bowl win since '54". ESPN.com. Retrieved 2008-12-31.
^ "John F. Kennedy Moon Speech - Rice Stadium". Er.jsc.nasa.gov. Retrieved 26 December 2018.
^ "Al Conover Coaching Record". College Football at Sports-Reference.com.
^ "Winsipedia - Rice Owls vs. SMU Mustangs football series history". Winsipedia.
^ "Winsipedia - Houston Cougars vs. Rice Owls football series history". Winsipedia.
^ "Winsipedia - Rice Owls vs. Texas Longhorns football series history". Winsipedia.
^ "Inductees - Football Players & Coaches - College Football Hall of Fame". www.cfbhall.com.
^ "2017 Media Guide" (PDF). riceowls.com. Rice Athletics. p. 177. Retrieved April 23, 2018.
^ "2017 FOOTBALL AWARD WINNERS" (PDF). ncaa.org. NCAA. p. 25. Retrieved April 23, 2018.
^ "Rice Owls Football Schedules and Future Schedules". Retrieved June 29, 2017.
|
0.92929 |
Browse the article What's the world's longest suspension bridge?
The motorway leading to the Akashi Kaikyo Bridge. The bridge transformed a 45-minute ferry ride into a four-minute car trip.
Six years into the construction process, and in 1995 the Akashi Kaikyo Bridge had survived its first earthquake. Surely, the going would get easier, right?
Wrong. The bridge's support cables became the next point of contention. Because the longest suspended portion of the bridge measured more than a mile, ordinary steel cables were just too heavy. Instead, Japanese engineers had to invent a solution: a new type of steel wire that was flexible, incredibly strong and composed of a new blend of alloys and silicone. At just 5 millimeters (1/5 inch) thick, a single strand of this ingenious steel could support the weight of three rhinoceri. Thousands of these strands were compacted into a single cord of steel wire more than 300,000 kilometers (190,000 miles) long and installed by helicopter to hold up the Akashi Kaikyo's roadways [source: Curiosity Aroused].
To lift the 290 sections of roadway deck into place, cranes were built just for this project. The deck's trusses included a strategic triangular design to allow airflow, but also incorporated vertical arms to act as rudders, stabilizing the deck during high winds [source: National Geographic].
Finally, in 1998, 10 years after construction began on the Akashi Kaikyo Bridge, the final piece of deck was in place. The six-lane suspension bridge, which transformed a 45-minute ferry ride into a four-minute journey by car, was complete. But not finished.
Although designed to last 200 years, the Akashi Kaikyo Bridge requires daily maintenance. The Honshu-Shikoku Bridge Authority, charged with the bridge's upkeep, operates a control center that monitors everything from the bridge's horizontal and vertical movement to the air conditioning system designed to keep its steel trusses from corroding. Travelers pay a toll of 2,300 yen (about U.S.$25) to cross the bridge by car [source: Honshu-Shikoku Bridge Authority].
Japanese engineers may have designed and built a suspension bridge that holds world records in triplicate, but they won't be able to rest on their laurels. Emerging technology, including lightweight carbon-fiber cables, could someday make it possible to construct suspension bridges with a reach 10 times that of the Akashi Kaikyo [sources: Curiosity Aroused, National Geographic, Ryan].
Author's Note: What's the world's longest suspension bridge?
One of my dreams is to visit Japan. My parents have traveled to Japan, my aunt and uncle made their home in Tokyo, and my husband spent the first two years of his life there. And now I can add one more line item to my travel goals: traversing the Akashi Kaikyo Bridge. While the reason the bridge came into being is a sad one, it's impressive to discovery the ingenuity that went into building it. It's one thing to build the first suspension bridge of that length. It's another to invent the materials and techniques to make it possible.
|
0.999994 |
Which is faster, a Weasel or a Rabbit?
Description Description:Long tailed weasels are found in most of Northern and Central America's temperate and tropical habitats. They are long and slender with long shaggy tails. They shed twice a year, and are white in winter and brown during summer. They are agile hunters that track the scent of prey. Description:Rabbits or Bunnies, are fairly small, soft, and fuzzy animals, which have long, often pointed ears. They are frequently kept as pets, and come with various fur colors and patterns including white, brown, black, tan, and spotted.
|
0.955534 |
What does 2016 hold for brand experiences?
2015 was another big year for brand experiences. The industry saw impressive growth, as revealed in the IPA’s Bellweather reports, where events ranked second only to internet spend in Q2 and Q3.
Millennials, the likely target of most marketing briefs in 2016, continued to value experiences over anything else. In 2015, it was ideas delivered with the most creative of technology that meant we were able to give these consumers the unforgettable moments they just had to share.
1. Quality over quantity: A trend towards brands investing more in higher quality experiences that speak to fewer but more influential people.
2. Deeper immersion: In 2015 we saw an increase in multi-sensory experiences. In 2016, immersive experiences will go a step deeper, think multi-sensory 2.0 where physical sensations are fused with creative technology to create the ultimate mind-blowing VR experiences.
3. Second Screens: While brands continue to build brilliant physical experiences, they have yet to fully tap into the power of engaging consumers through their mobiles during live events. Using a second screen at home is rapidly becoming the norm, but at sporting and music events it still has a long way to go.
4. Socially responsible: Social issues have become a major focus for many over the past year, with obesity, gender and sexuality being debated more than ever before. This is something that brands will need to be increasingly sensitive towards when planning experiences.
5. Measuring advocacy: With the growing influence of experiences, especially via word of mouth and social media, the success of physical engagement can no longer be measured in terms of direct interactions and linked uplifts in sales. Brands in 2016 will need to consider other effective ways of measuring success, so we anticipate a move towards looking more at advocacy by focusing on metrics such as Net Promoter Score and its positive shift thanks to experiences.
|
0.847771 |
Some people prefer to praise the good things children have done; some people prefer to punish the bad things kids have done, which choice do you think is more appropriate and why? Give your explanations in your response.
In my view, I think compliment is the best choice.
Compliment will make children feel motivated and they might be more likely to repeat the good things they have done. After listening the praise from parents, seeing the smiles from teachers, getting the recognition from others, children will feel a sense of achievement and happiness, they will know their deeds are beneficial to others and next time they will also do good things to others, such as picking up the rubbish on the road or respecting the elderly and so on. However, if always getting punishment or criticism from others, children might become timid and diffident, which is harmful to their growth.
feel a sense of ... 感到,后接n.
|
0.996598 |
San Antonio, officially the City of San Antonio, is the second most populated city in the state of Texas. The city is the county seat of Bexar County, due to the U.S. Armed Forces numerous facilities in and around San Antonio it has been nicknamed Military City, USA. It is a popular tourist destination, with the Alamo Mission in San Antonio as the top tourist attraction. The second most visited attraction is the San Antonio River Walk, which is a lined by bars, shops, restaurants, nature, and public artwork.
San Antonio Housing statistics According to US News the average cost to buy a home in San Antonio is approximately $200,000, which is lower than the national average. The cost of living in the city is also slightly lower than the national average. The price to buy a home vary in the neighborhoods, North Central and Downtown are the most expensive areas to buy a home in. There are many affordable alternatives for those who are looking to rent instead of buying a home in San Antonio. The average monthly rent in the city is low when compared to the average rent in the country.
Living in San Antonio San Antonio is a popular tourist destination with the Alamo Mission as the top attraction. The Alamo Mission in San Antonio along with the city's other four missions located in the San Antonio Missions National Historical Part have been named UNESCO World Heritage sites. However, the city is also home to animal attractions, including the world's largest SeaWorld and the historic San Antonio Zoo. There are also several commercial amusement parks, including Morgan's Wonderland which is a theme park for children with special needs.
The McNay Art Museum is located in the city and it is the first museum of modern art in Texas. Of course, there are other institutions and museums, such as ArtPace, Blue Star Contemporary Art Center, and the Texas Rangers Museum. Along with the Alamo, the city's most famous tourist attraction is the San Antonio River Walk which is a city park and a network of walkways along the banks of the San Antonio River. The River winds and loops under bridges as two parallel sidewalks and are lined with bars, shops, restaurants, nature, and public artwork.
San Antonio Transportation and commutes Almost all working San Antonio residents commute by driving on their own, it is the only major city in Texas without toll roads. The main public transportation service is provided by the city's metropolitan transit authority, VIA Metropolitan Transit. The city has been working on creating bicycle paths.
They have built bike lanes, routes or off-road paths; these paths travel along the San Antonio River, linear greenways, or city parks. A bicycle sharing services exist to serve both residents and visitors called San Antonio Bike Share, operated and maintained by Biker World. Amtrak has daily departures to Chicago and the thrice-weekly New Orleans to Los Angeles, Sunset Limited. The San Antonio International Airport (SAT) have non-stop departures to primarily domestic destinations, but also have flights to international destinations.
Military City, USA San Antonio is home to one of the largest concentrations of military bases in the country and has therefor been nicknamed Military City, USA. Lackland Air Force Base, Brooke Army Medical Center, Randolph Air Force Base, and Fort Sam Houston all reside in or around the city. The city has one of the country's largest active and retired military populations, over 30,000 students graduate from military training each year.
|
0.970398 |
He retains his cardinalship for life, but his infirmity almost certainly renders him "inactive" and so ineligible as an elector, it presumably also puts him out of the running for pope.
If that is not party political, your Cardinalship, I don't know what is.
The cardinalship is a title conferred by the pope, and it is something that the pope can take away It is something he should take away if he has any sense of how his inaction is diminishing his moral authority.
|
0.962219 |
Choose the type of modular you want for your room. Some modular sectional sofa have two that are placed at an angle perpendicular one against another, while others have a long sofa with a sofa at one end. The couch is like a bed where you can lie or sit with your feet up. Modular come in different styles, and with the back curved or straight. Let’s assume you choose a standard modular which has a long sofa and a daybed. It is placed in an “L”.
Place a table next to the couch where the couch is. You can Place some decorative objects such as framed images or a vase in this table, or a telephone and simply a lamp. The person you relax on the couch can reach this table for a drink rather than the coffee table. Place a plant on the other side of the modular sectional sofa (the standard side of the sofa) if you want.
Place your entertainment center up against the wall which is adjacent to the window, preferably parallel to the long section modular sectional sofa. Place another small table next to the entertainment center for more decorative objects or framed pictures.
|
0.999934 |
How do I reduce the size of an image which is attached in Stack Overflow questions?
I found large size images attached in many Stack Overflow questions.
I feel the formatting does not look good. While moderating I have not found any option to reduce the image size.
How do I reduce a large image while moderating questions to improve Stack Overflow quality?
If the images are hosted on the Stack Exchange imgur.com account (which most are), you can add a h, l, m, t, b or s to the filename in the URL (before the extension) to get resized versions.
https://i.stack.imgur.com/a9LCg.jpg to get a more manageable size screenshot.
and it'll link the reduced-size version to the full-size image.
I've gone ahead and used the medium (m) version for that post to reduce the size of the retina-resolution iPhone screenshots, linking each to the full-resolution version.
The square options will scale the image (up as well as down) and crop to fit the size, thumbnails are only ever scaled down (smaller images are not scaled up) to fit with the square maximum dimensions.
NOTE: Resizing only the preserves the first frame of an animated GIF image. If you need to resize an animation, use HTML markup instead (i.e. use <img>).
WARNING: Imgur seems to have consistency issues with generating the different sizes of images, where not all suffixes give you a resized image; and are instead served the original image. I don't know what causes this to happen or what a work-around might be.
You can add a query string to the URL to specify some specific sizes. The available sizes are dimensions that are the powers of two from 16 up to 512 (i.e. X can be 16, 32, 64, 128, 256 and 512).
Using this method will produce a square image. The image may be cropped and/or resized without preserving the image's aspect ratio.
If you want to specify other sizes, you can use an <img> tag. The full image will be downloaded and scaled by the user's browser to fit the specified width and/or height.
The width attribute tells the browser to constrain the size, the height is scaled along automatically.
When using an <img> tag, any attributes must be specified in the following order or the image will not be displayed: src, width, height, alt, title. The values for the width and height attributes can be up to 999.
Source: What HTML tags are allowed on Stack Exchange sites?
Not the answer you're looking for? Browse other questions tagged support images .
How can I put images side by side in a Stack Overflow question?
Is there a way of adding some caption or description to an image?
Why does this image sizing specification not work?
Why is uploading Scalable Vector Graphics (SVG) not supported?
Are there any built-in resources that you can link to from within question to use in a code snippet on the Stack Overflow domain?
How do I improve visibility of a question as a newcomer?
Flaws in the Stack Exchange system. How to deal with them?
To what extent is Stack Overflow for Teams subject to the Code of Conduct and general site policies?
|
0.779062 |
The keyboard shortcut to start a search from anywhere in Bitbucket is " / ". Search terms can match the file path, filename, or any content within the file.
Search results in Bitbucket are code aware, which means your search results are ranked so that function and type definitions will display before other results. You can also use operators or modifiers to help you to refine search results.
Files can be found just by searching their filename or parts of the path. Using the path in your search only supports exact matches of path segments, but you can search using parts of the filename without a modifier. See the examples in the table below.
To search for a phrase, enclose the words in double quotes. For example, to find files with instances of the word abstract followed by the word class (or part of a word), your query would look like this.
This query would also find instances such as " abstract(class ".
The same search query without the double quotes would return files that contain both abstract and class in any order.
You cannot use AND in your search query; multiple search terms are implicitly combined. For example, a query for bitbucket jira means that only files that contain both bitbucket and cloud are matched.
MyClass AND MyComponent NOT "YourClass"
Use a modifier in the form key:value.
Modifiers can be negated using the NOT operator – see the section search operators above.
Code search can be restricted to only consider a particular path. For the purpose of search, file paths are split up into segments (parts separated by /) including directories and filenames. Matching is done on one or more segment and is case-insensitive. There is no partial matching within a segment.
Code search can be restricted to only consider a particular language or a particular file extension. For some languages, adding a language criteria is equivalent to specifying the file extension. For example, lang:java is equivalent to ext:java. For other languages, multiple file extensions are mapped to a single language. For example, the .hs, .lhs and .hs-boot file extensions are used for the Haskell programming language, and will be matched when specifying lang:haskell.
For example, here is a query that would find files with either the .js or the .jsx extension, that are in either repo A or repo B, and that contain the phrase "search-term".
ext:js project:myProject MyComponent Finds files with the js extension that are in the myProject project that contain the term MyComponent .
Search uses the main branch in a repo (usually the main branch will be master).
Wildcard searches (e.g. qu?ck buil*) are not supported.
Regular expressions are not supported in queries.
|
0.997424 |
Was Ariana Grande's Grammy's dress to honor Mac Miller?
Fans think Ariana Grande's Grammy's dress was to honor Mac Miller based on the fact that she looked like a real life Cinderella.
And since Mac Miller wrote his song "Cinderella" about Ariana Grande and he was up for a Grammy nomination fans think she was honoring him with her attire.
She really did look like a real life Cinderella!
|
0.99996 |
As children rode their bikes to the sound of leaf blowers on Wednesday, Redwood Avenue in Costa Mesa showed few signs that a neighbor had been killed there three days earlier.
A child's smiley-faced basketball sat in the front yard, while a skull-and-crossbones doormat rested at the front door of the small house where police say Thomas Michael Wilhelm, 48, shot his former girlfriend and business partner, Christian Marie Murray, 45.
An earlier version of the headline to this story should have attributed the accusation that Wilhelm stole the gun to his neighbor John Michael.
Wilhelm's arraignment has been moved to July 25. He faces murder and felony firearm charges, according to court documents.
