proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.995316 |
Create tri-fold brochure in InDesign.
Adobe Creative Suite 5 (CS5) includes programs for editing and creating graphics, as well as document design programs for creating websites, interactive applications and hardcopy print documents. The CS5 application for creating tri-fold brochures and other printed marketing material is InDesign. The trickiest part of creating a tri-fold brochure is setting up the layout. After that, you place content in the brochure as you would in any other InDesign document.
Click the "File" menu, choose "New," and then select "Document" from the flyout menu. This opens the New Document dialog box.
Click the "Intent" drop-down menu and choose "Print."
Type "2" in the "Number of Pages" field.
Click the "Facing Pages" check box to turn off Facing Pages.
Click the "Page Size" drop-down menu and choose "Letter."
Click the "Landscape" button in the "Orientation" area of the dialog box.
Type "3" in the "Number" field in the "Columns" section.
Type "2" in the "Gutter" field. By default, InDesign measures print documents in picas, as do most print shops -- six picas per inch. Gutters are spaces between columns. In a tri-fold brochure, gutters are also where the brochure folds.
Click "OK." InDesign creates two three-column pages. Each column is a panel in your brochure -- three outside panels and three inside panels.
Panel 1, the cover, goes in the third column of page 1. Panel 2, the first inside panel, goes in the first column of page 2. Panel 3 goes in the second column of page 2. Panel 4 goes in the third column of page 2. Panel 5 goes in the first column of page 1. Panel 6 goes in the second column of page 1.
This is the order in which the reader unfolds and reads the brochure.
Import and place the content in your brochure. Most InDesign documents consist of text and graphics created in external programs, such as a word processor and graphics programs. Click the "File" menu and choose "Place." This opens the Place dialog box. Navigate to the file you want to import, select it, then click "Open." This loads the mouse cursor with the image or text file. Click the location on the page where you want to place the content.
Repeat Step 10 until you have placed all your content.
Depending on the size of the file, InDesign doesn't actually import graphics files into the document file. Instead, it creates pointers to the graphics files. If your brochure will be printed from the InDesign file at a print shop, include the graphics and photograph files. Otherwise, your images will print at a poor-quality low resolution. You can avoid this issue altogether by exporting the document to a PDF. Click the "File" menu, choose "Adobe PDF Presets," then select "[High Quality Print]."
Harrel, William. "How to Make a Tri-Fold Brochure in Adobe CS5." Small Business - Chron.com, http://smallbusiness.chron.com/make-trifold-brochure-adobe-cs5-31640.html. Accessed 19 April 2019.
|
0.960305 |
What is there to say about a book for taking notes. It's a notebook. I will have to say that it is perfect for your shirt pockets if you are in the law enforcement business. It fits perfectly and allows you to keep all of your notes in one place.
I have been using these notebooks for years both in and out of the military. They are great because they do not fall apart over time, assuming you don't tear out pages. I have many of these full of notes from years past in storage. If like me, you need to keep notes and may have to reference back to them months later, this is the notebook for you.
|
0.999948 |
EEG is the record of electrical activity of brain( superficial layer i.e. the dendrites of pyramidal cells) by placing the electrodes on the scalp.
Identify and describe changes produced by provocation tests.
Apply electrode according to 10/20% system.
Electroencephalography (EEG) is a method of electrophysiological monitoring to record the electrical activity of the brain. It is typically non-invasive, with electrodes placed along the scalp, although sometimes invasive electrodes are used as in electrocorticography. The EEG measures voltage fluctuations resulting from the ionic current within brain neurons. In clinical settings, EEG refers to the recording of spontaneous electrical activity of the brain over a period of time, as recorded from multiple electrodes placed on the scalp. Diagnostic applications are generally focused on event-related potentials or spectral EEG content. The first investigates potential time-locked fluctuations to an event such as start stimulus or push button. The latter analyzes the type of neural oscillations (popularly called "brain waves") that can be observed in EEG signals in the frequency domain.
EEG is most commonly used to diagnose epilepsy, which causes abnormalities in EEG readings. It is also used to diagnose sleep disorders, depth of anesthesia, coma, encephalopathies and brain death. EEG used to be a first-line diagnostic method for tumors, strokes and other focal brain disorders, but this use has declined with the advent of high-resolution anatomical imaging techniques such as magnetic resonance imaging (MRI) and computed tomography (CT). Despite limited spatial resolution, EEG remains a valuable tool for research and diagnosis. It is one of the few available mobile techniques and offers a temporal resolution of milliseconds that is not possible with CT, PET or MRI.
Derivatives of the EEG technique include evoked potentials (PE), which implies the average EEG activity with time closed to the presentation of a stimulus of some type (visual, somatosensory or auditory). Event-related potentials (ERPs) refer to mediated EEG responses that are temporarily blocked for more complex stimulus processing; This technique is used in cognitive science, cognitive psychology and psychophysiological research.
|
0.966079 |
200. Direct labels for plots - Simple, uniform framework for adding direct labels to lattice or ggplot2 plots.
201. MeDiChI - R package implementing model based deconvolution of ChIP-chip (transcription factor binding) data, as published in Bioinformatics journal. Please visit http://baliga.systemsbiology.net/medichi for source code, instructions, and R package downloads.
203. Open Perimeter Interface (OPI) - The OPI is a standard for interfacing with visual field testing machines (perimeters). There are implementations for the Octopus 900, Heidelberg Edge Perimeter, and simulators for white-on-white perimetry.
204. BioMod - BIOMOD is a computer platform for ensemble forecasting of species distributions, enabling the treatment of a range of methodological uncertainties in models and the examination of species-environment relationships.
206. Tools for Uplift Modeling - The R Package tools4uplift integrates some tools for exploring and modeling uplift. The content can be separated into the following steps of statistical modeling: categorization, visualization, feature engineering, feature selection and model validation.
207. ElemStatLearn - Data sets, functions and examples from the book: "The Elements of Statistical Learning, Data Mining, Inference, and Prediction" by Trevor Hastie, Robert Tibshirani and Jerome Friedman.
208. modis - Functions for download, mosaic, re-sample, re-project, analyse and visualise of MODIS grid data. Special attention is given to spatio-temporal change detection and phenological metric extraction.
209. simsalabim - This package currently implements Singular System/Spectrum Analysis (SSA) and Phase Synchronisation Indices.
211. Uncertainty Analysis for SDMs - usdm is a framework to assess the impact of different sources of uncertainties (e.g. positional uncertainty) on performance of species distribution models (SDMs).
212. Toolbox for chemoinformatics - Basic tools for chemoinformatics, including manipulations with chemical structures, reading/writing files, computing descriptors, building SAR/QSAR/QSPR models, predicting properties of chemical compounds, etc.
213. brew - brew implements a templating framework for mixing text and R code for report generation. brew template syntax is similar to PHP, Ruby's erb module, Java Server Pages, and Python's psp module.
214. Bias reduction in GLMs - brglm provides brglm.fit which is an alternative method to glm.fit that works under the usual glm interface. Estimation is either by correcting the bias of the maximum likelihood estimates or using an adjusted-score approach to improving bias.
215. Mutoss - Mutoss (multiple hypotheses testing in an open software system) aims at providing a unified, extensible interface covering a large spectrum of multiple hypotheses testing procedures in R. Features a GUI and a simulation tool. Funded by PASCAL2.
216. art: Applied Regression Tools - Tools for working with various types of regression tools, including diagnostic graphics, inference and model comparison.
217. Analysis of Count Time Series - R package which provides likelihood-based methods for model fitting and assessment, prediction and intervention analysis of count time series following generalized linear models.
218. TIMP - TIMP is an R package for fitting superposition models that implements the partitioned variable projection algorithm. The package has been extensively applied to modeling spectroscopy and Fluorescence Lifetime Imaging Microscopy (FLIM) datasets.
219. PwrGSD - Tools for the design and analysis of sequentially monitored trials on a time to event endpoint. Allows for time varying hazards, allows a flexible specification of contamination and non-compliance.
|
0.999979 |
Can you really get rid of the symptoms of gout once and for all?
This is by no means a life threatening condition, but the question of how to get rid of gout is one of the most common questions asked about any type of medical condition.
The reason for this is quite simple; it can be very uncomfortable as well as extremely painful if it is severe enough.
There are several different types of drugs that can help with this condition, but there are also several natural forms of treatments.
They include vitamins, certain types of juices, as well as diet modifications that can help with answering the question of how to get rid of the symptoms of gout.
There are also several misconceptions about this condition and the two most common are that that it will only affect your toes or your feet and it is exclusive to men.
In answering the question of how to get rid of the symptoms of gout, it is very important to understand exactly what it is. It is not a single condition or a disorder.
Instead, it is a very complex form of arthritis that has some very distinctive characteristics.
The best known of these characteristics is the suddenness as well as the severity it which it strikes and will cause pain as well as redness in your joints.
It can also cause severe tenderness and it will usually affect your feet first, and the first form of attack is almost always the joint of your foot that is located at base of your big toe.
However, this is where the first misconception as well as one of the first questions of how to get rid of gout comes into play, as it can and often does affect a lot more than just your big toe.
It can also affect your ankles as well as your feet, but it can also affect your hands and your wrists.
It is also different than most disorders or conditions where the pain will intensify as more time passes, and as it intensifies, the question of how to get rid of the symptoms of gout also intensifies.
The most painful time frame for the condition is usually within the first 12 to 24 hours, and then after this initial time frame, the pain seems to start to calm down.
But even as it starts to calm down, the discomfort is anything but finished, as you can often have a lingering discomfort that can last for a few days, or in some cases, a few weeks.
There also seems to be another very common occurrence with this condition; the more you are attacked the longer this lingering discomfort seems to last.
Inflammation and redness is often associated with this discomfort, as the affected joints will remain swollen, red, and very tender.
The second common misconception is that it only affects men. The facts are that it can affect anyone at any time, and women that have passed menopause face the same degree of risk as men.
In answering the question of how to get rid of the symptoms of gout, it is also helpful to understand the causes and risk factors.
Unlike a lot of disorders or conditions that have several potential or unknown causes, this one has one very simple cause; too much uric acid in your body.
If you can defeat and eliminate most of this uric acid, it is very easy to control as well as prevent.
This condition develops when urate crystals begin to accumulate around your joints.
Once they reach a certain level the pain and redness will hit you so severely and fast that it will virtually stop you dead in your tracks.
Urate crystals form as the result of high levels of uric acid in your blood as your body produces it to breakdown what are referred to as purines.
These are substances that are found naturally in your body but are also found in certain foods such as organ meats, some fish such as herring, as well as some vegetables.
Under normal circumstances, uric acid is very easily dissolved in your blood and will pass smoothly through your kidneys and out of your body via your urine.
However, there are some occasions where two things can happen; your body produces too much uric acid or your kidneys do not excrete enough of it.
If this does occur, uric acid starts to build up and form very sinister attack weapons.
Crystals will form in the shape of very sharp almost needle-like crystals that attack your joints as well as the surrounding tissues with pin-point accuracy.
There are several risk factors that may trigger this condition, and by far and away the most dangerous is too much alcohol, especially beer.
However, there are also some medications that can trigger it such as high blood pressure or high cholesterol medications.
Low dose aspirin is also believed to be a risk factor, as is age and a family history. Most men as well as women suffer from the symptoms gout between the ages of 40 and 50.
The question of how to get rid of the symptoms of gout continues with the treatments.
There are some very effective medical treatments such as non-steroidal inflammatory drugs, colchicine if you can’t take these drugs, as well as corticosteroids.
Xanthine oxidase inhibitors which blocks uric acid production may also be used, as well as medications that will remove uric acid.
However, all of these drugs have one thing in common; some very serious potential side effects.
But the good news in how to get rid of the symptoms of gout is that there are also some very natural forms of treatments that are just as effective and have virtually no side effects.
The first of these is water, as it is recommended to drink between 8 to 16 cups of fluids every day if you suffer from this condition and at least half of this liquid should be in the form of water.
The next natural treatment in answering the question how to get rid of the symptoms of gout is a vitamin from the B-class of vitamins, folic acid.
This water soluble vitamin in large doses will inhibit xanthine oxidase, which is the enzyme in your body that produces uric acid and when combined with enough liquids, it is extremely effective.
These large dosages should be discussed and monitored by your doctor, as the recommend dosages are between 10,000 and 40,000 micrograms of folic acid per day.
However, there is always the potential that large dosages of any of the B-class of vitamins can cause shortages of the other B vitamins, so you should also take a multi-vitamin in conjunction.
How to get rid of the symptoms of gout continues with Vitamin E, as it is also considered to be very effective for combating this condition as its major role in your body is to reduce inflammation.
There are some circles that will recommend vitamin C, however, any excessive amounts of either vitamin C or niacin increase uric acid levels and should be avoided.
Ridding yourself from the symptoms of gout with cherries, which are a well-known natural treatment but adding other fruits such as blackberries, blueberries, purple grapes, as well as raspberries can also help to reduce uric acid levels in your body.
One teaspoon of raw apple cider vinegar in a glass of water twice a day is another answer to how to get rid of the symptom of gout.
It will also help to trigger alkaline in your body, which is a natural defense against uric acid.
The goal is to get at between 8 and 16 cups of fluids every day and although cherries are very effective, drinking 100 percent cherry juice gives you another very effective tool.
Pure cherry juice is very rich in anthocyanin and the next answer of how to get rid of gout as it does two things; reduces uric acid as well as inflammation.
However, there is one more fluid that when combined with these vitamins and natural treatments is very effective; coffee.
Both regular as well as decaffeinated coffee also seems to lower uric acids in your body and it will help to balance the variety of fluids.
If you have this condition you are most likely asking the question how to get rid of the symptoms of gout almost daily.
It is extremely painful and can attack you so fast you will wonder what actually hit you.
There are conventional medical treatments but why risk the potential side effects when you can treat it naturally without these risks.
|
0.936205 |
Wessex (/ˈwɛsᵻks/; Old English: Westseaxna rīce, "kingdom of the West Saxons") was an Anglo-Saxon kingdom in the south of Great Britain, from 519 until England was unified by Æthelstan in the early 10th century.
Modern archaeologists use the term "Wessex culture" for a Middle Bronze Age culture in this area (ca. 1600-1200 BCE). A millennium before that, in the Late Neolithic, the ceremonial sites of Avebury and Stonehenge were completed on Salisbury Plain; but the final phase of Stonehenge was erected in the Wessex culture phase, early in the Bronze Age. This area has many other earthworks and erected stone monuments from the Neolithic and Early Bronze periods, including the Dorset Cursus, an earthwork 10 km. long and 100 m. wide, which was oriented to the midwinter sunset. Although agriculture and hunting were pursued during this long period, there is little archaeological evidence of human settlements. From the Neolithic onwards the chalk downland of Wessex was traversed by the Harrow Way, which can still be traced from Marazion in Cornwall to the coast of the English Channel near Dover, and was probably connected with the ancient tin trade.
During the Roman occupation numerous country villas with attached farms were established across Wessex, along with the important towns of Dorchester and Winchester (the ending -chester comes from Lat. castra, "a military camp"). The Romans, or rather the Romano-British, built another major road that integrated Wessex, running eastwards from Exeter through Dorchester to Winchester and Silchester and on to London. The early 4th century CE was a peaceful time in Roman Britain. However, following a previous incursion in 360 that was stopped by Roman forces, the Picts and Scots attacked Hadrian's Wall in the far north in 367 and defeated the soldiers stationed along it. They devastated many parts of Britain and laid siege to London. The Romans responded promptly, and Count Theodosius had recovered the land up to the Wall by 368.
The Romans temporarily ceased to rule Britain on the death of Magnus Maximus in 388. Stilicho attempted to restore Roman authority in the late 390s, but in 401 he took Roman troops from Britain to fight the Goths. Two subsequent Roman rulers of Britain, appointed by the remaining troops, were murdered. Constantine III became ruler, but he then left for Gaul and withdrew more troops. The Britons then requested assistance from Honorius, but when he replied in 410 he told them to manage their own defenses. By this point, there were no longer any Roman troops in Britain. Economical decline occurred after these events; circulation of Roman coins ended and the importation of items from the Roman Empire stopped.
In An Introduction to Anglo-Saxon England, Peter Hunter Blair divides the traditions concerning the Anglo-Saxon settlement of Britain into two categories: Welsh and English. The De Excidio et Conquestu Britanniae, written by Gildas, contains the best preservation of the Welsh tradition. In brief, it states that after the Romans left, the Britons managed to continue for a time without any major disruptions. However, when finally faced with northern invaders, a certain unnamed ruler in Britain (called "a proud tyrant" by Gildas) requested assistance from the Saxons in exchange for land. There were no conflicts between the British and the Saxons for a time, but following "a dispute about the supply of provisions" the Saxons warred against the British and severely damaged parts of the country. In time, however, some Saxon troops left Britain; under Ambrosius Aurelianus, the British subsequently defeated those who remained. A lengthy conflict ensued, in which neither side gained any decisive advantage until the Britons routed the Saxons at the Battle of Mons Badonicus. After this, there occurred a peaceful period for the Britons, under which Gildas was living at the time he wrote the De Excidio et Conqestu Britanniae.
The Chronicle continues, stating that "Port, and his two sons Bieda and Maegla", landed at Portsmouth in 501 and killed a high-ranking British nobleman. In 508, Cerdic and Cynric slew a British king named Natanleod and five thousand men with him, (though the historicity of Natanleod has been disputed) and Cerdic became the first king of Wessex in 519. The Saxons attacked Cerdicesford in 519, intending to cross the River Avon and block a road which connected Old Sarum and Badbury Rings, a British stronghold. The battle appears to have ended as a draw, and the expansion of Wessex ended for about thirty years. This is likely due to losses suffered during the battle and an apparent peace agreement with the Britons. The battle of Mons Badonicus is believed to have been fought around this time. Gildas states that the Saxons were completely defeated in the battle, in which King Arthur participated according to Nennius. This defeat is not recorded in the Chronicle. The thirty-year period of peace was temporarily interrupted, when, according to the Chronicle, the Saxons conquered the Isle of Wight in 530 at a battle near Carisbrooke.
Ceawlin is one of the seven kings named in Bede's Ecclesiastical History of the English People as holding "imperium" over the southern English: the Chronicle later repeated this claim, referring to Ceawlin as a bretwalda, or "Britain-ruler". Ceawlin was deposed, perhaps by his successor, a nephew named Ceol, and died a year later. Six years later, in about 594, Ceol was succeeded by a brother, Ceolwulf, who was succeeded in his turn in about 617 by Cynegils. The genealogies do not agree on Cynegils' pedigree: his father is variously given as Ceola, Ceolwulf, Ceol, Cuthwine, Cutha or Cuthwulf.
The tradition embodied in the Anglo-Saxon Chronicle, and in the genealogies of the West Saxon dynasty, is open to considerable doubt. This is largely because the founder of the dynasty and a number of his alleged descendants had Brittonic Celtic, rather than Anglo-Saxon Germanic, names. The name Cerdic is derived from the British name *Caraticos. This may indicate that Cerdic was a native Briton, and that his dynasty became anglicised over time. Other members of the dynasty possessing Celtic names include Ceawlin and Caedwalla. Caedwalla, who died as late as 689, was the last West Saxon king to possess a Celtic name.
These attacks marked the beginning of sustained pressure from the expanding kingdom of Mercia. In time this would deprive Wessex of its territories north of the Thames and the Avon, encouraging the kingdom's reorientation southwards. Cenwealh married Penda's daughter, and when he repudiated her, Penda again invaded and drove him into exile for some time, perhaps three years. The dates are uncertain but it was probably in the late 640s or early 650s. He spent his exile in East Anglia, and was converted to Christianity there. After his return, Cenwealh faced further attacks from Penda's successor Wulfhere, but was able to expand West Saxon territory in Somerset at the expense of the Britons. He established a second bishopric at Winchester, while the one at Dorchester was soon abandoned as Mercian power pushed southwards. Winchester would eventually develop into the effective capital of Wessex.
After Cenwealh's death in 673, his widow, Seaxburh, held the throne for a year; she was followed by Aescwine, who was apparently descended from another brother of Ceawlin. This was one of several occasions on which the kingship of Wessex is said to have passed to a remote branch of the royal family with an unbroken male line of descent from Cerdic; these claims may be genuine, or may reflect the spurious assertion of descent from Cerdic to legitimise a new dynasty. Aescwine's reign only lasted two years, and in 676 the throne passed back to the immediate family of Cenwealh with the accession of his brother Centwine. Centwine is known to have fought and won battles against the Britons, but the details have not survived.
Centwine was succeeded by another supposed distant relative, Caedwalla, who claimed descent from Ceawlin. Caedwalla reigned for just two years, but achieved a dramatic expansion of the kingdom's power, conquering the kingdoms of Sussex, Kent and the Isle of Wight, although Kent regained its independence almost immediately and Sussex followed some years later. His reign ended in 688 when he abdicated and went on pilgrimage to Rome where he was baptised by Pope Sergius I and died soon afterwards.
His successor was Ine, who also claimed to be a descendant of Cerdic through Ceawlin, but again through a long-separated line of descent. Ine was the most durable of the West Saxon kings, reigning for 38 years. He issued the oldest surviving English code of laws apart from those of the kingdom of Kent, and established a second West Saxon bishopric at Sherborne, covering the territories west of Selwood Forest. Near the end of his life he followed in Caedwalla's footsteps by abdicating and making a pilgrimage to Rome. The throne then passed to a series of other kings who claimed descent from Cerdic but whose supposed genealogies and relationship to one another are unknown.
During the 8th century Wessex was overshadowed by Mercia, whose power was then at its height, and the West Saxon kings may at times have acknowledged Mercian overlordship. They were, however, able to avoid the more substantial control which Mercia exerted over smaller kingdoms. During this period Wessex continued its gradual advance to the west, overwhelming the British kingdom of Dumnonia. At this time Wessex took de facto control over much of Devon, although Britons retained a degree of independence in Devon until at least the 10th century. As a result of the Mercian conquest of the northern portion of its early territories in Gloucestershire and Oxfordshire, the Thames and the Avon now probably formed the northern boundary of Wessex, while its heartland lay in Hampshire, Wiltshire, Berkshire, Dorset and Somerset. The system of shires which was later to form the basis of local administration throughout England (and eventually, Ireland, Wales and Scotland as well) originated in Wessex, and had been established by the mid-8th century.
Egbert's later years saw the beginning of Danish Viking raids on Wessex, which occurred frequently from 835 onwards. In 851 a huge Danish army, said to have been carried on 350 ships, arrived in the Thames estuary. Having defeated King Beorhtwulf of Mercia in battle, the Danes moved on to invade Wessex, but were decisively crushed by Egbert's son and successor King Aethelwulf in the exceptionally bloody Battle of Aclea. This victory postponed Danish conquests in England for fifteen years, but raids on Wessex continued.
In 855-6 Aethelwulf went on pilgrimage to Rome and his eldest surviving son Aethelbald took advantage of his absence to seize his father's throne. On his return, Aethelwulf agreed to divide the kingdom with his son to avoid bloodshed, ruling the new territories in the east while Aethelbald held the old heartland in the west. Aethelwulf was succeeded by each of his four surviving sons ruling one after another: the rebellious Aethelbald, then Ethelbert, who had previously inherited the eastern territories from his father and who reunited the kingdom on Aethelbald's death, then Aethelred, and finally Alfred the Great. This occurred because the first two brothers died in wars with the Danes without issue, while Aethelred's sons were too young to rule when their father died.
In 865, several of the Danish commanders combined their respective forces into one large army and landed in England. Over the following years, what became known as the Great Heathen Army overwhelmed the kingdoms of Northumbria and East Anglia. Then in 871, the Great Summer Army arrived from Scandinavia, to reinforce the Great Heathen Army. The reinforced army invaded Wessex and although Aethelred and Alfred won some victories and succeeded in preventing the conquest of their kingdom, a number of defeats and heavy losses of men compelled Alfred to pay the Danes to leave Wessex. The Danes spent the next few years subduing Mercia and some of them settled in Northumbria, but the rest returned to Wessex in 876. Alfred responded effectively and was able with little fighting to bring about their withdrawal in 877. A portion of the Danish army settled in Mercia, but at the beginning of 878 the remaining Danes mounted a winter invasion of Wessex, taking Alfred by surprise and overrunning much of the kingdom. Alfred was reduced to taking refuge with a small band of followers in the marshes of the Somerset Levels, but after a few months he was able to gather an army and defeated the Danes at the Battle of Edington, bringing about their final withdrawal from Wessex to settle in East Anglia. Simultaneous Danish raids on the north coast of France and Brittany occurred in the 870s – prior to the establishment of Normandy in 911 – and recorded Danish alliances with both Bretons and Cornish may have resulted in the suppression of Cornish autonomy with the death by drowning of King Donyarth in 875 as recorded by the Annales Cambriae. No subsequent 'Kings' of Cornwall are recorded after this time, however Asser records Cornwall as a separate kingdom from Wessex in the 890s.
Alfred also reformed the administration of justice, issued a new law code and championed a revival of scholarship and education. He gathered scholars from around England and elsewhere in Europe to his court, and with their help translated a range of Latin texts into English, doing much of the work in person, and orchestrated the composition of the Anglo-Saxon Chronicle. As a result of these literary efforts and the political dominance of Wessex, the West Saxon dialect of this period became the standard written form of Old English for the rest of the Anglo-Saxon period and beyond.
The Danish conquests had destroyed the kingdoms of Northumbria and East Anglia and divided Mercia in half, with the Danes settling in the north-east while the south-west was left to the English king Ceolwulf, allegedly a Danish puppet. When Ceolwulf's rule came to an end he was succeeded as ruler of "English Mercia" not by another king but by a mere ealdorman named Aethelred, who acknowledged Alfred's overlordship and married his daughter Ethelfleda. The process by which this transformation of the status of Mercia took place is unknown, but it left Alfred as the only remaining English king.
After the invasions of the 890s, Wessex and English Mercia continued to be attacked by the Danish settlers in England, and by small Danish raiding forces from overseas, but these incursions were usually defeated, while there were no further major invasions from the continent. The balance of power tipped steadily in favour of the English. In 911 Ealdorman Aethelred died, leaving his widow, Alfred's daughter Aethelflaed, in charge of Mercia. Alfred's son and successor Edward the Elder, then annexed London, Oxford and the surrounding area, probably including Middlesex, Hertfordshire, Buckinghamshire and Oxfordshire, from Mercia to Wessex. Between 913 and 918 a series of English offensives overwhelmed the Danes of Mercia and East Anglia, bringing all of England south of the Humber under Edward's power. In 918 Aethelflaed died and Edward took over direct control of Mercia, extinguishing what remained of its independence and ensuring that henceforth there would be only one Kingdom of the English. In 927 Edward's successor Athelstan conquered Northumbria, bringing the whole of England under one ruler for the first time. The Kingdom of Wessex had thus been transformed into the Kingdom of England.
Although Wessex had now effectively been subsumed into the larger kingdom which its expansion had created, like the other former kingdoms, it continued for a time to have a distinct identity which periodically found renewed political expression. After the death of King Eadred in 955, England was divided between his two sons, with the elder Edwy ruling in Wessex while Mercia passed to his younger brother Edgar. However, in 959, Edwy died and the whole of England came under Edgar's control.
− 1. The name of a kingdom in south-west England in Anglo-Saxon times, used by Thomas Hardy as the name of the county in which his stories are set (corresponding approximately to Dorset, Somerset, Hampshire, and Wiltshire) and since used as a name for south-west England or this part of it.
− 1868 W. Barnes Poems of Rural Life in Common Eng. Pref., As I think that some people, beyond the bounds of Wessex, would allow me the pleasure of believing that they have deemed‥my homely poems in our Dorset mother-speech to be worthy of their reading, I have written a few of a like kind, in common English. 1874 Hardy in Cornh. Mag. Nov. 624 Greenhill was the Nijnii Novgorod of Wessex; and the busiest‥day of the whole statute number was the day of the sheep-fair. 1876 Examiner 15 July 794/1 The Wessex man knows that these passages have in them the real ring, all equally true to life and scenery. 1938 Proc. Prehistoric Soc. IV. 52 The work‥was‥undertaken with a view to examining the cultures of the geographical area usually comprised in the term 'Wessex' in the period immediately following the Beaker phase. 1979 N. & Q. June 193/2 All [volumes] share a chronology of the life and works, Hardy's General Preface to the Wessex Edition, and notes on Wessex and Wessex names.
Both Henry of Huntingdon and Matthew of Westminster talk of a golden dragon being raised at the Battle of Burford in AD 752 by the West Saxons. The Bayeux Tapestry depicts a fallen golden dragon, as well as a red/golden/white dragon at the death of King Harold II, who was previously Earl of Wessex. Dragon standards were in fairly wide use in Europe at the time, being derived from the ensign of the Roman cohort, and there is no evidence that it explicitly identified Wessex.
