proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.926691 |
In many finite horizon episodic reinforcement learning (RL) settings, it is desirable to optimize for the undiscounted return - in settings like Atari, for instance, the goal is to collect the most points while staying alive in the long run. Yet, it may be difficult (or even intractable) mathematically to learn with this target. As such, temporal discounting is often applied to optimize over a shorter effective planning horizon. This comes at the cost of potentially biasing the optimization target away from the undiscounted goal. In settings where this bias is unacceptable - where the system must optimize for longer horizons at higher discounts - the target of the value function approximator may increase in variance leading to difficulties in learning. We present an extension of temporal difference (TD) learning, which we call TD($\Delta$), that breaks down a value function into a series of components based on the differences between value functions with smaller discount factors. The separation of a longer horizon value function into these components has useful properties in scalability and performance. We discuss these properties and show theoretic and empirical improvements over standard TD learning in certain settings.
|
0.999915 |
What is a barometer, how does it work, and why is it useful in predicting the weather?
A barometer measures air pressure by examining the forces that air exerts on surfaces. The higher the air pressure, the more force air will exert on a certain surface. Most barometers compare the present air pressure with a known pressure by putting those two pressures on opposite sides of a flexible surface. The higher the air pressure, the more that surface will bend away from it. You can make a simple barometer by inserting a drinking straw in narrow-mouthed jar that’s half full of water and by sealing the neck of the jar around the straw (with a rubber stopper, wax, or glue). Make sure that the end of the straw is immersed in the water and that the water level in the straw is above the top of the jar. As the outside air pressure decreases, the trapped air inside the jar will push the water farther up the straw. As the air pressure increases, it will push the water farther down the straw. Try to keep your barometer’s temperature constant, because temperature will also affect its water level. You can use your barometer to predict the weather (somewhat) because storms tend to be accompanied by lower air pressures.
|
0.979441 |
There is a lot of controversy around the world about nuclear power and how these plants can be used to generate electricity.
One camp touts this method of energy creation as a cleaner alternative that requires no use of fossil fuels, while others are concerned about the environmental impacts of a possible disaster.
So, what is a nuclear power plant exactly, and how does it function?
Nuclear power is generated from the splitting of uranium atoms in a process known as fission. In the power plant, this process is used to produce heat, which in turn results in steam. This is then used by a turbine in order to create electricity.
It is not renewable - once the supplies of uranium have been used up, that's it.
There are two different types of nuclear plants used by electricity suppliers around the world.
This is the most popular kind of generator and consists of two circuits. One is used for cooling and heating transfer and the other for steam production.
In the primary circuit, water is kept under pressure so it heats up but the process is stopped before it can reach boiling point.
This heat is then sent to the steam generator, which is where water in another tube is turned into steam that is directed into the turbine generator.
Water in these two circuits is kept separate, and does not mix.
The other type of system used is called a boiling water reactor, or BWR. Here the process of fission is also used to boil the water, which is then turned into steam that powers the turbine generator.
Both systems reuse the steam by turning it back into water and sending it back through the tubes a second time.
Neither system uses combustion to create power and there are no carbon emissions created.
One of the main benefits of nuclear power is its lack of greenhouse gas emissions, which means it is kinder to the planet.
They can be used to help maintain the Earth's climate and keep air quality standards high by reducing pollution.
Nuclear power plants are able to produce a high level of energy by using a low amount of fuel. This reduces the amount of transport that needs to take place in order to get the energy from point A to point B.
These plants do not require as much land as solar or wind farms, so more space can be dedicated to other uses.
The areas around nuclear power plants are very clean, including any lakes or rivers, aiding aquatic life conservation.
Any water discharged from these kinds of power plants is free from pollutants and must meet all temperature standards before being discharged into the water.
As a result, the areas around nuclear plants are often developed as wetlands to promote the preservation of marine animals, trees, grasses and flowers.
Many endangered species are found in the areas adjacent to these properties. One problem many people have with wind farms is the attraction bird life has to the propellers. This can reduce the numbers of protected birds in these areas, harming the food cycle.
Practically speaking, nuclear power plants are also a more reliable source of energy as there is no need to gamble on the weather patterns to determine supply.
Rain or shine, nuclear power plants can generate energy.
They are also able to run for an extended length of time before requiring any maintenance or service, so they have a lower overall operating cost.
Uranium is a common element, according to the Franklin Institute Science Museum, which states it is as prevalent as tin.
Many people are concerned about the impact nuclear waste has on the environment, and what would happen if there was an accident.
Only small amounts of nuclear waste are created by nuclear power plants, but this can be expensive to remove as the output is radioactive.
This means if this waste were to leak out into the environment, it could contaminate water supplies as well as the food chain.
Nuclear waste is carried on the road, by rail and also by sea, increasing the risk of a terrorist attack. If a waste train were to be involved, tens of thousands of people could be exposed to cancer-causing radiation, according to Greenpeace. Entire regions would need to be evacuated.
These waste products can also be used to create nuclear weapons, which again raises the issue of terrorism.
In order to be kept safe, this waste must be sealed up and buried for thousands of years - enough time for the radioactivity to die away. The most dangerous waste needs to be kept safe for over 100,000 years in geological repositories.
During this period, it must be kept safe from natural disasters such as earthquakes and flooding as well as terrorists. This can be a costly and difficult process.
The other major concern many have is the event of another Chernobyl, or Fukushima-type event.
Even when small doses of radiation are released into the environment, reactions can be seen in local residents, such as nausea, vomiting, fatigue and diarrhoea. These symptoms may not even be evident straight off the bat, hitting some people years after the exposure in form of ailments like cancer.
Currently, the Australian government has no plans to pursue nuclear energy.
|
0.99984 |
How appropriate to be writing a review of a film like “The Apostle” on the birthday of the god his followers celebrate. Although Mel Gibson’s “Passion” comes to mind immediately when you think of Hollywood stars bankrolling movies about Christ or Christianity, Robert Duvall took a similar risk in 1997. Unlike Gibson, Duvall is far less interested in proselytizing for a particular religious point of view than in understanding the religious mindset. Written and directed by Duvall and featuring him in the role of the Pentecostal preacher Euliss “Sonny” Dewey, “The Apostle” defies easy interpretations–including from the left.
Sonny Dewey’s Forth Worth church has lots of black parishioners who respond enthusiastically to the ecstatic sermons he belts out while strutting around the tabernacle like James Brown. In the opening scenes we learn that Dewey developed an affinity for the passionate and extroverted style of black preachers while in the company of his black nanny as a young boy.
It should come as no surprise that Sonny has trouble warding off Satan, no matter how many times he has ordered him to get behind. When his wife (Farah Fawcett) tires of his philandering and boozing, he seems incapable of change. Instead of admitting his guilt, he implores her to get down on her knees with him and pray to Jesus in order to rekindle their marriage. She will have none of this, since she has obviously been through this with him too many times in the past.
Sonny takes it on the lam from Fort Worth. The only people he trusts at this point are his best friend Joe, whom he saved from a life of booze and promiscuity, and his pious mother. The two are played respectively and more than capably by country singing star Billy Joe Shavers and June Carter Cash, the renowned country singer and late wife of the late, great Johnny Cash.
One of the more captivating moments of this odd but captivating film is June Carter Nash singing a hymn along with Sonny as they drive along a Texas road moments after stopping by the wreckage of a huge, multiple car collision. Sonny takes his bible under his arm and goes to a crumpled car off the side of the road, where he discovers the injured occupants just moments away from death–a teenage boy and girl. Sonny implores them to accept Jesus as their savior so that they can live in bliss for all eternity in heaven with the angels. A highway patrolman shooing Sonny away asks him if preaching does any good. Duvall answers that he would prefer to die that day in god’s good graces than to live for a hundred years in sin.
Sonny leaves everything behind him in Fort Worth and resurfaces as “The Apostle E. F.” in a tiny, impoverished Louisiana town where he attempts with some success to launch a Pentecostal church that attracts poor and African-American worshippers (played mostly to great effect by non-professionals.) Without giving away too much, we can say that he finds redemption here. When a local racist played by Billy Bob Thornton stages an assault on the church, Sonny fends him off at first with his fists and then with prayers. It is a credit to Duvall’s acting and writing skills that we begin to regard Sonny as a kind of hero, especially in light of our wariness about Bible Belt values raised to higher levels after the 2004 elections no doubt.
I agree completely with Rosenbaum. The film forces us to engage with the main character and the world he inhabits without the usual signposts. The fact that Duvall can make the case for Sonny at all shows that he is a skilled artist and writer. Long ago when I took a writing class at NYU, the instructor made a point that has stuck with me over the years. He said that the greatest characters in world literature are villains, but it takes the talents of a great writer to make such characters interesting or even appealing. That is what Robert Duvall has done.
Although I could find no reference to this in reviews of “The Apostle,” it seems that the film it has the greatest affinity for is Billy Bob Thornton’s “Slingblade.” Both films rely heavily on local color and on a grotesque major character capable of acting for good and evil simultaneously.
Furthermore, both films incorporate a kind of bleak humor that I find irresistible. For example, shortly after Sonny takes it on the lam, he persuades an elderly black man to let him stay the night. After setting Sonny up in his daughter’s pup tent on the back lawn (which he calls a mansion on the hill), he goes to bed with a shotgun in his hands. It is Duvall’s way of indicating that ultra-religious people might strike normal people as dangerous.
If nothing else, “The Apostle” is a virtual actor’s workshop. Duvall becomes the character in a way that I have not seen outside of the best performances of Robert DeNiro or Marlon Brando. Duvall spent time in Texas researching his character and steeping himself in the religious community the film depicts.
America can not be saved if Donald Trump is impeached or even assassinated. The first step of a long journery to save America must begin with the removal of not only the Pres. and VP but the entire Congress and Supreme Court, and, if not every almost every, General Officer and just as importantly those who have controled the press for the past 200 years.. There is only one institution that can do that. Yet the members of that institutional have no desire to do it.
The rest of us who are not fooled can just sit around and eat bread and watch the circus, and wait for Alien Archeologists.
Here is my list of Apostoles metaphorically speaking.
It is not my position that everything that any of these individuals say is correct. It is my position that each person on this list helps mankind understand something that is very important.
|
0.996704 |
Total knee replacement is a surgical procedure in which injured or damaged parts of the knee joint are replaced with artificial parts. Primarily, this type of surgery is performed on patients suffering from severe arthritic conditions which result from the wearing away of the cartilage in the knee joint. Circumstances vary somewhat, but generally you would be considered for a total knee replacement if you were experiencing any of the following symptoms: severe constant pain which restricts even ordinary everyday activities; significant stiffness of your knee, instability of your knee, meaning it "gives out" frequently; or a significant deformity such as lock-knee or bowlegs.
Total knee replacement is a major operation, and as such requires that certain preparatory measures be followed in the days leading up to, and including, the day of surgery. Your doctor would go over specifics with you regarding topics such as anesthesia options, blood clot prevention, and pain control. Satisfactory physical health should be maintained, and it is often a good idea to find activities which will help increase upper body strength so that it's easier to maneuver on crutches or a walker after the operation.
Most joint replacement surgery is done using general anesthesia. During the procedure, the ends of the thigh bone and shin bone, and usually the underside of the kneecap, are removed. Next, the ends of these bones are capped with artificial surfaces lined with metal and plastic. Knee joint components are then secured with cement.
How long is the recovery and what does it entail?
Following surgery, you would remain in the hospital for several days, during which time you would begin physical therapy. PT is a crucial step in the process, since it serves not only to achieve mobility in the new knee joint, but also to strengthen the muscles that support it. The goal of these initial therapy sessions would be to allow you to bend your knee enough to do daily activities, such as walking, climbing stairs, sitting in and getting up from chairs, and getting in and out of a car. Upon your return home from the hospital, a continued exercise routine would be imperative so that strength and mobility can be regained.
Gradually, you would be able to resume normal physical activities such as golf, bike riding, swimming, dancing, and cross country skiing. High-impact activities, however, such as running, playing tennis, or movements that put a lot of stress on the joint, would most likely be discouraged by your doctor. The good news is that the pain you experienced prior to surgery would be greatly reduced or eliminated, and with the proper mix of continued exercise and care, a replacement knee can last anywhere from ten years to the rest of your life.
|
0.999991 |
Finding affordable insurance can be a daunting and requires doing a lot of homeworkInsurance but can be a crucial component for your peace of mind. Searching for the right insurance can help save you out-of-pocket costs in cases of emergencies. There are a few things to keep in mind that will help you find a plan you can live with. Here are the main factors to consider when shopping for insurance.
1. What can you afford per month or per quarter?
Most insurance companies will bill you either monthly or quarterly or yearly. Analyze your budget and decide how much you can afford to spend per billing period. Don't go above the figure you are comfortable with when deciding on an insurance policy. Also, consider what you think you would be able to afford in case of an unforeseen expense; if a sudden expense comes up, will you still be able to pay your bills?
2. What is the deductible?
Health insurance almost always involves a deductible. This is an additional expense you will need to pay at the time of any services rendered. For example, you may need to pay a certain amount of money for a visit to the doctor's office. Also, many prescription drugs require a co-pay, meaning that you pay a share of the cost for the medication. This may be a fixed dollar amount, such as ten or twenty dollars per prescription, or it may be a percentage. Decide what you think you can afford in terms of deductibles and co-pays. Keep in mind that plans with high deductibles may still be a good deal; hospitals will work with you to figure out a billing plan you can afford.
3. What kind of coverage do you need?
If you are shopping for auto or home insurance, there will be a certain minimum amount of coverage required by law. If you want extra coverage, you will pay more. It is up to you to decide whether or not you want the security of extra coverage. Health insurance is similar. The most basic health care plans are the least expensive options.. The less expensive policies generally cover hospitalization, emergency room visits, doctor's visits, and prescriptions. Extras include the ability to see a specialist, mental health care and pre-natal care. Also, dental and vision coverage are almost always separate from basic medical insurance. You will need to weigh what kind of coverage your medical condition requires and weigh this against what you can afford.
It is best to choose a policy from a reputable company. Do some research and find out if the company you are considering has a good track record, whether or not lawsuits have been brought against them, and whether they are fully licensed. Cut-rate insurance companies may tempt you with their low prices, but you may end up worse off in the long run.
|
0.999999 |
Then throughout the code something like Constants::getMaxValue() is used to get the value of a constant. This seems a very strange approach why wouldn’t you just use the define function in the outermost scope? I know define() can be quite slow but surely having to call a class property is not the most efficient way either?
Clearify the question: What is the advantage of a configuration container over globally define()ed configuration contstants?
The advantages are all the advantages that OOP offers: Data Abstraction and Encapsulation, Inheritance, Polymorphism and better design pattern integration.
|
0.999924 |
Sleep deprivation is dangerous. It can lead to reduced concentration levels, making one a threat to themselves and others particularly when they’re behind the wheel. On top of that, not getting enough sleep can prevent one from focusing at work—and depending on your work environment, that can be hazardous, too.
One of the most significant sleep disorders is sleep apnea, which occurs when a person has such difficulty breathing during sleep that they intermittently wake themselves, thereby preventing them from getting a decent night’s rest. There are medications and devices that can help sleep apnea sufferers sleep better, but are there are certain types of foods that can help promote sleep?
Tell someone you’re looking for a natural way to get some more sleep and chances are they’ll tell you to try taking melatonin. Indeed, melatonin is available in supplement (or pill) form and can be taken before bed to help you relax and get to sleep.
But melatonin is also prevalent in a number of popular foods, including a variety of fruits and vegetables, like cherries, corn, asparagus, tomatoes, pomegranate, olives, grapes, broccoli, and cucumber. It’s also available in grains and a variety of nuts and seeds.
|
0.999651 |
Why do pogroms occur in some localities and not in others? Jeffrey S. Kopstein, professor and chair of political science at University of California, Irvine examines a particularly brutal wave of violence that occurred across hundreds of predominantly Polish and Ukrainian communities in the aftermath of the Nazi invasion of the Soviet Union and notes that while some communities erupted in anti-Jewish violence, most others remained quiescent.
Jeffrey S. Kopstein is professor and chair of political science at University of California, Irvine. His books include The Politics of Economic Decline in East Germany, 1945–1989 and Growing Apart?: America and Europe in the 21st Century. His newest book, co-authored with Jason Wittenberg,Intimate Violence is a novel social-scientific explanation of ethnic violence and the Holocaust. It locates the roots of violence in efforts to maintain Polish and Ukrainian dominance rather than in anti-Semitic hatred or revenge for communism. In doing so, it cuts through painful debates about relative victim-hood that are driven more by metaphysical beliefs in Jewish culpability than empirical evidence of perpetrators and victims. Along with his co-author, Kopstein concludes that pogroms were difficult to start, and local conditions in most places prevented their outbreak despite general anti-Semitism and the collapse of the central state. In fact, fewer than 10 percent of communities saw pogroms in 1941, and most ordinary gentiles never attacked Jews.Kopstein and Wittenberg shed new light on the sources of mass ethnic violence and the ways in which such gruesome acts might be avoided.
Professor Kopstein's Athenaeum presentation is co-sponsored by the Mgrublian Center for Human Rights at CMC.
|
0.974066 |
Should we allow questions and/or recommendations about software & electronic devices related to the outdoors?
Typically, any kind of question seeking a shopping recommendation has been off-topic, across the board at Stack Exchange.
As for software questions, I think they should be off-topic, perhaps asked/migrated at/to Super User, our site for computer hardware/software (full disclosure: I'm a SU diamond moderator), where well-written, specific software-rec questions are allowed.
Example question: Are there any cheap 1:25K electronic maps for the UK or Europe?
What about questions regarding GPS units? Should those be allowed in the scope of The Great Outdoors?
I think they should be allowed if they are tied specifically to outdoor activities. GPS have a wide range of outdoor uses, and electronic maps can be very important for trip planning and printing. Meanwhile, the superuser community is less likely to have domain specific knowledge of the types of software that avid outdoor enthusiasts would.
However, if the question is related to problems operating software, I think SU would be a much better fit.
|
0.959974 |
Is it possible to use a blob storage account in Azure for Jira Data Center's shared home directory?
We are in the process of trying out Jira Data Center in Azure, we currently have a hosted Jira Software (single server instance).
We have deployed using the Azure Markteplace template which worked without issues, we are now in the process of trying to edit some of the things done in the template to bring it more in line with our costs, one thing that we are trying to do and I'm asking here because I don't even know if it is possible is to use a Blob storage account instead of a file based storage account. Is this something that is possible, and if so could someone help me understand where that configuration change would be made since I'm not seeing anywhere that looks like it would accept a blob access key.
Our requirement is only for having the fileshare visible as a volume in the OS.
However, looking at the Azure documentation on file services, the Azure Files seems to be the simplest choice as it uses SMB 2.1 protocol and it does not need to support other complex and unnecessary features like REST requests in Blob Storage (which also does not seem to support SMB entirely). Also, Azure Disk appears to have extended functionality like the boot sector, which you do not need for the shared storage.
Essentially, yes, the Blob Storage should work. Keep in mind, though, to us it appears that Azure Files appears to be the best cost x benefit option, however, it might be good to confirm this with someone more specialized in Azure architecture since Atlassian does not provide official support for 3rd-party platforms.
Let me know if you have any further questions on this.
|
0.999827 |
Many couples must ponder the idea of whether or not there is truly a “right” time to divorce when faced with the decision to call it quits. Is there really such thing as a good time to break the sad news to friends and family? No one is ever truly prepared for the emotional toll that divorce entails, so it is completely understandable when a couple chooses to delay the decision. Some couples hold off with hopes for possible reconciliation, while others feel it may be best to stay together for the children.
Whatever the personal circumstances surrounding your imminent separation, weighing various factors that may ultimately shape your divorce experience for better or worse before officially ending the marriage can be beneficial. Evaluating these factors can help you identify your priorities in the divorce process, which can help you decide the best time to make the jump.
Finances are often one of the biggest factors couples take into account when ending a marriage. Not everyone has the luxury of preparing for the financial impact of separation. Despite even the best planning, adjusting to the significant financial pitfalls that sometimes result from divorce be difficult, especially for those who lack the resources they need to feel safe and secure on their own. Consider your personal financial snapshot: Have you established credit in your own name? Do you have any money in savings to pay for the costs of a divorce? Have you opened a bank account in your own name? Do you have a reliable income or are you currently unemployed? Even if you feel severely underprepared, there are ways to adapt, create new opportunities, new routines, build a support network, and draw on resources available to you. The key is often to find balance between needs, wants, and reality. Do not let worry over tight funds keep you in a toxic, unhappy marriage, that negatively impacts your mental and physical health. Remember that you may be eligible for maintenance (alimony) and other legal protections that provide you with the resources you need to take care of yourself following the divorce.
Speaking of emotional health in divorce, the need or desire for closure is another factor to take into consideration when deciding whether or not it is the right time for you to take the plunge. If you feel you have done all you can on your own to repair the marriage, you may reach a point where you feel you may do better to resolve the impending divorce sooner, rather than later. Dragging out the inevitable can lead to more emotional stress for the whole family. Consider your priorities in terms of gaining closure in the relationship; if you feel you have already done enough to bring you peace, you may be ready to move forward with the process. Emotional closure needs are different, and look different, for everyone. Maybe the more practical factors, such as financial security and living arrangements are all you feel you need to address before pulling the plug.
Many couples do not want to let friends and family down during the holidays or in the midst of summer vacation, which can lead them to delay the divorce. It is not uncommon for couples with children, in particular, to wait until the holiday season or big family gathering has passed before filing. You may also consider the best time for your divorce based on the tax implications that come with separating. Some couples choose to wrap up their previous year’s taxes before tackling the financial changes that come with divorce. Depending on your circumstances, waiting until January for a fresh start at the beginning of the new year may be beneficial both financially and emotionally for both parties.
Only you and your spouse can decide on the best timeline to carry out your separation. Divorce is a diverse and complicated issue on many levels, but thankfully the legal process can be streamlined and simplified when you work alongside a skilled Kane County divorce lawyer. Call Shaw Family Law, P.C today at 630-584-5550 for a personal consultation that can equip you with the knowledge you need to move forward.
|
0.98611 |
In a country such as China, which is excessively wary of foreign media; the entry of Google as one of the primary search engines for scouring local news; was always looked at with suspicious eyes by the Chinese government. It was therefore no surprise that Google pulled out its Chinese operations. Now, though Google is back on track with its search operations in China, one cannot ignore the fact that the Chinese government also looked at other popular social networking sites such as Twitter, Facebook and YouTube in the same light, persuading others to believe that even these sites would be having a short tenure in the Chinese virtual turf. Eventually they were also given the official marching orders.
However, there is a sharp contradiction in the internet media of China. While on one hand, the Chinese government is attempting to tighten the noose of censorship on the internet community of China, on the other hand there are a growing number of Chinese internet users, which exceeds 400 million, who are extremely proactive on the internet, thus helping the private sector dot com companies to rake in billions of dollars. The market capitalization of the top 30 listed companies make US $100 in revenue, with three of them operating from China, namely Alibaba, Tencent and Baidu. Hence there is clear evidence that the internet is growing at a swift pace in China. On the contrary, the state is trying to suppress the internet. So what exactly explains this dichotomy?
In China, the new media of the internet is an emerging one, which is gradually changing the tastes and preferences of the Chinese people, rather the netizens of China. One of the core areas of internet is gaming, wherein several Chinese gamers are thronging the gaming portals for a piece of the action. Additionally, instant messaging is a rage in China. Bulletin boards and forum threads are now overtaking emails as a preferred communication medium between friends and like-minded people. Besides, countless Chinese net savvy people are using the net for staying abreast with the latest news roundup, watching movie trailers and listening to music previews, which sometimes is also leading to media piracy.
As mentioned, popular social networking sites such as Twitter, Facebook and YouTube is officially banned in China. However, the ban has propelled certain clones of the sites, which are increasingly being used by the Chinese to carry out discourses such as campaigning or exchanging information. Then again, these local sites which substitute their famous counterparts, cannot offer the same cosmopolitan flavor or international reach that global networking sites offer.
The internet scenario in China is not very bright, according to a report from the New York Times by Gills Sabrie. The internet business in China needs to function in close accord with governmental authorities, which indirectly means that the political and business agendas would be mired. Secondly, these local online businesses cannot think about competing with the global brands because the scope is localized in nature. Moreover, the barrier that international websites encounter in China, allow the local websites to have monopolistic characteristics.
This subsequently leads to a lopsided price structure, which consumers eventually don't gain from. Therefore, the 'Great Firewall' of China is actually hindering the growth of local websites, preventing small companies to survive in the web space for a long time. The strict monitoring by the Chinese government since 2007 has stagnated progress of World Wide Web in the country.
Thus, it can thus be concluded that there has been no drastic changes that new media has brought about in China, as compared to the other corners of the world. For instance, controversies such as the blown up Beijing Olympics 2008 television coverage or the Tibet riots have not been comprehensively covered in the Chinese websites, nor have they garnered much support from online communities to campaign against the events. This is a testimony to the firm control the government has over the internet media. Unfortunately, the government has stifled any scope that social media sites behemoths such as Twitter, YouTube or Facebook might have had to expose the despicable acts which ensue on Chinese soil. Hence all these events would be virtually curtailed by the Great Wall of China. A whitepaper which was published by the state stated 'that the internet must serve the interests of both the economy and state'. This implies that the internet should always assist the government in furthering the welfare of the Chinese economy; if and when there is a tussle in the state and businesses, the state will always have the upper hand. The Chinese people have adapted to the censored version of the World Wide Web, which is reflected in the phenomenal growth in areas of internet businesses which are independent of such political ideologies. This also explains the contradiction which prevails in the Chinese internet space today.
Read the original article on Just Another Weblog. Copyright 2019.
|
0.972131 |
Discovering a new block is a task about generation of millions of hashes in order to find one valid hash, which is a hash less than the current target.
The question is: Are there more than 1 valid hash? Is it possible to find more than 1 hash valid for the same block? Maybe there are multiple nonce suitable to valid block hashes.
Yes, its possible for there to be more than one valid hash. I don't know what the mathematical probability of this is, but if you were to exhaust the entire nonce spectrum, there are likely to be several valid blocks. Most blocks, however, stop when they get a valid hash, so it seldom is an issue. Though occasionally, two miners might come up with different valid hashes at the same time, and this results in one of them being rejected.
As for a collision, well, that's effectively impossible. First, yes, it's possible that the same hash could be found for two different blocks, but that's not a collision. It's also highly unlikely. Unlikely to the point of there being no point in dealing with it.
Yes, it could screw up certain software that assumes hashes are indexable and unique, but it shouldn't really be an issue for the blockchain itself to have duplicate hashes.
The only real "collision" would be if an attacker were trying to come up with his own block of transactions, with the same parent that would somehow hash to the same value and trying to "take over" the other block, and that is astronomically unlikely to the point of absurdity.
Since changing a single byte of the block results in a different hash, a block can only have a unique hash. A block cannot have several hashes.
However, for a given previous block header, there's an quasi infinite number of new blocks that can be mined on top. The role of miners is to generate as many new blocks as they can on top of the current chain head, and then check if the hash of this new block is less than the current target.
To generate these new blocks, they pick a set of valid transactions that doesn't contradict previous transactions, compute the merkle tree of that set of transactions which they include in the block header. That block header contains the nonce field which they increment until they find a valid block or run out of nonce space, in which case, they start the process anew.
Certainly. Multiple miners can find a valid block hash for a specific block height and both would be valid blocks. In cases like this, the one that other miners decide to extend upon (usually by receiving the block first) becomes the "real" block and other block becomes stale (or orphaned). This happens fairly frequently.
Not the answer you're looking for? Browse other questions tagged bitcoind block hash or ask your own question.
|
0.999999 |
It is expedient to define the term “nationalism” before delving into a discussion of the aforementioned caption.
Nationalism is a multifaceted social, political or religious configuration that characterizes the inimitability or uniqueness of a particular nation. It is a concept that has as its primary objective, the securing and maintaining of jurisdiction through authority, self-governance or other methods that would ensure sovereignty over a territory of historical importance, such as an original homeland, to a race or group. Nationalism contends that a nation, for instance, should govern itself, exclusive of outside interference or meddling. The doctrine is inescapably intertwined with the principle of self-governance or self-determination.
Nationalism also revolves around developing and sustaining a national identity predicated on communal characteristics such as culture, language, race, religion, political goals or a belief in a common ancestry.1 Nationalism is fiercely linked with the preservation of a nature’s culture, and a sense of pride in a nation’s accomplishments. Consequently, the ideology is closely associated with the notion of patriotism.
Scholars used the term “nationalism”, from the late 18th century onwards, to exemplify the intention of a nation to pursue political autonomy and self-determination. History records nationalist movements in 19th century Germany, Italy, Greece, Serbia, Poland, Latin America, and 20th century China and Africa. There are many varieties of the mindset, among which are the following: (a) Integral nationalism (b) Civic or Liberal nationalism ( c) Ethnic nationalism (d) Religious nationalism (e) Left-Wing nationalism (f) Right-wing nationalism (g) Territorial nationalism, and (h) Racial nationalism.
Contrary to generally accepted protocol, which leans towards a ready dismissal of nationalism as maleficent or oppressive, the doctrine may be positive or negative, good or bad, or inclusive or exclusionary.
Given the above explanation of the nature and characteristics of nationalism, it seems appropriate to classify Zionism as a nationalist endeavor, but is the Zionist movement an unlawful or illegal form of the postulation? Negative or exclusionary nationalism relates to a majority ethnic group’s attempt to exclude and persecute minorities, often for the accrual of various benefits to the overassertive group. The presumption is negative nationalism accords little or no significance to global or international paradigms of justice and fair play. Those who practice negative or exclusionary nationalism are inclined to target the socially and economically fragile, and encourage their constituents to vent their frustrations on minorities that supposedly threaten their livelihood in one way or another. Promoters of negative nationalism sometimes direct their animosity towards minorities who are adhere to a religious persuasion that differs from the predominant faith of the land.
Zionism upholds or indorses none of the forgoing political, social or religious idiosyncrasies.
Israel is a democracy that boasts an enviable record of furthering the noble principles relative to (a) Civil Liberties (b) Multiculturalism and (c) Equality before the Law and the Right to Vote. It is unfathomable that leaders of other nations level charges of exclusionary or negative nationalism against the Jewish state. Furthermore, the allegations of wrongdoing take on an outrageously ironic guise when many of the accusers themselves exercise jurisdiction over governmental regimes that are blatantly nationalistic in deleterious ways, and that have a shameful history of discrimination and maltreatment of their minority populations. The author volunteers a few examples of such duplicity and treachery later in this discussion.
Religious Freedom – Israel is the only Middle Eastern country in which non-Jewish populations are allowed to co-exist and thrive with adherents of the primary faith (Judaism), instead of being persecuted and/or proscribed from living among those who subscribe to the central or ascendant worldview. As a matter of fact, although Israel was established as a Jewish state, it formally recognizes 15 religions, including Islam, the Baha’is and Druze faiths, as well as Chaldaic and many other Christian denominations, among other faiths. Israeli law mandates the protection of the holy sites of all religions. Each religious community enjoys unrestrained liberty to exercise its faith, observe its holy days and administer its internal functioning.
Freedom of Assembly & Freedom of Expression – The freedom to assemble, and to express oneself freely is the right of all Israeli citizens – Jewish or non-Jewish.
While hate speech and incitement to violence are outlawed, and indeed they should be in any civilized, constitutionalist society, expressing differences of opinion in any sphere of social, political and religious life in Israel is legal. Israeli-Arab members of the Knesset (the unicameral national legislature of Israel) have been known to criticize the Jewish State, and from the floor of the Knesset no less.
Free speech and communication in Israel are evidenced by the abundance of daily newspapers in Hebrew, Russian, Arabic, French and English. There are multiple hundreds of periodicals, numerous radio and TV stations, and ready access to the foreign press.
Civil Rights – Israel’s broadminded, liberal legislation guarantees protection of the rights of all minorities.
Contrary to what those opposed to the Israel’s existence as a self-governing state would propagandize, and what others who are obsessed with misrepresenting the truth about the country’s social, political and religious infrastructure would intimate, the Jewish nation is a pluralistic society. The following cultural characteristics of Israel might be a source of surprise to some, and a conduit of dismay to others who labor under a swath of denial.
Eighty percent of Israelis are people of Jewish ancestry derived from various ethnicities and races.
Many of the aforementioned Jews emigrated from the Middle East, Ethiopia, India, Russia, the U.S.A. and Europe.
Palestinians in the Territories, although they are not Israeli citizens, are enabled to petition the nation’s highest courts in legal matters. The Court administers its duties based on the merits of each case and as a matter of fact, often rules in favor of the Palestinians. A May 5, 2003 New York Times article lends credence to the aforementioned statement.
The entitlement of every Israeli citizen to vote or not to vote is an inalienable right granted to all Israeli citizens. The nation’s non-Jewish citizens, or its minority constituents, trace such a privilege to Israel’s Declaration of Independence. Election Day in Israel is a national holiday and voter turnout generally scales eighty percent, which is higher than even the voter turnout in the U.S.A. The Israeli electoral system accommodates various political parties that endorse a wide range of opinions i.e. Communist, religious, Arab, and secular standpoints. The multiparty system represents a departure from the traditional two or three-party arrangement that typifies most other democratic structures.
Why does there exist an international perception of Israel as a nation that is negatively or selfishly nationalistic?
The concept of nationalism is generally at odds with the perspective of globalism or a common global community. The forgoing assessment notwithstanding, there is a demarcation between positive nationalism and negative nationalism as alluded to earlier. The presumption is that negative nationalism evades global responsibility, while positive nationalism pursues domestic accountability. The reverse psychological play upon the italicized words in the preceding sentence leaves room for the assumption that negative nationalism may also evade domestic responsibilities, and positive nationalism may also pursue global obligations.
Furthermore, the theory of the development of a unified global community is nonsensically idealistic when one considers the overwhelmingly diverse social, political and religious agendas that hold sway in the multitudinous societies around the world. The very unpredictable situation as it relates to politics and religion in Europe and the Middle East, among other areas, makes it especially difficult to contemplate the emergence of any kind of global world order whereby there would be a common, undergirding framework for lasting international camaraderie and cooperation. In other words, globalism today is woefully absent while nationalism exists almost everywhere.
A society that demonstrates an unambiguous penchant for positive nationalism is more predisposed to be tolerant and accommodating towards foreign nations because its people are acquainted with the mores of good citizenship and social justice. A society that exhibit traits associated with negative nationalism, where for instance, dictators, autocrats and despots assume power, lacks the wherewithal to conform to standards and etiquette that appeal to international inclusiveness.
The forgoing having been said, negative nationalists tend to prey on people who experience the throes of social and economic instability. People who feel unobligated toward one another in a nation that displays negative nationalistic tendencies are wont to discriminate against minorities in their midst, and even rail against foreigners outside their borders in a misguided quest for a status of social or political, or even religious dominance. People whose livelihoods might be threatened welcome the opportunity to target others who they may somehow blame for their misfortune and on whom they can vent their frustrations.
In all of this, Israel is made out to be the villain…even though its nationalistic policies are rooted in justice and fair play. Zionism, which is a form of positive nationalism, is actually a commendable undertaking and is a proven success, given the breadth and latitude of Israel’s unique democratic processes.
If Zionism is racist merely because it is nationalist, then all nationalism is representative of racism. It follows that all nations that claim to be structured on nationalist principles also should be marginalized and ostracized from the global community, as is Israel. Anti-Zionism essentially advocates one or more of the following suppositions are true.
Jews are not a nation.
Evidence linking Jews to Old Testament (Torah) history is questionable.
Jews originated from Eastern Europe, not the Middle East.
Jews do not constitute a homogeneous group.
Jews have partnered with imperialists, Nazis and other oppressors throughout history.
Zionism essentially amounts to tyrannizing the Palestinians.
The forgoing allegations are false and unsubstantiated and do not coincide with the truth about the Jewish State of Israel, which, in its Zionist undertaking, embodies the moralities of positive of inclusive nationalism.
The Jews’ history is littered with episodes of discrimination, persecution and subjugation in their homeland and in countries around the world. They were expelled from the lands of their ancestors multiple times by hateful occupiers over the centuries and banished to diverse nations in which they were never welcome. During World War II, Jew hatred or anti-Semitism bourgeoned into the Holocaust – history’s deadliest incidence of genocide – and the unmitigated slaughter of over six million people of Jewish ancestry in Europe. The Jews, more than any other group of people, have the right to be allowed to return to their homeland i.e. Israel, and re-establish or develop an infrastructure that is unique to their social, political and religious needs and character. Zionism, or the reestablishment, development and protection of the nation of Israel is nationalism, but it is positive nationalism. It is nationalism that is eminently justifiable!
Just who are the decriers of Zionist nationalism?
It is lamentable that the majority of Middle Eastern countries, most of them Muslim theocracies, have pro-actively and systematically evicted Jews, Christians and other religious minorities over past decades without allowing them to return to lands that were their homes for thousands of years. Effectively, these nations have practiced nationalism – negative or exclusionary nationalism – for centuries, yet the world at large neglects to level discriminatory nationalist charges against these Muslim nations and instead demonizes Israel as illegally nationalist. To add insult to injury, many of the aforementioned nations themselves direct claims of unlawful nationalist charges against the Jewish nation. The following extract from a Jerusalem Post Christian Edition article, published in partnership with the International Christian Embassy Jerusalem (ICEJ) in February 2011 reveals some alarming statistics about the disappearance of Christians in Middle Eastern countries. The title of the article is The Tragic Decline of Middle East Christianity – Communities Dwindle under Pressure.
Recent upsurges of negative nationalism in Europe seem to solicit only token responses from global observers – unlike the more or less frenetic rejoinders to so-called unlawful Israeli or Jewish nationalism.
In Austria, for instance, the rise in popularity of the nation’s far-right Freedom Party and its performance in the 2016 general elections is seen as a resurgence of exclusionary nationalism. The Freedom Party’s unabashed agenda, which calls for stronger border defenses and tougher controls on immigration and asylum seekers, is a departure from the traditional political and social missions of one of Europe’s more stable democracies.
France’s National Front party, which lost in the country’s the 2017 general elections, nevertheless embodies a growing number of voters who lean towards unbridled nationalism. Marie Le Pen, the National Front’s leader unapologetically embraces anti-globalization and anti-immigration policies. Le Pen has proven to be formidable advocate of authoritarian politics and has sworn to oppose immigration and secure the country’s borders. Negative nationalism has been on a rise in France since the 1980’s, when the party’s founder, Jean-Marie Le Pen, Marie Le Pen’s father, won a seat in European Parliament in 1984.
Additionally, terror attacks in Paris, Nice and elsewhere in Europe, combined with seemingly endless streams of refugees and immigrants, particularly from Syria and other Muslim nations, have left many French citizens apprehensive. They feel endangered physically and economically. Michele Lamont, the Robert I. Goldman Professor of European Studies; Professor of Sociology and African and African American Studies at Harvard University offered the following statement in connection with the aforementioned outlook.
Switzerland also, finds itself a prominent player on the burgeoning European nationalist stage. The right-wing Swiss People’s Party (SVP) is the largest political assembly in the nation. The October 18, 2015 federal elections showed a shift due to voter concerns about refugee immigration. The SVP won a record number of seats, taking a third of the 200 lower-seat house. The party received the highest proportion of votes of any Swiss political party since 1919, when proportional representation was first introduced. 6 As the veteran Swiss nationalist, Christoph Blocher, advocates without reservation, the SVP’s mission is to make Switzerland fiercely independent and equipped to defend traditional values and combat “asylum chaos” across Europe.
The Southeast Asian nation of Indonesia, the fourth most populous country in the world (population of around 200 million), and the largest economy in the region, is embroiled in economic, cultural and territorial issues from a nationalistic perspective. Indonesians express their dissatisfaction at what they deem foreign interference in the nation’s affairs, and demand greater international recognition of the country’s status in the global arena. Politicians, intellectuals, and leaders of religious and social organizations, and ordinary citizens as well, regularly declare that foreign countries regularly demonize, exploit, and mistreat Indonesia, and do not accord the nation the respect it deserves as a major nation of the region, which includes Malaysia and Australia.
Recent actions of the incumbent Prime Minister of India, Mahendra Modi, indicate a leaning toward the adoption of national policy that reeks of religious exclusionism. The strategy, epitomizing Modi’s Bharatiya Janata Party’s (BJP) staunch stand for Hinduism, India’s main religion that numbers 80 percent of the country’s 1.3 billion people, is worrying, to say the least. Modi himself is a Hindu, and is a vocal supporter of the worldview, notwithstanding the expectation that the Prime Minister’s office in such a large democracy should project an image of religious neutrality or pluralism.
A wave of disturbances by Hindu nationalists over recent months has placed Modi in an unenviable, embarrassing position. Sikh, Christian and Muslim minorities are understandably discomfited by the belligerence of Hindu nationals and feel threatened physically, emotionally and economically. They fear the institution of Hinduism as a national religion, with numerous frightful repercussions for non-Hindus across the country.
The escalating instances of disagreement between Hindu nationals and Indian secularists can only serve to undermine Mahendra Modi’s already deteriorating reform agenda, deepen the country’s political polarization, and temper economic growth.
The author volunteers the following couple of paragraphs as a personal aside in connection with Narendra Modi’s departure from religious freedom and inclusionism.
My wife Pamela and I were sponsors of a young Indian girl via the auspices of Compassion International, a Christian humanitarian aid child sponsorship organization dedicated to the long-term development of children living in poverty around the world. Early in 2017 we received notification from Compassion International that we could no longer support our sponsored child in India, and our financial assistance would be redirected to help better the life of a young Haitian child. Upon enquiry, we were told that Compassion International and other Christian humanitarian organizations were debarred from continuing operations in the Asian country. Organizations were free to offer assistance to impoverished children in India, we learned, but could not preach the Christian Gospel. The ban pertained not only to Christian organizations, but to Muslim, Sikh, Jewish, and other non-Hindu groups. The disclosure lanced my innermost feelings.
Shortly afterwards, I read about Indian Prime Minister Narendra Modi’s concerted drive to promote Hinduism in India, at the expense of other belief systems. Modi’s approach represents not only a nationalist undertaking, but a negative and exclusionary strategy of excommunicating and oppressing people who do not subscribe to the tenets of Hinduism. The aforementioned outrage is today a fact of life in one of the world’s largest democracies.
And people ridicule miniscule Israel for being nationalist…positively nationalist!
The forgoing are examples of nations around the world that are not only nationalist, but negatively or prejudicially separatist. Yet the world at large pays scant attention to such a troubling state of affairs, and instead single out the nation of Israel, which is decidedly a positively nationalist one, as an exclusionary nation that abhors globalism and mistreats its ethnic minorities. The Jewish nation’s Zionist program, they say, ignores international connectedness and discriminates against resident non- Jews.
In would seem in most instances, criticism or denouncement of Zionism as an illegitimate nationalist movement is nothing more than a façade for expressing anti-Semitic sentiments. As Abraham (Abe) Foxman (born 1940), former National Director of the Anti-Defamation League and currently the League’s National Director Emeritus said, “…anti-Zionism constitutes anti-Semitism if Zionism is the only nationalism being opposed.” Put alternatively, when criticism of Israel retrogresses into demonization and delegitimization of the nation’s right to exist as a Jewish state, such condemnation becomes anti-Semitism. When Zionism is adjudged a conspirational scheme to subjugate and take over the world, it is arrant evidence of anti-Semitism at work.
Triandafyllidou, Anna (1998). “National identity and the other”. Ethnic and Racial Studies. 21 (4): 593–612. doi:10.1080/014198798329784.
Loolwa Khazoom, Jews of the Middle East, MyJewishLearning.com; Howard Sachar, A History of Israel, 2000, pgs. 515-517.
Greg Myre, Trial of Palestinian Leader Focuses Attention on Israeli Courts, New York Times, May 5, 2003.
Sources: US State Department, CIA World Factbook.
Gerber, Marlène; Mueller, Sean (October 23, 2015). “4 Cool Graphs that Explain Sunday’s Swiss Elections”. The Washington Post.
I read with great interest your brief article on Zionism and Nationalism. Like so much of your writing, it was most informative and carefully constructed. I learn so much from your writings. Thank you for sharing this with me. Like you, I believe in the miracle of the State of Israel. It is God’s chosen nation. I imagine that our Lord gets very irritated with the myopic and negative responses of so many nations of the world and their vitriol toward this democratic nation. To quote Jesus, “Forgive them, Father, for they know not what they do!” I welcome with eager anticipation your published material in the near future. May God Bless your mission!
Thank you, Jim! Your insightful comments are truly encouraging and help lend purpose to my work. There is much too much misinformation circulating today about the Jewish nation of Israel and Jews in general. It is lamentable that many people who profess to be Christians fall prey to the lies that anti-Semites around the world readily peddle.
Thanks again! I wish you and your family God’s continued blessings.
|
0.96398 |
Widely admired for his intelligence, courtesy, and bravery, Philip Sidney was considered by his contemporaries to be the ideal Elizabethan gentleman. He passionately supported the Protestant cause and fought with valor on the battlefield, where he was mortally wounded during a campaign to aid Dutch Protestants who had rebelled against Spanish rule. He also wrote poetry and prose that advanced the development of English literature. His Astrophel and Stella was the first sonnet sequence in English, and his Apology for Poetry was the first literary essay in English. His prose writings and his poetry profoundly influenced his contemporaries and continue to inspire new generations of writers.
"But the poet is the food for the tenderest stomachs; the poet is, indeed, the right popular philosopher."
Philip Sidney was born into a prosperous family with aristocratic connections. His mother, Lady Mary Sidney, was the daughter of John Dudley (Earl of Northumberland; 1501–1553), whose oldest son was married to Lady Jane Grey (1537–1554), a descendant of the royal family. Sidney's father, Sir Henry Sidney (1529–1586), was a favored advisor of Edward VI (1537–1553), and held several important government positions during the reign of Elizabeth I (1533–1603; see entry). Sidney's uncles, Robert Dudley (Earl of Leicester; 1532–1588; see entry) and Ambrose Dudley (Earl of Warwick; c. 1528–1589), were among England's most wealthy and powerful men. In fact, Robert Dudley was one of the queen's closest personal friends.
Sidney grew up expecting to enjoy a life of influence, wealth, and fame. In 1564 he began his formal education at the Shrewsbury School, and two years later he entered Christ Church, Oxford University. Though he demonstrated exceptional intelligence, he left Oxford without completing his degree. From 1572 to 1575 he toured Europe. He was living at the English embassy in Paris at the time of the St. Bartholomew's Day massacre in 1572, when Catholic mobs killed thousands of French Protestants called Huguenots. Leaving France immediately after that traumatic event, which contributed to his hostility toward Catholicism, he visited Austria, Germany, Poland, Italy, and France. He studied languages, music, and astronomy, or the study of the sun, moon, and other celestial bodies. He impressed those he met with his extraordinary gracious-ness and intelligence.
When he returned to England, Sidney spent much time with his uncle, Robert Dudley, who helped him maintain influential connections that would advance his career. In 1576 Sidney traveled to Ireland, where his father was serving as lord deputy. Ireland had been under English rule since the twelfth century, but over the years English administrators there had gradually reverted to Irish customs. Rival chieftains competed for power, and English laws were not effectively enforced. After Elizabeth became queen, she began taking steps to bring Ireland under control. But the Irish were not easily subdued; the chieftains waged war against English troops sent to maintain order. Sir Henry Sidney, who was named lord deputy in 1565, governed the country with skill, but he employed ruthless measures to subdue rebellions. Many of the queen's advisors criticized his policies. Seeing conditions in Ireland for himself, Philip Sidney wrote Discourse on Irish Affairs, which he presented to the queen in defense of his father's administration.
In 1577 Sidney undertook a diplomatic assignment to Germany. His task was to try to organize Protestants there against Catholic rule. Little came of this effort, however, and he returned to England soon afterward. During this period he began to cultivate several literary friendships. He met poets such as Fulke Greville (1554–1628), Edward Dyer (d. 1607), and Edmund Spenser (1552–1599; see entry), whose efforts to create a new kind of English poetry inspired him to attempt writing as well. He wrote several experimental poems during the late 1570s. He also wrote Lady of May, an entertainment performed in 1578 in honor of the queen.
Around this time Sidney began work on his Arcadia, most of which he wrote while living with his sister, the countess of Pembroke, to whom he dedicated the work. Arcadia mixed prose and poetry in a wide-ranging discussion of large themes such as justice, virtue, honor, friendship, love, and morality. Scholars believe Sidney wrote most of this work around 1580, but it was not published until 1590, after his death. Arcadia was immensely popular in the 1590s and the early 1600s.
During the 1580s Sidney was also working on his Apology for Poetry. This work, the first literary essay in English, was also the most important essay of its era. At the time many writers and thinkers argued that imaginative literature (such as lyric poetry and prose romances) was a waste of time because it did not tell the truth and was not serious. They believed that such literature encouraged people to believe in silly things and even to behave in immoral ways. In their view, only such subjects as history, philosophy, ethics, and religion were suitable for study. In contrast, Sidney presented a defense of imaginative literature. He argued that poetry—a term he used to encompass all imaginative literature—was a better way to approach the truth than the study of either philosophy or history. He stated further that poetry could inspire people to be virtuous, because it could describe ideal ways of living; history, on the other hand, could only describe events that had really occurred and was therefore more limited.
Sidney also criticized earlier English love poetry, saying that it lacked energy and passion. "Many of such writings as come under the banner of unresistible love," he wrote, "if I were a mistress, would never persuade me they were in love; so coldly they apply fiery speeches." Sidney argued that the English language was perfectly suited to express passion and that writers should devote their energies to developing lyric poetry in English. He concluded that poets "are so beloved of the gods that whatsoever they write proceeds of a divine fury," and added that if anyone had "so earth-creeping a mind that it cannot lift itself up to look at the sky of poetry," then that person deserved to fail in love and to die forgotten.
Sonnets are short lyric poems, often about romantic love, that contain fourteen lines and follow a regular meter (the pattern of stressed and unstressed syllables) and rhyming pattern. English poets of this time admired sonnets by Italian writers such as Petrarch and began experimenting with the form. The Petrarchan sonnet consists of eight lines (called an octave) followed by six lines (called a sestet). Though English poets imitated this type of sonnet, they began creating sonnets that consisted of three groups of four lines each (quatrains), followed by a concluding rhymed couplet of two lines. Though William Shakespeare (1564–1616; see entry) was not the first to write this type of poem, it became known as the Shakespearean sonnet.
Though sonnets can employ various rhyme schemes, or the pattern of rhymes in a poem, they traditionally use a rhythm known as iambic pentameter. This is one of the most commonly used rhythms in English poetry because it follows the natural rhythms of the English language. In iambic rhythms, the second syllable of a word or phrase is stressed. Many kinds of poems in English use iambic meter, as can be seen in the first lines from a modern poem by Robert Frost, "Stopping by Woods on a Snowy Evening": "Whose woods these are I think I know, / His house is in the village, though." In this case, there are four stressed syllables in each line. Sonnets, however, contain five stressed syllables in each line. Iambic rhythms, as the passage from Frost shows, allow poets to use speech patterns that sound natural and relaxed instead of stiff and artificial.
In a sonnet sequence individual sonnets about a general subject are arranged in order, each poem expanding in a particular way on the sequence's general theme. Sidney's Astrophel and Stella, the first sonnet sequence in English, inspired leading poets such as Shakespeare and Edmund Spenser to compose sonnet sequences of their own. In the seventeenth century John Donne (1572–1631) and John Milton (1608–1674) expanded the sonnet's thematic range from romantic love to religious feelings and other serious philosophical issues. The sonnet remained a popular form through the nineteenth century; poets such as John Keats (1795–1821) and William Wordsworth (1770–1850) frequently wrote sonnets. Though less common in modern literature, sonnets can convey complex feelings within the strict boundaries of a concise form.
Like Arcadia, Apology for Poetry circulated among Sidney's friends in manuscript form. It was extremely influential, contributing to a renewed interest in exploring the poetic possibilities of the English language. Apology for Poetry was not published until 1595, after the poet's death.
Sidney had meanwhile fallen in love with Penelope Devereux, daughter of the earl of Essex. He longed to marry her, but in 1581 she married Lord Rich. She became the inspiration for the figure of Stella in Sidney's sonnet sequence, Astrophel and Stella. In these poems, a young man, Astrophel (from the Greek words for star and lover) addresses his love, Stella (from the Latin word for star). Astrophel expresses the various feelings associated with romantic love, including the struggle in his heart between reason and passion, ideal love and physical desire. These poems, which Sidney's friends read in manuscript form, were greatly admired. The sequence was first published in 1591 and inspired numerous imitations.
Though Astrophel and Stella was modeled to some extent on the sonnets of the Italian writer Petrarch (1304–1374), Sidney claimed that his poems sprang freely out of his own heart without any careful attention to formal rules. Therefore, he felt his poems were much more than a rehashing of older literary conventions. He aimed to infuse a more personal and dramatic energy into his sonnets than could be found in earlier models. By using more natural language and by writing about his emotions in the present time—not as if he were remembering them much later—Sidney succeeded in making the Elizabethan sonnet a more natural and energetic type of love poem than earlier lyric forms had been.
In 1583 Sidney married Frances Walsingham (1569–1631), daughter of the queen's secretary of state, Francis Walsingham (1530–1590; see entry). That year Sidney was also made a knight. (A knight is a man granted a rank of honor by the monarch for his personal merit or service to the country.) He was a passionate supporter of the Protestant cause in England, and he advocated policies that would strengthen the development of a reformed Protestant church. With other committed Protestant leaders such as his uncle, Robert Dudley, he urged the queen to send military aid to Protestants in Europe who were rebelling against their Catholic monarchs. Sidney believed that it was not only England's duty to help fellow Protestants, but also that England's security was at stake. Catholic power in Europe threatened Elizabeth's authority; in fact, Philip II (1527–1598; see entry) of Spain had been associated with conspiracies to overthrow Elizabeth and replace her with her Catholic cousin, Mary Stuart (Queen of Scots; 1542–1587; see entry). Many in Elizabeth's government recommended an aggressive foreign policy that included direct aid to Protestant revolutionaries in Europe.
Though the queen was reluctant to commit England to costly and controversial wars, the threat from Spain intensified during the late 1580s. In 1585 she finally agreed to send troops to the Netherlands. Sidney accompanied his uncle, Dudley, who had been given command of the expedition. Several months after arriving in Europe Sidney received a leg wound at the battle of Zutphen on September 22, 1586. The wound did not heal, and Sidney died three weeks later at the age of thirty-one.
Sidney's death prompted a huge outpouring of grief. The Dutch proclaimed him a national hero. More than one thousand English troops in the Netherlands gathered at the docks to pay their respects as his coffin was loaded onto a ship to be taken back to England. In London the streets were crowded with people who reportedly cried "Farewell, the worthiest knight that lived!" as his coffin passed them. Tributes to Sidney from more than 140 writers were collected and published in three volumes, while dozens of his friends wrote independent tributes.
Sidney died in debt, without ever having published any of his writings. His father-in-law, Walsingham, took on the responsibility for his debts. Sidney's family saw to it that all of his works were published, though it took almost a decade. Immensely popular in England, Sidney's works also attracted interest in Europe. In the early 1600s they were translated into Dutch, Spanish, Italian, German, and French.
Writers of Sidney's and later generations were profoundly influenced by his writings. Many of his contemporaries dedicated poems or books to him. Edmund Spenser, for example, paid tribute to Sidney in his poem "Astrophel." Modern poet William Butler Yeats (1865–1939) mentioned Sidney in "In Memory of Major Robert Gregory," describing the poet as "our perfect man."