Next-door neighbor John "Jack" Michael, 79, said Wilhelm stole the gun he allegedly used to shoot Murray several times in the chest from him.
Police discovered Murray in a bedroom of the home she shared with Wilhelm in the 2900 block of Redwood. She was pronounced dead at Western Medical Center in Santa Ana.
Michael said he and Wilhelm were good friends, going so far as to keep ladders on either side of the fence so they could easily visit each other.
On Sunday, about 15 or 20 minutes before gunshots rang out, Wilhelm, who seemed agitated, visited Michael in the workshop adjacent to his house, he said.
According to Michael, Wilhelm said that he planned to move away because of increased tension with Murray.
During the visit, Wilhelm excused himself, saying he had to use the restroom, Michael said.
Instead, Wilhelm went to an upper level of the shop and stole a pistol, Michael said.
Minutes later Michael said he heard gunshots, and then through his kitchen window saw Wilhelm climb into his yard. Wilhelm returned to the workshop, taking a shotgun, according to Michael.
Police said Wilhelm tried to commit suicide using a shotgun. Michael said he understands the shotgun went off when Wilhelm tripped and he didn't know how to reload the gun.
The main source of the fighting between Murray and Wilhelm was a sprinkler business they shared that she was pushing him out of, according to Michael.
"I know it was getting volatile, but I didn't really think it would go that far," he said. "It was kind of a last straw kind of thing."
Court documents also show tension between the former couple.
One of her ex-husbands, Peter Madsen, in a custody battle over their 8-year-old son, said Murray's home life was "unstable."
In custody papers filed in January, Murray wrote that she and Wilhelm had financial problems.
"My boyfriend began drinking and on 12/31 I asked [Madsen] ... to take him while I looked for a new place to live," she wrote. "While our business has slowed and has caused financial difficulties we still live in the same home where [my son] has his own room. With his father he has to share a room. Despite the difficulties that I've had with my relationship the issues have been resolved and are being addressed. Our household is again alcohol and drug free."
Madsen, in writing to the court said Murray told him, "I can't do this anymore." He said nine garbage bags filled with the son's clothes and toys were outside the home in December of last year.
Michael said the boy was home at the time of the shooting.
On Wednesday, a man later identified as one of Murray's ex-husbands was at the home, and would only say that Murray left behind three children.
The escalating fighting between Wilhelm and Murray wasn't completely unknown to neighbors, although there was reportedly nothing to indicate the relationship could turn violent.
"It wasn't a match made in heaven," Michael said. He said the block had a Fourth of July parade, and he has photos of Murray seemingly happy with one of three great Danes she shared with Wilhelm.
"What was amazing was … Tom got along with her friends and her exes and all of that, and she got along with her exes and ex-boyfriends," Michael said. "But it seems like it was oil and water between the two of them."
|
0.989931 |
No Doubt is an American alternative rock group whose music was initially influenced heavily by ska and New Wave.
The group first formed in Orange County in the city of Anaheim in December 1986 with John Spence as lead singer. He committed suicide in 1988, leaving Gwen Stefani as lead vocalist. The band developed a reasonable live following, mainly in the band's home state of California. In in 1994, Gwen's older brother Eric left to pursue an animating job on the cartoon TV series The Simpsons.
No Doubt's self-titled first album was released in 1992 through Interscope, and featured the single "Trapped in a Box". Their second album, The Beacon Street Collection, was released independently. The release of 1995's Tragic Kingdom and the single "Just a Girl" allowed the group to achieve mainstream commercial success. A second single, "Spiderwebs", was also successful, and their third single, "Don't Speak" (1996), which was written about the dissolution of Gwen and Tony Kanal's romantic relationship, was a number one hit for 21 weeks on the airplay chart of the Billboard Hot 100. Tragic Kingdom has sold over 15 million copies worldwide.
No Doubt included its song "New" on the soundtrack to the movie Go in 1999. In 2000, the band released Return of Saturn, their highly anticipated followup to Tragic Kingdom. The album featured a darker tone and was more lyrically advanced than No Doubt's previous works. The band has spoken unkindly of the album in more recent interviews for various reasons. Consequently, they have excluded many fan-favorite songs in post-2000 concerts such as "Home Now", "Comforting Lie", "Dark Blue" and "Artificial Sweetner".
No Doubt's most recent studio album, Rock Steady, featured a hit Grammy winning single, "Hey Baby", with a notably more studio-influenced flavour.
Publicity for the group was mainly focused on Gwen and her image as a strong woman in the music industry. Gwen's hairstyle and clothing have been copied by teenage girls worldwide, who have traditionally gained the title of gwenabees.
An album featuring all their singles was released in 2003. It included their first cover version, "It's My Life" which had originally been a hit for Talk Talk. No Doubt also released a 2-CD 2-DVD box set titled Everything in Time. Rock Steady Live, a DVD of one of the band's Long Beach concert, has also been released.
No Doubt's latest single is "Bathwater (Remix)", which has been released as a CD single in countries such as the UK and Australia. No Doubt has planned a US tour with Blink 182 for later in 2004.
|
0.999999 |
This Copenhagen girl knows that having a warm coat that is enjoyable to wear, makes winter easier to bear. Add to that, the fact that the six-pack in her bicycle basket will be nicely cold when she arrives at her friends on this saturday evening. Cheers!
Oh, I forgot to say hi! I am new here, - or rather, my writing is. You may have seen some of my pics here during this fall, but now Mikael asked me if I wanted to do my own blogging. Basically I just enjoy taking pictures, but bicyclists frequently end up at the other end of my lens.
WOW, that looks like a super cosy coat!!!
In Copenhagen, what is the law regarding alcohol consumption while riding a bicycle?
If you seem to be a danger to yourself or others, the police (or somebody else) will probably ask you to walk your bike home. So no law, as far as I am informed, and it seems to work just fine.
Like in most countries there are no laws stopping you from drinking in public. And like Lars said, it's the same on a bike or on a sidewalk.
In many locales in the US public consumption of alcohol is illegal. You can drink it in a restaurant setting, but not walking down a street...damn puritanical laws! I once made the mistake of sitting on the outside of the rail at a local deli/cafe with a beer in my hand. Cost me $200 in fines and court costs.
I think it is illegal here.
I had a discussion with a policeman on the way back from our work christmas do in the early hours of sunday.
He stopped me and asked if I knew the laws relating to being drunk in charge of a bicycle.
I replied that I didn't, but would keep a sharp eye out for anything suspicious.
I carried the whole conversation off with, I feel, a certain amount of panache, and he waved me on.
Which was good of him as I was wearing black-tie and a father christmas hat, with one of the nurses perched on the parcel rack.
Three cheers for the boys in blue.
But hey, you can always brown-bag it and be "that person"... stick it to the Puritans?
I love the picture. :) I'm definitely excited to see more, I love that the blog is expanding.
While it isn't illegal to drink and bike in Denmark, I think it is worth mentioning that the girl just appears to be transporting the beer. No doubt going to a julefrokost (Christmas party) of sorts.
I have seen some local ordinances where it is illegal to transport alcohol containing beverages without them being covered, but that place was the exception rather than the rule.
It might even be a six-pack of mineral water, hehe.
Lars, I love your pics and will continue to enjoy them here!
If this is a transport, why not transport Your belongings to any place You want? Beer, water, whisky, wine, cakes, vodka... The most important is - not to bring danger to others and Yourself.
Great and full of life picture!
|
0.992498 |
how abt putting up some good legal torrents... just to keep da fun going and not keep bandwidth idle.... ur response?
well i am myself always on the hunt for some legal torrents. hard to find any these days.
Here is a refined answer to your quest for knowledgeBitTorrent is a protocol designed for transferring files. It is peer-to-peer in nature, as users connect to each other directly to send and receive portions of the file. However, there is a central server (called a tracker) which coordinates the action of all such peers. The tracker only manages connections, it does not have any knowledge of the contents of the files being distributed, and therefore a large number of users can be supported with relatively limited tracker bandwidth. The key philosophy of BitTorrent is that users should upload (transmit outbound) at the same time they are downloading (receiving inbound.) In this manner, network bandwidth is utilized as efficiently as possible. BitTorrent is designed to work better as the number of people interested in a certain file increases, in contrast to other file transfer protocols.One analogy to describe this process might be to visualize a group of people sitting at a table. Each person at the table can both talk and listen to any other person at the table. These people are each trying to get a complete copy of a book. Person A announces that he has pages 1-10, 23, 42-50, and 75. Persons C, D, and E are each missing some of those pages that A has, and so they coordinate such that A gives them each copies of the pages he has that they are missing. Person B then announces that she has pages 11-22, 31-37, and 63-70. Persons A, D, and E tell B they would like some of her pages, so she gives them copies of the pages that she has. The process continues around the table until everyone has announced what they have (and hence what they are missing.) The people at the table coordinate to swap parts of this book until everyone has everything. There is also another person at the table, who we'll call 'S'. This person has a complete copy of the book, and so doesn't need anything sent to him. He responds with pages that no one else in the group has. At first, when everyone has just arrived, they all must talk to him to get their first set of pages. However, the people are smart enough to not all get the same pages from him. After a short while they all have most of the book amongst themselves, even if no one person has the whole thing. In this manner, this one person can share a book that he has with many other people, without having to give a full copy to everyone that's interested. He can instead give out different parts to different people, and they will be able to share it amongst themselves. This person who we've referred to as 'S' is called a seed in the terminology of BitTorrent.
if i host a tracker from my pc and seed a torrent ... does tht become legal...explain wht is a legal torrent.as it is no point hosting windows,linux setups and stuffs like tht coz they r readily available on the manufacturer's website and http downloads are much faster tht torrent downloads.
|
0.948256 |
During the War for Independence, many women moved between their homes and military encampments as they joined their husbands in the Continental Army for varying lengths of time. Although they may all be called camp followers, at that time people distinguished between the women who followed the soldiers and those who were the consorts of officers. The consorts, in turn, were further divided by social and military rank. Martha Washington, Catharine Greene, and Lucy Knox, as generals' wives, represent the elite women within early America's civil and military societies. That shared status, however, should not obscure the differences in their cultural origins, economic situations, and postwar circumstances.
Over the course of the Revolution, Martha Dandridge Custis Washington (1731–1802) became the new nation's First Lady. Such a position was not even to be imagined in 1759, when the wealthy young widow and mother accepted George Washington (1732–1799) as her second husband. Like many other southern gentlewomen faced with administering an estate, Martha Custis had simply thought of finding an amiable spouse who could ably handle their public interests while she managed the domestic ones. The Washingtons created an affectionate, productive partnership that strengthened in the face of the Revolution's challenges.
When George Washington left Virginia to assume command of the Continental Army in 1775, Martha Washington initially remained at their home, Mount Vernon. That winter, however, she traveled up to the encampment around Boston. Catharine Greene and other officers' wives did the same, starting what would be a pattern throughout the war. Although there were exceptions, these women generally—unless home, health, or other issues intervened—joined their husbands after the active campaigning had ended in one year and left when the army readied for action in the next. The necessity of leaving the encampments was made clear early in the war. Martha Washington, Catharine Greene, and Lucy Knox had followed their husbands into New York City in the spring of 1776 only to have their spouses hurry them out in July when news came that the British might be coming. When the British did not immediately show up, Catharine Greene returned and Lucy Knox clamored to do the same. Greene's husband, however, regretted allowing his wife to return, and Knox's simply refused. General Washington did not have that worry, for Martha Washington understood the difference between providing comfort when the army was in garrison and creating a distraction when it was readying for a fight.
That understanding reflected the differences between these generals' wives in temperament, experience, and domestic arrangements. Martha Washington was longer married and a generation older than Catharine Littlefield Greene (1753–1814), who married Nathanael Greene (1742–1786) in July 1774, and Lucy Flucker Knox (1756–1824), who had married Henry Knox (1750–1806) just a month earlier in June 1774. Lady Washington (as she was often called) also had an established, extensive household to run. Her young compatriots were just starting their families and had not yet laid the foundations for their permanent homes.
Catharine Greene married into a Rhode Island Quaker family with farming, mercantile, and manufacturing interests. Because of the war, the young wife often found herself more with the family than the man—and that was not something she liked. Neither a Quaker (nor was Nathanael any longer because of his military activities), nor of strong domestic interests and skills, Catharine Greene often felt at odds with her brothers-and sistersin-law. She was always eager to join her husband (often leaving her children with the family) and engage in the social activities that were part of life at headquarters.
Lucy Flucker Knox's loyalist family (her father was the Royal Secretary of the Province of Massachusetts Bay, and her brother served in the British army) rejected her when she chose Knox, a bookseller and Whig. They disapproved of the match as socially, economically, and politically imprudent. When the British forces abandoned Boston in March 1776, the Fluckers fled, turning estrangement from Lucy into permanent separation. This may explain why Lucy cleaved all the more strongly to Henry: she had no other close family besides him and his brother. Lucy Knox attempted to help her brother-in-law run the bookseller business for a while during the war, but the business failed. She also stayed with friends or in rented lodgings at times during the war, but she always preferred to be with her husband. As a result of both need and determination, she managed numerous, lengthy visits to camp, where she started to raise her family and served as a prominent social hostess.
All three generals' wives faced various private and public pressures after the war. Martha Washington's duties as mistress of Mount Vernon increased as visitors consulting with her husband multiplied. Her social graces and experience at handling a large household stood her in good stead then and when her husband became president.
Although the Washingtons did have financial concerns, they were nothing like the problems facing the Greenes and Knoxes. Economic necessity drove the Greenes south. Unable to pick up where he left off in Rhode Island, and with debts from the war, Nathanael Greene gratefully accepted lands offered by South Carolina and Georgia. Still, when he died in 1785 he left his wife and children in a financial bind. Catharine Greene had to go to friends for help and practice the stringent housewifery she so despised. She learned to manage her affairs with the help of Phineas Miller, whom she married in 1796. She and Miller also served as patrons for Eli Whitney, who invented the cotton gin. Lucy Knox continued as a society hostess after the war, when her husband served as Secretary at War in the Confederation government and then as Secretary of War under Washington. He accepted those positions both out of a sense of public service and out of the need to support his family. The Knoxes continued to live beyond their means and without a permanent home through those years. Knox resigned in December 1794 and the following spring settled his family in Maine. After Henry died in 1806, Lucy became reclusive and sold much of her property to pay off debts and support herself.
These generals' wives served the Revolution through their domestic endeavors, but their private efforts contributed to public results by sustaining the Continental Army's leaders. In doing so, their lives reflected the dynamics of American society during the Revolutionary and federal periods. Like many others, these members of the provincial elite became part of the new American elite. Yet that was not an easy process or guaranteed result, for they had to cope with social and economic instability and the mobility of the time.
Callahan, North. Henry Knox: General Washington's General. New York and Toronto: Rinehart, 1958.
Freeman, Douglas Southall. Washington. Abridgment in one volume by Richard Harwell of the seven-volume Washington (1968). New York: Collier Books; Maxwell Macmillan International, 1992.
Greene, Nathanael. The Papers of General Nathanael Greene, edited by Robert E. McCarthy. Microform edition. Wilmington, DE: Scholarly Resources, 1989.
Stegeman, John F., and Stegeman, Janet A. Caty: A Biography of Catharine Littlefield Greene. Athens: University of Georgia Press, 1985.
Washington, George. The Papers of George Washington. Revolutionary War Series, edited by Philander D. Chase. Charlottesville: University Press of Virginia, 1985–2002.
"Martha Washington Collection." Mount Vernon Library and Special Collections. Available from <http://www.mountvernon.org/learn/collections>.