A panel of 18th century stained glass at Exeter Cathedral indicates that an association with an image of a dragon in south west Britain pre-dated the Victorians. Nevertheless, the association with Wessex was only popularised in the 19th century, most notably through the writings of E A Freeman. By the time of the grant of armorial bearings by the College of Arms to Somerset County Council in 1911, a (red) dragon had become the accepted heraldic emblem of the former kingdom. This precedent was followed in 1937 when Wiltshire County Council was granted arms. Two gold Wessex dragons were later granted as supporters to the arms of Dorset County Council in 1950.
In the British Army the wyvern has been used to represent Wessex: The 43rd (Wessex) Infantry Division, and post war regional 43 (Wessex) Brigade adopted a formation sign consisting of a gold wyvern on a black/dark blue background. The regular Wessex Brigade of the 1960s adopted a cap badge featuring the heraldic beast, until the regiments took back up individual regimental badges in the late 1960s. The Territorial Army Wessex Regiment continued to wear the Wessex Brigade badge until the late 1980s when its individual companies too re-adopted their parent regular regimental cap badges. The now disbanded West Somerset Yeomanry adopted a Wessex Wyvern rampant as the centre piece for its cap badge, and the current Royal Wessex Yeomanry adopted a similar device in 2014 when the Regiment moved from wearing individual squadron county yeomanry cap badges to a unified single Regimental cap badge.
The assigning of arms to the West Saxon kings is prochronistic as heraldry did not develop until the 12th century, though in this case the design was based on a genuine object; the pattern on the reverse of a silver penny of the reign of King Edward the Confessor, as reinterpreted by later heralds. These arms continued to be used to represent the kingdom for centuries after their invention and as the "Arms of Edward the Confessor" the design appears on a number of church windows in derived shields such as the Arms of the Collegeate Church of St Peter at Westminster (Westminster Abbey, which was founded by the king).
At its greatest extent Wessex encompassed the modern areas of Hampshire, Isle of Wight, Dorset and Wiltshire, as well as the western half of Berkshire and the eastern hilly flank of Somerset. This covers an area of about 4,440 sq. miles (11,500 km2).
The film Shakespeare in Love included a character called "Lord Wessex" – a fictional title, which did not exist in actual Elizabethan times, or later.
The BBC television series Broadchurch takes place in Wessex and its characters are seen attending South Wessex Secondary School.
↑ Peter Hunter Blair (17 July 2003). An Introduction to Anglo-Saxon England. Cambridge University Press. p. 2. ISBN 978-0-521-53777-3.
↑ Yorke, Barbara (1 November 2002). Kings and Kingdoms of Early Anglo-Saxon England. Routledge. pp. 130–131. ISBN 9781134707249.
↑ Giles, John Allen (translator) (1914). The Anglo-Saxon chronicle. G. Bell and Sons, LTD. p. 9. Retrieved 27 July 2015.
↑ Loyn, H. R. (1991). Anglo-Saxon England and the Norman Conquest (2 ed.). p. 34.
↑ "Alfred the Great (849 AD – 899 AD)".
↑ Hooper, Nicholas Hooper; Bennett, Matthew (1996). The Cambridge Illustrated Atlas of Warfare: the Middle Ages. Cambridge University Press. pp. 22–23. ISBN 0-521-44049-1.
↑ "Celtic Kingdoms of the British Isles: Dumnonii". The History Files. Retrieved 27 December 2015.
↑ Sawyer, Peter (2001). The Oxford Illustrated History of the Vikings (3rd ed.). Oxford: OUP. p. 57. ISBN 0-19-285434-8.
↑ J. S. P. Tatlock, The Dragons of Wessex and Wales in Speculum, Vol. 8, No. 2. (Apr., 1933), pp. 223–235.
↑ "The Coat of Arms". Somerset County Council. Retrieved 14 January 2008.
↑ "Civic Heraldry of England and Wales – Cornwall and Wessex Area – Wiltshire County Council". Civicheraldry.co.uk. Retrieved 6 August 2011.
↑ "Civic Heraldry of England and Wales – Cornwall and Wessex Area – Dorset County Council". Civicheraldry.co.uk. Retrieved 6 August 2011.
↑ "The Arms of the Countess of Wessex". Royal Insight. Royal.gov.uk. 28 October 2010. Archived from the original on 22 February 2008. Retrieved 28 November 2010.
|
0.999875 |
A patent lawyer's median annual salary is $115,000, but is it worth the lengthy education, training and licensure requirements? Read real job descriptions and see the truth about the career outlook to decide if becoming a patent lawyer is right for you.
Sources: *U.S. Bureau of Labor Statistics, **General Requirements Bulletin, U.S Patent and Trademark Office.
Lawyers represent their clients in legal matters and in the event of a dispute. The U.S. Bureau of Labor Statistics (BLS) lists patent lawyers under the category of attorneys who specialize in intellectual property, meaning patents and trademarks as well as creative works. Duties of patent attorneys may include preparing, filing and prosecuting patent applications for clients. Additionally, patent attorneys can offer legal advice and representation. Patent lawyers are also responsible for understanding the rules of the U.S. Patent and Trademark Office (USPTO).
According to the BLS, the median salary for lawyers was $115,000 in 2014. Jobs for lawyers are expected to increase about 10% between 2012 and 2022. However, since qualified job applicants graduate from school each year, there's still a lot of competition for attorney jobs.
In order to be a patent attorney, you must first become a lawyer. This usually means four years of college for a bachelor's degree followed by three years of law school, culminating in a Juris Doctor (J.D.) degree. Most states require bar applicants to have earned their J.D. at a law school that's accredited by the American Bar Association. After earning your law degree, you must then pass a written bar exam in order to be licensed to practice (also called being admitted to the bar) in that state or jurisdiction.
Be a U.S. citizen, or legal alien. If you practice outside of the U.S., you must be in good standing with the patent office of your country, and they must offer reciprocal privileges.
Complete the application. In addition to your personal information, the application is where you show that you have the technical background needed to help your clients win patents on their inventions. You'll need to include transcripts to prove that you have a degree in a technical subject, such as biology, organic chemistry or in engineering. If not, you must have a bachelor's degree and be able to prove an acceptable amount of coursework in the technical fields recognized by the USPTO. The application also has questions about violations of the law or disciplinary actions against you. Applications have to be printed out, signed by hand and mailed to USPTO, with the appropriate fee for the application and the exam.
Take the exam. Once your application is accepted, you can sit for the six-hour, 100-question exam, which is given on computer at official testing centers. The test is multiple-choice, and questions are pulled from USPTO Manual of Patent Examination Procedure and other policy and procedure manuals (the manuals are listed online in the USPTO's Official Gazette).
Once you pass the exam, the USPTO will send you further instructions on completing your registration. At this point you must provide a certificate of good standing from the bar in your state or jurisdiction in order to be registered as a patent attorney. If you are unable to provide a certificate, you're listed as a patent agent.
A professional staffing company is looking to hire a patent attorney for a contract position in Atlanta. Qualifications include three or more years writing patents, at least three years of biotechnical experience, membership in the Georgia state bar, and registration with the USPTO.
An intellectual property law firm is looking for a patent attorney with an advanced degree in organic chemistry. Candidates must be registered with the USPTO and have at least two years of patent drafting experience. Stellar skills in writing and communication and stellar academic credentials are required. The person hired can work in any of the firm's offices, located in Georgia, Texas, Michigan, Connecticut or Washington DC.
A law firm is looking for an intellectual property/patent attorney with expertise in operating systems, telecom and mobile devices. Candidates must have a J.D. degree and be admitted to the bar in at least one state. Applicants must have a four-year technical or advanced degree in electrical or computer engineering (or related degree) and experience in wireless, optical or communications systems.
The requirements for becoming a patent attorney are very specific. The most important thing to do besides having a technical degree, graduating from law school with the best grades possible and passing the bar in your state or jurisdiction is to carefully study the USPTO general bulletin and other policy and procedure manuals. This will help you be certain that you meet all the requirements to successfully take and pass the USPTO registration exam.
If you are in law school, check to see if your school is participating in the USPTO law school clinic program. This program gives students to opportunity to practice intellectual property law under a USPTO supervisor. You'll learn what it's like to prosecute patents and trademarks, and be more certain if this field of law is for you.
The American Intellectual Property Law Association (AIPLA) is open to state bar members and law students. It offers educational conferences and seminars, and online resources aimed at keeping members up to date on new changes in intellectual property law.
In addition to educational resources, the National Association of Patent Practitioners (NAPP), a nonprofit organization for patent attorneys and agents, offers a voluntary certification program. This program is designed for organization members who want to achieve beyond the minimum standards set by USPTO, and reach a level of best practice as established by NAPP.
If you have the required technical background but don't have or want to obtain a law degree, you can practice before the USPTO as a patent agent. Agents must meet the same registration requirements as patent attorneys, but cannot give legal advice or represent clients in legal matters. The BLS does not specifically collect data on patent agents, but according to PayScale.com, a patent agent (non-attorney) earned $54,000-$140,000 in April 2012.
If you like the idea of studying new inventions but don't want to prosecute patents, consider working for the USPTO as a patent examiner. Examiners determine whether a new invention qualifies for a patent. Examiners research the patent database, legal documents, scientific literature and technical data as well as confer with patent experts in order to accept or reject all or part of an application. In addition to a bachelor's or master's degree, often in engineering or science, new examiners undergo an eight-month training program and two years of ongoing training by the USPTO. Examiners also take continuing education courses given by the USPTO. According to the BLS, entry-level patent examiners earned around $41,000 in 2009. Examiners with experience, promotions and good job performance earned between $94,000 and $122,000.
|
0.999983 |
Infosys crisis blows up as Infy board backs Vishal Sikka, slams Narayana Murthy: Who is saying what?
The turn of events at Infosys in the past few hours have been dramatic with Vishal Sikka announcing his resignation and the Infosys board putting the blame squarely on Narayana Murthy for Sikka's exit.
Vishal Sikka seems to have managed to find a graceful exit by resigning despite the support of Infosys board. In the process, at least for now, Sikka has made the founders of the company look unaccommodating and unamenable. In his resignation letter, he took a dig at the founders, without naming anyone, for not offering support. He said in the letter that the situation was "amplified by the very people from whom we all expected the most steadfast support in this great transformation". "The distractions that we have seen, the constant drumbeat of the same issues over and over again, while ignoring and undermining the good work that has been done, take the excitement and passion out of this amazing journey," Sikka wrote in the letter. He called the accusations levelled against him "baseless and malicious" and "extremely personal". In a press conference later, Sikka said the situation had become "untenable" for him to continue as the CEO.
The Infosys board's strong defence of Vishal Sikka, after his decision to quit as the CEO of the company, clearly suggests that the battle between Infosys founders and the management is far from over. Infosys board statement, soon after Sikka announced his resignation, has directly blamed Narayana Murthy for Sikka's exit. "Murthy's continuous assault, including this latest letter, is the primary reason that the CEO, Vishal Sikka, has resigned despite strong Board support," the statement said.
The board's statement makes reference to an e-mail in which Murthy questioned Sikka's competency as the CEO of Infosys. The board has said that Murthy's email was filled with factual inaccuracies and out-of-context statements. The statement strongly criticised Murthy for carrying out a "misguided campaign" against Sikka. "The Board believes it must set the record straight on the false and misleading charges made by Murthy because his actions and demands are damaging the company," the statement read.
How Narayana Murthy has responded?
Narayana Murthy has made a statement in response to the board's allegations of carrying out a campaign against Sikka. Murthy has said that he will respond to the allegations in "right manner, right forum and at an appropriate time".
"I am extremely anguished by the allegations, tone and tenor of the statements. I voluntarily left the board in 2014 and am not seeking any money, position for children or power. My concern primarily was the deteriorating standard of corporate governance which I have repeatedly brought to the notice of the Infosys board," Murthy said in a statement.
He further added: "Several shareholders who have read the whistle-blower report have told me that it is hard to believe a report produced by a set of lawyers hired by a set of accused, giving a clean chit to the accused, and the accused refusing to disclose why they got the clean chit!"
|
0.999998 |
F20 Foundations Take a Stand: Renewable Energy Institute - TwentyThirty.
Mika Ohbayashi: We want to use the opportunity to speak in the name of a global coalition of foundations to encourage the Japanese government to aim for ambitious climate targets at the G20 summit. So far, Japan has not yet proposed long-term targets. This is even more important as Japan's climate policy has a major effect on other Asian countries.
Mika Ohbayashi: The Renewable Energy Institute can add value, especially in view of the G20 Summit hosted by Japan in 2019, by helping to understand the Japanese policy making, which may be difficult to fathom from outside. As current Japanese climate change policies pose an obstacle to ambitious global climate targets, it is important to encourage change. Also, we can help encourage other foundations, which so far have not yet engaged in climate change and international coalitions, to become part of this movement and members of F20.
What is the Renewable Energy Institute in a nutshell?
Mika Ohbayashi: The Renewable Energy Institute aims to realize a renewable energy-based society in Japan and other Asian countries. We are working towards this goal mainly through advocacy work, and by developing policy recommendations based on research to encourage the Japanese government and other stakeholders to implement an ambitious climate policy as well as renewable energy targets. Also, with the Japan Climate Initiative, we mobilize the private sector to go forward for climate change commitment.
|
0.999997 |
A can contains 375 mL of soda. How much is left after 308 mL is removed?
Therefore, the answer is 67 mL.
|
0.999895 |
I Have lived in the São Miguel Island, in the Azores Archipelago (Portugal) all my life and I love it!
The Azores is one of the two autonomous regions of Portugal, composed of nine volcanic islands situated in the North Atlantic Ocean.
Its main industries are agriculture, dairy farming (for cheese and butter products primarily), livestock ranching, fishing, and tourism, which is becoming the major service activity in the region.
São Miguel Island (named for the Archangel Michael), is also referred to locally as "The Green Island", is the largest and most populous island in the Portuguese archipelago of the Azores. The largest city in the archipelago is Ponta Delgada.
S. Miguel's diverse scenery is a pleasant awakening to visitors, with beautiful lakes, sandy beaches, rolling hills, high mountains, green plains and blue ocean.
S. Miguel is also the island in the Azores with the most to offer. Its cosmopolitan town of Ponta Delgada offers the visitor a blend of contemporary life with historic flavor. S. Miguel monuments, turn of the century architecture, parks and cobble stone streets are interlaced with a modern marina, nice restaurants, shopping, bars, night-clubs, and ocean-front cafes.
There are some hot springs, generally located in the center of the island, in the area stretching from Povoação to Nordeste.
Activities in S. Miguel include whale watching, swimming with dolphins, walking and trekking, diving, fishing, jeep safaris, bird watching, sailing, snorkeling, swimming, golf and many other outdoor and indoor activities.
The weather is best between June and October with the hottest months being July, August and September. November to January is also pleasant but temperatures dip slightly. February through May tend to be on the rainy side.
|
0.952415 |
The summit was hosted by British Prime Minister David Cameron. Attendees included Canadian Prime Minister Stephen Harper, US President Barack Obama, German Chancellor Angela Merkel, French President François Hollande, Italian Prime Minister Matteo Renzi and Spanish Prime Minister Mariano Rajoy.
There were another 180 VIPs, and 4,000 delegates and officials from approximately 60 countries.
The official logo for the summit included a panel with four quadrants, each bearing a stylised symbol of Newport or Wales: a Celtic knot, the Welsh Dragon, Newport Transporter Bridge and a Welsh castle. The entrance to the venue was fronted by a full-scale replica of a Eurofighter Typhoon.
World leaders met at the Celtic Manor, and informally at other locales in and around Cardiff. They discussed ongoing events in the world, such as terrorism, cyber warfare, and other areas of national security interest to the member states.
Ukrainian President Petro Poroshenko had a joint discussion with EU big four leaders and US President Barack Obama before the official start of the Summit, to discuss the crisis with Russia.
At the end of the summit Ukrainian President Poroshenko announced a ceasefire which had been agreed with one of the leading pro-Russia separatist leaders, under terms proposed by Russian President Vladimir Putin, which was cautiously welcomed by NATO leaders.
For the first time, the Allies formally pledged to aim to move towards what had previously been an informal guideline of spending 2% of their gross domestic products on defense, and 20% of that on new equipment. For countries which spend less than 2% they agreed upon that these countries "aim to move towards the 2% guideline within a decade". In 2015, five of its 28 members met that goal. At the beginning of 2018, eight of the 29 members either were meeting the target or were close to it; six others had laid out plans to reach the target by 2024 as promised; and Norway and Denmark had unveiled plans to substantially boost defense spending (including Norway's planned purchase 52 new F-35 fighter jets.
Further outcomes were the development of the Readiness Action Plan and the Defence and Related Security Capacity Building Initiative.
Protests, demonstrations and marches took place in Newport and Cardiff involving several hundred people, though the turnout was much lower than predicted.
A retired German politician, Walther Stützle [de], former defence secretary of state (until 2002) and former head of the Stockholm International Peace Research Institute (until 1991), criticised the summit agenda for its focus on military details and not political perspectives.[importance?] Stützle said that the Russian Federation was not a military threat to NATO but criticised that new NATO members' policies were not détente and negotiation with the Russian Federation.
Cardiff Castle during the summit, showing NATO flags and the "ring of steel".
In both Newport and Cardiff, road closures and security measures, starting weeks in advance of the summit, created widespread disruption. Thirteen miles (21 km) of security fencing, 2.7 m (9 ft) high, was erected around the Newport hotel venue and 10 miles (16 km) of fencing put up around Cardiff city centre, creating what was described as a "ring of steel". Businesses in the vicinity of security fencing in Cardiff reported a drop in trade by up to a third. This fencing was based on, and expanded, the 'National Barrier Asset' which is held in reserve for similar events.
Security included around 9,500 specially trained police officers patrolling the streets of the two cities, military helicopters including US Osprey V22s and the Royal Navy's new £1bn Type 45 destroyer HMS Duncan.
^ Hjelmgaard, Kim (31 August 2014). "NATO summit 'most important' since fall of Berlin Wall". USA Today. Archived from the original on 1 September 2014. Retrieved 9 December 2015.
^ "Nato Wales 2014: Newport summit in numbers". BBC News. 29 August 2014. Retrieved 30 August 2014.
^ "Nato summit logo features Newport's Transporter Bridge – BBC News". BBC. Retrieved 9 December 2015.
^ "Final preparations for Nato summit in Newport – BBC News". BBC. Retrieved 7 February 2016.
^ "Summit Wales 2014 – Day 1". Getty Images. 4 September 2014. Retrieved 7 February 2016.
^ "Poroshenko to brief world leaders before NATO summit". Channel NewsAsia. 4 September 2014. Retrieved 8 September 2014.
^ "Obama, Cameron, Merkel, Hollande y Renzi se reunirán con presidente de Ucrania – Noticias | TeleticaMovil". teletica.com. Retrieved 12 September 2014.
^ "Ucraina. Renzi arriva al vertice Nato, summit G5 su Ucraina apre incontri". Internazionale (in Italian). Rome. 4 September 2014.
^ a b North Atlantic Alliance (5 September 2015). Written at Newport, Wales. Wales Summit Declaration (PDF). Meeting of the North Atlantic Council, 4–5 September 2014. London: Government Digital Service. Archived from the original (PDF) on 21 June 2015. Retrieved 7 February 2016.
^ "International partners sign Joint Expeditionary Force agreement – News stories". gov.uk. Retrieved 12 September 2014.
^ "NATO Summit 2014: Armed Forces Declaration – Publications". gov.uk. Retrieved 12 September 2014.
^ "NATO Summit 2014: Joint Statement of the NATO-Ukraine Commission – Publications". gov.uk. Retrieved 12 September 2014.
^ "Wales Summit Declaration on Afghanistan – Publications". gov.uk. Retrieved 12 September 2014.
^ MacAskill, Ewen; Walker, Shaun (4 September 2014). "Nato leaders cautiously welcome Ukraine ceasefire agreement". The Guardian. Archived from the original on 4 September 2014. Retrieved 8 September 2014.
^ Techau, Jan (2 September 2015). "The Politics of 2 Percent: NATO and the Security Vacuum in Europe". Carnegie Europe. Retrieved 11 July 2018. A month before [the alliance's summit in Riga in 2006], Victoria Nuland, then the U.S. ambassador to NATO, called the 2 percent metric the "unofficial floor" on defense spending in NATO. But never had all governments of NATO's 28 nations officially embraced it at the highest possible political level—a summit declaration.
^ "Military Spending by NATO Members". The Economist. 16 February 2017. Retrieved 4 March 2017.
^ Bendavid, Naftali (22 June 2015). "Just Five of 28 NATO Members Meet Defense Spending Goal, Report Says". The Wall Street Journal. Retrieved 4 March 2017.
^ Ivana, Kottasova (8 July 2016). "These NATO Countries are Not Spending Their Fair Share on Defense". CNNMoney. Retrieved 4 March 2017.
^ Gramer, Robbie (27 June 2018). "Ahead of NATO Summit, U.S. President Exhorts Allies to Pay Up". Foreign Policy magazine. Retrieved 12 July 2018.
^ "Four arrests at anti-Nato protest in Cardiff". BBC News. 5 September 2014. Retrieved 6 September 2014.
^ Stützle, Walther (4 September 2014). "Die NATO wird nicht bedroht" [NATO is not threatened]. deutschlandfunk.de (Interview) (in German). Interviewed by Friedbert Meurer. Köln, DE: Deutschlandfunk. Archived from the original on 5 September 2014.
^ a b Deans, David (7 August 2014). "Nato Summit 2014: Road closures and disruption in Cardiff city centre". Wales Online. Retrieved 1 September 2014.
^ Gemma Mullin (26 August 2014). "Lockdown in Cardiff: City turned into high security 'prison' with 10 mile 'ring of steel' ahead of Nato conference". Daily Mail. Retrieved 3 September 2014.
^ Atwell, Jessica (28 August 2014). "Nato Summit 2014: Businesses near Cardiff Ring of Steel claim trade has dropped by a third since fence was erected". Wales Online. Retrieved 1 September 2014.
^ Paul Rowland (2 September 2014). "Nato Summit 2014: The main security measures in Newport and Cardiff". Wales Online. Retrieved 8 September 2014.
^ "VERTICE NATO: MATTEO RENZI E MINISTRO MOGHERINI ARRIVATI IN GALLES | AGENPARL AGENPARL". agenparl.com. Retrieved 12 September 2014.
Wikimedia Commons has media related to 2014 Wales summit.
This page was last edited on 25 April 2019, at 15:30 (UTC).
|
0.974806 |
The first popular science-fiction program on American television was the DuMont Television Network children's adventure serial Captain Video and His Video Rangers, which ran from June 1949 to April 1955. Within eight months of Captain Video's debut, two other landmark series were launched - Tom Corbett, Space Cadet (8/50 - 6/55) and Space Patrol (3/50 - 2/55). ABC attempted to cash in on the burgeoning television science fiction market with a small screen version of Buck Rogers in 1950, but failed within months. Another series of the fiftes, Rod Brown of the Rocket Rangers broadcast live Saturdays from April 18, 1953, to May 29, 1954. The show was eventually cancelled due to a copyright infringement lawsuit based on the shows conceptual similarity to Tom Corbett.
Nevertheless, Captain Video proved to be very popular, drawing audiences of 3.5 million at its peak, a more than respectable number for television at that time. It fired the imaginations of many of its young viewers, who had never before seen science fiction outside of cinemas, and had never been able to follow the same characters in a science-fiction setting over a prolonged period of time.[ citation needed ] The financial crisis of the DuMont Network eventually led to the cancellation of Captain Video, and soon the collapse of the entire network itself. However, the program had made its mark, and other science-fiction shows followed during the 1950s.
Within eight months of the debut of Captain Video, two other series would come to eclipse the program in popular memory. Tom Corbett, Space Cadet (1950–55) and Space Patrol (1950–55) were a fast-turnaround second generation of TV sci-fi, telling more compelling stories on larger budgets. Thanks to a stronger connection to their sponsors, both shows offered a shower of mail-in premiums that solidified their brand names, leading to the first TV tie-in toys on store shelves. Both offered daily radio programs featuring the television casts to augment their television adventures, and the actors were pressed into service for public appearances on a weekly basis. The schedule was grueling, but the resulting media blitz resulted in a large and loyal fan base for both programs. Both of these shows offered something Captain Video could not - due to the poor budget of the series, Captain Video was earthbound. The space adventures of Tom Corbett and Space Patrol forced Captain Video to eventually take to the stars to compete.
ABC’s attempt to cash in on the success of this genre was a small screen version of Buck Rogers , which had already proved to be a huge success as a film serial in the 1930s. Running for a single season, 1950–1951, ABC’s Buck Rogers starred Kem Dibbs and later Robert Pastene in the lead role. Like Captain Video, it was the victim of a very small budget, which restricted most of its action to a single laboratory set, hardly the most thrilling of situations for its young target audience.
Another 1930s serial was also resurrected for the small screen: Flash Gordon , starring Steve Holland in the title role. Episode credits indicate that it was filmed in Germany and France and syndicated in the U.S. It ran for a single season of 39 episodes, from 1953 to 1954. Another film hero, an alien living on Earth, transitioned to television in the Adventures of Superman which ran from 1952 to 1958.
Other series existed, but mostly in independent syndication. Captain Z-Ro was initially broadcast locally in San Francisco beginning in 1951, but moved to national syndication during its final two years of production beginning in 1954. Rocky Jones, Space Ranger was syndicated nationally for its two-year run from 1954–55. Generally a superior program to most of the sci-fi series of the time,[ citation needed ]Rocky Jones was a victim of timing; by 1954, public interest was returning to the western genre. By the end of 1955, all of the episodic science fiction adventure series were gone from the airwaves.
Gradually, television producers realized that there was an adult audience as well as a young audience for science fiction. Television began to cater to a more cerebral brand of science fiction viewer, possibly inspired by the contemporary boom in literary science fiction by the likes of Isaac Asimov, or by the popularity of the allegorical science-fiction movies that were produced during the decade, such as The Day the Earth Stood Still .
One of the stalwarts of science fiction television programming in its early decades was the anthology series, in which a completely new story would be presented in each episode, with new actors, settings, and situations. The only continuing link was the producers, the genre, and the series title. The first series of this kind was Tales of Tomorrow running for 85 episodes, between 1951–53, it was meant to be the first science fiction show for adults. The next popular series was Science Fiction Theatre , a syndicated series that ran for 78 episodes between 1955–57.
Two years after its run finished, a much more popular and influential program in the same vein debuted on the CBS Network: The Twilight Zone , hosted by Rod Serling. The Twilight Zone began life as a one-off pilot, commissioned after the success of a science-fiction episode of the general drama anthology series Westinghouse-Desilu Playhouse. In its original form, the series ran for five years, from September 1959 until September 1964, with 156 episodes aired during that time. Presenting a vast array of science-fiction and horror concepts, its run included many memorable episodes whose imagery still lingers in American popular consciousness. One of its most enduring motifs has been its theme music, which is now recognized internationally.
The Twilight Zone was the bedrock of the more grown-up science fiction that would be produced during the 1960s. It was shot on film (as was now standard for much American non-live television programs), well-produced, and featured imaginative writing. One of the best-known episodes was the 1963 installment "Nightmare at 20,000 Feet," which starred a young William Shatner (later cast as Star Trek's Captain Kirk) as a man convinced that a hideous monster is lurking on the wing of the airplane in which he is traveling, even though nobody else can see it.
That episode help launch the career of Shatner, as well as a film version and a revival series during the 1980s. It also served as inspiration for ABC’s decision in 1963 to launch their own science fiction anthology, the equally iconic The Outer Limits . Although The Outer Limits had a much shorter run, finishing in 1965, it proved to be famous and influential as well. Like its CBS contemporary, it spawned an only moderately successful revival decades later.
Irwin Allen, who later went on to produce famous 1970s disaster movies like The Poseidon Adventure and The Towering Inferno , produced a whole range of popular science fiction series shows on American television during the 1960s. These included Voyage to the Bottom of the Sea (1964-1968), The Time Tunnel (1966-1967), and Land of the Giants (1968-1970). All involved futuristic, scientific concepts played out as the background to glossily produced action/adventure shows. Critics of Allen’s output often argue that it is all rather soulless and shallow, but as mass-produced entertainment it proved popular with American and international audiences. A popular non-Allen production was The Wild Wild West (1965 to 1969) which incorporated classic Western elements, espionage thriller and science fiction/alternate history concepts (in a similar vein to what would later be called steampunk).
The mid 1960s would prove to be an important period in the history of US television science fiction. It saw the creation of two brand new "space opera"-based science fiction shows, both featuring broad galactic exploration themes, with each show dealing with them in very different manners. The first of these was Irwin Allen's CBS show Lost in Space , which ran for three seasons from 1965 to 1968, and the other series, which premiered on NBC in 1966, was Star Trek.