Duncan-Jones, Katherine. Sir Philip Sidney, Courtier Poet. New Haven, CT: Yale University Press, 1991.
Hamilton, A. C. Sir Philip Sidney: A Study of His Life and Works. Cambridge, UK and New York: Cambridge University Press, 1977.
Ousby, Ian, ed. The Cambridge Guide to Literature in English. Cambridge, UK: Cambridge University Press, 1993.
Ruoff, James E., ed. Major Elizabethan Poetry and Prose. New York: Thomas Y. Crowell Company, 1972.
"Sir Philip Sidney." Renaissance English Literature, http://www.luminarium.org/renlit/sidney.htm (accessed on July 11, 2006).
"Sir Philip Sidney World Bibliography." Resources in Renaissance Literature at St. Louis University. http://bibs.slu.edu/ (accessed on July 11, 2006).
Stump, Donald. "Sidney as a 'Renaissance Man.'" Sir Philip Sidney Online. http://bibs.slu.edu/sidney/history.html (accessed on July 11, 2006).
"Sidney, Philip." Elizabethan World Reference Library. . Encyclopedia.com. 24 Apr. 2019 <https://www.encyclopedia.com>.
|
0.998872 |
The Northwest Passage, a supposed sea route to the Pacific Ocean by way of the Arctic Ocean, had long been sought by European explorers as a possible trade route to East Asia and the Indies. During the Age of Exploration, the presupposed existence of the passage motivated much of European exploration in North America. Beginning in the early 19th century, the Royal Navy, having expanded to unprecedented proportions during the Napoleonic Wars, turned much of its attention to the passage's discovery. Under the influence of Sir John Barrow, the Royal Navy sponsored many Arctic expeditions, including those led by John Ross, William Edward Parry, James Clark Ross, and John Franklin. For the next fifty years, the Royal Navy dominated the Arctic seas.
Franklin himself was at that point an experienced mariner, serving in the Royal Navy while in his teens, and having been present during the Battle of Trafalgar in 1805. In 1819, he was chosen to lead an expedition whose intention was to map the northern coast of the North American continent eastwards from the mouth of the Coppermine River. The Coppermine expedition was by any objective standard a disaster; Franklin completely failed in his goal of mapping a sufficient portion of the Arctic coast, and half of his 22-strong party died over the course of the journey. In spite of the expedition's disappointing results, upon his return to Britain, Franklin was lauded as a hero and promoted post-captain in 1822. In the following year he began planning another expedition to the Arctic, with the intention of, this time, using the Mackenzie River as the expedition's primary route of travel.
Franklin himself devised the expedition's itinerary; it was accepted by the Admiralty in autumn, 1823. In accordance with his official instructions, he was to first spend the summer of 1825 travelling to Great Bear Lake via standard trading routes, where the party's winter quarters would have been constructed. Beginning in spring of 1826, Franklin was to descend the Mackenzie River to its mouth, where he would then split the party. A smaller detachment, led by Richardson, was to map the intermediate coast between the Mackenzie and Coppermine Rivers. Franklin himself was to travel westwards along the coast with the ultimate goal of reaching Icy Cape, the northern terminus of the Bering Sea. From there, Franklin would have the choice of either rendezvousing with the HMS Blossom under the command of Frederick William Beechey or returning to the party's winter quarters at Great Bear Lake. Should he rendezvous with Beechey, Franklin would be conveyed either to the Sandwich Islands (now the Hawaiian Islands) or Canton, whereupon he would make his own way back to England.
In spite of the poor outcome of his previous expedition, Franklin had learned several key lessons that would lead to the future success of the Mackenzie River expedition. In Franklin's mind, the weak point of the Coppermine expedition was its dependency on outside help. His preparations were not completed sufficiently in advance, and he relied far too much on fur traders, voyageurs, and First Nations People, all of whom were far less forthcoming than anticipated. Applying this knowledge to his new expedition, Franklin sought to place greater trust in British naval personnel and, most critically, to bring sufficient supplies for the duration of the journey. The recent union of the North West Company and Hudson Bay Company, and resulting cessation of the companies' near-constant state of conflict also meant that any anticipated assistance would be much more likely to materialize.
Supplies were ferried from York Factory to the continent's interior beginning in 1824. While still in Britain, Franklin oversaw the construction of the company's vessels. Although canoes of birch-bark were the de facto standard for travel along North America's internal waterways, Franklin judged them unfit for navigation in the open waters of the Arctic Ocean. He therefore commissioned the construction of three boats built of ash and mahogany, the largest of which was 8 metres (26 ft) in length and was capable of carrying 2.7 tonnes (6,000 lb) of baggage. Navigation instruments included a sextant, altimeters and a telescope. Supplies included tobacco, alcohol, tents, books, paper, fishing implements, blankets, clothing, guns, knives and hatchets; much of the company's supplies were intended to be traded with the local First Nations communities.
Franklin and the other naval officers, including Back and Richardson, departed Liverpool on 16 February 1825. Landing in New York City on 15 March, they then followed standard travelling routes through New York State, across the Niagara River and Lake Ontario, then through Upper Canada to Fort William on the shores of Lake Superior. After traversing numerous lakes and river systems, the party arrived at Cumberland House on the Saskatchewan River on 15 June. From there, they reached Methye Portage, mostly by way of the Churchill River system. Simultaneously, most of the expedition's supplies were sent from York Factory on Hudson Bay up the Hayes River, reaching the officers at Methye Portage on 29 June.
The party descended the Clearwater and Athabasca Rivers, arriving at Fort Chipewyan on 15 July. The party's expeditious pace can be attributed to their intense rowing efforts: during their last push to Great Slave Lake, they had been paddling for thirty-six of the thirty-nine preceding hours. At Fort Resolution, Franklin met with Keskarrah and Humpy of the Coppermine Indians, the latter of whom was the brother of Franklin's friend and former ally Akaitcho. After coasting the southern shore of Great Slave Lake, the party reached the headwaters of the Mackenzie River on 3 August, which would thereafter be their route to the Arctic Ocean.
The party began their descent of the Mackenzie, reaching its junction with the "River of the Mountains" (likely the Liard River) on 4 August. Fort Norman was reached on 7 August, with the group having traveled 423 kilometres (263 mi) in three days. At Fort Norman, realizing that their speedy pace afforded them additional time for exploration, Franklin opted to embark on a preliminary reconnaissance to the mouth of the Mackenzie River, while the rest of the party would continue to Great Bear Lake to oversee the construction of the their winter quarters. The goal of this venture was primarily to find the best route to the sea, in addition to establishing friendly relations with the native Inuit. Joined by Admiralty Mate E.N. Kendall and an Inuit interpreter, Franklin departed on 8 August.
During their descent they encountered several groups of First Nations, some of whom joined them for a portion of the journey. The delta of the Mackenzie was reached on 13 August, whereafter the party began exploring the archipelago of islands surrounding the river's mouth. Most of their early navigation of the sea was plagued by intense fog that occluded astronomical observation. After completing their early charting, the group returned to the Mackenzie River proper, reaching Fort Franklin on Great Bear Lake on 5 September. Over the course of the 1825 season the party had traveled 9,339 kilometres (5,803 mi).
The winter of 1825–1826 was relatively uneventful. On 8 September, Franklin dispatched two men to Great Slave Lake to convey an account of the expedition's progress and to pick up letters sent from the Crown. Supplies were provided by the Chipewyan and Dog-Rib Indians. With October came the first frosts and snow; it was at this time, just before ice began to form on the lake, that fishing was most productive. According to Franklin, several hundred fish were caught daily, most of which were frozen until the following spring.
Those at Fort Franklin were frequently visited by the local First Nations. On one such occasion, on 18 December, the wife of one of the Dog-Rib hunters brought her young girl to the fort, seeking advice on the girl's sickly condition. In spite of the Europeans' efforts, the girl perished, bringing great grief to the mother. The First Nations and Europeans celebrated Christmas together on 25 December. On 1 January, the coldest temperature of the season, −45 °C (−49 °F), was recorded. The month of February brought anxiety to the party as their fishing output greatly decreased. The group's dried meat had since been expended, and the scant diet of fish caused several among the them to suffer from diarrhea.
As recorded in Franklin's journal, during the winter of 1825–1826, to pass the time, the men played a game very similar to modern ice hockey. In a separate entry, Franklin noted that that "skating" was among the winter "amusements" enjoyed by his men. Whether or not the use of ice skates were combined with the game is not known; if the two were combined, this would make Fort Franklin the earliest documented location where ice hockey was played, and also the first known use of the word "hockey" in reference to the modern-day sport.
The ice on Great Bear Lake began breaking up on 23 May, but with this came the constant threat of mosquitoes, which Franklin called "vigorous and tormenting". As winter ended, the party made a more concentrated effort to chart the coastline of Great Bear Lake. The most extensive of these explorations was conducted by Richardson and Kendall, lasting from 10 April–1 May. Franklin at this point grew displeased with the constant presence of the Dog-Rib Indians, claiming that they "continued hanging about the fort, and their daily drumming and singing over the sick, the squalling of the children, and bawling of the men and women, proved no small annoyance." With the beginning of June, Franklin began more intensely planning the party's voyage to the coast. The boats the company had been constructing over the course of the winter were tested on 15 June. Supplies and men were then divided between the western and eastern detachment, and after final preparations were made, the party departed from Fort Franklin on the summer solstice of 1826.
The expedition's plans for the coming summer were ambitious. Franklin, leading the western detachment, aimed to get as far as Icy Cape, which had previously been visited by James Cook in 1778. Richardson's journey would involve coasting the shore of the ocean as far east as the mouth of the Coppermine River. He would then ascend the river and cross overland to Great Bear Lake, ideally arriving at Fort Franklin before the onset of winter.
The party made quick progress in descending the Mackenzie River, reaching its delta by early July. The western detachment was to consist of two boats, Lion and Reliance, commanded by Franklin and Back, respectively. The eastern detachment consisted of the boats Dolphin and Union. In the early morning of 4 July, the parties split.
The western detachment quickly faced difficulty at the hands of the Inuit. When the boats became grounded due to the river's shallowness, Franklin, while observing the location's longitude, discovered a nearby Inuit settlement. After instructing Back and the others to be prepared to take up arms should the Inuit prove hostile, Franklin departed for the camp, alongside the party's interpreter, Augustus. The settlement, which contained in excess of 250 individuals, initially greeted the expeditionaries with hesitance. When Franklin later explained the benefit to their people of the putative sea route known as the Northwest Passage, they became friendly. Soon after, however, the Inuit, desiring the party's cargo, plundered Lion and Reliance. After an altercation lasting several hours, the two boats departed; Franklin commanded that none of the Inuit follow them under penalty of being shot. He later designated the area where the conflict had occurred as Pillage Point.
For the rest of the season, much of the group's voyage was impeded by poor weather and sea ice. On 9 July, the group once again came in contact with the Inuit; this encounter was much more cordial. Franklin inquired as to the usual date of ice breakup and the groups exchanged gifts. According to Franklin, the Inuit group, who numbered 48, had a high proportion of elders, all of whom were highly active and appeared in excellent health. Nearly all suffered from some degree of snowblindness. When told of the Europeans' previous encounter, the Inuit condemned the attack.
On 15 July, the mouth of the Babbage River was reached; soon after, Herschel Island came into view. On 17 July, the party stepped foot on the island, where they came into contact with more Inuit. Western travel along the Arctic coast was arduous: temperatures seldom exceeded 6 °C (43 °F), and gusts of wind frequently upended the expeditionaries' tents, making sheltering from the rain difficult. The constant fog obscured visibility, and the mosquitoes were described by Franklin as "torturous". At one point, Augustus fell into a fit of hypothermia after rushing into an icy lake in pursuit of a reindeer. He was given blankets and chocolate to warm up, but by the next morning still felt pain in his limbs.
By 30 July, the party had entered the waters of the modern-day state of Alaska; Brownlow Point was reached on 5 August. In the succeeding weeks, Franklin grew hesitant to continue pursuing the expedition's goal of reaching Icy Cape. On 16 August, realizing that summer was coming to an end and the navigability of the rest of the party's route would be threatened by increasingly poor conditions, Franklin decided they would turn back towards the Mackenzie's mouth. Unbeknownst to him however, an exploratory party of Beechey's vessel lay only 257 kilometres (160 mi) to the west, which, under the party's average pace, could have been reached in less than a week. According to Franklin, had he known that Beechey's vessel was a mere six days' pursuit away, "no difficulties, dangers, or discouraging circumstances, should have prevailed" on him to convene with Beechey. He was, however, oblivious to Beechey's proximity, and opted to return to the Mackenzie.
The journey east was relatively uneventful, but sea ice and wind continued to pose a serious threat to the expeditionaries. The party landed on Herschel Island again on 26 August. Encounters with Inuit occurred almost daily; on 29 August, Franklin was informed by a group of Inuit that Richardson's party had been seen clearing the Mackenzie River delta and had narrowly escaped another attempt by the Inuit to pillage their boats. He was later alarmed by a group of Inuit who rushed into the party's camp and informed them that a rival Inuit group was en route with the express intent of massacring the party and stealing their possessions. This group, termed the 'Mountain Indians' by Franklin, allegedly had planned to await their likely return to the mouth of the Mackenzie River. Under the pretense of helping the Europeans navigate the river, the Mountain Indians would then stave in their boats, making them unfit for escape to deeper waters; then a larger group would rush out of a predesignated hiding spot and attack. Franklin was cautioned by the Inuit to thenceforth only camp on islands that were out of gunshot range. He later surmised that the Mountain Indians had been armed by trades conducted with the Russians, who were ostensibly prohibited from trading with any Inuit groups.
By September, the party was ascending the Mackenzie River, and on 4 September had reached Point Separation, where the two detachments had originally split. They recovered a small depot of supplies, stowed by the party the previous July, before pressing on. The mouth of the Great Bear River was reached on 16 September; five days later, Fort Franklin was reached. Over the course of their journey, the western party had traveled a total distance of 3,296 kilometres (2,048 mi) in 80 days, with an average distance of about 41 kilometres (25 mi) per day.
Consisting of twelve individuals, the eastern detachment proceeded down the Mackenzie, and eventually to open ocean. Encounters with the Inuit were relatively amicable, with the task of interpretation given to the group's Inuit companion, Ooligbuck.
After traversing the maze of islands that comprise the delta of the Mackenzie, open sea was reached on 7 July. That same day, a band of Inuit were encountered. Quelling their initial fears by presenting gifts, Richardson established relations with the group, but found their disposition impolite. Ooligbuck, apparently distrusting the band, urged Richardson to depart; upon doing so, the party was trailed by the Inuit. These encounters remained almost constant until 20 July, when the last group of Inuit were seen before the party reached the Coppermine.
The following days were spent rounding the highly indented coastline; progress was impeded by the constant presence of sea ice. On 4 August, a large northerly landmass came into view, which Richardson termed Wollaston Land. In reality, this land was actually a southerly protuberance of Victoria Island, one of the largest islands in the Canadian Arctic Archipelago. This was the first time a European had laid eyes on the island. Coronation Gulf was reached on 6 August, whereupon the group turned southwards until they reached the mouth of the Coppermine. It was at this point that Richardson crossed into territory already mapped during Franklin's previous expedition.
The party reached the mouth of the Coppermine River on 8 August, and the next day began ascending the river. The river was at that point running extremely low, occasionally to the point that it hindered the travel of their boats. After passing Bloody Falls, Richardson judged that the rest of the Coppermine's course was unfit for navigation by boat. He therefore decided that Dolphin and Union would be left behind and the group would carry on by foot. Each man was allotted 9 kilograms (20 lb) of pemmican, in addition to packages of macaroni, dry soup mix, chocolate, sugar, and tea. In addition, the group carried a portable boat; blankets; spare guns, shoes, and ammunition; fishing nets; kettles; and hatchets. When divided among the party, this load came to a weight of 33 kilograms (73 lb) per man. Richardson feared that carrying so much weight would prove too arduous, and assured the men that when sufficient progress was made they would halt and examine the necessity of carrying certain items. All that was not carried by the party was stowed in tents marked with a Union Jack for the use of a future expeditionary force.
The march to Great Bear Lake began on 10 August. Richardson planned to follow the Coppermine as far as its junction with the Copper Mountains. From there they would hike in more or less a straight line until reaching the Dease River, which they would then descend to its mouth at Great Bear Lake. Many among the party were unaccustomed to carrying such heavy loads, but upon examining the group's stocks, Richardson found little that he considered superfluous enough to discard. He eventually resolved to abandon the portable boat and five of the group's rifles, reducing each man's load by 7 kilograms (15 lb). Still, the group seldom traveled at a pace of more than 3 kilometres per hour (1.9 mph).
In spite of their reduced loads, many among the party were exhausted by the end of each day. Richardson attributed much of their exertion to the frequent change of elevation, the spongy, wet ground and resulting absence of secure footing. The party grew more accommodated to their loads in the succeeding days and soon established a more productive pace.
In the night of 15 August the party encountered a group of First Nations who led them to the headwaters of the Dease River. Soon after, a range of hills distinct to the north shore of Great Bear Lake came into view, and the lake itself was spotted on 18 August. From that point onward, Richardson was to wait for a scout from Fort Franklin who had been directed to depart from the fort on 6 August to the mouth of the Dease River and wait there for Richardson's party. After sending out hunting excursions to enlarge the expedition larder in preparation for their push to Fort Franklin, on 21 August, Richardson and the scouting party were united. After paddling along the coast of Great Bear Lake, Fort Franklin was reached on 1 September, nearly two weeks before the western detachment.
The eastern detachment had traveled 3,197 kilometres (1,987 mi) over the course of 60 days, amounting to an average of 53 kilometres (33 mi) per day. A total of 1,452 kilometres (902 mi) of new coastline had been charted over the course of the journey.
During the party's absence from Fort Franklin, those still inhabiting the dwelling were directed to make repairs, which were completed by the time Franklin arrived. Upon his arrival, however, Franklin became concerned at the depletion of the fort's food stores, and dispatched Kendall to requisition some food and other supplies from Fort Norman. Kendall returned to the fort on 8 October, carrying an abundance of food and other supplies, which were of particular benefit to the eastern detachment, who had been forced to sacrifice much of their equipment during their overland crossing between the Coppermine and Dease Rivers.
The party's second winter offered few events of note. By mid-November, ice on the Great Bear Lake rendered it unnavigable. By early January, temperatures dipped to −47 °C (−53 °F), and by February, to −50 °C (−58 °F). The fort's larder at that point consisted of some tens of thousands of fish and nearly 11 tonnes (24,000 lb) of meat. Franklin endeavored to depart from the fort much earlier than in the previous season. He quit the fort on 20 February, carrying most of his supplies, including all of the expedition's charts, journals, and drawings, on a sledge, while Back was to remain at the fort until the breakup of the ice, after which he would proceed to York Factory and thence to England on an HBC ship.
Franklin and his company traveled southwards through the taiga, arriving at Fort Chipewyan on 12 April and then Cumberland House on 18 June. It was there that Franklin and Augustus were to split, with the latter shedding tears at their parting and requesting to be informed of any other expedition to the Arctic that he could join. They reached New York in August, and on 1 September Franklin departed from North America on a packet ship bound for Liverpool, which he reached on 26 September, while Back and the other officers arrived in Britain in October. Franklin's second expedition had thereafter concluded.
Upon his returned to Britain, Franklin was lauded as a hero. In 1829 he was knighted by George IV, and later appointed Knight Commander of the Royal Guelphic Order and a Knight of the Greek Order of the Redeemer. Although Back had been appointed commander in 1825, following his return to Britain, he was unable to find appointment to a ship, and was unemployed until 1833.
Over the course of the expedition, Franklin and his associates had traveled nearly 22,000 kilometres (14,000 mi) and mapped half of the continent's northern coast. This was a sharp contrast to Franklin's previous expedition, where only 800 kilometres (500 mi) had been explored before the party was forced to turn back.
Franklin himself later wrote of the contrast between this expedition and his previous one. During the breaking of the party at Point Separation, he realized the contrast between his situation and the previous expedition, writing that "it was impossible not to be struck with the difference between our present complete state of equipment and that on which we had embarked on our former disastrous voyage. Instead of a frail bark canoe, and a scanty supply of food, we were now about to commence the sea voyage in excellent boats, stored with three months' provision."
Franklin was appointed Lieutenant Governor of Van Diemen's Land in 1837, leaving this post after six years. Given that less than 500 kilometres (310 mi) of Arctic coastline remained unmapped, Franklin, then 59 years old, was appointed to lead another expedition in 1845. The Northwest Passage expedition departed England in 1845 aboard the ships HMS Erebus and HMS Terror. Sometime in summer 1847, the vessels became icebound somewhere in Victoria Strait, and Franklin, in addition to all 128 of his crew, were lost. During the Admiralty's inquest of Franklin's lost expedition, of which Back was a member, several search parties were dispatched, all of which were ultimately unsuccessful. It wasn't until 2016 that the wreck of Terror was found off the shores of King William Island.
Prior to Franklin's second expedition, the mouth of the Mackenzie River had only been seen on one occasion by Europeans. In 1789, Scottish explorer Alexander Mackenzie descended the river, hoping that it would lead to the Pacific Ocean. Under the employ of the North West Company, Mackenzie spent the summer of 1789 descending the river and reached its mouth on 14 July. In Mackenzie's mind, having reached the wrong ocean, he turned back in disappointment and returned to Britain, where his efforts were not widely recognized. Mackenzie later led the first overland crossing of North America, reaching the western coast of British Columbia in 1793.
In 1771 Samuel Hearne crossed overland from Hudson Bay, reaching the source of the Coppermine River in July. He descended the river down to Coronation Gulf, marking the first time a European had reached the Arctic Ocean by land.
During his third voyage, James Cook mapped much of the western coast of North America, including Alaska's eponymous Cook Inlet. He reached Icy Cape, the ultimate goal of Franklin's western detachment, in August 1778. It was named by Cook for the large amounts of ice along the cape's coast.
^ Fleming, Fergus (1998). Barrow's Boys. Granta Books.
^ Holland, Clive A. (1972). "BACK, Sir GEORGE". Dictionary of Canadian Biography, vol. 10. Retrieved 10 March 2019.
^ Fleming, Fergus (1998). Barrow's Boys. Granta Books. p. 30.
^ "Map Shewing The Discoveries made by British Officers in the Arctic Regions from the Year 1818 to 1826". princeton.edu. Retrieved 11 March 2019.
^ Holland, Clive A. (1988). "FRANKLIN, Sir JOHN". Dictionary of Canadian Biography, vol. 7. Retrieved 11 March 2019.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. xxi.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. xii.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 29.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 35.
^ Rudmose-Brown, R.N. (1970). Encyclopedia Arctica 15: Biographies. p. 8.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 60.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 67.
^ Boswell, Randy (17 September 2011). "Deline, NWT: The 'birthplace' of hockey?". NunatsiaqOnline. Nunatsiaq News. Archived from the original on 9 February 2015. Retrieved 9 February 2015.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 83.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 97.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 102.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 111.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 145.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 154.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 167.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 223.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 225.
^ Dawson, L.S. Memoirs of Hydrography. Google Books. p. 105.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 239.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 246.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 258.
^ Neatby, Leslie H.; Mercer, Keither (6 April 2018). "Sir John Franklin". The Canadian Encyclopedia. Retrieved 12 March 2019.
^ "Address". The Hobart Town Courier (Tas: 1827–1839). May 26, 1837. p. 3 – via NLA Australian Newspapers.
^ Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey. p. 262.
^ "Franklin: 1825-1827". princeton.edu. Retrieved 13 March 2019.
^ Watson, Paul (12 September 2016). "Ship found in Arctic 168 years after doomed Northwest Passage attempt". The Guardian. Retrieved 12 September 2016.
^ Mackenzie, Alexander (1801). Voyages from Montreal Through the Continent of North America. A.S. Barnes and Company.
^ Lamb, W. Kaye (1983). "MACKENZIE, Sir ALEXANDER". biographi.ca. University of Toronto. Retrieved 13 March 2019.
^ Hayes, Derek (2009). First Crossing: Alexander Mackenzie, His Expedition Across North America, and the Opening of the Continent. D&M Publishers. pp. 211–224. ISBN 978-1-926706-59-7. Retrieved 17 September 2015.
Fleming, Fergus (1998). Barrow's Boys. Granta Books. ISBN 9780802197559.
Franklin, John (1828). Narrative of a Second Expedition to the Shores of the Polar Sea. Carey, Lea, and Carey.
Dawson, L.S. Memoirs of Hydrography. Google Books.
Hayes, Derek (2009). First Crossing: Alexander Mackenzie, His Expedition Across North America, and the Opening of the Continent. D&M Publishers. ISBN 978-1-926706-59-7.
This page was last edited on 18 March 2019, at 22:58 (UTC).
|
0.957563 |
Learn how to remove or install memory in your MacBook portable computer.
To identify your MacBook model, use the information in How to identify MacBook models.
Warning: The internal components of your MacBook can be warm. If you have been using your MacBook, wait ten minutes after shutting down the computer to let the internal components cool before continuing.
Shut down your MacBook. Disconnect the power adapter, Ethernet cable, and any other cords connected to the MacBook, to prevent damaging the computer.
This MacBook model has an integrated battery that cannot be removed. Do not attempt to disconnect or remove the battery in the MacBook.
Remove the eight (8) screws that secure the bottom case of your MacBook. Be sure to put the screws in a safe place.
Lift off the case from the hinged side, and set it aside.
When you remove the bottom case, you expose sensitive internal components. Avoid touching anything other than the memory assembly when you remove and replace memory.
Push the ejection levers on the sides of the memory module in an outward direction to release the module from the memory card slot.
The memory pops up at an angle. Before removing it, make sure you see the half-circle notches. If you don’t, try pressing the ejection levers outward again.
Hold the memory module by its notches, but do not touch the gold connectors. Remove it from the slot.
Use two fingers with firm, even pressure to push down on the memory module.
Repeat to install an additional memory module in the top slot. Press down on the module to make sure it is level.
The memory modules should be parallel to each other. If it appears that one of the memory modules is not parallel, remove the modules and seat them again.
Replace the bottom case, making sure it sits flush. Grasp the case in the middle of each side, and push down first with one thumb and then the other to lock the snaps on the inside of the case.
When the bottom case is seated flush, replace and tighten the eight screws. Make sure the different length screws are in their proper locations.
Additional notes For best performance, don't mix sizes; always install two identical memory modules (a pair of 1 GB, 2 GB, or 4 GB memory modules).
Warning: The internal components of your MacBook can be warm. If you have been using your MacBook, wait ten minutes after shutting the computer down to let the internal components cool before continuing.
Shut down your MacBook. Disconnect the power adapter, Ethernet cable, and any other cords connected to the MacBook, in order to prevent damaging the computer.
Review and follow MacBook: How to remove or install the battery to remove the battery.
Remove the eight (8) screws that secure the bottom case of your MacBook, and then remove the bottom case.
Because the screws are different lengths, note the screw lengths and locations so you can replace the screws correctly. Put them aside in a safe place.
Replace the bottom case making sure it sits flush. This is especially important in the area of the access door latch.
When the bottom case is seated flush, replace and tighten the eight screws. Start with the four screws in the middle, then the two screws on the same side as the access door latch, and finally the two screws opposite the access door latch. Make sure the different length screws are in their proper locations.
If you need to remove a memory card, follow these instructions: In one swift motion, use your thumb or index finger to move the lever to the left and release it. This swift motion ejects the memory card, and the lever then springs back to the starting position. Pull out the memory module(s).
Lever does not return to starting position.
Insert the new memory modules into the slots.
Insert the gold edge first, with the notch on the left side.
Use two fingers with firm even pressure to push in the memory modules.
If the levers don't return to the closed position, move them to the right to close them.
Note: You may need to use increased firm pressure in order to ensure that the memory seats properly. If you do not seat the memory correctly, it could result in a "no power" situation, or the memory might not be recognized by the computer.
Replace the L-bracket by inserting the short end first and tightening the screws.
When you see the Mac OS X desktop, choose Apple () from the upper-left menu bar, then choose About This Mac.
The total memory includes the amount of memory that originally came with the computer plus the new memory you added, or if all the memory has been replaced, the new total for that memory. For detailed information about the amount of memory installed in your computer, open System Profiler by choosing Apple (), then About This Mac; click More Info and then Memory from the Hardware section that appears in System Profiler.
If your computer doesn’t recognize the memory or doesn’t start up correctly, confirm that the memory you installed is compatible with your MacBook and that it is installed correctly by reseating the memory.
|
0.999698 |
The Monk James, Bishop and Confessor, had from his early years yearned towards the ascetic life. Saint James left the world and withdrew to the Studite monastery, where he was monasticised. He led a strict life, full of works, fasting and prayer. Pious as a monk and remarkably learned in Holy Scripture, the Monk James was elevated to the bishop's cathedra-seat of the Church in Catania (Sicily). During the reign of the iconoclast emperor Constantine V Kopronymos (741-775), Saint James was repeatedly urged in vain towards a renunciation of holy icons. They exhausted him in prison, starved him with hunger, and they beat him, but he bravely endured all the suffering. The holy Bishop James died in exile.
|
0.999843 |
OBJECTIVE: To define the effects of androgen deprivation therapy (ADT) used prior to salvage cryoablation (SC) for the treatment of recurrent localized prostate cancer after radiation.
METHODS: Patients from the Cryo On-Line Database registry undergoing SC after radiation failure were divided according to whether they had previously received or not received ADT. Baseline characteristics including demographics and presalvage cancer risk were compared. Biochemical progression-free survival (bPFS) as defined by the Phoenix criteria was compared between the 2 groups as a whole and also in D'Amico risk-stratified subgroups. In addition, postsurgical complications such as urinary fistula, retention, incontinence, and erectile dysfunction were compared.
RESULTS: Two groups consisting of 254 and 486 patients with and without pre-SC ADT were analyzed. The patients who received ADT were younger (P = .003) and had higher presalvage D'Amico risks (P < .001). The 5-year bPFS was 63.8% and 39.3% for the hormone-naïve and the pre-SC ADT patients, respectively (P < .001). On subgroup analysis, the difference in 5-year bPFS was significant only for patients with a high D'Amico cancer risk (54.3% vs 30.5%; P = .013). On multivariate analysis, presalvage prostate-specific antigen (hazard ratio [HR], 1.7), Gleason score ≥8 (HR, 2.5), and use of pre-SC ADT (HR, 1.7) correlated with biochemical recurrence. Additionally, patients receiving pre-SC ADT experienced less urinary retention (P = .001) and incontinence (P = .008) but were more likely to be impotent (P = .010).
CONCLUSION: Patients receiving ADT before SC, especially those with high-risk prostate cancer, had worse 5-year bPFS. Added caution is needed when selecting patients having previously received ADT for salvage cryotherapy.
Li R, Ruckle HC, Schlaifer AE, El-Shafei A, Yu C, Jones JS. Are you the author?
Department of Urology, Loma Linda University Medical Center, Loma Linda, CA; Glickman Urological and Kidney Institute, Cleveland Clinic, Cleveland, OH; Urology Department, Medical School, Cairo University, Giza, Egypt.
|
0.972365 |
Excel is world’s most used spreadsheet program by Microsoft Corporation, which is used to create information documents in tabular format as well as creating various intelligent reports. Here is list of shortcuts to help you speed up your excel productivity.
1 Arrow Keys Move one cell up, down, left, or right in a worksheet.
2 Page Down/Page Up Move one screen down / one screen up in a worksheet.
3 Alt+Page Down/Alt+Page Up Move one screen to the right / to the left in a worksheet.
4 Tab/Shift+Tab Move one cell to the right / to the left in a worksheet.
6 Home Move to the beginning of a row in a worksheet.
7 Ctrl+Home Move to the beginning of a worksheet.
8 Ctrl+End Move to the last cell with content on a worksheet.
9 Ctrl+f Display the Find and Replace dialog box (with Find selected).
10 Ctrl+h Display the Find and Replace dialog box (with Replace selected).
11 Shift+F4 Repeat last find.
12 Ctrl+g (or f5) Display the 'Go To' dialog box.
13 Ctrl+Arrow Left/Ctrl+Arrow Right Inside a cell: Move one word to the left / to the right.
14 Home/End Inside a cell: Move to the beginning / to the end of a cell entry.
15 Alt+Arrow Down Display the AutoComplete list e.g. in cell with dropdowns or autofilter.
16 End Turn 'End' mode on. In End mode, press arrow keys to move to the next nonblank cell in the same column or row as the active cell. From here use arrow keys to move by blocks of data, home to move to last cell, or enter to move to the last cell to the right.
17 Shift+Space Select the entire row.
18 Ctrl+Space Select the entire column.
19 Ctrl+Shift+* (asterisk) Select the current region around the active cell.
20 Ctrl+a (or ctrl+Shift+spacebar) Select the entire worksheet or the data-containing area. Pressing ctrl+a a second time then selects entire worksheet.
21 Ctrl+Shift+Page Up Select the current and previous sheet in a workbook.
22 Ctrl+Shift+o Select all cells with comments.
23 Shift+Arrow Keys Extend the selection by one cell.
24 Ctrl+Shift+Arrow Key Extend the selection to the last cell with content in row or column.
25 Shift+Page Down/Shift+Page Up Extend the selection down one screen /up one screen.
26 Shift+Home Extend the selection to the beginning of the row.
27 Ctrl+Shift+Home Extend the selection to the beginning of the worksheet.
28 Ctrl+Shift+End Extend the selection to the last used cell on the worksheet (lower-right corner).
29 F8 Turn on extension of selection with arrow keys without having to keep pressing shift.
30 Shift+F8 Add another (adjacent or non-adjacent) range of cells to the selection. Use arrow keys and shift+arrow keys to add to selection.
31 Shift+Backspace Select only the active cell when multiple cells are selected.
32 Ctrl+Backspace Show active cell within selection.
33 Ctrl+. (period) Move clockwise to the next corner of the selection.
34 Enter/Shift+Enter Move active cell down / up in a selection.
35 Tab/Shift+Tab Move active cell right / left in a selection.
36 Ctrl+Alt+Arrow Right/Ctrl+Alt+Arrow Left Move to the right / to the left between non-adjacent selections (with multiple ranges selected).
38 Shift+Arrow Left/Shift+Arrow Right Select or unselect one character to the left / to the right.
39 Ctrl+Shift+Arrow Left/Ctrl+Shift+Arrow Right Select or unselect one word to the left / to the right.
40 Shift+Home/Shift+End Select from the insertion point to the beginning / to the end of the cell.
41 Ctrl+z Undo last action (multiple levels).
42 Ctrl+y Redo last action (multiple levels).
43 Ctrl+c Copy contents of selected cells.
44 Ctrl+x Cut contents of selected cells.
45 Ctrl+v Paste content from clipboard into selected cell.
46 Ctrl+Alt+v If data exists in clipboard: Display the Paste Special dialog box.
47 Ctrl+Shift+[+] If data exists in clipboard: Display the Insert dialog box to insert blank cells.
48 F2 Edit the active cell with cursor at end of the line.
49 Alt+Enter Start a new line in the same cell.
50 Enter Complete a cell entry and move down in the selection. With multiple cells selected: fill cell range with current cell.
51 Shift+Enter Complete a cell entry and move up in the selection.
52 Tab/Shift+Tab Complete a cell entry and move to the right / to the left in the selection.
53 Esc Cancel a cell entry.
54 Backspace Delete the character to the left of the insertion point, or delete the selection.
55 Delete Delete the character to the right of the insertion point, or delete the selection.
56 Ctrl+Delete Delete text to the end of the line.
57 Ctrl+; (semicolon) Insert current date.
58 Ctrl+Shift+: (colon) Insert current time.
59 Ctrl+d Fill complete cell down (Copy above cell).
60 Ctrl+r Fill complete cell to the right (Copy cell from the left).
61 Ctrl+" Fill cell values down and edit (Copy above cell values).
62 Ctrl+' (apostrophe) Fill cell formulas down and edit (Copy above cell formulas).
63 Ctrl+l Insert a table (display Create Table dialog box).
65 Ctrl+- with row / column selected Delete row / delete column.
67 Ctrl+Shift++ with row / column selected Insert row/ insert column.
68 Shift+F2 Insert / Edit a cell comment.
69 Shift+f10, then m Delete comment.
70 Alt+F1 Create and insert chart with data in current range as embedded Chart Object.
71 F11 Create and insert chart with data in current range in a separate Chart sheet.
72 Ctrl+k Insert a hyperlink.
73 enter (in a cell with a hyperlink) Activate a hyperlink.
74 Ctrl+9 Hide the selected rows.
75 Ctrl+Shift+9 Unhide any hidden rows within the selection.
76 Ctrl+0 (zero) Hide the selected columns.
77 Ctrl+Shift+0 (zero) Unhide any hidden columns within the selection*.
78 Ctrl+` (grave accent) Alternate between displaying cell values and displaying cell formulas. Accent grave /not a quotation mark.
79 Alt+Shift+Arrow Right Group rows or columns.
80 Alt+Shift+Arrow Left Ungroup rows or columns.
81 Ctrl+6 Alternate between hiding and displaying objects.
82 Ctrl+8 Display or hides the outline symbols.
83 Ctrl+6 Alternate between hiding objects, displaying objects, and displaying placeholders for objects.
84 Alt+o, ca Adjust Column width to fit content. Select complete column with Ctrl+Space first, otherwise column adjusts to content of current cell). Remember Format, Column Adjust.
88 Ctrl+1 Format cells dialog.
89 Ctrl+b (or ctrl+2) Apply or remove bold formatting.
90 Ctrl+i (or ctrl+3) Apply or remove italic formatting.
91 Ctrl+u (or ctrl+4) Apply or remove an underline.
92 Ctrl+5 Apply or remove strikethrough formatting.
93 Ctrl+Shift+f Display the Format Cells with Fonts Tab active. Press tab 3x to get to font-size. Used to be ctrl+shift+p, but that seems just get to the Font Tab in 2010.
94 Alt+' (apostrophe / single quote) Display the Style dialog box.
95 Ctrl+Shift+$ Apply the Currency format with two decimal places.
96 Ctrl+Shift+~ Apply the General number format.
97 Ctrl+Shift+% Apply the Percentage format with no decimal places.
98 Ctrl+Shift+# Apply the Date format with the day, month, and year.
99 Ctrl+Shift+@ Apply the Time format with the hour and minute, and indicate A.M. or P.M.
100 Ctrl+Shift+! Apply the Number format with two decimal places, thousands separator, and minus sign (-) for negative values.
101 Ctrl+Shift+^ Apply the Scientific number format with two decimal places.
115 = Start a formula.
116 Alt+= Insert the AutoSum formula.
117 Shift+F3 Display the Insert Function dialog box.
118 Ctrl+a Display Formula Window after typing formula name.
119 Ctrl+Shift+a Insert Arguments in formula after typing formula name. .
120 Shift+F3 Insert a function into a formula .
121 Ctrl+Shift+Enter Enter a formula as an array formula.
123 F9 Calculate all worksheets in all open workbooks.
124 Shift+F9 Calculate the active worksheet.
125 Ctrl+Alt+F9 Calculate all worksheets in all open workbooks, regardless of whether they have changed since the last calculation.
126 Ctrl+Alt+Shift+F9 Recheck dependent formulas, and then calculates all cells in all open workbooks, including cells not marked as needing to be calculated.
127 Ctrl+Shift+u Toggle expand or collapse formula bar.
129 Ctrl+F3 Define a name or dialog.
130 Ctrl+Shift+F3 Create names from row and column labels.
131 F3 Paste a defined name into a formula.
132 Shift+F11/Alt+Shift+F1 Insert a new worksheet in current workbook.
133 Ctrl+Page Down/Ctrl+Page Up Move to the next / previous worksheet in current workbook.
134 Shift+Ctrl+Page Down/Shift+Ctrl+Page Up Select the current and next sheet(s) / select and previous sheet(s).
138 F6/Shift+F6 Move to the next pane / previous pane in a workbook that has been split.
139 Ctrl+F4 Close the selected workbook window.
141 Ctrl+Tab/Ctrl+Shift+Tab Move to next / previous workbook window.
142 Alt+Space Display the Control menu for Main Excel window.
143 Ctrl+F9 Minimize current workbook window to an icon. Also restores ('un-maximizes') all workbook windows.
144 Ctrl+F10 Maximize or restores the selected workbook window.
145 Ctrl+F7 Move Workbook Windows which are not maximized.
146 Ctrl+F8 Perform size command for workbook windows which are not maximzed.
149 Ctrl+s Save the active file with its current file name, location, and file format.
150 F12 Display the Save As dialog box.
151 f10 (or alt) Turn key tips on or off.
152 Ctrl+p Print File (Opens print menu).
153 F1 Display the Excel Help task pane.
154 F7 Display the Spelling dialog box.
155 Shift+F7 Display the Thesaurus dialog box.
156 Alt+F8 Display the Macro dialog box.
157 Alt+F11 Open the Visual Basic Editor to create Macros.
160 Shift+F10 Display the shortcut menu for the selected command.
161 Space/Enter Activate the selected command or control in the Ribbon, Open the selected menu or gallery in the Ribbon..
162 Enter Finish modifying a value in a control in the Ribbon, and move focus back to the document.
164 Tab/Shift+Tab Move to the next / previous field which can be edited.
165 Enter/Shift+Enter Move to the first field in the next / previous record.
166 Page Down/Page Up Move to the same field 10 records forward / back.
167 Ctrl+Page Down Move to a new record.
168 Ctrl+Page Up Move to the first record.
169 Home/End Move to the beginning / end of a field.
170 Arrow Keys Navigate inside Pivot tables.
171 Home/End Select the first / last visible item in the list.
172 Alt+c Move the selected field into the Column area.
173 Alt+d Move the selected field into the Data area.
174 Alt+l Display the PivotTable Field dialog box.
175 Alt+p Move the selected field into the Page area.
176 Alt+r Move the selected field into the Row area.
177 Ctrl+Shift+* (asterisk) Select the entire PivotTable report.
178 arrow keys to select the cell that contains the field, and thenalt+Arrow Down Display the list for the current field in a PivotTable report.
179 arrow keys to select the page field in a PivotChart report, and then alt+Arrow Down Display the list for the current page field in a PivotChart report.
180 Enter Display the selected item.
181 Space Select or clear a check box in the list.
182 Ctrl+tab ctrl+Shift+Tab select the PivotTable toolbar.
183 enter then arrow down/Arrow Up On a field button: select the area you want to move the selected field to.
184 Alt+Shift+Arrow Right Group selected PivotTable items.
185 Alt+Shift+Arrow Left Ungroup selected PivotTable items.
186 Arrow Keys Move between options in the active drop-down list box or between some options in a group of options.
187 Ctrl+Tab/Ctrl+Shift+Tab Switch to the next/ previous tab in dialog box.
188 Space In a dialog box: perform the action for the selected button, or select/clear a check box.
189 Tab/Shift+Tab Move to the next / previous option.
191 Alt+a ... alt+z Select an option, or select or clear a check box.
192 Alt+Arrow Down Open the selected drop-down list box.
193 Enter Perform the action assigned to the default command button in the dialog box.
194 Esc Cancel the command and close the dialog box.
195 Alt+Arrow Down On the field with column head, display the AutoFilter list for the current column .
196 Arrow Down/Arrow Up Select the next item / previous item in the AutoFilter list.
197 Alt+Arrow Up Close the AutoFilter list for the current column.
198 Home/End Select the first item / last item in the AutoFilter list.
199 Enter Filter the list by using the selected item in the AutoFilter list.
200 Ctrl + Shift + L Apply filter on selected column headings.
201 Arrow Keys Select elements.
202 Esc Remove Focus from Selection.
203 F2 Edit Selection Text in if possible (in formula bar).
|
0.922177 |
Luxembourg is a landlocked country in Western Europe, all known as the Grand Duchy of Luxembourg. An area of 2586 square km. Population of 446,000, of which 64% of Luxembourg and the rest to foreigners. The official language is French, German and Luxembourgish, French and more for the administrative, judicial and diplomatic; German and more news for newspapers. Residents are Catholic. Currency is the euro. Capital of Luxembourg (Luxembourg).
From the top down the flag has a red, white and light blue tricolor.
After early Gaul residence, the Germans invaded in 400 AD with Luxembourg becoming a Frankish kingdom and part of Charlemagne's Empire. In AD 963–1554, the Ardennes answered to the Holy Roman Empire and the Dominion to the Duke of Luxembourg. Between the 15th and 18th centuries, it was affected by Spanish, French and Austrian rule. The Vienna Conference in 1815 decided the Grand Duchy of Luxembourg should belong to the Netherlands, with a part-time King of the Grand Duke, at the same time be a member of the German alliance. In 1859, it became recognized as an independent state of Luxembourg. In 1867, it became neutral and started a constitutional monarchy in 1868.
Luxembourg is a developed capitalist country but lacks natural resources and the economy depends heavily on small markets such as the iron and steel industry, the financial industry and the broadcast television industry. Luxembourg is known as the "Iron Kingdom" and its long-term steel production per capita ranks first in the world. However, more than 95% of the iron ore and coal used in steelmaking are imported. Luxembourg City is an important financial center in Europe, behind only New York, London and Tokyo.
The capital of the Grand Duchy of Luxembourg has a long history, especially its famous castle. In the history of western Europe, it has been an important military fortress. It has three retaining walls, dozens of massive forts, and is known as the "Gibraltar of the North." Downtown is the valley connected by 110 small bridges.
This is a scenic town located northeast of the Ur Ertel Brook River that was built in the ninth century. The town built a Gothic church in 1248 and this remains as one of the country's ancient religious buildings. The town's secular museum store has a variety of fine antiquities to show the world the history of civilization in Luxembourg. The town has an "overhead pulley" up to 440 m, where visitors can ride to the ancient city. French writer Victor Hugo was exiled there.
|
0.999992 |
Why does my guest have to re-enter credit card information when placing on-line orders?
This commonly happens when a guest visits a new/different location that may be owned by a different franchise. While the Brand Name may be the same (Rudy's Really Good Eats) each franchise -- Rudy's Really Good Eats - Las Vegas or Rudy's Really Good Eats - Austin will have their own merchant service id that will be unique to their location(s) that they own.
In its most specific use, merchant services usually refers to merchant processing services that enables a business to accept a transaction payment through a secure (encrypted) channel using the customer's credit card or debit card.
|
0.763827 |
For other uses, see Eos (disambiguation).
In Greek mythology, Eos (/ˈiːɒs/; Ionic and Homeric Greek Ἠώς Ēōs, Attic Ἕως Éōs, "dawn", pronounced [ɛːɔ̌ːs] or [héɔːs]; Aeolic Αὔως Aúōs, Doric Ἀώς Āṓs) is a Titaness and the goddess of the dawn, who rose each morning from her home at the edge of the Oceanus.
Eos is cognate to the Vedic goddess Ushas, Lithuanian goddess Aušrinė, and Roman goddess Aurora (Old Latin Ausosa), all three of whom are also goddesses of the dawn. All four are considered derivatives of the Proto-Indo-European stem *h₂ewsṓs (later *Ausṓs), "dawn", a stem that also gave rise to Proto-Germanic *Austrō, Old Germanic *Ōstara and Old English Ēostre / Ēastre. This agreement leads to the reconstruction of a Proto-Indo-European dawn goddess.
Eos was the daughter of the Titans Hyperion, a bringer of light, the One Above, Who Travels High Above the Earth and of Theia, The Divine, also called Euryphaessa, "wide-shining" and Aethra, "bright sky". She was the sister of Helios, god of the sun and Selene, goddess of the moon, "who shine upon all that are on earth and upon the deathless gods who live in the wide heaven". The generation of Titans preceded all the familiar deities of Olympus who largely supplanted them. In some accounts, Eos' father was called Pallas.
Eos married the Titan Astraeus ("of the Stars") and became the mother of the Anemoi ("winds") namely Zephyrus, Boreas, Notus and Eurus; the Morning Star, Eosphoros (Lucifer); the Astra ("stars") and the virgin goddess of justice, Astrae ("starry one"). Her other notable offspring were Memnon and Emathion by the Trojan prince, Tithonus. Sometimes, Hesperus, Phaethon and Tithonus (different from the lover) were called the children of Eos by the Athenian prince, Cephalus.
The dawn goddess Eos was almost always described with rosy fingers (ῥοδοδάκτυλος, rhododáktylos) or rosy forearms (ῥοδόπηχυς, rhodópēkhys) as she opened the gates of heaven for the Sun to rise. In Homer, her saffron-coloured robe is embroidered or woven with flowers; rosy-fingered and with golden arms, she is pictured on Attic vases as a beautiful woman, crowned with a tiara or diadem and with the large white-feathered wings of a bird.
"But soon as early Dawn appeared, the rosy-fingered, then gathered the folk about the pyre of glorious Hector."
"That brightest of stars appeared, Eosphoros, that most often heralds the light of early-rising Dawn (Eos Erigeneia)."
"And after these Erigeneia ["Early-born"] bore the star Eosphoros ("Dawn-bringer"), and the gleaming stars with which heaven is crowned."
Eos' team of horses pull her chariot across the sky and are named in the Odyssey as "Firebright" and "Daybright". While Quintus pictured her exulting in her heart over the radiant horses (Lampus and Phaëton) that drew her chariot, amidst the bright-haired Horae, the feminine Hours, climbing the arc of heaven and scattering sparks of fire.
Eos, the rosy-fingered, saffron-robed and golden-throned goddess, who goes up to Olympus to announce the light to the immortals, fell in love several times. According to Pseudo-Apollodorus, it was the jealous Aphrodite who cursed her to be perpetually in love and have an unsatisfiable sexual desire because once had Eos lain with Aphrodite's sweetheart Ares, the god of war. This caused her to abduct a number of handsome young men, most notably Cephalus, Tithonus, Orion, and Cleitus. The good-looking Cleitus was made immortal by her. She also asked for Tithonus to be made immortal, but forgot to ask for eternal youth, which resulted in him living forever as a helpless old man.
According to Hesiod, by Tithonus, Eos had two sons, Memnon and Emathion. Memnon fought among the Trojans in the Trojan War and was slain. Her image with the dead Memnon across her knees, like Thetis with the dead Achilles are icons that inspired the Christian Pietà.
The abduction of Cephalus had special appeal for an Athenian audience because Cephalus was a local boy, and so this myth element appeared frequently in Attic vase-paintings and was exported with them. In the literary myths, Eos kidnapped Cephalus when he was hunting and took him to Syria.
The second-century CE traveller Pausanias was informed that the abductor of Cephalus was Hemera, goddess of Day. Although Cephalus was already married to Procris, Eos bore him three sons, including Phaeton and Hesperus, but he then began pining for Procris, causing a disgruntled Eos to return him to her and put a curse on them.
In Hyginus' report, Cephalus accidentally killed Procris some time later after he mistook her for an animal while hunting.
In Ovid's account, Procris, a jealous wife, was spying on him and heard him singing to the wind, but thought he was serenading his ex-lover Eos.
"[Eos addresses Zeus :] ‘Least I may be of all the goddesses the golden heavens hold--in all the world my shrines are rarest.’"
Ovid may therefore have known of at least two such shrines.
Among the Etruscans, the generative dawn-goddess was Thesan. Depictions of the dawn-goddess with a young lover became popular in Etruria in the fifth century, probably inspired by imported Greek vase-painting. Though Etruscans preferred to show the goddess as a nurturer (Kourotrophos) rather than an abductor of young men, the late Archaic sculptural acroterion from Etruscan Cære, now in Berlin, showing the goddess in archaic running pose adapted from the Greeks, and bearing a boy in her arms, has commonly been identified as Eos and Cephalus. On an Etruscan mirror Thesan is shown carrying off a young man, whose name is inscribed as Tinthu.
The Roman equivalent of Eos is Aurora, also a cognate showing the characteristic Latin rhotacism. Dawn became associated in Roman cult with Matuta, later known as Mater Matuta. She was also associated with the sea harbors and ports, and had a temple on the Forum Boarium. On June 11, the Matralia was celebrated at that temple in honor of Mater Matuta; this festival was only for women during their first marriage.
^ Nonnus: "Eos had just shaken off the wing of carefree sleep (Hypnos) and opened the gates of sunrise, leaving the lightbringing couch of Kephalos." (Dionysiaca 27. 1f, in A.L. Rouse's translation).
^ Mary R. Lefkowitz, "'Predatory' Goddesses" Hesperia 71.4 (October 2002, pp. 325-344) p. 326.
^ Pausanias remarking on the subjects shown in the Royal Stoa, Athens (i.3.1) and on the throne of Apollo at Amyklai (iii.18.10ff).
^ Marilyn Y. Goldberg, "The 'Eos and Kephalos' from Cære: Its Subject and Date" American Journal of Archæology 91.4 (October 1987, pp. 605-614) p 607.
^ Goldberg 1987:605-614 casts doubt on the boy's identification, in the context of Etruscan and Greek abduction motifs.
^ Noted by Goldberg 1987: in I. Mayer-Prokop, Die gravierten etruskischen Griffspiegel archaischen Stils (Heidelberg) 1966, fig. 61.
Hesiod, Theogony from The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White, Cambridge, MA., Harvard University Press; London, William Heinemann Ltd. 1914. Online version at the Perseus Digital Library. Greek text available from the same website.
The Homeric Hymns and Homerica with an English Translation by Hugh G. Evelyn-White. Homeric Hymns. Cambridge, MA., Harvard University Press; London, William Heinemann Ltd. 1914. Online version at the Perseus Digital Library. Greek text available from the same website.
|
0.983288 |
Which one do you think is a better choice: “a top graphic design school” or “ a best graphic design school?” Some might think that a best school is better than a top school, while others might think they are one in the same. The truth is, both types of schools are among the greatest, but whether or not a school makes it onto the list of “top schools” will depend on factors that differ from the factors used to identify a “best” school.
For starters, top school lists are typically created by students, alumni, and others (bloggers) that might look at affordability, convenience, number and types of clubs, recreation, and other similar factors to determine which schools deserve a spot on the list. Respected organizations such as the Princeton Review and U.S. News & World Report are usually behind most “best schools” lists. They consider a different set of factors such as graduation and retention rates, the number of program offerings, peer assessment, faculty resources (student-teacher ratio), financial resources, and student selectivity.
In the state of Florida, several schools often end up on both lists, and many of them offer some of the nation’s best graphic design programs. Continue reading to find out which Florida graphic design schools made the list of “top” schools, and what they have to offer. Please note that the schools are in order from largest to smallest student population.
|
0.94712 |
Is it even possible to provide a combination of foods that mimic the natural diet for dogs? Unless you are willing to spend hours every day in preparing home-cooked meals for your pets, you will most probably not find many commercial foods that resemble a natural diet for dogs.
Even if you are prepared to home cook meals for your pets, it is difficult to attain the perfect balance of protein, vitamins, and minerals. You will need to calculate the exact proportions needed to attain the best possible balance. The truth is that the kitchen is a place for culinary delight and not generally designed as a lab. What is perfectly prepared and scrumptious does not necessarily resemble a natural diet for dogs.
Ensure that your pets receive the wholesome goodness associated with a natural diet for dogs by buying the best grain-free dog food that money can buy. The manufacturer will have a lab facility in which to calculate and research the correct ratio of protein to vitamins, fats, and minerals. Such a manufacturer understands the importance of consistency in the provision of dog food that is of exceptionally high quality. If the manufacturer is local, they will ensure that the dog food you buy has not been in storage and transit for months. Freshness, balance, and scientifically researched ratios are what come to mind when thinking of the Field + Forest™ brand.