See also:Adams, Abigail; Brown, Charlotte: Diary of a Nurse; Camp Followers: War and Women; Families at War; Madison, Dolley; Sampson, Deborah; Warren, Mercy Otis.
"Generals' Wives: Martha Washington, Catharine Greene, Lucy Knox." Americans at War. . Encyclopedia.com. 18 Apr. 2019 <https://www.encyclopedia.com>.
|
0.999958 |
Which animals are permissible and not permissible to eat?
Animals are of three types: Land life, aquatic life which cannot live outside water, such if you were to take it out, it would die, and the third is that which lives on land and in water together.
First, it is impermissible to eat land animals that attack with their fangs among predatory animals, such as lions, wolves, dogs, cats, bears, monkeys, elephants, according to our imams. Also impermissible are those that attack with their claws, their nails that is, of birds such as the falcon, the eagle and others of that type.
Second, any animal that the Prophet, may Allah's peace and blessings be upon him, commanded to kill is haram to eat, such as the snake, the crow and the mouse.
Third, any filthy creature such as worms, ants, bees, flies and all insects, and those that have poison [s. are impermissible to eat].
Fourth, any animal whose impermissibility to eat which has been specifically established, such as the domestic donkey.
Fifth, an animal that is born of one parent that is permissible to eat and another that is not permissible to eat is haram to eat because the impermissibility overcomes it, such as a mule born of a horse and a domestic donkey.
Sixth, any animal that the Prophet, may Allah's peace and blessings be upon him, prohibited to kill such as frogs, is impermissible to eat.
Any animal that does not derive strength from its fangs or claws and was not prohibited by the Prophet, may Allah's peace and blessings be upon him, to eat or kill, or one that he didn't command about, or anything that is not a filthy animal, nor one that harms, or was not born of a parent that is permissible to eat and another that is not, then it is permissible to eat. And those are grazing livestock, such as camels, cows, goats, deer, horses, wild donkeys, which have stripes, and according to our imams, it is permissible to eat rabbit, hyenas and fox, as well as chicken, doves and birds, ducks and goose and other birds like it that don't attack with their claws.
As for aquatic life, it is all permissible to eat, whether it looks like fish or not, except for harmful ones that they contain poison, for they are not permissible to eat.
As for what lives on land and in water, it is haram to eat them, such as the snake, the crocodile, the turtle, and the crab and others like them.
When should one stand up during the Iqamah?
Is it allowed to wear the clothes coming down below the ankles?
|
0.956933 |
Could a salamander forage inside your refrigerator?
The behavior and physiology of many animals (e.g., insects, amphibians and reptiles) can be greatly affected by changes in body temperature. For example, low temperature can reduce energy intake via effects on foraging behavior. Many insects and reptiles can offset such effects by choosing among thermally-diverse microhabitats to maintain body temperature within an optimal range. However, many amphibians occupy environments that do not allow them to control body temperature. Thus, the ability to minimize the effect of low temperature on feeding would provide a selective advantage for individuals. Adaptations allow some plethodontid salamanders (i.e., in the family Plethodontidae) to continue feeding at lower temperatures than other animals. For example, the quick release of energy stored in elastic tissue allows rapid tongue projection for prey capture below 5°C in some salamanders.
The effect of low temperature on feeding in plethodontid salamanders of the genus Desmognathus (i.e., Dusky Salamanders) has been inferred from field studies of changes in activity and gut contents at different seasons. Because field studies could not determine whether feeding is more dependent on thermal conditions influencing salamander behavior or prey availability and movement, we examined the effect of short-term low temperature on feeding under controlled conditions in the lab. We performed two experiments to determine the effect of low temperature on predatory behavior and prey-capture efficiency in Spotted Dusky Salamanders (Desmognathus conanti), which live in seeps and streams of the south-central United States. These salamanders are ambush, generalist predators that mainly eat small, semiaquatic and terrestrial invertebrate animals. Our observations indicate that typical predatory behavior consists of turning the head toward moving prey, very slow movement toward the prey (i.e., prey stalking) until it is within capture distance (i.e., about ½ inch), and then capture of the prey with the tongue and jaws. Often during stalking, the salamander jumps toward the prey just before capture to quickly travel the remaining distance.
In the first experiment, we observed variation in the feeding responses of cold salamanders (at 1, 3, 5 and 7°C) to a video recording of a walking, warm (15°C) cricket to determine the low-temperature limit for predatory behavior. By using a video recording as the prey visual stimulus in all feeding trials, we kept the stimulus exactly the same. This technique enabled us to determine the effect of temperature on feeding behavior independent of any potential temperature effect on prey movement. Salamanders exhibited vigorous feeding responses at 5 and 7°C, large variation in feeding responses both among and within individuals (over time) at 3°C, and little to no feeding response at 1°C. Mean feeding responses at both 1 and 3°C were significantly less than at each higher temperature.
In the second experiment, we quantified feeding by cold salamanders (at 3, 5, 7 and 11°C) on live, warm crickets to examine thermal effects on prey-capture ability. The mean feeding response to live crickets was significantly less at 3°C than at higher temperatures, however 50% of salamanders captured and ingested prey with high efficiency at this temperature. We conclude that many individuals stalk and capture prey at very low temperatures (down to 3°C). Our results support a growing body of data that indicate many plethodontid salamanders feed at temperatures only a few degrees above freezing.
Effect of acute low body temperature on predatory behavior and prey-capture efficiency in a plethodontid salamander.
|
0.999807 |
Maps are an indispensable tool for outlining natural features, human boundaries and transportation networks. But when it comes to depicting how many people are in a given place — how populations are distributed —a traditional map has distinct drawbacks. Mapmakers have sought to offset this limitation through an innovation that's known as a cartogram.
There are two types of cartograms. Distance cartograms are often used to show stylized bus or subway routes. They depict networks without strict adherence to location or range. The other type is called an area cartogram. In these graphics, the size of each shape making up the map — like counties, states or nations — is adjusted to represent a different variable, often the number of people living there.
Cartograms can highlight the difference between places with large populations (or large amounts of whatever variable is replacing area) and places with large amounts of land and/or water, but which have small populations. In other words, a cartogram shows population density in a graphic format.
There are many different ways to develop an area cartogram. In a contiguous cartogram, the shape of a specific area is altered to account for differences in population (or another variable), but shapes retain their positions relative to one another. This approach leads to distortion of the basic shapes. Another is a non-contiguous cartogram, which means that the shapes can move and resize without remaining in position with their neighbors. Rather, the shapes keep their usual form, and are scaled in size based on population (or other variable).
Cartograms can be helpful in interpreting data when the number of people is important. For example, area cartograms are often used to display election outcomes when the variable of interest is total number of votes — not some rate or percentage. An election results cartogram is an increasingly common tool used to help highlight dynamics related to population density. In conventional maps showing election results large areas that are sparsely populated take up the most space, and thus have the most visual impact, while more densely populated areas that take up very little land area have far less visual impact despite representing many more people.
In an non-contiguous area cartogram of Wisconsin, the state's counties have been resized according to their their populations. Counties with large populations grow bigger than they would appear on a standard map, and counties with sparse populations shrink in comparison.
These two maps of Wisconsin's counties highlight a few key points about the distribution of the state's population. First, the cartogram emphasizes how overwhelmingly large Milwaukee County's population is, relative to all other counties in the state. Dane and Waukesha counties stand out as the next two largest after Milwaukee. In addition, the other counties on the southern and eastern edges of the state together represent a preponderance of Wisconsin's total population. Another takeaway is just how different an area-based map and a population-scaled map look. It's easy to think of Wisconsin's rural areas as making up a lot of the state, but in terms of population they are quite small.
A cartogram can help make sense of any topic where the important information is in the number of people, and there is wide variation in population density in a region. For example, cartograms can be useful illustrations of economic activity, immigration, school enrollment, votes, jobs or housing numbers.
|
0.999985 |
Tools are handy, but you need the right tool for the job. ERP software is a powerful tool for businesses, but it’s important to know which version of ERP software is best suited to the business you’re operating.
Sure, all ERP products provide the same fundamental benefits: Automating processes to free up resources and enable smoother functioning, providing visibility on all relevant data so informed decisions can be made, performing calculations related to accounting and finance, and so on. But don’t make the mistake of thinking one version is as good as another when it comes to meeting the specific needs of a business.
This issue comes up often in the manufacturing industry, where process manufacturing and discrete manufacturing are considered part of the same industry, yet have vastly different needs. Discrete manufacturing refers building solid products, such as toys, furniture, cars, or computers, while process manufacturing refers to what could be called ‘liquid’ products, like paints, chemicals, food and beverages.
Discrete manufacturers build something piece by piece, and once made it can be disassembled. With process manufacturing, the final product cannot be reversed. It is composed of ingredients but none of them can be removed.
Process manufacturers make the same products in bulk. Discrete manufacturers make distinct products that may differ in appearance.
Process manufacturers use formulas or recipes. Discrete manufacturers use a Bill of Materials (BOM).
Process manufacturers blend ingredients to make the product. Discrete manufacturers make a product according to a sequence.
Process manufacturers endure fewer interruptions. With discrete manufacturing, each component of the final product has a production cost and time.
It’s not enough to simply acquire an ERP product designed for manufacturing. Some are better suited to process manufacturing, others to discrete manufacturing. That’s why it’s important to seek professional advice on the implementation of IT to ensure that Software as a Service provides the service it was designed for.
Numerous Components: A product can consist of a number of components, such as valves, springs, metals and containers. Each component must be planned out and tracked once it’s been shipped to the assembly location.
Outsourcing of Components: The construction of certain components may be outsourced; the different parts of a machine separated by time and distance.
Innovation: This is particularly important in the technology industries, where manufacturers have to keep up with constant upgrades to the various components.
Regulations: Discrete manufacturers have to deal with whatever regulations pertain to their industry, such as FDA regulations in the case of medical devices.
The ideal ERP software for discrete manufacturers will have functions geared towards reducing operating costs, managing raw materials and tracking shipments. The manufacturer faces very specific demands from a number of interested parties, including suppliers, customers and regulators.
Analyzing finances in all departments.
Ultimately, Microsoft Dynamics GP is designed to aid in each stage of the manufacturing process, from design to shipping.
Ineffective IT is one of the major factors hampering China’s manufacturing-based economy (articlesbase.com), and the nation is now planning a switch to a knowledge-based economy with an emphasis on Information Technology. The world’s second-biggest economy is recognizing the need for correct application of IT services.
ERP software may be designed to aid companies in decision-making, but companies need to ensure they make the right decision to begin with when they seek the ERP product best suited to their needs.
Written by Matthew Flax on behalf of Dynamics Careers, which advertises only Microsoft Dynamics jobs, such as those for GP developers, around the world.
|
0.960585 |
Franklin Delano Roosevelt was born in Hyde Park, New York, on January 30, 1882. He was born to a wealthy couple, James and Sara Roosevelt. His early education took place inside the Roosevelt house by home tutors, before attending Groton school at the age of 14.
He was a bright student, and excelled in his studies at Harvard University and Columbia Law School. He got married to his cousin, Eleanor Roosevelt, in 1905. She was the niece of Theodore Roosevelt, who was the President of the United States from 1901 to 1909.
Franklin had great admiration for Teddy Roosevelt, and just like him, he entered politics, although as a Democratic party candidate. He became a member of the New York senate in 1910. He became an active Democrat leader and was appointed by President Wilson as the Assistant Secretary of the Navy, a post he held for six years.
He attended the Paris Peace Conference, but voiced his opinion strongly against the Treaty of Versailles. This treaty, which imposed humiliating conditions on Germany, turned out to be a major cause for World War II. Roosevelt's popularity grew, and the Democratic candidate for presidency, James Fox, selected him as his running mate in 1920.
In 1921, he was diagnosed with poliomyelitis, which left him paralyzed. His legs suffered permanent damage, although he underwent strenuous training to minimize the effect of the illness.
He came back even more matured and composed after this period, and helped the Democratic nominee, Alfred Smith in his campaign for the highest office, which, unfortunately, he lost. Roosevelt became the Governor of New York in 1928.
His work for the New York state and national issues, made him the obvious choice as the Democratic presidential nominee in 1932. He convincingly defeated Republican Herbert Hoover and became the 32nd President of the United States of America.
Just before assuming office, there was an assassination attempt, by an Italian immigrant, Giuseppe Zangara, when he was addressing a rally in Belmont Park, Miami. Although he missed his mark, the bullet struck Roosevelt's good friend, the then mayor of New York Cermak, who succumbed to his wounds. Zangara was executed within three weeks of this incident.
Roosevelt took over at a time when America was reeling under the effect of the Great Depression and there were almost 1,300,000 unemployed people in the country. He introduced sweeping reforms to bring the US economy back on track.
He brought some relief to an ailing economy, but there was also some opposition to his policies, like the 'New Deal', where he proposed to enlarge the Supreme Court. Despite such events, he was successful in winning three terms as president, as his mass acceptance had grown enormously. Another major event during his tenure was World War II.
Although the USA had maintained a neutral policy with respect to their involvement, they supplied huge military aid to the Allies, especially UK. When France surrendered to Germany and England was under heavy attack, the Americans increased the aid in every possible way, stopping just short of actual participation in the war.
The Japanese launched a surprise aerial attack on the American Naval Base of Pearl Harbor, on December 7, 1941, causing serious damage to the unwary US troops. This prompted the American entry into the war, which led to a drastic change on all war fronts.
Roosevelt directed all the production and resources of the state towards its military initiatives, and America emerged a superpower after the end of the war, having employed nuclear weapons in open warfare for the first time in human history.
During the closing stages of the battle, Roosevelt's health suffered a great deal. He was extremely tired and unwell, as a result of all the hectic demands and pressure of being a president.
After the Yalta conference, he chose to take a hiatus. Unfortunately, during his vacation stay at a spa in Warm Springs, Georgia, he suffered a massive attack of cerebral hemorrhage, and died on April 12, 1945, at an age of 63.
His body was carried to New York and laid to rest at his estate in Hyde Park. FDR remains a very popular president to this day, and went down in history as one of the greatest Presidents of the United States of America.
|
0.884447 |
How old am I if I was born on October 4 1915?
103 years 6 months 17 days old!
There are only 5 months 12 days until your Birthday!
|
0.999143 |
John Barrowman is best known in the UK for his role as Captain Jack Harkness in Doctor Who and the spin off Torchwood. His first appearance as Harkness was in the two-part story "The Empty Child"/"The Doctor Dances", going on to appear in the next three episodes, "Boom Town", "Bad Wolf" and "The Parting of the Ways". The character of Captain Jack Harkness became so popular, he was given his own show. Torchwood, which premiered in 2006.
John Barrowman was born in the Mount Vernon area of Glasgow. He lived in the city for the first eight years of his life where his mother was a singer and his father was employed by the Caterpillar heavy machinery company in Uddingston. In 1976, his father's company relocated the family to Aurora, Illinois in the United States, where his father managed the Caterpillar tractor factory.
As a freshman, Barrowman won parts in several musical productions and from 1983 to 1985 he performed in Hello, Dolly!, Oliver!, Camelot, Li'l Abner and Anything Goes. After he graduated from high school, he moved to San Diego, California to study performing arts at the United States International University (USIU). As part of an exchange programme, he returned to the United Kingdom, in 1989, to study William Shakespeare for six months.