Star Trek began as an unscreened pilot made in 1964 before the series began in 1966. The show was conceived by screenwriter and producer Gene Roddenberry, depicting a future of galactic exploration and struggle, with all creeds and colors of humanity working together to explore the stars in a similar manner to the pioneers of the old West in America. Produced by Paramount for the NBC Network, Roddenberry’s original 1964 pilot for Star Trek, called "The Cage" and starring Jeffrey Hunter as Captain Christopher Pike, was regarded as being too intellectual and slow-moving by the network: however, they had sufficient faith in the ideas behind the program to commission a second pilot, which replaced the character of Pike and all but one of the rest (Spock, played by Leonard Nimoy, was the only character carried over from the original 1964 pilot) with a new crew commanded by Captain James T. Kirk, played by William Shatner. The show used a few established science fiction authors. Harlan Ellison wrote “The City on the Edge of Forever”, Richard Matheson wrote "The Enemy Within," and Theodore Sturgeon wrote “Shore Leave” and “Amok Time”.
Star Trek was also known for its social commentary. The background for this commentary was a set of alien cultures that roughly paralleled the Earth of today. The United Federation of Planets was analogous to America, Starfleet to NATO, the Klingons to the Soviet Union, and the Romulans to China.
When that background seemed restrictive, Star Trek would create new cultures and new situations. When an episode was written about racial prejudice (“Let That Be Your Last Battlefield”), half-black and half-white aliens were created. Frank Gorshin, playing Commissioner Bele, was black on the right side of his body, and white on the left. He was trying to arrest Lokai, played by Lou Antonio, who was black on the left, and white on the right. When Bele brought Lokai back to their home planet, no one was left alive. A racial war had killed everybody. In spite of Kirk saying “Give up your hate”, Bele and Lokai fled the Enterprise and continued their fight on the planet’s surface. The focus of this episode was not technology, but feelings and philosophy. The prejudice, and the pursuit of Lokai by Bele could have been a story without the presence of a star ship, and a pursuit across the galaxy. Therefore, it would be an example of soft science fiction.
Star Trek could also be technical. In the episode "The Changeling," Nomad is an Earth space probe that becomes damaged, and then somehow merges with the alien probe Tan-Ru. Its programming somehow changes, and it now seeks out and destroys imperfect life-forms. Nomad destroys the Malurian System’s four billion inhabitants, and then encounters the Enterprise. Kirk and his crew discover Nomad’s past and its new programming, and have to stop it before it destroys any more races. This, of course, they do. This is a classic case of out-of-control technology. Without Nomad, the technological artifact, there could have been no story. Science is used to analyze Nomad, and to determine how to defeat it. Therefore, this episode is an example of hard science fiction.
In this new form, Star Trek ran for three years until 1969, although it was never a huge ratings hit and stopped two years short of its planned five-year run. Only a fan campaign had prevented it from being canceled after the second season, but despite this apparent unpopularity, the show had a special quality to it that attracted a loyal fan base, and during syndication of the program in the early 1970s it proved to have an enduring popularity that would not go away. An animated series was commissioned, and eventually in the late 1970s a sequel series, Star Trek: Phase II was planned and work begun. However, after the success of Star Wars in the cinema, Paramount scrapped the idea of a new series and decided instead upon launching Star Trek as a film franchise. Star Trek would return to the small screen in a new form in due course, but not until 1987, some eighteen years after its original cancellation.
Apart from repeats of Star Trek gathering popularity in syndication, the early 1970s proved to be at something of a low ebb for television science fiction in the US. Very few series of any great note or popularity were produced, and few if any from this period are remembered today. The success in syndication of the original Star Trek series, and fan pressure for a Star Trek revival, led to The Animated Series (1973–1974). The Animated Series continued the adventures of the Enterprise and its crew, however, it is generally considered to be non-canonical.
After the end of the original Star Trek series, and before the first Star Trek movie, producer Gene Roddenberry was able to produce and write a few TV-movies, none of which had anything to do with Star Trek. Genesis II (1973) involved Alex Cord as Dylan Hunt, a scientist who after waking up from suspended animation, finds himself in a primitive society while he works with a more advanced group known as PAX. The Questor Tapes (1974) involves an android that disappears to seek his creator. Planet Earth (1974), was a sequel to Genesis II about PAX and Dylan Hunt who was played by John Saxon. A third and final PAX movie, Strange New World (1975), also starred John Saxon as Captain Anthony Vico.
It was not until later in the decade, again inspired by the post-Star Wars boom of 1977 and beyond, that science fiction series began to return to prominence. One of those particularly keen on exploiting the networks’ new interest in the genre was producer Glen A. Larson, who created two new science fiction series in quick succession: his own original creation Battlestar Galactica/Galactica 1980 (1978–80) and another television version of Buck Rogers, this time entitled Buck Rogers in the 25th Century (1979–81). Both of these series had much in common. They were glossily produced on high budgets, with pilot episodes that were released theatrically into cinemas in some territories. However, both series seemed to place an emphasis on style over content, with the scripts generally being run of-the-mill action/adventure affairs with few of the more challenging concepts of science fiction of their predecessors. It is perhaps for this reason that both programs were so short lived, although they did attract highly dedicated and vociferous fan bases and do still linger to a certain extent in the popular consciousness.
A successful British science fiction series Doctor Who was syndicated in the US starting in 1972, with selected episodes of Jon Pertwee's time as the Doctor. In 1978, Tom Baker's first four seasons as the Doctor were sold to PBS stations across the United States.
Science fiction print authors didn’t usually make it onto TV. Most TV scripts were created originally for TV. One of the few famous print authors to make it to the small screen was Ray Bradbury. His collection of linked stories The Martian Chronicles , was produced as a mini-series that first aired in 1980. Labeled as “faithful” but “bland'” it included such stars as Rock Hudson, Darren McGavin, Roddy McDowall and Bernadette Peters.
The most significant US science fiction television series of the early 1980s was the 1983 miniseries V , which aired on NBC. An allegorical tale paralleling the rise of Nazism in Germany of the 1930s with the arrival on Earth of an apparently friendly alien race with hidden motives, the miniseries proved to be highly popular and iconic, spawning both a sequel V: The Final Battle the following year, and then a full-blown television series for the 1984–1985 season, although neither of these were as successful as the original, being more action-oriented and somewhat less cerebral.
1987 saw the arrival of what is perhaps the most successful, in terms of sales and worldwide viewing figures, science fiction series of all time, Gene Roddenberry’s re-launching of his Star Trek franchise, Star Trek: The Next Generation . Taking place on a new starship Enterprise some seventy years after the events of the original series, unlike its predecessor it was not supported by a network, but instead sold directly into syndication. The program was a huge success, running for seven seasons and like the original series spawning several feature film spin-offs.
Another 1987 series was the oddball Max Headroom . Originally a British pilot film, it was picked up and re-made in America as a darkly comical drama series which followed an investigative video news journalist, Edison Carter (played by Matt Frewer) as he pursued stories and exposed scandals in a dystopian, TV-obsessed future. Edison was aided and abetted by a group of friends and colleagues, and by his electronic alter-ego, the stuttering, sarcastic iconoclast, Max Headroom. Although Max himself became something of a pop-culture phenomenon of the 1980s, the series itself was not a great success—despite being lauded for its portrayal of a world "20 minutes into the future", a Blade Runner -like cyberpunk world, where TV channels and ratings wars were everything, and people (particularly those at the margins of society known as "blanks", who had no record in the worldwide computer database and hence did not officially exist) were nothing.
A 1988 television series was the immensely successful British science fiction sitcom Red Dwarf. It originated from a 1980s' recurring radio sketch: Dave Hollins: Space Cadet and ran for 10 series over three time periods - Series 1-6 between 1988 and 1993, Series 7 & 8 between 1997 and 1999, plus a 3-parter (Series 9) in 2008 and Series 10 in 2012. In addition to the television series, there are four bestselling novels, two pilot episodes for an American version of the show, a radio version produced for BBC Radio 7, tie-in books, magazines and other merchandise. Red Dwarf was a mining ship running between Earth and Jupiter which experienced a radiation leak that kills almost all the crew. The series is based on the "odd couple" survivors.
In the fall of 1989, the Alien Nation television series premiered. The drama was based on the 1988 film which starred actor James Caan. The original film was a buddy cop action picture with a plot involving extraterrestrials who land on earth and attempt to assimilate into human society. The television series continued the storyline, but among the theme of science fiction, the writers injected other elements such as discrimination and racism into the episodes. The series lasted only one season, but it did spawn five television films, a comics series, and a number of novels.
The success of Star Trek: The Next Generation led to further Star Trek series which took place within the same time frame: firstly Star Trek: Deep Space Nine (1993–99) and later UPN’s Star Trek: Voyager (1994–2001) and Star Trek: Enterprise (2001–05). All of these series have helped affirm the iconic status of the Star Trek franchise, but as well as this they helped lead to a science fiction boom of the 1990s, as many networks and production companies sought to make their own shows in a genre which had shown itself to be incredibly popular and profitable again.
Although there were many run-of-the-mill series that did not get past a single season, this boom decade for science-fiction produced many intelligently written, creative, imaginative shows that have in a very short period of time been able to establish themselves in the popular consciousness of television viewers not just in the US, but worldwide as well.
Space: Above and Beyond lasted just one season – 1995–96. The basic premise was space Marines defending Earth against hostile aliens. Perhaps the show didn’t last because it produced no stars. [ citation needed ] seaQuest DSV , on the other hand, had a star in Roy Scheider. He played Captain Nathan Bridger from 1993–95. He was replaced for the 1995–96 season by Michael Ironside, who played Captain Oliver Hudson. The show was cancelled after that season.
However, one of the more successful and most artistically ambitious series of this period was Babylon 5 . Produced and largely written by J. Michael Straczynski with creative input by Harlan Ellison, this show attempted to create a series-long epic tale that avoided many of the clichés of the television genre. The series was highly acclaimed for its writing and its innovative visuals as the first television series to extensively use computer-generated imagery to create spectacular visual effects for an economical price. In addition, its five-season run (1993–98), the intended length of the series, was longer than any American non Star Trek space series up to that time.
There were time-travel and dimension-hopping series in the vein of Quantum Leap (1989–93) and Sliders (1995–2000), and mysterious conspiracy thrillers such as The X-Files (1993–2002). The latter series in particular enshrined itself within the pop culture of a generation in a manner in which few television series are able, and the entire decade produced a rich vein of highly successful science fiction shows.
At the turn of the century, however, a change began in the type of telefantasy program that was popular with the viewing masses. Most of the genre programming to be found on the networks was horror or fantasy based rather than science-fiction as such: there was perhaps a sense that audiences were tired of science-fiction, and sought other types of programs. Others would say there was a TV exec backlash against the Genre, others would claim a media conglomerate displeasure with the costs associated with high production values needed by a good quality science fiction show. Thus the rise to production of such shows as Buffy the Vampire Slayer , its spin-off Angel and the stylistically similar Charmed . All of these were set in the real world of the present day, but involved fantastical and horrific threats to the central characters, and possessed a wit and self-awareness that had perhaps been lacking in some of their more po-faced science-fiction predecessors, not to mention much lower costs to produce.
Nonetheless, the popularity of science fiction as a genre means that several notable programs enjoyed significant longevity. Stargate SG-1 began in 1997 and aired 10 seasons, and is somewhat unusual in being a successful spin-off series from the 1994 movie. The series became the longest-running North American science fiction television series, which warranted two spin-offs: Stargate Atlantis , which ran for five seasons; and Stargate Universe , which ran for only two seasons instead of the originally-planned five. Stargate SG-1 retained its record until Smallville completed its run with 218 episodes in 2011 and broke its record. The Sci-Fi Channel "original series" Farscape (which is in fact not American, but actually Australian, and premiered on the Nine Network), while never garnering a widespread audience, was heralded by critics and gained a dedicated fanbase, which helped the creators wrap up several story lines in the miniseries event Farscape: The Peacekeeper Wars after the show's cancellation. The aforementioned Star Trek: Enterprise ran for four seasons, and the Sci Fi Channel aired a mini-series based on the original Battlestar Galactica, whose success paved the way for the acclaimed Battlestar Galactica , which lasted for four seasons and two movies, Battlestar Galactica: Razor and Battlestar Galactica: The Plan . Fringe , which featured a mad scientist character and explored alternate universes, aired for 100 episodes (2008-2013) on Fox.
The nature of science fiction as a genre and the trends of American culture allows is to explore the whole range of all types of science fiction from comedy to drama, just entertainment to socially relevant, youth to adult, soft to hard, gross to tasteful, cheap to expensive productions, and lame to thoughtful.
Despite trends in television, science fiction as a genre has firmly established its place in the make-up of American programming. The future of science fiction could be significantly helped by the advances in digital imagery, which allows for spectacular visual effects for a relatively economical price.
Two other subgenres were comic science fiction, and youth science fiction (children and teenagers). Examples of the former are My Favorite Martian , CBS, 1963–66; Mork & Mindy , ABC 1978–1982; ALF , NBC, 1986–90; and 3rd Rock from the Sun , NBC, 1996–2001.
There are many examples of youth science fiction. They are characterized by relatively simple plots, and characters despite lacking production value. A British import using marionettes was Fireball XL5 , initially released in 1962. Fireball XL5 was a rocket ship protecting Sector 25 of the Solar System. Also first released in 1962 was Space Angel, a cartoon. “Space Angel” was the code name for Scott McCloud, captain of a space ship. The Jetsons originally ran on ABC from 1962–63. George Jetson was the head of a family of the future. Usually, Jonny Quest , (1964–65), was a cartoon adventure, but with science fiction technology, e.g. a rocket ship and a hovercraft. Higher production values were quite evident in the Zenon trilogy released by the Disney Channel. Zenon: Girl of the 21st Century was released in 1999, Zenon: The Zequel was released in 2001, and Zenon: Z3 was released in 2004.
↑ Both of these films are considered canon within the Star Wars expanded universe, but neither was carried over to Disney's Star Wars canon.
Ronald Dowl Moore is an American screenwriter and television producer. He is best known for his work on Star Trek; on the re-imagined Battlestar Galactica television series, for which he won a Peabody Award; and on Outlander, based on the novels of Diana Gabaldon.
Captain Video and His Video Rangers was an American science fiction television series aired on the DuMont Television Network, and was the first series of its genre on American television.
A clip show is an episode of a television series that consists primarily of excerpts from previous episodes. Most clip shows feature the format of a frame story in which cast members recall past events from past installments of the show, depicted with a clip of the event presented as a flashback. Clip shows are also known as cheaters, particularly in the field of animation. Clip shows are often played before series finales, or once syndication becomes highly likely. Other times, however, clip shows are simply produced for budgetary reasons.
Erick Avari is an American television, film and theater actor known primarily for his roles in science-fiction serial productions, including Stargate (1994), Independence Day (1996) and The Mummy (1999).
Star Trek is one of the most culturally-influential media franchises, and is often regarded as the most influential science fiction TV series in history.
Richard "Rick" Worthy is an American actor, best known for appearing in a variety of science fiction and fantasy television shows. He is perhaps best known for his recurring role as Simon O'Neill cylon model number four in the reimagined Battlestar Galactica.
InnerSpace was a daily Canadian television talk show devoted to genre news in science fiction which served as the flagship program of Space. InnerSpace aired each weekday at 7 p.m. ET and covered film, television, video games, technology, comic books, gadgets, and all news related to the sci-fi genre. Its hosts were Ajay Fry, Morgan Hoffman and Teddy Wilson. The show was cancelled on May 24, 2018 due to financial pressure.
The fourth season of the American science fiction television series Star Trek: The Next Generation commenced airing in broadcast syndication in the United States on September 24, 1990 and concluded on June 17, 1991 after airing 26 episodes. Set in the 24th century, the series follows the adventures of the crew of the Starfleet starship Enterprise-D.
↑ Aguilar, Lou (January 25, 2019). "Come Back, Shane — and Matt Dillon, Ringo Kid, and Magnificent 7". American Spectator. Archived from the original on January 28, 2019. Retrieved February 9, 2019.
Asherman, Allan (1986). The Star Trek Compendium. Pocket Books. ISBN 0-671-62726-0.
Malcom, Nollinger, Rudolph, Tomashoff, Weeks, & Williams (August 1, 2004). 25 Greatest Sci-Fi Legends. TV Guide, pp. 31–39.
|
0.999906 |
This quiz checks your knowledge of some of the most popular vampire movies.
Can you match the quote with the horror movie?
Dim out the room, get your popcorn ready and check your knowledge of scary movies.
|
0.963165 |
"Hard questions about the Joseph Smith Translation" formed the theme of Robert L. Millet's presentation at the BYU symposium. He is dean of religious education and professor of ancient scripture at BYU.
Here are some of the questions he addressed with excerpts from his answers:Why did Joseph Smith translate the Bible?
"Second, the work proved to be an important part of Joseph Smith's spiritual education. The Prophet did not translate the Bible primarily on the basis of what he already knew; he learned great and important truths in the process. He wasn't, as some have suggested, merely `Mormonizing the Bible'; a moment's reflection suggests that there would have been very little Mormon doctrine with which to Mormonize the Bible in June of 1830.
"Third, the work of translation illustrates a concept of revelation that has great relevance for all members of the Church. Revelation often comes line upon line to prophets, just as it does to you and me. The fact that Joseph Smith worked and revised and prepared the manuscripts of the JST from 1830 until the time of his death demonstrates this principle.
"Fourth, it is worth noting that over 50 percent of the revelations in the Doctrine and Covenants were received during the time period associated with the formal work of Bible translation. . . . It is important also that we recognize that revelation in the form of biblical revisions was being received at the same time that revelation in the Doctrine and Covenants was being received; the same spirit of inspiration was at work with Joseph the Seer."
Did the Prophet actually finish the work of translation?
"The answer to this question is a clear-cut `Yes and No.' He finished it in the sense that he gave attention to every book in the Old and New Testaments. (He did not make changes in every book, but he did consider them.) He did not finish it in the sense that he made every change or clarification that ever would be made. . . .
" . . . Elder Bruce R. McConkie has written in Mormon Doctrine: `In many passages all necessary changes were made; in others he was "restrained" by the Spirit from giving the full and clear meaning. As with all revealed knowledge, the Lord was offering new truths to the world, "line upon line, precept upon precept. . . ." Neither the world nor the saints generally were then or are now prepared for the fulness of biblical knowledge.' (p. 348, emphasis added.)"
How do we explain the fact that the Prophet made certain changes in the Bible during the years of translation - between 1830 and 1833 - and then later used the language from the King James Version to make a differing doctrinal point?
"This illustrates the gradual unfolding of truth through the translation; not everything of theological significance came forth through the translation or by 1833, and, perhaps as suggested earlier, the Lord only made known through His latter-day seer what He wanted the Saints to know at the time. This opens the door to the fascinating concept that a passage of scripture may be rendered more ways than one. In short, an alteration need not invalidate the original KJV passage. For example, Mal. 4:5-6 is as true as it can be, even though Moroni's rewording of this scripture adds a doctrinal dimension that is not apparent in the original."
What do we conclude when the JST differs from the same passage in the Book of Mormon, such as in the Sermon on the Mount?
"I cherish the Book of Mormon. . . . But I must add that I am convinced that the JST has clarifications and insights that in some cases even surpass those found in the Book of Mormon (see Bruce R. McConkie, `The Bible: A Sealed Book'; in Doctrines of the Restoration, p. 291).
" . . . I do not know whether the Prophet and his scribe utilized a King James Bible when they translated the Book of Mormon and am not aware of anyone now living who knows for sure. If in fact they did use the Bible, and if and when the Prophet sensed by revelation that the message on the golden or brass plates was sufficiently close to what was had in the KJV, he may have decided to simply go with the translation language most familiar to the people. He obviously did not sit down and copy everything from the Bible, given the hundreds of differences between the passages in the Bible and the Book of Mormon."
What of those times when the changes in the JST do not seem to fit the context, or alter the context, or when they seem to give the text a different flavor entirely? What do we conclude when we find that our most ancient Old and New Testament texts do not reflect the changes from the JST?
"Because we are uncertain as to what change falls into what category - restoration of text, restoration of events or words not previously recorded, prophetic commentary, harmonization of text with other passages - we are not really at liberty to say whether the KJV or the JST is historically correct. . . . I would be very careful about dismissing outright something . . . from the Prophet because it doesn't fit the text or texts or contexts with which we are most familiar and thus most comfortable.
" . . . Is our trust in the traditional texts so certain that we would be willing to dismiss or ignore what Joseph Smith delivered because it strikes a discordant chord with what we have learned elsewhere? Are we absolutely confident that what we now have is what once was, so far as ancient texts and manuscripts are concerned? . . . We must not turn a deaf ear to the warning Elder McConkie issued in 1984: Those who turn to the original tongues for their doctrinal knowledge have a tendency to rely on scholars rather than prophets for scriptural interpretations. This is perilous; it is a sad thing to be numbered with the wise and the learned who know more than the Lord.' (The Bible, a Sealed Book,' in Doctrines of the Restoration, pp. 284-85.)"
What exactly is the JST and how does it compare with the Book of Mormon, Doctrine and Covenants or Pearl of Great Price?
"The JST is one of many sources of divine truth, one of several ways by which the God of heaven has begun His restitution of all things (Acts 3:21) and, more specifically, His restoration of plain and precious truths in these last days. In my mind it holds a place at least as important as the other books of scripture given in our dispensation and is deserving of our ponderous and prayerful attention."
|
0.999988 |
Artists were invited to respond the following text: “Like walking on a tightrope, the environmental story can swing from great winds to enormous challenges, trying to balance the selfish with the sustainable. With oceans warming, icecaps melting, carbon rising, genetically modified crops, deforestation and increasing population is there any good news for the environment? There is: we have solar power, wind farms, recycling, biodegradable plastics and species brought back from extinction. What do artists do with all of this information? … often they make something beautiful.” Click here for more information.
|
0.999999 |
abstract in english: The tradition of Jewish studies in Poland has been drastically interrupted by the Second World War and the Holocaust. In the immediate postwar period the process of re-establishing research on Jewish history and heritage was undertaken by the Jewish Historical Commissions and later Jewish Historical Institute in Warsaw. More examples of the individual and group initiatives can be traced only in the 1970s and 1980s. The real happened in the late 1980s with Kraków as one of the first and main centers of revitalized Jewish studies in Poland. The first postwar academic institution in Krakow specializing in Jewish studies - Research Center for Jewish History and Culture in Poland - was established already in 1986 in the Jagiellonian University in Kraków. More than a decade later, in 2000, it was transformed into the first Poland’s Department of Jewish Studies (Katedra Judaistyki) - now the Institute of Jewish Studies. Nowadays there are more similar programs and institutions - at the universities in Warsaw, Wrocław and Lublin (UMCS). Also other academic centers tend to have at least individual scholars, programs, classes or projects focusing on widely understood “Jewish topics.” Jewish studies in Poland, along with the revival of Jewish culture, reflect the contemporary Polish attitude to the Jewish heritage, and their scale and intensity remains unique in the European context. The growing interest in Jewish studies in Poland can be seen as a sign of respect for the role of Jewish Poles in the country’s history, and as an attempt to recreate the missing Jewish part of Poland through research, education and commemoration, accompanied by slow but promising revival of Jewish life in Poland.
|
0.931596 |
The Klingon Empire (also referred to as the Imperial Klingon Empire or Klingon Imperial Empire) is the official state of the Klingon people, founded in the 9th century by Kahless the Unforgettable, who first united the Klingon homeworld of Qo'noS. Since then the Klingon Empire expanded its sphere of influence by conquering numerous systems and incorporating them in the Empire.
Officially, the Klingon Empire is a feudal monarchy, with power residing in the Emperor, who is traditionally a descendant of Kahless. In reality, however, power lays with the Klingon High Council. The position of emperor was abandoned (but not officially abolished) in the mid-21st century, but was revived in 2369 when a group of clerics created a clone of Kahless, who was accepted as the new Emperor, albeit only as a religious figurehead.
The Chancellor, the true leader of the Empire, was head of the High Council, which consisted of 24 members representing various Great Houses (tuqmey) (essentially, the nobility). The Chancellor was protected at all times by the Yan-Isleth (Brotherhood of the Sword).
Women were not normally permitted to hold seats on the High Council. Despite that, Gowron once offered Ambassador K'Ehleyr a seat on the Council in exchange for her support of his bid to be Chancellor. Also, Azetbur, the daughter of Chancellor Gorkon, was permitted to succeed him as Chancellor in 2293.
Various factions almost constantly challenged the leadership of the Empire, and so over time the Klingons developed a strict and rigorous Rite of Succession to determine their leader. According to tradition, one was permitted to challenge the leader on the grounds of cowardice or dishonorable conduct and fight in single combat. Should the challenger slay the incumbent, he assumed the role of the new leader.
Because of the Klingon propensity for violence, shrewd Klingon chancellors redirected hostilities outward, where they would otherwise cause a civil war. In the 2150s, the Klingon chancellor instructed Duras to recapture Jonathan Archer after the latter escaped imprisonment on Rura Penthe. In this way, the chancellor focused the blame for certain internal problems on an external cause. Likewise, Gowron focused his soldiers' energies on invading first the Cardassian Union and later the Federation in order to avoid internal conflicts at home.
Aside from challenges to the primary leadership of the Empire, there was also frequent feuding between the various Great Houses. Most often, the challenge was made on the floor of the High Council and resolved on the battlefield. However, on occasion, some "dishonorable" House leaders chose to make more insidious attacks by undermining the standing of their enemies. D'Ghor underhandedly attacked the House of Kozak in this way in the early 2370s.
|
0.999994 |
Why do statisticians use standard deviation?
You probably learned how to calculate a standard deviation[*] in a high school math class. It's a rather strange procedure: you take the square root of the sum of the squared differences between individual values an the mean value. A question I often get asked is why do we care about this funky metric, instead of a more intuitive measure like the mean absolute deviation (the average difference between individual values and the mean)? Well, there are a variety of reasons.
Ultimately, the goal of these calculations is to produce a summary measure of the degree of dispersion of a probability distribution--in layman's terms, we want to calculate how far your data points are from the average.
The first thing to note about absolute deviation is that it does not rank distances at all. Suppose that we have two observations, where one observation is 1 unit away from the mean, while the other is 3 units from the mean. Absolute deviation says that this is the same amount of dispersion as having both observations be 2 units away from the mean. That's fishy--3 units deviation is further from the mean than 2 units of deviation, yet mean absolute deviation is telling us that these two distributions have the same amount of dispersion. However, standard deviation actually gives greater weight to larger deviations than smaller ones, so the standard deviation tells us, correctly, that actually the former distribution is more spread out.
Both columns have a mean of 2.5. It also happens that they both have a mean absolute deviation of 1, even though Y is intuitively more spread out than X, covering a range from 0.5 to 4.5, instead of from 1 to 4. Going from X to Y, two observations got closer to the mean, while two others went further away from the mean. The formula for standard deviation implicitly ranks these changes based on how far from the mean they are--an increase in distance of the most extreme values affects standard deviation more than an equivalent decrease in the distance of the less extreme values, so that the standard deviation of Y, 1.41, is larger than the standard deviation of X, 1.12.
This gets at a pretty important point: unlike standard deviation, mean absolute deviation does not uniquely characterize the dispersion of a distribution. In statistics, we work with samples and thus don't really know the true population mean. If we want to estimate the population mean, a reasonable approach would be to pick a value for the mean that would minimize the degree of dispersion of the observed data about that value. It is always possible to estimate a mean that minimizes the standard deviation of the data--this minimizer always exists and will always be unique. However, it is frequently impossible to estimate a mean value that minimizes the absolute deviation, because there could be many different estimates that would produce the same mean absolute deviation. As observed above, the mean absolute deviation does not uniquely characterize the distribution. If you do any work with regression models, then this fact is of obvious importance--ordinary least squares estimation is really just a procedure that estimates coefficients that minimize the standard deviation of the data. If we used mean absolute deviation instead, then regression simply wouldn't work most of the time.
But aside from these practical considerations, standard deviation actually has strong theoretical appeal as a model parameter. You've probably heard of the normal distribution, which is by far the most widely used and most important probability distribution there is. It turns out that we can uniquely define a normal distribution with just two pieces of information: the mean and the standard deviation. This is not true of absolute deviations--there could be many different normal distributions that have the same mean and mean absolute deviations but which differ wildly in other respects. I do not know if it is possible to write a formula describing a normal distribution in terms of mean and mean absolute deviation, but if it is, it would certainly require more than two parameters--most likely, a lot more. Hence, while it may seem wacky at first, standard deviation actually represents a simplification versus the less tractable metric of mean absolute deviation.