The Field + Forest range is based on the natural diet for dogs. The ancestral intake of foods included a range of meats, as dogs would have hunted for their food. As such, the Field + Forest™ range includes a diverse selection of high-quality proteins, including animal cartilages, organs, and meat. With the food prepared in its own natural juices without the addition of water, every scoop full of wet or dry dog food is packed with flavour and nutrition. Vegetables and wholesome fruits are also included, which enhances the naturally present nutrients.
The protein-centric foods contain no less than 60% protein with animal meat being the main ingredient. No synthetic augmentation is applied because the preparation method ensures minimal loss of flavour and nutrients. As such, it is well balanced for your pet.
The red meat in the dog food comes from top-quality Karoo lamb and game, packed with amino acids and the right combination of zinc, iron, and phosphorus. The fish includes white fish, tuna, and salmon, and provides for essential amino acids and fatty acids, which support optimal brain functioning, while the chicken provides exceptional flavour and the fats needed for energy. The eggs included provide for highly digestible amino acids, riboflavin, fatty acids, vitamins A and B, folate, and selenium.
The formulations include a selection of fresh fruits and vegetables, such as carrots, butternut, chickpeas, oranges, peas, cranberries, and apples. Nutritious herbs also form part of the formulations to ensure that your pet gets the immune support it needs. This includes flaxseed, marine algae, oregano, rosemary, milk thistle, fish oils, and more.
Give your pet the nutritional benefits associated with a natural diet for dogs. View the full range of Field + Forest™ products for more information about the formulations for dogs and puppies.
|
0.999857 |
In 1695, Edmond Halley discovered that eclipses recorded in ancient history did not match calculations for the times or places of those eclipses. Starting with records of eclipses in his day and the observed motion of the Moon and Sun, he used Isaac Newton's new theory of universal gravitation (1687) to calculate when and where ancient should have occurred and compared them with eclipses actually observed more than 2,000 years earlier. They did not match. Halley had great confidence in the theory of gravitation and resisted the temptation to conclude that the force of gravity changed as time passed. Instead, he proposed that the length of a day on Earth must have increased by a small amount.
If the Earth's rotation had slowed down slightly, the Moon must have gained the angular momentum to conserve the total angular momentum of the Earth-Moon system. This boost in angular momentum for the Moon would have caused it to spiral slowly outward from the Earth to a more distant orbit where it travels more slowly. If, 2,000 years earlier, the Earth had been spinning a little faster and the Moon had been a little closer and orbiting a little faster, then eclipse theory and observation would match. Scientists soon realized that Halley was right.
But what would cause the Earth's spin to slow? Tides. The gravitational attraction of the Moon is the principal cause of the ocean tides on Earth. As the shallow continental shelves (primarily in the Bering Sea) collide with high tides, the Earth's rotation is retarded. The slower spin of the Earth causes the Moon to edge farther from our planet.
From 1969 to 1972, the Apollo astronauts left a series of laser reflectors on the Moon's surface. Since then, scientists on Earth have been bouncing powerful lasers off these reflectors. By timing the round trip of each laser pulse, the Moon's distance can be measured to an accuracy of several inches. The Moon is receding from the Earth at the rate of about 1.5 inches (3.8 centimeters) a year.
As the Moon recedes from Earth, its apparent disk becomes smaller. Total eclipses become rarer; annular eclipses more frequent. Total eclipses are moving toward extinction. When the Moon's mean distance from the Earth has increased by 14,550 miles (23,410 kilometers), the Moon's apparent disk will be too small to cover the entire Sun, even when the Moon's elliptical orbit carries it closest to Earth. Total eclipses will no longer be possible.
How long will that take? With the Moon receding at 1.5 inches a year, the last total solar eclipse visible from the surface of the Earth will take place 620 million years from now. There is still time to catch one of these majestic events!
All rights reserved. This material may not be reproduced, published, copied or transmitted in any form, including electronically on the Internet or World Wide Web, without written permission of the authors.
Contact Espenak (at MrEclipse) for more information.
|
0.958195 |
"Chromatic" redirects here. For other uses, see Chromatic (disambiguation).
Melodies can be based on a diatonic scale and maintain its tonal characteristics but contain many accidentals, up to all twelve tones of the chromatic scale, such as the opening of Henry Purcell's Thy Hand, Belinda, Dido and Aeneas (1689) ( Play (help·info), Play (help·info) with figured bass), which features eleven of twelve pitches while chromatically descending by half steps, the missing pitch being sung later.
Béla Bartók - Music for Strings, Percussion and Celesta, mov. I, fugue subject: chromatic Play (help·info).
Bartok - Music for Strings, Percussion and Celesta, mov. I, fugue subject: diatonic variant Play (help·info).
Diatonic (Greek: διατονική) and chromatic (Greek: χρωματική) are terms in music theory that are most often used to characterize scales, and are also applied to musical instruments, intervals, chords, notes, musical styles, and kinds of harmony. They are very often used as a pair, especially when applied to contrasting features of the common practice music of the period 1600–1900.
These terms may mean different things in different contexts. Very often, diatonic refers to musical elements derived from the modes and transpositions of the "white note scale" C–D–E–F–G–A–B. In some usages it includes all forms of heptatonic scale that are in common use in Western music (the major, and all forms of the minor).
Chromatic most often refers to structures derived from the twelve-note chromatic scale, which consists of all semitones. Historically, however, it had other senses, referring in Ancient Greek music theory to a particular tuning of the tetrachord, and to a rhythmic notational convention in mensural music of the 14th through 16th centuries.
Tetrachord genera of the four-string lyre, from The History of the Arts and Sciences of the Antients, Charles Rollin (1768). The text gives a typically fanciful account of the term chromatic.
is F♮ lowered by a quarter tone). For all three tetrachords, only the middle two strings varied in their pitch.
, commonly used for the notation of sacred music. These uses for the word have no relationship to the modern meaning of chromatic, but the sense survives in the current term coloratura.
The term chromatic began to approach its modern usage in the 16th century. For instance Orlando Lasso's Prophetiae Sibyllarum opens with a prologue proclaiming, "these chromatic songs, heard in modulation, are those in which the mysteries of the Sibyls are sung, intrepidly," which here takes its modern meaning referring to the frequent change of key and use of chromatic intervals in the work. (The Prophetiae belonged to an experimental musical movement of the time, called musica reservata). This usage comes from a renewed interest in the Greek genera, especially its chromatic tetrachord, notably by the influential theorist Nicola Vicentino in his treatise on ancient and modern practice, 1555.
Diatonic scale on C equal tempered and just.
Gamut as defined by George William Lemon, English Etymology, 1783.
Medieval theorists defined scales in terms of the Greek tetrachords. The gamut was the series of pitches from which all the Medieval "scales" (or modes, strictly) notionally derive, and it may be thought of as constructed in a certain way from diatonic tetrachords. The origin of the word gamut is explained at the article Guidonian hand; here the word is used in one of the available senses: the all-encompassing gamut as described by Guido d'Arezzo (which includes all of the modes).
In its most strict definition, therefore, a diatonic scale is one that may be derived from the pitches represented in successive white keys of the piano (or a transposition thereof): the modern equivalent of the gamut.[vague] (For simplicity, throughout this article equal temperament tuning is assumed unless otherwise noted.) This would include the major scale, and the natural minor scale (same as the descending form of the melodic minor), but not the old ecclesiastical church modes, most of which included both versions of the "variable" note B♮/B♭.
There are specific applications in the music of the Common Practice Period, and later music that shares its core features.
Some writers consistently classify the other variants of the minor scale – the melodic minor (ascending form) and the harmonic minor – as non-diatonic, since they are not transpositions of the white-note pitches of the piano. Among such theorists there is no agreed general term that encompasses the major and all forms of the minor scale.
Some writers consistently include the melodic and harmonic minor scales as diatonic also. For this group, every scale standardly used in common practice music and much similar later music is either diatonic (the major, and all forms of the minor) or chromatic.
Still other writers mix these two meanings of diatonic (and conversely for chromatic), and this can lead to confusions and misconceptions. Sometimes context makes the intended meaning clear.
Some other meanings of the term diatonic scale take the extension to harmonic and melodic minor even further, to be even more inclusive.
In general, diatonic is most often used inclusively with respect to music that restricts itself to standard uses of traditional major and minor scales. When discussing music that uses a larger variety of scales and modes (including much jazz, rock, and some tonal 20th-century concert music), writers often adopt the exclusive use to prevent confusion.
A chromatic scale consists of an ascending or descending sequence of pitches, always proceeding by semitones. Such a sequence of pitches is produced, for example, by playing all the black and white keys of a piano in order. The structure of a chromatic scale is therefore uniform throughout—unlike major and minor scales, which have tones and semitones in particular arrangements (and an augmented second, in the harmonic minor).
Some instruments, such as the violin, can be played in any scale; others, such as the glockenspiel, are restricted to the scale to which they are tuned. Among this latter class, some instruments, such as the piano, are always tuned to a chromatic scale, and can be played in any key, while others are restricted to a diatonic scale, and therefore to a particular key. Some instruments, such as the harmonica, harp, and glockenspiel, are available in both diatonic and chromatic versions (although it is possible to play chromatic notes on a diatonic harmonica, they require extended embouchure techniques, and some chromatic notes are only usable by advanced players).
Because diatonic scale is itself ambiguous, distinguishing intervals is also ambiguous. For example, the interval B♮–E♭ (a diminished fourth, occurring in C harmonic minor) is considered diatonic if the harmonic minor scale is considered diatonic; but it is considered chromatic if the harmonic minor scale is not considered diatonic.
Additionally, the label chromatic or diatonic for an interval may be sensitive to context. For instance, in a passage in C major, the interval C–E♭ could be considered a chromatic interval because it does not appear in the prevailing diatonic key; conversely in C minor it would be diatonic. This usage is still subject to the categorization of scales as above, e.g. in the B♮–E♭ example above, classification would still depend on whether the harmonic minor scale is considered diatonic.
In equal temperament, there is no difference in tuning (and therefore in sound) between intervals that are enharmonically equivalent. For example, the notes F and E♯ represent exactly the same pitch, so the diatonic interval C–F (a perfect fourth) sounds exactly the same as its enharmonic equivalent—the chromatic interval C–E♯ (an augmented third).
In systems other than equal temperament, however, there is often a difference in tuning between intervals that are enharmonically equivalent. In tuning systems that are based on a cycle of fifths, such as Pythagorean tuning and meantone temperament, these alternatives are labelled as diatonic or chromatic intervals. Under these systems the cycle of fifths is not circular in the sense that a pitch at one end of the cycle (e.g., G♯) is not tuned the same as the enharmonic equivalent at its other end (A♭); they are different by an amount known as a comma.
This broken cycle causes intervals that cross the break to be written as augmented or diminished chromatic intervals. In meantone temperament, for instance, chromatic semitones (E–E♯) are smaller than diatonic semitones (E–F), and with consonant intervals such as the major third the enharmonic equivalent is generally less consonant.
If the tritone is assumed diatonic, the classification of written intervals by this definition is not significantly different from the "drawn from the same diatonic scale" definition given above as long as the harmonic minor and ascending melodic minor scale variants are not included.
Diatonic chords are generally understood as those that are built using only notes from the same diatonic scale; all other chords are considered chromatic. However, given the ambiguity of diatonic scale, this definition, too, is ambiguous. And for some theorists, chords are only ever diatonic in a relative sense: the augmented triad E♭–G–B♮ is diatonic "to" or "in" C minor.
On this understanding, the diminished seventh chord built on the leading note is accepted as diatonic in minor keys.
Often musicians call diatonic harmony any kind of harmony inside the major–minor system of common practice. When diatonic harmony is understood in this sense, the supposed term chromatic harmony means little, because chromatic chords are also used in that same system.
At other times, especially in textbooks and syllabuses for musical composition or music theory, diatonic harmony means harmony that uses only "diatonic chords". According to this usage, chromatic harmony is then harmony that extends the available resources to include chromatic chords: the augmented sixth chords, the Neapolitan sixth, chromatic seventh chords, etc.
Since the word harmony can be used of single classes of chords (dominant harmony, E minor harmony, for example), diatonic harmony and chromatic harmony can be used in this distinct way also.
Chromatic harmony may be defined as the use of successive chords that are from two different keys and therefore contain tones represented by the same note symbols but with different accidentals. Four basic techniques produce chromatic harmony under this definition: modal interchange, secondary dominants, melodic tension, and chromatic mediants.
A clear illustration of the contrast between chromatic and diatonic harmony may be found in the slow movement of Beethoven’s Piano Concerto No. 4, Op. 58. The long, flowing melody of the first five bars is almost entirely diatonic, consisting of notes within the scale of E minor, the movement’s home key. The only exception is the G sharp in the left hand in the third bar. By contrast, the remaining bars are highly chromatic, using all the notes available to convey a sense of growing intensity as the music builds towards its expressive climax.
A further example may be found in this extract from Act III of Richard Wagner’s opera Die Walkure . The first four bars harmonize a descending chromatic scale with a rich, intoxicating chord progression. In contrast, the remaining three bars are entirely diatonic, using notes only within the scale of E major. The passage is intended to convey the god Wotan putting his daughter Brunnhilde into a deep sleep.
In modern usage, the meanings of the terms diatonic note and chromatic note vary according to the meaning of the term diatonic scale. Generally – not universally – a note is understood as diatonic in a context if it belongs to the diatonic scale that is used in that context; otherwise it is chromatic.
Alteration of a note that makes it (or the harmony that includes it) chromatic rather than diatonic.
Melodic movement between a diatonic note and a chromatically altered variant (from C to C♯ in G major, or vice versa, for example).
Movement between harmonies that are not elements of any common diatonic system (that is, not of the same diatonic scale: movement from D–F–A to D♯–F♯–A, for example).
The same as the second sense of chromatic inflection, above.
In musica ficta and similar contexts, a melodic fragment that includes a chromatic semitone, and therefore includes a chromatic inflection in the second sense, above.
Movement between harmonies that both belong to at least one shared diatonic system (from F–A–C to G–B–E, for example, since both occur in C major).
Diatonic modulation is modulation via a diatonic progression.
Chromatic modulation is modulation via a chromatic progression, in the first sense given above.
One very common kind of pentatonic scale that draws its notes from the diatonic scale (in the exclusive sense, above) is sometimes called the diatonic pentatonic scale: C–D–E–G–A[–C], or some other modal arrangement of those notes.
Other pentatonic scales (such as the pelog scales) may also be construed as reduced forms of a diatonic scale, but are not labelled diatonic.
Traditionally, and in all uses discussed above, the term diatonic has been confined to the domain of pitch, and in a fairly restricted way. Exactly which scales (and even which modes of those scales) should count as diatonic is unsettled, as shown above. But the broad selection principle itself is not disputed, at least as a theoretical convenience.
The selection of pitch classes can be generalised to encompass formation of non-traditional scales from the underlying twelve chromatic pitch classes. Or a larger set of underlying pitch classes may be used instead. For example, the octave may be divided into varying numbers of equally spaced pitch classes. The usual number is twelve, giving the conventional set used in Western music. But Paul Zweifel uses a group-theoretic approach to analyse different sets, concluding especially that a set of twenty divisions of the octave is another viable option for retaining certain properties associated with the conventional "diatonic" selections from twelve pitch classes.
It is possible to generalise this selection principle even beyond the domain of pitch. The diatonic idea has been applied in analysis of some traditional African rhythms, for example. Some selection or other is made from an underlying superset of metrical beats, to produce a "diatonic" rhythmic "scale" embedded in an underlying metrical "matrix". Some of these selections are diatonic in a way similar to the traditional diatonic selections of pitch classes (that is, a selection of seven beats from a matrix of twelve beats – perhaps even in groupings that match the tone-and-semitone groupings of diatonic scales). But the principle may also be applied with even more generality (including even any selection from a matrix of beats of any size).
^ Benward & Saker (2003). Music: In Theory and Practice, Vol. I, p.38. Seventh Edition. ISBN 978-0-07-294262-0.
^ a b Leeuw, Ton de (2005). Music of the Twentieth Century, p.93. ISBN 90-5356-765-8.
^ Often diatonic and chromatic are treated as mutually exclusive opposites, concerning common practice music. This article deals mainly with common practice music, and later music that shares the same core features (including the same particular use of tonality, harmonic and melodic idioms, and types of scales, chords, and intervals). Where other music is dealt with, this is specially noted.
^ This definition encompasses the natural minor scale (and equivalently the descending melodic minor), the major scale, and the ecclesiastical modes.
^ For inclusion of the harmonic minor and the ascending melodic minor see the section Modern meanings of "diatonic scale" in this article.
^ Translating the term used by Greek theorists: γένος, génos; plural γένη, génē.
^ It is unclear whether the lyre in question was itself a presumed four-stringed instrument ("τετράχορδον ὄργανον"), as some have suggested (see Peter Gorman, Pythagoras, a Life (London: Routledge & K. Paul, 1979), p. 162: "The fundamental instrument of early Greek music was the tetrachord or four-stringed lyre, which was tuned in accordance with the main concordances; the tetrachord was also the foundation of Greek harmonic theory"). The number of strings on early lyres and similar instruments is a matter of much speculation (see Martin Litchfield West, Ancient Greek music (Oxford and New York: Oxford University Press, 1994), especially pp. 62–64). Many later instruments had seven or perhaps more strings, and in that case the tetrachord must be thought of as based on a selection of four adjacent strings.
^ The English word diatonic is ultimately from the Greek διατονικός (diatonikós), itself from διάτονος (diátonos), which may mean (as OED claims) "through the tones" (taking τόνος, tónos, to mean interval of a tone), or perhaps stretched out (as recorded in Liddell and Scott's Greek Lexicon). See also Barsky (Chromaticism, Barsky, Vladimir, Routledge, 1996, p. 2): "There are two possible ways of translating the Greek term 'diatonic': (1) 'running through tones', i.e. through the whole tones; or (2) a 'tensed' tetrachord filled up with the widest intervals". The second interpretation would be justified by consideration of the pitches in the diatonic tetrachord, which are more equally distributed ("stretched out") than in the chromatic and enharmonic tetrachords, and are also the result of tighter stretching of the two variable strings. It is perhaps also sounder on linguistic morphological grounds. (See also Merriam-Webster Online.) A completely separate explanation of the origins of the term diatonic appeals to the generation of the diatonic scale from "two tones": "Because the musical scale is based entirely on octaves and fifths, that is, two notes, it is called the 'diatonic scale' " (Phillips, Stephen, "Pythagorean aspects of music", in Music and Psyche, Vol. 3, available also online). But this ignores the fact that it is the element di- that means "two", not the element dia-, which has "through" among its meanings (see Liddell and Scott). There is a Greek term δίτονος (dítonos), which is applied to an interval equivalent to two tones. It yields the English words ditone and ditonic (see Pythagorean comma), but it is quite distinct from διάτονος. Yet another derivation assumes the sense "through the tones" for διάτονος, but interprets tone as meaning individual note of the scale: "The word diatonic means 'through the tones' (i.e., through the tones of the key)" (Gehrkens, 1914, see below; see also the Prout citation, at the same location). This is not in accord with any accepted Greek meaning, and in Greek theory it would fail to exclude the other tetrachords. The fact that τόνος itself has at least four distinct meanings in Greek theory of music contributes to the uncertainty of the exact meaning and derivation of διατονικός, even among ancient writers. (See Solon Michaelides, The Music of Ancient Greece: An Encyclopaedia (London; Faber and Faber, 1978), pp. 335–40: "Tonos". Τόνος may refer to a pitch, an interval, a "key" or register of the voice, or a mode.) For more information, especially concerning the various exact tunings of the diatonic tetrachord, see Diatonic genus.
^ Chromatic is from Greek χρωματικός (khrōmatikós), itself from χρῶμα (khrṓma), which means complexion, hence colour – or, specifically as a musical term, "a modification of the simplest music" (Liddell and Scott's Greek lexicon). For more information, especially concerning the various exact tunings of the chromatic tetrachord, see Chromatic genus.
^ Occasionally, as in the Rollin excerpt shown in this section, spelt inharmonic; but in OED this is only given as a distinct word with a distinct etymology ("Not harmonic; not in harmony; dissonant,..."). The motivation and sources of the Greek term ἐναρμονικός (enarmonikós) are little understood. But the two roots are ἐν (en: "in") and ἁρμονία (harmonía: "good placement of parts", "harmony", "a scale, mode, or τόνος [in one sense; see notes above]"). So in some way the term suggests harmoniousness or good disposition of parts, but not in the modern sense of harmony, which has to do with simultaneous sounds. (See Solon Michaelides, The Music of Ancient Greece: An Encyclopaedia (London: Faber and Faber, 1978); Liddell and Scott; etc.) For more information, especially concerning the various exact tunings of the enharmonic tetrachord, see Enharmonic genus.
^ In practice tetrachord (τετράχορδον; tetrákhordon) also meant the instrument itself. And it could also mean the interval of a perfect fourth between the pitches of the fixed top and bottom strings; therefore the various tunings were called divisions of the tetrachord (see OED, "Tetrachord").
^ For general and introductory coverage of Greek theory see Tuning and Temperament, A Historical Survey, Barbour, J. Murray, 2004 (reprint of 1972 edition), ISBN 0-486-43406-0. These meanings in Greek theory are the ultimate source of the meanings of the words today, but through a great deal of modification and confusion in Medieval times. It would therefore be a mistake to consider the Greek system and the subsequent Western systems (Medieval, Renaissance, or contemporary) as closely similar simply because of the use of similar terms: "... the categories of the diatonic, chromatic and enharmonic genera developed within the framework of monodic musical culture and have little in common with the corresponding categories of modern music theory" (Chromaticism, Barsky, Vladimir, Routledge, 1996, p. 2). There were several Greek systems, in any case. What is presented here is merely a simplification of theory that spans several centuries, from the time of Pythagoras (c. 580 BCE – c. 500 BCE), through Aristoxenus (c. 362 BCE – after 320 BCE), to such late theorists as Alypius of Alexandria (fl. 360 CE). Specifically, there are more versions of each of the three tetrachords than are described here.
^ Details of the practice for certain periods: "The device that was both the simplest and the most stable and durable was that known as coloratio. In principle, any note or group of notes subjected to coloration or blackening was reduced to two-thirds of the value that it would have enjoyed in its pristine state. In respect of any note in mensural notation that was equal in duration to two of that next smaller in value, the coloration of three in succession caused each to undergo reduction to two-thirds of its erstwhile value, so creating a triplet [... .] In the case of any note that was equal in duration to three of that next smaller, the coloration of three together likewise effected a proportional reduction in the value of each to two-thirds, so reducing perfect value to imperfect and commonly creating the effect called hemiola [... .] On occasions coloured notes could appear singly to denote imperfect value, especially to inhibit unwanted perfection and alteration," Roger Bowers, "Proportional notation", 2. Coloration, New Grove Dictionary of Music and Musicians, second edition, edited by Stanley Sadie and John Tyrrell (London: Macmillan Publishers, 2001).
^ Parrish, Carl, The Notation of Medieval Music, Pendragon, New York, 1978, pp. 147ff.
^ Harvard Dictionary of Music, 2nd ed., "Chromatic".
^ Grout, Donald J, and Palisca, Claude, A History of Western Music, 6th ed., Norton, New York, 2001, pp. 188–190.
^ "The root of the Italian term is that of 'colour', and it is probably related through its use of diminution (the little notes that 'rush' to the next long note, as Bernhard writes) to the mensural practice of coloration" (New Grove, "Coloratura").
^ Grout et al., 2001, p. 188.
^ Some theorists[weasel words] derive such a scale from a certain series of pitches rising by six perfect fifths: F–C–G–D–A–E–B. These pitches are then rearranged by transposition to a single-octave scale: C–D–E–F–G–A–B[–C] (the standard C major scale, with the interval structure T–T–S–T–T–T[–S]). A few theorists[weasel words] call the original untransposed series itself a "scale". Percy Goetschius calls that series the "natural scale" (The Theory and Practice of Tone-Relations, Schirmer, 1931 edition, p. 3; see further citation below).
^ Goetschius, as cited below, accepts only the major as diatonic.
^ The first "exclusive" usage seems to be gaining greater currency. Certainly it is becoming close to standard in academic writing, as can be seen by querying online archives (such as JSTOR) for recent uses of the term diatonic. Equally certainly, the second "inclusive" meaning is still strongly represented in non-academic writing (as can be seen by online searches of practically oriented music texts at, for example, Amazon.com). Overall, considerable confusion remains; on the evidence presented in the list of sources, there are very many sources in the third category: Diatonic used vaguely, inconsistently, or anomalously.
^ A very clear statement of the "exclusive" stance is given in the excerpt from "The leading tone in direct chromaticism: from Renaissance to Baroque", Clough, John, 1957, below. The excerpt acknowledges and analyses the difficulties with logic, naming, and taxonomy in that stance.
^ A few exclude only the harmonic minor as diatonic, and accept the ascending melodic, because it comprises only tones and semitones, or because it has all of its parts analysable as tetrachords in some way or other.
^ However, beyond analysis of common practice music, even these writers do not typically consider non-standard uses of some familiar scales to be diatonic. For example, unusual modes of the melodic or harmonic minor scale, such as used in early works by Stravinsky, are almost never described as "diatonic".
A "diatonic" scale is a scale formed from two intervals of different sizes, such that groups of several adjacent instances of the larger interval are separated by single instances of the smaller interval.
A "pentatonic" scale is a scale formed from two intervals of different sizes, such that groups of several adjacent instances of the smaller interval are separated by single instances of the larger interval. Therefore a generic "pentatonic" can contain more than five tones.
"Chromatic" refers to the interval formed between adjacent pitch-classes of any equal-tempered scale.
See also #Extended pitch selections, in this article. See also an exceptional usage by Persichetti, in a note to #Diatonic_pentatonic_scale, below.
^ It is not usual to use chromatic scale in any other sense. A rare exception is found in Elements of Musical Composition, Crotch, William, 1830. (See the quotation from this text, below. See also extensive analysis in the excerpt from "The leading tone in direct chromaticism: from Renaissance to Baroque", Clough, John, 1957, in the same subsection below.) Outside of music altogether, chromatic scale may refer to Von Luschan's chromatic scale.
^ There are several other understandings of the terms diatonic interval and chromatic interval. There are theorists[weasel words] who define all augmented and diminished intervals as chromatic, even though some of these occur in scales that everyone accepts as diatonic. (For example, the diminished fifth formed by B and F, which occurs in C major.) There are even some writers who define all minor intervals as chromatic (Goetschius, Percy, The Theory and Practice of Tone-Relations, 1931, p. 6; Goetschius assesses all intervals as if the lower note were the tonic, and since for him only the major scale is diatonic, only the intervals formed above the tonic in the major are diatonic; see also, for example, Harrison, Mark, Contemporary Music Theory – Level Two, 1999, p. 5). Some theorists take the diatonic interval to be simply a measure of the number of "scale degrees" spanned by two notes (so that F♯–E♭ and F♮–E♮ represent the same "diatonic interval": a seventh); and they use the term chromatic interval to mean the number of semitones spanned by any two pitches (F♯ and E♭ are "at a chromatic interval of nine semitones"). Some theorists use the term diatonic interval to mean "an interval named on the assumption of the diatonic system of Western music" (so that all perfect, major, minor, augmented, diminished intervals are "diatonic intervals"). It is not clear what chromatic interval would mean, if anything, in parallel with this usage for diatonic. Some theorists use chromatic interval to mean simply semitone, as for example in the article Chromatic fourth. See also Williams, Peter F., The Chromatic Fourth during Four Centuries of Music, OUP, 1997. Something close to this usage may be found in print. For example, the term chromatically, as used in: "The trill rises chromatically by step above this harmonic uncertainty, forming a chromatic fourth, ..." (Robin Stowel, Beethoven: Violin Concerto (Cambridge Music Handbooks), Cambridge and New York: Cambridge University Press, 2005, p. 66). The term as used in the phrase chromatic fourth itself perhaps means just what it means in chromatic scale, but here applied to a melodic interval rather than a scale.
^ See for example the citation from Grove Music Online ("Diatonic"), below.
^ Helmholtz, Hermann, trans. Alexander Ellis, On the Sensations of Tone, Dover, New York, 1954, pp. 433–435 and 546–548. The two notes of a diatonic semitone have different letter-names; those of a chromatic semitone have the same letter-name.
^ Kostka, Stefan, and Payne, Dorothy, Tonal Harmony, McGraw-Hill, 5th edition, 2003, pp. 60–61.
^ "Because of the variability of [scale degrees] 6 and 7, there are sixteen possible diatonic seventh chords in minor ... [One line in a table headed Common diatonic seventh chords in minor:] __º7_____viiº7__" (Tonal harmony, Kostka, Stefan and Payne, Dorothy, McGraw-Hill, 3rd edition 1995, pp. 64–65).
^ This is because the third of the triad does not belong to the natural minor scale or Aeolian mode of C minor (C, D, E♭, F, G, A♭, B♭). This highly restrictive interpretation is effectively equivalent to the idea that diatonic triads are those drawn from the notes of the major scale alone, as this source rather roughly puts it: "Diatonic chords are wholly contained within a major scale" (Harrison, Mark, Contemporary Music Theory – Level Two, 1999, p. 7).
^ Often the content of "diatonic harmony" in this sense includes such harmonic resources as diminished sevenths on the leading note – possibly even in major keys – even if the text uses a classification for chords that should exclude those resources.
^ Some of these are chords "borrowed" from a key other than the prevailing key of a piece; but some are not: they are derivable only by chromatic alteration.
^ a b Tischler, H. (1958). "Re: Chromatic Mediants: A Facet of Musical Romanticism". Journal of Music Theory. 2 (1): 94–97. doi:10.2307/842933. JSTOR 842933.
^ "... most chromatic harmony can be read as diatonic harmony with chromatic inflection", a view attributed to Simon Sechter in New Grove, "Analysis", §II: History 3.
^ "A chromatic progression is one between harmonies with no diatonic relationship, harmonies that do not coexist in any single diatonic system of key and mode. For this purpose, the harmonic form of the minor scale is considered the tonal-harmonic basis of its diatonic system. A usual characteristic of the chromatic progression is chromatic inflection – the change of one or more notes from one form (sharp, natural, or flat) to another" Wallace Berry, Form in Music (Prentice-Hall, 1966), pp. 109–110, note 5.
^ Wallace Berry, Form in Music (Prentice-Hall, 1966), pp. 109–110, note 5.
^ "In [an example] the change from major to minor is supported by the chromatic progression ... in the bass" Structural Functions of Harmony, Schoenberg, Arnold, Faber & Faber, 1983, p. 54.
^ a b See New Grove Online, "Musica Ficta", I, ii, cited earlier.
^ See Form in Music, Berry, Wallace, Prentice-Hall, 1966, pp. 109–110, note 5. The author even includes movement between tonic and Neapolitan sixth harmonies (in both major and minor), because there exists some diatonic system in which both harmonies occur. With C major, for example, both occur in the subdominant minor, F minor.
^ a b Berry, Form in Music, p. 125, note 2.
^ Twentieth-Century Harmony, Persichetti, Vincent, Norton, 1961, pp. 50–51. Persichetti also makes an exceptional use of the term diatonic scale in this context: "Diatonic scales of five tones are harmonically limited ...".
^ Zweifel, P. F. (1996). "Generalized Diatonic and Pentatonic Scales: A Group-Theoretic Approach". Perspectives of New Music. 34 (1): 140–161. doi:10.2307/833490. JSTOR 833490.
^ Rahn, J. (1996). "Turning the Analysis around: Africa-Derived Rhythms and Europe-Derived Music Theory". Black Music Research Journal. 16 (1): 71–89. doi:10.2307/779378. JSTOR 779378.
|
0.964433 |
Real-time functional magnetic resonance (rtfMRI) imaging is a relatively new technique to compute moment-to-moment changes in brain activations corresponding to a particular experimental manipulation. When coupled with modern machine learning techniques, rtfMRI becomes a powerful tool to read brain states in real time. Two separate experiments were conducted in this study to answer two broad research goals.
The first experiment was conducted to investigate if visual perception and imagination can be decoded in real-time and if presenting neurofeedback of the decoding results can help improved decoding/task performance. 25 elastic net logistic regression classifiers were trained on fMRI responses for 100 random flickering random patterns on a 5 x 5 grid in order to learn the stimulus-to-cortical-activation mapping. The trained classifiers were then used to predict novel stimuli perceived and imagined on the same 5 x 5 grid used during training. Each perception and imagination conditions were performed twice: once with feedback and once without it. The results of the study indicate that visual perception can be decoded in real-time with an average accuracy of 55%. No significant decoding accuracy was obtained for imagined stimuli. Furthermore, lower decoding accuracies were obtained for conditions with feedback compared to the same conditions without feedback. However, the results of this experiment cannot be trusted as some critical mistakes were made in its design and implementation including selecting a wrong voxel size and using a very long visual cortex stimulation (12s) during training. All this led to poor performance in the experiment. Furthermore, the results indicate that subject motivation and experiment duration has a significant impact on task performance during the experiment.
The second experiment was conducted to find if one of the two competing stimulus categories can be attended to and decoded in real time, and if presenting the feedback of decoding can assist in improving task performance. The classifier was trained on pictures of famous faces and places. Subjects were then shown a 50/50 hybrid of a picture of a famous face and a famous place and asked to attend to only one of them. The attended picture was then decoded in real-time and the hybrid mix was updated at every TR (repetition time) such that if the prediction was right, the non-target picture will fade out whereas the target picture will get enhanced, and vice-versa. This is what happened in trials in feedback. In trials without feedback, the hybrid mix remained at 50/50 % mix all times during a trial. The results of the study indicate that the attended category can be decoded with very high accuracy (78.5%). Furthermore, the feedback of the decoded category has no influence on the decoding accuracy. The feedback does however, induce a snow ball effect where one classification leads to a stream of similar classifications in subsequent TRs in a trial. Moreover, the results also indicate that the transition period of the BOLD activity has a reliable structure that can be decoded with above chance level accuracies, thereby decreasing the real-time fMRI delay by as much as 6s.
Apart from these two experiments, the real-time fMRI architecture used for executing real-time fMRI experiments was developed and refined. Moreover, tools for efficient analysis and visualization of fMRI and rtfMRI data were also developed.
|
0.947056 |
The contras (some references use the capitalized form, "Contras") is a label given to the various U.S.-backed and funded rebel groups that were active from 1979 through to the early 1990s in opposition to the left-wing, socialist Sandinista Junta of National Reconstruction government in Nicaragua. Among the separate contra groups, the Nicaraguan Democratic Force (FDN) emerged as the largest by far. In 1987, virtually all contra organizations were united, at least nominally, into the Nicaraguan Resistance.
Contra (Japanese: 魂斗羅, Hepburn: Kontora) is a video game series produced by Konami composed primarily of run and gun-style shoot-'em-ups. The series debuted in 1987 as a coin-operated arcade game simply titled Contra, which was followed by the release of Super Contra in 1988 and several sequels produced for various home platforms.
The arcade version of Contra was released on February 1987, a few months after the Iran–Contra affair was made public. While it is unclear whether the game was deliberately named after the Nicaraguan Contra rebels, the ending theme of the original game was titled "Sandinista" (サンディニスタ, Sandinisuta), after the adversaries of the real-life Contras.
Auschwitz concentration camp (German: Konzentrationslager Auschwitz, also KZ Auschwitz [kɔntsɛntʁaˈtsi̯oːnsˌlaːɡɐ ˈʔaʊʃvɪts]) was a network of German Nazi concentration camps and extermination camps built and operated by the Third Reich in Polish areas annexed by Nazi Germany during World War II. It consisted of Auschwitz I (the original camp), Auschwitz II–Birkenau (a combination concentration/extermination camp), Auschwitz III–Monowitz (a labor camp to staff an IG Farben factory), and 45 satellite camps.
Auschwitz I was first constructed to hold Polish political prisoners, who began to arrive in May 1940. The first extermination of prisoners took place in September 1941, and Auschwitz II–Birkenau went on to become a major site of the Nazi "Final Solution to the Jewish question". From early 1942 until late 1944, transport trains delivered Jews to the camp's gas chambers from all over German-occupied Europe, where they were killed with the pesticide Zyklon B. At least 1.1 million prisoners died at Auschwitz, around 90 percent of them Jewish; approximately 1 in 6 Jews killed in the Holocaust died at the camp. Others deported to Auschwitz included 150,000 Poles, 23,000 Romani and Sinti, 15,000 Soviet prisoners of war, 400 Jehovah's Witnesses, and tens of thousands of others of diverse nationalities, including an unknown number of homosexuals. Many of those not killed in the gas chambers died of starvation, forced labor, infectious diseases, individual executions, and medical experiments.
Auschwitz, in English, commonly refers to the Auschwitz concentration camp complex built by Nazi Germany during World War II.
Boll shot the film in 2010 from February to March in Zagreb, Croatia.Auschwitz was filmed on the set of BloodRayne: The Third Reich.
The Holocaust (from the Greek ὁλόκαυστος holókaustos: hólos, "whole" and kaustós, "burnt"), also known as the Shoah (Hebrew: השואה, HaShoah, "the catastrophe"), was a genocide in which Adolf Hitler's Nazi Germany and its collaborators killed about six million Jews. The number includes about one million children and represented about two-thirds of the nine million Jews who had resided in Europe. Some definitions of the Holocaust include the additional five million non-Jewish victims of Nazi mass murders, bringing the total to about eleven million. Killings took place throughout Nazi Germany and German-occupied territories.
From 1941 to 1945, Jews were systematically murdered in one of the largest genocide in history, which was part of a broader aggregate of acts of oppression and killings of various ethnic and political groups in Europe by the Nazi regime. Every arm of Germany's bureaucracy was involved in the logistics and the carrying out of the genocide. Other victims of Nazi crimes included Romanis, ethnic Poles and other Slavs, Soviet POWs, communists, homosexuals, Jehovah's Witnesses and the mentally and physically disabled. A network of about 42,500 facilities in Germany and German-occupied territories were used to concentrate victims for slave labor, mass murder, and other human rights abuses. Over 200,000 people are estimated to have been Holocaust perpetrators.
|
0.918169 |
Who has sung the song Amazing Grace?
The song "Amazing Grace" has been sung by many artists. This includes Aretha Franklin, Rod Stewart, and Elvis Presley.
When was the song 'Amazing Grace' top of the charts?
Is the song Amazing Grace an African-American spiritual?
Is Amazing Grace a battle song or love song?
Neither. It is a hymn about God's amazing grace reaching out to the most miserable sinner..
Why did John Newton write the song Amazing Grace?
What are the words of the song amazing grace?
What is the name and artist of the gospel song that goes.. Amazing grace shall always be your song for it was grace.?
Dottie Rambo wrote, and sang the song. It was titled "He looked beyond my Fault, and saw my need"
What movies used the song 'Amazing Grace'?
What is the song Amazing Grace about?
Amazing Grace was written by John Newton, who was a Captain of a slave ship, when slavery was still in. One time when he was returning to England from the Indies a storm hit, and many men, women and children died. He then got a conviction from God, repeanted of his sins and wrote Amazing Grace.
Will the new song Disappear be sung by Three Days Grace?
No, the new song Disappear will not be sung by Three Days Grace. Three Days Grace does not have a song called Disappear. Three Days Grace has been featured on a few songs, but none of them being called Disappear.
When did the gospel song Amazing Grace come out?
The hymn, Amazing Grace, was written by John Newton, and Englishclergyman and poet. It was published in 1779.
What song begins with words Amazing Grace?
"He Looked Beyond My Fault", written by Dottie Rambo, set to the melody "Danny Boy".
How do you translate the lyrics of the song Amazing Grace to french?
Does Selena Gomez like the song Amazing Grace?
When was the song your grace still amazes me by eternity focus written?
How do you play the song 'Amazing Grace' on a harmonica?
If you are on a 10 hole harmonica it goes like this: 6 7 8 7 8 -8 7 -6 6 6 7 8 7 8 -8 9 8 9 8 7 6 -6 7 -6 6 6 7 8 7 8 -8 7 If I were you, I'd play it on the key of G because if it's on the key of C it gets hard to breathe. But you can play it in any key; that's the beauty of it.
Does the song Amazing Grace have a plot?
What philosophy inspired the song Amazing Grace?
"The song is based on a Christian hymn by John Newton, focusing on forgiveness and redemption."
What was the original title of the song amazing grace?
amazing grace was the title however it didnt have a tune as yet but in 1835 someone put the words to the tune of (NEW BRITIAN) and that is what we have today .
Is the tune to Amazing Grace in any form connected to an old folk song?
The words to Amazing Grace , written by John Newton, were published in 1779. They were put to more than twenty different tunes prior to 1835, when William Walker first joined the lyrics of Newton to the popular song New Britain , which is the tune we most know the song by today.
Where can one watch a video of the Whitney Houston song 'Amazing Grace' online?
Whitney Houstons rendition of 'Amazing Grace ' is very popular. This video can be seen on YouTube and Godtube. It can also be downloaded for free at djclip.
Is the song Amazing Grace in the public domain?
The song itself is in the public domain, but certain settings,arrangements, performances, and recordings may have their ownprotection.
|
0.962394 |
Why the popular cyberpunk card game may be the best game I have ever played.
Wet snow, dark. A cold Wednesday night in Toronto's Chinatown. I'm walking down the street headed to a basement underneath a well-to-do bank, and I'm nervous. I have some whisky with me to take the edge off, and I duck into an alleyway to take a sip. I've never done this before.
I'm going to play a card game—with strangers, in public. It's called Android: Netrunner, and it may be the best game I have ever played.
Netrunner is a game about hacking. Part of it takes place in what is, essentially, a version of William Gibson's endless plane of cyberspace: a representation of data more akin to virtual reality than what we know today as the internet. At the same time, the materiality of the world is present and accounted for, and encapsulates the best Cyberpunk themes. It has a touch of noir that permeates films like Blade Runner while directly addressing the politics of labour that linger like a spectre when we talk about artificial life—android or otherwise.
It is also an asymmetrical, turn-based game you play with a partner. One person takes on the role of a corporation—the massive construction conglomerate Weyland, perhaps, or the media empire NBN. The other is a runner, a hacker, like the tinkerer Kate McCaffrey, or the journalist Valencia Estevez.
The corporation attempts to advance the game by scoring agendas, which represent varying degrees of underhanded plans. These agendas are protected by other cards called ICE, (Intrusion Countermeasure Electronics, another Gibson reference). The different types of ICE are by far the most interesting thing about the game. They can be simple barriers that restrict access, tricky code gates that waste your time with riddles, or sentries that send electronic feedback straight into your runner's brain.
The runner, meanwhile, must break through this ICE and steal agendas from the corp.
The game plays out by building a tableau: the corporation constructs servers and installs ICE. The runner builds their rig and acquires resources while making periodic runs to gain access to the corp's servers, where agendas are hidden. So begins the dance between megacorporation and individuals that attempt to subvert them.
An important thing to know about Netrunner is that it isn't just a card game in a box: it's what is called a living card game. Unlike collectable card games like Magic: The Gathering or Pokemon Trading Card Game, Netrunner releases cards on a regular schedule that have no "collectability". Each pack has the same cards, which puts everyone on a level playing field. There is no secondary economy, where people buy and trade cards for obscene amounts of money.
But for me Netrunner is more than just its clever business model or its mechanics. It is both an intricate competitive game and a critical account of our world—a game with a flavour, politics, and a community of play that is distinct.
How come "a game with such diversity within its lore doesn't see it reflected in its player base"?
Netrunner, for example, has never had to deal with power creep. In other words, cards from the beginning of the game are just as useful today as when they were released. There is always a possibility that one card could throw off the balance of the game, but more often than not, the designers' careful implementation of new cards has instead broadened play. Rather than encouraging only one or two playstyles, new cards have allowed for dozens—even if some still win more than others.
At the same time the issue of gender and race representation in the player community remains a problem. The game itself far surpasses just about every Hollywood film and video game when it comes to diversity in its card art—but in the Netrunner community, it's mostly white guys who play.
A good sign is that some regions and cities are organizing 'Ladies Nights', providing safe spaces for women to play in public and build confidence with competitive play. But as Kim Nguyen recently wondered, how come "a game with such diversity within its lore doesn't see it reflected in its player base"?
In the basement around the corner from where I'm sipping whiskey in the snow is a tabletop gaming store. It has a bunch of tables, and lets anybody use them to play games. It's free and ad hoc and you usually have to coordinate with people through Facebook to see if anybody will be there to play the same game as you.
I did not know about this, so I went in blind.
I find some people playing Netrunner, but I'm the odd person out, so I wait until they finish and ask if anybody wants to play against me. I play a few games, lose most of them and go home. It was a an anxiety-inducing experience; I had been playing games online against strangers since I was a teenager, yet I had never gone to a physical space.
But a little more than a year later, I won my first tournament. I was hooked.
On a sleepy Sunday at a local game shop's monthly competition in Downtown Toronto, I went in with decks I had been practicing with for months. The day started well—two wins in my first round—and only got better. At end end of four rounds (each with two games, both players taking turns at corporation and runner) I had only lost one game. I was 7:1. I played well and picked up a few lucky mishaps in my favour too. It felt good.
Now, I feel ready for what's coming next: the Netrunner World Championships in Roseville, a sleepy suburb near Minneapolis-St. Paul, Minnesota.
It's not that I expect to win or even place in the top 16 players, in a field of more than 200. I want to be able to play my best, of course—but at the same time take stock of a growing community. I'm excited because five days of celebration await, and I'll be spending most of it playing a game that I think matters. It's the opportunity to run into people whose podcasts I've been listening to for more than a year. And there's an excitement that comes with being surrounded by hundreds of people who share the same passion as you.
I'll let you know how I do.
This is the first in a three-part series about the 2015 Netrunner World Championships. Read part two and part three.
|
0.94165 |
For other people named Frank Morgan, see Frank Morgan (disambiguation).
Francis Phillip Wuppermann (June 1, 1890 – September 18, 1949), known professionally as Frank Morgan, was an American character actor on radio, stage and film. He was best known for his appearances in films starting in the silent era in 1916, and then numerous sound films throughout the 1930s and 1940s, mostly as a contract player at Metro-Goldwyn-Mayer, with his most celebrated performance playing the title role in The Wizard of Oz (1939). He was also briefly billed early in his career as Frank Wupperman and Francis Morgan.
Morgan was born in New York City, to Josephine Wright (née Hancox) and George Diogracia Wuppermann. He was the youngest of 11 children, and had five brothers and five sisters. The elder Mr. Wuppermann was born in Venezuela, but was brought up in Hamburg, Germany and was of German and Spanish ancestry. His mother was born in the United States, of English ancestry. His brother, Ralph Morgan, was also an actor of stage and screen. The family earned their wealth distributing Angostura bitters, allowing Wuppermann to attend Cornell University, and joining Phi Kappa Psi Fraternity and the Glee Club.
Morgan starred with John Barrymore in Raffles, the Amateur Cracksman (1917), an independent film produced in and about New York City. His career expanded when talkies began, his most stereotypical role being that of a befuddled but good hearted middle-aged man. By the mid-1930s, Metro-Goldwyn-Mayer had been so impressed by Morgan that they signed him to a lifetime contract. Morgan's best remembered film performances, are in The Wizard of Oz (1939): he played the Wizard and five other roles: the carnival huckster "Professor Marvel", the gatekeeper at the Emerald City, the coachman of the carriage drawn by "The Horse of a Different Color", the Emerald City guard (who initially refuses to let Dorothy and her friends in to see the Wizard), and the Wizard's scary face projection. Morgan was cast in the role on September 22, 1938. W. C. Fields was originally chosen for the role of the Wizard, but the studio ran out of patience after protracted haggling over his fee. An actor with a wide range, Morgan was equally effective playing comical, befuddled men such as Jesse Kiffmeyer in Saratoga (1937) and Mr. Ferris in Casanova Brown (1944), as he was with more serious, troubled characters like Hugo Matuschek in The Shop Around the Corner (1940), Professor Roth in The Mortal Storm (1940) and Willie Grogan in The Human Comedy (1943). MGM's comedy film The Great Morgan (1946), was written with the story centering on the latter.
In 1939 Morgan played alongside Shirley Temple as Professor Appleby in Dimples. In the 1940s, Morgan co-starred with Fanny Brice in one version (of several different series) of the radio program Maxwell House Coffee Time, aka The Frank Morgan-Fanny Brice Show. During the first half of the show Morgan would tell increasingly outlandish tall tales about his life adventures, much to the dismay of his fellow cast members. After the Morgan segment there was a song, followed by Brice as 'Baby Snooks' for the last half of the show. When Brice left to star in her own program in 1944, Morgan continued solo for a year with The Frank Morgan Show. In 1947, Morgan starred as the title character in the radio series The Fabulous Dr. Tweedy. He also recorded a number of children's records, including the popular Gossamer Wump, released in 1949 by Capitol Records. Like most popular character actors of the studio era, Morgan was sought out for numerous supporting roles. He played Barney Wile in The Stratton Story (1949), which follows a baseball player (James Stewart), who makes a comeback after having his leg amputated due to a hunting accident. His final film, Key to the City (1950), was released posthumously.
Morgan married Alma Muller (1895–1949) in 1914; they had one son, George (1916-2003). Their marriage ended with his death in 1949. He was widely known to have alcoholism, according to several who worked with him, including Margaret Hamilton and Aljean Harmetz. Morgan sometimes carried a black briefcase to work fully equipped with a small mini-bar. Morgan's niece Claudia Morgan (née Wuppermann) was a stage and film actress, most notable for playing the role of Vera Claythorne in the first Broadway production of Agatha Christie's And Then There Were None. Morgan was also a brother of playwright Carlos Wuppermann (1887-1919, stage/pen names Carlyle Morgan and Carlos Wupperman), who was killed in the Rhineland in 1919 while on duty there with the Army of Occupation. Wuppermann had only one play produced on Broadway, The Triumph of X which opened at the Comedy Theater in New York City on August 24, 1921, but ran for only 30 performances. The production starred Morgan, and also featured Helen Menken as the female lead. Also in the production for his first Broadway outing was Robert Keith, father of actor Brian Keith and one-time husband of Theater Guild actress Peg Entwistle.
Morgan died of a heart attack on September 18, 1949, while filming Annie Get Your Gun. He was replaced by Louis Calhern for the film. His death came before the 1956 premiere televised broadcast on CBS of The Wizard of Oz, which made him the only major cast member from the film who did not live to see the film's revived popularity and become an annual American television institution. Morgan is buried in Green-Wood Cemetery in Brooklyn. His tombstone carries his real name, Wuppermann, as well as his stage name.
Morgan was nominated for two Academy Awards, one for Best Actor in The Affairs of Cellini (1934) and one for Best Supporting Actor in Tortilla Flat (1942). He has two stars dedicated to him on the Hollywood Walk of Fame in Hollywood, California: one for his films at 1708 Vine Street and one for his work in radio at 6700 Hollywood Boulevard. Both were dedicated on February 8, 1960.
1939 Broadway Serenade Cornelius Collier, Jr.
^ Obituary Variety, September 21, 1949, page 63.
^ The National cyclopaedia of American biography: being the history of the ... - James Terry White - Google Books. Books.google.ca. Retrieved September 18, 2012.
^ Playbills to Photoplays - New England Vintage Film Inc Society, New England Vintage Film Society, Inc. - Google Books. Books.google.ca. Retrieved September 18, 2012.
^ Grand Catalogue of the Phi Kappa Psi Fraternity - Twelfth Edition, p.377: Bernard C. Harris Publishing Company, 1985.
^ Slon, Michael (1998-01-01). Songs from the Hill: A History of the Cornell University Glee Club. Cornell University Glee Club. ISBN 9780962010316.
^ Dunning, John (1998). On the Air: The Encyclopedia of Old-Time Radio (Revised ed.). New York, NY: Oxford University Press. pp. 259–260. ISBN 978-0-19-507678-3.
^ "Frank Morgan at Hollywood's Irish Mafia". Archived from the original on 5 August 2009. Retrieved 18 September 2009.
^ Theater Review by Alexander Woollcot New York Times, August 25, 1921.
^ "Internet Broadway Database". Archived from the original on 2012-07-25.
^ "Desert Sun 20 September 1949 — California Digital Newspaper Collection". cdnc.ucr.edu.
^ a b Doug Fuhrmann, "Pop Culture History: Wizard of Oz televised (1950s), The Daily Journal.com April 6, 2009 Archived August 24, 2014, at Archive.today. Accessed 24 August, 2014.
Wikimedia Commons has media related to Frank Morgan.
|
0.999962 |
“Utopia” è una delle nostre varietà più potenti. Perciò a meno che non siate degli esperti, cominciate andandoci piano. 5 grammi faranno certamente sentire la loro ultraterrena presenza. Prendersi l'intera confezione da 15 grammi spedirà in orbita anche il più navigato. Se non vi sentite sicuri, provate con il nostro calcolatore di dosaggio.
La psilocybe Utopia sarà capace di regalarti un biglietto per il paese delle meraviglie: Utopia, chissà?! Con il giusto dosaggio ci si può aspettare una nuova realtà, completamente diversa da quella in cui siamo abituati a vivere. I normali schemi vengono scombussolati, le forme diventano fluide, il tempo viene perso, poi accelerato e ancora rallentato, si ha un concetto spirituale più profondo ed illuminante, il tutto accompagnato da esplosioni di risa incontrollata. Tuttavia gli effetti variano molto da persona a persona e da viaggio a viaggio, per cui come si svilupperà la tua esperienza psichedelica...noi non possiamo saperlo. Chissà, forse arriverete a sentire un profondo legame con la natura che vi circonda e vorrete fare amicizia con alcuni alberi. Tutto è possibile, nel paese delle meraviglie.
Un'odissea nello spazio a portata di mano con una semplice controllata al nostro pratico calcolatore di dosaggio.
I tartufi magici non sono droghe da party e non sono adatte per i minori. Non mettersi al volante sotto gli effetti dei tartufi! Iniziare sempre con un basso dosaggio e in un ambiente familiare, per testare così la reazione che si ha alla psilocibina. Mai assumere tartufi magici con alcool o altre droghe e neppure in casi di depressione o instabilità mentale. Le donne in gravidanza devono assolutamente desistere dallo sperimentare questo tipo di viaggio.
*Conservare in frigorifero per un periodo massimo di due mesi. Una volta aperta la confezione, consumare entro un paio di giorni.
*Salvo specifica richiesta, questi tartufi MushMagic vengono spediti senza la confezione originale.
Biologia dei tartufi: Perché i funghi sviluppano gli sclerozi?
COME AGISCONO I TARTUFI MAGICI?
I Tartufi Magici Possono Essere Consumati Tutti I Giorni?
so i would recomend those for a trip with your friends preferably outside, but not necessarily, i even took those inside. A great feeling and nice experience for me and my friends.