Barrowman's professional acting career began in London's West End in 1989, playing the role of Billy Crocker in Cole Porter's Anything Goes at the Prince Edward Theatre, alongside Elaine Paige as Reno Sweeney and Bernard Cribbins as Moonface Martin. He continued to appear in West End productions for the next decade, taking the title role of Domingo Hernandez in Matador at the Queen's Theatre in 1991; as Raoul in The Phantom of the Opera at Her Majesty's Theatre in 1992; as Claude in Hair at the Old Vic Theatre in 1993; as Chris in Miss Saigon at the Theatre Royal, Drury Lane in 1993; as Joe Gillis in Sunset Boulevard at the Adelphi Theatre from 1994�1995; and as Beast in Beauty and the Beast at the Dominion Theatre in 1999. Barrowman was part of the musical Godspell in 1994, and was a soloist in two songs, "We Beseech Thee" and "On The Willows". He was nominated for an Olivier Award for Best Actor in a Musical in 1998 for originating the role of Cal Chandler in The Fix, a performance he repeated in Cameron Mackintosh's 1998 gala concert Hey, Mr Producer! Barrowman played the role of Joe Gillis in Sunset Boulevard in the West End and, briefly, on Broadway. His only other Broadway credit is in the role of Barry in the Stephen Sondheim revue Putting It Together (1999�2000) at the Ethel Barrymore Theatre alongside Carol Burnett, George Hearn and Bronson Pinchot. In a review of Putting It Together, theater critic Tom Samiljan noted Barrowman's "fine baritone voice and suave looks". In 2002, Barrowman appeared as Bobby in Sondheim's Company in the Kennedy Center's Stephen Sondheim Celebration.
Barrowman was one of the original hosts of Live & Kicking, a children's Saturday morning variety show on the BBC. He appeared on the children's television game show, The Movie Game from 1994�1996 and was one of the regular presenters on Five channel's afternoon show 5's Company from 1997�1999.
In 2007, Barrowman was a judge on the BBC One TV series Any Dream Will Do, hosted by Graham Norton. The show searched for a new, unknown actor to play the role of Joseph in a West End revival of the Andrew Lloyd Webber musical Joseph and the Amazing Technicolor Dreamcoat.
Barrowman's television career began with several appearances in short-lived prime-time soap operas. Barrowman first starred as Peter Fairchild in Central Park West (1995). He appeared as Peter Williams in Titans (2000) alongside Yasmine Bleeth on NBC. Barrowman made a guest appearance in episode 22 of the BBC's comedy-drama show Hotel Babylon.
Barrowman appeared as Ben Carpenter in the low-budget film Shark Attack 3: Megalodon (2002). His musical abilities are featured in several film roles: as Jack in the Cole Porter biopic De-Lovely (2004), singing a duet with Kevin Kline on the song Night and Day; and in the role of the lead tenor Stormtrooper in The Producers (2005), singing Springtime for Hitler. Barrowman took part in the reality television series Dancing on Ice on ITV1 in January and February 2006.
In 2014 he was awarded an MBE for services to entertainment and charity.
|
0.961744 |
A war memorial is a building, monument, statue or other edifice to celebrate a war or victory, or to commemorate those who died or were injured in a war.
An important factor in the development of traditions of funerary art is the division between what was intended to be visible to visitors or the public after completion of the funeral ceremonies. The treasure of the 18th dynasty Pharaoh Tutankhamun, for example, though exceptionally lavish, was never intended to be seen again after it was deposited, while the exterior of the pyramids was a permanent and highly effective demonstration of the power of their creators. A similar division can be seen in grand East Asian tombs. In other cultures, nearly all the art connected with the burial, except for limited grave goods, was intended for later viewing by the public or at least those admitted by the custodians. In these cultures, traditions such as the sculpted sarcophagus and tomb monument of the Greek and Roman empires, and later the Christian world, have flourished. The mausoleum intended for visiting was the grandest type of tomb in the classical world, and later common in Islamic culture.
Tutankhamun was an Egyptian pharaoh of the 18th dynasty, during the period of Egyptian history known as the New Kingdom or sometimes the New Empire Period. He has, since the discovery of his intact tomb, been referred to colloquially as King Tut. His original name, Tutankhaten, means "Living Image of Aten", while Tutankhamun means "Living Image of Amun". In hieroglyphs, the name Tutankhamun was typically written Amen-tut-ankh, because of a scribal custom that placed a divine name at the beginning of a phrase to show appropriate reverence. He is possibly also the Nibhurrereya of the Amarna letters, and likely the 18th dynasty king Rathotis who, according to Manetho, an ancient historian, had reigned for nine years—a figure that conforms with Flavius Josephus's version of Manetho's Epitome.
Tomb is a general term for any repository for human remains, while grave goods are other objects which have been placed within the tomb. Such objects may include the personal possessions of the deceased, objects specially created for the burial, or miniature versions of things believed to be needed in an afterlife. Knowledge of many non-literate cultures is drawn largely from these sources.
John Weever (1576–1632) was an English antiquary and poet. He is best known for his Epigrammes in the Oldest Cut, and Newest Fashion (1599), containing epigrams on Shakespeare, Ben Jonson, and other poets of his day, and for his Ancient Funerall Monuments, the first full-length book to be dedicated to the topic of English church monuments and epitaphs, which was published in 1631, the year before his death.
An epitaph is a short text honoring a deceased person. Strictly speaking, it refers to text that is inscribed on a tombstone or plaque, but it may also be used in a figurative sense. Some epitaphs are specified by the person themselves before their death, while others are chosen by those responsible for the burial. An epitaph may be written in prose or in poem verse; poets have been known to compose their own epitaphs prior to their death, as did William Shakespeare.
Related genres of commemorative art for the dead take many forms, such as the moai figures of Easter Island, apparently a type of sculpted ancestor portrait, though hardly individualized. These are common in cultures as diverse as Ancient Rome and China, in both of which they are kept in the houses of the descendants, rather than being buried. Many cultures have psychopomp figures, such as the Greek Hermes and Etruscan Charun, who help conduct the spirits of the dead into the afterlife.
Cremation is traditional among Hindus, who also believe in reincarnation, and there is far less of a tradition of funerary monuments in Hinduism than in other major religions. However, there are regional, and relatively recent, traditions among royalty, and the samādhi mandir is a memorial temple for a saint. Both may be influenced by Islamic practices. The mausoleums of the kings of Orchha, from the 16th century onwards, are among the best known. Other rulers were commemorated by memorial temples of the normal type for the time and place, which like similar buildings from other cultures fall outside the scope of this article, though Angkor Wat in Cambodia, the most spectacular of all, must be mentioned.
Buddhist tombs themselves are typically simple and modest, although they may be set within temples, sometimes large complexes, built for the purpose in the then-prevailing style. According to tradition, the remains of the Buddha's body after cremation were entirely divided up into relics ( cetiya ), which played an important part in early Buddhism. The stupa developed as a monument enclosing deposits of relics of the Buddha from plain hemispherical mounds in the 3rd century BCE to elaborate structures such as those at Sanchi in India and Borobudur in Java. Regional variants such as the pagoda of China and Japan and the candi of Indonesia evolved from the Indian form. However, none of these can strictly be called tombs. Some important Tibetan lamas are buried in relatively small chortens (Tibetan stupas), sometimes of precious metal, inside or outside monasteries, sometimes after mummification. There are examples at Kursha Monastery in Zanskar and Tashiding Monastery in Sikkim, as well as the Potala Palace in Lhasa and many other monasteries. However, most chortens do not function as tombs.
In the late Middle Ages, influenced by the Black Death and devotional writers, explicit memento mori imagery of death in the forms of skulls or skeletons, or even decomposing corpses overrun with worms in the transi tomb, became common in northern Europe, and may be found in some funerary art, as well as motifs like the Dance of Death and works like the Ars moriendi , or "Art of Dying". It took until the Baroque period for such imagery to become popular in Italy, in works like the tomb of Pope Urban VIII by Bernini (1628–1647), where a bronze winged skeleton inscribes the Pope's name on a tablet below his enthroned effigy. As cities became more crowded, bones were sometimes recovered after a period, and placed in ossuaries where they might be arranged for artistic effect, as at the Capuchin Crypt in Rome or the Czech Sedlec Ossuary, which has a chandelier made of skulls and bones.
Another influence may have been the octagonal Dome of the Rock in Jerusalem, not a mausoleum itself, but "the earliest Islamic model for centrally planned commemorative buildings", adapting the Byzantine form of the martyrium in a building standing alone, though on a stone platform rather than in a garden. In the Persian sphere, a tradition of relatively small mausoleums evolved, often in the shape of short hexagonal or octagonal domed towers, usually containing a single chamber, like the Malek Tomb. These single-chambered tombs developed into larger buildings in the Timurid and Mughal Empires, like the Gur-e Amir tomb of Timur at Samarkand and the famous Mughal tombs of India, which culminated in the Taj Mahal. The Mughal tombs are mostly set in a large walled charbagh (chahar-bagh) or Mughal gardens, often with pavilions at the corners and a gatehouse. The Taj Mahal is atypically placed at the end of the garden, backing onto the river Yamuna; a central placing is usual. They may have minarets, although they do not normally function as mosques. The Tomb of Jahangir lacks any dome, while the Tomb of Akbar the Great has only small decorative ones. Other Islamic Indian rulers built similar tombs, such as Gol Gumbaz.
Other parts of the Islamic world reflected local techniques and traditions. The 15th-century royal Tomb of Askia in Mali used the local technique of mud-building to erect a 17-metre-high (56 ft) pyramidal tomb set in a mosque complex. At the other end of the Islamic world, Javanese royalty are mostly buried in royal graveyards such as those at Kota Gede and Imogiri.
↑ See for example the chapter "Tombs for the Living and the Dead", Insoll 176–87.
↑ Hammond, 58–59 characterizes disarticulated human skeletal remains packed in body bags and incorporated into Pre-Classic Mesoamerican mass burials (along with a set of primary remains) at Cuello, Belize as "human grave goods".
↑ See any well-regarded survey of the history of art or of architecture, such as Gardner's Art Through the Ages or the most recent edition of Sir Banister Fletcher's A History of Architecture.
↑ Lindley, Phillip (2007). Tomb Destruction and scholarship: medieval monuments in early modern England. Donington: Shaun Tyas. p. 3. ISBN 978-1900289-870.
↑ Cockerham, Paul (2008). "Reformation, reaction, reception: a 21st-century view of monumental destruction". Church Monuments. 23: 137–41 (137).
↑ Toynbee, 47–48, on Ancient Rome. Stewart and Rawski's book is entirely devoted to Chinese ancestor portraits. See Chapter 1 etc.
↑ Although the purpose of megalithic structures is not always clear, and of the very oldest, while Nevali Cori in Turkey contains burials, Göbekli Tepe appears not to.
↑ Robins, 51–55, 66–71, 218–19, and see index for other periods. Tomb styles changed considerably over the course of Egyptian history.
↑ Boardman, 126–27. Apart from those at the Mausoleum of Halicarnassus article, there are several from Lethaby's 1908 work here, and one illustrated in Boardman.
↑ Petersen, 95–105; see also Boardman, 240–41 on Eurysaces' tomb.
↑ Unesco Royal Tombs of the Joseon Dynasty.
↑ See Taylor for discussion.
↑ Davies, Serena (23 August 2004). "Viewfinder: Aboriginal burial poles". The Daily Telegraph. London. Retrieved 21 April 2010.
↑ Montillo, Roseanne (2009). Halloween and Commemorations of the Dead. New York: Infobase. pp. 41–42. ISBN 978-1-60413-097-3.
↑ Dowman, 54–55 for the Potala, and see index for other locations.
↑ Toynbee, 48–49. An exception in the Classical World were the Lycians of Anatolia. There are also the Egyptian mortuary-temples, where the object of worship was the deified royal person entombed, but Egyptian temples to the major gods contained no burials. For an extreme example, see ancient Delos.
↑ It was allowed in times of plague however. See Cremation in the Christian World for more details—the Orthodox churchs still forbid cremation.
↑ Board of Trustees for The Hofkirche in Innsbruck.
↑ Though they are exceeded in scale by Gothic revival monuments like the Albert Memorial and the Scott Monument, neither containing a tomb.
↑ Piponnier and Mane, 113 for the origins of mourning clothes.
↑ See for example Michalski, xi. Here Michalski refers to this rejection of religious imagery within Calvinism as "iconophobia". See also Gäbler, 72, 76–77 and Potter, 130–31 regarding the religious disputations in Zürich (1523) concerning (among other things) the removal of statues of saints and other icons. Participants included Leo Jud and Huldrych Zwingli.
↑ Berresford, 77–78 on "Liberty" (Italian term for "Art Nouveau") and 99–104 on Art Deco.
↑ Ruggles, 112 and 122. Her Chapter 10 includes a detailed description of the Taj with special reference to its gardens.
↑ An interesting contrast with the Taj Mahal, given they were both built by Shah Jahan.
1 2 The New York Times, Khomeini's Tomb Attracts Pilgrims, Philip Shenon, Published: 8 July 1990, accessed 25 April 2010.
↑ Levey 1975, 29–33 on Bursa, 83–84 on Istanbul; all the leading Ottoman tombs are covered in the book.
↑ Tomb of Askia, UNESCO page with aerial view.
↑ See Fletcher and Cruickshank, 596. The madrassa is labeled "the ultimate achievement of architectural development in Cairo" and its tomb chamber described as "immense."
↑ Mosse, 103–106 on conservatism, and generally throughout Chapter 5 on war memorials.
↑ Carrier, 19–22; Benton throughout, especially p. 194.
↑ Benton throughout, especially Chapter 1 on Soviet War Memorials (pp. 12–13 on Socialist Realism), but also noting deviations in the Warsaw Pact satellites, as on p. 194, and Chapter 7 on West Germany.
↑ Carrier, throughout, especially Chapter 8. See also the copious literature on the Washington Vietnam Veterans Memorial.
The ancient Egyptians believed that a soul was made up of many parts. In addition to these components of the soul, there was the human body.
The Book of the Dead is an ancient Egyptian funerary text, used from the beginning of the New Kingdom to around 50 BCE. The original Egyptian name for the text, transliterated rw nw prt m hrw, is translated as Book of Coming Forth by Day or Book of Emerging Forth into the Light. "Book" is the closest term to describe the loose collection of texts consisting of a number of magic spells intended to assist a dead person's journey through the Duat, or underworld, and into the afterlife and written by many priests over a period of about 1000 years.
The ushabti was a funerary figurine used in ancient Egyptian religion. The Egyptological term is derived from Ancient Egyptian: ㅱ㈙ダ㏏㏭〾wšbtj, which replaced earlier ㆷ㍯ダ㏏㏭〾 šwbtj, perhaps the nisba of ㈙㍯ダㆭ šwꜣb "Persea tree".
Geometric art is a phase of Greek art, characterized largely by geometric motifs in vase painting, that flourished towards the end of the Greek Dark Ages, circa 900 BC – 700 BC. Its center was in Athens, and from there the style spread among the trading cities of the Aegean. The Greek Dark Ages are also called the Geometric period in reference to this characteristic pottery style, although the historical period is much longer than the art-historical period, being circa 1100 – 800 BC. The vases had various uses or purposes within Greek society, including, but not limited to, funerary vases and symposium vases.
In the burial practices of ancient Rome and Roman funerary art, marble and limestone sarcophagi elaborately carved in relief were characteristic of elite inhumation burials from the 2nd to the 4th centuries AD. At least 10,000 Roman sarcophagi have survived, with fragments possibly representing as many as 20,000. Although mythological scenes have been mostly widely studied, sarcophagus relief has been called the "richest single source of Roman iconography," and may also depict the deceased's occupation or life course, military scenes, and other subject matter. The same workshops produced sarcophagi with Jewish or Christian imagery. Early Christian sarcophagi produced from the late 3rd century onwards, represent the earliest form of large Christian sculpture, and are important for the study of Early Christian art.