There's also another, deeper mathematical reason for the appeal of standard deviation. We can describe the mean of a distribution as the "expected value"--that is, the most likely value we are likely to observe. So lets suppose that we have a variable Z with a probability distribution such that the population mean, or "expected value" is zero. It turns out that the variance of Z is equal to the expected value (or mean) of Z*Z (that is, of Z squared). This is known as the "second moment." There are additional moments: the expected value of Z*Z*Z is the skewness of Z, the expected value of Z*Z*Z*Z is the kurtosis, and so on. For distributions where the mean is not zero, you need to modify those formulas slightly to get "central moments" of the distributions, but the broad concept remains intact--variance (and hence, standard deviation) is one of the fundamental metrics, along with all the higher-order moments that uniquely characterize a probability distribution, while mean absolute deviation is not. It's not quite true that you can deduce the whole probability distribution by knowing all the moments (the pareto distribution, for example, has no moments), but if all the moments are finite and you know what they are, then you know what the probability distribution is. This knowledge can lead us to some highly general, extremely powerful statistical techniques (for more, see "method of moments").
[*]I use standard deviation and variance fairly interchangeably. The former is just the positive square root of the latter, but the issue is fairly superficial since this is a monotone transformation--two distributions having the same standard deviation have the same variance and vice versa, and anything that minimizes the one also minimizes the other.
I just spent 30 minutes trying to find this explanation on other lesser websites. Finally I understand why standard deviation is more powerful than average deviation. Thank you!
I couldn't agree more with the comment above. Excellent explanation. Many thanks.
Thanks a million for a practical explanation! It may be disputed vehemently by different readers or other practitioners but it helps a lay reader understand why or why not one should spend their time working out SDs at all.
In your numerical example, I fail to see how "Y is intuitively more spread out than X". Yes, on the one hand, 0.5 and 4.5 are further away from the mean (2.5) than are 1 and 4.
But on the other hand, 2.5 and 2.5 are certainly closer (indeed equal) to the mean (2.5) than 2 or 3.
I'd say simply that one can reasonably disagree about whether X or Y is "more spread out". It's certainly far from obvious (as you try to present it).
The example in the preceding paragraph suffers from the same flaw.
You say that both (X,Y) have a MAD of 1, however to my calculation X = 0.75. Please, can you tell me what I did wrong?
"It turns out that the variance of Z is equal to the expected value of Z*Z"
You mean its equal to the expected value of ZZ minus the square of the expected value of Z?
I'm looking for more information on this topic. The mean and SD uniquely characterize a normal distrobution, that much is clear. But how does SD "uniquely characterize the dispersion of a distrobution" generally?
|
0.997503 |
What did he make plastic out of?
Plant based plastics are called Bioplastics. Bioplastics can be made from plant based starches, cellulose, proteins, and oils. Peanut plants contain starches, cellulose, proteins, and oils.
|
0.962194 |
What Is the PEG Ratio?
The PEG ratio can help you consider a stock's growth rate when evaluating its valuation.
Price-to-earnings, or P/E ratio, is perhaps the most commonly used metric used when valuing stocks. However, P/E ratios aren't always useful all by themselves, as they don't take a company's growth rate into account.
For this reason, the price-to-earnings-growth ratio, or PEG ratio, takes the P/E ratio and combines it with the company's expected earnings growth, in order to better express the valuation of growing companies. The PEG ratio is easy enough to calculate -- simply divide the P/E ratio by the company's expected earnings growth rate.
In general, a PEG ratio of less than 1 is considered to be indicative of an undervalued stock and a PEG ratio of more than 1 could imply that a stock is too expensive. However, the PEG ratio is only one piece of the valuation puzzle, and different industries have different average PEG ratios.
Let's say that you're considering two growth stocks in the same industry. The first trades for 18 times earnings, while the second trades for 22 times earnings. So, at a glance the first company may seem like the more attractive investment.
However, the first company is projected to grow its earnings at 12% per year for the next five years, according to the analysts following the company, while the second is forecast to grow earnings at a 16% rate.
The takeaway here is that even though the second company has the higher P/E valuation, it is actually the cheaper of the two when growth is taken into account.
When using the PEG ratio as part of your stock research process, there are a few things to keep in mind.
First, the PEG ratio makes assumptions that may or may not be valid. In our example, we used a projected five-year growth rate, which is a long time. There's no telling exactly when a company's growth could slow down or speed up, so keep in mind that this metric is based on someone's best guess of what will happen.
Also, the PEG ratio doesn't take into account other variables that could add or take away from a company's value. For example, some growth companies keep lots of cash on their balance sheet, but the PEG ratio ignores the obvious value this adds.
Finally, be careful when applying the PEG ratio to slower-growing companies or value stocks. If a certain company trades for 15 times earnings and has grown predictably by 5% per year for decades, its PEG ratio of 3.0 may look expensive. However, with a strong track record of steady growth, this stock could still be a good value for investors seeking safety and stability.
Are you ready to take the plunge into investing? Head over to The Motley Fool's Broker Center and get started today.
|
0.936284 |
How is the Union budget made?
The Union Budget is one of the most important announcements by the government for which the whole country waits eagerly.
The Union Budget, which is usually presented on the last working day of February every year, attracts attention because of the secrecy around the budget-making process and the government's announcement of new policies and programmes.
The Budget 2016-17 will be presented on 29 February.
The Union budget or the annual financial statement is an annual account of the government's finances including revenues and expenditure.
Article 112 of the Constitution mandates the government to present before the parliament its management of finances.
The government in the Union Budget, also presents the policies and programmes for the upcoming year along with the tax rates which affect citizens.
Independent India's first budget was presented by the then finance minister, RK Shanmukham Chetty on 26th November 1947.
The budget preparation is a consultative process which starts in September of the previous year (2015) and continues till February (2016).
The budget preparation involves consultation among ministries, the Ministry of Finance, and NITI Ayog.
In September, the Ministry of Finance issued a circular to the various ministries, states, Union Territories, autonomous bodies, departments, etc. asking for estimates for the next year.
After the ministries and departments send their demands, consultations happen at 2 levels.
Internal consultations take place between various ministries and the Ministry of Finance.
Externally, consultations are held between the government and various pressure groups such as farmers bodies, industry bodies, etc.
The consultation process and pre-budget meetings continue till late January after which the Finance Minister decides on tax proposals.
The budget proposals are then discussed with the Prime Minister before they are finalised.
The printing process for the budget starts with the 'halwa' ceremony in which 'halwa' is prepared in a big 'kadhai' (pan) and is served to all the staff.
After this ceremony, the officials involved in the budget preparation are required to stay in the ministry till the budget presentation.
Around 100 officials and the support staff involved in the budget-making process are "locked" in the North Block to maintain the secrecy of the budget. They cannot even contact their family members.
The Union Budget is presented by the Finance Minister (FM) in the Lok Sabha and is tabled in the Rajya Sabha only after the Finance Minister's speech.
The budget speech of the FM has 2 parts- Part-A details the economic survey and policy statements, and Part-B details the tax proposals.
Discussion on the budget doesn't happen immediately but after 2-3 days.
Once the budget is passed by both the houses, it receives assent from the President and comes into effect. The whole process has to be completed within 75 days.
The government has approved the collaboration of AYUSH (Ayurveda, Yoga and Naturopathy, Unani, Siddha, and Homeopathy) Ministry with the World Health Organisation.
Umar Khalid and Anirban Bhattacharya, two of the five JNU students facing sedition charges, surrendered before the Delhi police yesterday night after the Delhi high court ordered them to surrender.
|
0.983975 |
The pace of oncology drug development has accelerated in recent years to previously unmatched levels. Fueled by an increased understanding of the biologic underpinnings of tumor development and progression, clinical research platforms largely focused on evaluating the potential benefits of novel targeted therapeutics possessing unique mechanisms of action and safety profiles have led to improved outcomes in many large and rigorous clinical trials across many different tumor types. The successes yielded by this rational approach to the design and evaluation of new therapies have in turn provided medical oncologists and patients with many additional beneficial FDA-endorsed treatment options.
Although it is indisputable that new and effective treatments are good for all, it is interesting to note that minimal publicly accessible information exists regarding how, if at all, new therapies are being incorporated into practice and what factors may affect this dynamic. Even more, it is poorly documented whether the influx of new agents and the accompanying informational burden are affecting community-based medical oncologists and their need for additional resources. As such, additional strategies and resources are needed to help clinicians overcome the difficulties they are now facing as they attempt to stay up to date and informed. To bridge the gap between research and patient care, this CME activity uses the input of cancer experts to frame a relevant discussion of recent research advances and newly approved agents in multiple myeloma that can be applied to routine clinical practice. This information will help medical oncologists formulate up-to-date clinical management strategies.
Recognize the recent FDA approvals of carfilzomib and pomalidomide, and identify clinical situations for which these agents may be appropriate therapeutic options.
Effectively counsel patients regarding the expected efficacy and tolerability of newly approved therapeutics for the management of multiple myeloma.
Develop practical strategies to prevent and/or ameliorate the toxicities associated with recently approved antimyeloma therapies.
Recall the design of ongoing research efforts attempting to further define the role of recently approved therapies, and counsel appropriate patients with multiple myeloma regarding potential clinical trial participation.
This CME activity contains a text component. The participant should read the text.
Advisory Committee: Millennium: The Takeda Oncology Company, Onyx Pharmaceuticals Inc; Speakers Bureau: Celgene Corporation.
This activity is supported by educational grants from Celgene Corporation and Onyx Pharmaceuticals Inc.
|
0.999636 |
Linux를 설치했다가 필요가 없게 되었다던가 또는 부트레코드에 이상이 생기는 등의 일이 발생할 경우, Windows의 부트로더를 복구해야 할 때가 있다. 이러한 경우 아래를 참고하여 복구하면 된다.
1. Insert and boot XP CD.
2. Press R, to recovery console mode.
1. Boot on the Vista DVD.
2. Choose country. Next. Choose keyboard. Next.
3. Choose "system recovery options". If it is proposed to repair at the end of the search, answer "no".
4. Deselect all lines and click "next"
|
0.963745 |
Resumen: Host specialization has long been hypothesized to explain the extraordinary diversity of phytophagous insects in the tropics. However, addressing this hypothesis has proved challenging because of the risk of over-looking rare interactions, and hence biasing specialization estimations, and the difficulties to separate the diversity component attributable to insect specialization from that related to host diversity. As a result, the host specialization hypothesis lacks empirical support for important phytophagous insect clades. Here, we test the hypothesis in a radiation of seed-feeding insects, acorn weevils (Curculio spp. ), sampled in temperate and tropical regions (California and Nicaragua, respectively) with an equivalent pool of oak host species. Using DNA sequences from three low-copy genes, we delimited to species level 778 weevil larvae extracted from host seeds and assessed their phylogenetic relationships by Maximum Likelihood and Bayesian inference. We then reconstructed the oak-weevil food webs and examined differences in alpha, beta and gamma diversity using Hill numbers of effective species. We found a higher alpha, beta and gamma diversity of weevils in Nicaragua compared to California despite similar richness of host species at both local and regional level. By means of Bayesian mixed models, we also found that tropical weevil species were highly specialized both in terms of host range and interaction strength, whereas their temperate congeners had a broader taxonomic and phylogenetic host spectrum. Finally, in Nicaraguan species, larval body size was highly correlated with the size of the acorns infested, as would be expected by a greater host specialization, whereas in California this relationship was absent. Altogether, these lines of evidence support the host specialization hypothesis and suggest contrasting eco-evolutionary dynamics in tropical and temperate regions even in absence of differences in host diversity.
|
0.964464 |
Are free school lunches a good idea?
Free meals at Finnish schools are seen as a major achievement of the social welfare state but may be reinforcing the pupils' lack of appreciation for food, a report commissioned by the government explains. But reintroducing fees for school meals would jeopardise equal opportunities in education, commentators warn, and urge parents to do more to teach their children about the value of food.
|
0.934966 |
The ancient Chinese believed that good fortune and misfortune were the result of spirit intervention. Evidence from the Zhou (Chou) Dynasty (11th Century - 221 BCE) indicates that the Chinese dealt with evil spirits in the same way they dealt with their human enemies. Several times a year and during solemn occasions, swarms of exorcists would run through the streets shouting and thrusting their spears in the air to expel the evil spirits. Additionally, human prisoners were dismembered outside the city gates as a signal as to what would be the fate of any evil spirit that dared enter the city.
Since ancient times, the Chinese have believed that Chinese characters have a magical power to influence spirits. According to the "Book of Master Huainan" (淮南子), when Cang Jie (仓颉) invented Chinese characters during the reign (circa 2698 - 2598 BCE) of the legendary Yellow Emperor (Huangdi 黃帝), "millet fell from the sky and the spirits cried at night". This was because the spirits were afraid of being controlled by the magic power of Chinese characters used for amulets and charms.
It seems to be almost universal that the art of writing evokes a magical power in populations which are mainly illiterate.
At least from the time of the Han Dynasty (206 BCE - 220 AD), people wore charms or amulets on their waist or around their necks for protection (see pendant charms). These talismans often carried an inscription requesting a Daoist deified person, such as the "God of Thunder" or Lao Zi (also known as Lao Tzu and considered the author of the classic Taoist text Dao De Jing (Tao Te Ching 道德经)), to "expel" evil influences and "kill" demons, and also to "send down" good fortune and happiness.
Because these inscriptions frequently requested the God of Thunder (Lei Gong 雷 公 or Lei Shen 雷 神) to use thunderbolts (ting 霆) to kill the bogies or evil spirits, these amulets are often referred to as "Lei Ting" (雷霆) charms or "Lei Ting curse" charms.
Under the rule of Chinese emperors, official documents, including mandates and decrees, carried absolute authority. Such influence further fostered the belief by the common people in the power of Chinese characters. The Daoists were able to transfer to the spiritual world this concept of absolute power over people and the magical power of the written language.
Thus, the inscriptions on amulets and charms resembled official imperial documents of the time. The amulet would request that a "command" be issued from a "high official" to the "evil" spirits or bogies. The command needed to come from a deified "high official" with the prestige and power necessary to enforce the order. Frequently, this spirit was the God of Thunder with his arsenal of thunderbolts. Sometimes Lao Zi (Lao-Tzu 老子), the founder of Daoism (Taoism), would be asked to intercede.
The amulet inscriptions would request that the evil spirits be expelled or killed.
The inscription or legend would usually conclude in the same manner as an official government order with words such as "respect this command" or "quickly, quickly, this is an order". A couple of the charm inscriptions displayed below conclude with the expression "let it (the command) be executed as fast as Lu Ling." Lu Ling was a famous runner in ancient China.
Daoist magic writing (fuwen 符文) is also known as Daoist magic script characters, Daoist magic figures, Daoist magic formulas, Daoist secret talismanic writing, and talismanic characters. These are symbols with twisted strokes that sometimes resemble Chinese characters. Only Daoist priests can read and understand this magic writing and the characters can differ from sect to sect. Their method of writing is passed down secretly from master to disciple.
If magic writing were easy to understand then anyone could have the power to control the spirits.
The origin of "magic writing", according to such ancient Chinese texts as the "Records of the Divine Talismans of the Three Grottoes" (三洞神符纪), is from the condensation of clouds in the sky.
Some magic script characters appear to have been formed by stacking one Chinese character atop another and making them into a single character. This technique of linking or combining characters was used not only by the Taoists, however, since it also appears on other types of Chinese charms and woodblock prints.
"Magic writing" symbols are usually placed at the beginning and end of the inscriptions.
Several of the Daoist charms below display "magic writing" characters and translation is provided when known.
This is a very large and nicely cast specimen of an old Daoist charm. The central hole is round as opposed to square.
The large characters at the extreme right and extreme left are not Chinese but rather Daoist "magic writing". While Daoist priests would like for the meaning to be kept a secret, these particular magic writing characters can now be understood.
Regarding the very large character on the left, the upper half is "magic writing" for the Chinese character lei (雷) which means "thunder" and refers to the "God of Thunder". The lower part is "magic writing" for the Chinese character ling (令) which means "to order".
The top portion of the very large character on the right, consisting of what looks like a three prong fork with three small circles underneath, is the magic writing equivalent to sha (杀) which means "to kill". The part of the character below the three small circles is the Chinese character gui (鬼) which means "ghost" or "spirit".
The inscription of the two magic writing characters, read left to right, can thus be translated as the "God of Thunder orders the demons to be killed".
"God of Thunder (Lei) clear out and kill the ghosts and send down purity.
Behead the demons, expel the evil and keep us eternally safe.
1 The title Tai Shang Lao Jun (太 上老君) was bestowed upon Lao Zi (老子) by imperial command in 1013 AD.
I still have some doubts, however.
The person looks like a young woman to me and Liu Hai is a male. Also, all the other Liu Hai charms that I have seen always show the toad as having three legs and the picture here only shows the upper torso.
Additionally, the Liu Hai story usually associates Liu Hai using gold coins on a string to catch the toad in a well. In the scene here, there are no coins shown and the waves and bamboo would seem to indicate it is a river or stream.
However, until I can find an alternative explanation, I will follow the consensus and present the charm as Liu Hai and the Three-Legged Toad also known as "Liu Hai playing with the Golden Toad" .
This charm is 61 mm in diameter and 3.8 mm in thickness.
The obverse side of this Daoist charm is almost identical to that of the charm above.
"God of Thunder (Lei) thunderbolts, God of Thunder thunderbolts, kill the ghosts and send down purity.
Let it be executed as fast as Lu Ling.2"
2 Lu Ling was a famous runner from ancient times. He purportedly lived during the time of King Mu who became renowned for his chariot and eight outstanding horses. Please see Ancient Chinese Horse Coins for more information.
The reverse side of the charm displays bagua or the eight trigrams.
Bagua are frequently seen on Daoist charms and mirrors.
For additional information, please see The Book of Changes and Bagua Charms.
The charm has a diameter of 45.5 mm and weighs 25.5 grams.
While this Daoist charm has a round center hole similar to the two charms above, it is actually quite different.
The Daoist magic writing at the right and left are different from those above. Their meaning is unknown.
Let it be executed as fast as Lu Ling.3"
3 Lu Ling was a famous runner in ancient China.
This is the reverse side of the amulet. On the left side is Daoist "magic writing". Its meaning is unclear.
On the right is the Daoist god Zhenwu (真武), also known as the Perfected Warrior.
During the Han Dynasty (206 BCE - 220 AD), he was known as Xuanwu (玄武) and was depicted as a tortoise encircled by a snake. This symbol represented the north direction. Over the centuries this symbol gradually evolved and by the Song Dynasty (960 - 1279 AD) had developed into the very popular warrior god Zhenwu associated with healing and protection.
We know this is Zhenwu because he is standing on a tortoise with a snake around it. This charm is well-worn but if you look carefully at Zhenwu's feet you will see an oval shaped object (tortoise). The head and neck of the tortoise is pointed towards the left at about the 5 o'clock position and about half way between the round center hole and the rim. Just above the head of the tortoise is the head of the snake.
Above the center hole are the eight trigrams or bagua. In the middle of the bagua is the yinyang symbol also known as the taiji (see Hidden Meaning of Charm Symbols for more information). Additional information on the eight trigrams can be found at The Book of Changes and Bagua Charms.
The charm is 44 mm in diameter and weighs 23.5 grams.
The Chinese characters on the obverse side of this old Daoist (Taoist) charm are in ancient seal script.
The inscription, read from top to bottom and right to left, is lei ting hao ling (雷霆號令) which translates as "thunderbolt command".
As is the case with the amulets discussed above, this is a request for the assistance of the God of Thunder.
The reverse side of the charm is written in Daoist magic writing.
The inscription reads yong bao shou kao (永保寿考) which may be translated as "to protect eternally and to enjoy a long life".
This charm is 28 mm in diameter and weighs 4.75 grams.
This old Daoist (Taoist) charm is distinctive because the inscription is written in both Daoist magic writing and Chinese characters.
Each magic writing character has a Chinese character next to it.
It is believed that the magic script characters have the same meaning as the Chinese characters with which they are paired.
The inscription is fu shou yan chang (福寿延长) which translates as "good fortune and longevity for a long time".
(A charm with a magic script character similar to the one on the left side of this charm is discussed in detail at "Quest for Longevity" Daoist Charm).
On the reverse side of the charm and to the right of the round hole is a "Star Official" (xing guan 星官), also known as the "Primal God" (yuan shen 元神) or "Primal God of the Northern Dipper" (bei dou yuan shen 北斗元神).
The Chinese believe that this "star god" controls the life and fate of an individual. An individual needs to worship his star god for protection and to avoid misfortune.
To the left of the round hole is a "cloud" with an "ox" (niu 牛) in the middle. This particular charm was, therefore, intended to be a good luck charm for people born in the year of the ox which is one of the 12 animals of the Chinese zodiac.
The charm has a diameter of 50 mm and a weight of 29.3 grams.
This pendant charm is unique in that it represents a syncretism of the major Chinese religions of Daoism and Buddhism.
This side of the charm displays both Daoist and Buddhist inscriptions while the reverse side displays the "eight trigrams" (bagua 八卦) and the inscription chang ming fu gui (长命富贵) meaning "longevity, wealth and honor".
This Chinese character refers to a "dead ghost" and its purpose here can be better understood by the following analogy.
When a person dies, he becomes a ghost. People greatly dislike seeing ghosts.
Similarly, ghosts are afraid when they see a "dead ghost" and will run away.
The Chinese, therefore, believe that ghosts will be scared away if this Daoist magic character, meaning "dead ghost", is hung in homes or worn as an amulet.
As mentioned above, this amulet also has a Buddhist inscription which is written along the rim. This inscription is explained in detail at Buddhist Charms.
The amulet has a length of 49.5 mm, a width of 32 mm and a weight of 7.6 grams.
While this old charm has no inscription, it nevertheless tells an important story in Taoist history.
To the right of the round center hole sits Laozi (Lao Tzu 老 子) holding a ruyi sceptre in his right hand.
It is a little difficult to see but to the left of the hole is seated Zhang Daoling (张道陵). Behind Zhang Daoling is a tiger. The tiger's head is just to the left of the hole with the two front legs also showing. The tiger's rear leg is touching the left rim of the charm.
At the very top of the charm, just below the rim, is the seven star Big Dipper Constellation with an auspicious cloud (yunqi 云气) beneath.
Just below Laozi's feet is xuanwu (see Four Divine Creatures) which is a tortoise entwined by a snake that eventually evolved into the Daoist warrior god Zhenwu (真 武). To the left of xuanwu, with its head just to the right of the tiger's head, is a crane (he 鹤).
According to Daoist tradition, Laozi, the founder of Taoism, appeared before Zhang Daoling on "Crane Cry Mountain" (hemingshan 鹤鸣山) in what is now Sichuan Province in the year 142 AD and proclaimed him a "Celestial Master" who was to deliver the people from the evils of the Han Dynasty. Zhang Daoling (also known as Zhang Ling, "Ancestral Celestial Master" and "Celestial Master Zhang") then established the first organized Daoist religious sect known as the "Five Bushels of Rice" ("Five Pecks of Rice" or Wudou Mi Dao 五斗米道).
Each of the animals of the Chinese Zodiac is depicted in its own small circle with the entire group occupying most of the area of this side of the charm.
The charm is quite worn from use over many years and, although it is difficult to make out from the pictures which animal is which, the Chinese character of the Earthly Branch associated with each animal is shown to the left of each animal.
This charm is 64 mm from top to bottom and 56 mm in width.
This old Taoist (Daoist) charm has a single loop at the top and displays two of the "Eight Immortals".
The obverse side of the amulet depicts Lu Dongbin (Lu Tung-Pin 吕洞宾). In his left hand is his magic devil-slaying sword which can slay any ghost or demon. In his right hand is a whisk (fly whisk) which allows him to walk on clouds or fly to heaven whenever he wishes.
The inscription, read top to bottom, reads as zhu shen hui bi (诸神回避) which translates as "evade all the spirits".
At the very top of the charm, just below the hole, is a lotus. The Chinese word for "lotus" (lian 莲) has the same pronunciation as as the word for "continuous" (lian 连) so the hidden or implied meaning is that the inscription on the amulet should continue forever.
The reverse side expresses a wish for good fortune and happiness. The Taoist Immortal is Zhong Kui (钟馗) with a sword in his right hand. He is famous as a fearsome slayer of evil demons. The projections from each side of his hat are "demon-seeking" devices that can point to unseen and lurking dangers.
The inscription is read top to bottom as qu xie jiang fu (驱邪降福) which means "Expel evil and send down good fortune (happiness)".
To the left of the sword, at about the 11 o'clock position, is a bat flying upside-down. Zhong Kui is usually depicted with a bat so this further confirms that he indeed is the immortal being depicted on the charm. In Chinese, the word for "bat" (fu 蝠) and the word for "happiness" (fu 福) are pronounced the same. To say "upside-down bat" in Chinese (蝠倒) sounds exactly the same as saying "happiness has arrived" (福到).
There is an additional play on words here since saying "a bat descends from the sky" (fuzi tianlai 蝠子天来) sounds exactly like "happiness descends from heaven" (fuzi tianlai 福子天来).
There is a lotus design just below the loop at the top. As explained above, the lotus symbol means that expelling evil and receiving good fortune and happiness should "continue" forever.
Chinese swords, sword symbols and amulets are discussed in detail at Swords and Amulets.
This is a large and heavy Daoist charm with a good deal of wear.
The Chinese inscription is qu xie jiang fu (驱邪降福) which means "expel evil and send down happiness (good fortune)".
The reverse side reveals that this is another charm with Zhong Kui (钟馗), the "Demon Queller", as its theme. Zhong Kui is standing to the left of the center hole. It is difficult to see clearly because of the wear on the charm, but he is standing with his body facing slightly towards the left edge of the charm. His shoes are facing directly towards the 7 o'clock position. He is turning his upper torso so that it is facing the demon (or possibly his demon attendant) located to the right of the square hole. In his right hand is his sword. The tip of the sword can be seen just below the bottom left of the center hole.
As mentioned in the description of the charm above, Zhong Kui is usually accompanied by a bat, seen at the very top of the charm, and which is flying upside down. In Chinese, the word for "bat" (fu 蝠) and the word for "happiness" (fu 福) in the inscription on the obverse side have the same pronunciation. An "upside-down bat" in Chinese (蝠倒) sounds exactly like saying "happiness has arrived" (福到).
The charm is 52 mm in diameter and is 3 mm in thickness.
According to tradition, Laozi's real name was Li Er (李耳). The emperors of the Tang Dynasty had the same surname Li (李) and consequently traced their lineage back to Laozi.
Daoism (Taoism) was officially promoted during the Tang and in 666 AD Emperor Gaozong deified Laozi (tai shang lao jun 太上老君) with the title "The Supreme Emperor of the Mystery Prime" (xuan yuan huang di 玄元皇帝).
Emperor Xuanzong, also known as Emperor Ming (Minghuang), was even ordained as a Daoist priest and during his reign ordered that Daoist temples be established throughout China and that every household should own a copy of the Dao De Jing.
The inscription on the charm at the left reads yuan tian shang di (元天上帝) which translates as the "Supreme Lord of the Primal Heaven".
This is actually a reference to a proclamation by Emperor Xuanzong in 754 further exalting the status of Laozi with the almost identical expression xuan tian shang di (玄 天上帝) which means the "Supreme Lord of the Dark (Mysterious) Heaven".
The only difference is that the first Chinese character xuan (玄), meaning "dark" or "profound", has been changed to yuan (元) which means "first" or "primal". The inscription was changed because it was a cultural taboo to write the name of an emperor and in this case the emperor was Xuanzong.
The reverse side of the charm displays the bagua or eight trigrams.
You may notice that parts of this side show traces of red.
Red is considered a very auspicious color by the Chinese who sometimes further enhance the amuletic effect of charms with the addition of red paint.
This charm has a diameter of 39 mm and a weight of 12 grams.
Hanshan (寒山), also known as "Cold Mountain", was a Tang Dynasty poet whose poems reflected both Daoist and Buddhist (Chan, Zen) themes.
He is believed to have been a lower level official in the bureaucracy who fled to the mountains to live as a hermit during the An Lushan Rebellion.
The An Lushan Rebellion, also known as the An-Shi Rebellion (安史之乱), occurred during the years 755-763 of the reign of Emperor Xuanzong (Emperor Ming, Emperor Minghuang) mentioned in the description of the above charm. Emperor Xuanzong was so enamored with his beautiful concubine Yang Guifei that he neglected his official duties resulting in popular discontent and a revolt led by one of his generals, An Lushan (安禄山).
Very little is known of Hanshan's life. He was an eccentric who saw things and lived life in a manner probably more similar to Laozi (Lao-Tzu 老子) and Zhuangzi (Chuang Tzu 庄子) than the Daoist and Buddhist monks that inhabited the temples of the time.
Essentially all we know about him comes from the exquisite poems he left behind written on rocks, trees and temple walls.
At the left is an example of a Hanshan charm.
The inscription at the top of the charm reads han shan bi you (寒山庇佑) which means "Hanshan protect" or "Hanshan bless".
The four character inscription surrounding the square hole is qu xie fu zheng (驱邪辅正) which translates as "expel evil and assist the upright (righteous)".