Hello, dear psyhodelic fans, I will give you my insight in experience of veteran psyhonaut as myself. If you are getting ready and feeling warm filling feeling of excitment and genuine happines, then you are starting something what will wider your mind and alter your body senses! Our trip started with getting out of crowded capital city into west of our country, only 120km/68miles and we find ourselfes sorrounded in forest and sea by end of old time fisher camp ground! While getting everything ready and putting all important things for safe and careless trip in order time flies without notice, all equipment is ready, beds in circle around awsome looking fireplace thought for looking in fire and driffting away. 20pm each of trio eats his desired dose of Mushmagic truffles Utopia, I go for 17.5g, (Props to Zamnesia, package contained 15.5g, but since my friends took normal doses I could get some extra. First feeling of trip is fuzzines and mindfullnes, toughts are rushing past with greate speeds and everything feels awsome, even simpliest of tools, things of modern men and even dog barking with excitment of running after stick and barking with neighbour dogs, ( started to feel highnes and mild visual haluciations, comunication with dog felt awsome) Dog was very positive trip sitter and friend with sense of importance. All tree of us went for spiritual walk with dog, walked around 10km/6miles, ran almost half of it, dog just wanted to rush further, Health app with counting steps and distance of run was our only guidance of how much we have walked and how time passed, no real feeling of time, speed of it changes depending on intensity, importance, hype of comunication with friends. ( Take good friends with you, you will feel close and new ideas will cross all your mind, remember to write, picture beautiful views, record amazing sounds. Speaking about sound everything sound just insane, like your ears have never been opened, just godlike senses (that is around 2.5h in trip after initial kick in.) After that run and alot of movement feeling of empty stomach starts too annoy, but we ofcourse were ready before and got amazing wipecream-bannana-chocolate-biscuite cake, just euphoria for toung. Warmnes from fireplace and finally full stomach was so relaxing after our long 2h walk, that we cought ourselfes in infinite verbal and spiritual comunication, after a while like 5h in we started to feel late night, even see rising sun so it was sure good call for deep sleep. For summary, Zamnesia stuff was very good quality and got delivered in 4 full business days, perfect because if I will plan to trip in some weekend only thing I need to do is order in end of week so by Thursday-Friday everything is ready for use. You will ask why only 4 stars! My answer is simple, description of these Utopia truffles says that full pack of them will take even most experienced psyhonauts into orbit, but for me there was a lot more wanting of feeling stronger and intenser. Don’t forget that I still am very experienced in psyhodelics and this feeling ought differ from mine, consume with caution and be ready to feel great, new feelings and open your mid for brand new patherns of ideas. PEACE, have an good one, thanks for reading and I hope this explanation will be of help for new era of mind openess! P.S. Don’t eat before triping, like 5his best in my oppinion, 3h just feels a bit short for complete emptiness. Weed is only other mind/body altering substance which I would suggest, if smoking before consuming of those nutty/salty truffles you want so badly, then nausea will be less stronger or even not there at all + smoking in different stages of trip will fulfill truffle trip even further, so Have fun & Good luck!
La noche de las croquetas.
Fuimos a dar un paseo por el campo y a la media hora empecé a notar como si el mundo fuera muy pequeño. Al llegar a una explanada, nos subió a todos de golpe. Alucinaciones visuales potentes. Colores maravillosos, visión aumentada, zoom optico en los ojos. Sensación potente de euforia. Sensación de hermandad y paz. A momentos se sentía como estar en el paraíso, recordaba mucho a la sensación de placer intenso de las Tampanensis. Se sentía una flojera intensa en todo el cuerpo, como de quedarse sin fuerza en pies y brazos. Embelesados con la belleza de la puesta de sol en el campo de trigo y el agua fluyendo por el rio. Clásicos patrones psicodélicos con los ojos cerrados y abiertos, todo se doblaba por momentos como si tiraras una piedrecita a la gigantesca charca de la realidad, provocando una casi imperceptible pero sobrecogedora ondulación del universo. Al llegar a casa tuvimos la necesidad impresiona de hacer y comer croquetas... y así fué. Me resulta muy dificil valorar con una nota las diferentes trufas, porque todas las experiencias son increibles y diferentes, pero vamos a ser generosos: 5 estrellas como 5 sirios.
Decent trip but definitely not too powerful. took the whole bag in silent darkness and wrote down what the shrooms told me. good for beginners.
Good stuff always in good condition!
How do you store them correctly?
All our Magic Truffles are fresh and vacuum packed in quantities of 15 grams. They are usually just eaten as they are, but you can make tea with them as well. The truffles can be stored 2 - 3 months (when vacuum packed) in a cool and dark place (e.g. refrigerator). Do not freeze! Freezing the product will damage the produce. Once opened, the produce can only be kept for a few more days. You can consume them fresh, but you can also dry them to store them for longer. Dried they can be kept for at least one year. Please note though that, the longer you store them, the less potent they will become. To dry the truffles you need to find a dry place and lay them out on kitchen towels and make sure they're not touching each other. Depending on the surroundings, drying may take anywhere from between 3 to 7 days. Make sure to change the kitchen towels every other day. The best way to store dried truffles is in an airtight container in the dark. Dried Magic Truffles have 50%-70% less weight, so therefore the dosage should be halved.
How work the shipping? the truffles need to stay in a dark and COOL place! The truffles will not be damaged during shipment?
All our truffles are fresh and vacuum packed. They are indeed best stored in a dark and cool place, for example the refrigerator. Our truffles and parcels are professionally packed and prepared for transit within Europe. We regularly ship to hot countries such as Spain and Italy, without any damage to the product. Note though that the packaging may appear loose upon arrival. This is the result of CO2 that has been generated within the packet by the truffles after the packing process.
A quanti gradi devono stare per conservarsi al meglio?
All our Magic Truffles are fresh and vacuum packed in quantities of 15 grams. Unopened, they can be stored 3-4 months in a cool and dark place. A refrigerator is perfect, or anywhere about 2-4 degrees Celsius. Once the packaging has been opened, they can only be kept for a few more days.
Combien de temps est-il possible de les conserver sans en perdre de puissance?
Toutes nos truffes magiques sont fraîches et emballées sous vide par quantité de 15 grammes. Elles peuvent être conservées (emballées) 3-4 mois dans un endroit frais et á l'abri de la lumière. Lorsque l'emballage est ouvert, ils ne peuvent être conservés (frais et á l'abri de la lumière) pendant quelques jours de plus.
|
0.999999 |
• Leather Food. Moisturize-soften-preserve. "Helps to waterproof your leather"
• Reproofs and rejuvenates wax cotton (Barbour/Belstaff) jackets too!
Hello Martin, I have just ordered a big tub of your product and I must say after getting the first pot my jackets, boots and gloves have never looked better, they are very waterproof now as well. I have an older fabric jacket which leaked a bit on the right sleeve, so I treated the whole jacket with Duckswax and its perfect now, the jacket looks a lot better as well. I use it on lots of things even my Brief Case and the leather seat on my bike but make sure its well polished after application. I think its doing good to the wrinkles on the back of my hands, plus it smells good. Cant say enough on how good it is, wish I had found it years ago.
(update) I have now used this product for 2 years and won't beat about the bush.
Buy some and get more life from your leather.
I apologise for the v slow reply. I have to quote an overused expression, been busy. Of more note, I didn't want to give a short glib reply that understated my affection for your product.
Originally we were at the Chatsworth Country Fair and we were demonstrated a similar product to yours. Impressed as I was I didn't purchase and instead researched when home and found your product in comparison. With the joys of the net I discovered that your offer of 3 pots and free delivery almost matched the other by price vs volume and with other positive reviews, I choose yours.
So, to the product. My first small pot(100ml?) has lasted impressively well. My wife's shoes and boots, around twelve (probably more) pairs have been repolished, twice and my shoes also. Once you see the results you can't stop, next was a wax jacket. My wife claimed/bought this from a vintage store and required two hearty coats (left to dry in for about a week) to bring it back to its true glory.
Additionally the wax smells wonderful it certainly doesn't smell like your typical wax jacket anymore.
We have one pot left as the second pot has been claimed for a Christmas present for an aging biker.
3 months after initial application all items retain the same youthful shine and waterproof properties and look disturbingly similar to when they were first purchased.
In summary, I would easily recommended this product due to its ease of application, aroma, results and the fact that a little goes a massively long way.
Have to say I am impressed with Duckswax. I have a custom made bike leather from City of Leather that I bought four and a half years ago. It has been work on virtually every ride and been to every rally throughout this time and it has never been cleaned or protected once.
Bought myself a 500ml can of Duckswax at the Manchester Bike Show at Event City. Just given the jacket its first coat and it is looking awesome. Glad I invested in a big pot as I have a shed load of leather to protect.
This product enhances all my leathers from summer to wet cold winter to protect and look superb.
Thank you for a great product. Ive done my leathers and the it has lifted the surface dirt and made them look really good. Ive also done my gloves after a ride in the rain they had started to go hard when they dried. The product has softened them nicely.
Awesome stuff - does exactly what it says on the pot!! My motorcycle boots look brand new again, nice smell to them and water just runs off!! Very happy to continue buying this! Well done Martin for inventing such an excellent product.
I bought a 100ml pot and it has completely revived an old leather jacket to the point that one friend asked about the new jacket I bought to replace the tatty old one. I'll be doing another jacket, one trench coat, and probably the car seats. Really good stuff.
Bought 3 pots, one for me and two for friends... All v impressed... And it smells fab! Lovely people to deal with too!
Sorry Martin for the late reply, I saw an article in the MCN and was determined to purchase some for the brand new Triumph leather jacket I've just purchased.
So far I've done the jacket and my bike boots plus my work boots, plus the wife's and the car seats and the 5 seater corner sofa and it looks like I've hardly used any.
It's a great product and it will be the one I solely recommend to my friends and colleagues.
Last week I bought my wife a new pair of Dr Martin boots for work, black steel toe capped industrial soled boots. She was by her own admission stupidly excited but being DM's they were incredibly stiff and she now has some horrific blisters on both feet.
Anyway, in a flash of inspiration last night I took the laces out and gave them a treatment with Duckswax, left it to soak for a while then wiped it off and repeated. I've just given them their 4th treatment and they're starting to resemble Hush Puppies more than DM's. She won't be able to wear them for a few days yet until her blisters have properly healed but the leather is now so supple that I'll happily say she's nothing to worry about.
Certainly easier than driving over them in my car which according to the internet is the only way to soften up your new Dr Martin boots!
5 year old bike leathers and boots, two coats of Duckswax and a 700 mile ride, mostly in rain. For the first time in years, I stayed dry. I just wish I'd done my gloves too. This is the best product I've tried in 30 years riding. I'm a convert.
Very quick delivery and excellent personal service ! My new favourite waterproof treatment for my motorbike leather jacket. I bought the jacket from Amazon so it wasn't very expensive and when it was new it had some sort of thin protective coating but a few rides in the sun and it was in need of some renovating. I tried the top name liquid leather conditioner and was very disappointed. There was a time when that stuff worked wonders but you have to apply it every week and it has no waterproofing properties at all ! It just softens the leather which then acts like a sponge in the rain. DucksWax soaks in nicely and restores the original finish that had worn off in the sun, wind and rain, very happy to have discovered it ! Thanks Martin !
The stuff I have been looking for it is great.
Easy to apply, works well, smells great.
Excellent product. Thank you amazon for all these goods you bring to us!
Very good product does exactly what it says on the tub.
BRILLIANT WATER PROOFING WAX. WILL BE BUYING MORE OF THIS.
Best thing I've ever used on leather Using this as a waterproofer or just as a restorer it works magic on leather. Having used it on 2 pairs of motorcycle boots I can safely say it can stand up to the heaviest rain that Scotland could throw at it. Also used it to bring back an old leather jackets and it looks better than it did when I bought it. Very pleased. Cheers guys at Duckswax!
Your product (Ducks wax), is a wonderful way to rejuvenate my leather jacket andboots. Having scuffed my jacket from a minor case of falling from my motorcycle Ducks wax has made it like new and as for the boots, I no longer get wet feet after rubbing some wax into the seems.
I would highly recommend Ducks Wax to anyone looking to bring a leather item back to full health.
Ducks wax was used on my 5yr old RST leathers to waterproof them for my trip to the Isle of Man TT. I was unfortunate enough to be in a huge downpour getting off the ferry and guess what, I was bone dry, awesome product I would recommended to anyone, not to mention my leathers looked really shiny!!
An amazing product. Smells great and the amount you get goes a long way. Only used it on my motorcycle boots to re water proof and did an amazing job. Next will use it on the saddle bags and seat. Did a search online and through forums found out about duckswax for water proofing seat seams. Thanks again.
I am using Duckswax on my hiking and work boots as well as my motorcycle boots, easy to use, smells great and a nice finish to boot, no pun intended.
I bought duckswax after being wholly unimpressed with Belstaff's inability to recommend a suitable was for their leather jackets. I was slightly nervous about using the product and laboured over the application, with hindsight perhaps using too much, which delayed the drying out.
I left the jacket for almost 2 weeks to completely dry and then buffed to a shine. I've since used on a second leather Belstaff but applied less and it dried overnight. I left it for a couple of days thereafter, due only to availabletime, and it buffed easily. Both jackets have a nice sheen and water beads on the surface. Also used on leather boots although this provides a dull finish compared to the shine from polish. Boots are thoroughly waterproof though. Both jackets and boots are more supple following application.
I have a wax cotton motorbike jacket and this stuff is crazy good at keeping your armpits dry.
Great meeting you at Thruxton today. Hubby has already treated his bike boots and gloves and they look like new. Also gave my walking boots a treat of a clean and then the duckswax. So far so good plus it smells great.
Applied to my Cat boots twice now, and buffed up, but not to a high gloss, as some users seem to have done. There has been a slight darkening in colour overall (expected, from pics and other reviewers comments), but in spite of some recent very wet weather, have managed to miss the opportunity test any water resistance improvement! I'm sure it'll be fine, and the boots have a smart semi-matt brown-beige finish, as their supposed to.
been treated with any product.
Hi, We started using Duck Wax about 6 months ago, recommended to us by family member. It is a very good product we use it on our Motor Bike leathers and Boots, also on walking boots and I have used it on my leather furniture. Much better than anything else we have used.
"I put this on a pair of Haglofs Nubuck walking boots, goes on nicely, looks and smells good, you can even buff to a shine, and it performs really well. I also used it on the dogs Canadian Elk Leather collars, the protection lasted much longer than standard Bees Wax does. Previously I have gone with Timberland Wax which is good but expensive, this is even better, glad I've found it."
Firstly it smells lovely, more like a rich herby oily cream I would use on myself! Tempting though that was I used it on my leather Musto tall boots which were badly in need of some nourishment and beginning to crack and let in water. I wanted something exactly like this which I felt would really get into the leather, not some namby pamby expensive spray can of something. After very generously rubbing in all over, they are now much happier and I can stand in a big puddle and not get wet feet! I will make sure I give them the treatment twice a year from now on, so hopefully they will last me a few more years yet thanks to your DucksWax. I found you on an internet search and the description seemed to fit the bill, which it certainly does.
I was about to give up on my leaky leather boots & bin them. Tried Ducks wax & they no longer leak :-) these boots are well worn as I wear them when walking my dogs & when I go through lots of mud to feed my horses. They look like new after one treatment, would definitely recommend & will be buying more. Thank you for a product that actually works!
Hi, I received my pot of Duckswax today and I'm absolutely thrilled with it! I've tried a lot of products and nothing has compared to Duckswax. My leathers I wear when I ride my motorcycle looks like I've bought them yesterday! Will defiantly be using this product for a very long time. Thank you very much!
I purchased a pot at the Telford Classic Offroad Show on Saturday, Used it on my trials boot's on Sunday and couldn't believe how good this product is!! I've used many product's over the year's but non as good as this!! I showed my work mates today how good it is by pouring a cup of water over my freshly treated boot's!! Amazing stuff!! And i'll certainly be putting the word out!!
What a great item , the duck wax I applied only once and already it has made a pair of motorcycle boots waterproof they used make my feet wet now they are dry, thanks.
Amazing product for cleaning riding boots and saddles . My Ariat boots come up like new and are now waterproof. I Clean my tack with duck wax as so easy to apply and is not greasy.
Update - Amazing product, used this on my country boots today, walked miles over a cross county course today in boggy muddy fields, feet warm and dry at the end of the day. Also used to clean my horses tack after the cross county. Tack is lovely and soft and smells amazing.
Hi Martin. A quick text to say what a great product your DucksWax is ! Bought some from you yesterday at K Pk. I was the Devon chap with my pal Pete from Zummerzet. Did my boots, gloves, leathers and black leather jacket today with great results. Will tackle my old Belstaff tomorrow. Cheers.
I bought some at the Birmingham bike show from Martin. I was a sceptic, but I am a total convert. A great product from a great bloke. Well done Martin!
Bought a 100ml pot before Christmas to test. I run a bin cleaning company & my boots get basically jet washed all day every day! Nothing I have tried keeps my feet dry :(. Apart from Duck Wax, Brilliant stuff!! I have to apply it everyday as It's quite extreme conditions, but I haven't had wet feet once since I've been using it. & the bonus is it's much easier to apply than leather dubbing or polish :). Suffice to say I have just ordered a 500ml tub. Oh & it's great on my Bike leathers too (which is what it's meant for).
Using this as a waterproofer or just as a restorer it works magic on leather. Having used it on 2 pairs of motorcycle boots I can safely say it can stand up to the heaviest rain that Scotland could throw at it. Also used it to bring back an old leather jackets and it looks better than it did when I bought it. Very pleased. Cheers guys at Duckswax!
We ordered a small pot, a week ago. I really like the product it goes on very easily and makes the leather look great. Now ordered a large pot because we have several leather jackets and gear to treat before the spring and would like to have plenty on hand for future use.
Fab stuff. My leather sofas have never been better.
Got my Duckswax a couple of days ago, my boots look great and shed water. My jacket looks like new and water flies off it, my gloves are much the same. What a top product, worth the effort. Off to my dads to sort out his leathers too!
Have been using Duckswax for several months.....highly recommended.
I have used it on my riding and walking boots and anything else leather that I owned, to very good effect. Rain and water just beaded off, brilliant! I have re-proofed one of my lightweight horse rugs, but havent used the rug yet so cant comment on that.
(Update) Jacket now done having been really impressed with how much better my trousers and boots are. After I've done my gloves I'm going to need to order another pot!
I have used it on several pairs of shoes, it is easy to apply, and smells pleasant, more importantly leaves no polish on fingers! The shoes look good and buff up with a good shine, waterproof too.
I bought a 500ml jar. Its very easy to apply and not as sticky as leather food . It smells nice and i put some on a pair of dainese leather jeans that had been in a washing machine then left for about 6 months and were hard. One treatment of duckwax made them far more supple. It sinks in straight away and is very good. Hardly used any of the duckwax to treat two sets of leathers. Id say buy it.
I have been using DucksWax on my Gore Tex motorcycle boots and my already waterproof golf shoes (Footjoy), so it is difficult to say whether it waterproofs the items as they are already waterproof in the first instance. In addition my golf shoes are new so again it is difficult to say that DucksWax brings the shoes back to life.
When I bought DucksWax, I was actually looking for leather conditioner to help keep the leather supple and to prevent cracking but since the golf shoes were new, its not possible to say whether DucksWax has any effect or not. My motorcycle boots are about 3 years old and I had only used kiwi polish on them but now use DucksWax almost exclusively possibly once a month but I generally keep them in pretty good condition in any case, cleaning and polishing them regularly. Having said that water certainly beads on the surface of the leather after using DucksWax when before it didn't.
Hey Martin, this stuff is the dogs mate. Used on all my biking leathers,also used on my hand tooled leather seat,does what it says on the tin.
Bought the duckswax to use on leather motorbike jacket boots and gloves. What a great product! My jacket looks really good and the boots are still looking great after two weeks....granted we've not had much rain recently but I'll be using everything through the winter as usual so it will get a proper test in the coming months. Thanks again.
PS The 100ml tub has done two jackets, a pair of gloves and three pairs of boots and there's plenty left.
I found out about your Ducks Wax by doing my own research on the Internet: reading other reviews and recommendations. I guess I settled on your product after liking the reviews I saw, especially those written by Bikers, which was also my application. Also I liked that it seemed to be YOUR product, 100% natural & made in the UK & at the right price. I've found it easy to apply, and nice to use, but haven't seriously tested it's waterproof properties yet. I will no doubt get plenty of chance this Autumn/Winter.
So far so good! - Year round biker.
I have just ordered a big tub of your product and I must say after getting the first pot my jackets, boots and gloves have never looked better, they are very waterproof now as well.
I have an older fabric jacket which leaked a bit on the right sleeve, so I treated the whole jacket with Duckswax and its perfect now, the jacket looks a lot better as well.
I use it on lots of things even my Brief Case and the leather seat on my bike but make sure its well polished after application. I think its doing good to the wrinkles on the back of my hands, plus it smells good. Cant say enough on how good it is, wish I had found it years ago.
Hi Martin, Used the Duck's Wax on all my leather Motorcycle gear and boots and find it a very good product has softened up the leathers immensely, would recommend to others.
Gave my leather jacket and trousers a birthday, they came up like new well recommended!!
Hi Martin, I bought the DucksWax to use on my motorcycle leathers and boots, and so far I'm really impressed with it. So much so in fact that I now use it on my leather shoes and wax jackets as well. And yes you were right it does have a really nice smell.
Martin, Your product is excellent. Used on Daytona leather m/cycle boots, Knox gloves, Bering jacket. Most notably, it completely revived an Alpinestars race suit that got soaked en route Fulham to Spa Francochamps. All above black leather.
This stuff is the Dogs or Ducks knobblies! ... we have a lot of leather bike stuff, Touring jacket and Jeans, Road Jackets, Racing Suits, Boots and Gloves .... all get the Duckswax treatment and all stay nice and supple and pleasant to wear. Duckswax is easy to apply and unlike other products I have used, leaves no waxy residue. Everything gets treated before being stored over the winter months, which means no mould or stiff leathers come the spring.... I shall be ordering the giant 'Bucket' size very soon as I've just run out!
Excellent product, fast delivery. What more can u want.
"The product works beautifully, is easy to use and is very reasonable considering how many items you can do with one pot. I walked for over 8 hours in London in the rain on Saturday however, my boots and leather jacket remained dry with the droplets just resting on the surface!!"
After trying many products on the market over recent years I was a little dubious to say the least about trying Ducks Wax. Once it arrived in the post I immediately took a pair of steel toe capped work shoes and applied the wax and was instantly impressed. This spurred me on to apply it to my leather motorbike gear, once I had covered my boots, leather trousers and jacket I found I couldn't stop myself and continued to apply it to my motorbike seat & every pair of shoes I could find which included my wife's Hunter Style walking boots, my sons school shoes a pair of hiking boots and a wax jacket. After I had finished my shift at work the next day my shoes still looked like new. I am currently searching the house for more items to apply Ducks Wax to and will definitely be placing an order for more. On the whole I have to say this is a wonderful product which I would fully recommend to anyone.
Ps: my wife had now confiscated Ducks Wax off me as I am eyeing up the goldfish!!
"This product is unbelievable, if you Hunt, play Polo, or Beagle.. it really is a must, to preserve those leather boots!!!"
Used your ducks wax on my motor cycle trial Boots for the first time today, waterproofing worked great, feet stayed dry all day in awful conditions. What also impressed was the "as new" look after only a couple on minutes of application..
I put the duck wax on 3 pairs of boots, 2 of mine and 1 of my daughters. There has been no rain here since I applied it so the fields are quite dry at the moment but I put my feet under the hose in 1 pair and the water just ran off them! It was brilliant, for once I seem to have found a product that actually does what it's supposed to, waterproofs!!! I'm so glad that I found you on Facebook, I'm not even sure how I did, but thankfully I did. I will definitely be ordering some more when this pot runs out and also will recommend you of anyone is after a waterproofing product.
Got my duckswax and used it on my boots and my tool roll and seat on my kawasaki bobber and they know look brand new.Great product,recommended.
A word about using Duckswax on nubuck. The information on the pot label states that Duckswax can darken nubuck, and indeed it does. However, after several days the darkening diminishes - I treated a brand-new pair of Wrangler nubuck boots just before Christmas, and now they're almost back to their original look. They're a little darker, have the faintest hint of a shine, and the colour is subtly graduated (probably from being a little heavy-handed applying the wax at first). This gives them an attractive (in my opinion) slightly worn, slightly aged, look, with the 'lived in' patina that manufacturers try to achieve. Unless you really prefer the look of brand new nubuck, I wouldn't worry about it.
What a great product why didn't I know about this before no more wet feet or waiting for my mx boots to dry before I can go out on my bike again highly recommend this product to anyone that wears leather footwear!
It worked fine, made the boots waterproof again very pleased.
I bought some of this off ebay a couple of weeks ago as I had run out of our usual leather treatment. This was just as easy to apply on jackets and trousers and last weekends ride in pretty horrendous conditions was a good test for it. I was well impressed with the state of my jacket and jeans when we arrived home and we were still dry. I will be using this from now on as it is just as good as what we used before but we get double the quantity for the same price. Thanks Martin, keep (not) abusing them ducks.
Great stuff! Completely revived my old walking boots, and they've been terrific through the current Somerset weather. I'd recommend it to anybody.
I have just tried Duckwax and it really does work. I put it on motorcycle boots and trousers.
Tub arrived today. First impressions are great. Seems like the 100ml pot will go a long way! Smells really nice, softens the leather nice and leaves it looking new. Not greasy or shiny but brings back the depth of finish. I think it'll stop the flys sticking so bad and yet to test the water proofing! Cheers! Recommended.
Hi Martin, have received my three pots of duckswax & have already tried it. Brilliant on my motorcycle leathers & my partners various boots & shoes. Will definitely use your product again as it does what it says on the pot.
Used my tub of DucksWax today, smells lovely, easy to apply, I've used it on my motorcycle leathers and boots and they're looking nice n shiny. great products and very good service... highly recommended.
Hi Martin. Received the wax and tried it last night, Superb! Ended up looking for anything leather to clean, will recommend on the harley web site. Well done and thanks, hope you get the recognition the product deserves.
Bought some of this a couple of weeks ago very impressed. Only prob I wish the container had a larger opening to get the wax out easier.
"Martin, Received my first pot over the weekend and have used it on my leather jacket and gloves, really pleased and a little goes a long way. Had a ride out for breakfast Sunday and now a friend wants some which i will be ordering. Great product, well done."
What a treat for old leathers. I could hear a sigh of relief as I rubbed it into jacket, gloves and boots. All looking so much better and waterproof too. Good stuff!
Dear Martin, Thank you for the duckswax. We have re-waxed 2 motorbike jackets and a lot of handbags !!!!!! We are very pleased ,its a great product. Thank you.
|
0.967296 |
Not to be confused with Despereaux, the fictional mouse in The Tale of Despereaux.
Despero (/ˈdɛspəroʊ/) is a fictional supervillain that appears in comic books published by DC Comics. The character first appears in Justice League of America #1 (October 1960) and was created by Gardner Fox and Mike Sekowsky.
Debuting in the Silver Age of Comic Books, the character has appeared in both comic books and other DC Comics-related products such as animated television series and feature films, trading cards, and video games. He is an enemy of Martian Manhunter, Booster Gold, and the Justice League.
In 2010 IGN named Despero the 96th greatest comic book villain of all time.
Despero first appeared in Justice League of America #1 (Oct. 1960) and writer Mike Conroy noted "It was the first of several run-ins the would-be universe conqueror would have with the superteam."
Despero became a semi-regular villain and returned in Justice League of America #26 (March 1964), #133–134 (Aug.-Sept. 1976), and #177 –178 (April–May 1980). The character made cameo appearances in Justice League of America #247–250 (Feb.-May 1986) and then featured as the main villain in issues #251–254, dated June–Sept. 1986.
Despero returned in an extensive story arc in Justice League America #37–40 (April–July 1990) and Justice League Europe #30 – 34 (Sept. 1991-Jan. 1992). The character's body reappeared as the host for L-Ron in Justice League Task Force #0 (Oct. 1994), #13–33 (June 1994 – March 1996), and #37 (Aug. 1996) and Justice League International Vol. 2 #67–68 (Aug.-Sept. 1994). Despero reappeared in spirit form in Supergirl vol. 4, #17–18 (Jan.-Feb. 1998) and Young Justice #6 (March 1999).
Despero eventually reappeared whole in the graphic novel JLA/JSA: Virtue and Vice (Dec. 2002), and featured in the "Crisis of Conscience" storyline in JLA #115–119 (Sept.- Nov. 2005), Superman/Batman #33 (March 2007), and Trinity #4 (June 2008). Despero returned to a more human form in an alternate universe storyline in Booster Gold Vol. 2 #5 (Feb. 2008) and #7–10 (April–Aug. 2008).
The character returned in Justice League of America Vol. 2 #38 (Dec. 2009) and featured in R.E.B.E.L.S. Vol. 2 #12–13 (March–April 2010).
Despero first appears when in pursuit of two rebels from the planet Kalanor, which he rules as a tyrant. (Pre-Crisis it is an other-dimensional solar system). They are attempting to create a weapon to defeat him. The rebels make contact with the Justice League of America with JLA member Flash accepting Despero's challenge after he places the rest of the group in a hypnotic trance, but the Flash is defeated in a game similar to chess due to Despero cheating using his third eye's mental powers, and along with the rest of the JLA sent to different worlds. Despero found out about this by reading the mind of one of the rebels he had tracked down and teleported, though her father and Flash were protected by the dimensional traveller's 'blue glow'. However, the JLA are able to escape all the dangers on the worlds and return to Earth using a dimensional traveler one of Despero's henchmen possesses after the Flash defeats him. Despero has found the rebel and plans to use the energy-absorbing weapon they hoped to use to disable his weapons to conquer Earth, but Snapper Carr uses it to weaken the villain after pretending he has been hypnotized, though the 'blue glow' protected him. Despero is then imprisoned and Kalanor is freed.
The villain has his third eye surgically removed, making him lose his hypnotic powers. Eventually it grows back, he fakes his death in an explosion at a lab and in revenge ages half of the Justice League and banishes the remainder to three other worlds, where he has caused reptile, insect, and marine life to become intelligent, planning to conquer the worlds later. When Despero attempts to deceive Wonder Woman by disguising himself as an aged Superman, she overpowers the villain with her Lasso of Truth, realizing the energy should not have affected Superman, and forces him to undo his actions. Despero is thwarted again when the Justice League intervene in his intergalactic plans of conquest, save member the Martian Manhunter who is being forced to play in a life and death chess match.
Despero eventually returns with even greater abilities, and a new body (now physically enhanced by the "Flame of Py'tar", a remnant of the nuclear energy responsible for creating his race), and completely destroys the Justice League Satellite. After defeating the Justice League, Despero reshapes Gotham City to suit his purposes. Taunted by Batman, Despero is eventually distracted, allowing fellow member Vibe to extinguish the Flame of Py'tar. The villain's form is immediately dispelled and reality restores itself.
Despero eventually reforms, and targets the Justice League member Gypsy. After murdering Gypsy's parents, Despero is about to kill her when the Martian Manhunter intervenes. The villain quickly defeats the Manhunter, although fellow Justice League member Guy Gardner arrives and hurls Despero away. Despero attacks the League at their headquarters, and kills the comatose Steel (on life support for injuries sustained during a battle against the androids of Professor Ivo). When Despero is about to murder the Blue Beetle, the Martian Manhunter bestows upon him the gift of "Mayavanna": a sacred Martian rite that provides the subject with a reality in which they obtain their desires. Despero sees himself killing the entire League and destroying the world, and is immediately at peace. The villain then reverts into a fetus, and is eventually given to trader Manga Khan in exchange for his servant robot, L-Ron.
A re-aged Despero is angered by this defeat and escapes from Manga Khan, returning to Earth to battle the Justice League. Unknown to Despero, Khan hires the bounty hunter Lobo to recapture him. Despero engages the Justice League, Justice League Europe, and Lobo in Times Square, New York City, and keeps them all at bay. A desperate Green Lantern Kilowog and L-Ron use the slave collar Despero still wears to switch his mind with L-Ron's, with the diminutive robot's body being destroyed shortly afterwards. Now in Despero's body, L-Ron returns to Manga Khan.
L-Ron reappeared, still in Despero's body, and had a number of adventures with the Justice League Task Force and Justice League International. Despero returns in spirit form, and temporarily repossesses his old form until stopped by the heroine Supergirl. The villain makes a second attempt to return to a corporeal state, possessing the Martian Manhunter. The team Young Justice, however, use the Manhunter's fear of fire against him and team ally the Secret banishes Despero's spirit form.
Despero's spirit eventually returns with the aid of JSA villain Johnny Sorrow, and takes over the body of Lex Luthor, currently President of the United States. Together they release the Seven Deadly Sins which possess several members of the JLA and JSA, and neutralize the wizard Shazam. The remainder of the teams successfully drive the Sins from their comrades, and eventually defeat both Sorrow and Despero, who is driven from Luthor when exposed to Sorrow's lethal stare. The villain returns as the guiding force behind a new Secret Society of Super Villains, and allows them to remember they once learned the Justice League's identities. Although Despero takes mental control of several members of the League, he is eventually stopped by Green Lantern and imprisoned on the planet Oa.
Having allied himself with a race that destroys species unworthy of survival, Despero attempts to convince them to destroy Earth by using an alien substance known as the 'Blackrock' to influence Earth's alien superhumans-Martian Manhunter, Supergirl, Starfire, etc.-to turn against humanity by playing on their occasional feelings of isolation. However, his efforts are foiled when Batman exposes himself to the Blackrock while under attack by Superman, the sight of his friend's contamination helping Superman to recognise what is happening to him, allowing Superman to confront the aliens directly and convince them that Despero deceived them. Despero returned in his original human form when plucked from the timestream by Mister Mind, and is convinced to join a group called "The Time Stealers". The villains successfully create an alternate universe that differs significantly from the original. Hero Booster Gold and several allies (Rip Hunter and the Justice League International) eventually undo the change and restore the original universe.
Despero briefly allied with villains Morgaine Le Fey and Enigma and became god-like until stopped by the combined efforts of Superman, Batman, and Wonder Woman. Despero returns to attack the Justice League, but when teleported away by member Zatanna, is imprisoned on Oa once again.
At the request of human computer Vril Dox, Despero joins in the fight against the original Starro (a humanoid), that controls all other versions and is conquering the galaxy. Despero engages Starro in combat and, although easily destroyed, begins to regenerate into a superior form, which was always the villain's intent. Vril Dox uses Despero's still-living head as a weapon against Starro and its forces.
In September 2011, The New 52 rebooted DC's continuity. In this new timeline, Despero first appears when he arrives in the Watchtower wearing a Kryptonite ring where he subdues Atom and Firestorm. He attacks the rest of the Justice League until he ends up subdued by Martian Manhunter.
During the Forever Evil storyline, Despero appears as a member of the Secret Society of Super Villains at the time when the Crime Syndicate arrived from their Earth. When Stargirl and Martian Manhunter arrive in Denver, they are ambushed by Despero.
Despero is an alien from the planet Kalanor, and in addition to a genius intellect possesses a third eye on his forehead capable of mind control, illusions, telekinesis, and telepathy. Despero is also empowered by the "Flame of Py'tar", a mystical source of power that grants him massive superhuman strength, durability, speed, reflexes and the ability to alter his biomass (from human-sized to massive, even reintegrating himself molecule by molecule). However his power varies based on the psionic energy he wields; for example, through the complete flame of Py'tar he once had the ability to manipulate reality to a degree, creating monsters and demons out of an earthen city once. Otherwise without it, he has still repeatedly been shown to be more powerful than Kryptonians, Amazons, Hourman and even Captain Marvel.
In the comics, Despero is only shown for a brief period of time. He crashes into Earth, going through an office building which kills several people. Sinestro chases after him, exclaiming that he will not allow Despero to harm anyone. Despero responds in anger, telling him that ‘It was that damn corps of yours’ that brought him down. Sinestro uses his powers and places Despero's hands on his neck, feigning a struggle. Sinestro snaps Despero's neck using his yellow ring in front of Hal Jordan and Jon Stewart, saying he had no choice. Despero is not mentioned or seen again in the comics.
Despero appears in the Justice League episode "Hearts and Minds" voiced by Keith David. In this incarnation, Despero is a native of the harsh desert planet of Kalanor. Born with a third eye, he was an outcast. In his travels through the desert, he stumbled upon the Flame of Py'tar, which gave him the ability to control the minds of others and project powerful energy blasts that could overpower Green Lanterns. He built up an army of followers empowered by the Py'tar, defeated several members of the Green Lantern Corps, and threatened to spread his fanatical crusade across the galaxy. It is eventually discovered that the Flame of Py'tar is actually the dormant life-force of Kalanor. Martian Manhunter allows it to speak through his body, thereby exposing Despero as a fraud while releasing the Py'tar. The Py'tar then spread its power across Kalanor, seeding it with lush vegetation. Despero's followers traveling the universe are transformed into trees that fall to the nearby planets. While Despero himself is dragged underground never to be seen again, his last words are, "Oh Py'tar, now I see... paradise!".
Despero appears in the Batman: The Brave and the Bold episode "The Eyes of Despero!" voiced by Kevin Michael Richardson. This version has eyes on the palms of his hands in addition to the third eye on his head. He plans to overthrow and destroy the Green Lantern Corps by hypnotizing its members into becoming his army. When he succeeds in corrupting a large number of Lanterns, Hal Jordan apparently sacrifices them and himself. Despero alters his plan, corrupting Mogo so as to use his vast power to brainwash entire worlds in an instant. Batman, summoned by Hal's ring, as well as Green Lanterns Guy Gardner, Sinestro, and G'nort, band together to free Mogo and defeat Despero. Once Mogo is freed, he shoots a rock which knocks out Despero. In "Duel of the Double Crossers!", Batman makes the Outsiders fight Despero in Metropolis in a simulation.
Despero appears in the Young Justice: Invasion episode "Cornered". This version is a gladiator who arrives on Earth to prove himself as the greatest warrior in 93 Star Systems. He does not fly or talk and lets his majordomo L-Ron speak for him. Despero traps the Hall of Justice in a forcefield, puts Zatanna in a trance in order to stick to hand-to-hand combat, and attacks Captain Marvel and Superboy. When Captain Marvel is regressed back to Billy Batson, Despero puts him in a trance and defeats Superboy. When Despero attempts to take Superboy's head, Bumblebee stalls him, but ends up in a trance. In the nick of time, Mal Duncan appears in Guardian's costume and keeps Despero busy while Superboy and Miss Martian come up with a plan to stop him. Miss Martian awakens Zatanna and redirects Despero's powers against him, allowing Superboy to knock him out. Captain Atom later mentions that Despero is in the custody of the Reach. In "The Hunt", Despero was seen with Mongul and The Team in the Warworld's stasis cells.
An alien that recalls despair appears in the background of one of the DEO monitors in the pilot episode of the Supergirl series, likely referring to Despero.
Despero appears in Superman/Batman: Public Enemies. He is among the supervillains that attack Superman and Batman.
Despero makes an appearance in issue #01 of the comic book tie-in of Justice League Unlimited.
Despero has also appeared in the Justice League Task Force video game for the SNES and Sega Genesis consoles.
^ Conroy, Mike. 500 Comicbook Villains, Collins & Brown, 2004.
^ R.E.B.E.L.S #12 – 13 (March–April 2010).
^ "Superhero Shows: First Look at Static, Deathstroke, and Arsenal from Young Justice". Superheroshows.blogspot.com. 2012-07-16. Retrieved 2016-01-06.
|
0.946619 |
Islam is the stereotype of the unknowable "Other" in the West today. Yet the commonality between Islam and Christianity is greater than the difference. The legacy of Crusades fought long ago lends itself to more recent political interests and ambitions that obscure that commonality. There is, no doubt, an important theological difference between Islam and Christianity: the belief held by Christians of the divinity of Christ is not held by Muslims. Yet, Muslims revere Jesus (peace be upon him) as an outstanding Prophet and Messiah, and acknowledge the legitimacy of the Christian community as "People of the Book" (i.e., as recipients of an earlier revelation). Additionally, the Qur’an (which every Muslim believes to be the actual Word of God) states: "Nearest among [people] in love to the believers will you find those who say: ‘We are Christians.’ That, because among them are [people] devoted to learning and [people] who have renounced the world and they are not arrogant" (Qur’an 5:85). In the light of these facts the theological differences between these two great religions are insufficient grounds for the past violent hostility that has often occurred between the two groups or for future conflicts which some prognosticators appear to be fashioning as self-fulfilling prophecy.
For Christians who believe that their religion mandates a free society, there is a commonality between their understanding of Christianity and Qur’anic Islam that is of fundamental importance: the value of human liberty under a rule of law. This idea is unmistakable in the fundamental teachings of Islam. Further, there is circumstantial evidence that contact with Islam in the Middle Ages triggered the awareness among Western Christians of these inherent factors in their religion. This idea has been touched on in, for example, Rose Wilder Lane’s chapter on Islam in The Discovery of Freedom1 and my book, Signs in the Heavens.2 The practical subordination of the "divine right of kings" to a higher law in the West is commonly dated to the Magna Carta. Were not the nobles, persecuted by King John, impressed by what King Richard’s troops in the Holy Land saw in the example of Salahuddin (Saladin) who, following Islamic principles, subjected himself to the Islamic law?
For most of the period from the eighth to the fifteenth centuries, "world trade" and "Muslim economy" were almost synonymous. Muslims freely produced and circulated literature including pre-Islamic Greek, Persian, and Hindu works. Muslim creativity was manifested in scientific and technological breakthroughs that included the development of algebra, the invention of spherical trigonometry, the discovery of the circulation of the blood, and the development of the sugar-refining industry. The Muslims introduced pluralism to statecraft by treating peaceful non-Muslim groups as protected minorities. Their internal affairs were governed by their own laws to a degree unmatched even in modern secular states. While Christians under Muslim jurisdiction have been permitted wine for their sacraments, the U.S. Supreme Court has denied American Indians a constitutional right to peyote use in their religious ceremonies.
The Islamic view of nature and of free will carries within it the necessity of a liberal political doctrine. In Islamic metaphysics, this earth is the stage on which our own willingness to submit to Divine Will is tested. To test each human being, it is necessary that people have the freedom to choose between good and evil. This imperative is seen in the Qur’an’s repeated admonition to the Prophet Muhammad (peace be upon him) that his sole duty is to preach the clear message. He should neither force people to accept it nor grieve over their rejection of it: "Invite [all] to the Path of your Lord with wisdom and goodly exhortation; and his Path and your Lord knows best who is rightly-guided. And if you retaliate [in argument], retaliate no worse than they attack you. But if you show patience, that is indeed the best course for those who are patient. And do be patient, for your patience is but from God; nor grieve over them; and distress them; and distress yourself not because of their [rhetorical] schemes. Truly, God is with those who are conscious of Him [restraining themselves] and those who do good" (16:125-128).
The fountainhead of Islamic law, the Qur’an, directs obedience to the Prophet only "in any just matter" (e.g., 60:12) and warned him "nor art thou set over them to dispose of their affairs" (39:41): "So if they dispute with you, then say ‘I have submitted my face [whole self] to God and so have those who follow me.’ And say to the People of the Book and to those who are unlearned ‘Do you also submit yourselves?’ If they do, they are in right guidance, but if they turn back, your [only] duty is to convey the Message; And in God’s sight are all His servants" (3:20).
The Qur’an declares absolutely that "There is no compulsion in religion" (2:256). God is sufficient to bring down the consequences of people’s evil action upon them. "Then leave Me alone with such as reject this Message: by degrees shall We punish them from directions they perceive not" (68:44). "Leave Me alone, (to deal) with the (creature) whom I created (bare and) alone" (74:11).
For men to submit their wills to other men–whether those others are clerics or the "majority"–violates the fundamental premise of Islam. The word "Islam" is Arabic for "submission to God" alone. Then, obedience to the ruler is conditional on whether his commands are just. In his inaugural address as the first Caliph, Abu Bakr reflected an attitude in sharp contrast to that of political leaders before Islam: "Now it is beyond doubt that I have been elected your Amir, although I am not better than you. Help me, if I am right; set me right if I am in the wrong; truth is a trust; falsehood a treason…Obey me as long as I obey God and His Prophet; when I disobey God and His Prophet, then obey me not."
Because the Qur’an recognizes that man is at once rational, volitional, acquisitive, and ethical, it encourages free trade and economic progress. It prescribes moderation as the means of attaining success in this world and the next (see, e.g., verses 7:31-32, 18:46 and 17:29). It asserts that man can and should act to provide for existence on this material plane without sacrificing his moral sensibilities. Reasonable consumption is encouraged (2:168), while niggardliness (35:29), wastefulness (6:141) and extravagance (17:27) are condemned. The desire for a livelihood (4:5), for comfort (42:36), even for ornament and adornment (18:46) or protection from future uncertainty (4:9) in this world is never called evil. Private property is protected (2:188). The fulfillment of obligations is commanded (2, 177;5:1) and contract law detailed (e.g., 2:282-283). Fraud is prohibited (26:181) and clear standards of weights and measures called for (55:9).
Ironically, Ibn Khaldun’s elucidation of the economic principles that had made Islamic society economically successful came as that society was abandoning those principles. Political leaders, then as now prone to corruption, began interventions into the economy, gradually developing a loss of respect for private property and individual liberty. Muslim scholars, who until the thirteenth century had been largely independent of the government, were no longer permitted to engage in original thought (called ijtihad). The high-water mark was followed by the loss of Spain to the nascent West, whose reformers had picked up the Islamic concepts. These Western scholars were either reformers who saw justification for the new view of human freedom in original Christian doctrine from which the Church had strayed, or revolutionaries who imagined a conflict between religion and human freedom. As the West rose, the Muslim world declined to its present state. Freedom and morality are inseparable. Piety is an act of volition. One can only be good if one chooses to be good. In Islam, the order for a just (and therefore free) society is a religious requirement. Coercion is only for defense of rights: "To those against whom war is made, permission is given (to fight), because they are wronged;–and verily God is most powerful for their aid;–(They are) those who have been expelled from their homes in defiance of right–(for no cause) except that they say, ‘Our Lord is God.’ Did God not check one people by means of another, there would surely have been pulled down monasteries, churches, synagogues and mosques…" (22:39-40).
Rose Wilder Lane, The Discovery of Freedom (New York: Laissez-Faire, 1984).
Imad-ad-Dean Ahmad, Signs in the Heavens: A Muslim Astronomer’s Perspective on Religion and Science (Beltsville: Writers Inc., Intl., 1992).
Wali ad-Din Ibn Khaldun, Muqaddimah: An Introduction to History. Franz Rosenthal, trans. (Princeton: Princeton Univ. Press, 1968).
Ibid., v. II, p. 3.
Quoted by Haroon Khan Sherwani in Studies in Muslim Political Thought and Administration (Lahore: Ashraf, 1959).
Dr. Imad Ahmad is president of Imad-ad-Dean, Inc., a scientific research corporation, and author of Signs in the Heavens: A Moslem Astronomer’s Perspective on Religion and Science.
|
0.999975 |
Created in 2016, the Center for Sport Science is devoted to research, education, collaboration, policy development, and best practice guidelines that benefit the safety and wellness of lacrosse players, with a particular focus on youth players.
Coaches, help your players to be good teammates. Give them the one-minute speech about being responsible enough to speak up if they suspect a teammate might have a concussion. Good teammates look out for each other.
Automated External Defibrillators (AEDs) are portable and easy-to-use devices that deliver potentially life-saving defibrillation therapy quickly and effectively. Every team or program should consider the purchase of an AED, because quite simply, AEDs can save lives.
Proper preparation using sport-specific training techniques, combined with knowledge of the rules, are essential to improving performance and preventing injury in lacrosse.
Characterized by an impairment of the brain’s normal function and caused by violent shaking or jarring of the brain, concussions may cause alterations in cognitive function, vision, eye movement, facial movement, or speech. Contrary to popular belief, no helmet in any sport can prevent a concussion.
Having emergency plans in place and following basic risk management protocol provides a safe playing environment for players. We provide resources to ensure that you have the safest playing environment.
A healthy diet and good eating habits are essential for a young athlete's development and performance. Similarly, if the body isn't replenished with fluids and electrolytes, dehydration may occur. We provide basic nutrition guidelines and hydration information that athletes of all ages should keep in mind.
|
0.943358 |
Russian ballerina and dance educator Aleksandra Danilova (1903-1907) was one of the premier dancers of the 20th century, and a collaborator with such icons as George Balanchine, Sergey Diaghilev and Leonide Massine. This collection contains letters, biographical notes, photographs, and other miscellaneous material related to Danilova's personal and professional life.
Ballerina and dance educator Aleksandra Dionisyevna Danilova (1903-1907) was born in Petergof, Russia. In 1911, she began studying dance at the Russian Imperial Ballet School in Leningrad. There she met George Balanchine, with whom she would maintain a life-long friendship. In 1920, Danilova danced with the Maryinsky Ballet. She joined Balanchine's Soviet State Dancers for a tour of Western Europe in 1924. In December of that year, Sergey Diaghilev brought both her and Balanchine into his acclaimed Ballets Russes. She stayed with Diaghilev's troop until his death in 1929. Danilova continued to perform in prominent venues around Europe, and in 1933 made her American debut with Les Ballets Russes de Monte-Carlo. Choreographer Leonide Massine hired her as his prima ballerina from 1938 to 1952 and her fame grew in the United States and abroad. Danilova married twice, first to Giuseppe Massera from ca.1933 to 1935, and then to Kazimir Kokich from 1941 to1948. In 1946 she became an American citizen. Danilova toured the world with various dance company between 1952 and 1956, and visited the Caribbean Islands, England, Japan, the Philippines, South Africa, Spain, and the United States. After 1957, she struggled to find work, though in 1958 she had a acclaimed dance number with Tony Randall in the Broadway musical Oh, Captain! In 1964, Balanchine secured Danilova a faculty position at his School of American Ballet in New York City. She remained on the faculty there until retiring in 1989. During that time, she was involved with staging productions for the New York City Ballet, had a roll in the film The Turning Point (1977), and published her memoir Choura (the title is taken from her nickname) with the help of writer Holly Brubach. Danilova died in New York City on July 13, 1997.
The Aleksandra Danilova papers contain letters, biographical notes, photographs, and other miscellaneous material related to Danilova's personal and professional life.
The biographical documents consist of multiple timelines documenting important events and accomplishments in Danilova's life, which she created while working on her memoir. General documents include miscellaneous items, such as copies of programs for performances given in Manila, Philippines (1955); a travel document with details on Danilova's visit to Columbia (1954); a poem celebrating Danilova composed by a fan (1944); and an unpublished review of Danilova's debut as a choreographer (1958); among other items.
The clippings consist of Danilova mentions in newspaper fashion sections and obituaries for Danilova.
The bulk of the approximately 100 letters are items sent to Danilova between 1954 and 1979 from friends, colleagues, and fans. Topics discussed include Danilova's ballet performances, such as her final performance with the Ballet Russe de Monte Carlo (1957); her personal life, work, and travel; and memories of past performances with Diaghilev, Balanchine, and others. Senders include Karl Christopher Allen, Rupert Allen, Sergie J. Denham, Anton Dolin, Lincoln Kirstein, Mildred E. Neff, Tony Randall, Olga J. Rosenthal, Olga Spessivtzeva, and Paul Strauss. Several letters are addressed to "Choura" and "Butch," two nicknames for Danilova. Also present are four letters from Danilova to her friends William and Margaret Manning in the late 1980s. In these she discussed her health, working on her memoir, and the death of a mutual friend.
Images include 8 photographs depicting Danilova as a dancer and with friends on a trip visiting Diaghilev's grave in Italy, and a painting on paper of dancers in the moonlight inscribed "For Mme. Alexandra Danilova…J. Aseltine."
This collection is organized by document type. Correspondence is ordered chronologically with undated items at the end.
The incoming letters were kept by Danilova, and given to Holly Brubach. Brubach, who helped write Danilova's memoir, donated these materials to the New York Public Library. The outgoing letters and the photographs were donated by William Manning.
Donated by Holly Brubach (2005) and William Manning (2006).
Letters were ordered chronologically with undated items placed at the end.
Donor retains copyright of materials. Library policy on photocopying will apply. For permission to publish, contact the Curator, Jerome Robbins, Dance Division.
|
0.997581 |
Similarly to the classical AI planning, the Atari 2600 games supported in the Arcade Learning Environment all feature a fully observable (RAM) state and actions that have deterministic effect. At the same time, the problems in ALE are given only implicitly, via a simulator, a priori precluding exploiting most of the modern classical planning techniques. Despite that, Lipovetzky et al. recently showed how online planning for Atari-like problems can be effectively addressed using IW(i), a blind state-space search algorithm that employs a certain form of structural similarity-based pruning. We show that the effectiveness of the blind state-space search for Atari-like online planning can be pushed even further by focusing the search using both structural state similarity and the relative myopic value of the states. We also show that the planning effectiveness can be further improved by considering online planning for the Atari games as a multiarmed bandit style competition between the various actions available at the state planned for, and not purely as a classical planning style action sequence optimization problem.
|
0.953863 |
Caulfield, a residential area with a prominent metropolitan racecourse, is on Dandenong Road, 10 km from central Melbourne. In addition to the suburb of Caulfield, there are also the suburbs of Caulfield North, South and East. Until about 1990 Caulfield East also included the area bounded by Waverley, Belgrave and Dandenong Roads, but that is now part of Malvern East. The origin of the name is uncertain, although John Caulfield, a builder who arrived in Melbourne in 1837, has been suggested as a source. The name Caulfield was in use on maps around 1857, generally in the vicinity of the present racecourse.
The 1870s saw considerable development of Caulfield. The Roads District became a shire on 17 April 1871, and the Caulfield railway station was built in 1879 as part of the South Yarra to Oakleigh to Gippsland line. Two years later the Caulfield to Mordialloc line was opened. While this construction activity was under way an entrepreneur William Ross proposed the building of another line across the south of Caulfield shire, from Oakleigh to Elsternwick. It was associated with the Ross sugar beet factory, using sugar beet grown in Gippsland. The line did not open until the late 1880s, but failed during the Depression in the following decade. Its route is traceable on present-day street maps along Oakleigh Road and a linear park which is a prolongation of the road.
On 4 May 1901, the district's urbanisation was acknowledged by the shire becoming a borough, which became a town on 26 September of that year. The Caulfield municipality acquired separate suburbs, and the Caulfield township was in the north. The northern municipal boundary followed Dandenong Road, and the railway station and racecourse were quite close to it.
Caulfield's northern boundary is just south of an escarpment more or less followed by Dandenong Road. North of the escarpment is hilly, more elevated land than the land on which the municipality is situated. There were several swamps in Caulfield, one being just west of the racecourse and the low-lying land was blamed for water-borne diseases. Sewering was a major concern in the 1890s, to replace cess pits, along with water reticulation. By 1914 reticulated water was available on most new housing estates. Several swampy or low-lying areas became parklands. Paddy's Swamp from which peat and sand were extracted in the 1860s and 1870s, became Caulfield Park, the main sports area in Caulfield near the racecourse. On 16 April 1913, the part of Caulfield municipality between Poath and Warrigal Roads was annexed to Oakleigh borough.
Caulfield's suburban boundaries are Kooyong, Glen Eira, Booran and Glen Huntly Roads. It has the Hawthorn Road and Glen Huntly Road tramlines (1913). The tram intersection is a grand union junction (1913) where tram cars can turn right or left from all four directions. The junction is heritage-listed.
The town hall at the corner of Hawthorn and Glen Eira Roads dates from 1885. The main hall and portico underwent a major remodelling in 1931 as part of a local employment scheme during the Great Depression, and an arts complex was added in 1988. The Caulfield Library opened there in 1993 and Glen Eira city council is headquartered there. Caulfield hospital is in Kooyong Road. The site was originally the Glen Eira mansion (c1880-1964) and was a World War I military hospital.
Caulfield East's suburban boundaries are Dandenong, Grange, Neerim, Booran and Kambrook Roads. Half the area is taken by Caulfield Racecourse, stables and Glen Huntly Park. The area is served by railway and the Malvern East tram (1913). Caulfield railway station (1914) is heritage-listed.
The Caulfield high school's building (1963) was at the south of the racecourse reserve and is now Glen Eira college. North of the railway is Monash University's Caulfield campus, formerly Caulfield technicial school.