Ancient Egyptian retainer sacrifice is a type of human sacrifice in which pharaohs and occasionally other high court nobility would have servants killed after the pharaohs' deaths to continue to serve them in the afterlife. In Egypt, retainer sacrifice only existed during the First Dynasty, from about 3100 BC to 2900 BC, slowly dwindling, and eventually dying out.
Roman funerary art changed throughout the course of the Republic and the Empire and comprised many different forms. There were two main burial practices used by the Romans throughout history, one being cremation, another inhumation. The vessels that resulted from these practices include sarcophagi, ash chests, urns, and altars. In addition to these, buildings such as mausoleums, stelae, and other monuments were also popular forms used to commemorate the dead. The method by which Romans were memorialized was determined by social class, religion, and other factors. While monuments to the dead were constructed within Roman cities, the remains themselves were interred outside the cities.
Hammond, Norman. Social Patterns in Pre-Classic Mesoamerica . Washington DC: Dumbarton Oaks Research Library and Collection, 1999. 49–66. ISBN 0-88402-252-8. Accessed 22 March 2010.
|
0.999999 |
How to use a Bluetooth stereo phone to enjoy music?
Please follow the steps below to operate:<br><br>1.Right-click on the <b>Bluetooth wireless technology</b> icon in the task tray, and click <b>Add New Connection</b>. The <b>Add New Connection Wizard(Welcome to the Add New Connection Wizard)</b> will appear.<br>2.Switch ON the stereo headphone and activate Discoverable mode.<br>3.Confirm that <b>Express Mode</b> has been selected, and then click <b>Next</b>.<br>4.Once the search for the devices has ended, the <b>Add New Connection Wizard(SelectDevice)</b> screen will appear. Select the device name of the stereo headphones from the list, and click <b>Next</b>. The <b>Add new Connection Wizard(Searching for Services)</b> screen will appear.<br>5.Configure the type and name of the icon to appear once registration is complete, and click <b>Next</b>. The <b>Add New Connection Wizard(Configure Connection Name)</b> screen will appear.<br>6.Click <b>Finish</b>. The settings will be registered, and the icon will appear on the Bluetooth Settings screen.<br>7.Connecting to the stereo headphones: You can connect to the sterep headphones form the icon registered in <b>Bluetooth Settings</b>.<br>8.Play music or other audio files on your PC.<br>9.Finishing listening to music and disconnecting: Right-click on the icon for the currently connected mode from Bluetooth Settings on your PC and click <b>Disconnect</b>.A message confirming the disconnection may appear. Click <b>Yes</b> after having followed the instructions in the message. The icon will indicate that the device has been disconnected.
|
0.995882 |
How much will it cost my business to migrate to a hosted VoIP phone system?
We explain how much it costs to migrate to a hosted VoIP phone system.
Migrating to a new hosted VoIP phone system is generally something companies don’t have too much experience with because systems are typically replaced every 7-10 years. It’s a one-and-done event for many, and most don’t know the new VoIP technology really costs.
When it comes to migrating to a new system, many customers just want to know what it’s going to cost them. Not on a month by month basis, but how much to get from the old system to the new system. It’s a great question, so let’s answer it as quickly and easily as possible.
Simply, it depends. There are so many variables that giving you an accurate number is difficult.
However, for an extreme ballpark price, you can roughly figure on $40 per user per month as an all-inclusive fee. This would include things such as your ongoing monthly phones lines, rental of the VoIP services, IP Phones, and VoIP hardware, as well as installation, training and ongoing support. This is a safe estimate, but it does exclude any left-over analog phone lines and any internet circuits you already have and need.
So, for a very informal estimate, if you have 20 employees you can expect a VoIP Phone System WITH professional installation services to cost ~ $800/mo. Again, it can be a little lower or higher depending on variables.
Additionally, if you’re in contract with a carrier, your early termination fees can be extreme, to the point of them being cost prohibitive to switching to a VoIP provider. However, these fees are negotiable with your existing carrier if you only have a verbal commitment and they can’t pull an original signed agreement. Additionally, these fees may be negotiable with your new VoIP provider to absorb all or some of the fees if they really want your business on a “long term” agreement over 3 years.
Where does that $40 come from? Well, when it comes to migrating to a hosted VoIP phone system, we’ve found these 8 factors play the biggest role in estimating how much it will cost.
You have to remember that a hosted phone system is an ongoing monthly investment for your phone system service. For example, you’ll be paying for phone lines and phone extensions & software applications, as well as potentially new or upgraded internet service.
However, I can safely give you a range for these costs. Realistically, you’ll be spending anywhere between $25 and $75 per line. The higher monthly number typically applies to very call center based environments that have advanced needs. Of course, that number is going to depend on the particulars of your system, but generally you can budget within that range for monthly costs per line. For further reading on the subject, check out our article How much does a VoIP phone system cost a small business?
On every VoIP implementation there’s going to be hardware and professional installation fees for getting your new system setup and running. If you’re purchasing your phone hardware outright, you’re going to be on the hook for these costs right up front. Conversely, you may be able to choose to rent or lease the equipment. Depending on the provider, you would be offered either the one-time fee for everything up front versus a long-term lease or rental. Most clients acquire the technology on a monthly model as its very popular with VoIP Phone technology.
Another hardware related item customers don’t think of is the need for wiring. Your office might already have cat5e or cat6 meaning you are VoIP ready but you might need new wiring or install an appliance to convert cat3 wiring to VoIP. Again, you’re looking at hardware and professional fees. This may be included in the hardware & setup fees, or it may not, it all depends on who you’re hiring. It’s crucial to understand that wiring components can impact total costs.
One a related note, who’s doing your IT Network support? Do you have insourced or outsourced IT services? If you need to hire an outside professional, expect more fees and upfront costs. If you have someone within your organization, your costs are already in payroll but regardless, there will be some IT time needed when you upgrade to a VoIP phone system. You’re going to need an IT provider capable in understanding the technical design and the moving parts that need to be carefully laid out when it comes to a hosted VoIP phone system.
So, you can either hire an outside IT vendor, use your own internal IT resources, or hire a VoIP provider who’s going to handle much of the IT work. Most local VoIP providers will handle IT work, but there still may be some additional requirements that you’ll need to pay for. Conversely, if you’re hiring a national level provider, your IT costs will be even higher since you’re in charge of getting things up and running and the national provider is remote.
So, your IT costs here will depend on if you have insourced or outsourced IT, and if you’re going with a national or local VoIP provider.
When companies decide to go with VoIP, they think it’s the end all be all and everything is now over the internet. Sounds simple, right?
Well not really. When you upgrade, there may be some necessary phone lines that may remain on traditional (analogy) lines. Lines such as fax, alarm systems, postage, payroll, or credit card merchant services may be dependent on analog phone lines.
Meaning, you may have some costs from your old phone provider that don’t go away. So just be aware that when you look at your proposal there may still be left over analog lines that you’ll be paying for separately with a different provider.
When you get a new VoIP phone system, you’re going to need training on it. And, training will differ for the average user, versus a receptionist, versus the system’s administrator. Companies may nickel and dime you for this, wrap it up into the one-time upfront costs, or average it out over the long term and include it within your rental or lease. Just be aware that training is necessary, or else you won’t know how to use your system to its fullest potential.
Realistically, estimate 15-30 minutes per person for training or 1 hour for over achievers. The system administrator or receptionist may receive more time as well, something more along the lines of an hour or two.
Simply put, you want to avoid downtime during the installation and switch over process at all costs. Keeping your communication channels up and running is key. If everything is planned in advance and you hire a good VoIP provider, with a solid project management team, you should not have problems with incoming calls.
When your number is ported out to a VoIP provider, calls should properly be routed to cell phones, an auto attendant, or voicemail, avoiding any downtime.
However, it’s possible to have some down time on outbound calls as phones are being switched over. Of course, this depends on the installation and your specific wiring situation, but a fair estimate is to assume 5 minutes per phone for downtime on outgoing calls. Yes, it’s a short time, but still it’s time you can’t get in touch with your customers.
Here’s a bit of warning though – if you hire a company that is remote or detached, you could have much more downtime if this isn’t handled properly. This goes double if there’s a lapse in communication between you and your VoIP provider. For instance, if you’re communicating over email or your provider is on the other side of the country, this could become an issue quickly.
You’re probably thinking I already pay for the internet, what else do I need? Again, depending on your depending on size & needs, you could have additional internet costs, or you may be able to keep your service as it.
Sometimes when you buy a new VoIP phone system you need to upgrade your existing internet package if your speed isn’t high enough. Additionally, some companies might consider a fail-over internet line for backup & redundancy. Others may consider a MPLS T1 circuit for dedicated connection for VoIP to ensure quality or a more robust fiber internet circuit.
Point is, if your new VoIP system taxes your current internet subscription too much, you may have to buy either upgraded service, or another internet line. Obviously, this will raise costs, and something you’re going to want to consider ahead of time.
Why not wait for current phone system to fail?
If you aren’t planning of time, and wait for disaster to strike, you’ll end up paying much more. When your current phone system fails, you won’t have the luxury of shopping around, or understanding what’s truly right for you. When your system dies, you’re going to need a new phone system, fast. To be direct, your current phone dealer may take this opportunity to charge you a maximum rate because you failed to plan.
Unfortunately, many people take the mindset of “if it ain’t broke, don’t fix it”, which is completely understandable, but when things break, it’s expensive to fix and you will pay.
The costs of migrating to a hosted VoIP phone system depends on your situation.
The reality is there is no simple answer, and everyone’s going to have different costs during the process. The best way to figure out what you’ll end up spending is to talk to a local or remote VoIP provider and have them assess your company, needs, and current system. They’ll be able to give you a ballpark idea of what it will cost to migrate to a hosted VoIP phone system.
To learn the cost of migrating to a hosted VoIP phone system, you can click here to contact us online, give me a shout directly at [email protected], or touch base with me at 908-378-1218.
|
0.792712 |
Harry F. Ward as he appeared in 1941.
Harry Frederick Ward, Jr. (1873–1966) was a British-born American Methodist minister and political activist who emerged as a leading fellow traveler of the Communist Party, USA. Ward is best remembered as the first national chairman of the American Civil Liberties Union (ACLU), leading the group from its creation in 1920 until his resignation in protest of the organization's decision to bar Communists in 1940.
Harry Frederick Ward, Junior was born in the County of Middlesex, located on the outskirts of the City of London, on October 15, 1873. Ward's father, Harry F. Ward, Sr., was a successful Chiswick businessman who also served as a Methodist lay minister. Ward's upbringing was steeped both in commercial and religious values and he began working in his father as a wagon-driver during his teenage years.
In 1878 Ward was sent away to a boarding school, a rather harsh and inferior environment to the more illustrious public schools occupied by the sires of the upper class. In the estimation of Ward's biographer, Eugene P. Link, this experience quite possibly contributed to Ward's later distaste for differentiation of society into social classes. During this interval Ward developed rheumatic heart problems which forced his removal from school to live with aunts in the rural environs of Lyndhurst, Hampshire. Ward later remembered the experience favorably, even naming his son, the illustrator Lynd Ward, after the English south coastal town.
Ward emigrated to the United States at the age of 17 in pursuit of a higher education. In May 1891 Ward arrived in Salt Lake City, Utah at the home of an uncle living there to take up work for him as a horse driver. He also worked for a time as a farmhand for another uncle living in the neighboring Western state of Idaho. In addition to these and other jobs, Ward dedicated part of his time to Methodist evangelism as a lay minister preaching to passersby on street corners.
In 1893 Ward was finally able to accomplish his goal of entering a university, enrolling at the University of Southern California (USC), located in the still modest-sized town of Los Angeles. Ward became an admirer of a young political science instructor named George Albert Coe and when Coe left USC for Northwestern University in Evanston, Illinois at the end of Ward's freshman year, Ward followed his mentor there. Ward majored in Philosophy and minored in political science at Northwestern, with his background in populist Christian evangelism and social gospel-driven concern for the poor gradually taking on a more politicized flavor, influenced at least to some extent by the anti-capitalist critique of Karl Marx.
During his Northwestern University years Ward was active in intercollegiate debate, in which he was regarded as a skillful participant. Ward received a Bachelor's degree from Northwestern in 1897 and, upon the recommendation of Northwestern president Henry Wade Rogers was granted a one-year scholarship to Harvard University, from which he graduated with a Master's degree in Philosophy in 1898.
Following graduation, Ward took a position as head resident of Northwestern University Settlement, a settlement house located in Chicago which sought to educate and improve the lives of impoverished immigrant workers of the city's meatpacking district. This settlement house was first launched in 1891, inspired by Hull House, established by Jane Addams and Ellen Gates Starr two years previously. Ward would remain in this position as a resident amongst the urban poor until being forced out by the settlement's governing council due to personal conflicts in the summer of 1900.
The English-born Ward gained his American citizenship on October 10, 1898 at Cook County Courthouse in Chicago, shortly after beginning his life at Northwestern University Settlement.
Also in 1898 Ward received his first posting to a Methodist pastorate, being appointed to a position as co-pastor of the Wabash Avenue Methodist Episcopal Church. In addition to preaching at his own church, Ward began to become involved in wider Chicago Protestant movement, gaining election as Secretary of the Open and Institutional Church League. Ward first became an outspoken advocate of participation in "Christian politics" in this interval, declaring the necessity to put pressure for social reform upon the Chicago political structure without compromise, so as to help establish the "divine ideal, working out the dreams of the prophets, bringing in the Kingdom of God, establishing a true theocracy, a democracy led by God in the shape of the teachings of His Son."
In October 1900 Ward was moved to the 47th Street Methodist Episcopal Church, another pastorate in the Chicago stockyards district with a congregation composed largely of working class immigrants from Eastern Europe. Ward was increasingly radicalized by contact with the impoverished workers who attended his church. Ward himself joined the fledgling Amalgamated Meat Cutters and Butcher Workmen of North America in a show of solidarity with his parishioners. He also joined the Civic Club of Chicago, where he became the chairman of its Committee on Labor Conditions. Ward evangelized the social gospel, sermonizing on matters of economics and poverty and the potential role of the church in the rectification of the structural failings of society.
Ward was married and had two children: Gordon Hugh Ward (born June 27, 1903), who later became an agricultural economics professor, and the artist Lynd Kendall Ward (born June 1905). A daughter, Muriel, was born in February 1907. Following the birth of the second son, Ward took a one-year sabbatical leave during which time he seems to have read the works of Karl Marx for the first time. In the estimation of Ward biographer David Nelson Duke, the introduction to Marxism was not transformative for Ward, but rather "offered labels for and an interpretation of what he knew firsthand" from his life amongst Chicago's working poor.
Ward returned to the pulpit in the fall of 1906 reenergized. Over the course of the next year he began to formulate plans with a trio of like-minded Methodist ministers from Ohio and others to establish a new organization within the Methodist community dedicated to advance religious principles through practical politics. This group, the Methodist Federation for Social Service (MFSS), was formally brought into being at a National Conference held in Washington, D.C. on December 3, 1907. Ward addressed this initial gathering and served as head of the Committee on Programs, establishing an agenda for the organization based upon the publication of pamphlet literature and the dispatch of speakers. The MFSS was to be based upon a set of local chapters, each of which was to promote "social study" within their separate communities and to further coordinate local activities as part of a broad national program.