The inscription at the top of the reverse side of the charm is jia xu nian zao (甲戌年造). Jia xu (甲戌) is the combination of one of the Ten Heavenly Stems and one of the Twelve Earthly Branches the traditional 60 year Chinese calendar uses to identify the year 1874.
The inscription thus reads "made in the year 1874".
The four character inscription on the lower portion of the charm is chang ming fu gui (长 命富贵), meaning "longevity, wealth and honor". This is one of the most frequently seen inscriptions found on Chinese charms.
Hanshan charms have traditionally been cast in Jiangsu Province (江苏) where there is a Hanshan Temple (寒山寺) located in the city of Suzhou (苏州). A number of Hanshan charms have also been found in Guangxi Province (广西).
This charm has a length of 57.5 mm, a maximum width of 43 mm, and a weight of 19.5 grams.
This is the obverse side of another Taoist (Daoist) charm with a loop which means it was meant to be worn on a necklace or on the waist.
The inscription is read from top to bottom and right to left as jiang fu bi xie (降福避邪) which means "send down good fortune and keep away evil".
The reverse side has the eight trigrams or bagua with a taiji (太极) symbol at its center.
The Chinese also produced bronze mirrors with Daoist charm characteristics.
At the left is an example of an old bronze mirror with the inscription written in Daoist "magic writing" script.
This Daoist mirror is discussed in detail at Chinese Daoist Mirrors.
|
0.999736 |
I feel the same way about the ending. I was loving the book, loving the book, liking the book quite a lot, and then I got to the end and it was just blah. Disappointing.
|
0.999931 |
Hair gel is a styling product that acts like hair spray, which makes your hair stay in place throughout the day, but instead of being a pure liquid hair gel is a molasses like substance. I chose to do my project on hair gel because it was the first thing that came to my mind. I also decided to pick hair gel due to the fact that i use hair gel regularly and on the day of the project I had hair... Hello my beautifoodies friends, this beauty tip is especially for those of you whom love & use aloe vera gel everyday�because making aloe vera gel at home will help you save lots of money while being fully aware of what your aloe vera gel contains.
First add the preservative to water and mix thoroughly. Add in the xanthan gum slowly, with lots of stirring or agitation, into cold or heated deionized water until the solution is clear and begins to thicken.... First add the preservative to water and mix thoroughly. Add in the xanthan gum slowly, with lots of stirring or agitation, into cold or heated deionized water until the solution is clear and begins to thicken.
To make this homemade hair gel, first heat a cup of water in a small pot. Just before the water comes to a boil, remove the pot from heat. Then, add aloe vera gel and unflavored gelatin to the warm water. If you want to use essential oil for fragrance, you can also add few drops of it. Then, mix all the ingredients together to attain a smooth and thick texture. If you find that the mixture has... 22/06/2012�� It is less likely to flake in hair - though it will if you use too much gel or too much xanthan gum in a gel. The hold from xanthan gum gels is more flexible in the hair. The hold from xanthan gum gels is more flexible in the hair.
What others are saying "DIY Natural Hair Gel with only 3 ingredients. I have been getting so sick and tired of thinking I have to put chemicals on my head to style my hair.
25/12/2010�� In this Article: Making Flaxseed Gel on the Stove Making Gel in the Microwave Styling Hair with Flaxseed Gel Community Q&A. Flaxseed hair gel is a natural, inexpensive hair product particularly suited for curly or wavy hair.
Hello my beautifoodies friends, this beauty tip is especially for those of you whom love & use aloe vera gel everyday�because making aloe vera gel at home will help you save lots of money while being fully aware of what your aloe vera gel contains.
|
0.999916 |
(CNN) — With unemployment rates near record lows, workers have plenty of options. Taco Bell hopes that “hiring parties” with free food, swag and Instagram-friendly photo props will lure in new employees.
“The tight labor market has made hiring more challenging for Taco Bell and the restaurant industry as a whole,” Frank Tucker, Taco Bell’s chief people officer, told CNN Business in an email. “We are excited and optimistic that the Hiring Parties will help increase applicant flow,” he added.
The fast food chain said on Thursday that it is planning to host nearly 600 parties across the country from April 22 to 27 to help fill thousands of open jobs.
In addition to the free food, people will be able to interview for open positions on the spot.
To try to attract talent, the brand is offering other perks, like one free meal per shift for employees at company-owned stores, leadership development programs and tuition discounts. The starting salary at corporate-owned stores is above $10 per hour on average, according to the company, which noted that it doesn’t set the salary at franchises.
Taco Bell first tested out hiring parties in Indianapolis last year. Over the course of two days at four different restaurants, the company got close to 75 applications in person, it said. It also received more than 300 online applications thanks to virtual promotion of the events.
Brands like Taco Bell need to get creative to help maintain an edge in a tight labor market. In March, the unemployment rate fell to 3.8% There have been fewer unemployed people than open jobs since June 2018.
To bring people into the fold, companies are offering a number of new perks. Over the summer, Starbucks announced that it is testing a program that will let some employees spend half of their workweek at a local nonprofit. Papa John’s launched a free tuition program in February that covers all tuition costs for undergraduate and graduate online degrees from Purdue University. And McDonald’s said last week that it will no longer lobby against raising workers’ pay alongside the National Restaurant Association.
Taco Bell, which is owned by Yum Brands, wants to create 100,000 new US jobs by 2022.
|
0.998563 |
What are the qualities of a great forklift operator in the Philippines?
Great forklift operators are not easy to come by. A person who wants to be a forklift operator needs to have a particular personality and skill set to succeed.
If you are looking to operate a wheel loader or forklift in the Philippines, you might be considering several candidates for the job. While experience and skills are necessary, there are other characteristics you need to have to be an efficient forklift driver.
Here are some of the qualities of a great forklift operator in the Philippines.
You need time and effort to learn how to drive a forklift—and even more so to excel in it.
Driving a forklift is not like driving a car. There are many components that an excellent operator needs to have a working knowledge of.
It is also essential to know the lifting capacity of a forklift, as well as the wisdom to not exceed this capacity. Forklifts also have a different basic maintenance routine. Understanding every aspect of this, needless to say, can help improve safety and efficiency.
An efficient forklift operator should also know the flow of the warehouse or factory operations like the back of their hand. They should be acclimated to working in an industrial environment.
Forklift operators who started out unpacking unloaded pallets and preparing pallets for other forklift drivers usually display this kind of knowledge.
The warehouse, agricultural, and manufacturing industry can be fast-paced, which means that there is no shortage of risk and there is very little room for error.
Safety should be the top priority of your forklift operator especially since they will be in charge of operating heavy machinery. A reckless driver can not only be a liability to the operations of your business, but can also injure, hurt, or even kill their fellow workers.
While the commitment to safety is not something you would easily find on your potential forklift operator’s resume, it can be verified with a few reference checks. Do not hesitate to contact a candidate’s previous employer to know if they are a responsible operator behind the wheel.
Forklift operators have to be particular about their surroundings to avoid damage to the warehouse or fellow co-workers. Someone who does not pay attention to what they are doing is a poor candidate for a forklift operator. Common sense and logical thinking are valuable traits to have when working under pressure.
Operators should be able to know when their equipment may not be functioning at 100% and should be able to repair it if the need arises. Daily checks are also important to know immediately if something is wrong—this can help ensure operations can go smoothly and successfully.
While this does not necessarily mean that they should be able to run a marathon, a good forklift operator should be able healthy enough to perform basic movements like climbing in and out of the forklift. They should not be uncomfortable or get exhausted easily because they need to make it through a day of strenuous activity.
Physical fitness can also mean having excellent hand-eye coordination needed to maneuver the forklift into tight spots and tricky places. Good eyesight and depth-perception are important when using the forklift to place objects on shelves, trailers, and vehicles.
Operating a forklift is not a job for everyone. It requires a person with certain traits and excellent skills just to qualify as one—and much experience and training to be the best. Make sure that the operator of wheel loaders and forklifts in the Philippines you are looking for has some of these qualities to avoid mishap in your warehouse or factory.
|
0.954034 |
Was Prophet Muhammad ﷺ a wife beater?
That was easy. Too easy.
Muslim men like to quote from the greatest Prophet ﷺ that if he scolded his wives when they questioned him, why can't they? The Prophet Muhammad ﷺ had the greatest tests in his marriage. And yes he did become upset and angry. But he never hit his wives. He never raised his hand, not once; he did not even raise his voice when verse 4:34 gave permission to do so. `Umar (ra) the khalif is another classic example of balance. His wife Attika shouted at him in front of a guest but he remained silent. His guest asked him why he put up with it and `Umar said, "she loves me, she maintains my home, cooks for me, she does all this - so why should I get angry when she complains about my shortcomings?"
It is usually too late when we remember the Prophet's ﷺ hadith: "Abusing a Muslim is a sin, and killing him is disbelief," (Bukhari & Muslim). The Messenger of God would not contradict what was written in the Qur'an. A marriage is not a battlefield, albeit it is a form of jihad, one that is supposed to bring you closer to God. If your spouse is bringing you closer to divorce or the hospital, you have some decisions to make.
Continuing with the Prophet's words, it is a good thing to understand what is abuse and what is not. 'AbdAllah reported that the Prophet ﷺ said, "A believer is not a fault-finder and is not abusive, obscene, or coarse." (Bukhari, Book of Manners #313) This is the ruling for a relationship between believers, how do you think a husband and wife are supposed to be? Swearing at your wife/ husband is wrong. Muttering under your breath is disrespectful. Throwing a vase at them in legitimate pain is also bad and this can lead to more. Verse 4:34 talks about a one-off light strike. The detention or striking should not be on repeat. Remember that as a man what you see as "disciplinary" action or "rage" are violent to a woman. Say, hypothetically, you did hit your wife - you struck her once in hysterical anger. Stop. Move back. Apologise. Spend the rest of your time making it up to her. Restore that trust and build on that protection. You would not imagine how deep one strike affects a woman. Her children's children will feel that pain.
There is a custom in looking for a calm partner, by testing the extent of their anger. Ideally the potential partner is questioned or provoked (within reason) to check his/ her reactions. Do they explode? And in that answer is a hint of the joy to come. A woman came to the Prophet ﷺ for advice about a suitable spouse, saying, "Abul Jahm and Mu'awiah have proposed to marry me. The Prophet (by way of advice) said: As to Mu'awiah he is very poor and Abul Jahm is accustomed to beating women." (Muslim) A poor man is better than a violent man.
Does the Ideal Marriage exist?
But you were hoping it was yes. I'm sorry.
I don't care how you were brought up, what was 'o.k.' in your house or what cultural norms you have accepted, if you raise your hand instead of your voice, you lose all respect as a man. Your value as a leader is put to question - if you treated one woman that brutally, how will you handle other people? In Islam we are taught that Allah is extra merciful to those who show mercy to others. This goes beyond a smile and punch of flowers. As a Muslim representative of a peaceful faith you add to the statistics that claim more Muslim marriages result in domestic violence and divorce (they do). As a father you destroy the respect your children had for you, so in ten years you are faced with children who raise their voices against you and you wonder in horror - why? A modern saying is that "by the time a man realises his own father was right, he was children who think he's wrong". How you communicate with and treat the mother of your children, especially in front of them, paints a stark picture of what you are. If you have daughters and they grow up hating men, you can begin by asking yourself what you did to help.
But irrespective of the male-female stereotypes, abusive relationships emerge the moment one person feels let down or arrogant. In the mentality of the victim, men will react with greater force. By all means seek marriage counselling, ask your wife's sisters, friends, mother to talk to her. Do not resort to rolling up your own sleeves and cracking knuckles because you were told by someone that Allah said you could.
I remind the sisters too that this applies both ways. If you've got a self-righteous, obnoxious and stubborn husband - give them the cold shoulder. Please stop hitting them.
Good Stuff but also people shouldn't overdo it with speech, sometimes verbal abuse is worse than physical. People also have a tendency to play mind games. Calm and rational discussion seems to be the best option, I think. Maybe even make rules as to how the couple would resolve future issues: such as no name calling or no insults or to clearly voice your thoughts.
The best solution for them would be to look to the Quraan and Hadeeth for a solution and if not found there to think what would Nabi(saw) would have said about it.
The breakdown of social relationships sometimes needs more than a reminder of ahadith or Qur'an ayat; we can build a 'victim' mentality where we think we need apologies or guilt that we can't fix something. Yeah other times it's repetitive cycles of verbal abuse - infantile behaviour in adults where nobody gives in. But, alhamdulillah ala kulli haalin.
Very good article, however the trend is point to an increase in Woman on Man violence too.
|
0.999559 |
Within this book, you will find some of the best-known Sherlock Holmes stories including A Scandal in Bohemia, The Speckled Band, The Red-Headed League, and the much despised The Final Problem. These stories were published serially in a magazine before Doyle gathered them together for The Adventures and The Memoirs.
It's hard to say too much about these stories that hasn't already been mentioned. I found them a perfect pick for winter. It was easy for me to sit down with a blanket and immerse myself in the dark alleys of London or the mysterious country homes with dark secrets. The mysteries are well-written and the combination of Holmes and Watson has stood up to the test of time for good reasons. Watson makes the perfect every man narrator to show us the bizarre but compelling world of the reclusive Holmes. The good detective has, of course, become an archetype for detective stories everywhere. His mind seems to work on a different level than that of the average person, as he seamlessly uses his powers of observation and his vast knowledge of science, history, and psychology to solve case after case.
It was interesting for me to note that the Sherlock Holmes of Doyle's stories is a more multi-faceted character than the one we often see portrayed on TV and in the movies. He is a genius who is socially awkward and feels that he is superior to everyone he encounters. But the Holmes created by Doyle goes through many more emotions than we usually see portrayed - he is unsure of his decisions, he worries for his friend, and in rare moments he even worries for himself. This character has so much for the reader to uncover and it feels that you could spend a lifetime with him (as Watson does) and perhaps you will never really know him.
I'm glad I finally read some Sherlock Holmes. The mysteries are wonderful and I feel inspired to pick up some other classic mysteries (Agatha Christie, maybe?). Sherlock Holmes and Watson are an incredible duo and I'm glad to have met them in their original incarnations.
Have you read Sherlock Holmes? What is your favorite story or novel?
I have never read Sherlock Holmes. I really really should do so!
|
0.999991 |
Cloves offer many health benefits, some of which include aiding in digestion, fighting against cancer, protecting the liver, boosting the immune system, controlling diabetes, and preserving bone quality. They also contain anti-mutagenic and anti-microbial properties, along with fighting against oral diseases and headaches, while also displaying aphrodisiac properties. What Are Cloves? Cloves are one of the spices indigenous to Asian countries like Indonesia, India, Pakistan, and even areas of East Africa. It is native to the Maluku islands in Indonesia. They are a popular flavoring agent used in a variety of ways across the world, particularly in Asia and cloves form a culinary base in a number of different Asian cuisines. Clove, just like many other spices originating in Asia, has a great history behind it. During the 13th and 14th centuries, cloves were transported all the way from Indonesia to China, India, Persia, Africa, and Europe. During this time, cloves had a very high price, and thus wars for monopoly over clove production and distribution began. Many wars were waged in order to control the islands of Maluku during both the medieval and modern periods. The Dutch emerged victoriously and held the Maluku islands for a very long time. Today, clove is a very important commercial crop all around the world. Scientific Facts About Clove Clove is the dried bud of the flower from the tree Syzygium aromaticum. It belongs to the plant family named Myrtaceae. The plant is an evergreen plant growing in tropical and subtropical conditions. Clove is an herb and people use various parts of the plant, including the dried bud, stems, and leaves to make medicine. Clove oil is also famous for its medicinal properties. Clove has been used for thousands of years in India and China not only as a spice and condiment but also as a medicine for many ailments. Ayurvedic medicine used cloves for tooth decay, halitosis, and bad breath. In Chinese medicine, clove was considered to possess aphrodisiac properties. Cloves Nutrition Facts According to the National Nutrient Database for Standard Reference , the nutrients found in 100 grams of cloves include 65 grams of carbohydrates, 6 grams of protein, 13 grams of total lipids, 2 grams of sugars, 274 kcal of energy, and 33 grams of dietary fibers. Minerals in cloves include calcium, iron, magnesium, phosphorous, potassium, sodium, and zinc. The vitamins found in them include vitamin C, thiamin, riboflavin, niacin, folate, vitamin B6, vitamin B12, vitamin A, vitamin E, vitamin D, and vitamin K. Bioactive Substances in Cloves Certain bioactive compounds have been isolated from clove extracts. Some of them include flavonoids, hexane, methylene chloride, ethanol, thymol, eugenol, and benzene. These biochemicals have been reported to possess various properties, including antioxidant, hepatoprotective, anti-microbial, and anti-inflammatory properties. Health Benefits Of Cloves Health benefits of cloves include: Better Digestion Cloves improve digestion by stimulating the secretion of digestive enzymes. Cloves are also good for reducing flatulence, gastric irritability, dyspepsia, and nausea. They can be roasted, powdered, or taken with honey for relief in digestive disorders. Is Apricot Good For Stomach? Antibacterial Properties Cloves have been tested for their antibacterial properties against a number of human pathogens. The extracts of cloves were potent enough to kill those pathogens. Clove extracts are also effective against the specific bacteria that spread cholera. Chemo-preventive Properties Cloves are of interest to the medical community due to their chemo-preventive or anti-carcinogenic properties. Tests have shown that they are helpful in controlling lung cancer at its early stages. Liver Protection Cloves contain high amounts of antioxidants, which are ideal for protecting the organs from the effects of free radicals, especially the liver. Metabolism, in the long run, increases free radical production and lipid profile, while decreasing the antioxidants in the liver. Clove extracts are helpful in counteracting these effects with its hepatoprotective properties. Diabetes Control Cloves have been used in many traditional remedies for a number of diseases. One such disease is diabetes. In patients suffering from diabetes, the amount of insulin produced by the body is either insufficient, or it is not produced at all. Studies have revealed that extracts from cloves imitate insulin in certain ways and help in controlling blood sugar levels. Bone Preservation The hydro-alcoholic extracts of cloves include phenolic compounds such as eugenol and its derivatives, such as flavones, isoflavones, and flavonoids. These extracts have been particularly helpful in preserving bone density and the mineral content of bone, as well as increasing tensile strength of bones in case of osteoporosis. Anti-mutagenic Properties Mutagens are those chemicals that change the genetic makeup of the DNA by causing mutations. Biochemical compounds found in cloves, like phenylpropanoids, possess anti-mutagenic properties . These were administered to cells treated with mutagens and they were able to control the mutagenic effects to a significant rate. Boosts the Immune System Ayurveda describes certain plants to be effective in developing and protecting the immune system. One such plant is clove. The dried flower bud of clove contains compounds that help in improving the immune system by increasing the white blood cell count, thereby, improving delayed-type hypersensitivity. cloveinfo Anti-inflammatory Properties Cloves possess anti-inflammatory and pain-killing properties. Studies on clove extracts administered to lab rats suggest that the presence of eugenol reduced the inflammation caused by edema. It was also confirmed that eugenol has the ability to reduce pain by stimulating pain receptors. How To Use Ginger Root For Inflammation? Cure for Oral Diseases Cloves can be taken for gum diseases like gingivitis and periodontitis. Clove bud extracts significantly control the growth of oral pathogens, which are responsible for various oral diseases. Cloves can also be used for toothaches due to their pain-killing properties. Aphrodisiac Properties Spices such as clove and nutmeg have been said to possess aphrodisiac properties, according to Unani medicine. Experiments on clove and nutmeg extracts were tested against standard drugs administered for that reason, and both clove and nutmeg showed positive results. Cure for Headaches Headaches can be reduced by using cloves. Make a paste of a few cloves and mix it with a dash of rock salt. Add this to a glass of milk. This mixture reduces headaches quickly and effectively. Side Effects Of Using Clove Clove Oil: Clove oils must not be used directly; instead they must be diluted either in olive oil or in distilled water. Clove extract oil is generally considered to be safe, but certain studies have revealed that they possess cytotoxic properties. There are two major components present in clove extract oil; eugenol, and B-caryophyllene. These compounds were particularly effective against fibroblasts and endothelial cells. Clove Cigarettes: In Indonesia, cloves are consumed on a large scale in the form of cigarettes, popularly known as kreteks. These clove cigarettes have emerged as an alternative to tobacco cigarettes, but research shows that clove cigarettes are actually worse than conventional cigarettes. In the case of clove cigarettes, the amount of nicotine, carbon monoxide, and tar entering into the lungs was higher than that from normal tobacco cigarettes.
|
0.8566 |
Chechen (нохчийн мотт , [ˈnɔx.t͡ʃiːn mu͜ɔt]) is a Northeast Caucasian language spoken by more than 1.4 million people, mostly in the Chechen Republic and by members of the Chechen diaspora throughout Russia, Jordan, Central Asia (mainly Kazakhstan and Kyrgyzstan), and Georgia.
Chechen is a Northeast Caucasian language. Together with the closely related Ingush, with which there exists a large degree of mutual intelligibility and shared vocabulary, it forms the Vainakh branch.
There are a number of Chechen dialects: Akkish, Chantish, Chebarloish, Malkhish, Nokhchmakhkakhoish, Orstkhoish, Sharoish, Shuotoish, Terloish, Itum-Qalish, and Himoish. The Kisti dialect of Georgia is not easily understood by northern Chechens without a few days' practice. One difference in pronunciation is that Kisti aspirated consonants remain aspirated when doubled (fortis) or after /s/, whereas they lose their aspiration in other dialects in these situations.
Dialects of Chechen can be classified by their geographic position within the Chechen Republic. The dialects of the northern lowlands are often referred to as "Oharoy muott" (literally "lowlander's language") and the dialect of the southern mountain tribes is known as "Laamaroy muott" (lit. "mountainer's language"). Oharoy muott forms the basis for much of the standard and literary Chechen language, which can largely be traced to the regional dialects of Urus-Martan and contemporary Grozny. Laamaroy dialects include (but are not limited to) Chebarloish, Sharoish, Itum-Qalish, Kisti, and Himoish. Until recently, however, Himoy was undocumented and was considered a branch of Sharoish, as many dialects are also used as the basis of intertribal (teip) communication within a larger Chechen "tukkhum". Laamaroy dialects such as Sharoish, Himoish and Chebarloish are more conservative and retain many features from Proto–Chechen. For instance, many of these dialects lack a number of vowels found in the standard language which were a result of long-distance assimilation between vowel sounds. Additionally, the Himoy dialect preserves word-final, post-tonic vowels as a schwa [ə], indicating Laamaroy and Ohwaroy dialects were already separate at the time that Oharoy dialects were undergoing assimilation.
According to the Russian Census of 2010, 1,350,000 people reported being able to speak Chechen.
Chechen is an official language of Chechnya.
Chechens in Jordan have good relations with the Hashemite Kingdom of Jordan and are able to practice their own culture and language. Chechen language usage is strong among the Chechen community in Jordan. Chechens are bilingual in both Chechen and Arabic, but do not speak Arabic among themselves, only speaking Chechen to other Chechens. Some Jordanians are literate in Chechen as well, having managed to read and write to people visiting Jordan from Chechnya.
Some phonological characteristics of Chechen include its wealth of consonants and sounds similar to Arabic and the Salishan languages of North America, as well as a large vowel system resembling those of Swedish and German.
The Chechen language has, like most indigenous languages of the Caucasus, a large number of consonants: about 40 to 60 (depending on the dialect and the analysis), far more than in most European languages. Typical of the region, a four-way distinction between voiced, voiceless, ejective, and geminate fortis stops is found.
Nearly any consonant may be fortis because of focus gemination, but only the ones above are found in roots. The consonants of the t cell and /l/ are denti-alveolar; the others of that column are alveolar. /x/ is a back velar, but not quite uvular. The lateral /l/ may be velarized, unless it's followed by a front vowel. The trill /r/ is usually articulated with a single contact, and therefore sometimes described as a tap [ɾ]. Except in the literary register, and even then only for some speakers, the voiced affricates /dz/, /dʒ/ have merged into the fricatives /z/, /ʒ/. A voiceless labial fricative /f/ is found only in European loanwords. /w/ appears both in diphthongs and as a consonant; as a consonant, it has an allophone [v] before front vowels.
The approximately twenty pharyngealized consonants also appear in the table above. Labial, alveolar, and postalveolar consonants may be pharyngealized, except for ejectives. Pharyngealized consonants do not occur in verbs or adjectives, and in nouns and adverbs they occur predominantly before the low vowels /a, aː/ ([ə, ɑː]).
Except when following a consonant, /ʢ/ is phonetically [ʔˤ], and can be argued to be a glottal stop before a "pharyngealized" (actually epiglottalized) vowel. However, it does not have the distribution constraints characteristic of the anterior pharyngealized (epiglottalized) consonants. Although these may be analyzed as an anterior consonant plus /ʢ/ (they surface for example as [dʢ] when voiced and [pʰʜ] when voiceless), Nichols argues that given the severe constraints against consonant clusters in Chechen, it is more useful to analyze them as single consonants.
The voiceless alveolar trill /r̥/ contrasts with the voiced version /r/, but only occurs in two roots, vworh "seven" and barh "eight".
Unlike most other languages of the Caucasus, Chechen has an extensive inventory of vowel sounds, about 44, putting its range higher than most languages of Europe (most vowels being the product of environmentally-conditioned allophonic variation, which varies by both dialect and method of analysis). Many of the vowels are due to umlaut, which is highly productive in the standard dialect. None of the spelling systems used so far have distinguished the vowels with complete accuracy.
All vowels may be nasalized. Nasalization is imposed by the genitive, infinitive, and for some speakers the nominative case of adjectives. Nasalization is not strong, but it is audible even in final vowels, which are devoiced.
Some of the diphthongs have significant allophony: /ɥø/ = [ɥø], [ɥe], [we]; /yø/ = [yø], [ye]; /uo/ = [woː], [uə].
In closed syllables, long vowels become short in most dialects (not Kisti), but are often still distinct from short vowels (shortened [i], [u], [ɔ], and [ɑ̤] vs. short [ɪ], [ʊ], [o], and [ə], for example), though which remain distinct depends on the dialect. /æ/, /æː/ and /e/, /eː/ are in complementary distribution (/æ/ occurs after pharyngealized consonants, whereas /e/ does not, and /æː/—identical with /æ/ for most speakers—occurs in closed syllables, while /eː/ does not) but speakers strongly feel that they are distinct sounds.
Pharyngealization appears to be a feature of the consonants, though some analyses treat it as a feature of the vowels. However, Nichols argues that this does not capture the situation in Chechen well, whereas it is more clearly a feature of the vowel in Ingush: Chechen [tsʜaʔ] "one", Ingush [tsaʔˤ], which she analyzes as /tsˤaʔ/ and /tsaˤʔ/. Vowels have a delayed murmured onset after pharyngealized voiced consonants and a noisy aspirated onset after pharyngealized voiceless consonants. The high vowels /i/, /y/, /u/ are diphthongized, [əi], [əy], [əu], whereas the diphthongs /je/, /wo/ undergo metathesis, [ej], [ow].
Chechen permits syllable-initial clusters /st px tx/, and non-initial /x r l/ plus any consonant and any obstruent plus a uvular of the same manner. The only cluster of three consonants permitted is /rst/.
Chechen is an agglutinative language with an ergative–absolutive morphosyntactic alignment. Chechen nouns belong to one of several genders or classes (6), each with a specific prefix with which the verb or an accompanying adjective agrees. The verb does not agree with the subject or object's person or number, having only tense forms and participles. Among these are an optative and an antipassive. Some verbs, however, do not take these prefixes.
Chechen is an ergative, dependent-marking language using eight cases (absolutive, genitive, dative, ergative, allative, instrumental, locative and comparative) and a large number of postpositions to indicate the role of nouns in sentences.
Word order is consistently left-branching (like in Japanese or Turkish), so that adjectives, demonstratives and relative clauses precede the nouns they modify. Complementizers and adverbial subordinators, as in other Northeast and in Northwest Caucasian languages, are affixes rather than independent words.
Chechen also presents interesting challenges for lexicography, as creating new words in the language relies on fixation of whole phrases rather than adding to the end of existing words or combining existing words. It can be difficult to decide which phrases belong in the dictionary, because the language's grammar does not permit the borrowing of new verbal morphemes to express new concepts. Instead, the verb dan (to do) is combined with nominal phrases to correspond with new concepts imported from other languages.
When a noun denotes a human being, it usually falls into v- or y-Classes (1 or 2). Most nouns referring to male entities fall into the v-class, whereas Class 2 contains words related to female entities. Thus lūlaxuo (a neighbour) is class 1, but takes v- if a male neighbour and y- if a female. In a few words, changing the prefixes before the nouns indicates grammatical gender; thus: vоsha (brother) → yisha (sister). Some nouns denoting human beings, however, are not in Classes 1 or 2: bēr (child) for example is in class 3.