Caulfield North's suburban boundaries are Orrong, Wattletree, Dandenong, Kambrook and Glen Eira Roads. The area is served by three tram lines: Hawthorn Road (1913), Balaclava Road (1913) and the Glenferrie Road line which goes along Dandenong Road (1911). The first two tram lines meet at the corner of Caulfield Park, the district's largest and best appointed public reserve. Balaclava Road is also the address of an imposing brick Catholic church (1924), Caulfield Junior College (originally Caulfield North central school) (1916) and the former Presbyterian church, now the Indonesian Uniting church. The church (1926) was built for a new, fast growing parish and the heritage-listed design blends Gothic and Art Nouveau. To the west there is the Liebler Yavneh College (1962) and Melbourne Grammar School's junior campus (1918).
Glen Eira Road is the address of Shelford Girls' School (1898) adjacent to St Mary's Anglican church (1871) and Jubilee Sunday school (1887), both heritage-listed. Caulfield North's grandest heritage building is the Labassa mansion (c1890) in Manor Grove. A short way north is another synagogue in Inkerman Road.
Caulfield South's suburban boundaries are a rectangle, Kooyong, Glen Huntly, Booran and North Roads. It is served by Hawthorn and Glenhuntly Roads tramlines (1925, 1913). It has the Caulfield primary school (1864) but Caulfield South school's opening year, 1928, typified the suburb's interwar and early postwar growth. Its south-west corner has Brighton cemetery (1849), well distant from built-up streets for probably its first 80 years.
Prince's Park is in the middle of Caulfield South. It has four ovals and is linked to a linear reserve which was the route of the Rosstown railway. Adjacent to the reserve there is Hillcrest Avenue, the address of A.V. Jennings first housing estate (1933). A short distance south there is a Jewish synagogue and kindergarten. Unlike the other Caulfield suburbs, Caulfield South has kept much of its detached house stock.
|
0.999803 |
The following article provides information regarding major differences between the kingdoms of archaebacteria and eubacteria.
True to the above quote, bacteria have existed on the Earth since life started to appear. As most of us are aware, bacteria are unicellular micro organisms having prokaryotic cellular structures. There is probably no place on Earth, where these microbes cannot be found. Bacteria belong to a vast assortment of shapes, which include spherical, spiral, and rod-like structures. Based on their ability to retain crystal violet stain, these organisms are broadly classified as gram positive and gram negative bacteria. Although all unicellular prokaryotic life forms are identified as bacteria, there exists a bifurcation in terms of biological domain, which separates these single-celled prokaryotes into two distinct life forms: Archaebacteria and Eubacteria.
Archaea have been observed to be equipped with metabolic pathways and several units of heredity, which are very close regarding the form and functions of eukaryotic organisms. Most significant among these aspects are the enzymes possessed and produced by archaea, which are involved in genetic translation and transcription.
Archaea are also known to be dependent upon ether lipids for all functions relating to polar lipids.
Besides these observations, another characteristic of archaebacteria is that they are capable of extracting energy and nutrition from more sources, other than eukaryotic life forms. These sources of energy and nourishment include sugars, metal ions, hydrogen, and sunlight. Some species can also convert gaseous carbon dioxide to solid carbon compounds, a process which is known as carbon fixation. Archaebacteria can reproduce asexually by the following three methods - budding, binary fission, or fragmentation. Examples of this type are Halobacteria and Methanocella.
This term is used to denote the generic unicellular prokaryotic bacteria. Almost all types reproduce by undergoing binary fission, though some species are also known to reproduce by budding. Eubacteria usually derive their nutrition through carbon fixation. There are many types of such bacteria, which helpful and harmful varieties. Eubacteria can derive their nutrition from three chief energy sources - sunlight, organic, and inorganic compounds.
The following table represents the basic structural and characteristic differences with relation to archaebacteria and eubacteria.
Although initially believed to have belonged to the same group of unicellular prokaryotes as Eubacteria, the Archaea kingdom was later discovered, and its constituent members were identified as a separate group of micro organisms altogether, based upon their rRNA gene sequences. After much research, it was finally concluded that both eubacteria and archaebacteria belong to two separate microbiological domains, which probably descended from a common unicellular ancestor.
|
0.996037 |
Test your design in different browsers. Make sure it looks good on the popular ones: Internet Explorer, Netscape Navigator/Mozilla, and Opera.
Test your design in different screen resolutions. If the design scrolls sideways on an 800x600 pixel resolution, fix it. 800x600 is still thought to be the most common resolution. Instead of setting table widths to pixels, set it to percentages. That way it will always fit, on any resolution.
Keep in mind that if your site uses an uncommon font that a user does not have installed, it will show up as their default font, usually Times New Roman. It is usually best to stick to common fonts, such as Arial, Verdana, Courier New, Comic Sans MS, etc. If you want funky titles or something, make them into an image and put that on the page.
Use web-safe (non-dithering) colors as often as possible. To test your colors, set your computer to 256 colors only. Another way is to press "print screen" on your keyboard and paste it into a graphics program, then decrease its colors to 256 (Standard/Web Safe).
Try to steer clear of new plug-ins that most people will not have installed; as more often than not if they've never heard of it before, they won't want to install it, so will leave your site. Macromedia's Shockwave & Flash plugins, however, have become very popular and are now found on most computers, so it is usually harmless to make use of them.
Limit the use of browser-specific functions, such as the infamous <blink> and <marquee> tags, CSS filters that only show up on IE6+, etc. If you simply must use them, ensure that this usage has no negative effect on the page in browsers that do not support these functions.
|
0.931937 |
For politics in Indonesia, see Politics of Indonesia.
On 30 September 1965, six of the military's most senior officers were killed in an action (generally labelled an "attempted coup") by the so-called 30 September Movement, a group from within the armed forces. Within a few hours, Major General Suharto mobilised forces under his command and took control of Jakarta. Anti-communists, initially following the army's lead, went on a violent purge of communists throughout the country, killing an estimated half million people and destroying the PKI, which was officially blamed for the crisis.
The Post-Suharto era in Indonesia began with the fall of Suharto in 1998 during which Indonesia has been in a period of transition, an era known in Indonesia as Reformasi (English: Reform). A more open and liberal political-social environment ensued following the resignation of authoritarian President Suharto, ending the three decades of the New Order period.
The DPR, which is the premier legislative institution, originally included 462 members elected through a mixed proportional/district representational system and thirty-eight appointed members of the armed forces (TNI) and police (POLRI). TNI/POLRI representation in the DPR and MPR ended in 2004. Societal group representation in the MPR was eliminated in 2004 through further constitutional change.
A general election in June 1999 produced the first freely elected national, provincial and regional parliaments in over forty years. In October 1999 the MPR elected a compromise candidate, Abdurrahman Wahid, as the country's fourth president, and Megawati Sukarnoputri — a daughter of Sukarno, the country's first president — as the vice-president. Megawati's PDI-P party had won the largest share of the vote (34%) in the general election, while Golkar, the dominant party during the Soeharto era, came in second (22%). Several other, mostly Islamic parties won shares large enough to be seated in the DPR. Further democratic elections took place in 2004 and 2009.
The president and vice-president are selected by vote of the citizens for five-year terms. Prior to 2004, they were chosen by People's Consultative Assembly. The last election was held 9 July 2014. The President of Indonesia is directly elected for a maximum of two five-year terms, and is the head of state, commander-in-chief of Indonesian armed forces and responsible for domestic governance and policy-making and foreign affairs. The president appoints a cabinet, members of which do not have to be elected members of the legislature.
^ Stop talk of KKN Archived 26 October 2014 at the Wayback Machine. The Jakarta Post (24 August 2001).
^ "Indonesia's military: Business as usual". 16 August 2002.
|
0.999966 |
The day had been long and loud, with the constant roar of the crowds outside the palace cheering for Elwell. Now it was dark and the man himself was inside, with the king he had deposed, carrying a heavy crystal decanter and a white powder in a bag.
"There's not enough powder here to kill you, but enough to make you forget who you are and how you will end," Elwell offered gently, as if with real compassion.
Haber, no longer King, stood at the window, looking out on his last sunset.
Elwell shrugged. "It's your choice. The end won't come any sooner or slower for it, but I wanted you to know that I do have some scrap of mercy left for you. We were once friends, were we not?"
"I was your friend," said Haber. "But I think you've been planning this for a very long time indeed. Revenge for boyhood slights? You have capitalized on every misstep, on the queen's death, on the rebellion I put down so bloodily, on the raised taxes after the drought. I trusted you."
"Trust is a fatal flaw in a king, sadly." Elwell put another log on the fire.
The room was plenty warm. Elwell was making it hot enough that Haber's robes would become acutely uncomfortable. But to take them off -- no. They were the last sign of kingship, the last thing he had left that Elwell had not taken, and he would die with them on.
"What is the price, then?" asked Haber, gesturing to the powder though he had no intention of taking it.
"Gifting your son with the magic," said Elwell. "Of course. What else do you have to offer?"
The magic that protected the kingdom from outside attack. It did not extend to civil war, nor to drought or plague. But so long as the king held the magic and the king held the throne, the kingdom of Triborn could not be taken by an invading army from another land.
In his youth, Haber had twice been tempted by his friendship with Elwell to tell him how the magic passed from one king to the next, but both times had stopped himself. It was perhaps his only wisdom in all those years. If Elwell knew, how different this scene would be.
"No," said Haber. "Giving the magic to him would be the same as giving it to you." Elwell would use Berick worse than he had used Haber.
|
0.984403 |
What could be a better family getaway than a trip to an amusement park? I know my husband and kids both love them, and I’m sure your loved ones do too.
As the world’s oldest theme park, Tivoli Gardens in Copenhagen captures that classic funfair experience better than anywhere else you can imagine, with classic rides, stalls, gardens and architecture all in a distinctive 1800s style.
While the rides are primarily intended to be nostalgic and fun, there are also rides which will match the expectations of all of the biggest thrill-seekers you know. Check out the terrifying Vertigo, which spins you upside down at a mind-bending 100km per hour, see how brave they’re feeling after that!
The most popular ride at Tivoli, and my personal favourite, is the old wooden rollercoaster.
Originally built in 1914, it is true to its original construction, and even has a brakeman on every train! Something only 6 other rollercoasters in the world can say.
There’s plenty more than just rides at Tivoli Gardens though, for a start the whole park is gorgeous and is an ideal place to spend a summer’s day if you’re taking a trip to Copenhagen. There’s also a concert hall which still attracts A-list acts to this day, so be sure to check the listings before you go! There are rock concerts every Friday during the summer too.
Although lots of people prefer to bring a picnic, there are loads of great places to eat in Tivoli Gardens too. If you’re feeling adventurous then check out Fru Nimb, which sells traditional Danish smørrebrød, or open-faced sandwiches. There are also other options, including a French bistro and Asian food.
If you’re not travelling in the summer, then be sure to visit in autumn for the Halloween theme, or from mid-November when Tivoli gets all Christmassy, housing the most magical Christmas market in Copenhagen.
|
0.918817 |
3 2 = 9 ⇒ 9 1/2 = 3.
and read as “nth root of y". Here, n√ is called a radical, n is called the index of the radical and y is called the radicand.
The number written as y 1/n is called its exponential form.
|
0.944074 |
(CNN) -- Bringing a growing health concern to Congress, scientists squared off Thursday over whether cell phones contribute to brain cancer.
Rep. Denis Kucinich of Ohio holds a model of a 5-year-old child's brain absorbing cell phone radiation.
Studies have indicated that long-term cell phone use may be associated with brain cancer, according to Dr. Ronald Herberman, director of the University of Pittsburgh Cancer Institute, and Dr. David Carpenter, director of Institute for Health and the Environment at University of Albany. They both testified in front of the House Subcommittee on Domestic Policy.
"I cannot tell this committee that cell phones are definitely dangerous. But, I certainly cannot tell you that they are safe," Herberman said.
Herberman and Carpenter cited the results from a study recently presented by Dr. Lennart Hardell of Örebro University in Sweden.
The results indicated that people who use cell phones have double the chance of developing malignant brain tumors and acoustic neuromas, which are tumors on the hearing nerve. The study also said people under age 20 were more than five times as likely to develop brain cancer.
But Dr. Robert Hoover, director or Epidemiology and Biostatistics Program at the National Cancer Institute, said the study has not yet appeared in a peer-reviewed journal, so has not come under sufficient scrutiny. The evidence for the connection between cell phones and cancer is inconclusive and more research is needed, he said.
"Larger studies are needed to sort out chance and bias," Hoover testified.
Interphone, a series of multinational studies on the risk of cancer from cell phones, has not found an increase in tumors associated with the first 10 years of mobile phone use, he said.
Some findings show an increased risk of tumors diagnosed on the side of the head that the cell phone is pressed against, but this pattern has not been seen consistently, Hoover said.
CTIA, the International Association for Wireless Telecommunications, declined the invitation to testify, Rep. Dennis Kucinich, a former Democratic presidential candidate from Ohio, who led the hearing, said.
Steve Largent, CEO of CTIA, issued a statement Wednesday saying the industry has supported scientific research on these issues and supports the Federal Communications Commision's safety guidelines.
"The available scientific evidence and expert reviews from leading global health organizations such as the American Cancer Society, National Cancer Institute, United States Food and Drug Administration and the World Health Organization reflect a consensus based on published scientific research showing that there is no reason for concern," Largent's statement said.
The overall evidence for the cancer-phone link has not been statistically significant at a 95 percent confidence level, a standard in science, Carpenter said. But he also noted that U.S.-funded research is very scarce.
"Are we at the same place we were with smoking and lung cancer 30 years ago?" he asked.
But the incidence of brain cancer in children has not increased significantly from the late 1980s to 2005, Hoover said.
The Federal Communications Commission limits cell phone radio frequency energy emissions, called the specific absorption rate (SAR), at 1.6 watts per kilogram, as measured over one gram of tissue.
The standard was developed in 1997 in consultation with Institute of Electrical and Electronics Engineers, a professional association open to everyone, including manufacturers and health specialists.
But the SAR standard reflects a biological response to cell phone radio frequency energy heating tissue, Kucinich said.
Many experiments show that radio frequency energy does cause "biological effects" without heating tissue, although not all of those effects are harmful, Carpenter said. Hoover agreed that there could be such effects related to cancer risk, but they have not been properly vetted in a laboratory.
The FCC itself does not have the expertise to evaluate whether this standard is appropriate protection for possible heath risks, Julius Knapp, director of the FCC's Office of Engineering and Technology, testified.
The hearing took place just a week after the Cleveland Clinic reported a study showing that keeping a cell phone on talk mode in a pocket can decrease sperm quality.
Herberman had issued a warning to physicians, scientists, and staff at the University of Pittsburgh in July advising them to limit cell phone use because of the possible risk of cancer. The Israeli Health Ministry endorsed this recommendation within a week, he said.
Ellen Marks of Lafayette, California, whose husband found out he had a brain tumor on his right frontal lobe in May, attended the hearing.
The tumor is on the same side of his head where he held his cell phone, which he used about 30 hours per month. She believes the tumor is the result of cell phone use.
"I often threatened to throw it in the garbage, and how I wish I had," she said. "This horror could have been avoided with a simple warning."
|
0.999933 |
Enter the Heritage Homes section.
The Aura business was originally formed as Aura Conservation Ltd in 2006. The business has since developed through completion of a number of numerous Listed Building projects to become a Principal Contractor carrying out complex conservation contracts in excess of £3 million, often managing several trades.
The management team, led by Craig Liddle, has a wealth of experience in all aspects of building conservation, general construction and health and safety to enable the company to deliver projects to the highest standards.
Experience is vital in this field and is something that only comes through time.
The past 12 years has seen Aura Conservation broaden skills and services leading to the creation of the ‘Aura’ brand.
Aura’s objective is to act primarily as Principal Contractor and through the specialist divisions provide a high quality personal service whilst maintaining a sympathetic approach to our architectural heritage.
By combining modern techniques and traditional skills, Aura carry out work to the highest standard on all conservation, restoration and new build projects.
Aura Conservation has over 100 years of combined specialist experience of carrying out restoration to Historic and Listed Buildings with a very experienced and committed team managing large and complex contracts. Aura Conservation are current members of the Stone Federation of Great Britain and are CHAS, SMAS and Constructionline accredited, plus all of their highly experienced employees hold Gold heritage CSCS cards and are assessed regularly to ensure their skills are kept up to date.
Aura Heritage Homes provides a complete service from a new build design concept through to building completion creating bespoke individual heritage homes, including advice on the best use of stone and traditional materials. Aura’s level of expertise in modern building techniques and traditional crafts, combined with bespoke designs will bring ideas to life.
Aura Monumental works within the ethos and practice of the conservation profession, who have maintained, conserved and restored a wide range of structures from traditional marble statuary and contemporary bronze public sculptures to ornamental iron gates and railings.
|
0.985289 |
Same procedure needs to do in the month of October.Record the growth of all 25 type Now you can speak with your land in its own language.
1. The land has to be tilled for 1 or 2 times before the seeds are broadcasted.
2. The above 20 seeds mentioned need to be mixed thoroughly and broadcasted by hand.
3. Just before the flowering of the crops(in 3 months time), the crops need to be dealt in two different ways.
4. If the land is slushy, the entire crops need to be tilled again so that the crops, as well as the soil, are mixed thoroughly and allowed to decompose.
5.If the land is not slushy, the entire crops need to be cut at the base and allowed to decompose in the soil.
6.Mostly these needs to be done before the main crop is grown or if you are not growing any main crop and just for soil improvement, it is better to do this during the rainy season.
1. Normally, most of the villages in India will have temples/mosques and along with them, they will have ponds, tanks etc which stores water and which is used for the temple as well as for the common use. Even if there are not any temples around, definitely there will be ponds, tanks or other sources of water storage. This is an excellent source of nutrient-rich soil as most of the water that arrives in this place carry with them the topsoil from many places and deposit them here.
2.With the permission from the temple or local body, collected not more than 15-30 cms of topsoil from the pond, tank etc. By doing this, you will allow the water storage structure to retain more water.
3.Spread the topsoil collected from the ponds, tanks etc in your farm to improve your soil.
4.The topsoil needs to be taken out only after sufficient amount of topsoil has been collected in the ponds, tanks etc.
1. The method mentioned above is also applicable for moving from Chemical Farming to Organic Farming.
2. The catch here is that this needs to be done at least for a continuous period of three years to notice the soil improvement.
3.Once you plan to move from Chemical Farming to Organic Farming, it is advisable to stop using Chemical Farming altogether from the first year.
4.The farmer may notice a dip in their production during the transition period. In case this is an issue, plan the transition in a phased manner like transitioning only 25% of the land every year.
|
0.983948 |
Kevin Anderson said that grand slam authorities had to mull changing their format following his draining semi-final encounter with John Isner which lasted over six hours.
Anderson defeated eight-time Wimbledon champion Roger Federer in a 13-11 fifth set in the quarterfinals Wednesday.
The match has surpassed the previous record of 4 hours, 44 minutes when the score was tied 9-9 in the deciding set.
It was also the second longest match at a Slam, beating the six hours and 33 minutes which Fabrice Santoro spent seeing off Arnaud Clement in the 2004 French Open.
"I don't really know what to say right now", said Anderson. "For us to be out there for that amount of time, I really hope we can address this", he said.
Anderson, who graduated from the University of IL, came through another marathon match to beat Roger Federer in the quarterfinals on Wednesday, winning their fifth set 13-11.
Isner has been playing the tennis of his life this year, claiming a first Masters title and now on the threshold of a first Slam final, and he edgedMilos Raonic, whose body looked to be letting him down once more in a career ravaged with injury.
Anderson finished with 49 aces and 118 winners; Isner had 53 aces and 129 winners.
The eighth seed will face either twice champion Rafael Nadal or three-times victor Novak Djokovic in Sunday's final.
An Isner ace fittingly concluded the 12 games in the first, before Anderson recovered from a mini-break down to take a one-set lead after an hour and three minutes.
That's how the U.S. Open settles things at 6-all in the fifth set of a men's singles match - or at 6-all in the third set for women - and has since 1970. Between that and the energy-sapper against Isner, it's hard to imagine how the No. 8 seed Anderson will have much left for Sunday's final, his second at a major.
The 12th-seeded Peschke and Melichar came from a break down in the final set to see off the sixth-seeded pairing of Dabrowski of Canada and Xu of China.
How do you sum up Kevin Anderson and John Isner's Wimbledon semi-final? The American roared and turned to his box as he took the third set on his third set point. Another set point came at 9-8, but this time on Isner's serve, who saved it with a 138 miles-per-hour serve.
But not only did Anderson jump back to his feet, the South African astonishingly switched his racket into his left hand and, gripping it half way up the handle, hit a forehand to get the ball back and take the point before he broke and then went on to win the match.
"I feel pretty awful", Isner said afterward.
In extra-time we showed we are still able with the fatigue to play our game". The country is small but all the players are pretty big. Now there is only one game left to make it forever.
Trump said Thursday he would ask Putin about the Kremlin's interference in the 2016 US election, but pointed out Putin will likely deny it.
Since then I've been following all the matches in Croatia to this day! And then it all went wrong. I will really do it! "The more experiences like this the more you I'm going to improve".
Peter Dinklage received a well deserved Emmy nomination Thursday morning, and in doing so he broke a huge Emmy record. Comedy series: Atlanta; Barry; Black-ish; Curb Your Enthusiasm; GLOW; The Marvelous Mrs.
After the visit , Trump will decamp to Finland for a one-on-one with Russian President Vladimir Putin on July 16. But, he added: "Whether he sees it, whether he reacts to it, we don't really care.
If Dinklage wins, he'll tie Aaron Paul ( Breaking Bad ) for the most wins in the Supporting Actor in a Drama Series category. Streaming service Netflix steals front-runner title from HBO with whopping 112 Emmy nominations.
England were comfortable winners over Sweden in their last game, winning 2-0 thanks to goals from Harry Maguire and Dele Alli . But that wouldn't deter the Duke of Cambridge from supporting his team as they take on Croatia in Wednesday's semi-final.
Insurance is normally based on risk, with premiums costing more for clients who are expected to require more healthcare services. President Donald Trump departs after speaking at a Make America Great Again rally in Great Falls, Montana, U.S., July 5, 2018.
Meanwhile, there are reports of clashes between supporters of Sharif and police in Lahore and several other cities. Earlier, it was reported that the Cabinet Division had allocated two helicopters to the NAB.
There is still work to be done and finding a way to create more chances from open play looks chief among Southgate's tasks. No-one believed before the World Cup that we could go this far, but we believed. "For me, we are not favourites".
The team was trapped in a cave system after heavy rains forced them deeper into the caves in search of higher ground. The entire Wild Boar youth soccer team and its coach have been safely removed from a cave in Thailand .
Del Potro too noted the change in conditions but appeared to relish the chance to slide around a bit more on the grass. The dogfight Nadal feared and Del Potro knew was his only route to the semi-finals had begun in earnest.
Chinaman bowler Kuldeep Yadav was dropped raising a few eyebrows as he had taken five wickets in the first game. With the score being below par, India's bowlers took it on their shoulders to make the most out of the match.
England , who had plundered a record 481 in Nottingham against Australia last month, struggled despite an opening stand of 73. England is on the back-foot after losing the T20I series to India but is in good form and can outclass Indian team in ODIs.
She wants a free-trade area based on the EU's rule book for goods. "But it is too bad what is going on", the president said . Tracy Black, director of the Confederation of British Industry in Scotland, said the "direction" of the paper was "welcome".
She said she will reach at Lahore airport on Friday at 6.15 p.m.by Ittehad Airways' flight EY-243. Sharif, who is in London with his ailing wife, has promised to return to Pakistan .
Some 77 percent of Britons have an unfavorable view of Trump, according to a poll by YouGov with 1,648 respondents. The trip coincides with a tumultuous week for May after two senior ministers resigned in protest. .
Who will be picked in the NFL Supplemental Draft?
|
0.877816 |
Achieving sustainable use of the planet will require a new paradigm regarding the relationship between human society and the environment and a concomitant paradigm on the responsibility of those now living to provide a quality life for their descendants for an indefinite period of time. Both industrial ecology and natural capitalism provide useful guidelines and case histories on how these two paradigm shifts might be achieved.
The seminal publication on natural capitalism is the book Natural Capitalism: Creating the Next Industrial Revolution, by Paul Hawken and Amory and Hunter Lovins (1). The authors believe that the traditional definition of capital as "accumulated wealth in the form of investments, factories, and equipment" is inadequate and that an economy should be based on four types of capital to function properly: a) human capital, in the form of labor, intelligence, culture, and organization; b) financial capital, consisting of cash, investments, and monetary instruments; c) manufactured capital, including infrastructure, machines, tools, and factories; and d) natural capital, consisting of resources, living systems, and ecosystem services.
Natural capitalism envisions the use of natural systems without abusing them, which is the essence of sustainable use of the planet. I do not use the term "sustainable development" because the word "development" implies growth to most people, and infinite growth on a finite planet is an oxymoron. Sustainable use of the planet requires that the relationship between human society and natural systems be sustainable and that the close relationship between ecosystem health and human health be recognized.
Tibbs (2) believes that the view of industrial systems and ecosystems as polar opposites is archaic and that a continuum must develop from the merging of the two systems. The focus in industrial ecology is narrower than in natural capitalism, but the essential idea of the coexistence of industrial and natural ecosystems would encourage the protection and accumulation of natural capital in areas where it is now in danger or unlikely to flourish.
McNeill (3) has shown that, in the course of the twentieth century, the human race has undertaken, without intending to do so, a giant and uncontrolled experiment on Earth. Unquestionably, environmental transformations have occurred during the twentieth century on a scale and at a rate that are unprecedented in human history. Ecotoxicologists are well aware that many of the effects of human society on natural systems are nonlinear and that a multiplicity of thresholds and break points exist, most of which only become apparent after they have been crossed. However, societal decisions are usually expressed through public and private institutions, most of which tend to resist change. As a caveat, institutional stability is essential to societal stability, but the rate of change must bear some resemblance to both the temporal and spatial rates of change on the planet. Moreover, the environmental literacy of the general public and of its representatives is totally inadequate to cope with the multidimensional problems that the economic/technologic system is creating. One of the major problems has been identified by Kahn (4) and Odum (5)--the tyranny of small decisions, which individually seem insignificant but, in the aggregate, can have tremendous consequences. Environmental literacy is an extremely important issue because it is not clear how far global societies (particularly those emphasizing individualism, such as the United States) will agree to modify their personal lifestyles and expectations to conform with the measures necessary to achieve sustainability, including preservation and accumulation of natural capital. In the United States and elsewhere in the world, the conservative opinion rejects any infringements on individual rights and various levels of political sovereignty. The question of individual rights and political sovereignty has been quite evident in the discussions of such issues as global warming at the Kyoto conference and other conferences. An extreme version of this view is that the custody and care of natural systems and a variety of other social issues can be best solved by the marketplace economy. Even when mainstream science accepts a hypothesis, as is the case for global warming, a tiny number of contrarians can stop change because both the media and some politicians believe that until there is unanimity on the subject, no action is justified. Ecotoxicologists can expect this view to continue.
Once an activity raises threats of harm to human health or the environment, precautionary measures should be taken, even if some cause-and-effect relationships are not fully established scientifically (6). Arguably, future trends in ecotoxicology will depend on the degree to which the precautionary principle is adopted globally when dealing with toxic substances; at present, there has been more rhetoric than implementation. Nevertheless, this principle is one of the major keys to sustainable use of the planet and is the only viable alternative to the idea of taking no action until some crucial environmental threshold has been crossed with severe consequences to the environment--and often to human health as well. The precautionary principle is also the key to the orderly and systematic development of the field of ecotoxicology. If ecotoxicology is limited primarily to addressing emergencies because the precautionary principle was not implemented, then the field will be expending more time on difficult remedial actions, possibly hindered by long delays in courts of law, rather than on preventative action, which is far less costly in the long run and provides more opportunity for developing fundamental concepts and principles. However, implementing the precautionary principle requires a multidimensional accelerated process of social learning, which must include learning what is needed to cope with the human health and environmental hazards that rapid technologic and economic developments are producing.
Both natural capitalism and industrial ecology involve temporal and spatial scales far greater than those possible in laboratory tests, even with the most elegant microcosms or mesocosms. They also operate in a multidimensional framework far more complex than even the most elaborate microcosms or mesocosms. The best test systems for natural capitalism are probably the industrial/ecologic hybrid systems advocated by Tibbs (2). This endorsement does not mean that the test systems presently used by ecotoxicologists are outmoded, but merely that the range of testing must move beyond the laboratory to the kinds of systems being discussed here. For the industrial/ ecologic hybrid systems to provide the most information possible, some carefully planned risks must be taken, and regulatory agencies must be sufficiently flexible to permit this to be done. Further, the information generated by the hybrid system must be available generally and widely shared. Because some ecologic damage is inevitable under these circumstances, ecotoxicologists must be well acquainted with the field of ecologic restoration. Accidents can also be valuable sources of ecotoxicologic information if they are openly and immediately studied by qualified personnel and if a variety of experimental remedial measures are permitted to expand the information base. This concept espouses a new relationship between industry and governmental agencies that is likely to be viewed with distrust by many citizens who may already be suspicious of both groups.
End points characterizing ecosystem health and integrity are not those routinely used by ecotoxicologists, and yet they are central to sustainable use of the planet, delivery of ecosystem services, and all of the components of natural capitalism and industrial ecology. In human health, the absence of symptoms of disease is no longer regarded as evidence of a healthy condition; other measurements involving fitness are now used to assess the health of the body. Robust health and fitness are closely linked whether the ecosystem or the human condition is being assessed. However, a substantial difference exists between the two. Humans have homeostasis: a series of feedback loops and regulating mechanisms keep human attributes, such as respiratory rate, blood pressure, and temperature, within relatively narrow limits. Ecosystems, on the other hand, exhibit homeorhesis--variability within limits, but without the finely tuned feedback loops that are characteristic of individual humans. Furthermore, when humans exceed limits by a marked degree, death or serious impairment of function usually result. These responses are also true for ecosystems, but they may reach a new equilibrium state and not return to the previous state, as humans are capable of doing, up to a point. Thresholds and break points are important for both humans and ecosystems, but they must be interpreted differently.
Unnoticed trends (an unnoticed trend, even if it produces no discontinuities or synergisms, may still do a surprising amount of damage before it is discovered).
As a consequence, there is a high probability, almost a certainty, that one or more crucial environmental thresholds will be crossed, even if the precautionary principle is implemented to a much greater degree than it is now. Therefore, ecotoxicologists should be prepared to take remedial ecologic restoration measures promptly when it is apparent that a threshold has been crossed, while simultaneously gathering evidence that will enable monitoring activities in the future to provide more effective early warning signals when this particular threshold is being approached. Ecosystems, like humans, have a certain amount of resilience or ability to recover from disequilibrium situations. The promptness of both the detection of the early warning signals and the remedial responses will reduce the severity of the consequences and the time of recovery as well.
Ecotoxicology has always been a multidimensional field. One of the major advances was combining the fields of environmental toxicology and environmental chemistry (8). A number of protocols have been recommended for determining at which level of detail the information base is adequate for both environmental toxicology and environmental chemistry in order to reduce uncertainty to a point where a persuasive decision can be made. The level of detail needed is an extremely important issue for ecotoxicologists, especially in the transitional stages of becoming effective participants in both natural capitalism and industrial ecology. With limited numbers and resources and a multitude of toxicants to deal with, it is necessary that the level of detail be appropriate for the particular problem being addressed, that is, ecotoxicologists must be prepared to reduce uncertainty to the point where a rational decision with minimal, but not zero, risk can be made. Ecotoxicologists must avoid the temptation to demonstrate their professional skills by measuring everything they know how to measure in the finest detail possible. If ecotoxicologists misjudge the level of measurement needed, then some problems, including some very crucial ones, will be neglected while a high level of detail is produced that may be unnecessary for the decision being made. Arriving at the appropriate level of detail is a particularly difficult decision in the United States, where attorneys abound in a very litigious society. Opposition attorneys make every attempt to characterize any level but the finest level of detail possible as professional incompetence, negligence, or laziness. Some law suits have required environmental scientists to make every possible measurement, even though the measurements were unnecessary in the professional judgment of the scientist for reasons described above.
For ecotoxicologists and other environmental professionals to function properly in the areas of natural capitalism and industrial ecology, it is probable that science courts will be developed where highly trained professionals can pass judgments on the adequacy and suitability of the evidence base and the rationale for decisions and judgments being made. These judgments are now handled inadequately in courts of law where the knowledge of legal matters is high, but there is little knowledge about matters of science and probabilistic determinations requiring scientific evidence. Almost every country has the equivalent of the United States National Academies of Science and Engineering and the National Research Council, which is the operating arm of these two academies in the United States. Such organizations could determine how science and engineering courts would be structured and staffed. They would also serve, for science and engineering, as the equivalent of the Supreme Court in the United States, which is the ultimate arbitrator of legal decisions. In short, they would be the ultimate final court of appeal for determining the adequacy of probabilistic evidence in science and engineering.
Such endeavors require much time and resources, and divert both scientists and engineers from what they regard as their primary responsibilities. However, if this new responsibility is not accepted, complex multidimensional scientific and engineering problems will be judged by those with inadequate literacy in these highly scientific and technical fields.
Given the urgency and the dimensions of these problems, it is not excessive to ask professional scientists and engineers to donate 10% of their professional time to help resolve these issues, which otherwise will not be resolved in ways satisfactory to them. There will undoubtedly be a widespread, deeply felt protest from people already working at what they judge to be the limits of their capacity. However, many scientific professionals are already spending huge amounts of time in courts of law, reaching solutions that are not satisfactory from a scientific or engineering point of view. Because natural capitalism and industrial ecology are social contracts, just as legislation is a social contract, there is no reason why courts of science and engineering should not be financially supported in the same fashion as courts of law. This financial support is going to be difficult to obtain in an era of increased distrust of science as well as an increased distrust of the ways in which courts of justice work. Respect for both areas will require a vastly increased level of literacy in the general public regarding these problems. An increased level of literacy is the responsibility not only of the educational system but of television, radio, newspapers, magazines, and other media. The Internet provides a splendid opportunity for increasing literacy and for disseminating information on case histories of the implementation of both natural capitalism and industrial ecology in various areas of the world. Ecotoxicologists must, therefore, become much more accustomed to functioning adequately in this multimedia situation and in communicating as effectively with the general public as they do with their colleagues who already have a higher literacy in ecotoxicology. These changes require major paradigm shifts for which ecotoxicologists and their colleagues in other branches of science and engineering are not fully prepared. Yet, if natural capitalism and industrial ecology are to function, science courts are inevitable, although the exact form that the courts of science and engineering will take and the precise role of ecotoxicologists in these courts will doubtless develop over time. However, the necessity for these paradigm shifts is abundantly clear, and the time to make a decision to do them is almost certain to occur early in the twenty-first century. Those who are prepared for these shifts will, as usual, benefit most when they occur.
If sustainable use of the planet is to be achieved, both natural capitalism and industrial ecology or some variants of these two interrelated concepts must be adopted. However glorious the achievements in these two areas, human society will not know for many generations whether sustainable use of the planet has been achieved or exactly how natural capitalism and industrial ecology should be implemented. In fact, I have developed a series of speculative scenarios about sustainable use of the planet (9), only one of which is pleasant to contemplate. Numerous books describe why human society ignores serious environmental problems (10). Basically, the problems are the result of enormous numbers of personal decisions that individually seem small, but collectively are creating seemingly intractable problems. Ironically, perceptions of how to improve the personal lives of humans mask the fact that their collective well-being requires coordination of efforts and a societal ethos or guiding system of values different from the present. Technology has so benefitted individual lives that humans now believe (or act as if they believe) that there is a technologic solution to every problem or that economics combined with technology will provide the solution. Seidel (10) believes that failure to react to planet-imperiling circumstances does not lie in not knowing what is wrong or not knowing what to do about it, but rather in the failure to take this knowledge seriously enough to act on it. This belief is supported by the well-documented recounting of the ecologic collapse of ancient civilizations (11,12). It will seem strange to ecotoxicologists that their efforts, data, and predictions will be used in a societal context that is embedded in an environmental ethos or set of guiding beliefs because many are uncomfortable with the mixture of science and values (13). Thus, it is a view of balancing the perceived needs of human society with the needs of the biosphere and recognizing that the biospheric life support system is essential to humanity--humankind must choose science to understand how to care for Earth and establish a set of guiding values to apply the knowledge. I have spent over a half century in the field now known as ecotoxicology, and I am delighted to have lived long enough to see, if only dimly, the probable future path for the field and the wonderful opportunities for those who will carry on its exciting research.
1. Hawken P, Lovins A, Lovins H. Natural Capitalism: Creating the Next Industrial Revolution. New York:Little, Brown, & Co., 1999.
2. Tibbs HBC. Industrial ecology: an environmental agenda for industry. Whole Earth Rev 77:4-19 (1992).
3. McNeill JR. Something New Under the Sun: An Environmental History of the Twentieth-Century World. New York:WW Norton and Co, 2000.
4. Kahn AE. The tyranny of small decisions: market failures, imperfections, and the limits of economics. Kylos 19:23-47 (1966).
5. Odum WE. Environmental degradation and the tyranny of small decisions. BioScience 32(9):728-729 (1982).
6. Raffensperger C, Tickner JA. Protecting Public Health and the Environment: Implementing the Precautionary Principle. Washington, DC:Island Press, 1999.
7. Bright C. Anticipating environmental "surprise." In: State of the World 2000 (Brown LR, Flavin C, French H, eds). New York:WW Norton and Co, 2000;22-38.
8. Cairns J Jr, Dickson KL, Maki AW, eds. Estimating the Hazard of Chemical Substances to Aquatic Life. STP657. Philadelphia, PA:American Society for Testing and Materials, 1978.
9. Cairns J Jr. Unpublished data.
10. Seidel P. Invisible Walls: Why We Ignore the Damage We Inflict on the Planet - and Ourselves. New York:Prometheus Books, 1998.
11. Diamond J. The ecological collapse of ancient civilization: the golden age that never was. Bull Am Acad Arts Sci XLVII(5):37-59 (1994).
12. Diamond J. Paradises lost. Discover 18(11):68-78 (1997).
13. Suzuki D, McConnell D. The Sacred Balance: Rediscovering Our Place in Nature. New York:Prometheus Books, 1998.
More articles by John Cairns, Jr.
|
0.999997 |
As I started to write my first column as President of the Gulf Coast Section of the SEPM, I began to think how I became involved with the Section and more importantly, with the Executive Council. Having attended a few recent GCSSEPM research conferences myself and referencing a number of technical papers from previous conferences, namely 1993, 1994 and 2004, I always knew of the Section and its associated research conference. In addition, the number of highly skilled technical individuals associated with the organization most certainly drew my attention. In terms of my involvement with the Executive Council, two very distinct things come to mind: sitting around a campfire in South Australia with colleagues participating in Flinders Ranges salt tectonics research (among the group was Past President Carl Fiduk) and the ever-apparent age gap in our industry. This age gap will be a theme throughout my note to you, but more on that in a few paragraphs. After a lengthy discussion about ways to involve the younger generation in local Houston-based geological societies, Carl posed the question to me of whether I would like to run for the position of Vice President for the GCSSEPM. Not knowing what I would get myself into, I most certainly agreed to the task because I thought this would be a good way to get involved and offer insight from the perspective of a younger generation. Roughly a year later, having ventured further into uncharted territory, I find myself President of the Section by default (see Carl's Fall 2014 President's Column for more details). I am honored to have such a position, to walk in the footsteps of so many esteemed Past Presidents and to have the encouragement of my fellow Executive Council members and the Board of Trustees to take on the task. I know I have big shoes to fill following Carl's departure and hope to continue all of the efforts that he, the Executive Council and the Board of Trustees have tirelessly worked toward during 2014.
A little bit about myself: I graduated in late 2013 from the Colorado School of Mines with a PhD in geology, having completed outcrop- and subsurface-based salt tectonics research in the Flinders Ranges of South Australia and the northern Gulf of Mexico. My research was focused on the evolution of steep diapirs to shallow salt sheets, including the integration of detailed geologic mapping of multiple outcropping salt diapirs and flanking growth strata, seismic interpretation and structural restorations. I apply many of these interests in my day-to-day technical work at ConocoPhillips, where I am a member of the Structure and Geomechanics team. I have been tasked with research and development in salt tectonics and with applied technical services to our business units operating in salt-dominated basins worldwide. In addition to this, I volunteer some of my free time to the GCSSEPM.
We have a lot going on here at the GCSSEPM for 2015. From the Executive Council side, I would like to welcome Sophie Warny as our new Vice President. Sophie is an associate professor of palynology at Lousiana State University, one of our core Gulf Coast universities. I would also like to welcome President Elect Dorene West, who is currently a staff geologist at Nexen Petrolum. Charlotte Jolley, who has served as Secretary for the last several years, will retire her duties at the end of 2015. Brandi Sellepack graciously offered to extend her duty as Treasurer until the end of 2016. After three years of dedicated service, we are sad to see Mike Blum depart from the Executive Council. A big thank you goes to Carl Fiduk, who served the Section for the past two years and continues to serve as Past President. I cannot thank you all enough for your hard work and dedication to the Section. Finally, I would like to thank the Section Trustees, who help guide the overall direction of the Section and offer advice to the Executive Council. All of your efforts keep us operating and we appreciate everyone's involvement!
As many of you know, almost 24 months will have lapsed before the 2015 Perkins-Rosen Research Conference, which is focused on "Petroleum Systems in 'Rift' Basins." The conference is slated for 13-16 December 2015 at the Omni Westside in Houston, TX. Technical Co-conveners James Coleman, Paul Post and David Brown have arranged an outstanding technical program that I am sure you will not want to miss. And, you read it correctly...the Executive Council voted during Autumn 2014 to rename the Bob F. Perkins Research Conference to the Perkins-Rosen Research Conference to honor our Executive Director Norm Rosen. Norm's tireless efforts over the years have helped mold what GCSSEPM is today. We will host an 'official' announcement during the conference, but we wanted to make everyone aware of this special news as soon as possible. We appreciate everything you have done for us and continue to do for us, Norm!
In similar fashion to the 2014 research conference, for the 2015 conference, we will continue our focus on students by offering a student poster session and we hope to offer another student short course, both of which were very well received in the past. The short course, entitled "Structural and Stratigraphic Framework, Northern Gulf of Mexico," will be taught by Carl Fiduk (Past President), Bruce Hart (Past President and current Trustee), Ursula Hammes (Past President) and Mike Blum (Past President) focus on the Gulf of Mexico. Speaking of conferences, the GCAGS/GCSSEPM annual conference will be held in Houston, TX 19-22 September 2015. Several GCSSEPM officers and trustees have been involved in the technical organization and planning of the conference. We look forward to attending!
Lastly, we have a new initiative between the Houston Geological Society and the GCSSEPM. In an attempt to bridge the age gap shared by both societies, we have teamed up with the HGS to offer a well-recognized, leading scientist from the younger generation the opportunity to deliver a join HGS-GCSSEPM General Dinner Presentation. First up, Jacob Covault, who is a member of the Clastic Stratigraphy R&D Team at Chevron Energy Technology Company, will deliver a talk entitled "Predictive Organization of Deep-Water Lobes" on March 23. We look forward to hearing Jake's talk and hosting additional speakers during the latter part of 2015.
With that, I will sign off and say to everyone that we appreciate your membership and interest in the GCSSEPM. Active participation benefits the Section and its members! Please get involved where you can!
|
0.96078 |
"Red October" redirects here. For other uses, see Red October (disambiguation).
This article is about the Soviet Revolution of 1917. For other uses, see October Revolution (disambiguation).
The October Revolution (Russian: Октя́брьская револю́ция, tr. Oktjabrjskaja revoljucija; IPA: [ɐkˈtʲabrʲskəjə rʲɪvɐˈlʲutsɨjə]), officially known in the Soviet literature as the Great October Socialist Revolution (Russian: Вели́кая Октя́брьская социалисти́ческая револю́ция, tr. Velikaja Oktjabrjskaja socialističeskaja revoljucija), and commonly referred to as Red October, the October Uprising or the Bolshevik Revolution, was a seizure of state power instrumental in the larger Russian Revolution of 1917. It took place with an armed insurrection in Petrograd traditionally dated to 25 October 1917 (by the Julian or Old Style calendar, which corresponds to 7 November 1917 in the Gregorian or New Style calendar).
The revolution was led by the Bolsheviks, who used their influence in the Petrograd Soviet to organize the armed forces. Bolshevik Red Guards forces under the Military Revolutionary Committee began the takeover of government buildings on 24 October 1917. The following day, the Winter Palace (the seat of the Provisional government located in Petrograd, then capital of Russia), was captured.
The long-awaited Constituent Assembly elections were held on 12 November 1917. The Bolsheviks only won 175 seats in the 715 seat legislative body, coming in second behind the Socialist Revolutionary party, which won 370 seats. The Constituent Assembly was to first meet on 28 November 1917, but its convocation was delayed until 5 January 1918 by the Bolsheviks. On its first and only day in session, the body rejected Soviet decrees on peace and land, and was dissolved the next day by order of the Congress of Soviets.
At first, the event was referred to as the October coup (Октябрьский переворот) or the Uprising of 25th, as seen in contemporary documents (for example, in the first editions of Lenin's complete works). In Russian, however, "переворот" has a similar meaning to "revolution" and also means "upheaval" or "overturn", so "coup" is not necessarily the correct translation. With time, the term October Revolution (Октябрьская революция) came into use. It is also known as the "November Revolution" having occurred in November according to the Gregorian Calendar.
The Great October Socialist Revolution (Russian: Вели́кая Октя́брьская Социалисти́ческая Революция, Velikaya Oktyabr'skaya sotsialisticheskaya revolyutsiya) was the official name for the October Revolution in the Soviet Union after the 10th anniversary of the Revolution in 1927.
The February Revolution had toppled Tsar Nicolas II of Russia, and replaced his government with the Russian Provisional Government. However, the provisional government was weak and riven by internal dissension. It continued to wage World War I, which became increasingly unpopular. A nationwide crisis developed in Russia, affecting social, economic, and political relations. Disorder in industry and transport had intensified, and difficulties in obtaining provisions had increased. Gross industrial production in 1917 had decreased by over 36% from what it had been in 1914. In the autumn, as much as 50% of all enterprises were closed down in the Urals, the Donbas, and other industrial centers, leading to mass unemployment. At the same time, the cost of living increased sharply. Real wages fell about 50% from what they had been in 1913. Russia's national debt in October 1917 had risen to 50 billion rubles. Of this, debts to foreign governments constituted more than 11 billion rubles. The country faced the threat of financial bankruptcy.
In September and October 1917, there were mass strike actions by the Moscow and Petrograd workers, miners in Donbas, metalworkers in the Urals, oil workers in Baku, textile workers in the Central Industrial Region, and railroad workers on 44 railway lines. In these months alone, more than a million workers took part in strikes. Workers established control over production and distribution in many factories and plants in a social revolution.
By October 1917, there had been over 4,000 peasant uprisings against landowners. When the Provisional Government sent punitive detachments, it only enraged the peasants. The garrisons in Petrograd, Moscow, and other cities, the Northern and Western fronts, and the sailors of the Baltic Fleet in September declared through their elected representative body Tsentrobalt that they did not recognize the authority of the Provisional Government and would not carry out any of its commands.
In a diplomatic note of 1 May, the minister of foreign affairs, Pavel Milyukov, expressed the Provisional Government's desire to continue the war against the Central Powers "to a victorious conclusion", arousing broad indignation. On 1–4 May, about 100,000 workers and soldiers of Petrograd, and after them the workers and soldiers of other cities, led by the Bolsheviks, demonstrated under banners reading "Down with the war!" and "all power to the soviets!" The mass demonstrations resulted in a crisis for the Provisional Government. 1 July saw more demonstrations, as about 500,000 workers and soldiers in Petrograd demonstrated, again demanding "all power to the soviets", "down with the war", and "down with the ten capitalist ministers". The Provisional Government opened an offensive against the Central Powers on 1 July which soon collapsed. The news of the offensive and its collapse intensified the struggle of the workers and the soldiers. A new crisis in the Provisional Government began on 15 July.
Another problem for the government centered on General Lavr Kornilov, who had been Commander-in-Chief since 18 July. In response to a Bolshevik appeal, Moscow’s working class began a protest strike of 400,000 workers. They were supported by strikes and protest rallies by workers in Kiev, Kharkov, Nizhny Novgorod, Ekaterinburg, and other cities.
In what became known as the Kornilov affair, Kornilov directed an army under Aleksandr Krymov to march toward Petrograd to restore order to Russia, with Kerensky's agreement. Although the details remain sketchy, Kerensky appeared to become frightened by the possibility the army would stage a coup, and reversed the order. By contrast, historian Richard Pipes has argued that the episode was engineered by Kerensky. On 27 August, feeling betrayed by the government, Kornilov pushed on towards Petrograd. With few troops to spare on the front, Kerensky turned to the Petrograd Soviet for help. Bolsheviks, Mensheviks and Socialist Revolutionaries confronted the army and convinced them to stand down. The Bolsheviks' influence over railroad and telegraph workers also proved vital in stopping the movement of troops. Right-wingers felt betrayed, and the left wing was resurgent.
On 23 October [O.S. 10 October] 1917, the Bolsheviks' Central Committee voted 10–2 for a resolution saying that "an armed uprising is inevitable, and that the time for it is fully ripe".
The Bolsheviks created a revolutionary military committee within the Petrograd soviet, led by the soviet's president, Trotsky. The committee included armed workers, sailors and soldiers, and assured the support or neutrality of the capitol's garrison. The committee methodically planned to seize strategic locations through the city, almost without concealing their preparations: the Provisional Government's president Kerensky was himself aware of them, and some details, leaked by Kamenev and Zinoviev, were published in newspapers.
On 7 November [O.S. 25 October] 1917, Bolsheviks led their forces in the uprising in Petrograd (modern day Saint Petersburg), then capital of Russia, against the Kerensky Provisional Government. The event coincided with the arrival of a flotilla of pro-Bolshevik marines, primarily five destroyers and their crew, into the St. Petersburg harbor. At Kronstadt, sailors also announced their allegiance to the Bolshevik insurrection. In the early morning, the military-revolutionary committee planned the last of the locations to be assaulted or seized from its heavily guarded and picketed center in Smolny palace. The Red Guards systematically captured major government facilities, key communication, installations and vantage points with little opposition. The Petrograd Garrison and most of the city's military units joined the insurrection against the Provisional Government.
Kerensky and the provisional government were virtually helpless to offer significant resistance. Railways and rail stations had been controlled by Soviet workers and soldiers for days, making rail travel to and from Petrograd, for Provisional Government officials, impossible. The Provisional Government was also unable to locate any serviceable vehicles. On the morning of the insurrection, Kerensky desperately searched for a means of reaching military forces he hoped would be friendly to the Provisional government outside the city, and ultimately borrowed a Renault car from the American Embassy, which he drove from the Winter Palace alongside a Pierce Arrow. Kerensky was able to evade the pickets going up around the palace and drive to meet oncoming soldiers.
As Kerensky left Petrograd, Lenin penned a proclamation "To the Citizens of Russia" stating that the Provisional Government had been overthrown by the Military Revolutionary Committee. The proclamation was sent via telegram all throughout Russia, even as the pro-Soviet soldiers were seizing important control centers throughout the city. One of Lenin's intentions was to present members of the Soviet congress, who would assemble that afternoon, with a fait accompli and therefore forestall further debate on the wisdom or legitimacy of taking power.
The insurrection was mostly bloodless, with a final assault being launched against the Winter Palace, poorly defended by 3,000 cadets, officers, cossacks and female soldiers. The assault was delayed throughout the day, both because functioning artillery could not be found, and because the Bolsheviks feared violence when the insurrection had so far been peaceful. At 6:15 p.m., a large group of artillery cadets abandoned the palace, taking their artillery with them; at 8:00 p.m., 200 cossacks also left the palace and returned to their barracks. While the cabinet of the provisional government within the palace debated what action to take, the Bolsheviks issued an ultimatum to surrender. Workers and soldiers occupied the last of the telegraph stations, cutting off the cabinet's communications with loyal military forces outside the city. As the night progressed, crowds of insurgents surrounded the palace, and many infiltrated it. While soviet historians and officials tended to depict the event in heroic terms, the insurrection and even the seizure of the Winter Palace happened almost without resistance. At 9:45 p.m, the cruiser Aurora fired a blank shot from the harbor. By 2:00 a.m on 8 November [O.S. 26 October] 1917 Bolshevik forces entered the palace, and after sporadic gunfire throughout the building, the cabinet of the provisional government surrendered.
Later official accounts of the revolution from the Soviet Union would depict the events in October as being far more dramatic than they actually had been. (See firsthand account by British General Knox.) This was helped by the historical reenactment, entitled The Storming of the Winter Palace, which was staged in 1920. This reenactment, watched by 100,000 spectators, provided the model for official films made much later, which showed a huge storming of the Winter Palace and fierce fighting (See Sergei Eisenstein's October: Ten Days That Shook the World). In reality, the Bolshevik insurgents faced little opposition. The insurrection was timed and organized to hand state power to the Second All-Russian Congress of Soviets of Workers' and Soldiers' Deputies, which began on 25 October. After a single day of revolution, 18 people had been arrested and two killed.
Soviet government archives show that parties of Bolshevik operatives sent from the Smolny by Lenin took over all critical centers of power in Petrograd in the early hours of the first night without a shot being fired. This was completed so efficiently that the takeover resembled the changing of the guard. The capture of the Winter Palace was more dramatic, with the Red Guards storming it at 2:10 a.m. on 8 November [O.S. 26 October] 1917. The Cossacks deserted when the Red Guard approached, and the Cadets and the 140 volunteers of the Women's Battalion surrendered rather than resist the 40,000 strong army. The Aurora was commandeered to then fire blanks at the palace in a symbolic act of rejection of the government. The effectively unoccupied Winter Palace fell not because of acts of courage or a military barrage, but because the back door was left open, allowing the Red Guard to enter. A Red Guard named Adamovich remembered gasping as he burst into the palace, as he had never before seen such luxury and splendour. A small group broke in, got lost in the cavernous interior, and accidentally ran into the remnants of Kerensky's provisional government in the imperial family's breakfast room. The illiterate revolutionaries then compelled those arrested to write up their own arrest papers. The Provisional Government was arrested and imprisoned in Peter and Paul Fortress after the ministers resigned to fate and surrendered without a fight, and officially overthrown.
Some sources contend that as the leader of Tsentrobalt, Pavlo Dybenko played an enormous role in the revolt. It is said that the ten warships that entered the city with ten thousand Baltic fleet mariners was the force that actually took the power in Petrograd and put down the Provisional Government. The same mariners then dispersed by force the elected parliament of Russia, and used machine-gun fire against protesting demonstrators in Petrograd. About 100 demonstrators were killed, and several hundreds wounded. Dybenko in his memoirs mentioned this event as "several shots in the air". Later, during the first hours after the taking the Winter Palace, Dybenko personally entered the Ministry of Justice and destroyed there the documents about the financing of the Bolshevik party by Germany. These are disputed by various sources such as Louise Bryant, who claims that news outlets in the West at the time reported that the unfortunate loss of life occurred in Moscow, not Petrograd, and the number was much less than suggested above. As for the "several shots in the air", there is little evidence suggesting otherwise. The alleged action of Dybenko entering the Ministry of Justice to destroy documents as recalled by Savchenko can also be challenged. According to reports, Pavel Dybenko was in Helsingfors organizing the sailors' departures for Petrograd. In the book Radio October...On the "Krechet" in Helsingfors, radio operator Makarov hands a telegram to Pavel Dybenko with the report of the "Samson" commissar, Grigoriy Borisov: "To Tsentrobalt. Everything is calm in Petrograd. The power is in the hands of the revolutionary committee. You have to immediately get in touch with the front committee of the Northern Army in order to preserve unity of forces and stability."