In the fall of 1908 Ward was assigned to a new parish, this time in the Chicago suburbs at the Euclid Avenue Methodist Episcopal Church in Oak Park. In December 1910 Ward was named secretary of the MFSS, a newly paid position. Ward oversaw the launch of the MFSS's official organ, Social Service Bulletin, in 1911 as well as the publication of a series of pamphlets, activity which was well-received within the hierarchy of the Methodist Church.
Ward taught ethics at the Union Theological Seminary from 1918 until 1941.
Ward would later obtain a law degree from the University of Wisconsin in 1931.
Ward was active in a variety of left-wing causes besides the ACLU. He was one of the founders of the Methodist Federation for Social Action and served as its general secretary from 1911 to 1944. From 1934 to 1940, he was the chairman of the American League Against War and Fascism. He frequently spoke at events held by the National Council of American-Soviet Friendship.
In October 1939 Ward testified before HUAC, which concluded that the American League Against War and Fascism was a Communist front.
In March 1940, the ACLU, under pressure to demonstrate its anti-Communism, barred Communists from holding office in the organization.
Formally, the ACLU barred "anyone who is a member of any political organization which supports totalitarian dictatorships in any country." Ward resigned in protest, and Elizabeth Gurley Flynn, the ACLU's lone Communist board member, was forced out soon after.
During his final two years Ward was weak, bedridden, and in need of constant care from home aides. Ward died in December 1966 at the age of 93, with a small private funeral held on December 12. A public memorial service was held at Union Theological Seminary on January 4, 1967, with fewer than the chapel's capacity of 500 persons in attendance.
Social Ministry: An Introduction to the Study and Practice of Social Service. (Editor.) New York: Eaton and Mains, 1910.
The Social Creed of the Churches. New York: Eaton and Mains, 1914.
Social Service for Young People: What Is It? Boston: Social Service Department of the Congregational Churches, 1914.
A Yearbook of the Church and Social Service in the United States, Vol. 1. (Editor.) New York: Fleming H. Revell, 1914.
Social Evangelism. New York: Missionary Education Movement of the US and Canada, 1915.
Poverty and Wealth from the Viewpoint of the Kingdom of God. New York: Methodist Book Center, 1915.
A Yearbook of the Church and Social Service in the United States, Vol. 2. (Editor.) New York: Fleming H. Revell, 1916.
The Living Wage: A Religious Necessity. Philadelphia: American Baptist Publishing Center, 1916.
The Bible and Social Living. With Sidney A. Weston. New York: Methodist Book Concern, 1917.
The Labor Movement from the Standpoint of Religious Values. New York: Sturgis and Walton, 1917.
Social Duties in War Times. New York: Association Press, 1917.
What Every Church Should Know About Its Community. With Henry A. Atkinson. New York: Federal Council of Churches of Christ in America, 1917.
Foreign Missions and Social Service. New York: Board of Foreign Missions of the Methodist Episcopal Church, 1917.
Christianizing Community Life. With Richard H. Edward. New York: Association Press, 1918.
The Christian Demand for Social Reconstruction. Philadelphia: W.H. Jenkins, 1918.
The Gospel for a Working World. New York: Missionary Education Movement of the US and Canada, 1918.
The Religion of Democracy. Boston: Murray Press, 1918.
The New Social Order: Principles and Programs. New York: Macmillan, 1919.
The Opportunity for Religion in the Present World Situation. New York: The Womans Press, 1919.
Social Unrest in the United States. New York: Methodist Federation for Social Service, 1919.
Repression of Civil Liberties in the United States (1918-1923). Chicago: American Sociological Society, 1923.
The Profit Motive: Is It Indispensable to Industry. New York: League for Industrial Democracy, 1924.
Ethical Aspects of Industrialism. Beijing: Peking Leader Press, 1925.
The New Social Order: Principles and Programs. New York: Macmillan, 1926.
Creative Ideas in the Orient. Bloomington, IL: Public School Publishing Co., 1926.
Our Economic Morality and the Ethic of Jesus. New York: Macmillan, 1929.
Which Way Religion? New York: Macmillan, 1931.
In Place of Profit: Social Incentives in the Soviet Union. New York: Scribner's, 1933.
Fighting to Live. New York: American League Against War and Fascism, 1934.
The Development of Fascism in the United States. New York: American League Against War and Fascism, 1936.
Spain's Democracy Talks to America: An Interview. New York: American League Against War and Fascism, 1936.
The Fascist International. New York: American League Against War and Fascism, 1937.
Concerted Action for Peace. New York: American League for Peace and Democracy, 1938.
Democracy and Social Change. New York: Modern Age Books, 1940.
The Soviet Spirit. New York: International Publishers, 1944.
Soviet Democracy. New York: Soviet Russia Today, 1947.
The Story of Soviet-American Relations, 1917-1958. New York: National Council of American-Soviet Friendship, 1959.
The Harry F. Ward Sampler: A Selection from His Writings, 1914-1963. Annette T. Rubinstein, ed. Ardsley, NY: Methodist Federation for Social Action, 1963.
"The Kaiser and Others: The Treatment of International Offenders in the Light of Penal Reform," The World Tomorrow [New York], vol. 2, no. 11 (November 1919), pp. 298–303.
"Why I Believe in Giving Justice," The Biblical World, vol. 54, no. 4 (July 1920), pp. 348–351. In JSTOR.
"The Bible and the Proletarian Movement," Journal of Religion, vol. 1, no. 3 (May 1921), pp. 271–281. In JSTOR.
"The Moral Valuation of Our Economic Order," Journal of Religion, vol. 1, no. 4 (July 1921), pp. 416–417. In JSTOR.
"The Function of the Church in Industry," Annals of the American Academy of Political and Social Science, vol. 103 (Sept. 1922), pp. 96–100. In JSTOR.
"Social Science and Religion," Journal of Religion, vol. 2, no. 5 (Sept. 1922), pp. 476–489. In JSTOR.
"Is Jesus Superfluous?" Journal of Religion, vol. 10, no. 4 (Oct. 1930), pp. 471–486. In JSTOR.
"The Development of Fascism in the United States," Annals of the American Academy of Political and Social Science, vol. 180 (July 1935), pp. 55–61. In JSTOR.
"Organized Religion, the State, and the Economic Order," Annals of the American Academy of Political and Social Science, vol. 256 (March 1948), pp. 72–83. In JSTOR.
1 2 Eugene P. Link, Labor-Religion Prophet: The Times and Life of Harry F. Ward. Foreword by Corliss Lamont; illustrations by Lynd Ward. Boulder, CO: Westview Press, 1984; pg. 2.
↑ Link, Labor-Religion Prophet, pg. 3.
1 2 3 4 5 Link, Labor-Religion Prophet, pg. 4.
1 2 3 Link, Labor-Religion Prophet, pg. 5.
↑ Link, Labor-Religion Prophet, pg. 5. Los Angeles recorded a population of slightly more than 50,000 people in the census of 1893.
↑ Link, Labor-Religion Prophet, pp. 5-6.
↑ Link, Labor-Religion Prophet, pp. 6-7.
↑ Link, Labor-Religion Prophet, pp. 7-9.
↑ Link, Labor-Religion Prophet, pg. 9.
1 2 David Nelson Duke, In the Trenches with Jesus and Marx: Harry F. Ward and the Struggle for Social Justice. Tuscaloosa, AL: University of Alabama Press, 2003; pg. 44.
↑ Duke, In the Trenches with Jesus and Marx, pg. 45.
↑ Duke, In the Trenches with Jesus and Marx, pg. 50.
1 2 Duke, In the Trenches with Jesus and Marx, pg. 46.
↑ Harry F. Ward, "The Christian in Politics," sermon of June 24, 1900, Harry F. Ward Papers, Union Theological Seminary. Quoted in Duke, "In the Trenches with Jesus and Marx," pg. 50.
↑ Duke, "In the Trenches with Jesus and Marx," pg. 51.
1 2 3 Duke, "In the Trenches with Jesus and Marx," pg. 52.
1 2 3 4 "Harry Ward Dies; Led ACLU to '40," New York Times, December 10, 1966.
↑ Duke, "In the Trenches with Jesus and Marx," pg. 61.
1 2 3 Duke, "In the Trenches with Jesus and Marx," pg. 58.
↑ Duke, "In the Trenches with Jesus and Marx," pg. 59.
↑ Duke, "In the Trenches with Jesus and Marx," pp. 59-60.
↑ Duke, "In the Trenches with Jesus and Marx," pg. 60.
↑ Duke, "In the Trenches with Jesus and Marx," pg. 71.
↑ Duke, "In the Trenches with Jesus and Marx," pg. 73.
↑ Duke, "In the Trenches with Jesus and Marx," pp. 72-73.
1 2 3 Gary Dorrien, Social Ethics in the Making: Interpreting an American Tradition. Chichester: Wiley-Blackwell, 2008; pg. 128.
↑ "Dr. H.F. Ward Quits Liberties Organization," New York Times, March 4, 1940.
↑ "Liberties Union Asks Red to Resign," New York Times, March 5, 1940.
1 2 Ward, Labor-Religion Prophet, pg. 303.
↑ Ward, Labor-Religion Prophet, pp. 304-305.
David Caute, The Fellow Travellers: Intellectual Friends of Communism. New Haven, CT: Yale University Press, 1988.
Henry Sloane Coffin, A Half Century of Union Theological Seminary, 1896-1945: An Informal History. New York: Charles Scribner's Sons, 1954.
Robert H. Craig, Religion and Radical Politics: An Alternative Christian Tradition in the United States. Philadelphia, PA: Temple University Press, 2005.
David Nelson Duke, In the Trenches with Jesus and Marx: Harry F. Ward and the Struggle for Social Justice. Tuscaloosa, AL: University of Alabama Press, 2003.
David Nelson Duke, Christianity and Marxism in the Life and Thought of Harry F. Ward. PhD dissertation. Emory University, 1980.
Eugene P. Link, "Harry F. Ward: Christian Rebel," Mid-America: An Historical Review, vol. 56 (Oct. 1974), pp. 221–230.
Doug Rossinow, "'The Model of a Model Fellow Traveler': Harry F. Ward, the American League for Peace and Democracy, and the 'Russian Question' in American Politics, 1933–1956," Peace and Change, vol. 29, no. 2 (April 2004), pp. 177–220.
Doug Rossinow, "The Radicalization of the Social Gospel: Harry F. Ward and the Search for a New Social Order, 1898–1936," Religion and American Culture: A Journal of Interpretation, vol. 15, no. 1 (Winter 2005), pp. 63–106. In JSTOR.
Ralph Lord Roy, Communism and the Churches. New York: Harcourt, Brace, 1960.
|
0.975138 |
Logan County is a county located in the U.S. state of West Virginia. As of 2000, the population was 37,710. Its county seat is Logan6.
Logan County was formed in 1824 from parts of Giles, Tazewell, Cabell, and Kanawha counties. It is named for Chief Logan, famous Native American chief of the Mingo tribe. In 1921 it was the location of the Battle of Blair Mountain, one of the largest armed uprisings in U.S. history.
According to the U.S. Census Bureau, the county has a total area of 1,180 km² (456 sq mi). 1,176 km² (454 sq mi) of it is land and 4 km² (1 sq mi) of it (0.31%) is water.
As of the census² of 2000, there were 37,710 people, 14,880 households, and 10,936 families residing in the county. The population density was 32/km² (83/sq mi). There were 16,807 housing units at an average density of 14/km² (37/sq mi). The racial makeup of the county was 96.33% White, 2.59% Black or African American, 0.12% Native American, 0.30% Asian, 0.02% Pacific Islander, 0.06% from other races, and 0.59% from two or more races. 0.54% of the population were Hispanic or Latino of any race.
There were 14,880 households out of which 30.50% had children under the age of 18 living with them, 57.00% were married couples living together, 12.60% had a female householder with no husband present, and 26.50% were non-families. 24.00% of all households were made up of individuals and 11.40% had someone living alone who was 65 years of age or older. The average household size was 2.50 and the average family size was 2.95.
In the county, the population was spread out with 22.10% under the age of 18, 9.30% from 18 to 24, 28.00% from 25 to 44, 26.10% from 45 to 64, and 14.50% who were 65 years of age or older. The median age was 39 years. For every 100 females there were 94.20 males. For every 100 females age 18 and over, there were 91.00 males.
The median income for a household in the county was $24,603, and the median income for a family was $29,072. Males had a median income of $31,515 versus $20,212 for females. The per capita income for the county was $14,102. About 20.80% of families and 24.10% of the population were below the poverty line, including 34.60% of those under age 18 and 14.40% of those age 65 or over.
The Logan Banner - daily newspaper.
This page uses content from the English language Wikipedia. The original content was at Logan County, West Virginia. The list of authors can be seen in the page history. As with this Familypedia wiki, the content of Wikipedia is available under the Creative Commons License.
|
0.999985 |
We are encountering the following issue: Googlebot encountered extremely large numbers of links on your site. The site is an ecommerce site and has around 12M pages indexed in Google. From the examples provided, a majority of links are from facets and internal search queries. The facets are using rel="canonical" to the non faceted version and set to 'No URLs' via URL parameters. The search pages are noindexed and set to 'No URL's via URL parameters and up until recently were blocked via robots.txt. Despite blocking the facets/search pages via URL parameters, using canonical, and noindex Googlebot is still crawling these pages.
I've heard that I should also be blocking the facets via robots.txt, but we had our search pages disallowed in robots.txt and Google did not honor it.
What other options do I have to resolve this issue?
Regrading @John Mueller's answer to a similar problem: Solving "Googlebot encountered extremely large numbers of links on your site." He says that the message is sent out before the new URLs are crawled, meaning the robots.txt, and noindex robot tags, or rel=canonical are not known at that point. Given that the facets have been blocked since 2012, Google should not be finding these unique URLs from crawling our site internally, does this mean that people are externally linking to these faceted links, thus providing Google this list of faceted URLs?
This is not an issue that needs to be resolved. Any site that has a large number of pages on it gets this message. Google tells you this in case you accidentally published URLs, especially ones with duplicate content.
As long as you mean to publish your URLs and are handling any duplicate ones appropriately, this is not an warning that you need to pay further attention to. I've worked with large sites that have had this warning for years, but always enjoyed great rankings and lots of search engine traffic.
I spoke with John Mueller regarding robots.txt, URL parameters, canonicals, and noindexation. Using 'URL parameters' in GWT is a strong suggestion to Googlebot, but not absolute. Googlebot still spot checks the URLs, so depending on the number of URLs the spot check might be fairly visible. Also, since we had 'URL parameters' set to not crawl search queries and facets - Googlebot would be limited to how often the URLs are crawled. Which means it'll take longer to recrawl them and drop them out of Google's index. Regarding robots.txt, since we were blocking the search pages via robots.txt, Googlebot would not be re-crawling the URLs to see the noindex. So, removing the search pages from robots.txt was the correct move.
Because of the amount of search pages/facet pages, it'll take some time for the URLs to get reprocessed. John Mueller gives us a time from half a year to 3/4s a year to be recrawled and dropped out naturally.
Solution: John Mueller's suggestion is to use Google's urgent 'Remove URL' tool found in GWT: Remove URL.
Here is the video link of John Mueller's response from Google webmaster office hours.
if you send us 5-100x more URLs than you actually have content, that can result in us not being able to pick up new content as quickly as we might if we could crawl more efficiently.
So going on a limb, setting the URL parameters for their purpose could make a crawl more efficient....or at the very least allow Gbot to understand what its about to encounter. Seems like just turning them off is an easy way out rather than the "right" way, especially for a major player with huge amounts of facets and query identifiers like Walmart.