Whereas Indo-European languages code noun class and case conflated in the same morphemes, Chechen nouns show no gender marking but decline in eight grammatical cases, four of which are core cases (i.e. absolutive, ergative, genitive, and dative) in singular and plural. Below the paradigm for "говр" (horse).
Verbs do not inflect for person (except for the special d- prefix for the 1st and 2nd persons plural), only for number and tense, aspect, mood. A minority of verbs exhibit agreement prefixes, and these agree with either their subject (intransitive verbs) or with their objects (transitive verbs), with the important note that verbs in compound continuous tenses have the auxiliary verb (-u, to be) agree with the subject and the main verb in participial form agree with the object, provided that the subject is left in the absolutive case (unmarked). If the subject of a transitive verb is marked ergative case, then the auxiliary can only agree with the direct object of the verb.
Where the verb's future stem "-огІур" (will come) and the auxiliary "-у" (present tense of 'be') receive the prefix v- for a masculine subject but y- for a feminine subject.
Numerous inscriptions in the Georgian script are found in mountainous Chechnya, but they are not necessarily in Chechen. Later, the Arabic script was introduced for Chechen, along with Islam. The Chechen Arabic alphabet was first reformed during the reign of Imam Shamil, and then again in 1910, 1920 and 1922.
At the same time, the alphabet devised by Peter von Uslar, consisting of Cyrillic, Latin, and Georgian letters, was used for academic purposes. In 1911 it too was reformed but never gained popularity among the Chechens themselves.
The Latin alphabet was introduced in 1925. It was unified with Ingush in 1934, but abolished in 1938.
In 1938–1992, only the Cyrillic alphabet was used for Chechen.
Ё ё ё یوٓ yo /jo/ etc.
Э э э اە E e e /e/ etc.
Ю ю ю یو yu /ju/ etc.
Юь юь юь یو yü /jy/ etc.
Я я я یا، یآ ya /ja/ etc.
Яь яь яь یا yä /jæ/ etc.
^ In the Arabic character گ (equivalent to Cyrillic Кӏ or Latin Kh), the upper stroke is under the main stroke.
^ The Arabic character ڔٜ (equivalent to Cyrillic Ц or Latin C) is the Arabic letter rā’ with two dots below.
^ a b The glottal stop ⟨ъ⟩ is often omitted when writing.
In 1992, a new Latin Chechen alphabet was introduced, but after the defeat of the secessionist government, the Cyrillic alphabet was restored.
Most Chechen vocabulary is derived from the Nakh branch of the Northeast Caucasian language family, although there are significant minorities of words derived from Arabic (Islamic terms, like "Iman", "Ilma", "Do'a") and a smaller amount from Turkic (like "kuzga", "shish"), belonging to the universal Caucasian stratum of borrowings) and most recently Russian (modern terms, like computer – "kamputar", television – "telvideni", televisor – "telvizar", metro – "metro" etc.).
Before the Russian conquest, most writing in Chechnya consisted of Islamic texts and clan histories, written usually in Arabic but sometimes also in Chechen using Arabic script. Those texts were largely destroyed by Soviet authorities in 1944. The Chechen literary language was created after the October Revolution, and the Latin script began to be used instead of Arabic for Chechen writing in the mid-1920s. In 1938, the Cyrillic script was adopted, in order to tie the nation closer to Russia. With the declaration of the Chechen republic in 1992, some Chechen speakers returned to the Latin alphabet.
The Chechen diaspora in Jordan, Turkey, and Syria is fluent but generally not literate in Chechen except for individuals who have made efforts to learn the writing system, and of course the Cyrillic alphabet is not generally known in these countries.
The choice of alphabet for Chechen is politically significant: Russia prefers the use of Cyrillic, whereas the separatists preferred Latin.
^ Hammarström, Harald; Forkel, Robert; Haspelmath, Martin, eds. (2017). "Chechen". Glottolog 3.0. Jena, Germany: Max Planck Institute for the Science of Human History.
^ Moshe Maʻoz, Gabriel Sheffer (2002). Middle Eastern minorities and diasporas. Sussex Academic Press. p. 255. ISBN 1-902210-84-0. Retrieved May 12, 2011.
^ Johanna Nichols, Chechen, The Indigenous languages of the Caucasus (Caravan Books, Delmar NY, 1994) ISBN 0-88206-068-6.
^ "Indigenous Language of the Caucasus (Chechen)". Ingush.narod.ru. pp. 10–11. Archived from the original (GIF) on 2016-03-04. Retrieved 2016-01-21.
^ Dotton & Doyle Wagner, Zura & John. A grammar of Chechen.
Pieter Muysken (6 February 2008). From Linguistic Areas to Areal Linguistics. John Benjamins Publishing Company. pp. 29, 46, 47, 49, 52–54, 56, 58, 60, 61, 63, 70–74, 77, 93. ISBN 978-90-272-9136-3.
Wikivoyage has a travel guide for Chechen phrasebook.
|
0.971859 |
Birinci Dünya Savaşının galibi İngiltere'dir. İngiliz devletini yöneten unsur kraliyet hanedanlığıdır. Bilindiği gibi İngilizler, Almanlar, Hollandalılar ve Fransızlar gibi Cermen milletinin bir mensubudurlar.
Birinci Dünya Savaşından sonra Dünyayı yöneten unsurun Birinci Dünya Savaşının galibi ve baş aktörü olan ülkenin olduğunu anlamamız gerekir.
İşte bu İngiltere devleti, kendisinin bir uzantısı olan Amerikan devleti ve Almanya devletindeki bazı aile şirketlerini, şeytani tarikatları ve hükümet nezdindeki önemli kişileri kullanarak(ve ayrıca onları büyütüp, ünlü yapıp, sahneye çıkartıp ve sonrasındada besleyip), Devlet+Mafya-Tarikat-Gladyo sistemini İkinci Dünya Savaşı öncesinde ve sırasında kurmaya çalışmak istemiştir ve başarılı olmuştur.
Nasıl başarılı olmuştur ve bu Devlet+Mafya-Tarikat-Gladyo sisteminin içinde kimler var?
Gladyo: İngilizlerin kontrolünde olan Faşist İktidarlar: İngiliz Ajanı Kukla Hitler ve Kukla Nazi Devleti/Hükümeti, ve İngiliz Ajanı Kukla Stalin ve Lenin'in Sovyetler Birliği'nin Yıkımını Amaçlayan Yeni Sovyet Devleti/Hükümeti.
Bu konu hakkında ayrıntılı bilgileri bu forumdaki başlıklarda bulabilirsiniz.
Martens is very much in the limelight. There appears to be no doubt about his connection with the Guarantee [sic] Trust Company, Though it is surprising that so large and influential an enterprise should have dealings with a Bolshevik concern.
Following on the initial successes of the revolution, the Soviets wasted little time in attempting through former U.S. residents to establish diplomatic relations with and propaganda outlets in the United States.
Albert R. Williams, bearer Department passport 52,913 May 15, 1917 proceeding United States to establish information bureau for Soviet Government for which he has written authority. Shall I visa?
Nyberg was none too successful as a diplomatic representative or, ultimately, as a propagandist. The State Departmment files record an interview with Nyberg by the counselors' office, dated January 29, 1919. Nyberg was accompanied by H. Kellogg, described as "an American citizen, graduate of Harvard," and, more surprisingly, by a Mr. McFarland, an attorney for the Hearst organization. The State Department records show that Nyberg made "many misstatements in regard to the attitude to the Bolshevik Government" and claimed that Peters, the Lett terrorist police chief in Petrograd, was merely a "kind-hearted poet." Nyberg requested the department to cable Lenin, "on the theory that it might be helpful in bringing about the conference proposed by the Allies at Paris."4 The proposed message, a rambling appeal to Lenin to gain international acceptance appearing at the Paris Conference, was not sent.
On May 7, 1919, the State Department slapped down business intervention in behalf of the bureau (noted elsewhere),7 and repudiated Ludwig Martens, the Soviet Bureau, and the Bolshevik government o1 Russia. This official rebuttal did not deter the eager order-hunters in American industry. When the Soviet Bureau offices were raided on June 12, 1919, by representatives of the Lusk Committee of the state of New York, files of letters to and from American businessmen, representing almost a thousand firms, were unearthed.
. . . Every effort was made from the first by Martens and his associates to arouse the interest of American capitalists and there are grounds tot believing that the Bureau has received financial support from some Russian export firms, as well as from the Guarantee [sic] Trust Company, although this firm has denied the allegation that it is financing Martens' organisation.
It was noted by Thompson that the monthly rent of the Soviet Bureau offices was $300 and the office salaries came to about $4,000. Martens' funds to pay these bills came partly from Soviet couriers — such as John Reed and Michael Gruzenberg — who brought diamonds from Russia for sale in the U.S., and partly from American business firms, including the Guaranty Trust Company of New York.
(1) There was an intrigue afoot about the time the President first went to France to get the Administration to use Nuorteva as an intermediary with the Russian Soviet Government, with a view to bring about its recognition by America. Endeavour was made to bring Colonel House into it, and there is a long and interesting letter to Frederick C. Howe, on whose support and sympathy Nuorteva appeared to rely. There are other records connecting Howe with Martens and Nuorteva.
(2) There is a file of correspondence with Eugene Debs.
(3) A letter from Amos Pinchot to William Kent of the U.S. Tariff Commission in an envelope addressed to Senator Lenroot, introduces Evans Clark "now in the Bureau of the Russian Soviet Republic." "He wants to talk to you about the recognition of Kolchak and the raising of the blockade, etc."
(4) A report to Felix Frankfurter, dated 27th May, 1919 speaks of the virulent campaign vilifying the Russian Government.
(5) There is considerable correspondence between a Colonel and Mrs. Raymond Robbins [sic] and Nuorteva, both in 1918 and 1919. In July 1918 Mrs. Robbins asked Nuorteva for articles for "Life and Labour," the organ of the National Women's Trade League. In February and March, 1919, Nuorteva tried, through Robbins, to get invited to give evidence before the Overman Committee. He also wanted Robbins to denounce the Sisson documents.
(6) In a letter from the Jansen Cloth Products Company, New York, to Nuorteva, dated March 30th, 1918, E. Werner Knudsen says that he understands that Nuorteva intends to make arrangements for the export of food-stuffs through Finland and he offers his services. We have a file on Knudsen, who passed information to and from Germany by way of Mexico with regard to British shipping.
Ludwig Martens, the intelligence report continued, was in touch with all the leaders of "the left" in the United States, including John Reed, Ludwig Lore, and Harry J. Boland, the Irish rebel. A vigorous campaign against Aleksandr Kolchak in Siberia had been organized by Martens.
[Martens'] organization is a powerful weapon for supporting the Bolshevik cause in the United States and... he is in close touch with the promoters of political unrest throughout the whole American continent.
The Scotland Yard list of personnel employed by the Soviet Bureau in New York coincides quite closely with a similar list in the Lusk Committee files in Albany, New York, which are today open for public inspection.
the British analysis included the name "Julius Hammer" whereas Hammer was omitted from the Lusk Committee report.
In Julius Hammer, Martens has a real Bolshevik and ardent Left Wing adherent, who came not long ago from Russia. He was one of the organizers of the Left Wing movement in New York, and speaks at meetings on the same platform with such Left Wing leaders as Reed, Hourwich, Lore and Larkin.
There also exists other evidence of Hammer's work in behalf of the Soviets. A letter from National City Bank, New York, to the U.S. Treasury Department stated that documents received by the bank from Martens were "witnessed by a Dr. Julius Hammer for the Acting Director of the Financial Department" of the Soviet Bureau.
The Hammer family has had close ties with Russia and the Soviet regime from 1917 to the present. Armand Hammer is today able to acquire the most lucrative of Soviet contracts. Jacob, grandfather of Armand Hammer, and Julius were born in Russia. Armand, Harry, and Victor, sons of Julius, were born in the United States and are U.S. citizens. Victor was a well-known artist; his son — also named Armand — and granddaughter are Soviet citizens and reside in the Soviet Union. Armand Hammer is chairman of Occidental Petroleum Corporation and has a son, Julian, who is director of advertising and publications for Occidental Petroleum.
Julius Hammer was a prominent member and financier of the left wing of the Socialist Party. At its 1919 convention Hammer served with Bertram D. Wolfe and Benjamin Gitlow on the steering committee that gave birth to the Communist Party of the U.S.
In 1920 Julius Hammer was given a sentence of three-and-one-half to fifteen years in Sing Sing for criminal abortion. Lenin suggested — with justification — that Julius was "imprisoned on the charge of practicing illegal abortions but in fact because of communism."13 Other U.S. Communist Party members were sentenced to jail for sedition or deported to the Soviet Union. Soviet representatives in the United States made strenuous but unsuccessful efforts to have Julius and his fellow party members released.
Another prominent member of the Soviet Bureau was the assistant secretary, Kenneth Durant, a former aide to Colonel House. In 1920 Durant was identified as a Soviet courier. Appendix 3 reproduces a letter to Kenneth Durant that was seized by the U.S. Department of Justice in 1920 and that describes Durant's close relationship with the Soviet hierarchy.
MR. NEWTON: It is a mailer of interest to this committee to know what was the nature of that letter, and I have a copy of the letter that I Want inserted in the record in connection with the witness' testimony.
MR. Mason: That letter has never been shown to the witness. He said that he never saw the letter, and had asked to see it, and that the department had refused to show it to him. We would not put any witness on the stand and ask him to testify to a letter without seeing it.
MR. NEWTON: The witness testified that he has such a letter, and he testified that they found it in his coat in the trunk, I believe. That letter was addressed to a Mr. Kenneth Durant, and that letter had within it another envelope which was likewise sealed. They were opened by the Government officials and a photostatic copy made. The letter, I may say, is signed by a man by the name of "Bill." It refers specifically to soviet moneys on deposit in Christiania, Norway, a portion of which they waist turned over here to officials of the soviet government in this country.
Kenneth Durant, who acted as Soviet courier in the transfer of funds, was treasurer lot the Soviet Bureau and press secretary and publisher of Soviet Russia, the official organ of the Soviet Bureau. Durant came from a well-to-do Philadelphia family. He spent most of his life in the service of the Soviets, first in charge of publicity work at the Soviet Bureau then from 1923 to 1944 as manager of the Soviet Tass bureau in the United States. J. Edgar Hoover described Durant as "at all times . . . particularly active in the interests of Martens and of the Soviet government."
Felix Frankfurter — later justice of the Supreme Courts — was also prominent in the Soviet Bureau files. A letter from Frankfurter to Soviet agent Nuorteva is reproduced in Appendix 3 and suggests that Frankfurter had some influence with the bureau.
In brief, the Soviet Bureau could not have been established without influential assistance from within the United States. Part of this assistance came from specific influential appointments to the Soviet Bureau staff and part came from business firms outside the bureau, firms that were reluctant to make their support publicly known.
On February 1, 1920, the front page of the New York Times carried a boxed notation stating that Martens was to be arrested and deported to Russia. At the same time Martens was being sought as a witness to appear before a subcommittee of the Senate Foreign Relations Committee investigating Soviet activity in the United States. After lying low for a few days Martens appeared before the committee, claimed diplomatic privilege, and refused to give up "official" papers in his possession. Then after a flurry of publicity, Martens "relented," handed over his papers, and admitted to revolutionary activities in the United States with the ultimate aim of overthrowing the capitalist system.
Affording to Martens, instead of farthing on propaganda among the radicals and the proletariat he has addressed most of his efforts to winning to the side of Russia the big business and manufacturing interests of this country, the packers, the United States Steel Corporation, the Standard Oil Company and other big concerns engaged in international trade. Martens asserted that most of the big business houses of the country were aiding him in his effort to get the government to recognize the Soviet government.
"Among the people helping us to get recognition from the State Department are the big Chit ago packers, Armour, Swift, Nelson Morris and Cudahy Among the other firms are . . . the American Steel Export Company, the Lehigh Machine Company, the Adrian Knitting Company, the International Harvester Company, the Aluminum Goods Manufacturing Company, the Aluminum Company of America, the American Car and Foundry Export Company, M.C.D. Borden & Sons."
The New York Times followed up these claims and reported comments of the firms named. "I have never heard of this man [Martens] before in my life," declared G. F. Swift, Jr., in charge of the export department of Swift & Co. "Most certainly I am sure that we have never had any dealings with him of any kind."18 The Times added that O. H. Swift, the only other member of the firm that could be contacted, "also denied any knowledge whatever of Martens or his bureau in New York." The Swift statement was evasive at best. When the Lusk Committee investigators seized the Soviet Bureau files, they found correspondence between the bureau and almost all the firms named by Martens and Heller. The "list of firms that offered to do business with Russian Soviet Bureau," compiled from these files, included an entry (page 16), "Swift and Company, Union Stock Yards, Chicago, Ill." In other words, Swift had been in communication with Martens despite its denial to the New York Times.
The New York Times contacted United States Steel and reported, "Judge Elbert H. Gary said last night that there was no foundation for the statement with the Soviet representative here had had any dealings with the United States Steel Corporation." This is technically correct. The United States Steel Corporation is not listed in the Soviet files, but the list does contain (page 16) an affiliate, "United States Steel Products Co., 30 Church Street, New York City."
The Lusk Committee list records the following about other firms mentioned by Martens and Heller: Standard Oil — not listed. Armour 8c Co., meatpackers — listed as "Armour Leather" and "Armour & Co. Union Stock Yards, Chicago." Morris Go., meatpackers, is listed on page 13. Cudahy — listed on page 6. American Steel Export Co. — listed on page 2 as located at the Woolworth Building; it had offered to trade with the USSR. Lehigh Machine Co. — not listed. Adrian Knitting Co. — listed on page 1. International Harvester Co. — listed on page 11. Aluminum Goods Manufacturing Co. — listed on page 1. Aluminum Company of America — not listed. American Car and Foundry Export — the closest listing is "American Car Co. — Philadelphia." M.C.D. Borden 8c Sons — listed as located at 90 Worth Street, on page 4.
Q: [by New York Times reporter]: What is your business?
A: Purchasing director tot Soviet Russia.
Q: What did you do to accomplish this?
A: Addressed myself to American manufacturers.
A: International Harvester Corporation is among them.
Q: Whom did you see?
Q: Did you go to see him?
A: I went to see so many, about 500 people and I can't remember all the names. We have files in the office disclosing them.
In brief, the claims by Heller and Martens relating to their widespread contacts among certain U.S. firms were substantiated by the office files of the Soviet Bureau. On the other hand, for their own good reasons, these firms appeared unwilling to confirm their activities.
In addition to Guaranty Trust and the private banker Boissevain in New York, some European bankers gave direct help to maintain and expand the Bolshevik hold on Russia. A 1918 State Department report from our Stockholm embassy details these financial transfers. The department commended its author, stating that his "reports on conditions in Russia, the spread of Bolshevism in Europe, and financial questions . . . have proved most helpful to the Department. Department is much gratified by your capable handling of the legation's business."
According to this report, one of these "Bolshevik bankers" acting in behalf of the emerging Soviet regime was Dmitri Rubenstein, of the former Russo-French bank in Petrograd. Rubenstein, an associate of the notorious Grigori Rasputin, had been jailed in prerevolutionary Petrograd in connection with the sale of the Second Russian Life Insurance Company. The American manager and director of the Second Russian Life Insurance Company was John MacGregor Grant, who was located at 120 Broadway, New York City. Grant was also the New York representative of Putiloffs Banque Russo-Asiatique. In August 1918 Grant was (for unknown reasons) listed on the Military Intelligence Bureau "suspect list."
This may have occurred because Olof Aschberg in early 1918 reported opening a foreign credit in Petrograd "with the John MacGregor Grant Co., export concern, which it [Aschberg] finances in Sweden and which is financed in America by the Guarantee [sic] Trust Co."
After the revolution Dmitri Rubenstein moved to Stockholm and became financial agent for the Bolsheviks. The State Department noted that while Rubenstein was "not a Bolshevik, he has been unscrupulous in money making, and it is suspected that he may be making the contemplated visit to America in Bolshevik interest and for Bolshevik pay.
Another Stockholm "Bolshevik banker" was Abram Givatovzo, brother-in-law of Trotsky and Lev Kamenev. The State Department report asserted that while Givatovzo pretended to be "very anti-Bolshevik," he had in fact received "large sums" of moneT' from the Bolsheviks by courier for financing revolutionary operations. Givatovzo was part of a syndicate that included Denisoff of the former Siberian bank, Kamenka of the Asoff Don Bank, and Davidoff of the Bank of Foreign Commerce. This syndicate sold the assets of the former Siberian Bank to the British government.
Yet another tsarist private banker, Gregory Lessine, handled Bolshevik business through the firm of Dardel and Hagborg. Other "Bolshevik bankers" named in the report are stirrer and Jakob Berline, who previously controlled, through his wife, the Petrograd Nelkens Bank. Isidor Kon was used by these bankers as an agent.
The most interesting of these Europe-based bankers operating in behalf of the Bolsheviks was Gregory Benenson, formerly chairman in Petrograd of the Russian and English Bank — a bank which included on its board of directors Lord Balfour (secretary of state for foreign affairs in England) and Sir I. M. H. Amory, as well as S. H. Cripps and H. Guedalla. Benenson traveled to Petrograd after the revolution, then on to Stockholm. He came. said one State Department official, "bringing to my knowledge ten million rubles with him as he offered them to me at a high price for the use of our Embassy Archangel." Benenson had an arrangement with the Bolsheviks to exchange sixty million rubles for £1.5 million sterling.
In January 1919 the private bankers in Copenhagen that were associated with Bolshevik institutions became alarmed by rumors that the Danish political police had marked the Soviet legation and those persons in contact with the Bolsheviks for expulsion from Denmark. These bankers and the legation hastily attempted to remove their funds from Danish banks — in particular, seven million rubles from the Revisionsbanken.
Also, confidential documents were hidden in the offices of the Martin Larsen Insurance Company.
Consequently, we can identify a pattern of assistance by capitalist bankers for the Soviet Union. Some of these were American bankers, some were tsarist bankers who were exiled and living in Europe, and some were European bankers. Their common objective was profit, not ideology.
The questionable aspects of the work of these "Bolshevik bankers," as they were called, arises from the framework of contemporary events in Russia. In 1919 French, British, and American troops were fighting Soviet troops in the Archangel region. In one clash in April 1919, for example, American casualties were one officer, .five men killed, and nine missing.26 Indeed, at one point in 1919 General Tasker H. Bliss, the U.S. commander in Archangel, affirmed the British statement that "Allied troops in the Murmansk and Archangel districts were in danger of extermination unless they were speedily reinforced." Reinforcements were then on the way under the command of Brigadier General W. P. Richardson.
In brief, while Guaranty Trust and first-rank American firms were assisting the formation of the Soviet Bureau in New York, American troops were in conflict with Soviet troops in North Russia. Moreover, these conflicts were daily reported in the New York Times, presumably read by these bankers and businessmen. Further, as we shall see in chapter ten, the financial circles that were supporting the Soviet Bureau in New York also formed in New York the "United Americans" — a virulently anti-Communist organization predicting bloody revolution, mass starvation, and panic in the streets of New York.
|
0.999974 |
To date the approaches to the study of Wikipedia have followed from certain qualities of the online encyclopedia, all of which appear counter-intuitive at first glance. One example is that Wikipedia is authored by "amateurs," yet is surprisingly encyclopedia-like, not only in form but in accuracy (Giles, 2005). The major debate concerning the quality of Wikipedia vis-a-vis Encyclopedia Britannica is also interesting from another angle. How do the mechanisms built into Wikipedia's editing model (such as dispute resolution) ensure quality? Or, perhaps quality is the outcome of Wikipedia's particular type of "networked content," i.e., a term that refers to content 'held together' (dynamically) by human authors and non-human tenders, including bots and alert software. One could argue that the bots keep not just the vandals, but also the experimenters, at bay, those researchers as well as Wikipedia nay-sayers making changes to a Wikipedia entry, or creating a new fictional one, and subsequently waiting for something to happen (Chesney, 2006; Read, 2006; Magnus, 2008). Another example of a counter-intuitive aspect is that the editors, Wikipedians, are unpaid yet committed and highly vigilant. Do particular 'open content' projects have an equivalent community spirit, and non-monetary reward system, to that of open source projects? (See UNU-MERIT's Wikipedia Study.) Related questions concern the editors themselves. Research has been undertaken in reaction to findings that there is only a tiny ratio of editors to users in Web 2.0 platforms. This is otherwise known as the myth of user-generated content (Swartz, 2006). Wikipedia co-founder, Jimbo Wales, has often remarked that the dedicated community is relatively small, at just over 500 members. Beyond the small community there are also editors who do not register with the system. The anonymous editors and the edits they make are the subjects of the Wikiscanner tool, developed by Virgil Griffith studying at the California Institute of Technology. Anonymous editors may be 'outed,' leading to scandals, as collected by Griffith himself. Among the ways proposed to study the use of Wikipedia's data, here the Wikiscanner is repurposed for comparative entry editing analysis. For example, what does a country's edits, or an organization's, say about its knowledge? Put differently, what sorts of accounts may be made from "the places of edits"?
Wikipedia is an encyclopedia as well as a source for more than content. It is also a compendium of network activities and events, each logged and made available. In some sense it has in-built reflection upon itself, as in the process by which an entry has come into being, something missing from encyclopedias and most other 'processed' or edited works more generally. This process by which an entry matures is one means to study Wikipedia. The materials are largely the revision history of an entry, but also its discussion page, perhaps its dispute history, its lock-downs and reopenings. Another approach to network activity would rely on the edit logs of an entry, where one may view editor names, dates, times and changes. In the study of Wikipedian vigilance, the researcher is interested in how page vandalism is quickly expunged, or not, as in the infamous case of John Seigenthaler' biography entry. Herein lies the vital role assumed by bots, as well as questions concerning the level of dependency of Wikipedia on bots generally, including for each language version. Wikipedia also may be thought of as a collection of sensitive subject matters, where editors (anonymous or otherwise) make careful and subtle changes so as to set the record straight, and regain control of the narrative. (Do the tone of the NPOV [neutral point of view], and the style of an encyclopedia entry, eventually allow for settlement or closure, or does that reside in human-bot relations?) The Wikiscanner has been crucial in making connections between the location of the anonymous editor and the edit. What do the edits say about the management of content? What do the places of edits tell us about entries more generally?
Chesney, Thomas (2006). "An empirical examination of Wikipedia’s credibility," First Monday, 11(11), November, http://firstmonday.org/issues/issue11_11/chesney/.
Giles, Jim (2005). "Internet encyclopedias go head to head." Nature. 438:900-901, http://www.nature.com/nature/journal/v438/n7070/full/438900a.html.
Read, Brock (2006). "Can Wikipedia Ever Make the Grade?" Chronicle of Higher Education, 53(10): A31, http://chronicle.com/free/v53/i10/10a03101.htm.
Schiff, Stacy (2006). "Know it all. Can Wikipedia conquer expertise?" The New Yorker. 31 July, http://www.newyorker.com/archive/2006/07/31/060731fa_fact/.
Swartz, Aaron (2006). "Who writes Wikipedia?" Raw Thoughts blog entry, 4 September, http://www.aaronsw.com/weblog/whowriteswikipedia/.
Looking into all the actors (the dutch universities) and their (anonymous) edits on wikipedia in order to be able to say something about the amount and type of edits made. Will university 'profiles' emerge out of the Wikipedia data? This projects is also aiming to 'test' the wikiscanner as a research tool (can it get beyond 'scam research'?).
Define a set of actors, in this case " dutch universities".
Go to the wikiscanner and type in the actors.
Define the timespan of edits to be discovered by the Wikiscanner.
Get the list of results.
Go to the TagCloudGenerator to transform list into cloud.
The findings are visualised in lists as well as tag-clouds, providing an overview of the amount and type of topic edited. The image below shows a tagcloud about the type of topics edited by a single university, in this case the Technical University of Eindhoven.
In the well-known video about the history of a Wikipedia entry (the heavy metal umlaut), the narrator, Jon Udell, is astounded at the speed by which a vandalized page is corrected by Wikipedia's users. A vandalized page is reverted to the previous version of the entry within a minute. "Wikipedians" appear extremely vigilant.
An underinterrogated aspect of Wikipedians' vigilance are the robots, or bots -- software that often automatically monitors wikipedia pages for changes. When a change is made to a page, a bot will come calling, examining the change. Perhaps it will add a link to another wikipedia (one in a different language). Perhaps it will send an alert to a user, telling the wikipedian about a reversion or any other manner of activity. Thus changes to wikipedia pages trigger bot visits. Vigilance is often bot-driven.
In this project we are interested in the reliance of wikipedia on bots in order for the collectively-authored, user-generated encyclopedia to maintain itself.
What is the degree of dependency of Wikipedia on bots?