The following day, 8 November [O.S. 26 October] 1917, the Congress elected a Council of People's Commissars (Sovnarkom) with Lenin as leader as the basis of a new Soviet Government, pending the convocation of a Constituent Assembly, and passed the Decree on Peace and the Decree on Land. This new government was also officially called "provisional" until the Assembly was dissolved. The Council of People's Commissars now began to arrest the leaders of opposition parties. Dozens of Constitutional Democratic Party (Kadet) leaders and members of the Constituent Assembly were imprisoned in The Peter and Paul Fortress. These were to be followed by the arrests of Socialist Revolutionary Party and Menshevik leaders.. Posters were pinned on walls and fences by the SRs describing the takeover as a "crime against the motherland and revolution". There was also strong anti-Bolshevik opposition within Petrograd.
On 9 November [O.S. 27 October] 1917, the Mensheviks seize power of Georgia and declare it an independent republic. The Don Cossacks also claim control of their own government. There is strong anti-Bolshevik opposition outside of Petrograd, with Bolshevik control of country still very weak. There are also reports that the Provisional Government has not conceded defeat and are meeting with the army at the Front.
On 10 November [O.S. 28 October] 1917, posters and newspapers start criticizing the actions of the Bolsheviks and refute their authority. The Executive Committee of Peasants Soviets "refutes with indignation all participation of the organised peasantry in this criminal violation of the will of the working class". Strong opposition to the Bolsheviks still continues from several important proletariat sources.
On 11 November [O.S. 29 October] 1917, opposition to the Bolsheviks develops into major counter-revolutionary action. Cossacks enter Tsarskoye Selo on outskirts of Petrograd with Kerensky riding on a white horse welcomed by church bells. Kerensky gave an ultimatum to the rifle garrison to lay down weapons, which was promptly refused. They were then fired upon by Kerensky’s Cossacks, which resulted in 8 deaths. This turned soldiers in Petrograd against Kerensky because he was just like the Tsarist regime. Kerensky’s failure to assume authority over troops described by John Reed as a ‘fatal blunder’ that signalled the final death of the government.
On 12 November [O.S. 30 October] 1917, the battle against the anti-Bolsheviks continues. The Red Guard fights against Cossacks at Tsarskoye Selo, with the Cossacks breaking rank and fleeing, leaving their artillery behind.
On 13 November [O.S. 31 October] 1917, the Bolsheviks gain control of Moscow after a week of bitter street-fighting. Artillery had been freely used with an estimated 700 casualties. However, there is still continued support for Kerensky in the provinces.
On 14 November [O.S. 1 November] 1917, there is an appeal to anti-Bolsheviks throughout Russia to join new government of the people, with the Bolsheviks gradually winning the support of the Russian people.
On 15 November [O.S. 2 November] 1917, there is only minor public anti-Bolshevik sentiment; for example, the newspaper Novaya Zhizn criticises the lack of manpower and organisation of the Bolsheviks to run a party, let alone a government. Lenin confidently claims that there is "not a shadow of hesitation in the masses of Petrograd, Moscow and the rest of Russia" towards Bolshevik rule.
On 20 December 1917 the Cheka was created by the decree of Vladimir Lenin. These were the beginnings of the Bolsheviks' consolidation of power over their political opponents. The Red Terror was started in September 1918. The Jacobin Terror was an example for the Soviet Bolsheviks. Leon Trotsky had compared Lenin to Maximilien Robespierre as early as 1904.
The Church's properties (including bank accounts) were seized.
Bolshevik-led attempts to seize power in other parts of the Russian Empire were largely successful in Russia proper — although the fighting in Moscow lasted for two weeks — but they were less successful in ethnically non-Russian parts of the Empire, which had been clamoring for independence since the February Revolution. For example, the Ukrainian Rada, which had declared autonomy on 23 June 1917, created the Ukrainian People's Republic on 20 November, which was supported by the Ukrainian Congress of Soviets. This led to an armed conflict with the Bolshevik government in Petrograd and, eventually, a Ukrainian declaration of independence from Russia on 25 January 1918. In Estonia, two rival governments emerged: the Estonian Provincial Assembly proclaimed itself the supreme legal authority of Estonia on 28 November 1917 and issued the Declaration of Independence on 24 February 1918, while an Estonian Bolshevik sympathizer, Jaan Anvelt, was recognized by Lenin's government as Estonia's leader on 8 December, although forces loyal to Anvelt controlled only the capital and a few other towns.
In an attempt to intervene in the civil war after the Bolsheviks' separate peace with the Central Powers, the Allied powers (United Kingdom, France, United States and Japan) occupied parts of the Soviet Union for over two years before finally withdrawing . The United States did not recognize the new Russian government until 1933. The European powers recognized the Soviet Union in the early 1920s and began to engage in business with it after the New Economic Policy (NEP) was implemented.
Soviet historians of the October Revolution interpreted the Revolution so as to establish the legitimacy of Marxist ideology, and also the Bolshevik regime. To establish the accuracy of Marxist ideology, Soviet historians generally described the Revolution as the product of class struggle. They maintained that the Revolution was the supreme event in a world history governed by historical laws. The Bolshevik Party is placed at the center of the Revolution, exposing the errors of both the moderate Provisional Government and the spurious "socialist" Mensheviks in the Petrograd Soviet. Guided by Vladimir Lenin's leadership and his firm grasp of scientific Marxist theory, the Party led the "logically predetermined" events of the October Revolution from beginning to end. The events were, according to these historians, logically predetermined because of the socio-economic development of Russia, where the monopoly industrial capitalism alienated the masses. In this view, the Bolshevik party took the leading role in organizing these alienated industrial workers, and thereby established the construction of the first socialist state.
During the Cold War, Western historiography of the October Revolution developed in direct response to the assertions of the Soviet view. The Soviet version of the October Revolution conditioned historical interpretations in the United States and the West. As a result, these Western historians exposed what they considered flaws in the Soviet view, thereby undermining the Bolsheviks' original legitimacy, as well as the precepts of Marxism.
These Western historians presented the revolution as the result of a chain of contingent accidents. Examples of these accidental and contingent factors that precipitated the Revolution include World War I's timing, chance, and the poor leadership of Tsar Nicholas II as well as liberal and moderate socialists. According to this historical interpretation, it was not popular support, but rather Bolshevik manipulation of the masses and the organization’s ruthlessness and superior structure which enabled it to survive. For these historians, the Bolsheviks’ defeat in the Constituent Assembly elections of November–December 1917 demonstrated popular opposition to the Bolsheviks’ coup, as did the scale and breadth of the Civil War.
These historians saw the organization of the Bolshevik party as proto-totalitarian. Their interpretation of the October Revolution as a violent coup organized by a proto-totalitarian party reinforced the idea that totalitarianism is an inherent part of Soviet history. For them, Stalinist totalitarianism developed as a natural progression from Leninism and the Bolshevik party’s tactics and organization.
The dissolution of the USSR affected historical interpretations of the October Revolution. Since 1991, increasing access to large amounts of Soviet archival materials made it possible to re‑examine the October Revolution. Though both Western and Russian historians now have access to many of these archives, the effect of the dissolution of the USSR can be seen most clearly in the work of historians in the former USSR. While the disintegration essentially helped solidify the Western and Revisionist views, post-USSR Russian historians largely repudiated the former Soviet historical interpretation of the Revolution. As Stephen Kotkin argues, 1991 prompted "a return to political history and the apparent resurrection of totalitarianism, the interpretive view that, in different ways…revisionists sought to bury". There has additionally been the revival among some historians of the "continuity thesis", the idea that there was an uncomplicated, natural evolution from the October Revolution’s organizational structure to Stalin’s Gulags.
7 November, the anniversary of the October Revolution, was the official national day of the Soviet Union from 1918 onward and still is a public holiday in Belarus, Kyrgyzstan, and the breakaway territory of Transnistria.
↑ Bunyan & Fisher 1934, p. 385.
↑ Richard Pipes (1990). The Russian Revolution. Knopf Doubleday. p. 407.
↑ Michael C. Hickey (2010). Competing Voices from the Russian Revolution: Fighting Words: Fighting Words. ABC-CLIO. p. 559.
↑ Beckett, 2007. p. 526.
↑ Service, 2005. p. 54.
1 2 Beckett, p. 528.
↑ Jonathan Schell, 2003. 'The Mass Minority in Action: France and Russia'. In The Unconquerable World. London: Penguin, pp. 167–185.
↑ "ВОЕННАЯ ЛИТЕРАТУРА --[ Мемуары ]-- Дыбенко П.Е. Из недр царского флота к Великому Октябрю".
↑ "ВОЕННАЯ ЛИТЕРАТУРА --[ Биографии ]-- Савченко В. А. Авантюристы гражданской войны".
1 2 3 Acton, Critical Companion, 7.
↑ Stephen E. Hanson (1997). Time and Revolution: Marxism and the Design of Soviet Institutions. U of North Carolina Press. p. 130.
↑ Kevin Murphy, "Can we write the history of the Russian Revolution?," http://www.isreview.org/issues/57/feat-russianrev.shtml (May 2011).
Radek, Karl (1995) [First published 1922 as "Wege der Russischen Revolution"]. "The Paths of the Russian Revolution". In Bukharin, Nikolai; Richardson, Al. In Defence of the Russian Revolution: A Selection of Bolshevik Writings, 1917–1923. London: Porcupine Press. pp. 35–75. ISBN 1899438017. OCLC 33294798.
|
0.999999 |
Reverse Discrimination is widely used to refer to the discriminatory effects that racial quotas and preferences have upon Caucasians, Northern European Americans, and other non-minorities in the United States.
Reverse Discrimination refers explicitly to laws and policies which deny certain opportunities, jobs, employment, contracts and educational admissions to "whites" in favor of other, government-defined "disadvantaged" racial groups. Sometimes these policies and laws are collectively, if historically inaccurately, referred to as "Affirmative Action".
The arguments in favor of racial preferences all boil down to this: Government-defined "historically disadvantaged groups" (such as blacks, Hispanics, Native Americans, and selected others) continue to suffer from the "lingering effects of prior discrimination" (e.g., slavery, Jim Crow laws, etc.) and thus need racially discriminatory policies which give them an advantage over so-called "historically advantaged" individuals and groups (such as white Americans of Northern European descent).
Of course, more racial discrimination in order to wipe out the effects of prior discrimination presents a Constitutional, moral, and logical conundrum: Racial discrimination is racial discrimination regardless of the "higher" purpose for which the discrimination may be endorsed.
According to most opinion surveys, most Americans strongly disapprove of using race or skin color as the basis for providing (or denying) any opportunity in the U.S.
Brief History: Racial preferences (reverse discrimination) in the U.S. began in earnest almost on the very day in 1964 that President Lyndon B. Johnson signed into law the Civil Rights Act of 1964 (CRA) in spite of the fact that the CRA was race-neutral and eschewed racial quotas!
The text of the original, unamended 1964 CRA was race neutral, it demanded non-discrimination, it supported integration, and it specifically prohibited the granting or denial of any opportunity based upon race, gender, or ethnicity.
But racial special interests in Congress and in the federal agencies almost immediately began violating the law by implementing concepts such as "racial underrepresentation", "proportional representation", and "disparate impact" which provided a thin, legalistic veneer by which discrimination could be practiced against the supposed beneficiaries of prior discrimination (whites), and in favor the the supposed victims of prior discrimination (primarily blacks, but later also including Hispanics, Native Americans, Asian Pacific Islanders, and women regardless of race).
But concepts such as "racially proportionate representation" have always begged the Constitutional question: Does the U.S. promise its citizens equal opportunity based upon effort and ability regardless of race or ethnicity, or does the U.S. promise various racial and ethnic groups proportional numbers of jobs, educational admissions, contract and other opportunities based upon the number of their racial / ethnic group in the general population?
Since enactment of the original, unamended Civil Rights Act of 1964, the U.S. has endured 40+ years of racial preferences and racial quotas in the form of preferences which strongly favor selected, non-white racial groups (referred to as "minorities") in the form of: preferential college admissions for selected racial groups, special school transfer policies favoring minorities, and contracting and employment preferences for minorities.
By definition, during the preceding 40+ years since passage of the Civil Rights Act of 1964, literally hundreds of thousands of innocent "white" citizens have been denied jobs, contracts, educational admissions and other benefits in favor of selected, non-white citizens who often have lower qualifications.
Why, after 40+ years, hasn't this policy of "reverse discrimination" solved the problems of racial minorities in the U.S.?
What is the difference between supposedly "good" racial discrimination and "bad" racial discrimination? Is there any difference at all? From a moral perspective, can there be any difference?
What possible Constitutionally or morally valid argument can be made in favor of using more racism to deny jobs, educational opportunities, contracting opportunities, and other opportunities to "whites" simply because of the color of their skin?
Thus, the term Reverse Discrimination has come to be accepted as shorthand for race and gender discrimination against whites, and especially against white males, for the alleged purpose of "remedying" the lingering effects of prior discrimination against persons of color and against women regardless of color.
NOTE: Adversity.Net doesn't especially care for the term Reverse Discrimination because there really is only one kind of discrimination, and that is old-fashioned racial and sexual discrimination. However, we grudgingly use this term since it is so widely understood to mean illegal discrimination against anyone who is not on the government's approved list of "historically disadvantaged".
Copyright 2002 Adversity.Net, Inc., an IRS 501(c)(3) tax-exempt educational organization. For problems or questions regarding this web contact [email protected] Last updated: August 02, 2006.
|
0.999992 |
What is wine exactly? Wine has been around the world for over 7000 years and is made from just 2 basic ingredients, yeast and grape juice. By far the majority of all wine is made from the juice of the grape, although some wines do use the skin, this mainly colour the wine( rose for example).
Yeast is the main ingredient needed for fermentation and yeast is what transforms the grapes into wine. Just as a point of interest, there are actually wild yeast spores just being carried all over the place by the wind. To make wine you just need an open container of grape juice, patience and time. The result however, wouldn't be very pleasant to taste.
There are a number of different strains of yeasts, numbering somewhere in 1000's and the types being used to make wine have been designed for this sole purpose. So yeast is actually a living organism that feeds off sugars in the grape juice in a process called fermentation.
When fermenting, yeast spores increase in numbers exponentially, this happens until the sugar content has been consumed. During this fermentation process, the sugars are converted into alcohol and carbon dioxide.
There are various different flavors the yeast will lend to the finished wine product, the temperature when fermentation takes place, the particular strain of yeast used as well as a few other things.
When all of the fermentable sugars have been exausted, the yeast then falls to the bottom of the container where the fermentation process starts. The wine is removed, leaving the yeast, and is transferred to another container to mature and to await bottling.
|
0.980177 |
We describe IBEX, an open-source tool designed for medical imaging radiomics studies, and how to use this tool. In addition, some published works that have used IBEX for uncertainty analysis and model building are showcased.
Ger, R. B., Cardenas, C. E., Anderson, B. M., Yang, J., Mackin, D. S., Zhang, L., Court, L. E. Guidelines and Experience Using Imaging Biomarker Explorer (IBEX) for Radiomics. J. Vis. Exp. (131), e57132, doi:10.3791/57132 (2018).
Imaging Biomarker Explorer (IBEX) is an open-source tool for medical imaging radiomics work. The purpose of this paper is to describe how to use IBEX's graphical user interface (GUI) and to demonstrate how IBEX calculated features have been used in clinical studies. IBEX allows for the import of DICOM images with DICOM radiation therapy structure files or Pinnacle files. Once the images are imported, IBEX has tools within the Data Selection GUI to manipulate the viewing of the images, measure voxel values and distances, and create and edit contours. IBEX comes with 27 preprocessing and 132 feature choices to design feature sets. Each preprocessing and feature category has parameters that can be altered. The output from IBEX is a spreadsheet that contains: 1) each feature from the feature set calculated for each contour in a data set, 2) image information about each contour in a data set, and 3) a summary of the preprocessing and features used with their selected parameters. Features calculated from IBEX have been used in studies to test the variability of features under different imaging conditions and in survival models to improve current clinical models.
In medicine, patient disease diagnosis typically incorporates a large number of diagnostic exams such as x-rays, ultrasound, computed tomography (CT), magnetic resonance imaging (MRI), and positron emission tomography (PET) scans to assist in determining the course of patient care. While physicians use these images to qualitatively assess patient's diagnosis, there may be additional quantitative features that can be extracted to guide patient care. The rationale is that these features may represent proteomic and genomic patterns expressed on the macroscopic scale1. Combining this quantitative information with the current clinical information, e.g., patient demographics, may allow more individualized patient care. This is the theory behind radiomics: feature analysis of images on a voxel level. The features typically fall into 5 main categories: gray level co-occurrence matrix, gray level run length matrix, neighborhood intensity difference matrix, histogram, and shape.
A general introduction to the workflow of IBEX will help to organize data properly before starting radiomics projects utilizing IBEX. If importing DICOM images, IBEX requires that each patient have their own folder with their DICOM images. DICOM radiation structure set is optional to include in the patient folder, but is recommended instead of using the contouring platform in IBEX. To assist with importing all patients for a specific study, all patient folders can be placed into one folder together so that all data may be imported into IBEX using only one step. If importing patients from Pinnacle, it is best to have the structure set with the patient plan. As patients may have multiple image sets and plans within Pinnacle, it is best to know which image set and plan are correct before importing. If computation time is a concern, reducing the number of image slices for a patient can drastically reduce time. For example, if only the liver is of interest in a study but the patients have full body CT scans, reducing the DICOM slices to only the extent of the area of interest can shorten computation time (e.g., reducing the DICOM from 300 slices to 50 slices can take 1/6th the time). There are different tools available to perform this slice reduction, from manual to semi-automatic.
NOTE: To install a source-code version go to step 1.1. Alternatively, to install a stand-alone version go to step 1.2.
Go to the IBEX source-code version website3. Download the "IBEX_Source.zip" and "How_to_use.pdf" files. Look in the "How_to_use.pdf" file to find the pre-requisites to use the latest IBEX version.
NOTE: IBEX works only on 32 bit and 64 bit Matlab versions 2011a and 2014b, respectively.
Once the download is completed, unzip the "IBEX_Source.zip" and add the \IBEX_Source folder to the local path.
NOTE: Instructions on how to add a path can be found on the software references page for "add path"26.
Type "IBEXMain" in the command window to start IBEX.
Go to the IBEX stand-alone version website4. If installing IBEX for the first time, go to the "Dependencies" folder and download/install the "MCRInstaller.exe," vc2005redist_x86_new.exe," and "vc2012redist_x86.exe" files. From the main page, download the "IBEX.exe," "IBEX.ctf," "IBEX.ini," and "How_to_use.pdf" files to the same folder. Look in the "How_to_use.pdf" file for the pre-requisites to use the latest IBEX version.
Double click "IBEX.exe" to start IBEX.
Note: The images are imported to this set location and the data for this study are stored here as well. IBEX uses the most previously applied location as the default location when re-launched.
Click on the "Location" icon (Figure 1).
Select user or double click "New User" to create a new user folder. If creating a new user folder, enter the name in the new window then click the "OK" button.
Select the site within the selected user or double click "New Site" to create a new site folder. If creating a new user folder, enter the name in the new window then click the "OK" button.
Click the "OK" button at the bottom.
Click on the "Import" icon (Figure 1).
Select DICOM or Pinnacle9 (Pinnacle file version 9) format by clicking on the name of the format. To import DICOM images go to step 3.3.1. To import Pinnacle9 files go to step 3.3.2.
NOTE: To import patients individually go to step 3.3.1.1. To import multiple patients at once go to step 3.3.1.2.
Import each patient individually by selecting the patient folder through the directory.
Click on the "..." button next to the listed directory to select the patient folder that contains the DICOM images and radiation structure set DICOM file (optional).
NOTE: While it is only optional to import a structure set with the patient files, it is highly recommended to do so. IBEX does have a contouring platform within it, but this is somewhat impractical for large datasets. IBEX can accommodate structure sets from commercial software platforms that are familiar contouring tools for radiation oncologists, which makes the workflow much easier. This is typically how IBEX is used in studies.
Click the "Import" button on the bottom left once IBEX has finished searching the DICOM files, the Patient and Details boxes will be populated.
Repeat steps 3.3.1.1.1 - 2 for each patient.
Click the "Exit" button after all patients are imported.
Import all patients at once by checking the 'Batch Folder' box in the top right corner.
NOTE: All patients must have a separate folder containing their respective DICOM files.
Click on the "..." button next to the listed directory to select the folder that contains all patient folders with their corresponding DICOM images and radiation structure set DICOM file (optional).
Click the "Import" button. Patients will be imported sequentially. Click the "Exit" button after all patients are imported.
Configure the Pinnacle Host and Database within the "\IBEX\ImportExport\ImportModule\Pinnacle9\Pinnacle9ImportMain.INI" file. Click the "Config" button before selecting Pinnacle in the import module box.
Select the proper Pinnacle Host and Database.
Enter the Patient MRN, Last Name, or First Name then click elsewhere in the window.
Select the patient in the new window then click the "Transfer" button.
Click the box of the desired image sets from that patient in the new window and click the "OK" button.
Click the "OK" button in the new window that is labeled "Data successfully imported."
Click on the "Data" icon (Figure 1). Click on the desired patient file to open in the "Select a patient" section of the GUI (top half).
Click on the image set of the desired patient file to open in the "Select image set(s)" section of the GUI (bottom half). Click the "Open" button.
Use the arrows beneath the images to scroll through the images, which are shown in the axial, coronal, and sagittal views (from left to right).
Zoom in on the image by clicking on the "Zoom" button (Figure 2). Draw a box on the image plane to zoom. Right click to zoom out.
Turn on localizers by selecting the "Intersection" button (Figure 2).
NOTE: The lines that appear show where that slice is located in each plane. These lines move when scrolling using the arrows.
Click on the "Ruler" button (Figure 2) to measure distances. Click and hold the left mouse button to measure between the two points of interest. Release the mouse to remove the measured value from the displayed area.
Click on the "CT Num" button (Figure 2) to measure the value of a voxel. Click and hold the left mouse button on the voxel of interest, and the value will pop up on the left side of the GUI below the color scale. Release the mouse to remove the measured value from the displayed area.
Click on the "W/L" button (Figure 2) to window/level the images. Another window will pop up. Drag the left and right sides to the desired area or manually enter the window/level in the Window and Level boxes at the bottom of the new window. Select different window/levels using the first drop down menu on the left ( Figure 2): there are 8 for CT and 1 for PET.
Select different color scales using the second drop down menu on the left (Figure 2): there are 9 options to choose from.
Visualize ROIs by clicking on the box next to the ROI to make it visible on the images, or click on the "On All ROIs" button to turn on all patient ROIs.
Edit ROIs by clicking on the "Edit ROIs" button in the top left or in the bottom center. Select the contour to edit by clicking the box next to its name.
Use the "Nudge Contours" button (Figure 3) to push contours in or out as already drawn. Adjust the size of the circle used in the box labeled "D" next to the Nudge Contours button.
Remove a whole contour slice by using the "Cut Contours" button (Figure 3). Click and hold the left mouse button and draw a box around the ROI to be removed.
NOTE: Go to step 5.4.1 to draw contours by connecting points. Go to step 5.4.2 to draw contours by free hand.
Connecting Points: Use the "Draw Contours (1)" button (Figure 3) to draw a contour on each slice by clicking points around the contour where the points are connected by straight lines. Complete the ROI for that slice by clicking on the first point drawn.
Free Hand: Use the "Draw Contours (2)" button (Figure 3) to draw a contour by free hand. Hold the left mouse button to draw the contour on the slice. Finish the contour on that slice by coming back to the beginning of the drawn ROI and then releasing the left mouse button.
Click on the "Interpolate contours" button (Figure 3) to interpolate ROIs between slices.
Click on the "Copy ROI" button to copy the ROI.
Merge ROIs by selecting multiple ROIs and then clicking the "Merge ROI" button.
Click the "Delete ROI" button to delete the currently selected ROI.
Click "Create ROI" to create a new ROI which will cause a window will pop up. Enter the name of the ROI and click the "OK" button. Click the "Save" button. Click the "Exit" button to return to the patient viewer.
Click the "Show Data Set" button to view contours in the data set. Click on the name of the data set to view. Click the "Open" button. Select patient contours using the box next to their name. Click the "Delete", "Move", or "Copy" button depending on the desired function for that contour. Close the data set window once finished viewing the data set.
Select contours to add to a data set by clicking the checkbox next to their name then click the "Add to Data Set" button. Click on the name of the data set to add the contours or click the "New" button for a new data set. If New is selected, enter the name of the data set in the new window. Click the "OK" button.
Click the "Import ROIs" button to import a Pinnacle version 9 .roi file if contours were not loaded during Section 3.
Click the " …" button to select the file. Click the "Import" button.
Click the "Export ROIs" button to export ROIs.
Click the " …" button to select the directory in which exported ROIs will be placed. Click on the name of the format that is preferred for the exported ROIs. Enter anonymization information if that is preferred. Click the Export button.
NOTE: The preset is for no anonymization to be performed.
Click the "Exit" button to return to the list of patients and scans.
Click on the "Feature" icon.
Click on the "Add" button under "Step1: Preprocess". Select the preprocessing option from the drop-down menu in the new window.
Click on the "i" under "Para." to select the preprocessing parameters. Click on the number under the Value column in the new window of the parameter to change it. Type in the new parameter value and click the "OK" button.
Click on the "question mark" button in the upper right corner for a description of the preprocessing method and the preprocessing of specific parameters.
Click the "Add" button. Select the preprocessing step and click the "Delete" button to delete undesired preprocessing steps.
Select the feature category from the drop-down menu under "Step 2: Features Category:". Repeat steps for multiple categories.
NOTE: Only one category of features can be added at a time. Different combinations of preprocessing and feature categories can be added to the same feature set if desired.
Select the "GrayLevelCooccurenceMatrix25" and the "NeighborIntensityDifference25" feature categories to compute the gray level co-occurrence matrix and neighborhood intensity difference matrix, respectively, in 2.5D, which is done by computing the matrix on each slice individually and then summing all matrices together.
Select the "GrayLevelCooccurenceMatrix3" and the "NeighborIntensityDifference3" feature categories to compute the gray level co-occurrence matrix and neighborhood intensity difference matrix, respectively, in 3D.
Click on the "i" under "Para." for the parameters selected for that preprocessing. Click on the "question mark" button in the upper right corner for a description of the preprocessing method and the parameters.
Type in the new parameter value and click the "OK" button.
Click the "Test" button to view a feature category or specific feature. Click the button next to the feature or category desired.
Select the data set to view the test on and click the "Open" button. Check the box next to the patients from the selected data set to view the test on and click the "Test" button.
Uncheck unwanted features for the category selected; all features are selected after selecting the category. Click the word "Features:" under "Step2: Features" to uncheck all features.
Click the "Add to Feature Set" button to add all selected features with selected preprocessing.
Select the feature set to add features to and click the "Open" button or click the "New" button to add features to a new feature set. If creating a new feature set, enter the name of the feature set in the new window and click the "OK" button.
Click the "Show Feature Set" button to view features with corresponding preprocessing techniques to view features in a feature set.
Select the feature set to view and click the "Open" button or click the "New" button to create a new feature set. If creating a new feature set, enter the name of the feature set in the new window and click the "OK" button.
Click on the "Show Data Set" button to view current data sets.
Select the data set to view and click the "Open" button or click the "New" button to create a new data set. If creating a new data set, enter the name of the data set in the new window and click the "OK" button.
Click the "Result" icon. Click on the data set to run the features under "Step 1: Data Set." Click on the feature set to run on the selected data under "Step 2: Feature Set."
Click on the "View Data" button to view the selected data set. Click on the "View Feature" button to view the selected feature set.
Click the "Compute&Save Result" button. Enter the file name for the results and click the "Save" button.
Open the saved results file.
NOTE: This is typically under C:\IBEX\DataIbex\[Selected User in Step 2.2]\[Selected Site in Step 2.3]\1FeatureResultSet_Result, unless otherwise assigned in step 8.4.
Use the data from the different tabs in the desired statistical tests or model building in software.
NOTE: The protocol can be paused at any time. However, it is most convenient after finishing all steps needed for a particular icon, e.g., finishing all of Section 7 which is under the Feature icon.
The output from IBEX is a spreadsheet (see Figure 4) that contains 3 tabs. The "Results" tab contains the feature values for each ROI in the data set (Figure 4A). The "Data Info." tab contains information about the images taken from each ROI in the data set (Figure 4B). The "Feature Info." tab contains a comprehensive list of features used with the parameters selected for the feature category and the preprocessing used for that category of features (Figure 4C).
The IBEX calculated features from medical images have been utilized in several contexts. Hunter et al. used an early version of IBEX to identify robust image features19. Fave et al. investigated the uncertainty in radiomics features of 4D CT thoracic scans collected at different respiratory phases, peak tube voltages, and tube currents9. This study found intra-patient variation to be less than inter-patient variation for most features when tube voltage and current were varied, making these factors negligible. The reproducibility of the feature from cone beam CT (CBCT) images was then evaluated using IBEX10. In this study, features calculated from lung CBCT images were found to be reproducible when the same protocol and manufacturer were used only when breathing motion was small. Image preprocessing impact on feature values was subsequently evaluated. The study showed that 39 of the 55 features studied had at least one preprocessing technique that resulted in significant stratification for overall survival using Cox proportional hazards models indicating that different preprocessing may be needed for each feature11. The uncertainty in features from perfusion CT images has also been evaluated using IBEX. Yang et al. showed that radiomics features were not dependent on time between contrast administration and CT scan, and that 86.9% of features were reproducible with an inter-session stability concordance correlations coefficient greater than or equal to 0.916. Lastly, a phantom was designed to test inter-scanner variability on a subset of features15. Texture strength was found to be the most consistent feature while busyness was found to vary the most.
The radiomics features from IBEX are also often used for model building, typically looking at overall survival, local-regional control, and freedom from distant metastases. Fried et al. identified 8 radiomics features from non-small cell lung cancer (NSCLC) patients' CT scans that when implemented into a Cox proportional hazards models for overall survival, loco-regional control, and distant metastases significantly improved Kaplan-Meier stratification when compared to models that only used clinical data20. Similarly, Fave et al. found radiomics features that improved patient stratification in survival curves12. Their study used weekly CT images and calculated changes in the lung radiomics features. Calculated features in the model had four different pre-processing methods: (1) thresholding, (2) threshold and bit depth, (3) thresholding and smoothing, (4) thresholding, bit depth, and smoothing; and the best pre-processing method was chosen for each feature individually before being tested in the Cox proportional hazards models. Hunter et al. also showed that radiomics features can predict tumor shrinking in NSCLC patients while exploring different thresholds and bit depth rescale values18.
PET image's radiomics features and their prognostic value have also been investigated using IBEX. Fried et al. scaled standardized uptake values (SUVs) by rounding SUVs to the nearest whole number and then subtracting the minimum SUV for that ROI from the rest13. Energy and solidity were found to statistically improve an overall survival model when included compared to the model when only conventional clinical factors were included. These two radiomics features were also found to be able to identify subgroups of patients who received a benefit or detriment from dose escalation14. Similarly, van Rossum et al. found an increase in the c-index for a clinical prediction model of pathologic complete response when including radiomics features into clinical models17.
Figure 1: IBEX main home page. Main page for IBEX with icons for each section. Each of these sections are described in Sections 2 - 6. Please click here to view a larger version of this figure.
Figure 2: Data selection window. GUI window is used for data selection manipulation. The window comes with buttons to alter the appearance of the images as described in steps 4.4 - 4.10. Please click here to view a larger version of this figure.
Figure 3: ROI editor window. GUI window is used for ROI manipulation. The window comes with the same buttons to alter the appearance as in the data selection as well as buttons to alter the ROIs. The ROI manipulation is described in Section 5. Please click here to view a larger version of this figure.
Figure 4: IBEX results worksheet. IBEX outputs three pages of information in a worksheet. The first page (A) contains the feature values for each ROI, the second page (B) contains information about the images that the ROIs were drawn on, and the third page (C) contains information about the features and preprocessing used. The outputs for this figure are from a phantom study where features were calculated using Butterworth smoothing and 8-bit depth rescaling, shown in panel C, column E, rows 5 and 6. Please click here to view a larger version of this figure.
IBEX is a powerful tool for medical imaging radiomics research. It has thus far mostly been used for radiation oncology purposes in studies conducted by the MD Anderson radiomics group. IBEX allows for manipulation of ROIs and calculation of features within 5 main feature categories. The source code version of IBEX allows the user to design applications that are not already part of IBEX, such as gray level zone matrix features.
The main steps involved in IBEX are the import of images, contouring of ROIs, selection of ROIs for data set, and creation of feature set. Accurate contours are necessary as features are only calculated within these areas and thus inaccurate contours will provide inaccurate feature values. Thus, any relationship found between these features calculated on inaccurate contours and outcomes will be spurious. Parameter selection for the features is also a vital step. For example, changing the step size for the gray level co-occurrence matrix can impact the features calculated from the matrix. This could depend on image type (i.e., MRI, CT, or PET), site for investigation (e.g., NSCLC vs. head and neck), and the purpose of the study (e.g., creating survival models vs. linking image features with genomics). Feature parameters should be selected based on a physical or biological reasoning, e.g., is there a reason that a step size of 4 would be biologically relevant in a co-occurrence matrix? Feature parameters can also be selected based on previous studies that have found certain feature parameters to correlate with outcomes or biological expressions. IBEX has 27 preprocessing modules and 132 features available for selection, along with allowing altering of parameters for each preprocessing module and feature category, which makes it an adaptable tool for many types of radiomics studies.
There are several general limitations in radiomics research that apply when using any software. For example, image features have been shown to depend on image acquisition parameters such as voxel size and scanner15,27. A limitation of all software is that there are many parameters that can be altered for each feature and the default values may not be appropriate for the specific study. Users must be vigilant, and research previously used parameter settings for similar studies and evaluate the applicability of the settings. The quality of the contours and the inherent inter- and intra-observer variability can also affect the calculation of features. Owens et al. showed that calculated features are more robust when using auto-contouring tools28. The features calculated for radiomics studies are human-engineered features and may not fully convey the features observed by the visual perception system. In addition, these features may be highly correlated to one another creating difficulties when analyzing the results. One specific limitation of IBEX is that the current version lacks the availability to calculate wavelet features; however, our group intends to include these features in future versions.
There are several alternative software platforms available for the calculation of image features25. Some advantages of IBEX include the fact that it is freely available, is well documented2, and allows users detailed control of the image feature calculations. IBEX also displays the processed patient images (e.g., after smoothing), so the user can visualize the impact of any image processing - this is useful, for example, when confirming that the preprocessing has not over-smoothed the images. Similarly, IBEX can export the actual co-occurrence matrix and intensity histograms; this can be useful when delving deeper into the image features.
IBEX has been solely used for cancer studies, mostly focused on radiation therapy. However, future studies can branch out to other cancer therapies or even outside of the cancer field. For example, Kassner et al. used radiomics to predict hemorrhagic transformation in patients with acute ischemic stroke29. IBEX could also be used in radiomics studies of this type.
IBEX also has continual maintenance. For example, a study by Fave et al. found that 5 features (busyness, coarseness, gray level non-uniformity, run length non-uniformity, and energy) were strongly volume dependent and corrected their formulas11. These updated formulas have been included in the updated release of IBEX. Additionally, there is a google group30 that has users post questions that other users then answer. This continual improvement of IBEX in addition to the current capabilities of IBEX and its availability make it a prime source for radiomics studies.
Rachel Ger is funded by the Rosalie B. Hite Graduate Fellowship and American Legion Auxiliary Fellowship. Carlos Cardenas has been funded by the George M. Stancel PhD Fellowship in the Biomedical Sciences. The development of IBEX was funded by the NCI (R03 CA178495).
Excel Microsoft Office Any version of excel should work.
Matlab MathWorks Only use IBEX on 32 bit Matlab 2011a or 64 bit Matlab 2014b.
Lambin, P., et al. Radiomics: extracting more information from medical images using advanced feature analysis. EJC. 48, 441-446 (2012).
Zhang, L., et al. IBEX: an open infrastructure software platform to facilitate collaborative work in radiomics. Med Phys. 42, 1341-1353 (2015).
IBEX Source Code. Available from: http://bit.ly/IBEXSrc_MDAnderson (2017).
IBEX Stand Alone. Available from: http://bit.ly/IBEX_MDAnderson (2017).
Haralick, R. M., Shanmugam, K. Textural features for image classification. IEEE Trans Syst Man Cybern. 610-621 (1973).
Galloway, M. M. Texture analysis using gray level run lengths. Comp Graphics and Im Proc. 4, 172-179 (1975).
Tang, X. Texture information in run-length matrices. IEEE Trans on Im Proc. 7, 1602-1609 (1998).
Amadasun, M., King, R. Textural features corresponding to textural properties. IEEE Trans Syst Man Cybern. 19, 1264-1274 (1989).
Fave, X., et al. Preliminary investigation into sources of uncertainty in quantitative imaging features. Comp Med Imaging Graph. 44, 54-61 (2015).
Fave, X., et al. Can radiomics features be reproducibly measured from CBCT images for patients with non-small cell lung cancer. Med Phys. 42, 6784-6797 (2015).
Fave, X., et al. Impact of image preprocessing on the volume dependence and prognostic potential of radiomics features in non-small cell lung cancer. Trans Cancer Res. 5, 349-363 (2016).
Fave, X., et al. Delta-radiomics features for the prediction of patient outcomes in non-small cell lung cancer. Scientific Reports. 7, 588 (2017).
Fried, D. V., et al. Stage III Non-Small Cell Lung Cancer: Prognostic Value of FDG PET Quantitative Imaging Features Combined with Clinical Prognostic Factors. Radiology. 278, 214-222 (2016).
Fried, D. V., et al. Potential Use of (18)F-fluorodeoxyglucose Positron Emission Tomography-Based Quantitative Imaging Features for Guiding Dose Escalation in Stage III Non-Small Cell Lung Cancer. IJROBP. 94, 368-376 (2016).
Mackin, D., et al. Measuring Computed Tomography Scanner Variability of Radiomics Features. Invest radiol. 50, 757-765 (2015).
Yang, J., et al. Uncertainty analysis of quantitative imaging features extracted from contrast-enhanced CT in lung tumors. Comp Med Imaging Graph. 48, 1-8 (2016).
van Rossum, P. S., et al. The incremental value of subjective and quantitative assessment of 18F-FDG PET for the prediction of pathologic complete response to preoperative chemoradiotherapy in esophageal cancer. JNM. 57, 691-700 (2016).
Hunter, L. A., et al. NSCLC tumor shrinkage prediction using quantitative image features. Comp Med Imaging Graph. 49, 29-36 (2016).
Hunter, L. A., et al. High quality machine-robust image features: identification in nonsmall cell lung cancer computed tomography images. Med Phys. 40, 121916 (2013).
Fried, D. V., et al. Prognostic value and reproducibility of pretreatment CT texture features in stage III non-small cell lung cancer. IJROBP. 90, 834-842 (2014).
Gan, J., et al. MO-DE-207B-09: A Consistent Test for Radiomics Softwares. Med Phys. 43, 3706-3706 (2016).
Klawikowski, S., Christian, J., Schott, D., Zhang, M., Li, X. SU-D-207B-07: Development of a CT-Radiomics Based Early Response Prediction Model During Delivery of Chemoradiation Therapy for Pancreatic Cancer. Med Phys. 43, 3350-3350 (2016).
Huang, W., Tu, S. SU-F-R-22: Malignancy Classification for Small Pulmonary Nodules with Radiomics and Logistic Regression. Med Phys. 43, 3377-3378 (2016).
Hanania, A. N., et al. Quantitative imaging to evaluate malignant potential of IPMNs. Oncotarget. 7, 85776-85784 (2016).
Court, L. E., et al. Computational resources for radiomics. Trans Cancer Res. 5, 340-348 (2016).
Matlab Add path. Available from: https://www.mathworks.com/help/matlab/ref/addpath.html (2017).
Zhao, B., et al. Reproducibility of radiomics for deciphering tumor phenotype with imaging. Sci Rep. 6, 23428 (2016).
Owens, C., et al. Reproducibility and Robustness of Radiomic Features Extracted with Semi-Automatic Segmentation Tools. Med Phys. (2017).
Kassner, A., Liu, F., Thornhill, R. E., Tomlinson, G., Mikulis, D. J. Prediction of hemorrhagic transformation in acute ischemic stroke using texture analysis of postcontrast T1-weighted MR images. JMRI. 30, 933-941 (2009).
IBEX Google Forum. Available from: https://groups.google.com/forum/#!forum/ibex_users (2017).
|
0.99917 |
We stand for classical liberalism but what do we mean with this? First of all, we mean with classical liberalism that we oppose neo-liberalism. Neo liberalism is the ideology of (extreme) laissez-faire economics and the strong belief in deregulation.
In our opinion, however, “neo-liberalism” is a corruption of liberal ideas. For classical liberals, such as Adam Smith, markets are a mean to an end, and not an end in itself. Government has to intervene if markets would lead to unacceptable outcomes.
Also classical liberals from John Locke to Thomas Paine has endorsed the existence of some kind of welfare state to take care of the poor and disabled.
Classical liberals believe that there are certain public services, which should not be privatized.
We believe that negative and positive freedoms are both important and that one cannot exist without the other. Government policy should be aimed at strengthening both types of freedom.
Constitutional issues: Unicameralism or bicameralism?
|
0.999994 |
How are Mangrove forests throughout tropical areas of the world responding to the rising sea levels attributed to climate change? Daniel M. Alongi, of the Australian Institute of Marine Sciences, analyzed historic responses to changes in sea levels in Mangrove forests as well as current data to determine how well these forests are reacting to the climate crisis (Alongi 2015). Mangrove forests tend to occupy the border between land and sea in low latitudes, making them especially susceptible to the effects of climate change. Fortunately for mangroves, they have an outstanding ecological stability, in part due to their large subterranean storage capabilities. However, despite responses to develop resilience to environmental disturbances, mangrove forests are still suffering. In terms of human impact, mangrove forests are being deforested at a rate of 1-2% per year, leaving only about a century before these forests disappear entirely. Mangroves are crucial to the environment; they serve as breeding and nursery grounds for fish, birds and other animals, prevent erosion and damage from natural disasters like tsunamis, serve as a renewable source of wood for fuel, and are key components in filtering ocean contaminants.
Alongi analyzed how mangroves have historically adjusted to variations in the sea levels over time. Ultimately, the rate of sediment accretion can determine how mangroves adjust to rising sea levels. By looking at the depth of peat deposits, it can be clearly seen that mangroves have had to adapt quite a large amount throughout their existence on earth, dating back to the Late Cretaceous-Early Tertiary Period. After looking at geological records and the peat deposits in various parts of the world, Alongi was able to determine that mangroves have been able to adapt in sync with rising sea levels, except in regions where the rise was most rapid, where they became extinct.
Mangroves have also had to respond to variations in temperature, precipitation and carbon dioxide (CO2). In general, more CO2 in the atmosphere leads to growth in mangroves, however this can vary from species to species. When faced with increasing temperatures, plants and animals tend to see increases in functional processes, until a threshold is reached, resulting in a slowing of these processes due to the critical temperatures. Mangroves, given their tropical location, are already close to these thresholds, and are thus highly susceptible to rising temperatures. Mangroves also prefer wet environments where there is more available fresh water.
Mangrove forests of the future, according to Alongi, are going to be quite different than the ones found around the world today, primarily less dense owing to the scarcity of available land for forest expansion. Alongi predicts that mangrove forests on arid coasts will decline due to rising salinities and higher temperatures, and will decline in areas succeptible to sea level rise like the Caribbean and tropical river deltas where land for expansion is scarce. On the other hand, Alongi predicts that mangrove forests will expand their latitudinal range as CO2 levels increase in New Zealand, China, and Australia. Consequently, mangroves will survive around the world, but will be under pressure from the effects of climate change, and most importantly the human impacts of deforestation.
This entry was posted in Deforestation, Ecosystem services, Pushan Hinduja and tagged Australian Institute of Marine Science, Climate change, CO2, Daniel M. Alongi, Mangrove Forests, salinity, Sea Levels, Temperature, Tropical by Emil Morhardt. Bookmark the permalink.
|
0.999796 |
Until recently I would have told you I was male. I have presented myself as male my whole life and I have never had anyone misgender me as female when they could see me. I am very male-bodied.
Four women have asked me for advice on feminine hygiene products (cups and reusable pads). That is, they thought, "I need advice on this product to catch menstrual blood, I'm going to ask that man I know." For clarity, I have not studied the subject and have no credentials.
Three women have told me about a time when they were sexually assaulted.
When men don't seem to get the prevalence of sexual assault - the number of women who have been sexually assaulted and how it has affected their lives - I want to say to them, "How many women have asked you for advice about feminine hygiene products?"
Because while I know my experience can't be at all representative, I still can't help but feeling: If the answer is zero, what makes you think a woman has ever been comfortable enough around you that she would tell you her story?
i have never asked anyone advice about feminine hygiene products.
i have told dozens of people about my assault.
|
0.999984 |
Why are so many people ignoring and denying global warming even after what NASA published about the last 5 years?
Sorry, but more and more people are waking up to the reality that NASA should never have gone into the climate business, and is becoming increasingly partisan and political and twisting the science in cahoots with a global movement centered in the U.N. Colorado-based engineer-scientist Tony Heller has been producing numerous great videos exposing NASA climate scientists as pikers tampering with data to support the CO2 global warming narrative for their fellow conspirators, and proving that the emperor has no clothes.
https://www.youtube.com/watch?v=RgxgkRmsF2gMeanwhile basic physics has been mangled by the CO2 greenhouse warming scientists, confusing the temperature on the surface where we live with the temperature up high in the sky where it can’t reach us. The only purpose of the atmosphere is to take solar heat from the surface up to space and dispose of it. The composition of the atmosphere has nothing to do with it, only its mass. The great mass slows the process of extracting surface heat, keeping it within livable limits unlike the Moon which has no atmosphere. There’s no physical way that CO2 in the sky can radiate heat back down to the surface, sorry, it’s a hoax.
In short, CO2 has been framed and demonized, when all along it is a clean green good gas that’s essential for plant life, and therefore animal and human life. If anything the atmosphere has too little CO2, currently at 400 ppm, when greenhouse operators regularly pump CO2 up to 1200–1500 ppm. Despite all the fossil fuel burning, atmospheric CO2 is only increasing by 3 ppm per year, isn’t it?
If you want to finally understand the climate issue, read my essay that devastates the greenhouse warming theory with fundamental physics, and which if more widely known might even change the so-called climate scientists’ minds and make them drop their Green New Deal and other wild unworkable self-defeating plans for using our money.
|
0.999922 |
I think I’ll be printing this out for my office. Could come in handy on occasion.
The MySQL cheat sheet is designed to act as a reminder and reference sheet, listing useful information about MySQL. It includes a list of the available functions in MySQL, as well as data types. It also includes a list of MySQL functions available in PHP, and a list of useful sample queries to select data from a database.
|
0.944279 |
Linux Mint 12 "Lisa" or Ubuntu 11.10 Oneiric Ocelot? I told you the Linux world moves fast. Only a few days after I wrote my article, A Look at Popular Linux Distributions, Linux Mint 12 was released. There had been much hype about what Mint had planned to do to improve the user experience of Gnome version 3.
On other distros that have deployed Gnome 3, such as Fedora 16 and OpenSUSE 12, the drastic change in the Gnome interface from the 2.x version was a shock to everyone's system. Gnome 3 won't run on a computer with a video card that isn't up to snuff. It has what appears to be a menu panel, but it doesn't seem to be customizable without a lot of learning.
Ubuntu and Mint are arguably the most popular Linux distributions right now, and I think, for good reason. They look great, are easy to use, and are very stable. And both have come up with different solutions to the Gnome 3 problem.
Ubuntu turned their back on Gnome 3 and developed the Unity desktop, which is similar to Gnome 3 in some ways, and perhaps equally hated by the community. However, it does appear to run more readily on older video hardware. Like the other Gnome 3 distros, Ubuntu also provides a Gnome Classic mode, that looks like Gnome 2.x, but lacks the customization tools that 2.x users were so fond of.
Mint 12 went in a different direction and embraced Gnome 3, providing the Mint Gnome Shell Extensions (MGSE). The shell extensions add functionality on top of Gnome 3, which Mint has used to bring back some of the look and feel of Gnome 2.x. For those who dislike Gnome 3, MGSE may help you, in that it provides a more traditional menu, similar to previous versions of Mint, while still providing a Gnome 3 launcher, and it does pretty up that pitch black Gnome 3 menu bar.
Mint 12 also includes the MATE desktop, which is a fork of Gnome 2.x. In between MGSE and MATE, they also provide a Gnome Classic mode. It's all a bit confusing.
I tested Mint 12 and Ubuntu 11.10 on an older laptop at home, and a fairly decent desktop at work. Ubuntu runs flawlessly on both. I can't say I love the Unity interface, OK I hate it, so I've got Ubuntu running in Gnome Classic mode. The default color scheme in Ubuntu's classic mode was a little bugged up, so I had to learn how to straighten it out a bit (I'm talking about the funny colored blocks in the panel). Aside from that, I'm happy with Ubuntu in classic mode.
Mint on the other hand, in Gnome 3 simply doesn't work on my laptop at home (no surprise, none of the Gnome 3 distros ran on my laptop without falling back to classic mode), but I was really surprised that MATE doesn't run right either. The menu panels crash on me if you even think about clicking on them. Maybe it'll take them some time to work out the bugs. So that leaves classic mode again. Well, Mint's classic mode look absolutely beautiful. I'll give them that!
On my desktop, all three Mint modes work fine. MGSE is at least a moderate improvement over Gnome 3, classic mode looks great, and MATE, well, the default looks aren't great, but luckily the good old Gnome 2.x appearance applet is available so you can go theme tweak crazy.
Personally, I don't love Ubuntu's Unity, nor Mint's Gnome 3 extensions, so I'm left now running Gnome Classic mode on both. As such, they look and feel very similar, and they're based on a lot of the same code (you actually update from some of the same repositories).
So which to choose? I've got to give Ubuntu points for the fact that it runs fine on all my hardware. The Unity interface is something I could eventually get used to, but the concern is that the rest of the industry is going with Gnome 3. In that, I give Mint points for being the only distro to date to deliver significant improvements to Gnome 3. However, I gotta ding Mint for failing in two out of their three modes on my laptop.
If you really want to embrace Gnome 3, and you've got the hardware, maybe Mint is for you. Even if your hardware is sub-par, Mint in classic mode, like I said, is beautiful, and appears very stable.
But, as has been true for quite some time, I gotta call Ubuntu the best over all. It hasn't given me a lick of trouble yet (funny colors in the panel aside).
Please understand the difference between gnome 3 and gnome shell. ubuntu 11.10 is running gnome 3 compared to ubuntu 11.04 gnome 2.x.Both unity and gnome-shell runs under gnome3 on oneiric.
gnome shell is heavily uses java script.
both are having problems with *latest* hardware drivers.
personally i love gnome shell on usability and hate unity for same.
unity has a very nice feature called global menu which is being ported to gnome shell as an extension.
ATI : catalyst broken, gallium does work.
NVIDIA : proprietary drivers does the work.
SANDY BRIDGE HD : sna is buggy but still under development. others does.
Thanks for that, I've fixed the text accordingly!
I have embraced the Unity desktop in Ubuntu.
I think it is the best improvement that Ubuntu has seen. Linux is fairly good, but I personally am in love with Ubuntu.
I've tested a lot of Linux distros now, and I've come back to Ubuntu. And although I love love 10.10 Maverick Meerkat, I've bit the bullet and am now using 11.10. I am however, still flipping back and forth between Unity, Xfce, and Gnome Fallback mode.
I was fed-up with unity and the slow boot and shutdown.. I'm back to Meerkat..
|
0.999629 |
Facts: The petition concerned the security procedures for screening Israeli citizens at Israeli airports. The Petitioner’s primary claim was that Israel’s Arab citizens are generally subjected to stricter security checks than Israel’s Jewish citizens. The Petitioner argued that employing ethnicity as a criterion for the rigorousness of airport security screening of Israeli citizens is fundamentally unacceptable. The petition was submitted in 2007, but the decision was delayed in light of changes that the Respondents implemented in the security procedures, primarily comprising the introduction of new technology for the inspection of checked baggage, which was the subject of main concern of the passengers, as well as additional steps adopted to reduce distinctions among passengers in the security procedures. In light of those developments, the Respondents argued that the petition should be dismissed. In their view, the claims in regard to the security procedures in place at the time the petition was submitted were no longer relevant, while the claims advanced in regard to the new procedures were not yet ripe for decision. The Petitioner demanded that Court decide upon the fundamental issue it had raised, and advanced additional claims in regard to the changes that had been adopted.
The Respondents had made considerable progress towards increasing equality in the security procedures. It was clear that significant efforts were being devoted to the implementation of technological solutions that would reduce, to the extent possible, the differences in the security procedures applied to different passengers, and significantly limiting the public element that formerly characterized the screening of certain passengers, while maintaining the appropriate level of security that is indisputably required in regard to air transport. It is only natural that such changes require time, and are dependent upon the cooperation of many parties. Under the circumstances, the Court ruled that the petition had exhausted itself. The authorities should be permitted to complete their work and collect data in regard to the effect of the changes that had been made before subjecting the fundamental question to judicial review. In this regard, the Court emphasized that achieving the correct balance between the need for air transport security and the reasonable functioning of the airports, and the protection of individual rights is an especially difficult task, particularly in Israel’s current security situation. It should also be borne in mind that a terrorist attack upon an airplane could result in the loss of many lives.
If, in the future, the Petitioner finds that the changes instituted have not brought about the desired result, and that the distinction – particularly the public distinction – among Israeli citizens persists in the airports, the Court’s gates will remain open. That will also be the case if the implementation of the planned changes in the airports does not proceed at a reasonable pace, in accordance with the timetable presented by the Respondents.
The petition was therefore dismissed without prejudice. In light of the important contribution of the petition to advancing the changes in the field of security procedures in Israeli airports, the Respondents were ordered to pay the Petitioner’s costs in the amount of NIS 30,000.
Petition for the granting of an order nisi.
For the Petitioner: Auni Bana, Adv., Dan Yakir, Adv.
For the Respondents: Chani Ofek, Adv.
1. The subject of this petition, which was submitted in 2007, is the security procedures for screening Israeli citizens in Israeli airports. The Petitioner’s main claim is that Arab citizens of Israel are generally subjected to more intensive inspection than Jewish citizens of Israel. In the opinion of the Petitioner, employing ethnicity as a criterion for deciding the extent of the screening to which citizens are subjected at the airports is fundamentally flawed.
2. The Petitioner is the Association for Civil Rights. Respondent 1 is the Israeli Airports Authority. Respondent 2 is the General Security Service, which advises the Airport Authority in the field of security. Respondent 3 is the Ministry of Transport. On March 3, 2011, an order nisi was granted, ordering the Respondents to show cause as to why security screening for all citizens at the airports should not be carried out in accordance with equal, relevant and uniform criteria (D. Beinisch, CJ, E. Rivlin, DCJ, and M. Naor, J). On May 23, 2011, the Minister of Defense signed a security-interest immunity certificate in accordance with sec. 44 of the Evidence Law [New Version], 5731-1971, in regard to the details of the procedures and guidelines for security screening at the airports. Information in regard to the details of the procedures was presented to us at various stages in the proceedings. The information was presented ex parte due to its sensitivity and the danger to state security posed by its disclosure.