Also another thought is your canonicals themselves...noticing on your rel=next in the android tab pc category for example that is full of querystrings such as facet= cat_id= etc. Maybe its just me but that seems counter-intuitive to define a canonical full of querystrings without the bot being able to understand the parameter logic itself.
Again, it's not a direct answer to your question, and im not an expert on your traffic, but it seems to me like it could effect things for the Gbot, even if in a post-warning yet pre-understanding way.
Not the answer you're looking for? Browse other questions tagged google google-search-console googlebot or ask your own question.
What to do if Google starts to index fewer pages from your site?
URLs with parameters & canonical tags. Block them via robots.txt vs GSC URL parameters?
Crawl Budget economy: what to do with URLs with tracking parameters?
How should UTM parameters be configured in Google Search Console URL parameters tool?
Is it necessary to block googlebot and googlebot-video to block video crawl?
|
0.993676 |
There are schools offering math courses in Georgia!
Approximately 0.2% of graduates in of Georgia receive math degrees every year. In other words, every year an estimated 501 math professionals graduate from Georgia's 37 math schools.
Emory University, which is located in Atlanta, is the top-ranked school in Georgia that has a math program. It received a ranking of 14th in the country in 2010. 26 students graduated with a degree in math from Emory University in 2010. Emory University charged in-state students $39,158 in tuition fees per year.
University of Georgia, which is located in Athens, is the second-ranked school in Georgia that has a math program. It received a ranking of 15th in the country in 2010. In 2010, University of Georgia graduated 80 students from its math program. University of Georgia charged in-state students $8,736 in tuition fees per year.
The third-ranked school in Georgia with a math program is Georgia Institute of Technology-Main Campus, which is located in Atlanta. In 2010, it was ranked 19th nationwide. In 2010, Georgia Institute of Technology-Main Campus graduated 67 students from its math programs. Tuition at Georgia Institute of Technology-Main Campus was $8,716 per year.
A math degree from a Georgia school... what next?
The government projects that, by 2018, the number of math professionals in the state of Georgia will grow to 1,690. This would require a 3% growth in the field.
For more data regarding a career in math in Georgia and to compare salaries with various related fields such as accounting or physics, take a look at the graphs and charts below.
|
0.794908 |
Laycock was born in Westminster on 18 April 1907, the eldest son of Brigadier General Sir Joseph Frederick Laycock (died 1952)—an officer of the Royal Regiment of Artillery knighted for his services during the First World War—by his marriage on 14 November 1902 to Katherine Mary (Kitty) Hare (1872–1959), who was previously married to and divorced by the 6th Marquess of Downshire (died 1918), and herself a granddaughter of William Hare, 2nd Earl of Listowel. Laycock was thus a half-brother of the 7th Marquess of Downshire; their sister Josephine (died 1958) married Edward Greenall, 2nd Lord Daresbury, and is grandmother of the present Baron. Through his father's relationship with the married Daisy Greville, Countess of Warwick, issue occurring before and during his marriage with Kitty, Robert Laycock was half-brother to the Countess of Warwick's son Maynard Greville (1898-1960), and daughter, Mercy Greville (1904-1968).
Laycock was educated at Lockers Park School and Eton College, followed by officer training at the Royal Military College, Sandhurst, from which he emerged as a well-read young man with a scientific bent.[according to whom?] He also briefly worked in a factory.
In 1954, his old friend, Anthony Head, now Secretary of State for War appointed Laycock to the position of Commander-in-Chief and Governor of Malta. This was during a period of tensions surrounding a drive for independence, with Prime Minister Dom Mintoff leading a campaign for "Integration (with Britain) or Self-Determination", and the Nationalist Party looking for a "Quasi-Dominion Status. Prior to his assuming the position of Governor, Queen Elizabeth knighted Laycock in the drawing room of Sledmere House, Yorkshire whilst staying as fellow house guests of Sir Richard Sykes, Baronet. Laycock served until 1959, having had his term extended twice.
A noted horseman, yachtsman and historical book collector, his interests made him a man who could enjoy life. It was said by many[by whom?] he had no enemies.
His estate was probated at £279,910.
Laycock was married in 1935 to Claire Angela Louise Dudley Ward (1916–1999) younger daughter of the Right Honourable William Dudley Ward, Liberal MP for Southampton by his wife Freda Dudley Ward née Winifred May Birkin, granddaughter of Sir Thomas Isaac Birkin, 1st Baronet. By his wife, he had two sons, and three daughters. His wife Angela, Lady Laycock, died in 1999.
Emma Rose Laycock, now Lady Temple (born 1943), married 1964 Sir Richard Chartier Carnac Temple, 5th Bt. (born 1937), elder son and heir of Sir Richard Antony Purbeck Temple, 4th Bt., of The Nash, MC ( 1913– 5 December 2007) by his first wife Lucy Geils de Lotbinière, dau of Alain Joly de Lotbinière, of Montreal; they have issue, three daughters.
Katherine Martha Laycock (born 1949); married 1969 David Mlinaric (born 1939), interior designer and decorator, has three children.
^ Michael Rhodes, with supplements by Brooke. " Sir Richard Antony Purbeck Temple, 4th Baronet, MC (1913–2007)". "Peerage_News" group on Google, 8 December 2007. The baronetcy was created 1876 for Sir Richard Temple, 1st Baronet, a British India colonial administrator.
This page was last edited on 31 May 2018, at 14:58 (UTC).
|
0.996389 |
Great Lake (ひょうたん湖) is a large lake that lies in the northern part of the Great Forest of Tob and extends to the southern end of the Azerlisia Mountains.
This enormous lake has a width of approximately twenty kilometers and has the shape of an inverted calabash or ladle. Its waters flow between the southern tip of the Azerlisia Mountains and Great Forest of Tob.
The Great Lake is the main setting for this arc, specifically the Wetlands, where the lizardmen reside. Nazarick plans to expand its power and turns its attention to the demi-human tribes of the Great Lake. Wishing to convert the strong bodies of the lizardmen into powerful undead, Ainz sends Cocytus to carry out the campaign.
After arriving at the southern part of Great Lake, Cocytus sends out a messenger to deliver a message to the lizardmen tribes. Instead of cowering in fear of the threat, it promotes the lizardmen tribes to unite and overcome the invasion. Led by Green Claw, the tribes unite under one banner and face the undead army. After eight days of preparing for battle, the lizardmen successfully become one tribe and manage to obliterate the first wave of the attack and later fend off the second. Cocytus seeing that his army is on the verge of defeat immediately sends out Iguva=41. The lich, though powerful, also falls to the combined might of the tribal chiefs. As the last undead falls, it leaves the lizardmen in triumph.
The united tribes' victory does not last for long as an even stronger and better equipped undead army is assembled right outside the Green Claw's village. The lizardmen witness the fantastical creatures from Nazarick and tremble at their power. An ultimatum is given by Ainz Ooal Gown, who was impressed by their ability to overcome his previous army. Rather than destroying them, Ainz offers to give them a chance. If they are able to defeat his warrior, Coyctus, he promises to forever abandon his attempts to conquer the lizardmen.
The tribal chieftains, seeing no other alternative, agree to the terms. The lizardmen sent a force of sixty-two warriors to combat Cocytus. All were slain to the last lizardman, and with their defeat, the Lizardmen Alliance were conquered. However, their warrior's resolve impressed Cocytus even to request Ainz to resurrect a few of the strongest to serve Nazarick.
The conquest of the Great Lake area had only begun. Cocytus, with the help of Demiurge, began to integrate the lizardmen into Nazarick. He then later led a campaign to the northern part of the lake to subjugate the toadmen.
By the time the Sorcerer Kingdom has been established, the entire Great Lake and the surrounding areas have fallen under their rule due to Cocytus' subjugation campaign. Ainz visited the lizardman tribe to see how things have been progressing before beginning his journey to the Dwarf Kingdom.
The lake is divided into two parts. The upper lake and the lower lake. The upper lake is relatively deep, hence large creatures tend to gather there while the lower lake is inhabited by smaller creatures.
Located at the southern end of the lower lake is a large region where the lake and the wetlands blended into each other. Several tribes of lizardmen live here and their villages are located over the muddy lands.
The lizardmen dwell in the southern part of the Great Lake.
The toadmen inhabit the northeastern side of the Great Lake.
Southeast of the toadmen settlements, there is a swamp where the twin witches dwell.
Supposedly, the Great Lake was once frozen over in the past.
The lizardmen are just one of the recent tribes to establish a home near the Great Lake.
|
0.999921 |
Write a personal encouraging message on the back of one of these inspirational gift tags. The cheerful assortment of colors and Scripture messages is sure to bless the recipient of your thoughtful and loving gift. Each set of gift tags includes 16 tags with a decorative cord to attach to gift.
|
0.999987 |
What would a Norseman in the early 11th century have worn as daily clothing?
Most of the Norse clothing we know about seems to come from burials. However, in many cultures, bodies dressed for burial are wearing either "good" clothes, or special clothes for the dead. Is there any evidence to suggest that ordinary, everyday wear for Norsemen (or, indeed, Norse women) was different to that which we see in excavated graves?
I passed the question to Cathy Raymond. Although she does not earn her living in either history or in textiles (due, I suspect, to her preference for a non-gruel based diet), I've read her research for a couple of years, and I've come to trust her opinion. One of the reasons I place faith in her opinion is that after answering the question, she offered the responsible academic caveat that "just about all of what we 'know' about Viking clothing is deduction from slender evidence."
In warm weather: A linen shirt and linen trousers, probably linen underpants shaped like knee-length boxer shorts, probably with a leather belt and leather shoes.
In cold weather: same as above, but with a wool tunic and wool trousers being worn over the linen ones (or instead, depending on an individual's level of wealth). Some kind of wool footwrapping or stocking (this part is pretty speculative but there is support for it, and it makes a lot of sense given the climate), a wool, fur, or wool-and-fur hat, and a wool cloak for traveling or other prolonged presence outdoors where one wouldn't be working. The style of the wool tunic probably varied by culture; the farther east you went, the more likely a wrapped jacket (shaped kind of like a modern Japanese gi) would have been used instead of a closed tunic.
Hurstwic's article is pretty good but it concentrates heavily on western Vikings (Norwegians and Danes, mostly, including the ones that stole...er settled land in the British Isles) instead of the eastern ones (Swedes, including the ones that stole, er... settled land in what's now Russia).
In short, the general profile of menswear among the 11th century Vikings/Norsemen is pretty similar to what you'd put on in the morning--i.e., pants and a shirt. But the details--shape, fiber, modes of fastening, how shoes were made and worn--have changed a lot in 1,000 years.
Not the answer you're looking for? Browse other questions tagged middle-ages everyday-life vikings fashion or ask your own question.
What would be accurate illustrations of vikings and viking culture?
How were small swords worn in the 18th century?
What caused the imposition of strict celibacy for Catholic priests during the 11th century?
Was there self-censorship in private correspondence in the early 19th Century?
How were the hides of wild beasts cured and tanned back in the 11th century?
How did contemporaries view the Byzantine Empire during the 11th century?
|
0.946132 |
Harry Truman lived for nineteen years after leaving the White House in 1953. He and his wife Bess returned to Truman's hometown of Independence, Missouri, where Truman spent his post-presidential years guarding and constructing his legacy and place in history. He also continued to comment on political events of the day.
Truman selected Independence as the site for his presidential library and oversaw its construction. Upon its completion, Truman spent a good deal of time at his office there, until health concerns in the mid-1960s limited his mobility and forced him to remain at home. At the library, Truman relished receiving important guests, meeting scholars who were studying his presidency, and speaking to groups of visiting school children. His trademark feistiness remained intact; he told one young history professor that he had better go home and read his books before trying to interview him again.
In 1955, Truman published the first volume of his memoirs; the second volume followed in 1956. Unfortunately, he hired ghostwriters and research assistants of questionable ability to help him through the process. As a result, the volumes were poorly organized, marred by leaden writing, and offered neither a comprehensive account of the Truman presidency nor many insights. Nonetheless, both volumes sold well upon their release.
Truman remained active in American politics after he left the White House. Eisenhower's handling of the presidency annoyed and angered Truman, who regularly criticized the administration's policies and politics in public appearances. He actively campaigned against Eisenhower in 1956. The personal relationship between the two men, already strained after Ike declared in 1952 that he would run for the Republican nomination, deteriorated throughout the eight years of Eisenhower's presidency. Truman had better relations with Presidents Kennedy and Johnson. He expressed reservations about Kennedy in 1960—thinking him too young and too Catholic to be a successful Democratic presidential nominee—but once in office, Kennedy and his wife charmed the ex-President. Truman felt even more comfortable with President Johnson, with whom he had enjoyed cordial relations while Johnson was on Capitol Hill. He never got along with President Nixon, however.
Truman found time to relax and rest in his post-presidential years. He was never far from his favorite bourbon and enjoyed clanking glasses with the old friends, political allies, and dignitaries who came through Independence. While his health permitted, he took regular walks around town. He traveled some, including a 1953 auto trip to New York during which a policeman stopped him on the Pennsylvania Turnpike for making an illegal lane change. It was Truman's only attempt at a long drive after leaving the presidency.
Harry S. Truman died on December 26, 1972, of old age rather than any specific sickness. Bess vetoed plans for an elaborate state funeral and arranged an Episcopalian service in the auditorium of the Truman Library. She had a Baptist minister and the Grand Masonic leader of Missouri conduct the proceedings. Truman was buried in the courtyard of his presidential library, with a simple stone epitaph that he himself had prepared. It listed the dates of his birth and death, the birth of his daughter, and his public offices from district judge to President of the United States. When Bess joined him ten years later, her marker read "First Lady of the United States."
|
0.823904 |
The Siege of Tobruk was a confrontation between the Italo-German army under Lieutenant-General Erwin Rommel and British Commonwealth forces that lasted for 253 days in North Africa during the Western Desert Campaign during the Second World War. The siege started on 10 April 1941, when Tobruk was attacked by Italo–German forces, and continued for 253 days up till 10 December 1941, and was only lifted when the Polish Carpathian Brigade under Major-General Stanisław Kopański attacked and captured White Knoll during Operation Crusader.
On 24 March, Rommel launched his first offensive with the newly arrived Afrika Korps. By early April he had destroyed most of Major-General Michael Gambier-Parry's 2nd Armoured Division's tanks (British 3rd Armoured Brigade) and severely damaged its 2nd Support Group at Mersa Brega, leaving the road south of the Jebel Akhdar (Green Mountains) to Mechili open. He brought forward along the coast road, elements of the 17th Pavia and 27th Brescia Divisions while pushing his mechanized units across country towards Mechili. On 6 April the leading Bersaglieri columns of the Italian Ariete Division reached Mechili.
On 6 April the Australian 9th Division received orders to withdraw along the coast road to Tobruk. Amid the confusion and congestion of the road of the so-called "Benghazi Handicap", Generals Neame and O'Connor were captured.
The positions at Mechili were defended by non-tank elements of 2nd Armoured Division (3rd Indian Motor Brigade and elements of the 2nd Support Group). Surrounded, they fought bravely in defence of Mechili, but Gambier-Parry surrendered to General Pietro Zaglio of the Pavia Division on 8 April.3,000British, Indian and Australians were captured at Mechili after an attempted breakout was broken up by the Ariete's Fabris and Montemurro Bersaglieri battalions.