Thus, initially, we are interested in the overall picture. How many edits are made by humans, and how many by bots? According to Wikipedia bot activity data (which we later found to be incomplete), overall, 39% of all edits to all wikipedias (that is, to all the different language versions) are made by bots. Adding the English-language data (which was missing) we found that overall share of edits by bots in all wikipedias is 19%.
Having noticed the great discrepancy between bot activity in English and the other language versions of Wikipedia, we became interested in the level of bot activity per language. There are currently 264 language versions of wikipedia. The English-language wikipedia is the largest in size, followed by the German in the number two position. Bot activity varies greatly by language version. One small wikipedia has seen 97% of its edits made by bots.
The graphics below show the findings with respect to the share of edits by bots versus humans, as well as per language. In the final graphic, we explore the radical idea of the dependency of endangered languages on bots. (It is not so much that the endangered languages rely on bots for their survival as much as it is that bot activity is remarkably high in endangered languages, suggesting not only few humans in those language spaces, which we already know. Rather, the bots are creating links and otherwise integrating the languages into the larger wikipedia undertaking.
2. Shares of human, bot and software-assisted human edits in the top twenty most active Wikipedia entries in the English-language version.
3. Share of Wikipedia bot activity in the twenty most used languages worldwide.
Create a narrated video of the history of a Wikipedia entry. An example: http://weblog.infoworld.com/udell/gems/umlaut.html. (The video is made using screencast software.) The exercise is to show and make an account of a Wikipedia entry over time.
Peruse the 'change log' for an idea of the activity on the topic.
Choose interesting dates, or extremes in activity.
What story do the changes tell?
|
0.999549 |
The watchdog said it had "concerns regarding both the effectiveness of the technology" and the "protection of privacy and individual civil liberties."
The FBI has amassed more than 411 million photos as part of its vast facial recognition database, according to a government watchdog -- which in a new report criticized the system for its lack of safeguards and protections.
That includes millions of individuals' driving license photos, as well as photos of foreigners applying for visas, and criminal mugshots.
But the Government Accountability Office (GAO) criticized the FBI in a new report, published Wednesday, saying that the agency had not properly tested the system or balanced civil liberties and privacy.
The system kicked into operations in early-2015 after what appeared to be a relatively successful pilot. Agents would feed in a photo and the database would spring back between two and no more than 50 images of suspects, leaving the agent to make the final call on who the suspect might be.
But the GAO argued that there's no way to determine whether or not the returned images are any more accurate than the number of images rejected by the system.
That could lead to "potentially innocent individuals identified [that] could be brought in for questioning," which the report said "if false positives are returned at a higher than acceptable rate, law enforcement users may waste time and resources pursuing unnecessary investigative leads."
In one paragraph, the GAO said that the FBI's reliance on third-party data -- which the agency can't vouch for its accuracy -- could lead to missed investigative leads.
"The FBI has entered into agreements to search and access external databases -- including millions of U.S. citizens' drivers' license and passport photos -- but until FBI officials can assure themselves that the data they receive from external partners are reasonably accurate and reliable, it is unclear whether such agreements are beneficial to the FBI and do not unnecessarily include photos of innocent people as investigative leads," said the report.
In other words, the system as it stands opens up the possibility of automating a process of picking out faces that have nothing to do with an investigation -- opening up the likelihood that innocent people may be drawn up as suspects in ongoing criminal matters.
The Electronic Frontier Foundation (EFF), which was cited in the report, said on its blog following the report's release that it the findings were "shocking."
"Over and over, the FBI's secret data collection practices confirm why we need more transparency, not less. In the coming weeks, we'll be asking you to sign on to our comments to the FBI's proposal," said senior staff attorney Jennifer Lynch.
The Justice Dept. said it disagreed with half of the recommendations the watchdog made.
|
0.999998 |
(CNN) - Hawaii may have a hurricane on its horizon next week -- though it's far too early to tell how close it will get. Hurricane Lane, a devastatingly strong Category 4 storm now, is heading west-northwest over the Pacific, and is forecast to weaken and pass south of the Aloha State around Wednesday or Thursday.
Hurricane Lane could get close to Hawaii next week 1 HR Hawaii may have a hurricane on its horizon next week -- though it's far too early to tell how close it will get.
(CNN) - Hawaii may have a hurricane on its horizon next week -- though it's far too early to tell how close it will get. Hurricane Lane, a devastatingly strong Category 4 storm now, is heading west-northwest over the Pacific, and is forecast to weaken and pass south of the Aloha State around Wednesday.
Hurricane Lane could get close to Hawaii next week 14 Mins Hawaii may have a hurricane on its horizon next week -- though it's far too early to tell how close it will get.
Hawaii may have a hurricane on its horizon next week -- though it's far too early to tell how close it will get. Hurricane Lane, a devastatingly strong Category 4 storm now, is heading west-northwest over the Pacific, and is forecast to weaken and pass south of the Aloha State around Wednesday.
Hurricane Lane could get close to Hawaii Hawaii may have a hurricane on its horizon next week -- though it's far too early to tell how close it will get.
Hurricane Lane is expected to make a run at Hawaii next week, with an outcome similar to Hurricane Hector last week, The Weather Channel reported. Lane became the sixth hurricane of the eastern Pacific season Thursday night. That is about three weeks ahead of the average seasonal pace.
New hurricane makes run toward Hawaii 29 Mins Hurricane Lane is expected to make a run at Hawaii next week, with an outcome similar to Hurricane Hector last week, The Weather Channel reported.
New hurricane makes run toward Hawaii 6 Mins Hurricane Lane is expected to make a run at Hawaii next week, with an outcome similar to Hurricane Hector last week, The Weather Channel reported.
An investigation by Reveal from The Center for Investigative Reporting and The Dallas Morning News found the state failed to implement the most basic defenses against wage theft after Hurricane Harvey, leaving some workers in the rebuilding effort to fend for themselves against employers. The hurricane made landfall in Texas on Aug.
It's too soon to say, but newly upgraded Hurricane Lane will certainly be one for those in the islands to watch. The National Hurricane Center's five-day forecast track shows the storm, now in the eastern Pacific, heading westward and into the central Pacific by Saturday.
On Aug. 15, 2018, NASA-NOAA's Suomi NPP satellite flew over Tropical Depression Hector elongating and fading in the eastern region of the Northwestern Pacific Ocean. Credit: NASA/NOAA Worldview. Tropical Depression Hector is being torn apart in the Northwestern Pacific Ocean. On Aug.
After more than two-weeks’ delay, the Hikianalia and her crew are scheduled to depart Sand Island for northern California at noon on Friday. The departure officially launches the “Alahula Kai o Maleka,” which honors the frequented pathway across the ocean between Hawaii and California. Kai o Maleka means “sea of America.
Another tropical storm is traveling toward Hawaii and could affect the islands next week. Tropical storm Lane is expected to strengthen rapidly over the next few days and turn into a hurricane by Friday, but it is still unclear whether the storm will hit the islands.
Tropical Storm Lane formed far out in the East Pacific early Wednesday and is forecast to be a Category 3 hurricane with 120 mph winds about 1,000 miles southeast of Hawaii island when it enters the Central Pacific on Saturday. Lane had maximum sustained winds of 50 mph as of 11 p.m.
|
0.959353 |
Can Sarah ever survive her extremely bossy sister?
Sarah lives with her real life bossy sister. Her sister is so bossy, she decided to write a book about it. But even when her sister drives her crazy, she still loves her like crazy.
|
0.947084 |
General John L. Piotrowski is a retired United States Air Force four star general who served as Vice Chief of Staff, U.S. Air Force (VCSAF), from 1985 to 1987; and Commander in Chief, North American Aerospace Defense Command/Commander in Chief, U.S. Space Command (CINCNORAD/USCINCSPACE), from 1987 to 1990.
Piotrowski was born in 1934, in Detroit and graduated from Henry Ford Trade School in Dearborn, Michigan, in 1951. He attended Arizona State University and Florida State University, and graduated from the University of Nebraska at Omaha in 1965 with a bachelor of science degree. He did postgraduate work at the University of Southern California and Auburn University, and attended the program for management development at Harvard University. He completed Squadron Officer School in 1956, Air Command and Staff College in 1965, Armed Forces Staff College in 1968 and the Royal Air Force College of Air Warfare, Royal Air Force Station Manby, England, in 1971.
He enlisted in the U.S. Air Force in September 1952. After basic training at Lackland Air Force Base, Texas, he was assigned to Keesler Air Force Base, Mississippi, as a student in basic electronics and ground radar.
In July 1953 Piotrowski transferred to Harlingen Air Force Base, Texas, for navigator and observer training in the aviation cadet program. After graduating as a distinguished graduate, he was commissioned a second lieutenant in the Air Force in August 1954. He then returned to Keesler Air Force Base for advanced training in electronic countermeasures. In January 1955 he received the electronic warfare rating and was assigned to the 67th Tactical Reconnaissance Wing in South Korea and Japan as an electronic warfare officer and RB-26 navigator.
Piotrowski returned to the United States in May 1957 for pilot training at Marana Air Base, Arizona; Bainbridge Air Base, Georgia; and Bryan Air Force Base, Texas. He then attended F-86F advanced gunnery training at Williams Air Force Base, Arizona. After graduation he was assigned as armament and electronics maintenance officer at Williams and, later, at Luke Air Force Base, Arizona. In May 1961 he moved to Eglin Air Force Auxiliary Field 9, Florida, and joined the initial cadre of Project Jungle Jim, which became the 1st Air Commando Wing. While assigned to Eglin, he served in Southeast Asia, from November 1961 to May 1963, as a munitions maintenance officer, and T-28 and B-26 combat aircrew member.
In August 1965 Piotrowski joined the Air Force Fighter Weapons School at Nellis Air Force Base, Nevada, and served as an F-4C instructor pilot, chief of academics, an academic instructor and project officer for the Air Force operational test and evaluation of the Walleye missile program. Upon completion of testing in the United States, he introduced the Walleye into combat with the 8th Tactical Fighter Wing in Southeast Asia. After graduation from the Armed Forces Staff College in August 1968, he was assigned to Headquarters U.S. Air Force, Washington, D.C., as an action officer under the deputy director of plans for force development.
From December 1970 to July 1971 he attended the Royal Air Force College of Air Warfare. He was then assigned to Bitburg Air Base, West Germany, as assistant and, subsequently, deputy commander for operations, 36th Tactical Fighter Wing. In January 1972 he took command of the 40th Tactical Group, Aviano Air Base, Italy.
In April 1974 Piotrowski became chief of the Air Force Six-Man Group, located at Maxwell Air Force Base, directly responsible to the chief of staff. He became vice commander of Keesler Technical Training Center, Keesler Air Force Base, in March 1975.
He took command of the reactivated 552nd Airborne Warning and Control Wing at Tinker Air Force Base, Oklahoma, in July 1976 and was instrumental in establishing the E-3A Sentry Airborne Warning and Control System aircraft as an operational Air Force weapon system. While Congress debated the E-3 future (due to huge cost over-runs), General Piotrowski took the planes on continuous road shows. Especially Europe, and Korea. He filled the planes with observers who would benefit, or could appreciate the capability to project tactical forces anywhere in the world, in less than 24 hours. It should be noted, he was not only an effective leader, he was very personable and warm hearted. Before Piotrowski, the E-3 was going to be a system that would orbit America in defense, and after he arrived he changed the system to deploy to where the war was, and bring tankers and fighters along. A true tactical mission, with troops who could live out of an A-3 bag for 200 days a year. Piotrowski was named deputy commander for air defense, Tactical Air Command, Peterson Air Force Base, in September 1979. In April 1981 he became Tactical Air Command's deputy chief of staff for operations at Langley Air Force Base, Virginia, and in August 1982 was assigned as the command's vice commander. He served as commander of 9th Air Force, Shaw Air Force Base, South Carolina, from October 1982 to July 1985, when he became vice chief of staff of the Air Force, Washington, D.C. He assumed command of NORAD in February 1987.
Piotrowski was a command pilot with more than 5,000 flying hours, including 100 combat missions and 210 combat flying hours. His military decorations and awards include the Defense Distinguished Service Medal, Air Force Distinguished Service Medal, Legion of Merit, Meritorious Service Medal with two oak leaf clusters, Air Medal with two oak leaf clusters, Air Force Commendation Medal with oak leaf cluster, Presidential Unit Citation and Air Force Outstanding Unit Award with three oak leaf clusters. He received the Eugene M. Zuckert Management Award for 1979.
|
0.999997 |
Which of these lines contains a metaphor? A. She offered him a hundred-watt smile. B. Like unto death was her countenance. C. You are like a sun to me. D. Now is your final hour.
User: Which of these lines contains a metaphor? A. She offered him a hundred-watt smile. B. Like unto death was her countenance. C. You are like a sun to me. D. Now is your final hour.
She offered him a hundred-watt smile. This sentence contains a metaphor.
|
0.999988 |
This quilt is a political protest.
What would you do if you were sentenced to house arrest? As a crafter, you would no doubt spend a lot of time working on an incredibly intricate project. Surely there would be few better ways to pass the time. I suspect this is true of most crafters, and it is also true of Queen Lili'uokalani, the deposed Queen of Hawaii.
Queen Lili'uokalani was overthrown in 1893, her reign ended, and the Kingdom of Hawaii brought under rule of the American mainland. Queen Lili'uokalani herself was found guilty of treason as part of the resistance movement, and was sentenced to permanent house arrest in an upstairs bedroom of the Iolani Palace in Honolulu.
Queen Lili'uokalani had many artistic talents, including music composition (she composed and wrote a song that became a classic, "Aloha Oe"), writing, needlework and quilting. After being sentenced to house arrest she continued these activities, even though her resources were limited. And so she began making a quilt as both a political statement and a record of her imprisonment.
The finished work is nearly square, 97 by 95 inches, in a traditional nine panel style. It is currently on display at the museum in Iolani Palace, although most visitors don't appreciate what it represents. An organization called Friends of Iolani Palace is working to raise funds to publish a book about the quilt, including color photos and information about each of the nine squares.
The quilt is made in a "crazy quilt" style, and made with rich fabrics including silk brocades and printed ribbon. Each of the nine panels features a crazy quilt composition, separated with strips of a dark brown fabric to bring the composition together.
The center panel is embroidered with the words "Imprisoned at Iolani Palace… We begin the quilt here…" It features "the Kalakaua coat of arms and framed by pairs of crossed Hawaiian flags," and details the events that led up to her imprisonment and Hawaii's political takeover.
The quilt is made with fabric that appears to have come from her own wardrobe and that of her attendants. The pieces are appliquéd to a muslin background, exquisitely embroidered "in multicolored silk threads and further embellished with ink, painting, and a profusion of embroidered flora and fauna." The quilt also features "commemorative and patriotic ribbons and badges," as well as amazingly intricate embroidery throughout.
This moving piece of political history deserves its place in the sun. And long may it serve as inspiration to crafters everywhere!
|
0.965531 |
How do I use the lancets?
Twist and pull the long piece of safety plastic off the end of the lancet. Then, place the lancet between your index and middle finger (like holding a syringe). Place and hold onto the finger you wish to draw blood from and press down on the large yellow button until you hear a click.
Twist and pull the long piece of safety plastic off the end of the lancet. Then, hold lancet between two fingers. Place against the finger you wish to draw blood from and press down until you hear a click.
|
0.958877 |
Rules: Teams will have 1 minute to perform as many snatches as possible at each bar. Only one person works at a time. Teammates may trade off at any point. There will be a 20 second transition to the next bar. There will be a point value for each bar. Points will increase with weight. Bar 1 = 1pt, Bar 2 = 2pts, Bar 3 = 3pts, Bar 4 = 4pts, Bar 5 = 5pts. Scoring will be total points.
|
0.999999 |
Recent discoveries of the incredible loss of life caused by the introduction of small pox and other diseases in the New World have led some scholars to conclude that 100 million people lived in North and South America in 1492, prior to European contact. This is nearly twice the estimated population of Europe of that time. Skeptics argue that there is not sufficient archeological evidence to prove the existence of so many people in the Americas, especially when compared to the more “technologically advanced” Europe.
Which of the following, if it were discovered, would be pertinent evidence against the skeptics’ argument above?
C - The growing season in most of the Americas is longer than that of Europe.
D - The estimate population of North and South America combined was only around 3 million people in 1600.
E -The area that is now the United States and Canada, had no cities with more than 20,000 people in 1492.
We need to an answer which should support Scholars conclusion about the population of America.
D: This answer talks about population in 1600 while we are concerned about 1400. Hence, exclude this answer.
E: This answer supports skeptics' argument. Hence we can exclude E.
|
0.999997 |
Is a 366 bed Joint Commission-accredited tertiary care facility that is located in the center of the Delmarva Peninsula in Salisbury, Maryland. Their decision to convert from using Social Security numbers to a unique MRN was driven by a need to better protect their patient's identities.
To mitigate the risk of privacy and security breaches, while working to better protect its patient population from identity theft and fraud, Peninsula Regional Medical Center (PRMC) in Salisbury, Md., determined it was time to transition away from the use of Social Security numbers to a unique, system generated medical record number (MRN), while working to avoid any interference with patient care or disrupting business processes and systems.
To complete the transition as cost-effectively and efficiently as possible, Peninsula first established a multi-disciplinary oversight committee capable of taking a very holistic view of the project to ensure equal representation of all interests. The organization then retained Just Associates (JA) to utilize their expertise in patient identification management and the electronic linking of patient records to design and manage the conversion and help PRMC avoid complications.
Just Associates' data conversion planning, mapping, interface testing and data integration services provided significant value in keeping the project moving forward, allowing PRMC to successfully convert the MRN in over 25 applications with minimal disruption to clinical systems and departments.
Peninsula Regional Medical Center is a 366 bed Joint Commission-accredited tertiary care facility that is located in the center of the Delmarva Peninsula in Salisbury, Maryland. Their decision to convert from using Social Security numbers to a unique MRN was driven by a need to better protect their patient's identities.
Because of PRMC's high repeat admission rate, where patient records rarely became inactive, it was critical that the conversion to a new MRN be done in a manner that would have minimal impact on patient care and business processes. Further, there was concern over the conversion project's effect on more than 25 different information systems in place at PRMC, including registration, clinical, ancillary and financial systems.
The project involved extensive interviews with the integration team and members of each department that utilized those systems that would be impacted by the patient identifier. By understanding at a very granular level how the patient identifier was used, JA was able to develop a workflow process that traced the movement of patient identification numbers from entry point (registration) through exit point (discharge) and every possible format in which that number would reside (paper files, clinical systems , etc.). This information allowed JA to rank impacted systems according to specific risk levels, leading to specific recommendations of how best to approach the conversion within each system.
In addition to ensuring that the migration to a new medical record numbering system was conducted in an efficient and cost-effective manner, PRMC gained a better understanding of how data and information flows through the entire organization, which will be invaluable as the facility migrates to a new information system.
|
0.999798 |
The Deo Tin's have some dents and Deo sticks have some greasy marks.
Earth Conscious Natural Deodorant has anti-bacterial properties that help to stay fresh all day. Made with soothing and moisturising Coconut Oil, Shea Butter. To prevent body odour it contains Sodium Bicarbonate.
Earth Conscious is a small company in the UK and was founded from a mother of 4 in 2014. The Deodorant was born out of a need to find a natural deodorant that worked effectively against body odour.
Since 2017 they also produce a Natural Baby Balm.
All products are made from certified organic ingredients that don't cause any harm. All goods come in eco-friendly packaging.
Why is the product "a little less than perfect"? The Deo Tin's have some dents and Deo sticks have some greasy marks.
|
0.999936 |
There is a very wide range of styles of modern swimsuits available, which vary as to body coverage and materials. The choice of style may depend on community standards of modesty, as well as current fashions, and personal preferences. The choice will also consider the occasion, for example whether it is to be worn for a passive occasion such as sunbathing or for an activity such as surfing or competition. Swimwear for men usually exposes the chest, while suits for women usually cover at least the breasts.
In western culture, men's swimsuit styles include boardshorts, jammers, swim trunks, briefs or "speedos", thongs, and g-strings, in order of decreasing lower body coverage.
Women's swimsuits are generally described as one-piece, bikinis, or thongs. While they go through many trends in pattern, length and cut there is not much modification to the original variety of suit. A recent innovation is the burqini, favored by some Muslim women, which covers the whole body and head (but not face) in a manner similar to a diver's wetsuit. These are an updated version of full-body swimwear, which has been available for centuries, but conforms with Islam's traditional emphasis on modest dress. In Egypt, the term "Sharia swimsuit" is used to describe full-body swimwear.
Wetsuit and Dry suit Wetsuits and drysuits are insulated, close fitting suits designed for prolonged immersion, usually in the context of snorkeling, scuba diving, or surfing, and other water boardsports. Made from neoprene, they come in different thicknesses and styles depending on the user's interests.
Racing suits Swimsuits made of technologically advanced fabrics biomimetically designed with a surface that mimics the rough shark denticles to reduce drag along key areas of the body. The characteristics of the fabric improve shape retention and increase muscle compression to reduce vibration and retain muscle shape to reduce fatigue and power loss. Available in a variety of cuts such as bodyskin, legskin and kneeskin.
(also known as two piece) Two piece covers the breasts and stomach (like a tank top), the other the crotch and buttocks. Leaves a small gap in between the belly button and the hips, available in stylistic variations.
Trikini The name of this woman's bathing suit is formed from the word "bikini", replacing "bi-", meaning "two", with "tri-", meaning "three".
Most swimsuits in western culture leave at least the head, shoulders, arms, and lower part of the leg (below the knee) exposed. Women's swimsuits generally cover at least the aereola and bottom half of the breasts, but some are designed for the top part of the swimsuit to be removed. In many countries, young girls and sometimes women choose not to wear a swimsuit top, and this can vary with the occasion, location, age, etc.
American swimmer Conor Dwyer at the 200m freestyle semi-final in Kazan.
↑ Hawley, Caroline (2000-09-05). "Warm welcome for 'Sharia swimsuit'". BBC News. Retrieved 2009-01-10.
↑ "Child Safety: Public Swimming Pool". Essortment. 16 May 1986.
↑ "Hot Tub Rash - Hygiene-related Diseases - Hygiene - Healthy Water - CDC". cdc.gov.
↑ "El Paso, Texas, swimming pool rules Rules for swimmers. See rule 1" (PDF). elpasotexas.gov.
|
0.971781 |
The United States has no reason to accuse the Taiwan Affairs Office of the establishment of diplomatic relations between China and Saudi Arabia: brutally interfering in the internal affairs of other countries.
Original title: the United States has no reason to criticisms the Taiwan Affairs Office of the Sino Sarah diplomatic relations: it has brutally interfered in the internal affairs of other countries.
Overseas Network, September 26 - On the morning of September 26, the Taiwan Affairs Office of the State Council held a regular press conference. A spokesman for the Taiwan Affairs Office, an Feng Shan, answered questions on recent hot issues on both sides of the Straits.
A spokesman for the US State Department recently said that maintaining close official relations with Taiwan and developing relations with the mainland of China are applicable to the United States and may not be applicable to other countries. What is the response of the spokesman to the US side?
Anfeng Shan said that our Foreign Ministry has repeatedly expressed our position on the groundless accusations made by the United States on the establishment of diplomatic relations between China and Sahara. I would like to emphasize once again that the establishment of diplomatic relations between China and Sahara is the correct decision taken by El Salvador in accordance with the interests of its own country and people. Relevant remarks and practices of the US side have rudely interfered in the internal affairs of other countries. At the same time, they are also typical of double standards, seriously violating the one-China policy promised by the US side and the provisions of the three Sino-US joint communiques.
The Taiwan Affairs Office held a news conference to respond to the US arms sales to Taiwan.
|
0.99999 |
Got Error while running my test application, please help.
Error creating bean with name 'org.springframework.security.filterChains': Cannot resolve reference to bean 'org.springframework.security.web.DefaultSecurityFilterChain#0' while setting bean property 'sourceList' with key ; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'org.springframework.security.web.DefaultSecurityFilterChain#0': Cannot resolve reference to bean 'org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter#0' while setting constructor argument with key ; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter#0': Cannot resolve reference to bean 'org.springframework.security.authentication.ProviderManager#0' while setting bean property 'authenticationManager'; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'org.springframework.security.authentication.ProviderManager#0': Cannot resolve reference to bean 'org.springframework.security.config.authentication.AuthenticationManagerFactoryBean#0' while setting constructor argument; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'org.springframework.security.config.authentication.AuthenticationManagerFactoryBean#0': FactoryBean threw exception on object creation; nested exception is org.springframework.beans.factory.NoSuchBeanDefinitionException: No bean named 'org.springframework.security.authenticationManager' is defined: Did you forget to add a gobal <authentication-manager> element to your configuration (with child <authentication-provider> elements)? Alternatively you can use the authentication-manager-ref attribute on your <http> and <global-method-security> elements.
Did you forget to add a gobal <authentication-manager> element to your configuration (with child <authentication-provider> elements)?
It seems that you are missing the authentication-manager configuration.
|
0.935887 |
Greek Catholic Theological Academy [Греко-католицька богословська академія; Hreko-katolytska bohoslovska akademiia; aka Ukrainian Theological Academy]. The academy was founded in Lviv in 1928 by Metropolitan Andrei Sheptytsky to foster theological studies with particular emphasis on the liturgical and other particularities of the Eastern rite, the history of the union of the Ukrainian church with Rome, and Eastern dogma. It was also a school of higher education for candidates to the priesthood. The academy was intended to serve as the embryo of a future Ukrainian university. Organized on the same principles as Catholic universities in the West, it offered a five-year program. It had faculties of philosophy and theology, and a law faculty was to have been established in fall 1939. There were 350–400 students between 1932 and 1939, with 50–70 graduating each year, and a teaching staff of about 30 professors and lecturers. Ukrainian and Latin were the languages of instruction. The academy was directed by a rector appointed by the metropolitan from among the full professors. For the entire period of its existence the rector was Rev (later metropolitan and cardinal) Yosyf Slipy.
Altogether the academy published 21 volumes of works. The history seminar published (irregularly) its Arkhiv Seminara istoriï; the Slavic philology seminar, the semiannual Slovo; and the art history seminar, the quarterly Mystetsvo i kul'tura. The academy maintained a library and a museum (est 1932) with icons from the 14th to the 16th centuries. Scholars such as Metropolitan Andrei Sheptytsky, Bishop Mykola Charnetsky, reverends Yosyf Slipy, Tyt Myshkovsky, Vasyl Laba, Dionysii Dorozhinsky, Yaroslav Levytsky, Mykola Konrad, Andrei Ishchak, and Yuliian Dzerovych, and laymen Mykola Chubaty, Ivan Krypiakevych, Yaroslav Pasternak, Yurii Poliansky, Konstantyn Chekhovych, Volodymyr R. Zalozetsky-Sas, and Borys Kudryk served on its faculty. The academy was closed by the Soviet authorities in 1939 and again in 1944. From 1941 to 1944 it had an enrollment of 97 students.
When Metropolitan Yosyf Slipy came to the West in 1963 he founded the Ukrainian Catholic University in Rome and re-established the academy as its faculty of theology. In 1994 the Lviv Theological Academy was formed as a successor to the Greek Catholic Theological Academy. In 2002 it was reorganized as the Ukrainian Catholic University.
|
0.999995 |
Kate Elizabeth Winslet was born into a theater family, including her actor parents, Sally and Roger Winslet, and her maternal grandparents, who founded a local repertory theater. She took an interest in acting at an early age, and her first professional job was appearing in a cereal commercial as a child. She would go on to appear on the TV series "Shrinks," "Get Back" and "Dark Season," and in stage productions such as "Adrian Mole" and "Peter Pan."
Winslet landed her debut film role in director Peter Jackson's 1994 film "Heavenly Creatures," playing a schoolgirl suffering from tuberculosis who forms an obsessive friendship with a classmate. She earned an Academy Award nomination for supporting actress for her next film, Ang Lee's adaptation of the Jane Austen novel "Sense and Sensibility," which also starred Emma Thompson, Hugh Grant and Alan Rickman.
After starring in "Jude" and "Hamlet," Winslet had her big break playing Rose DeWitt, the heroine of James Cameron's 1997 blockbuster romance "Titanic," opposite Leonardo DiCaprio. The film won numerous Academy Awards, including best picture, and though Winslet didn't win for lead actress, she became the youngest actress to be nominated for two Academy Awards.
Winslet also earned Oscar nominations for her work in "Iris" in 2001, "Eternal Sunshine of the Spotless Mind" in 2004 and "Little Children" in 2006. She finally claimed an Oscar statue for her lead performance as Hanna Schmitz, a woman with a Nazi past, in Stephen Daldry's 2008 drama "The Reader."
In addition to her Oscar, Winslet has won a Grammy for best spoken-word album for children for "Listen to the Storyteller" 2000 and an Emmy for lead actress in a miniseries or movie for "Mildred Pierce" 2010, leaving her a Tony Award shy of being an EGOT a person who has won an Emmy, Grammy, Oscar and Tony.