3. In the course of the proceedings, we learned that, in 2006, the General Security Service and the Airports Authority began a broad administrative examination of the security-inspection procedures. In the course of that process, changes were adopted in regard to the screening of Israeli citizens in Ben Gurion Airport (hereinafter: Ben Gurion) in order to reduce the differential aspect of the inspections, i.e., to promote uniformity in the security procedures applied to all Israeli citizens. The primary change relates to the procedure for screening baggage intended for the airplane's baggage hold (hereinafter also: checked baggage), which was the subject of most passenger complaints. A new technological system was developed (Hold Baggage Screening – HBS) that allows for the inspection of all the checked baggage in a separate, non-public area, without the presence of the passengers, and its direct transfer to the baggage hold. The inspection by the new technology is performed at various security levels in accordance with threat levels. In addition to the plans regarding the new technology, other changes were introduced at Ben Gurion in 2008, such as changes in the security procedures at the vehicle entrances to the airport and at the terminal entrances. In their answer to the order nisi, the Respondents claimed that the new security procedures will serve to alleviate the sense of discomfort and humiliation attendant to the rigorous inspection of a passenger’s baggage in the main passengers’ hall, the detaining of the passenger and the conducting of public screening in the presence of other passengers waiting in line. They added that they intended to begin operating the HBS system in the course of 2013, subject to operational exigencies. It should be noted that the Respondents presented more optimistic timetables in earlier responses. The Respondents further emphasized that there is no uniform, strict level of screening for all Israeli Arab citizens. They maintained that, in practice, most of that population undergoes quick, simple screening, and the planned changes will help to further simplify the procedure. Moreover, the Respondents explained that the level of screening is not based upon a single criterion, but rather upon a mix of criteria, based upon empirical data and professional threat assessment that indicate the potential threat level posed by a particular passenger.
“The application of a security profile to an Israel citizen in a manner that would justify conducting stricter security screening, even without concrete information in regard to that citizen, raises significant problems. We are doubtful whether the use of a security profile that is based upon sweeping, general characteristics, and that relies upon a passenger’s being a member of a specific ethnic group as a sole characteristic, is legitimate. […] Indeed, although a person does not have a vested right not to be subjected to security screening at the airport, it is a person’s right that such screening be applied equally, based upon equal, uniform criteria. No one doubts that since the phenomenon of widespread, intensive terrorist attacks began, many countries are confronted by the question of the legitimacy of profiling potential threats through tagging that is based upon origin or ethnicity. Such tagging, of course, raises particular difficulties when we are concerned with citizens whose equal rights must be respected. Even in the instant case, although high-level screening is not applied to all the Arab citizens of the state, the existence of sweeping, general criteria for threat assessment – to the extent that those are indeed the factual circumstances, and we are not ruling on that – raises a problem that justifies a more in-depth examination on the basis of the relevant data” (para. 5 of the decision).
5. On Nov. 22, 2012, the Respondents informed the Court that the integration of the HBS system at Ben Gurion was proceeding, despite operational difficulties. They estimated that the technology would become operational in accordance with the timetable that was presented to the Court, that is, already in the course of 2013. The Respondents emphasized that the Airports Authority is prepared, in principle, to introduce the technology into the security procedures of the domestic airports, as well, subject to exigencies. Thus, they stated, an advanced technological system was put in place in the Eilat airport in the second half of 2011, which makes it possible to inspect checked baggage behind the scenes and without the involvement of the passengers. They are also trying to implement the screening procedure, as far as possible, in Ben Gurion, although there are differences in this regard between the two airports. At the Uvda airport, which serves only international flights, there is a uniformly strict screening procedure for all passengers, most of whom are foreign nationals. Both the Eilat airport and the Uvda airport are scheduled for relocation to a new site in Timna, where the new screening procedure being implemented in Ben Gurion will be fully adopted. As opposed to that, the Haifa airport and Tel Aviv’s Sde Dov airport present significant infrastructure problems. Nevertheless, advanced technological systems have been installed at the terminal entrance for the inspection of both carry-on and checked baggage. It should be noted that there is an intention, in principle, to relocate Sde Dov. The Respondents further informed the Court that, in addition to the technological changes, the operation of the “Security Center” (“Mokdan”) will be expanded. The purpose of the Security Center is to provide security services to foreign business travelers, and guests of government ministries and Israeli companies, in order to simplify the process for them. The data of the Security Center are shared with the domestic airports and the Israeli carriers flying to Israel. According to the Respondents, this service has significantly reduced friction with sensitive populations in the security screening process.
6. On Sept. 18, 2013, the Respondents submitted an updated affidavit. In that affidavit, the director of Ben Gurion informed us of a delay in the timetable for integrating the HBS technology, and therefore the implementation of the new security procedures would only begin in March 2014, at the earliest. According to him, the reason for the delay was that the foreign companies involved in the project had not met their commitments. The Respondents emphasized that as soon as they became aware of the delay, a number of steps were taken to mitigate it. According to the Respondents, the Airports Authority made the necessary changes required of it in Ben Gurion in terms of construction and infrastructure, as well as the recruitment and training of manpower, and it was, therefore, prepared, in principle, to incorporate the system on the intended date, had a working system been supplied by the foreign companies. In accordance with the amended timetable presented by the Respondents, examinations and other actions in preparation for the full implementation of the system in Ben Gurion will be carried out between March and July of 2014. The running-in stage of the system will begin in July 2014, and six months later, the system will be fully transferred from the foreign companies to the Airports Authority. The Respondents emphasized that further delays were possible due to the complexity of the integration process and the possibility of unforeseen developments.
7. In an additional notice, dated Nov. 14, 2014, the Respondents updated the Court that due to recent developments in the integration of the HBS system, it appeared that the system would indeed be fully operational in March 2014, and that it would be finally transferred to the Airports Authority in December. The Respondents explained that the HBS system would be put into use only in Terminal 3 in Ben Gurion, and not in Terminal 1. Terminal 1 was designated to serve domestic flights, after the opening of Terminal 3, but in 2011, it was decided that it would also serve low-cost international flights. The Respondents further noted that, as of 2014, a project will commence for the introduction of a system like HBS in Terminal 1, and that the expected timetable for this is two years, subject to operational exigencies. That estimate was later amended, and the current projection for the introduction of the system in Terminal 1 is 2017. The Respondents emphasized that the changes made in Ben Gurion in regard to the vehicle entrances and the entrances to the terminals will also apply to Terminal 1.
8. On Dec. 20, 2013, a hearing was held on the response to the petition before a three-judge panel (A. Grunis, CJ, and M. Naor and E. Arbel, JJ). At the end of the hearing, it was decided that it was not yet time to rule upon the petition, in light of the progress in integrating the changes in the security system in Ben Gurion, despite the delays. The Respondents were ordered to submit an update by April 30, 2014. Accordingly, in notices dated April 28, 2014 and November 2, 2014, the Respondents confirmed that the HBS system began operation in Terminal 3 of Ben Gurion as of March 2014. According to the Respondents, there is a possibility of limited recourse to the “old” screening procedure in cases of breakdowns and due to operational needs. The Respondents noted that the initial experience gained from operating the system was positive, and that it appeared that the system allowed for the required level of screening from a security perspective, while mitigating the attendant intrusion of strict screening of passengers in public. They reiterated that they intend to introduce the new technology in Terminal 1. In addition, The Respondents provided other details concerning additional steps taken, in addition to the installing of the HBS, to reduce the differences between passengers in the screening procedures. Thus, they stated, advanced screening devices had been purchased that would reduce the need for the physical examination of passengers. They added that such gates had been purchased for Ben Gurion, and an additional purchase was planned for the Eilat airport.
9. In light of the above developments, the position of the Respondents is that the petition should be dismissed. In their view, the claims made in regard to the security screening procedures in place at the time the petition was submitted are no longer relevant, while the claims regarding the current changes are not yet ripe for a decision. The Respondents are of the opinion that they should be allowed time to evaluate the effects of the changes upon passenger screening procedures. However, the Respondents expressed their commitment to continuing their efforts to reduce the offense caused to individuals by security screening procedures in the airports. According to the Respondents: “The treatment of the broad issue raised by the petition is over but not completed. The Respondents are committed to continue and persist in implementing technological solutions, while diminishing the injury caused by public exposure and the character of strict security screening” (see para. 4 of the Respondents’ notice of April 28, 2014).
10. The position of the Petitioner has consistently been that the question raised by the petition concerns the lawfulness of the use of the criterion of ethnicity as a basis for adopting differential screening methods for a specific group of Israeli citizens. In its view, this is a fundamental question. The problem in the very distinction on the basis of ethnicity will not be resolved, it argues, even if all the changes in the security procedures detailed above are fully implemented. The Plaintiff argues that even the Respondent admits that the technological and other changes will not lead to uniformity in the security procedures, and at most, they will lessen the discomfort felt by Arab citizens in the airports. The Petitioner also criticizes the HBS system itself. In its view, it is unclear what criteria are employed for deciding whether to carry out a physical inspection of hand luggage that has been scanned by the new system. According to the Petitioner, the changes adopted do not address other elements of screening that discriminate against Arab citizens, such as the inspection of the hand luggage of passengers, their pre-check-in questioning in Israel and on flights of Israeli carriers flying to Israel. In addition, the Petitioner complains of the recurring delays in the date for the planned implementation of the HBS system in Ben Gurion, and that as far as Terminal 1 and the other domestic airports are concerned, there are only intentions for future implementation of the new technology. The Petitioner also argues that it is unclear what contribution the Security Center – which provides services to government ministries and companies – makes to advancing equality between Arab and Jewish citizens of Israel in the security screening process. In addition, the Petitioner emphasizes that introducing screening devices that perform full-body scans raises significant problems, in and of itself, due to the infringement of privacy attendant to their use.
11. On Nov. 23, 2014, another hearing was held before this Court. In the course of that ex parte hearing, we were presented with classified information in regard to the changes made in the security screening procedures. In light of that information, and in light of all the developments made over the years that this petition has been pending, we are under the impression that the Respondents have gone a long way in increasing equality in the screening process. It is clear that significant efforts have been made to implement technological solutions that will limit differences in the screening process, to the extent possible, while maintaining an appropriate level of security, which is indisputably required in the field of air transport. By their very nature, such changes demand time, and are contingent upon the cooperation of many parties. As noted, the HBS technology is currently operating in Terminal 1 of Ben Gurion, which is the main hub of Israel’s air transport. That technology enables the examination of checked baggage without a need for the passenger’s presence, and while significantly reducing the public exposure that formerly characterized the screening of certain passengers. A similar system is planned for Terminal 1. While the screening process is not identical for all passengers, and some baggage undergoes greater scrutiny, the distinction is based upon technological indicators. Although recourse to the “old” screening process may occur in cases of breakdowns, that possibility is reserved for exceptional cases in which the need may arise in order to ensure the proper functioning of Ben Gurion. Changes have also been made in the domestic airports, which include the introduction of new technologies. Some of those airports are slated for relocation, and according to the Respondents, the screening procedures currently employed in Terminal 3 will be implemented at the new locations. In addition to the changes in the system for screening checked baggage, scanning gates will be employed to reduce the need for the physical inspection of passengers. Those changes are in addition to earlier technological changes in the screening procedures at the vehicle entrance of Ben Gurion and at the entrances to the passenger terminal.
12. Under these circumstances, we are of the opinion that, at present, the petition has exhausted itself (and compare: HCJ 2467/05 Gorenberg v. Director of the IDF and Defense Establishment Archives (Jan. 13, 2010); HCJ 1254/10 Anonymous v. Population, Immigration and Border Crossing Authority – Ministry of the Interior (April 4, 2012); HCJ 3091/99 Association for Civil Rights in Israel v. Knesset (May 8, 2012)). The Petitioner’s claims in regard to the screening procedures prior to the introduction of the HBS system and the other changes have been rendered superfluous. Looking to the future, it is as yet too early to evaluate the effect of those changes upon the extent of harm to individual rights involved in the screening process. We must wait and see whether the significant changes introduced will, indeed, help reduce expressions of distinction among different groups of Israeli citizens in the airport screening process. We should note that the case before us is not one in which the authorities have sat on their hands and refrained from correcting a situation that poses an unnecessary infringement of individual rights. The Respondents are aware of their responsibility to address this issue, and expressed their intention to implement and initiate additional changes in the screening process, which are intended to contend with the problems raised in the petition. We are of the opinion that the authorities should be permitted to complete their work and collect data in regard to the effect of the changes that have been implemented, before subjecting the fundamental questions to judicial review.
13. We are aware of the Petitioner’s stance that any distinction between Israeli citizens that is based upon ethnicity – even if it is “behind the scenes” and not visible – infringes human dignity, equality, freedom of movement and privacy. As opposed to that, the alternative of strict, uniform screening of all passengers also raises significant problems, and according to the Respondents, such screening cannot be implemented without causing extreme harm to the proper functioning of the airports and to the effectiveness of security screening. Finding the appropriate balance between the need for the security of air transport and the reasonable functioning of the airports, and protecting individual rights is a particularly difficult task. We must bear in mind that an act of terrorism carried out against an airplane may result in the loss of many lives. Israel is not the only country faced with this challenge, although it cannot be denied that it also faces certain unique problems due to the nature of the security threats with which it must contend. For the reasons stated above, we are not ruling upon the fundamental issue at this time. If, in the future, the Petitioner finds that the changes instituted have not brought about the desired result, and that the distinction – particularly the public distinction – among Israeli citizens persists in the airports, the Court’s gates will remain open. That will also be the case if the implementation of the planned changes in the airports does not proceed at a reasonable pace, in accordance with the timetable presented by the Respondents.
14. The petition is, therefore, dismissed without prejudice. In light of the important contribution of the petition to advancing the changes in the field of security procedures in Israeli airports, the Respondents will pay the Petitioner’s costs in the amount of NIS 30,000.
2. Indeed, as my colleague has shown, the Respondents are striving to improve screening in this regard in various ways. The Respondents should be encouraged in every way to continue in those efforts to the extent possible. As a Jewish and democratic state, we should be particularly sensitive. As stated, I concur with my colleague.
Decided as stated in the opinion of Chief Justice (ret.) A. Grunis.
Given this 19th day of Adar 5775 (March 3, 2015).
|
0.999988 |
How Long Would it Take to Walk Across the Sun?
I was watching this video and thought “How long would it take to walk around the sun?” And, how long would it take to walk around the Earth.
Circumference of the sun: 2,713,406 miles.
Circumference of Earth: 24,901 miles.
Average hiking speed is 2-3 miles per hour. Since these are going to be huge numbers and it is improbable that anyone would ever be able to set foot on the sun, or walk across an ocean, we are taking some liberties. The first one is average hiking speed. We will say 2.5 miles / hour.
How long does it take to hike around Earth?
24,901 miles / 2.5 mph = 9960.4 hours.
9960.4 hours / 24 hours per day = 415 days. Now that is hiking 24 hours per day. Let’s try the 8 hours / day.
9960.4 hours / 8 hours per day = 1245 days.
1245 days / 365 days per year = 3.4 years.
Well… how does that compare to the first person to ever walk across the Earth?
This guy walked 14,450 miles around the Earth, flying over the oceans. It took about 4 years. Sadly, his brother, who joined him for the journey, was shot and killed by bandits in Afghanistan. It is a compelling story and worth the short reading.
Ideal conditions might take you 3.4 years to walk across the circumference of Earth, with no days off. No days of rest. No sleeping off the hangover from fermented mare’s milk. No vacation. No sick days. But, if you just hiked weekdays (5 days / week & 52 weeks = 260 days / year. 1245 days / 260 days hiking per year = 4.8 years. This is more realistic. Let’s use this formula for hiking around the sun.
How long does it take to hike around the Sun?
2,713,406 miles / 2.5 mph = 1,085,362 hours.
1,085,362 hours / 8 hours per day = 135,670 days.
135,670 days / 260 day hiking per year (you know, weekends off, sick days, et cetera) = 521.8 years.
15. Great great great great great great great great great great great great grand child. Yeah! Back where we started.
Might make better sense to have two children and send them off in opposite directions. Nearly the same result… only in half the time.
|
0.999915 |
What are some of the factors that led to your decision to enter the seminary and discern the question of a vocation to the priesthood?
I was lead to the priesthood by frequenting the sacraments and by cultivating a discipline of quiet prayer. The sacrament of reconciliation created a sacramental context in which to experience the priesthood in a sort of inter-personal dialogue, and I think that this helped me to form a ministerial consciousness. I also had good priestly models from the parish clergy. All of these factors culminated in a healthy deliberation on the possibilities of where God was drawing me.
It is always an oversight not to consider the authors who shape out thinking. Therefore, I would say priest-authors like Athanasius of Alexandria, François de Sales, and John Henry Newman influenced me. My family and parish clergy were also instrumental in my considerations inasmuch as they were always positive and supportive in the pursuance of my vocation. I would also count the parishioners within the ranks of those who helped me arrive at some understanding of my vocation. The ecclesial life within the many parishes that I have belonged was certainly a help in making me understand the socio-aggregative role of God’s minister. I would also count Saint Philip Neri among the people who interceded for me and encouraged me by his saintly example.
The role of prayer is to help the seminarian to draw closer to God just like any Christian. However, in the seminarian's case, prayer helps to assess the value of his experience in the seminary in a considered, serene, cumulative way. Prayerful consideration confers a new level of intelligibility that is not really from us, yet made clearer to us. The seminarian must pray in order to gain the spiritual sustenance necessary to persevere in the seminary, but more importantly, to survive in the parishes as a minister of God. When prayer (inasmuch as it can be a discipline) becomes habitual, it becomes a part of your life that you feel dependent upon to see where and how God is drawing us to a life of charity. God uses instruments to to make his paths known to us, but prayer makes the instruments as divinely posited better known to us.
Find a good priest mentor, establish a daily routine of quiet prayer, only take advice from wise friends, frequent the sacrament of reconciliation, and enjoy the good things that God has set before you in your youth. I would also recommend reading many of the great Christian Classics. Be open to the possibility that God may be calling you to other things. Time at the seminary often has the effect of recalibrating our ability to clearly focus on our true vocation. In short, you can’t really waste your time in trying out the seminary or asking God to draw you to a better situation.
I really enjoy being in school and learning about things to have direct relevance to what I aspire to do and be. I am happy to say that I live with very good people and that this has enriched my life. I do think that the seminary is a social laboratory in the best sense of the word. At the seminary, we come to understand human nature as it is subjected to the routines of a healthy regimen for mind and soul. There are many fine discussions to be had here for sure. Our observations of the communal landscape provide us with the opportunity to arrive at a better insight as to the various ways in which God discloses himself to others.
I think that people see as challenges the length of time until ordination, the future of our institutions, the moral certitude involved in assuming the onus of the priesthood. One may perhaps find the external surroundings of the clerical life in such a monumental facility a little uninviting to say the least. Someone might not be able to picture themselves leading the quasi-regimented life as it presents itself in its particular instantiation at the seminary. Someone might not have a moral support structure from his family or friends. All of these perceived barriers challenge our courage to go forward.
I like to read and watch an occasional film. I must admit that I am at loss to answer this question, as the boundaries between leisure and duty seem to coalesce very often in my activities. I’m am one of those people who actually enjoy reading material which is coincidentally similar in genre to the reading that we are required to do in school. I understand “hobby” to be any solitary activity one cultivates in order to pass the time in a leisurely way. I don’t have any trouble filling my time with the things that I am supposed to do, let alone with things that I would freely choose to do in my spare time. In short, my pastimes are spent recuperating from my labours through rest, bicycling, reading, or watching films.
I think that the Archdiocese is doing a good job at the central level. At the central level, I’m not sure that much more can be done that is not already being done. Pastors are the ones who can make the best impression of the men in the parish, so it might be the parish clergy who would invest time and consideration in their own men. It is a an invaluable asset to have a priest who demonstrates his unwavering support for a man who expresses interest in the priestly ministry.
|
0.949331 |
World music is a musical category encompassing many different styles of music from around the world, including traditional music, neotraditional music, and music where more than one cultural tradition intermingle. World music's inclusive nature and elasticity as a musical category pose obstacles to a universal definition, but its ethic of interest in the culturally exotic is encapsulated in Roots magazine's description of the genre as "local music from out there". The term was popularized in the 1980s as a marketing category for non-Western traditional music. Globalization has facilitated the expansion of world music's audiences and scope. It has grown to include hybrid subgenres such as world fusion, global fusion, ethnic fusion and worldbeat.TerminologyThe term has been credited to ethnomusicologist Robert E. Brown, who coined it in the early 1960s at Wesleyan University in Connecticut, where he developed undergraduate through the doctoral programs in the discipline. To enhance the process of learning, he invited more than a dozen visiting performers from Africa and Asia and began a world music concert series. The term became current in the 1980s as a marketing/classificatory device in the media and the music industry. There are several conflicting definitions for world music. One is that it consists of "all the music in the world", though such a broad definition renders the word virtually meaningless. The term also is taken as a classification of music that combines Western popular music styles with one of many genres of non-Western music that are also described as folk music or ethnic music. However, world music is not exclusively traditional folk music. It may include cutting edge pop music styles as well. Succinctly, it can be described as "local music from out there", or "someone else's local music". It is a very nebulous term with an increasing number of genres that fall under the umbrella of world music to capture musical trends of combined ethnic style and texture, including Western elements (examples noted in this section).
|
0.999994 |
Richard Le Manz es un fotógrafo español nacido en Toledo y afincado en León desde hace más de dos décadas, cuyo trabajo gira alrededor de contar historias reales e imaginadas. Reales tejiendo historias de los lugares, paisajes y culturas más extraordinarias; e imaginadas utilizando la fotografía para explorar e indagar en la relación humana con la naturaleza, a medio camino entre la visión y la creatividad.
Aficionado a la pintura en su adolescencia, ingeniero de formación y apasionado de los viajes; Richard tiene su primer contacto con la fotografía en 2013 y retoma su dormida faceta artística de sensibilidad y percepción visual. Inicia una carrera de rápido aprendizaje y evolución convirtiéndose pronto en un fotógrafo emergente inspirador, en palabras de prestigiosas personalidades de la industria fotográfica. En su corta andadura Richard a recibido numerosos premios nacionales e internacionales por su trabajo.
Richard ha viajado por más de 30 países, comenzando su carrera con el frenesí e impulso de la curiosidad del descubrimiento, de los viajes, de otras culturas, de nuevas experiencias, de paisajes sublimes, y en este frenesí el llevar la cámara consigo traslada al artista a una implicación mucho mayor con esos lugares, con esas gentes, con esas experiencias a las que de forma mágica la cámara hace de alguna manera inmortal.
Durante este camino, Richard ha tratado de ir más allá de la mera representación, modular la distracción contemplativa buscando un poco más dentro de el mismo, incorporando a su trabajo la imaginación y la creatividad, sumando a su trayectoria la exploración y libertad de las propias ideas.
Richard progresivamente ha ido trasladando la fascinación por la naturaleza, por sus paisajes, por sus inmensidades, por sus elementos, modulando esa visión romántica e idealizada para construir una nueva visión a medio camino entre el romanticismo y la búsqueda de nuevos lenguajes, nuevas técnicas. Ver hacia fuera, pero también hacia dentro, visión y creatividad, para construir imágenes atemporales que se asomen a la belleza y al sentimiento.
Richard incorpora a su trabajo toda su creatividad incluyendo también los objetos, buscando en ellos las respuestas a sus propias preguntas. Este nuevo estilo bautizado por algún autor como “filografía” (philography), “filo” de filosofía y “grafía” de fotografía, busca hacer filosofar sobre lo que hay detrás de cada imagen, busca conmover y mover al ser humano que cada uno llevamos dentro. Así nace su primer gran proyecto que sigue en evolución “Hábitat, más allá de la fotografía” introduciendo un nuevo significado a elementos internos de los motores de explosión.
Actualmente disfruta y se encuentra a medio camino entre la visión romántica de nuestro planeta, tratando de mostrar lo increíblemente bello, diverso, frágil, y armónico que es nuestro mundo, y la búsqueda de nuevos lenguajes para en ambos casos expresar, trasmitir sentimientos de respecto y preservación por nuestros hábitats. Mezclando la fotografía de paisaje y la conceptual para tejer historias reales o imaginarias.
En el plano más solidario, Richard es principal impulsor del proyecto solidario ww.nepalwillriseagain.com donde se unió la solidaridad y fotografía en un gran proyecto de ayuda a las víctimas del terremoto ocurrido en Nepal en 2015. Numerosas actividades tuvieron lugar en el año 2015 y 2016.
Richard Le Manz is a Spanish photographer; whose work revolves around telling real and imaginary stories. Real ones, weaving stories of the most extraordinary places, cultures and sceneries; and imaginary, using photography to explore and look into human relationship with nature, halfway between vision and creativity.
Painting enthusiast in his teenage years, with a background in engineering and a passion for traveling; Richard has his first contact with photography in 2013 and resumes his sleeping artistic facet of sensitivity and visual perception. He began a fast learning and evolution career path, soon becoming an inspiring emerging photographer, as described by prestigious personalities within the photographic industry. In his short career Richard has received numerous national and international awards for his work.
Richard began his journey around 30 countries, starting his career with the frenzy and impulse of the curiosity about discovery, travel, other cultures, new experiences, sublime sceneries, and in this craze, taking the camera along with him led the artist to a much greater involvement in those places, people and experiences that somehow magically make the camera immortal.
During this journey Richard has tried to go beyond mere representation, to modulate the contemplative distraction, looking a little deeper than oneself, incorporating his imagination and creativity into his work, adding to his path the exploration and freedom of the his own ideas.
Richard has been taking the fascination for nature, for its landscapes, for its immensities, for its elements, modulating that romantic and idealized vision, to build a new vision halfway between romanticism and the search for new languages, new techniques. Seeing outward, but also inward, vision and creativity, to build timeless images that showcase beauty and feeling.
Richard incorporates all his creativity into his work, including the objects, searching within them the answers to his own questions. This new style, called by some author "philography", "philo" as in philosophy and "graphy" as in photography, seeks to philosophize about what is behind each picture, to touch and move the human being that each one of us holds within. This is how his first great project came about. This project that is still evolving "Habitat, beyond photography" introduces a new meaning to internal elements of the combustion engines.
He currently enjoys and is halfway between the romantic vision of our planet, trying to show how incredibly beautiful, diverse, fragile, and harmonious our world is, and the search for new languages to at the same time express, transmit feelings of respect and preservation towards our habitats. Mixing landscape photography and conceptual photography to weave real or imaginary stories.
In a more humanitarian plane, Richard is the main promoter of the support project ww.nepalwillriseagain.com where solidarity and photography joined together in a large project to help the victims of the earthquake that took place in Nepal in 2015.
|
0.999999 |
What is calendula herb used for?
Calendula herb is used to treat inflammation, rashes, scars, and eczema. It is also used to treat menstrual cramps and stomach ulcers. It is also effective in removing dandruff and increasing collagen production. Calendula is known to have an antimicrobial and antiseptic properties which helps in reducing acne and blemishes.
|
0.9793 |
Can the new Canon 5D Mk III beat its older brother?
The Canon EOS 5D Mark II was announced way back in September 2008. Its replacement, the Canon EOS 5D Mark III, announced on 2 March, features a 22-megapixel full-frame sensor.
The EOS 5D Mark II has a 21MP full-frame sensor, so Canon has added one million pixels to the new DSLR. Is that it? What's Canon been doing all this time?
Quite a lot, as it happens. The resolution, and that tiny 1MP increase, is the least significant aspect of the EOS 5D Mark III's improvements.
Pixel counts continue to make headlines, but most professionals would probably agree that 20MP is enough. The 36MP Nikon D800 might have caused a bit of a storm, but for many practical, professional purposes, the Canon 5D Mark II's resolution was not the problem.
The Canon EOS 5D Mark II has a maximum sensitivity of ISO 6400, expandable to ISO 25600.
The sensor in the Canon EOS 5D Mark III is all-new, though, and has an increased ISO range. The Mark 3 camera has a maximum sensitivity setting of ISO 25600, expandable right up to ISO 102400. That's a whole two stops more, both in the normal and expanded ISO range.
Few would fault the image quality of the Canon EOS 5D Mark II, but the Canon EOS 5D Mark III goes further, not by increasing the number of pixels, but by including a number of features designed to improve sharpness, reduce lens aberrations and handle extra high contrast lighting.
Not all lenses live up to the legendary reputation of Canon's L-series glassware such as the Canon EF 100mm F2.8 L Macro IS USM lens, but the EOS 5D Mark III brings in-camera correction for peripheral illumination (vignetting, or corner shading, in other words) and both lateral and axial chromatic aberration.
And the Digital Photo Professional 3.1.1 software bundled with the MK 3 camera incorporates a new Digital Lens Optimizer designed to correct a range of aberrations and counteract the effect of the sensor's low pass filter, delivering new, higher levels of resolution.
The Canon EOS 5D Mark III also incorporates an HDR mode that combines three separate exposures and applies one of five different tone maps to suit the conditions you're shooting in and the effect you're looking for.
The Canon EOS 5D Mark II might have been ahead of its time, but its autofocus system wasn't. Its simple 9-point AF system, plus 6 Assist AF points, was adequate, but only just.
The Canon EOS 5D Mark III, however, uses the same advanced 61-point wide-area autofocus system as the Canon EOS-1DX. This incorporates 41 cross-type AF sensors and five dual cross-type sensors, together with the autofocus presets introduced with the Canon EOS-1DX. These quickly set the camera up for optimum AF performance in six key autofocus situations, or 'Cases'.
And Canon's new iTR (Intelligent Tracking and Recognition) system uses colour information and face recognition to improve the reliability and speed of its focus tracking.
The Canon EOS 5D Mark II offers 35-zone Evaluative, Centre-weighted, Partial and Spot metering systems.
The Canon EOS 5D Mark III's Evaluative mode uses a new 63 zone dual-layer sensor that responds more reliably to different colours and forms part of Canon's latest iFCL (Focus, Color, Luminance) exposure system, first seen in the Canon EOS 7D, which also uses focus point information to arrive at the correct exposure.
This is a much more sophisticated system than the Canon EOS 5D Mark II's, although exposure metering is a skill that also relies heavily on the photographer's familiarity with the camera's metering system, so photographers who've learned to get good results with the Canon 5D Mark II may need to relearn the exposure system in the Mark III.
The Partial and Spot metering modes on the 5D Mark III are more precise than the old camera's, too. Partial mode measures 6.2% of the scene (8 per cent in the 5D Mark II), while spot mode measures 1.5% (3.5% in the 5D Mark II).
Speed was not one of the Canon EOS 5D Mark II's strong points, with a maximum continuous shooting speed of 3.9fps and a buffer capacity of 310 JPEGs (with a UDMA card) and 13 raw files.
The 5D Mark III beats that easily, thanks to Canon's latest DIGIC 5+ processor, shooting at 6fps for 16270 JPEGs - indefinitely, in other words - although if you're shooting raw files the maximum capacity of 18 shots provides a smaller advantage over the 5D Mark II than many might be expecting.
In any event, the combination of higher frame rates, greater capacity and much faster autofocus mean the Canon EOS 5D Mark III is much better suited to fast action photography than the Canon EOS 5D Mark II ever was.
The Canon EOS 5D Mark II has already carved out a reputation as the best DSLR movie camera available, and because it already shoots video in Full HD, the Canon EOS 5D Mark III might not offer any obvious advantage.
However, Canon claims that the combination of the new sensor and DIGIC 5+ processor "virtually eradicates" moire, false colour and other artefacts.
SMPTE timecode support makes the Canon EOS 5D Mark III easier to use in professional, multi-camera shooting situations. And professional sound quality will be much easier to achieve, thanks to an external headphone socket - an essential feature for video pros. It's also possible to trim movie clips in the camera.
The price of these cameras could prove an issue, possibly even a deciding one. The Canon EOS 5D Mark III will go on sale for £3,000 in the UK or $3,500 in the US for the body only, whereas the Canon EOS 5D Mark II is currently on sale for just £1,700, or $2,200.
Even at launch, the 5D Mark II was considerably cheaper, at £2,300, or $3,000.
At first glance, the Canon EOS 5D Mark III might seem like a pretty modest upgrade of the old Canon EOS 5D Mark II. But it boasts a number of very important improvements, including the autofocus and metering systems, enhanced filming capabilities, high ISO capability and continuous shooting speed.
These might not grab headlines in the same way as a big jump in pixels, but they perfectly address the Canon EOS 5D Mark II's deficiencies without trying to fix what didn't need fixing.
However, the Canon EOS 5D Mark III isn't just more expensive, it's in danger of moving into a different price bracket. What made the Canon EOS 5D Mark II so appealing was that it was an affordable step into professional-quality full-frame photography for amateurs. The Canon EOS 5D Mark III, however, may be a step too far.
|
0.999998 |
How do you get them ready for the trails? Nature walks, for starters, but also hiking boots that can handle all types of terrain, including slippery and rocky sections. A solid beginner shoe, this mid-height hiker supplies them with the essentials: a breathable yet supportive feel, waterproof protection, sturdy traction, and just enough ankle support.
|
0.999995 |
Prepare a 100-word paragraph from the team (to include input from the teacher, technical advisor and the students) on how teaming progressed throughout the program duration.
Like a hive full of bees, our team diligently worked week after week to create a solution to the real world problem of spent nuclear fuel. The basis of our team’s success was our excellent communication. Throughout our project, our team was able to relay new ideas effectively, which allowed us to synthesize ideas together to create our elegant solution. But unlike our communication, our teamwork could have been better. While our veteran members efficiently worked together, some of the newer members did not collaborate as well. Our team leader also found it infuriating that an assignment had to be distributed more than once. This caused frustration among members, and in turn, resulted in the team lagging behind in the overall project.
Prepare a 100-word paragraph from the team on what they learned about researching and innovating a solution to a real world problem throughout the program's duration.
Nuclear science is a very broad and in-depth subject to research. Our team had to gather a multitude of background information before we were even able to specify a product. It was difficult at times to find current information and we frequently found that we had to discard previous research due to a discovery of more updated data. Some of the information was not publicly available due to the danger associated with nuclear power. As we accumulated knowledge on nuclear technologies, we advanced towards being able to conceptualize our product. Our extensive investigations proved to be imperative in developing the unique twist that made our product original.
Initially, our team believed research on this topic to be very complex and overwhelmingly time consuming, but as our project progressed to its later stages, we became research experts that were able to skim over irrelevant information to discover valuable knowledge.
Procrastination was at one point in our development a primary issue, but as the dead line approached and mutual frustration grew, team members began taking the initiative to submit completed work in a timely manner.
Communication between team members is essential for success. We often found that unless we worked together, progress was going to go slower, much slower. In order to become more efficient in our work, we quickly adapted to become a team that could accumulate knowledge together and move towards a common goal.
|
0.999233 |
For each of the following questions, consider your own answer. Then compare it with the results of a national poll of Americans conducted by the Pew Research Center and Smithsonian magazine. the questions are taken from the script used by the interviewers. Other questions and more detail on the answers are available in the report.
"Now I have a few questions about the future. Some books and movies portray a future where technology provides products and services that make life better for people. Others portray a future where technology causes environmental and social problems that make life worse for people. How about you? Over the long term, you think that technological changes will lead to a future where people’s lives are mostly better or to a future where people’s lives are mostly worse?"
The overall response is 59% think technology will mostly make people's lives better, while 30% think it will mostly make people's lives worse. To me, the notion that almost one-third of Americans think future technology is mostly a negative is startling and unwelcome. Men are more likely to think that technology will make lives mostly better (67%) than are women (51%). Those with a college education are more likely to think that technology will make lives mostly better (66%) than are those who have not completed a college education (56%).
Next, here are some other things that might happen in the next 50 years. For each, tell me if you think it would be a change for the better or a change for the worse if this happens. How about [INSERT ITEMS; RANDOMIZE]?
d. If prospective parents can alter the DNA of their children to produce smarter, healthier, or more athletic offspring.
A majority believes that all four of these would be a change for the worse. The least unpopular is wearing implants or devices, with 53% saying it would be a change for the worse. For the other three, between 63-66% think it would be a change for the worse.
The report notes: "Men and women have largely similar attitudes toward most of these potential societal changes, but diverge substantially in their attitudes toward ubiquitous wearable or implantable computing devices. Men are evenly split on whether this would be a good thing: 44% feel that it would be a change for the better and 46% a change for the worse. But women overwhelmingly feel (by a 59%–29% margin) that the widespread use of these devices would be a negative development."
Next, here are some things that people might be able to do in the next 50 years. For each, tell me if this were possible, would YOU PERSONALLY do this... (First,) Would you [INSERT ITEMS; RANDOMIZE]?
This question struck me as a little odd, because the 50-year horizon seems pretty far away. The first hamburger grown from stem cells in a lab was served in August 2013 in London, and cost about $335,000. But the possibility of factory meat production at commercial prices may be only a few years away, and growing meat in a lab involves far less use of energy, water, and land than does agricultural production. Driverless cars have been on the roads on an experimental basis for a few years now. While we don't yet have brain implants, we do have computers and smartphones that many of us use all the time in ways that may actually be altering how we use memory and mental capacity.
About half of people would be willing to try a driverless car--and it's interesting to me that about half say they would not. From the report: "College graduates are particularly interested in giving driverless cars a try: 59% of them would do so, while 62% of those with a high school diploma or less would not. There is also a geographical split on this issue: Half of urban (52%) and suburban (51%) residents are interested in driverless cars, but just 36% of rural residents say this is something they’d find appealing."
People are more opposed to eating meat from a lab (78% would not) than they are to a memory brain implant (72% would not). Apparently, there are people out there who are willing to have brain implants if only they can eat a cow-sourced cheeseburger while doing it. College graduates stand out here as more willing to experiment, with 37% of them would be willing to get a performance-enhancing brain implant if given the chance, and 30% willing to try lab-grown meat. There may be a commentary here, both positive and negative, on what we are teaching college graduates.
Public attitudes toward new technology are of course malleable over time. Many people in the past might well have opposed having electrical wires running through homes, for example. But public attitudes shape attitudes toward support of research and development and whether new technologies will have to face extensive regulatory hurdles. Because new companies are chasing consumer dollars, people's attitudes determine which technologies will be pursued with greater intensity and, ultimately, what new technologies will succeed.
|
0.995408 |
I have good news for action RPG fans: free-to-play ARPG Path of Exile is “about six months away” from an official version 1.0 release. The game has been in open beta since January, and has surged in popularity to roughly 2 million registered players. The full release six months from now will add a new act, new monsters, new gear, and various other additions that had to be cut to prepare the game for open beta.
You can find more information about this dark ARPG and its frightening skill tree on the official website, pathofexile.com.
|
0.905781 |
Prime-time viewership numbers compiled by Nielsen for June 16-23. Listings include the week's ranking and viewership.
1. NBA Finals: San Antonio vs. Miami (Game 7), ABC, 26.32 million.
2. NBA Finals: San Antonio vs. Miami (Game 6), ABC, 20.64 million.
3. "The Voice" (Tuesday), NBC, 15.6 million.
4. "The Voice" (Monday), NBC, 12.68 million.
5. "America's Got Talent" (Tuesday), NBC, 11.75 million.
6. "Skywire Live with Nik Wallenda � The Walk," Discovery, 10.65 million.
7. "60 Minutes," CBS, 8.41 million.
8. "NCIS," CBS, 8.13 million.
9. "The Big Bang Theory," CBS, 7.66 million.
10. "Winner Is," NBC, 6.69 million.
11. "NBA Countdown to Game 7," ABC, 6.56 million.
12. NHL Stanley Cup Final: Chicago at Boston (Game 4), NBC, 6.46 million.
13. "CSI: Crime Scene Investigation," CBS, 6.41 million.
14. "Skywire Live with Nik Wallenda � Before the Walk," Discovery, 6.25 million.
15. "NCIS: Los Angeles," CBS, 6.03 million.
16. "American Baking Competition," CBS, 5.8 million.
17. "Two and a Half Men," CBS, 5.799 million.
18. "Criminal Minds," CBS, 5.78 million.
19. "Master Chef" (Wednesday, 9 p.m.), Fox, 5.777 million.
20. "Person of Interest," CBS, 5.768 million.
ABC is owned by The Walt Disney Co.; CBS is a division of CBS Corp.; Fox is a unit of News Corp.; NBC is owned by NBC Universal; Discovery is owned by Discovery Communications, Inc.
|
0.968136 |
How does an automatic gearbox know when to change gear?
5 speed automatic transmission still have five gears. 1–2–3–4–5. One being the gear you use at slow speeds and 5 being the gear you use at high speeds. The transmission chooses the right gear for you to be in based on the how you are driving your car. Trucks will often have a tow switch that locks out the top overdrive gear for towing heaving loads.... In an automatic transmission, however, the gears are never physically moved and are always engaged to the same gears. This is accomplished through the use of planetary gear sets. This is accomplished through the use of planetary gear sets.
5 speed automatic transmission still have five gears. 1–2–3–4–5. One being the gear you use at slow speeds and 5 being the gear you use at high speeds. The transmission chooses the right gear for you to be in based on the how you are driving your car. Trucks will often have a tow switch that locks out the top overdrive gear for towing heaving loads.
Vacuum states are generally interpereted as low load, off-throttle or generally as situations suited for higher gears. As the throttle opens, the transmission will tend to gear down. As the governor speeds up, the lower gears cease to be an option.
|
0.989914 |
Who knew oatmeal could taste so good? Follow this recipe for a healthy and quick vegan breakfast idea. The oats provide lots of fiber and the peanut butter adds a healthy dallop of protein as well as a textured crunch. If you want a quick and easy vegetarian and vegan whole foods breakfast idea, just try adding peanut butter to your oatmeal. Yum! Just try it!
Bring the water to a slow boil and add oats. Stirring occasionally, allow to cook for about 5 minutes, until oats are soft and slightly fluffy. Or, microwave oats in water for about 3 minutes, until finished cooking.
Add peanut butter and stir well. The heat will melt the peanut butter slightly, so it will be easy to combine.
Reeses peanut butter cups taste better.
|
0.998229 |
In the U.S., it's easy – and fairly inexpensive – to send one's DNA away for testing to learn more about one's ancestry, disease predisposition, and traits. I know that at least one company (23andMe) tests for Neanderthal DNA. It's incredible that technological advances have made so much information available to us. Of course, there are differing perspectives on whether or not getting one's DNA tested is worthwhile, wise, etc.
I suspect many people have only a basic understanding of how DNA testing this works and what the connection is between evolution and genetics (how can a modern human have Neanderthal DNA?). For the biology or genomics lovers out there, how would you answer the question: How are genetics and evolution related?
|
0.999902 |
The Lew Electric PUR20-OW is a round, spill proof, retractable countertop pop-up power outlet that hides in kitchen countertops, or any worktop surface, and offers protection from liquids. Press the top and pull-up the outlet to gain access to the plugs. When the outlet is not needed, the unit disappears under the counter. The circular top is slightly off white with chrome trim. The white color matches white appliances, and white stone countertops without being too bright.
The Lew Electric PUR20-B is perfect for any countertop location, as well as kitchen islands. It can be used in potentially wet locations requiring recessed power such as pantries, closets, garage work benches, bars, and varied uses at airports, hotels and restaurants. Use the pop up to power small appliances such as coffee makers, blenders, toaster ovens, warming trays, and other items. It can also be used for charging mobile devices such as tablets and phones with an appropriate adapter. The pop up can be installed in granite, quartz, marble, wood, laminate, concrete, or any surface up to 2 3/16” thick, that you can cut the required 3.75” hole.
What outlet does this need plugged into?
The pop up needs to be plugged into a 20A outlet.
|
0.999913 |
Digital marketing is the best approach that you can attain your marketing goals and objectives. The use of digital marketing techniques is contributed by the advancement in technology and migration of the market to the digital platform. If you use the digital techniques, you will be sure of higher visibility and sales. Digital marketing is more challenging as compared to the traditional forms. For that reason, it is important to hire experts to help with the implementation of digital marketing strategies. The most suitable means is usually hiring the digital marketing agencies. The demand for the services has led to the emergence of several agencies and thus choosing the most suitable on can be challenging unless you employ certain important tips. By reading the article herein, you will learn some of the tips for choosing the most suitable digital marketing agency.
The first tip that you should employ is checking the services that are offered by the agency about digital marketing. Digital marketing involves the use of different tools and the most common is the website. Therefore, you should ensure that the digital marketing agency offers services such as web development and design, optimization, and maintenance. In the end, you will not have to worry about hiring other companies so that you can realize your digital marketing goals.
The next tip that you should employ when choosing a digital marketing agency is the experience. The agency should be well-established so that you can be sure about the experience of the workforce. During the period of existence, it should have helped other business organizations in realizing their digital marketing goals and objective. It, therefore, means that you should focus on establishing the reputation of the agency. The agency should enjoy positive reviews from the previous clients so that you can be sure about the reputation. You should also check the performance of the organizations that it has rendered the digital marketing services.
|
0.953391 |
When you have lost half of your total weight-loss goal, you make the transition to five to six days of menus that include Jenny Craig foods and one to two days of your own foods. Alcoholic distillates were also occasionally used to create dazzling, fire-breathing entremets a type of entertainment dish after a course by soaking a piece of cotton in spirits. I get asked all the time about a stall on the keto diet too. Perhaps as a consequence of the Norman conquest and the travelling of nobles between France and England, one French variant described in the 14th century cookbook Le Menagier de Paris was called godale most likely a direct borrowing from the English "good ale" and was made from barley and spelt , but without hops. These devices are meant to be used along with a weight-loss option. These prices are subject to change at any time. Does the program emphasize balanced food choices and exercise?
At major occasions and banquets, however, the host and hostess generally dined in the great hall with the other diners. However, it can be assumed there were no such extravagant luxuries as multiple courses , luxurious spices or hand-washing in scented water in everyday meals.
Forks for eating were not in widespread usage in Europe until the early modern period , and early on were limited to Italy. Even there it was not until the 14th century that the fork became common among Italians of all social classes.
Before that the pastry was primarily used as a cooking container in a technique known as ' huff paste '. Extant recipe collections show that gastronomy in the Late Middle Ages developed significantly. New techniques, like the shortcrust pie and the clarification of jelly with egg whites began to appear in recipes in the late 14th century and recipes began to include detailed instructions instead of being mere memory aids to an already skilled cook. In most households, cooking was done on an open hearth in the middle of the main living area, to make efficient use of the heat.
This was the most common arrangement, even in wealthy households, for most of the Middle Ages, where the kitchen was combined with the dining hall.
Towards the Late Middle Ages a separate kitchen area began to evolve. The first step was to move the fireplaces towards the walls of the main hall, and later to build a separate building or wing that contained a dedicated kitchen area, often separated from the main building by a covered arcade. This way, the smoke, odors and bustle of the kitchen could be kept out of sight of guests, and the fire risk lessened. Many basic variations of cooking utensils available today, such as frying pans , pots , kettles , and waffle irons , already existed, although they were often too expensive for poorer households.
In wealthy households one of the most common tools was the mortar and sieve cloth, since many medieval recipes called for food to be finely chopped, mashed, strained and seasoned either before or after cooking. This was based on a belief among physicians that the finer the consistency of food, the more effectively the body would absorb the nourishment.
Microbial modification was also encouraged, however, by a number of methods; grains, fruit and grapes were turned into alcoholic drinks thus killing any pathogens, and milk was fermented and curdled into a multitude of cheeses or buttermilk. The majority of the European population before industrialization lived in rural communities or isolated farms and households. The norm was self-sufficiency with only a small percentage of production being exported or sold in markets. Large towns were exceptions and required their surrounding hinterlands to support them with food and fuel.
French cardinal Jacques de Vitry 's sermons from the early 13th century describe sellers of cooked meat as an outright health hazard. The stereotypical cook in art and literature was male, hot-tempered, prone to drunkenness, and often depicted guarding his stewpot from being pilfered by both humans and animals. In the early 15th century, the English monk John Lydgate articulated the beliefs of many of his contemporaries by proclaiming that "Hoot ffir [fire] and smoke makith many an angry cook.
Meats were more expensive than plant foods. Though rich in protein , the calorie -to-weight ratio of meat was less than that of plant food.
Meat could be up to four times as expensive as bread. Fish was up to 16 times as costly, and was expensive even for coastal populations. This meant that fasts could mean an especially meager diet for those who could not afford alternatives to meat and animal products like milk and eggs. It was only after the Black Death had eradicated up to half of the European population that meat became more common even for poorer people. The drastic reduction in many populated areas resulted in a labor shortage, meaning that wages dramatically increased.
Plain milk was not consumed by adults except the poor or sick, being reserved for the very young or elderly, and then usually as buttermilk or whey. Fresh milk was overall less common than other dairy products because of the lack of technology to keep it from spoiling. However, neither of these non-alcoholic social drinks were consumed in Europe before the late 16th and early 17th century. Wine was commonly drunk and was also regarded as the most prestigious and healthy choice.
In England , the Low Countries , northern Germany , Poland and Scandinavia , beer was consumed on a daily basis by people of all social classes and age groups. For most medieval Europeans, it was a humble brew compared with common southern drinks and cooking ingredients, such as wine, lemons and olive oil.
In , the Sienese physician Aldobrandino described beer in the following way:. But from whichever it is made, whether from oats, barley or wheat, it harms the head and the stomach, it causes bad breath and ruins the teeth , it fills the stomach with bad fumes, and as a result anyone who drinks it along with wine becomes drunk quickly; but it does have the property of facilitating urination and makes one's flesh white and smooth. The intoxicating effect of beer was believed to last longer than that of wine, but it was also admitted that it did not create the "false thirst" associated with wine.
See, Play and Learn No links available. Research Clinical Trials Journal Articles. Resources Find an Expert. Instead, vegetarian eating patterns usually fall into the following groups: The vegan diet, which excludes all meat and animal products The lacto vegetarian diet, which includes plant foods plus dairy products The lacto-ovo vegetarian diet, which includes both dairy products and eggs People who follow vegetarian diets can get all the nutrients they need. United States Department of Agriculture.
|
0.898579 |
What makes New Guinea so special? The world’s largest tropical island, it boasts a spectacular avifauna characterized by cassowaries, megapodes, pigeons, parrots, cuckoos, kingfishers, and owlet-nightjars, as well as an exceptionally diverse assemblage of songbirds such as the iconic birds of paradise and bowerbirds.
Expanding its coverage with 111 vibrant color plates—twice as many as the first edition—and the addition of 635 range maps, the book also contains updated species accounts with new information about identification, voice, habits, and range.
|
0.999999 |
What do the following cases have in common? In Boy Scouts of America v. Dale,2 the Court upheld the right of a private organization to ignore a generally applicable state statute prohibiting discrimination on the basis of sexual orientation. In Hurley v. Irish-American Gay, Lesbian and Bisexual Group of Boston,3 the Court upheld the right of parade organizers to exclude gay-rights banners. In Zelman v. Simmons-Harri4s , the Court permitted government funding of religious schools through vouchers issued to low-income parents. And in Rosenberger v. Rector and Visitors of the University of Virginia, the Court required state funding of the printing costs of a proselytizing religious publication. In each of these cases, a comparatively "conservative" association was pitted against "progressive" ideals. In each of these cases, the Court sided with the association. Do these cases therefore represent a conservative interpretation of the First Amendment? In particular, is a conservative Court overprotecting conservative associations that are intermediate between the family and the state?' I would suggest that labeling these cases as conservative is a mistake. Each can be described in either liberal or conservative terms.7 It is progressive to allow citizens to come together in smaller communities that define their own goals and values, even if-or maybe especially if-those values are at odds with those of the larger polity.8 The state should not be permitted to impose its own values on such communities, whether it does so directly by imposing membership requirements or indirectly by withholding funding. On the other hand, it is conservative to allow individuals to segregate themselves from those they consider inferior or offensive because such segregation diminishes the equal citizenship status of the excluded groups. It is also conservative, in a religiously pluralist society, to use coercively raised monies to fund organizations whose primary mission is the teaching of specific religious doctrine. A better way to approach these cases, and to discuss their common failures, is to recognize that there are important, non-ideological values at stake on both sides of each of these cases.
|
0.975177 |
A music genre is a categorical and typological construct that identifies musical sounds as belonging to a particular category and type of music that can be distinguished from other types of music. It is to be distinguished from musical form and musical style, although in practice these terms are often used in an undifferentiated way.
Music can be divided into many genres in many different ways. Due to the different purposes behind them and the different points of view from which they are made, these classifications are often arbitrary and controversial and closely related genres often overlap. Many do not believe that generic classification of music is possible in any logically consistent way, and also argue that doing so sets limitations and boundaries that hinder the development of music. While no one doubts that it is possible to note similarities between musical pieces, there are often exceptions and caveats associated.
There are several academic approaches to genre. In his book Form in Tonal Music, Douglass M. Green lists the madrigal, the motet, the canzona, the ricercar, and the dance as examples of genres (from the Renaissance period). According to Green, "Beethoven's Op. 61 and Mendelssohn's Op. 64 are identical in genre - both are violin concertos - but different in form. Mozart's Rondo for Piano, K. 511, and the Agnus Dei from his Mass, K. 317 are quite different in genre but happen to be similar in form." Some treat the terms genre and style as the same, and state that genre should be defined as pieces of music that share a certain style or "basic musical language". Others state that genre and style are two separate terms, and that secondary characteristics such as subject matter can also differentiate between genres. A music genre (or sub-genre) could be defined by the techniques, the styles, the context and the themes (content, spirit). Also, geographical origin sometimes is used to define the music genre, though a single geographical category will normally include a wide variety of sub-genres.
Kembrew McLeod, in an essay entitled "Genres, Subgenres, Sub-Subgenres and More", suggested that in electronic music, "the naming of new subgenres can be linked to a variety of influences, such as the rapidly evolving nature of the music, accelerated consumer culture, and the synergy created by record company marketing strategies and music magazine hype. The appropriation of the musics of minorities by straight, middle and upper-middle-class Whites in the United States and Great Britain plays a part, and the rapid and ongoing naming process within electronic/dance music subcultures acts as a gate-keeping mechanism, as well."
Musicology has sometimes classified music according to a trichotomic distinction, e.g., referred to by musicologist Philip Tagg as one of an "axiomatic triangle consisting of 'folk', 'art' and 'popular' musics." He explains that each of these three is distinguishable from the others according to certain criteria.
Art music (or "serious music") primarily refers to classical traditions including contemporary as well as historical classical music forms, or others listed at List of art music traditions (including non-European classical music), which focus on formal styles, invite technical and detailed deconstruction and criticism, and demand focused attention from the listener. In strict western practice, art music is considered primarily a written musical tradition, preserved in some form of music notation, as opposed to being transmitted orally, by rote, or in recordings (like popular and traditional music). Historically, most western art music has been written down using the standard forms of music notation that evolved in Europe beginning prior to the Renaissance period and reaching its maturity in the Romantic period. The identity of a "work" or "piece" of art music is usually defined by the notated version, rather than a particular performance of it (as for example with classical music). Art music may also include certain forms of jazz (even though jazz is primarily a form of popular music). Art music is music that is used as in a form of a work of art, and uses many textbook elements of music. Art music is generally instrumental, and when vocals are present they have very explicit poetic, political, or religious overtones.