On 10 April, in preparation for the forthcoming battle, the 15th Panzer Division's commander, Major-General Heinrich von Prittwitz is killed along with his driver by an anti-tank shot, while conducting a reconnaissance outside Tobruk. Upon finding out, the commander of the 5th Light Division, Major-General Johannes Streich, angrily drove up to Rommel's headquarters in a commandeered British vehicle to personally blame him for the loss of von Prittwitz. Rommel points out that Streich could also have been killed in a case of mistaken identity by protecting 20mm guns, to which Streich replies that in that case Rommel would've killed two German generals in just one day.
About 70 tanks came right up to the antitank ditch and opened fire on our forward posts. They advanced in three waves of about twenty and one of ten. Some of them were big German Mark IVs, mounting a 75-mm gun. Others were Italian M13s and there were a lot of Italian light tanks too. The ditch here wasn't any real obstacle to them, the minefield had only been hastily rearmed and we hadn't one antitank gun forward. We fired on them with antitank rifles, Brens, and rifles and they didn't attempt to come through, but blazed away at us and then sheered off east towards the 2/13th's front.
When the infantry were about 500 yards out we opened up, but in the posts that could reach them we had only two Brens, two antitank rifles and a couple of dozen ordinary rifles. The Jerries went to ground at first, but gradually moved forward in bounds under cover of their machine guns. It was nearly dusk by this time, and they managed to reach the antitank ditch. From there they mortared near-by posts heavily. We hadn't any mortars with which to reply, and our artillery couldn't shell the ditch without risk of hitting our own posts.
At the El Adem road, Axis tanks engaged with the 1st Royal Tank Regiment, and four Italian tanks and one German panzer were lost. Two British tanks were also lost, but the British forced the Axis armoured column and infantry to withdraw. The 2/13th Battalion's mortar platoon, equipped with two Italian 47mm antitank guns, also knocked out two Italian tanks in the El Adem road action.
That night, Axis tanks along with pioneers again probed the Australian defences, but were driven off by the 2/17th Battalion.
That night, a strong German night-fighting patrol attempted to captured strongpoint R33, but the attack failed when Lieutenant-Colonel Mackell personally led a counterattack along with six of his men. The Australians claim 12 Germans were killed and one captured, and Corporal Jack Edmondson was posthumously awarded the Victoria Cross for his part in the action.
On the night of 19th/20th April 1941, No. 7 Commando (carried in the cargo ship HMS Glengyle) under the cover of the anti-aircraft cruiser HMS Coventry and three Australian destroyers (HMAS Stuart, Voyager and Waterhen), raided the port of Bardia. The British commandos inflicted considerable damage to an Axis stores dump and managed to destroy a bridge and four coastal guns, but were not all unable to escape on the single landing craft made available to them and nearly 70 were consequently forced to surrendered to an Axis motorized column.
At about 20:00, German tanks moved up near the strongpoint S.1 and, using grappling hooks pulled away the barbed wire entanglements. Tanks from the 5th Panzer Company and supporting infantry from the German 2nd Machine-Gun Battalion and a Pioneer Battalion proceeded to clear up the bunkers manned by Captain Fell's A Company, 2nd/24th Battalion. Strongpoint S1 was the first to fall. Two panzers drove to within 100–200 yd (91–183 m) of the strongpoint, and opened fire, and, after a brief fight (in which three men were killed and four wounded), Lieutenant Walker and his men surrendered to the Germans. These tanks then proceeded to attack the defenders of S.2 (under Major Fell), which contained the Company HQ and 7th Platoon. Getting to within 200 yards, the panzers opened fire, shredding sandbags on the parapets and blowing up sangars. On each tank were riding German infantrymen, who under cover of the tank fire, ran forwards with grenades forcing the Australians to surrender.
German infantry now concentrated on the 9th Platoon defenders dug-in along strong points R.0 and R.1. After a fight in which three were killed and four wounded, the defenders surrendered. The crews of two Royal Horse Artillery 2-pounders provide effective fire support, knocking out some of the panzers, but when the guns tried to turn to engage tanks moving to their flank, they exposed themselves to German machine-gunners, with the gunners either killed, wounded or captured. The bunkered platoons from the neighbouring C Company from the 2nd/24th Battalion were also attacked. Strongpoint S.5 was captured at first light on 1 May, and strongpoints S.4 (under Corporal Rod Deering) and S.6 (under Captain Lin Canty) held out grimly until late in the morning. Strongpoint S.7 (under Corporal Thomson) stubbornly resisted, inflicting heavy casualties on the attacking Italians, before the attackers were able to throw in grenades. Attacks on strong points S.8, S.9 and S.10 were repelled. Nevertheless, C Company suffered 20 men killed and wounded, and another 44 taken prisoner in the fighting in the northern sector.
The British 51st Field Regiment had been constantly firing, causing an entire German battalion to scatter and, according to Rommel, creating panic in the Italian infantry. Seven British Cruiser and five Matilda tanks also appeared in the Italian area of penetration, engaging in an inconclusive battle with Italian tanks.
Two companies get off their motor lorries and extend in battle order. All sorts of light signals go up — green, white, red. The flares hiss down near our own MGs. It is already too late to take aim. Well, the attack is a failure. The little Fiat-Ansaldos go up in front with flame-throwers in order to clean up the triangle. Long streaks of flame, thick smoke, filthy stink. We provide cover until 2345 hours, then retire through the gap. It is a mad drive through the dust. At 0300 hours have snack beside tank. 24 hours shut up in the tank, with frightful cramp as a result — and thirsty!
After several tanks lost their tracks, the remaining Panzers have no option to retreat and the Australians claim a victory.
Nevertheless, the Axis forces had captured fifteen strong points on an arc of 5.6 kilometres of the perimeter, including its highest fort. The Australians had fought well and one German POW commented: "I cannot understand you Australians. In Poland, France, and Belgium, once the tanks got through the soldiers took it for granted that they were beaten. But you are like demons. The tanks break through and your infantry still keep fighting." Rommel wrote of seeing "a batch of some fifty or sixty Australian prisoners [probablyy C Company, 2nd/24th Battalion that had surrendered to the Italians]... marched off close behind us — immensely big and powerful men, who without question represented an elite formation of the British Empire, a fact that was also evident in battle."
Nevertheless, the 9th Division losses had been heavy. Australian casualties were 59 killed, 335 wounded and 383 captured.
The besiegers would be principally Italian units belonging to the Ariete and Trieste (20th Motorised Corps), Pavia, Bologna, and Brescia Divisions (21st Infantry Corps). The Australian commanders would remain determined to recapture the ground lost on 1 May.
On 3 May, the Australians launched a counterattack employing the 18th Brigade but are only able to recapture one strongpoint from the Italians. On the night of 16/17 May, the Axis combat engineers and supporting infantry retaliate and although the participating German pioneers (under a Major Betz) fail in their attack, two platoons of the 32nd Combat Sappers Battalion and Brescia infantry (armed with flamethrowers) come to their rescue and secure and successfully defend the captured S.8, S.9 and S.10 strongpoints from the Australians.
On the night on 16 May 1941, two platoons of the 3rd Combat Engineer Company in union with assault groups of the "Brescia" Infantry Division, which had been sent as reinforcements on the 11th of that month, initiated the attack. With total disregard to danger and usual stealthiness, the combat sappers opened three paths in the wire fencing in front of each assault group. They used explosive charges in tubes. Fighting side by side with the assaulters, in fierce hand-to-hand combat, they inflicted heavy losses on the enemy, and obtained the objective.
|
0.999903 |
How to play Zilch? It is simple: 1. First roll the six dice: Some of your dice should be worth some points (if not, you will not score any point during this turn. It is called zilching. Keep in mind that you must score points when you roll some dice).
3. To win the game you must reach 10,000 points (or score over 10,000 points AND have more points than your opponent).
- Win ten games to unlock the third simulated opponent (called Realist).
- The game of Farkle on Wikipedia here.
- The various combinations (and their points): * A single 1 (100). Two ones (200). Three ones (1000). Four ones (2000). Five ones (4000). Six ones (8000). * Three twos (200). Four twos (400). Five twos (800). Six twos (1600). * Three threes (300). Four threes (600). Five threes (1200). Six threes (2400). * Three fours (400). Four fours (800). Five fours (1600). Six fours (3200). * A single 5 (50). Two fives (100). Three fives (500). Four fives (1000). Five fives (2000). Six fives (4000). * Three sixes (600). Four sixes (1200). Five sixes (2400). Six sixes (4800).
- To get a free roll: Have all dice selected! The best example is getting a single 1 or a single 5 on the last cube when rolling it.
- To get a free roll (and 500 points): A six dice roll must not score any point from a combination.
|
0.950674 |
¿QUÉ HACER CUANDO LA EMPRESA ME QUIERE HACER UNA MODIFICACIÓN DE LAS CONDICIONES DE TRABAJO?
¿HAY QUE DECLARAR LAS INDEMNIZACIONES POR DESPIDO EN EL IRPF?
DIFERENCIA ENTRE BAJA VOLUNTARIA Y ABANDONO DEL PUESTO DE TRABAJO.
|
0.763007 |
The Mendicant Orders were a 13th century movement that stirred up great controversy in the Middle Ages. Called so from the Latin verb mendicare (to beg), they rejected wealth and possessions in order to emulate their view of the ideal Christian life.
The first group that earned the title "mendicant" was founded by St. Francis of Assisi (1181-1226). Deciding that a life without material possessions was more godly, he created a group that he called the Ordo Fratrum Minorum. Literally, this means Order of Minor Brothers—Francis himself referred to his members as fraticelli, "little brothers"—but from Latin frater through French frere the word became friar to denote these men. Therefore, it is usually now officially called (in English) the Order of the Friars Minor, or the Grey Friars, although colloquially they are called simply Franciscans. His first step was to gather 12 disciples; then he presented his group to Pope Innocent III for official recognition. Innocent was reticent at first, and wanted Francis to return when his group was larger and better established, but (supposedly) he had a dream in which he saw Francis supporting the Basilica of St. John Lateran, which is the Pope's "seat" in his role as Bishop of Rome. Innocent accepted that Francis would support the Church, so he approved the new Order. He had the men tonsured; ordained or not (and Francis never was, another reason that they were "minor" brothers), tonsuring was a mark of their Church connection, and was a way to say "you're part of the team now, so stick with approved doctrine!"
Maybe it was a dissatisfaction with the growing wealth and opulence of the church, or a desire to do something toward Salvation that didn't require traveling on Crusade, or merely the eloquence of the messengers and the attraction of the message, but the Order grew quickly. Franciscans traveled to preach in England, France, Spain, Hungary; Francis went to Egypt, but returned to make sure the message of the Friars Minor was not being diluted by too many new ideas. Still, he did not feel the need to "rule" his Order: in 1220, he resigned his position as its head, leaving it to Peter of Cattaneo (who died in 1221) and then Elias of Cortona (who, with Franciscan humility, always signed his name "Brother Elias, sinner).
He also formed, with St. Clare of Assisi, a sister order; as well as the Third Order of St. Francis for lay people who wish to live as nearly as possible a godly life while still being part of the world.
The nice thing about being a saintly person and creating your own fan club while alive is that, upon your death, your memory is likely to spur people to action. Elias of Cortona immediately started to raise funds for building a church to Francis in Assisi, and labored to get him canonized—which he was, less than than 2 years after his death, by Pope Gregory IX. The new church was far enough along by June 1230 to receive Francis' body.
The Mendicant Orders, and the Franciscans especially, would become involved in serious debates in the future over whether priests or the Church should own property. Those arguments are what provided Umberto Eco with the setting for his best-selling first novel, The Name of the Rose.
|
0.948227 |
Between the Nazi seizure of power in 1933 and the beginning of World War II in 1939, SS chief Heinrich Himmler built an unassailable position for the SS in the Nazi regime by taking control of the German police forces.
By late 1934, Himmler and his deputy, SD chief Reinhard Heydrich, had centralized the regional German political police departments within a single new agency in Berlin, the Secret State Police (Geheime Staatspolizei; Gestapo). After Hitler appointed him Reichsführer SS and Chief of German Police on June 17, 1936, Himmler centralized the various criminal police detective forces (Kriminalpolizei-Kripo) in Germany into the Reich Criminal Police Office (Reichskriminalpolizeiamt) and united the Gestapo and Criminal Police within the Security Police Main Office (Hauptamt Sicherheitspolizei).
Himmler also centralized the German uniformed police forces, known as the Order Police (Ordnungspolizei), within the Order Police Main Office (Hauptamt Ordnungspolizei) in Berlin under the command of SS General Kurt Daluege. On September 27, 1939, four weeks after Nazi Germany invaded Poland to initiate World War II, Himmler fused the Security Police and the SD into the Reich Security Main Office (Reichssicherheitshauptamt-RSHA), the agency that would be tasked with implementing the Holocaust in 1941-1942.
Himmler's intent was a complete fusion of the SS and the German police. He aimed to utilize the executive authority of the police to implement ideological policies deemed by the Nazi leadership to be essential for the survival and expansion of the German race. These included smashing political opposition and expelling or eliminating “undesirable” racial groups at home (such as Jews, Roma [Gypsies], and people with hereditary disabilities), initiating a program of military expansion, and establishing permanent rule of a German “master race” in eastern Europe and the Soviet Union. The security of this “thousand-year Reich” would be guaranteed by the elimination of “enemy races,” such as the Jews—wherever they lived—and the enslavement of other “inferior races” such as Poles, Russians, and other Slavic peoples, after physically annihilating their intellectual, cultural, military, and political elites.
To implement these policies, Himmler and his SS leaders, on the other hand, by tying it to the SS, removed the police from the framework of the administration and judicial system of the German state. Police operations ordered by Hitler through the SS-police chain of command would no longer be constrained by judicial or administrative review. Hitler as Führer could authorize all such actions, including individual and mass murder, on the basis of his “will” to ensure the survival of the German race-nation. Such an authorization was not subject to the laws of the state or international law.
Himmler never succeeded in completely amalgamating the SS with the police. Nevertheless, virtually all leadership posts in the uniformed police and the police detective forces were held by SS officers; by 1938, SS control over the police was unchallenged. Few German police officers objected to the change in their status related to the state and the justice system. Many police officials joined the SS willingly; the overwhelming majority of police officers welcomed this broad expansion of their policing powers that association with the SS brought them.
After centralizing the German police by mid-1936, the SS and police leaders streamlined the regional organization of the SS and police in anticipation of the conquest of Europe. In 1936, Heydrich and Daluege appointed regional representatives, called Inspectors of Security Police and SD (Inspekteur der Sicherheitspolizei und des SD-IdS) and Inspectors of the Order Police (Inspekteur der Ordnungspolizei-IdO). From 1939 until 1945, these representatives were called Commanders of Security Police and SD (Befehlshaber der Sicherheitspolizei und des SD; BdS) in occupied territory. The IdS/BdS and the IdO/BdO commanded all of the personnel and units, respectively, of the Security Police and SD and Order Police in the region to which they were assigned.
In 1937, Himmler established regional representatives of all SS and police agencies called Higher SS and Police Leaders (Höhere SS- und Polizeiführer-HSSPF). The HSSPF represented all interests of the SS and police, including those that went beyond police functions (such as settlement planning, caring for ethnic Germans, and supervising the maintenance of the Military SS—Waffen-SS). In case of emergency, the HSSPF commanded all SS and police agencies in his region and answered only to Himmler. The deployment of personnel and resources to carry out mass murder operations—whether by shooting as at Babi Yar near Kiev, Ukraine, or in killing centers such as Chelmno or Treblinka—could only take place under the authority of the HSSPF or his subregional representatives, the SS and Police Leaders (SS- und Polizeiführer-SSPF).
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.