For a critical introduction, see the work of Richard Middleton (e.g. Studying Popular Music 1998) and Starr/Waterman American Popular Music (2004). Popular music is also used in more of a sense with the market economy, in a way music can be used to make a profit. Popular music is usually found on most commercial radio stations, in most commercial music retailers and department stores, and for use in movie and television soundtracks. Popular music is also recorded on the Billboard charts and uses music producers as opposed to singer songwriters and composers.
The very distinction between classical and popular music has sometimes been blurred in the border regions, for instance minimalist music and light classics. In this respect music is like fiction, which likewise draws a distinction between classics and popular fiction that is not always easy to maintain.
Cultural basis: The music derives from and is part of the traditions of a particular region or culture.
Musicologist and specialist of popular music such as Richard Middleton have been critical with such a classification.
Music is sometimes categorized by the time period from which it originates or was most popular, e. g. '50's rock', '17th century music' or 'music from the romantic period'..
It is possible to categorize music geographically. For example, the term "Australian music" could include Australian rock music, Australian traditional music in the European style (e.g. Waltzing Matilda), Aboriginal Australian music, Australian classical music, and Australian Jazz.
Music can also be categorized by some technical aspect including the instruments used. For example Rock music revolves around the electric guitar, and Club music is typically accompanied by synthesizers and/or drum machines.
A genre can be labelled so its fusional origins from other preexisting genres becomes clear, e.g. blues rock, latin jazz. In other cases the name of the genre only reflects the fact that it mixes different styles, e.g. crossover, jazz fusion.
Music genres can also be categorized by their sociological function. Trivial examples are wedding music and Christmas music.
The emergence of new genres can occur by actual development of new forms and styles of music, but also just by a new categorization.
Although it is theoretically possible to create a musical style with new relations to existing genres, new styles more commonly appear under influence of preexisting genres. The genealogy of musical genres is the pattern of musical genres that have contributed to the development of new genres, which often can be expressed in the form of a written chart. If two or more existing genres influence the emergence of a new genre a fusion between these genres can be said to have taken place.
Artists who work in fusion genres are often difficult to categorise within non-fusion styles. Most styles of fusion music are influenced by various musical genres. While there are many reasons for this, the main reason is that most genres evolved out of other genres. When the new genre finally identifies itself as separate, there is often a large gray area in which musicians are left. These artists generally consider themselves part of both genres. A musician who plays music that is dominantly blues, influenced by rock, is often labelled a blues-rock musician. The first genre is the one from which the new one evolved. The second genre is the newer and less-dominant genre in the artist's playing. An example of a blues-rock group would be Stevie Ray Vaughan and Double Trouble. Vaughan, a Texas blues guitarist, surrounded by a world in which rock was dominating music, used rock and blues together.
What is an actual fusion between genres and what is a mere influence from another genre can often be disputed. Also the level of originality needed to create a completely new genre can be questioned. But most people would agree on the distinctness of e.g. rock music from its predecessors. In some genres, the emergence of subgenres is vast and the originality and distinctness of these subgenres has been questioned.
There is a fair amount of examples were the music genre has been labeled long after its first actual appearance, e.g. the term 'jazz' was not established as a genre name before the years just prior to 1920 yet the musical phenomenon had been in existence at least since roughly the turn of the century. There can be several reasons for this. One is that the categorization has been done in the process of a music historical survey.[specify] Another reason could be a more nostalgic flashback.
^ Green, Douglass M. (1965). Form in Tonal Music. Holt, Rinehart, and Winston, Inc. pp. 1. ISBN 0030202868.
^ van der Merwe, Peter (1989). Origins of the Popular Style: The Antanddececedents of Twentieth-Century Popular Music. Oxford: Clarendon Press. pp. 3. ISBN 0-19-316121-4.
^ McLeod, Kembrew (2001). "Genres, Sub-Genres, Sub-Sub-Genres, etc.: Sub-Genre Naming In Electronic/Dance Music". JOURNAL OF POPULAR MUSIC STUDIES (13): 59–75.
^ a b c Philip Tagg, "Analysing Popular Music: Theory, Method and Practice", Popular Music 2 (1982): 41.
^ Philip Tagg, "Analysing Popular Music: Theory, Method and Practice", Popular Music 2 (1982): 37-67, here 41-42.
^ Mark Tucker and Travis A. Jackson. "Jazz." Grove Music Online. Oxford Music Online. 22 Jul. 2010 <http://www.oxfordmusiconline.com/subscriber/article/grove/music/45011>.
"Genre." The New Grove Dictionary of Music and Musicians. Grove Music Online.
Negus, Keith (1999). Music Genres and Corporate Cultures. New York: Routledge. ISBN 041517399X.
|
0.999913 |
I'm trying to automate geoprocessing by editing simple python scripts generated from "Save as Python" and running them within the QGIS script editor framework. I am using QGIS v2.18.7 my Mac (OS X Yosemite 10.10.5).
I've noticed that when I process multiple files (currently using gdalogr:warpreproject, with 12 layers run sequentially), I always get errors of the type "ERROR 1: Output dataset /path/file.tif exists" for at least some of the operations. The files in question do not actually exist as far as I can tell (I have tried using the temporary file option as well as writing to specific files using various strange file names to be sure). Furthermore, when I rerun, it tends to alter which layers are generating the error (e.g. months 01, 04, 05 on one run and months 03, 08, 09 for the next run). There is also an error on the last layer merge operation, which I am at this point guessing is a consequence of the errors in the input layers.
2017-06-15T13:15:05 0 GDAL execution console output ERROR 1: Output dataset /var/folders/8y/6924gdvx3jg6k2rz5yrzwz100000gr/T/processing1524180f5e1443d3a74b4fdc0a8bd484/558b56639752426697b3345fd326a7c3/OUTPUT.tif exists, but some command line options were provided indicating a new dataset should be created. Please delete existing dataset and run again.
2017-06-15T13:15:05 0 GDAL execution console output Creating output file that is 1003P x 991L.
2017-06-15T13:15:06 0 GDAL execution console output Creating output file that is 1003P x 991L.
/var/folders/8y/6924gdvx3jg6k2rz5yrzwz100000gr/T/processing1524180f5e1443d3a74b4fdc0a8bd484/7fa79d45d41e40cdb0651f2242a00699/OUTPUT.tif exists, but some command line options were provided indicating a new dataset should be created. Please delete existing dataset and run again.
/var/folders/8y/6924gdvx3jg6k2rz5yrzwz100000gr/T/processing1524180f5e1443d3a74b4fdc0a8bd484/ee42542a5c0e434ea3f5c6156f9935bf/OUTPUT.tif exists, but some command line options were provided indicating a new dataset should be created. Please delete existing dataset and run again.
2017-06-15T13:15:07 0 GDAL execution console output Creating output file that is 1003P x 991L.
Processing is looking for a field called "YearDat " (with a trailing space) rather than "YearDat"
Not the answer you're looking for? Browse other questions tagged qgis python pyqgis qgis-processing or ask your own question.
|
0.999998 |
Only one more week left here at Vigilant Management, I can’t believe how quickly the summer went! After attending various meetings over the course of the work term, I now know what makes a meeting successful.
The most important thing to do when running a meeting is to properly prepare. This includes determining the purpose of the meeting, the people required to be in attendance and any required props. If you know what you need to prepare and others need to prepare, the meeting will go much smoother. Required props can include laptops, paper, pens, etc.
Prior to the meeting, the project manager should create an agenda of topics that need to be discussed. This will help keep the meeting on track. In addition, the action items should be reviewed prior to the meeting to ensure that all action items are addressed or at least know the status of the items.
As the attendees are generally very busy people, it is key to ensure that the meeting will be within the set time frame. This is often difficult because topics generally create a discussion leading to further topics. As the person running the meeting, you are responsible for keeping the meeting on track.
|
0.959371 |
If one were to ask who the greatest smiths of the shinto period were, it would be reasonable to expect responses like Kunihiro, Umetada Myoju, Tadayoshi, Kotetsu, Sukehiro, and Shinkai. While some might contend that Shinto works are inferior to koto works, there is little doubt in anyone's mind that the product of these smiths fits in well with the excellent work of the koto period.
Near what we now consider to be the beginning of the Shinto period, Kunihiro was a retainer of the Ito family in Hyuga Obi. In 1577, disaster struck the Ito clan and Kunihiro was set to wandering the various kuni, so the story goes, researching and learning forging techniques, eventually settling in Kyoto. He is regarded as a genius, and his works are held in very high regard.
One of the students of Kunihiro before he died, was the excellent smith Shodai Izumi no Kami Kunisada. The nidai and son of Kunisada would eventually go down in history as the truly brilliant smith Inoue Shinkai. Shodai Kunisada was still very young when Kunihiro died, and at this time he became a student of Echigo no Kami Kunitomo.
After the death of his master, Kunisada moved to Osaka, along with a fellow student Kunisuke, and together they pioneered the unique Osaka Shinto swordmaking tradition. Osaka was a thriving city during this time and one of Japan's cultural centers. It is thought that the unique energy and prosperity of the city was a key influence on the gorgeous workmanship of Osaka Shinto.
Around 1644, a Yamato native and smith from the Tegai school arrived in Osaka: Mutsu no Kami Kaneyasu. He had a unique habit of signing his work with a mirror image signature (his characters were backwards). The school he founded included Iga no Kami Kanemichi, who taught Echigo no Kami Kanesada, and who in turn taught Sakakura Gonnoshin Terukane.
Terukane originally signed Echigo no Kami Kanesada like his teacher, and when his high level of skill became evident, Shodai Kanesada adopted him into his family (relationships of choice like this were apparently considered deep bonds in old Japan). After the death of the Shodai in 1666, Terukane abdicated the rights to the name Echigo no Kami Kanesada to the Shodai's young biological son, and began signing Terukane. This is something that I find illustrates a particular strength of character, to give up his name in this fashion.
Terukane is rated Jo-jo Saku by Fujishiro, near the top of his school and times, and 850 man yen in the Toko Taikan, making him highly valued, as much as some great smiths of the koto period. (I have seen Juyo Token katana by this smith offered for sale in Japan between $66,000 and $80,000 USD). He is also rated as O-wazamono with a reputation for producing very sharp swords. Only 16 kaji rate higher at Sai-jo Wazamono, the highest rating.
Osaka Shinto is a particularly beautiful style, though possibly criticized for focusing more on aesthetics than on functionality. The school produced mostly wakizashi and katana, with few tanto. The sugata is expected to have little sori, with a slightly extended chu-kissaki. The hada one expects from Osaka Shinto is a very fine and beautiful ko-mokume, one that seems to have a sheen or almost an internal glow to it.
The hamon will be mostly thick nioi; as for pattern, it will run the full gamut of possibilities. Furthermore, several new hamon styles were invented by Osaka Shinto smiths. One key kantei point though is the straight Osaka yakidashi that will then usually expand into a notare or midare based hamon. The boshi will usually be a ko-maru in suguba regardless of the hamon.
For Terukane in particular his hada was similar in ways to Shodai Kanesada, his teacher. In addition, his was clear, extremely fine and tight and in some cases almost muji (undiscernable), with bright ji nie. The hamon on his works was a toran midare or gonome midare similar to Sukehiro, mixed with yahazu midare. It will be bordered on one side with fine ji nie, and on the other with thick nioi, and full of ashi and sunagashi. To my eye, the hamon looks cold and frosty, as the thick and wide nioi resemble crystals of ice and snow within the hamon.
Terukane's skill was very high, and there are currently over 80 Juyo Token to his credit, and some of them are Tokubetsu Juyo. There are 40 each signed Terukane and Echigo no Kami Kanesada.
This yari speaks very well to the talent of Terukane. There is one kizu on the back side of the yari as shown in the photographs, but otherwise the jigane is perfect, gorgeous and luminously full of ji nie. The hamon is gentle in suguba, with extremely fine ashi here and there. Making a yari of this form is extremely difficult (as is the polishing of Jumonji yari in general, but Chidori Jumonji yari even moreso). The grace and beauty of this work speak easily to those deep into the love of the Japanese sword, as well as those who may otherwise have no interest.
Hacho tate go sun ku bu, Yoko san sun go bu ari kore.
The length of the middle blade is 5.9 sun, the side blades 3.5 sun.
Nidai Kanesada sunawachi Sakakura Gonnoshin Terukane dounin nari.
The second generation Kanesada is also known by the name Sakakura Gonnoshin Terukane.
the construction of the jihada and yakiba (in this example) are excellent.
Mizunoto Hitsuji Koyomi Satsuki Gekan Tanzan Shirusu.
Tanzan wrote this in the last days of May 2003.
This exact yari is featured on page 300 of the important reference Osaka Shinto Zufu as an example of Terukane's work, a scan of the photograph in the book is included to the right. A rough translation of the commentary is included here.
Ryokawagata (both sides, kama style). The top of the center blade is widely forged ko-itame with some masame and fine ji-nie. [The hamon is in] chu suguha with ko-midare, hard nioi guchi and delicate nie. Boshi is yakitsume on both sides.
Nakago is ubu, kurijiri, yasuri is kattesagari, mekugi ana are two. Signature is above the mekugi ana.
The shape and form of both kama are very beautiful. The ko-itame hada is very good, and overall it is a very nice yari. The maker's high level of skill for making swords shows in this yari.
This type of yari is known as Chidori Jumonji, with Chidori meaning "cow's horns", referring to the side blades, and Jumonji refers to the character for the number ten, which is a cross 十 and refers to the layout of a yari with side blades.
Yari and Naginata were the weapons of choice on the battlefield. A heavy Naginata could be used to attack a horse and unseat a rider. A yari can attack at distances not possible for a sword to counterattack. It is only inside of the effective radius of the yari that a sword came into use, almost a weapon of last resort (that role would be reserved for the tanto).
The Japanese yari has several different variations, and the jumonji yari has particular fighting techniques in which it excels. The right angle between the side blades and the center blade can be used to parry another yari or a sword far more effectively than a simple spear as the opposing weapon can be trapped and controlled. A followup thrust can run the yari up along the shaft of the opponents weapon, giving the opponent a choice between dropping his weapon or losing his fingers.
Producing a yari with blades and points also allows for chopping and slicing actions, that a simple spear cannot perform effectively.
When the side blades are pointed in the opposite direction, back towards the wielder, they can be used to trap and twist an opponent's weapon, forcibly pulling it from their grasp. Stories also exist of ninja using this kind of yari to hook into trees and scale walls, disappearing out of sight. They can also be used to hook and unseat a horseman.
This style of yari combines both forward facing and slight rearward facing points, which can provide all of the above options to varying levels of effectiveness to a well trained samurai.
|
0.99975 |
Products known as Cantor Futures are also interesting as they tend to protect the investor from external shocks especially when it comes to trading on the crypto currency exchanges which tend to vary and wobble slightly especially when panic mode selling comes into the equation. By using cantor futures, one can easily get into the market and not burn their fingers by excessive exposure to risk. Futures commission is also not so prohibitive and the rates are quite competitive.
Futures are financial contracts obligating the buyer to purchase an asset or the seller to sell an asset, such as a physical commodity or a financial instrument, at a predetermined future date and price. Futures contracts detail the quality and quantity of the underlying asset; they are standardized to facilitate trading on a futures exchange. Some futures contracts may call for physical delivery of the asset, while others are settled in cash.
The futures markets are characterized by the ability to use very high leverage relative to stock markets. Futures can be used to hedge or speculate on the price movement of the underlying asset. For example, a producer of corn could use futures to lock in a certain price and reduce risk, or anybody could speculate on the price movement of corn by going long or short using futures.
The primary difference between options and futures is that options give the holder the right to buy or sell the underlying asset at expiration, while the holder of a futures contract is obligated to fulfill the terms of his contract. In real life, the actual delivery rate of the underlying goods specified in futures contracts is very low as the hedging or speculating benefits of the contracts can be had largely without actually holding the contract until expiry and delivering the good. For example, if you were long in a futures contract, you could go short in the same type of contract to offset your position. This serves to exit your position, much like selling a stock in the equity markets closes a trade.
Futures contracts are used to manage potential movements in the prices of the underlying assets. If market participants anticipate an increase in the price of an underlying asset in the future, they could potentially gain by purchasing the asset in a futures contract and selling it later at a higher price on the spot market or profiting from the favorable price difference through cash settlement. However, they could also lose if an asset's price is eventually lower than the purchase price specified in the futures contract. Conversely, if the price of an underlying asset is expected to fall, some may sell the asset in a futures contract and buy it back later at a lower price on the spot.
The purpose of hedging is not to gain from favorable price movements but prevent losses from potentially unfavorable price changes and in the process, maintain a predetermined financial result as permitted under the current market price. To hedge, someone is in the business of actually using or producing the underlying asset in a futures contract. When there is a gain from the futures contract, there is always a loss from the spot market, or vice versa. With such a gain and loss offsetting each other, the hedging effectively locks in the acceptable, current market price.
A futures contract is a legal agreement, generally made on the trading floor of a futures exchange, to buy or sell a particular commodity or financial instrument at a predetermined price at a specified time in the future. Futures contracts are standardized to facilitate trading on a futures exchange and, depending on the underlying asset being traded, detail the quality and quantity of the commodity.
Futures contracts are used by two categories of market participants: hedgers and speculators. Producers or purchasers of an underlying asset hedge or guarantee the price at which the commodity is sold or purchased, while portfolio managers or traders may also make a bet on the price movements of an underlying asset using futures.
|
0.999992 |
Synopsis: After his parents are gunned down when he was a child, Bruce Wayne undergoes intense training and becomes a superhero known as Batman and begins to wage war on the criminals of Gotham.
Review: If one was given the task of describing this film in one sentence, it would be: the film that is the rebirth of a franchise that died in 1997. As it is an origin story, it really excels in giving Batman a great deal of character development and depth that we have almost never seen on the big screen before. We understand what ultimately drives Bruce Wayne to bring about an end to the evil and corruption in Gotham. After his parents were murdered by a mugger, he becomes an angry individual and he becomes determined to eradicate the crime underworld that Gotham has been entrenched in for many years.
In the early stages of the film, Bruce endures training under the eyes of Henri Ducard (Liam Neeson) and his master Ra’s Al Ghul who recruit him into the League of Shadows. Under their tutelage he becomes a very skilled warrior. However, he ultimately becomes their enemy and returns to Gotham to become a symbol of hope. To do this he fights crime in order to bring Gotham back from the mire of damnation. With the help of his trusted butler Alfred (Michael Caine) and the brilliant Lucius Fox (Morgan Freeman), Bruce gets the equipment he needs in order to eliminate the crime and evil that lurks within Gotham.
However, Ducard returns as the League of Shadows, together with the work of the evil physicist Dr Jonathan Crane, also known as the Scarecrow return with a plan to destroy Gotham and Bruce under his new alias must stop them. The film is packed with some intense action sequences including a sword fight on a frozen lake and a high speed car chase over Gotham’s rooftops that will keep the viewer glued to the screen with excitement and anticipation. But the action although entertaining is a secondary element of this film, the focus on the titular character is the centrepiece of the film and this is what drives it onwards.
Many of the actors in this film give some great performances. Christian Bale was outstanding in both his roles as Bruce Wayne and as Batman. We see his pain and his drive to become a great force for good in a city that is crawling with the evil and the corrupt. Similarly we see his anger and ferocity when he puts on the cape and mask. Liam Neeson also delivers as Ducard as he comes across as a good guy in the beginning but is quite the opposite at the end of the film. Morgan Freeman and Gary Oldman really deliver in their roles as the scientist Lucius Fox and the cop Jim Gordon, both of whom are two of Batman’s closest allies in his fight against evil in Gotham.
Katie Holmes plays Rachel Dawes, Bruce’s love interest. While their on screen chemistry is a little lacking at times, she also delivers in her role as Gotham City’s assistant District Attorney. Michael Caine who plays the Wayne family butler Alfred also gives a strong performance. He provides support to Bruce when he needed it most and also gives some comic relief moments that add a little bit of humour to an otherwise very dark and gritty superhero film.
All in all, Batman Begins does what it set out to do very well. It explores the character many of us know and love in great and almost unprecedented detail. On top of that, it boasts some excellent action sequences and some humorous moments, along with an excellent villain. It was the film that rescued the Batman franchise from the doldrums of the film industry and restored it to one of the best superhero franchises in existence. For that, Christopher Nolan deserves a huge amount of credit.
Well acted by all with a tremendous lead performance from Bale, the Dark Knight returned triumphantly back onto the big screen and the superhero radar.
|
0.995696 |
What does a Bullard home stager do?
Home staging companies in Bullard, TX employ a variety of different techniques to present the home in the best light possible. The first step will likely be to make sure the home is impeccably clean, including the exterior of the house. Next the home stager will work on removing the personal touches that are unique to the current owners. Paint colors might go from dramatic reds and purples to neutral tones like beige and taupe, in order to appeal to the masses. The home will likely be cleared of family photos, risqué artwork, collections and knickknacks, so potential buyers will be able to better envision their own life in the house. In some cases furniture will be swapped out, and you might not even recognize your own house. Some Bullard home stagers tackle most of these tasks themselves, while others work with subcontractors and other professionals to get the job done. Here are some related professionals and vendors to complement the work of home stagers: Interior Designers & Decorators, Photographers, Real Estate Agents.
The process of staging a home can be difficult for some homeowners, especially when being asked to change things you’ve poured your heart and soul into over the years; but try not to take anything personally, as the stager only has your best interest in mind and no intention of insulting your personal taste. Before you contact a professional home staging company in Bullard, TX, make sure to consider a few things: Are you willing to change your home and take the advice of this professional to help sell your house? Do you think your house would greatly benefit from the help of a stager? How long are you comfortable having your home on the market? A staged home is likely to sell faster and, on occasion, at a higher asking price than a non-staged home. While there is no guarantee this will always be the case, it’s often true and can make the entire selling and moving process a lot less stressful in the long run. If you are selling through a real estate agent, it’s a good idea to get their opinion on whether staging your home would be beneficial to your specific situation.
Find a certified Bullard home stager on Houzz. Narrow your search in the Professionals section of the website to Bullard, TX home stagers. You can also look through Bullard, TX photos by style to find a room you like, then contact the professional who staged it.
|
0.999912 |
Have you ever heard someone - and in my experience it is rarely a person with an indigenous background, upbringing or understanding - say something about living in ways that honor the seventh generation?
It is a phrase I have heard repeatedly in some circles, spoken by people with very honorable intentions. It’s a phrase I used myself for many years without truly understanding its meaning.
In conversations about the future I would say things like: We need to consider how this decision will impact people seven generations from now.
And in so saying, I'd think that I had made a comprehensible statement capable of creating change when I saw heads nodding around me.
Rarely did I, or the people with whom I was speaking, have even the vaguest idea of how something we were doing now would impact someone 140 years from now, or have the slightest notion of what an effective way of judging our actions in that context would be.
The idea of the seventh generation sounded good, but did not really have much traction when it came to the way I lived my life on a day-to-day basis.
Then in the early 1990s I encountered the work of a woman who would later become a personal teacher to me for a very brief time - Paula Underwood - who was called too soon from this world.
Paula was a wisdom keeper.
She was living link to a past that stretches back over 10,000 years and is kept alive through a rigorous process of teaching and storytelling. She was marvel of woman, soft and gentle in her manner, powerful and grounded in her tradition.
Paula taught that indigenous people are careful observers of the world and of life - after all, if your very survival depends on distinguishing between two plants that look almost identical, one of which is a healing plant and the other a deadly poison, your powers of observation become highly refined.
Hard won knowledge, sometimes obtained by great sacrifice or through horrible mistakes was kept alive in her culture by being passed along from one generation to the next, by carefully teaching only to those who showed aptitude for such stewardship.
One of the things that indigenous people observed was the cycle of life.
Contrary to the contemporary notion that before the advent of modern medicine no one lived past the age of 40, it was not unusual for indigenous tribes to have Elders who lived into their 60s, 70s, 80s or even longer - take a look sometime at the photos of Indian Elders that were taken in the late 1800s.
It was noticed that a person blessed with a long life would actually move through each of these generational stages - entering the circle as a great-grandchild would come around to be completed as the experience of being a great-grandparent before exiting it to become an ancestor - and by the way ancestors and the unborn were also included in tribal decision making processes.
As a result of this noticing, a core tenant and competency of life in the indigenous world was that any decision which might impact the lives of The People would be looked at and considered from the perspectives of each of the Seven Generations Who Walk Through Time - the very old, the very young, those in the middle, those who had passed from this world, those who were waiting to come in, and of the world itself - for the world is infused with the energy of aliveness.
Learn how conversations yield awareness and insight for 21st century business transformation and enlightenment.
Listen to the collection, The Power of Collaborative Conversations by Ken Homer with David Hodgson at the I-Open civic wisdom library on Vimeo.
Read the transcription, "Oral Traditions" by Ken Homer in the I-Open library on Scribd.
|
0.998247 |
Is Cyprus peace a model for Middle East?
Children ride bicycles in Nicosia, Cyprus, in the Turkish-controlled northern part of the island.
Editor's note: David Frum writes a weekly column for CNN.com. A special assistant to President Bush in 2001-02, he is the author of six books, including "Comeback: Conservatism That Can Win Again" and is the editor of FrumForum.
Washington (CNN) -- Anybody remember Cyprus?
Cyprus does not usually get much attention from the world media. Even in these past days, with the Gaza flotilla dominating the news, eyes have focused on the flotilla's destination -- never its point of departure.
Which is too bad. Because Cyprus may offer a good model for how the Israeli-Palestinian dispute might eventually be resolved.
Cyprus is home to about 1.1 million Greek-speaking Christians and Turkish-speaking Muslims. The two groups have had a tangled and sometimes bloody history. In 1974, mainland Turkey invaded the island republic and occupied the northern half.
Turkey claimed -- with some accuracy -- that the Turkish minority population had suffered abuses at the hands of the Greek majority.
But what happened next was also bad: The powerful Turkish army inflicted heavy casualties on Greek Cypriots and drove some 180,000 Greeks from their homes in the North.
In 1983, Turkey declared northern Cyprus an independent republic. Turkey has settled 150,000 mainland Turks in the northern parts of the island. No compensation has been paid for the former Greek property. Attempts to negotiate a formal peace between the parties have fizzled again and again.
But now here's the unfamiliar part.
Despite the fuzzy legal status of the North -- despite lingering angry feelings between Greeks and Turks -- peace has in fact settled upon Cyprus.
There has been no major violence on the island since the mid-1970s. The economy on both sides of the line has grown handsomely in recent years. Barriers between the two sides -- including physical barriers -- have begun to open. Greek Cyprus belongs to the European Union and uses the euro; Turkish Cyprus does not. Greek Cyprus has a seat at the UN; Turkish Cyprus does not.
Turkish Cyprus even experiences its own version of blockade: While Greek Cypriots can fly to multiple destinations from their international airport, Turkish Cypriots have direct access only to Turkey.
But if Turkish Cyprus does not have a legal existence as a country, it nonetheless exercises the functions of sovereignty. Turkish Cyprus keeps the peace on its side of the line: It tolerates no terrorist groups and shoots no rockets.
And over time, the two sides have approached closer and closer to mutual acceptance. Younger Cypriots seem increasingly bored by the ancient dispute. Some of the physical barriers dividing the island have been demolished. Will the two sides ever ratify a formal peace? Who knows? And how much does it matter?
In Israel-Palestine, by contrast, the international community emphasizes exactly what has failed in Cyprus: some kind of formal and final resolution of the conflict. In Cyprus, growth and development have lulled the conflict even in the absence of a formal treaty.
There are hopeful signs that the Palestinian Authority in the West Bank is following the Cyprus example. It's not easy to say exactly what the Palestinian Authority is in law. But in practice, it acts more and more like a government. It deploys a security force. It suppresses terrorism and crime on its side of the separation fence. It oversees impressive economic growth. It negotiates specific solutions to practical problems.
The contrast with Hamas in Gaza is sharp -- and in the coming months will likely be sharpened further. The number of manned Israeli checkpoints in the West Bank has been reduced from 42 to 12, as Tom Friedman noted in The New York Times on Sunday. Look for that number to drop sharply again.
The leaders of the West Bank Palestinian Authority do seem to have made a strategic decision for peace. Two weeks ago, PA President Mahmoud Abbas told Egyptian TV that the Second Intifada launched in 2000 was one of the Palestinian people's "worst mistakes."
When will the hardest problems be resolved? As with Cyprus -- who knows? But the easier problems can be solved first. Maybe these Middle Eastern conflicts end -- not with some solemn proclamation -- but by the gradual accumulation of habits.
If the Cyprus flotilla had carried that advice in its boats, it might have brought some valid hope and done some genuine good.
The opinions expressed in this commentary are solely those of David Frum.
|
0.997441 |
A mouse named Ralph learns to ride a boy's toy motorcycle at the Mountain View Inn. He wishes he could live more dangerously -- and he does: he gets trapped by humans, is almost taken up by an owl and more.
Parents need to know that The Mouse and the Motorcycle is a faithful adaptation of the popular children's novel by Beverly Cleary, blending live actors in the human roles with realistic looking puppet animation to bring the mice to life. Ralph, the mouse, is a mischievous scamp looking for some fun, and his new human friend Keith has just the thing: a toy motorcycle that's perfectly suited for a small rodent. The film is tailored for a young audience, with no swearing, drinking, or anything else that might alarm parents.
Mice discuss the grim fates of some of their relatives at the hands of rodent-hating humans and predators such as cats and owls, and one mouse barely escapes such an unpleasant end as he undertakes a dangerous rescue mission.
Parents will want what's best for their kids, but they may not always understand exactly what that is. That's why it's important for young people to be able to cultivate a sense of imagination and adventure, and to be open to new experiences that their parents may not completely endorse -- like making friends with a motorcycle-loving mouse.
The film is based on a popular title by the beloved children's author Beverly Cleary.
|
0.999999 |
Differentiate true and false information about a subject.
Test knowledge of a subject in an ungraded format.
Steps: Located on the left side of the screen, this panel is used to manage choices for your interaction.
Text: Located in the middle of the screen, this panel is used to add text to each choice.
Go to the Quick Choice tab on the ribbon, and click Add Choice.
Click the Duplicate button at the bottom of the Steps panel to copy the currently selected choice(s).
New choices get added just below the choice that's currently selected in the Steps panel.
Double-click the choice in the Steps panel to open it for editing. Enter the new name, and press the Enter key.
Select the choice in the Steps panel, and type the new name in the title field at the top of the text panel.
Drag them to a new location in the list. An orange line will move with your mouse to indicate where the choices will be when your mouse is released.
Go to the Quick Choice tab on the ribbon, click Move Choice, and select either Up or Down.
Go to the Quick Choice tab on the ribbon, and click Delete Choice.
Go to the Quick Choice tab on the ribbon, and click Interaction Properties.
Select the Quick Choice tab on the left side of the window.
Choose a numbering style from the Number choices using drop-down.
|
0.999998 |
Briefly describe three case studies illustrating the importance of key resources. Many companies may not know this but establishing, designing, implementing an HR strategy will ensure that your company will run smoothly and efficiently.
The best part about an organized company, is that the compensation being afforded to employees is paid as a form of recognition for their contributions. It involves finding applicants and hiring the most qualified individual for the position.
Relevant Case Studies Google used customer data collected from search engines and its Analytics program to develop its Ad service.
A microchip manufacturer needs capital-intensive production facilities, whereas a microchip designer depends more on human resources. Physical Physical assets such as manufacturing facilities, buildings, vehicles, machines, systems, point-of-sales systems, and distribution networks come into this category.
This section highlights the individual skill of your team and their contributions to your business and simple business plans. The human resource strategic plan, if organized well and properly will be the key element to the success of any business, small or big.
Microsoft and Adobe depend on software and related intellectual property that is continually being developed. Parents who would like to partake in a subsequent lay-away plan must have no history of payment defaults. Qualcomm, a supplier of chipsets for broadband mobile devices, built its business model around patented microchip designs that now earn the company substantial licensing fees.
The company must set what specific role an HR must do. Key Resources can be categorized as follows: Nonetheless, the department is not expected to be always accurate in the recruitment assessment, which makes it important to keep assessment programs part of the staffing strategy.
Know and understand the business strategies and how these strategies can develop a company. Key resources can be owned or leased by the company, or acquired from key partners. A computer system will be available at the section for this purpose. Hire a Store Manager to oversee the overall store operations and to troubleshoot any problems that may be encountered by the staff or customers.
A pharmaceutical company relied heavily on human resources: Understand what your boss needs and wants from you. EasyDiagnosis employed its medical knowledge to create an online medical diagnosis expert system. This, in a way, is true because downsizing is a result of business strategies that failed, and layoffs have been regarded by employees as part of those failed strategies.
Providing benefits package to the employees can increase the chance of retaining them Employee relations. Consult with your fellow executives. Dolls have different characters; hence, doll clothes and accessories will come in varying styles.6 MCBCC Human Resources Business Plan Business Description & Vision Mission statement: The HR department will attract, develop and retain a highly-qualified, diverse workforce and create a culture that promotes excellence throughout the organization.
Human resources play a key role in attaining a business's mi-centre.com, if sales and marketing departments present management with a strategy to meet a goal, then a human resources strategic plan should be created to help meet that goal.
Get inspired with our gallery of over example business plans. Choose the category that is closest to your own business or industry, and view a plan you like. LivePlan includes all business plan samples, so you can easily reference any of them when you’re writing your own plan.
If you’re. Our Branch The Human Resources Branch provides comprehensive strategies, programs, services and consultationtomeettheneedsofandsupporttheCity. Key resources can be physical, financial, intellectual, or human.
A microchip manufacturer needs capital-intensive production facilities, whereas a microchip designer depends more on human resources. Key resources can be owned or leased by the company, or acquired from key partners. The management plan section of your business plan will give more focus on defining your management team, Fundamentals of Human Resources Strategic Planning.
|
0.999302 |
I've been concerned about the high bounce rates received by this site for a long time: Does the high number mean that my articles are irrelevant to user searches, difficult to understand, or just plain boring? While I'm sure that's true to a certain extent, my return visit rate isn't that bad, but even the bounce rate for the returning visitors is still very high?!
Well, hopefully all isn't lost: Maybe I can gain some insights by having a look at exactly how a bounce is defined, analyzing the type of content my site contains, thinking about the reason people might be interested in such content, and doing some testing using Google Analytics event tracking to reduce bounce rates for people who stay on a page for a while. So, let's get started and see if I can boost my ego a little bit here….
What is a “Bounce” in Google Analytics?
Google defines the Bounce rate metric as "the percentage of visitors that see only one page during a visit to your site": meaning that the user either left your site without loading another page (either via a link or refreshing the current page), or didn't load another page before their GA session expired. This is different to what's commonly called a “Short Click”, where a visitor quickly notices that the page they've landed on doesn't have the information they want and promptly moves back to their original location.
Does it matter if people leave my site after only viewing a page?
Are people actually reading my content or just leaving my site very shortly after arriving?
The answer to the first question requires some thought about the value of the content on my site, while the second question can be tested using some modified GA tracking code.
Why Might a Visitor Want To Read the Information on My Site?
A site owner will normally want the visitor to perform an action on their site that's valuable for them; however, it usually requires more interaction with a site before a visitor is engaged enough to take an action that has real value.
However, a visitor could well see a bounce as a positive outcome: When you're browsing Google for a quick answer to a question, then finding it on the first page of a site is ideal; the visitor will often leave satisfied with their visit, and may even come back again.
While this is a very narrow analysis of the topic, it's enough for me to form a basic hypothesis about my bounce rate: Given that most of the articles on my site relate to programming topics that developers usually want to find a quick answer to, I believe that my bounce rate could be caused by visitor satisfaction, instead of visitor discontent. A small number of visitors want to find out about me and my products, so will browse further into the site and contact me, which is where my value comes into play; however, most people will find an article on a programming topic, scan through it, copy some code snippets into their IDE, then leave—possibly coming back in the future for more information.
So that's the hypothesis, but I now need to put an experiment together to see if it improves my understanding of the situation.
Is My Site Receiving Too Many Short Clicks?
Ideally, I'd be able to actually survey each visitor to find out if they found my content useful or just meaningless dribble, but in reality most people don't answer surveys unless they're really happy, aggravated, or just plain bored. This means I'm going to have to use the usual method of analyzing click streams with Google Analytics.
I think that a reasonable indicator suggestive of a user actually finding my articles useful would be based on the time they spent viewing them. While my visitors could be just staring blankly at my site, I think that if they spend more than two minutes on a page, then they could well be doing something of value; like reading a tutorial or copying some code. I just need to tell that to Google Analytics.
You just need to make sure that the last value is omitted or set to false because it's the opt_noninteraction parameter that stops the event counting towards the bounce rate when it's set to true.
The first line of the function retrieves a reference to the default GA tracker using the _gat._getTrackerByName() API call; note that this presupposes that the standard tracking code has been installed and run before this function is called.
The next line defines a variable, called minSecondsOnPage that contains the number of seconds you want the script to wait until you consider the visitor to be engaged with your site; I'm trying out two minutes to start with, but you might want to set this to a higher or lower number depending on the type of content you have on your site.
I'm giving the event a category of TimeOnPage and an action of TimeThresholdReached; you can use different values if they're more suitable for additional reporting you want to undertake. I've also set the optional label parameter to the name of the current page, the value parameter to the number of seconds I decided to wait, and finally set the noninteraction parameter to false to ensure the event cancels out the bounce.
The final line of code simply registers a timeout event to run cancelBounceFunc() after the number of seconds defined in the minSecondsOnPage variable (the seconds are multiplied by 1000 because the event registration function uses milliseconds, not seconds).
The only thing left to do is place the code onto your page; however, you also need to ensure it plays well with the rest of your GA code, so you need to sequence it correctly using the _gaq: The function assumes that a default tracker is already available so you need to make sure the initial tracking code has been executed before it's run.
You might want to make an additional modification to the code, so it only registers events on the first page of your site; this isn't too important, but reduces network bandwidth a little and will make your event reports clearer should you wish to use them.
To get this working you need to enter your domain name into the currentDomainName variable; there's more generic ways of doing this without needing to enter your domain, but this should suffice as an example.
I'm satisfied by my results that people are actually interested in my content: Many people leave my site after only viewing one page, but because of the type of articles I've written, I need to measure how long people spent reading them, instead of how many of them got read during a single visit. However, I should note that this type of tracking will probably work better on an informational site like mine—where success is defined by how useful the information is, not how well it converts into business actions—as sites with a stronger commercial focus need to drive a certain level of engagement, especially if they're paying for traffic.
I think that the most useful outcome of this investigation is that I've cut out some noise, so I can now get a better view of the real bounce rate and time on site metrics, and use them to home in on the content that really is or isn't working.
Really a beautifully analytical article. It is like a complete guide on bounce rate. I am completely agree that bounce rate does not matter to sites like yours. As an user comes to your page mainly through search engine. So he gets the idea and leave the site as he requires only that data. So we can't say that the page content is of lower quality.
Hi, please I do not understand, "put the ga.js script twice." I put only once. Please, can you explain me better.
And what means " you’re not supposed to do is reverse engineer the ga.js script, or send personally identifiable information about your users to GA–it’s supposed to be an anonymous tracking service"
I think the script is already working: Using live HTTP headers I can see an event request being sent to Analytics; have you noticed a change in your bounce rate yet?
You've probably got two plugins adding the GA code, or maybe it's been added to your theme, but I don't think it will actually cause you any problems if you really can't find out where it comes from.
The bit about reverse engineering and sending personal information to Analytics was just in response to your question about whether Google allows you to modify their tracking code; you don't need to worry about that if you're using this script.
If I use this pluign no issues. Could you tell me if this code is accept by Google?
I've checked out your site and it appears to be working now: I can see the event pixel being sent off to Google analytics.
Google doesn't have a problem with you customising their tracking code; they actually have an API for the purpose, and you can read the documentation to find out how it works. The only things you're not supposed to do is reverse engineer the ga.js script, or send personally identifiable information about your users to GA--it's supposed to be an anonymous tracking service.
I also noticed that you included the ga.js script twice; I'm not sure if that will cause any problems, but you should remove it anyway, just in case.
yes www.criarblogsite.com I use genesis studiopress template.
I can't see my code on your site? Can you point me to any pages where it's installed? Remember that you're using a caching system, so you might need to clear it before the code takes effect.
Also, it looks like you're using Wordpress; are you using a plugin for Google Analytics? I'm using Google Analyticator and have the custom part of my code pasted into the "Additional tracking code (after tracker initialization):" section.
no I didnt use plugin. I use genesis admin. And I will send PrintScreen to you so you can see problem.
do you use all code after tracker initialization or just some part?
Look, I want to say thank you. I have this same problem with my bounce. I've tried everything to resolve, but never found a solution. I hope your system works. accepted Google this method? My Alexa Bounce is great. if your method works, I'll do a post on my blog about your method. Thanks! Please answer all my questions!
Can you give me the URL of the website you're trying it out on, so I can have a look and see what problem your getting?
Please, I tried to install this system, but the code was appearing in the header. I think I did everything right. I put my domain in place, but did not work. why?
A tutorial explaining how to import cost data into Google Analytics from ad networks other than AdWords.
|
0.996415 |
If you want to hire students from universities with strong analytical skills, you need to know the landscape of available programs and skills. Some believe that universities move slowly, but many were swift to respond to the first wave of demand for professionals with analytics skills. Many business schools, for example, quickly designed master’s programs in analytics by drawing from strengths in established disciplines, including statistics and operations research. They also brought in faculty from marketing, finance, and organizational behavior to show how analytics can relate to those specific business disciplines. These offerings typically involve both business and analytics skills, so they are not as commonly found in undergraduate degrees.
For companies hiring graduates of analytics master’s degrees in business schools, it’s important to be aware of the differences among programs. Some are focused on applications of analytics, others on detailed analytical methods. Some have mostly classroom training, and others focus heavily on company projects and internships. Some focus heavily on statistics, while others include related (and important) subjects like data management, project management, and communicating effectively about analytics. Some are online, and some are face-to-face. A quick look at the curriculum of a program will enable you to classify its strengths and shortcomings.
If the first wave of analytics education involved specialty degrees in business analytics, the second wave involves data science, and the third wave centers on artificial intelligence (AI). Business schools have found it somewhat more difficult to respond to the second and third wave than the first one. Data science, for example, is not only relatively new and difficult to define, it has a strong computer science orientation. For that reason, many data science programs are offered by schools of engineering, information, or computer science. Data science programs tend to focus more on complex programming methods for handling and analyzing big data; data analytics programs are typically more focused on analytical/statistical methods, with somewhat less focus on programming and computer science.
In fact, some universities have multiple analytics programs residing in various colleges within the university. The variety of offerings can be confusing to both students and their potential employers. For example, the University of Minnesota and the University of California San Diego offer master’s degrees in both data science and business analytics. At Minnesota, the MS in business analytics is offered through the Carlson School of Management, while the MS in data science is run by the schools of engineering, liberal arts, and public health.
While data science degree programs have begun to proliferate, programs built around AI are still rare. Both Northwestern’s engineering school and the University of Georgia’s college of arts and sciences offer master’s programs in AI, and both MIT and Carnegie Mellon University’s computer science schools have recently instituted undergraduate programs focused on AI. Several schools, mostly in Europe—including the University of Gothenburg, the Free University of Amsterdam, and the Ecole Polytechnique in Paris—also offer master’s degrees in artificial intelligence. These programs are either contained within the computer science or engineering schools, or they draw from multiple schools within the university.
To my knowledge, no business schools in the U.S. have degree programs in AI. This is not surprising, given the paucity of faculty with expertise in AI (I teach a course in business applications of AI, but I’d be hard pressed to teach, for example, deep learning algorithms). Technical faculty who are able to develop AI programs often have been hired—at very high compensation levels—by private sector firms such as Google and Facebook. Some such faculty maintain university affiliations, but often not with business schools.
What Skills Do These Programs Inculcate?
Because AI programs are so difficult to put together, most business schools will concentrate on programs for analysts and data science professionals instead. In my opinion, these professionals must acquire at least four different types of expertise to be competent in their jobs.
Quantitative and statistical skills are the foundation of any analytics role. Anyone holding such a job must be proficient at general statistical analysis—at least up to and including logistic regression analysis. Such professionals also should also be able to analyze categorical data, probability and statistical inference, optimization, and basic experimental design.
If graduates want to be hired into specific industries or business functions, they also should master other quantitative techniques. These might include such methods as lift analysis in marketing, stochastic volatility analysis in finance, biometrics in pharmaceuticals, and informatics in healthcare fields. Some types of analysts—those involved in business intelligence or reporting work—may be able to get by without substantial statistical knowledge, but this lack probably would eventually limit their career progress.
Analysts also must know how to use the software associated with their type of analytical work, whether it is used to build statistical models, generate visual analytics, define decision-making rules, conduct “what-if” analyses, or develop visual dashboards. These tools once were offered only as proprietary packages from vendors, but are increasingly open source today. You may want to check whether the software your company uses is also used by the universities you want to recruit from.
Data management skills are just as important to analytical professionals as statistical and mathematical expertise. The “dirty secret of analytics” is that analytical professionals spend the majority of their time manipulating data—finding, integrating, cleaning, matching, and so on. And surveys suggest that the skill most commonly sought by data scientist employers is not expertise with a statistical program, but rather with SQL—a query language for data management.
Like analytics professionals, data scientists also perform data management tasks, but their tasks tend to be more complex and often rely on languages such as Python. Their jobs often involve taking relatively less structured data like text and images and creating the rows and columns of numbers that are well suited to statistical analysis.
The topic of data management also encompasses data privacy, security, and ethical issues. In fact, some master’s programs in analytics, including one from the University of Notre Dame, require students to take a course in ethics. I expect those will become more common over time.
Business knowledge and design skills enable analysts to be more than simple backroom statisticians. Analysts need enough general business background to understand the problems and processes they are analyzing, so they should be familiar with marketing, finance, HR, and new product development. They also should know how analytics can be used to drive business value, and they must have insight into the opportunities and challenges their employers are facing. Many of these skills and content domains are taught in MBA programs, but most business analytics degrees don’t require a lot of traditional MBA courses.
Relationship and communication skills are vital to the success of all analytical projects. Analysts who can advise, negotiate, and manage expectations will be able to work effectively with their business counterparts to conceive, specify, pilot, and implement analytical applications.
These skills are particularly critical when analysts must communicate the results of their work. Within the business, they will need to share best practices with their bosses and colleagues, while emphasizing the value of analytical projects. Outside the business, they will need to develop working relationships with customers and suppliers. They also might have to explain the role of analytics in meeting regulatory requirements—for instance, an analyst might use data to help a utility company make a successful bid to increase its rates for service.
Analysts who can “tell a story with data” are highly prized. The ability to communicate effectively about analytics is the single most sought-after capability among graduates from analytics and business intelligence programs, according to one survey of employers, and some schools realize this. For instance, “Communicating with Data” is a required course within the new master of business analytics program at the Massachusetts Institute of Technology’s Sloan School of Management.
In addition to mastering these four sets of skills in the classroom, students typically participate in internships or practicums, during which they work on real analytical problems for real organizations. Students not only gain experience in what it’s like to be analysts or data scientists, they also get a chance to meet potential recruiters.
For schools, the challenge is combining all these necessary components into a single degree program. It’s particularly difficult to cover all the material because the typical master’s in analytics is only one year or three semesters long—hardly enough time to adequately train students who arrive at the program lacking basic analytic skills. It is probably more feasible for business schools to target students who already have undergraduate degrees in quantitative fields and provide them with “finishing school” skills in business and communication.
Another challenge schools face is assembling faculty with expertise in all the relevant areas. Although universities can be very siloed and fragmented in their offerings, some draw on faculty from multiple schools to create their analytics programs. For instance, the master’s in advanced analytics at North Carolina State, which was intended to be cross-disciplinary from the beginning, involves faculty from statistics, mathematics, bioinformatics, computer science, and English departments. Such cross-disciplinary programs can be excellent for student learning, but are not always easy for schools to maintain.
For employers, the challenges include figuring out which schools offer the required skills, which ones hire the most talented students, and which are most likely to graduate students who want to work in your company or location. If you want to find out which students are most likely to perform well in your company, make sure you interview them—if for nothing else, to test their communications skills. And an ongoing relationship with faculty members in the programs you like will provide not only opportunities for help with your analytics projects, but the inside line on which students might be best for you to hire.
Tom Davenport is the co-founder of IIA. He is the President’s Distinguished Professor of IT and Management at Babson College, and a research fellow at the MIT Center for Digital Business. Tom’s “Competing on Analytics” idea was named by Harvard Business Review as one of the twelve most important management ideas of the past decade and the related article was named one of the ten ‘must read’ articles in HBR’s 75 year history. His most recent book, co-authored with Julia Kirby, is Only Humans Need Apply: Winners and Losers in the Age of Smart Machines.
|
0.999691 |
If you are someone who loves to spend time outdoors, but you often find yourself indoors instead, ask yourself why. Is there something wrong with how you have decorated the exterior of your home? Certain common outdoor decorating mistakes can make time spent outdoors much less enjoyable. Inadequate Lighting To maximize the beauty of your property, do not forget to add the amount of lighting necessary to achieve the mood you wish to create.
If you are attempting to grow vegetables in a garden in your yard, you undoubtedly wish to keep pests away so you can enjoy the end product after your plants are harvested. There are several insects that enjoy feasting upon the leaves on vegetables. If you fail to take steps in deterring or eliminating these insects, you may be left with damaged goods as a result. Applying pesticides may be release toxins into the soil, possibly harming your vegetables in addition to insects.
If you want your home and garden to work for you the best way possible, you owe it to yourself to get the help of an irrigation system installation service. These companies can provide you with the work that you need for your home and garden, so that your grass is always plush and cared for. When you get the assistance of professionals, you can count on quality work, but you must also understand some points that will help you out with this purchase.
|
0.999787 |
Democrats will take control of the state Senate in January. Here's what it could mean for gun control.
ALBANY - New York lawmakers could be poised to pass new gun-control measures come January, six years after the SAFE Act expanded the state's ban on assault-style firearms.
With Democrats taking control of the chamber in January, incoming Senate Majority Leader Andrea Stewart-Cousins, D-Yonkers, said her conference is likely to support "common-sense gun laws" that could include a measure to allowing a judge to block someone from possessing a firearm if they pose an "extreme risk."
"We will be getting together over the next few weeks, where people will have a clear understanding of so many of the things that are going to be facing us," Stewart-Cousins said at the Capitol on Monday.
Senate Republicans, who held control of the chamber since 2011, allowed the SAFE Act to come to a vote in 2013 but otherwise blocked gun-control measures favored by Democratic Gov. Andrew Cuomo and Assembly Democrats, who control a wide majority in the Legislature's lower house.
Now, firearms organizations are concerned over losing their last Republican check on state government, which will soon be under entirely Democratic control.
Any significant gun-control measures would likely further anger gun owners in upstate New York, where the SAFE Act helped cement an ongoing distaste for Cuomo in some of the state's rural areas.
"I think that any infringement like that would tip the people over the edge," said Tom King, president of the state Rifle and Pistol Association.
Cuomo, who considers the SAFE Act one of his crowning achievements, has singled out the "red flag" bill as a priority for the coming legislative session, which begins in January.
In short, it would work like this: School officials, family members and police officers would be able to seek a court order blocking someone from purchasing or possessing firearms in New York if they pose an "extreme risk" to themselves or others.
It would then be up to a judge to decide whether to issue an "extreme risk protection order," which would force a gun owner to surrender his or her firearms and prevent them from attempting to purchase new ones.
In order to issue an order, a judge would have to weigh whether the person has used or threatened violence against themselves or others, has violated a restraining order, has any pending charges involving weapons, has recklessly brandished a firearm or has any history of alcohol or substance-abuse problems.
Stewart-Cousins singled out the red flag bill when speaking to reporters Monday.
"The reality is I believe there's really a broad consensus around something like doing the common-sense gun laws that we have been pushing, whether it's what they're calling the red flag or extreme risk protection orders, or whether it's banning bump stocks," she said.
King said he believes the state's existing laws and regulations are plenty to ensure guns don't get into the wrong hands.
"We don't want people who are mentally disturbed out there with a firearm," King said. "But the problem is we don't need more rules and regulations to do it. All those rules and regulations are out there; they're not enforced."
In New York, bump stocks — the mechanism used by a Las Vegas mass shooter in 2017 to simulate an automatic weapon — are in something of a grey area.
In short, it's legal to own, buy or sell them in the state — but it's illegal to attach them to a firearm and use them.
There are a variety of bills that would ban the possession and sale of bump stocks in New York, but they were never put to a vote under the Republican-led Senate.
Democrats said that could soon change.
"Gun control is definitely on the top tier list that I hope we can pass as soon as possible and get signed into law," said Sen. David Carlucci, D-Clarkstown, Rockland County.
Ultimately, though, this bill may be moot: The federal government is reportedly expected to ban bump stocks in the coming weeks.
When you buy a gun in New York, your name is run through the National Instant Criminal Background Check System.
The system gives one of three responses: Proceed, denied or delayed.
When the response is "delayed," it triggers a three-day waiting period before the gun seeker can purchase the firearm.
Under bills proposed by Cuomo and Democratic lawmakers, that waiting period would be extended to 10 days to give investigators more time to look into possible criminal issues in a person's background.
"Expanding the time that NICS officials have to perform an investigation to ten days would assist in ensuring that firearms sales will not be made to persons prohibited from possessing a firearm without unduly burdening legitimate sales," a memo attached to Cuomo's bill states.
A newly introduced bill that would require handgun seekers to give up their social-media passwords and search-engine history has generated plenty of headlines and online discussion.
Whether it gets a vote in the Legislature? Well, that's a different question.
The bill from Sen. Kevin Parker, D-Brooklyn, would allow the investigating officer — in most cases, a county judge — to go through three years of social-media posts and one year of search-engine history before determining whether an applicant should be approved for a handgun permit.
It would also apply to assault weapons grandfathered in under the SAFE Act.
It's the password provision, however, that has proven to be most controversial.
The bill would allow the investigating officer to obtain "any log-in name, password or other means" necessary to review the applicant's social media accounts and search history.
It's not clear whether the bill will get a vote. It does not have an Assembly sponsor so far.
|
0.979604 |
Which was a prophet - Ανηρ προφητης, a man prophet, a genuine prophet; but this has been considered as a Hebraism: "for, in Exodus 2:14, a man prince is simply a prince; and in 1 Samuel 31:3, men archers mean no more than archers." But my own opinion is, that this word is often used to deepen the signification, so in the above quotations: Who made thee a man prince (i.e. a mighty sovereign) and a judge over us! Exodus 2:14. And, the battle went sore against Saul, and the men archers (i.e. the stout, or well aiming archers) hit him, 1 Samuel 31:3. So in Palaephatus, de Incredib. c. 38. p. 47, quoted by Kypke, ην ανηρ βασιλευς μεγας, He was a great and eminent king. So ανηρ προφητης here signifies, he was a Genuine prophet, nothing like those false ones by whom the people have been so often deceived; and he has proved the divinity of his mission by his heavenly teaching, and astonishing miracles.
Mighty in - word - Irresistibly eloquent. Powerful in deed, working incontrovertible miracles. See Kypke in loco.
A prophet - A teacher sent from God. They did not now call him the “Messiah,” for his “death” had led them to doubt that, but they had no doubt that he was a distinguished “prophet.” The evidence of that was so clear that they “could” not call it in question.
Mighty in deed - Powerful in working miracles, in raising the dead, healing the sick, etc.
In word - In teaching.
Before God and all the people - Manifestly; publicly. So that “God” owned him, and the people regarded him as a distinguished teacher.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.