Other films of Winslet's include "Revolutionary Road," "Carnage," "Contagion" and Labor Day."
In 2013, Winslet was honored as a Commander of the British Empire. Winslet is married to Ned Rocknroll, a nephew of Richard Branson. The two wed in December 2012 and gave birth to a son, Bear Blaze Winslet, a year later. Winslet also has a daughter, Mia, and son, Joe, with previous husbands Jim Threapleton and Sam Mendes, respectively.
Did you ever meet Kate Winslet? Share your memory.
Which other stars on the Hollywood Walk of Fame have connections to Kate Winslet?
Are other places in the world important to Kate Winslet?
Does Kate Winslet deserve this star on the Hollywood Walk of Fame?
|
0.90196 |
I am interested in the policy for titling articles, since many articles have unnecessary parentheses in their titles, IMO. AWOIAF follows the standards of Wikipedia, whose official policy is "Article titles should be recognizable to readers, unambiguous, and consistent with usage in reliable English-language sources." It is often simplified to use the most common and recognizable names (the "WP:COMMONNAME" policy). The texts of ASOIAF and D&E, the Primary Canon, are the reliable English-language sources for us. The terminology used in GRRM's works is the usage most familiar to the wiki's userbase. Although there are occasional mistakes in the appendices of ASOIAF (e.g. Eggen instead of Ebben), their content would seem to indicate GRRM's preferred terminology.
Since noble characters usually have a straightforward "given name, house name" structure, they are easier to title. Smallfolk are where many of articles are titled in awkwardly, IMO. The character Garth of Greenaway is one of the mutineers at Craster's. In the appendix of ADWD, he is listed as "GARTH OF GREENAWAY", not "GARTH of Greenaway". While his given name is Garth, GRRM is identifying the character to the reader as "Garth of Greenaway". In the text of ASOS he is usually mentioned as Garth of Greenaway or Garth Greenaway. However, AWOIAF had his article titled under "Garth (Greenaway)". Small Paul is listed in the appendix of ASOS as "SMALL PAUL" and is usually referred to by that name in ASOS, but his article was listed as "Paul". Garth's co-conspirator Muttering Bill is mentioned once in the body of ASOS and then in the appendices, all times with Muttering as part of GRRM's designation, but his article was simply titled "Bill".
The appendices shouldn't be used exclusively for titles, but they are a good starting point. An example of an exception is to not include professions and honorifics (lord, ser, king, maester, etc.) in titles, which is already in practice. Nestor Royce is listed as "LORD NESTOR ROYCE" in the ADWD appendix, but his article is appropriately titled "Nestor Royce" rather than "Lord Nestor Royce". Similarly, Maester Colemon is printed as "MAESTER COLEMON", but his article is understandably titled as simply "Colemon".
Jenny, better known as Penny Jenny, and later known as Redgrass Jenny, was a whore.
In The Mystery Knight, GRRM most frequently refers to her as "Penny Jenny". If she is better known as Penny Jenny instead of simply Jenny, then "Penny Jenny" should be the article's title, not "Jenny (Penny)". "Jenny" should be a disambiguation page linking to "Jenny of Oldstones" and "Penny Jenny".
Bethany, better known as Blushing Bethany, is a prostitute at the Happy Port whorehouse in Braavos.
Her article is currently titled "Bethany (Blushing Bethany)".
There are numerous Pates in the series. In ASOS, Tom Sevenstrings lists "Pate of Mory, Pate of Lancewood, Old Pate, and Pate of Shermer's Grove" as victims of the Lannisters. It seems unnecessary to have their corresponding articles at "Pate (Mory)", "Pate (Lancewood)", "Pate (Old)", and "Pate (Shermer's Grove)", as GRRM is giving us P-Canon phrasing which already differentiates.
TL;DR - Articles should be titled according to how GRRM designates the topic, when available. Parenthetical disambiguation should be reserved for situations in which articles would otherwise have the same title, such as the numerous Brandon Starks.
King Bread desires no avatars.
I only read the TL;DR. Look, while there isn't any official policy stating this, naming article is done like in Wikipedia. Name or (in case there is no known name) whatever known alias goes as title. Now situations where we have a name and aliases and the article also happens to share its name with another, it becomes disambiguation and there it's better suited to dissimilate the articles by providing info (that makes one article distinguish itself from the other) into brackets following the name in the title.
For example, imagine two Roys, one from ASOIAF and other from THK (The Hedge Knight), and in this situation none is given any more aliases or anything else to recognize them. Here, we undoubtly have to procceed with the brackets (naming it Roy (The Hedge Knight)) case so given this likely situation, we rather apply it alike to cases where aliases or surnames are provided in order to avoid too much diversity.
I agree with this - "Roy (A Clash of Kings)" and "Roy (The Hedge Knight)" are satisfactory titles if we have no other detailed information about them. However, if GRRM hypothetically writes, "Ser Whosit met Roy of Happytown and Roy the Daring", their articles should be titled "Roy of Happytown" and "Roy the Daring" (the terminology used by GRRM), rather than "Roy (Happytown)" and "Roy (the Daring)".
In ASOS-Arya VI, Tom Sevenstrings lists "Pate of Mory, Pate of Lancewood, Old Pate, and Pate of Shermer's Grove" as victims of the Lannisters. It seems unnecessary to have their corresponding articles at "Pate (Mory)", "Pate (Lancewood)", "Pate (Old)", and "Pate (Shermer's Grove)", as GRRM is using phrasing which already disambiguates.
|
0.999873 |
Good comebacks are hard to 'come' by and even harder to give 'back'. Here are some of the best ones that you can use. Read them and have fun.
Have you ever been in a situation where someone says something really really mean, stupid, vague, out of context, outrageous or all of the above, and you have not been able to come up with something smart and funny to say at that moment? And after an hour or so, you realize what you could have said.
Well, there's no point in that, is there? The whole point of good comebacks is that it is an instantaneous response to the absurdity that you just heard. But not to worry, there are some pretty good ones mentioned here. Use them the next time you need a witty one-liner to respond with.
*Disclaimer: The 'comebacks' used here have been compiled using different sources. They have not been formulated by the author. The idea is just to have some light-hearted fun, not hurt the sentiments of the reader.
While some people use funny comebacks as a regular part of their daily and almost every conversation, there are some who fumble with coming up with something smart to say, especially when someone has said something to insult or annoy them. At such times, just relax, breathe deeply and try and remember any of the ones mentioned here.
Using witty comebacks for the sake of humor is fine. But using it just to insult someone for pleasure or to deliberately hurt someone's sentiments is simply mean. Hence, the ones mentioned here are quite generic. So you can use them with anyone.
When someone is acting really really weird: I've seen people like you before, but I had to pay admission!
For someone who thinks he is the smartest person to walk the earth and has decided to take it upon himself to explain a very simple thing in a very complicated manner: Go ahead, tell them everything you know. It'll only take 10 seconds.
Person 1: Drivers book says you can't change gears while turning.
Person 2: Yeah, well it also says you can't speed. But does anyone ever listen?
When someone is fishing for compliments about their 'art': The fact that no one understands you doesn't mean you're an artist.
To someone who states something that is very painfully obvious: Thank God you're here, Captain Obvious!!!
Say this to someone who has just said something very amusingly stupid to you: You're the reason no one wants human cloning.
To that annoying person in the office who thinks he knows everything about everything: I can see your point, but I still think you're full of crap.
To someone who has just disagreed with you about something very trivial: You!... Off my planet!
To someone who seems surprised when you say something intelligent:I'm not as dumb as you look.
Just for fun, when someone says something uncharacteristically smart: You sound reasonable... Time to up the medication.
For a girl who has been going on and on: I'm already visualizing the duct tape over your mouth.
To someone who thinks she has engaged you in a riveting conversation and asks you a question about it: You obviously overestimated my interest.
To someone who's been trying to get your attention and finally exclaims that you were being rude for not noticing: I'm not being rude. You're just insignificant.
When someone says something exceptionally stupid: I will always cherish the initial misconceptions I had about you.
Person 1: What are you looking at?
Person 2: That's what I'm trying to figure out.
If someone says something really creepy: Children and animals are scared of you for very good reasons.
To someone who has the magical ability to come up with really senseless solutions to problems: Did you go to school to be an idiot or were you just born that way?
To someone who has just said something very shallow: I'm trying to imagine you with a personality.
To someone who has just given you a very mindless idea about what to do over the weekend: I'll try being nicer if you'll try being smarter.
It can be painful to be put down by your friends at times. But when they do it the next time, the best thing to do is respond with some good comebacks which will actually make them feel guilty about what they've just said to you.
A simple one like "I'm sure you didn't mean that the way it sounded, dear" or"How does it feel to insult other people just because you want to hide your imperfections?" will definitely do the trick!
|
0.999976 |
A hate preacher who has called for gay people to be beheaded or burned to death should be removed from the UK, the Home Secretary has been told.
Shaykh Hamza Sodagar is in London this week to deliver a series of lectures at the Islamic Republic of Iran School, which is run by the Iranian government.
The American-born radical, who describes himself as a 'role model for young Muslims all around the world', has previously posted a video listing five ways in which gay people should be killed.
The footage, from 2010, shows him saying: 'If there’s homosexual men, the punishment is one of five things.
'One - the easiest one maybe - chop their head off, that’s the easiest.
'Second - burn them to death.
'Third - throw ‘em off a cliff. Fourth - tear down a wall on them so they die under that.
WHO IS SHEIKH HAMZA SODAGAR?
Sheikh Hamza Sodagar was born in Kentucky, and was raised in Maryland until his family moved to Iran.
He is a scholar who currently lives in Iran, where he has spent the past 16 years pursuing Islamic studies.
He has previously described Americans and Europeans as 'kuffar' - and says they are puppets of Jewish lobby groups, describing Israel as a 'cancerous tumour'.
He gives regular lectures around the world, and teaches students from the west.
Human rights campaigner Peter Tatchell has called on the Home Secretary to revoke the preacher's visa.
He said: 'In a free society, Hamza Sodagar has a right to believe that homosexuality is sinful but not to preach about ways to kill lesbians and gay men.
'Many people with far less extreme views, who have never advocated violence, have been banned from entering the UK.
'Calling for death to LGBT people crosses a red line. The Home Office was wrong to grant him a visa and should now revoke it.
The series of lectures is organised by the Ahlulbayt Islamic Mission - a nonprofit British group which says it was founded by a group of Muslim activists and thinkers.
A statement from the group defended the cleric, saying claims that he advocated beheading gay people was 'laughable and absurd'.
It said: 'In remarks made in 2010, as part of a series of lectures delivered on mercy, love and hatred in Islam through a commentary of a supplication from the Islamic tradition, Shaykh Hamza explained the position of Islam on homosexuality, and that it is not compatible with Islam.
'This is a clear and undeniable position that is upheld by Islam as found in Islamic scripture and tradition.
'In this regard, it must be understood, as was mentioned in the very same lecture series, that Islamic penal code cannot be administered outside the framework of law-enforcement and legal process within a legitimate government.
'De-contextualised excerpts of this series, were used by right-wing media to suggest that Shaykh Hamza was calling for ‘the beheading and burning of homosexuals’. This is untrue and a mischievous and malicious accusation to make.
The lecture series will run until October 12.
The Islamic Republic of Iran School is an Iranian government-run small independent mixed Muslim school teaching pupils aged six to 17 in Maida Vale.
Iran has the death penalty for homosexuality.
The school opened in 2001 and follows the Iranian National Curriculum teaching in Farsi.
It seeks to help pupils achieve an understanding of their Muslim faith and culture, as well as Arabic and the Qur’an, which was rated as 'adequate' by Ofsted at the last inspection in 2013.
When the lectures were announced, the mission wrote: 'The Ahlulbayt Islamic Mission (AIM) is proud to announce that it has confirmed Shaykh Hamza Sodagar to speak for the 10 nights of Muharram in October 2016.
|
0.992622 |
What's the Point of Amazon Go?
Amazon Go has officially opened in Seattle. It's a physical store that takes the next step in retail automation—allowing customers to scan their phone as they walk in, pick up any items they want and walk out without getting in line to pay. It works with a massive array of sensors and cameras (displayed below) that track your movement, know what you pick up and charge you for what you take with you.
As I read about Amazon Go over the last few days, I kept running into tweets and articles suggesting Amazon Go might just be a novelty store, a one-off. But that doesn't make sense. I believe Amazon is in the early stages of something much bigger, and Ben Thompson offers a strong argument for that being the case.
- It was expensive to develop mainframes, but IBM could reuse the expertise to build them and most importantly the software needed to run them; every new mainframe was more profitable than the last.
- It was expensive to develop Windows, but Microsoft could reuse the software on all computers; every new computer sold was pure profit.
- It was expensive to build Google, but search can be extended to anyone with an Internet connection; every new user was an opportunity to show more ads.
- It was expensive to develop iOS, but the software can be used on billions of iPhones, every one of which generates tremendous profit.
- It was expensive to build Facebook, but the network can scale to two billion people and counting, all of which can be shown ads.
|
0.999909 |
a term originating from the work of Immanuel Kant (1724-1804) referring to any knowledge which is known to be true independently of experience. It contrasts with a posteriori which refers to knowledge confirmed by observation. Kant attempted to distinguish analytic a priori statements - true by reason of definition - from the synthetic a priori which are necessarily true statements but which are informative about experience, such as statements in mathematics or the statement 'every event must have a cause'. Synthetic a priori statements are said to be never false in any logically possible world.
|
0.999644 |
Question: How complex should a character's personality be? I don't want my characters to be extremely simple, but I'm not sure if a complicated personality would be too hard to grasp.
Answer: It depends somewhat on what type of story you are writing. Some stories are more plot/action based. They may have simpler characters because complex exploration of personalities would slow the action too much. Archetypal characters often work well in such stories.
On the other hand, some stories are more character/decision based. They may have simpler plots because the focus is more on in-depth character deliberations.
You have to know what genre you're writing in and perhaps what the readers expect to know what is appropriate. Or sometimes you just write the kind of story that would appeal to you and maybe you create an interesting twist on an existing genre.
Incidentally, even in a plot/action story, you still want well-rounded characters, you just have to paint them with fewer, broader brushstrokes.
|
0.928698 |
The Victoria Cross (VC) was awarded to 182 members of the British Armed Forces, British Indian Army and civilians under their command, during the Indian Mutiny (also known as the Indian Rebellion of 1857). The VC is a military decoration awarded for valour "in the face of the enemy" to members of armed forces of some Commonwealth countries and previous British Empire territories. It takes precedence over all other Orders, decorations and medals. It may be awarded to a person of any rank in any service and to civilians under military command. The VC is traditionally presented to the recipient by the British monarch during an investiture at Buckingham Palace, though in a large number of cases this was not possible and it was presented in the field by a prominent civil or military official. The VC was introduced in Great Britain on 29 January 1856 by Queen Victoria to reward acts of valour during the Crimean War.
The Indian Mutiny (also known as India's First War of Independence, Revolt of 1857, or the Sepoy Mutiny) began as a mutiny of sepoys of British East India Company's army on 10 May 1857, in the town of Meerut. It soon erupted into other mutinies and civilian rebellions largely in the upper Gangetic plain and central India, with the major hostilities confined to present-day Uttar Pradesh, Bihar, northern Madhya Pradesh, and the Delhi region. The rebellion posed a considerable threat to Company power in that region, and it was contained only with the fall of Gwalior on 20 June 1858. The rebellion proved to be an important watershed in Indian history; it led to the dissolution of the East India Company in 1858, and forced the British to reorganise the army, the financial system, and the administration in India. India was thereafter governed directly from London—by the British government India Office and a cabinet level Secretary of State for India—in the new British Raj, a system of governance that lasted until 1947.
Indian troops were not originally eligible for the VC, because since 1837 they had been eligible for the Indian Order of Merit—the oldest British gallantry award for general issue. When the VC was created, Indian troops were still controlled by the Honourable East India Company, and did not come under Crown control until 1860. European officers and men serving with the Honourable East India Company were not eligible for the Indian Order of Merit; the VC was extended to cover them in October 1857. The first citations of the VC varied in the details of each action; some specify one date, some date ranges, some the name of the battle and others have both sets of information. There were only two posthumous recipients of the VC for actions during the rebellion; the original Royal Warrant did not contain a specific clause regarding posthumous awards, although official policy was to not award the VC posthumously. Between 1897 and 1901, several notices were issued in the London Gazette regarding soldiers who would have been awarded the VC had they survived. In a partial reversal of policy in 1902, six of the soldiers mentioned were granted the VC, but not "officially" awarded the medal. In 1907, the posthumous policy was completely reversed and medals were sent to the next of kin of the six officers and men; Everard Phillipps and Edward Spence were decorated thus. The Victoria Cross warrant was not officially amended to explicitly allow posthumous awards until 1920. The Indian Mutiny holds the record for the most VCs won in a single day; 24 at the Second Relief of Lucknow on 16 November 1857.
"Honourable East India Company and Indian Army holders of the Victoria Cross". VictoriaCross.org. Retrieved 11 April 2008.
Bandyopadhyay, Sekhar (2004). From Plassey to Partition: A History of Modern India. New Delhi and London: Orient Longmans. ISBN 81-250-2596-0.
Bayly, C. A. (1990). Indian Society and the Making of the British Empire (The New Cambridge History of India). Cambridge and London: Cambridge University Press. ISBN 0-521-38650-0.
Bose, Jalal; 2003; pp.88–103; Quote: "The 1857 rebellion was by and large confined to northern Indian Gangetic Plain and central India."
^ Bayly, C.A.; 1990; p.170; Quote: "What distinguished the events of 1857 was their scale and the fact that for a short time they posed a military threat to British dominance in the Ganges Plain."
^ a b c "No. 27986". The London Gazette. 15 January 1907. p. 325.
^ "Robert Aitken details". National Archives. Retrieved 20 August 2008.
^ a b "No. 22154". The London Gazette. 18 June 1858. p. 2957.
^ "No. 22318". The London Gazette. 21 November 1859. p. 3792.
^ a b "No. 22396". The London Gazette. 19 June 1860. p. 2316.
^ a b "No. 22347". The London Gazette. 20 January 1860. p. 178.
^ Probyn was awarded his VC for numerous gallant acts throughout the period of the Indian Rebellion of 1857.
"No. 22154". The London Gazette. 18 June 1858. p. 2960.
^ The 'siege' mentioned in the citation is not identified and is often wrongly assumed to be Lucknow. He served at Delhi where he was badly wounded in September 1857.
^ "No. 22485". The London Gazette. 1 March 1861. p. 1007.
^ "No. 22318". The London Gazette. 21 October 1859. p. 3793.
|
0.986367 |
Cristiano Ronaldo could be back at Old Trafford in the next summer, not exactly to play for Manchester United, but to participate in Rio Ferdinand's tribute game. The English center defender completes 10 years of serving the club and Ronaldo is said to be one of the most wanted guests at this friendly game, to be held in the Summer of 2012.
Manchester United center defender, Rio Ferdinand, is close to complete 10 years at the English club and a tribute game will be held in the the Summer of 2012. Cristiano Ronaldo is a good friend of Ferdinand and there's a good chance that the Portuguese player accepts the invitation to honor his former teammate, by participating on this friendly match. The game will take place after the EURO 2012 and the final word about allowing Cristiano Ronaldo to make his return to Old Trafford, would necessarily have to be given by Real Madrid.
Do you remember Cristiano Ronaldo best moments in Manchester United?
Rio Ferdinand was born in 1978 (he's now 33 years old), and started his football player professional career at West Ham United, in 1996. The English defender joined Leeds United in 2000, where he played until 2002, just before moving to Manchester United for a record breaking transfer fee at the time, at roughly 30 million pounds. While playing for the Red Devils, Rio Ferdinand has been involved in close to 250 games already and scored 6 goals so far. Cristiano Ronaldo joined Manchester United in 2003 and shared the locker room with Ferdinand for nearly 6 years, until he got transfered to Real Madrid, in 2009.
However, it's still possible that Cristiano Ronaldo returns to Old Trafford before next summer, since both Real Madrid and Manchester United are leading their UEFA Champions League groups and could actually face each other in the knock-out stages in 2012. A match-up between two of the most popular football clubs in the World would however only be possible at the quarter-finals and further on. The reason behind that is that if the two clubs finish their group stage campaign in the 1st place, as it is expected, they will automatically avoid each other on the 1st knock-out stage draw, the last 16 round.
When Cristiano Ronaldo left Manchester United to join Real Madrid in the Summer of 2009 for a world-record transfer free of 96 million euros, there has been a wide diversity of reactions from Manchester United and English fans. While some United supporters may still bear grudge against Cristiano Ronaldo, it's my personal belief that the majority of the supporters would grant Ronaldo with a well deserved ovation, if the Portuguese ever steps the Old Trafford pitch in the future. One thing is for sure: it will be a mix of a nostalgic and strange moment if we ever see Cristiano Ronaldo showing up in Old Trafford, in a Real Madrid number 7 jersey.
Real Madrid next scheduled game is against Valencia, for La Liga, on the 19th of November 2011. Cristiano Ronaldo has joined the Portuguese National Team camp earlier this week, in order to prepare the 2-games playoff stage, against Bosnia Herzegovina. The first leg will be played in Bosnia, next Saturday, the 11th of November. The 2nd leg will be played in Lisbon, Portugal, in the 15h November of 2011. The winner will qualify for the EURO 2012.
|
0.998295 |
I used the medium thick wool and got 73 stitches.
1. Start with a 73-knit full needle.
3.72 needle on the needle.
5.71 needle on the needle.
6.69 needle on the needle, use the lower needle 2 and 1 needle.
7.70 needle on the needle.
8.68 needle on the needle, 2 and 1.
9.69 needle on the needle.
10.67 needle on the needle, 2 and 1.
Repeat the above weaving method, and after reducing to 65 stitches, we will start weaving flowers. The above weaving method is to go back and forth, and we have to weave a few lines to choose from. I have woven 9 rows of needles.
20.22 needle on needle, 41 needle on needle, 2 and 1.
21.64 needle on the needle.
22.22 needle on the needle, 40 needle on the needle. 2 and 1.
23.63 needle on the needle.
24.22 needles, 39 needles, 2 and 1.
25.62 needle on the needle.
28.22 needles, 37 needles, 2 and 1.
30.22 needle on the needle, 36 needle on the needle, 2 and 1.
32.22 needle on the needle, 4 needles. (1 release. 3 down needles) weave 7 times. 1 put. 1 down the needle. 2 and 1.
34.22 needle on the needle, 34 needle on the needle. 2 and 1.
36.22 needle on the needle, 33 needle on the needle, 2 and 1.
38.22 needle on the needle, 2 needle on the needle, (1 release. 3 down needle) woven 7 times. 1 release, 1 lower needle, 2 and 1 needle.
40.22 needle on the needle, 31 needle on the needle, 2 and 1.
42.22 needle on the needle, 30 needle on the needle, 2 and 1.
44.22 needle on the needle, 4 needles, (1 release, 3 times) woven 6 times, 2 and 1.
45. All needles. (52-pin needle) The flower is finished here.
46.52 needle on the needle, after the end of the needle, the hypotenuse of the needle is picked up by a needle with a total of 21 needles, then the number of needles is 73 needles.
47. Weaving 73 needles on the needle. At this point, the flower is finished. Then weaving the next petal from the 2nd line. That's it, and so on.
I woven a 5-flower flower, and everyone can determine the weave of several petals according to the thickness of the line and the head circumference. After weaving enough, we can suture it. A beautiful hat will be successful, and it will be warm to the mother.
|
0.97507 |
According to the balanced equation 6 moles of carbon dioxide will react with 6 moles of water to produce 1 mole of sugar and 6 moles of oxygen. What are the molar masses of the following compounds from the photosynthesis equation?
2 KMnO4 + 5 H2C2O4 + 3 H2SO4 ---> 2 MnSO4 + 10 CO2 + 8 H2O + K2SO4 How many milliliters of a 0.123 M KMnO4 solution is needed to react completely with 3.141 of oxalic acid? Please help I've worked this every way I know.
The number of moles of KMnO4 required to react with 5 moles of H2O2 in acidic medium is ?
How many moles of A1 are needed to react with each mole of CuSO4 in the reaction 2AI + 3CuSO4 -> 3Cu + AI2(SO4)3.
|
0.999996 |
Why is having travel health insurance cover so critical for international travel? Obtaining healthcare in some parts of the world can be difficult. Some hospitals won't provide treatment or won't allow a patient to be discharged until a guarantee of payment has been received. Such guarantees are commonly provided by travel insurers, but rarely by other types of insurers or managed care plans.
Other international assistance services such as protection of baggage and travel documents, personal liability, legal costs etc.
Accidents and injuries related to high-risk sports and activities, for example, skydiving. Some sports, such as skiing, may be offered limited coverage and may require higher premiums.
Single-Trip plans cover one trip only, usually with a 3-60 day duration of coverage. Appropriate for holidays and short breaks, but not for extended travel, study or work abroad.
Annual Multi-Trip plans cover all the trips you take during one year. Duration of coverage of any one trip is generally limited to 60-70 days, so again, appropriate for holidays and short breaks, but not for extended travel, study or work abroad.
Some travel health insurers have designed special policies for backpackers and for those who are planning to work or study abroad long-term. Hunt around to find the policy that is best for you.
|
0.999981 |
What's the best prescribed action? Is it that which relies solely on long-standing, individually developed ideals, disregarding the current circumstances and possibly deluding oneself waiting for the results to align with the desired/assumed conclusion? Is it instead action which is executed in direct reaction to each new event and piece of new information, accepted one's current state as the truth and while risking instability, making full use of one's own capabilities in any given moment? Or is it simply to avoid situations where one's fundamental beliefs are called into question?
Predicitons can be accurate, when based on one of a few variations of human behavior (and there are only a few variations), but only for so far.
|
0.954043 |
Definition of Motion According to Newton's law of motion, all bodies traveling in elliptical orbits move faster at certain portions of their orbits, and slower in others. It is therefore important to observe whether the travel between two successive days is greater or less than their mean motion. In erecting a Figure for a specified hour it is necessary to reduce this to hourly motion, to determine the exact position occupied by the faster-moving bodies.
To Reduce Daily Motion to Hourly Motion Since 1� or 60 m., divided by 24 h. equals 2�; therefore: degrees per day X 2� = minutes per hour; and minutes per day X 2� = seconds per hour. Thus: Moon's travel of 14� p. d. X 2� = 35' p. h.; and 24' less p. d. = 1' less p. h., or 34' p. h.; Mercury's travel of 2� 7' p. d. (computed as 2� X 2.5 = 5'; and 7' X 2.5 = 17.5") gives a rate of 5' 17.5" p. h.
|
0.965582 |
Manchester City and Sunderland are set to meet in the final of the Capital One Cup at Wembley on Sunday 2 March 2014.
Manchester City are odds on favourites to beat Sunderland at Wembley in the League Cup Final on Sunday 2 March 2014, but Sunderland have already defied the odds to knock out Chelsea and Manchester United and they beat Manchester City earlier this season. In this article, Steve Rogerson looks at both teams' routes to the final.
Sunderland will be hoping to continue their amazing giant-killing run when they face Manchester City in the Capital One Cup Final at Wembley on Sunday 2 March 2014. The Black Cats, despite poor league form, have already knocked out fellow Premiership sides Chelsea, Manchester United and Southampton and are now looking a much stronger side under recently appointed manager Gus Poyet.
In fact, Sunderland’s journey has seen them play their League Cup matches under three different managers this season. Paolo di Canio was in charge when they started their campaign in August. Then caretaker Kevin Ball saw them through the third round. And Poyet has been at the helm since.
They should though find life a lot tougher against a Manchester City side that has been scoring for fun this year in the Premiership and the League Cup. But Sunderland will know they have the capability to beat City, as they have done so once already this season when they won 1-0 at the Stadium of Light in a Premiership clash in November. The two teams also met over the summer in the final of the Barclays Asia Trophy in Hong Kong where City came out 1-0 winners in the heavy rain.
Manchester City’s European commitments meant they didn’t enter the tournament until the third round when they thrashed Championship side Wigan Athletic 5-0. This was seen as revenge for last year’s FA Cup Final between the two sides, which saw Wigan come out on top.
The fourth round on paper looked a tougher prospect with a trip to St James’ Park to face Newcastle United, and indeed City struggled for 90 minutes to break down United, forcing the game into extra time. But late goals from Alvaro Negredo and Edin Dzeko saw City through 2-0.
The quarter final was more comfortable with a 3-1 win away at Championship side Leicester City to set up a two-legged semi-final against Premiership strugglers West Ham United. This was all over bar the shouting after City stormed to a 6-0 lead at Eastlands, helped by a hat-trick from Negredo. They then added another three (including two more from Negredo) with no reply in the away leg at Upton Park.
Sunderland’s journey to Wembley started back in August with a 4-2 victory over MK Dons in the second round at the Stadium of Light, but it nearly all went wrong when they found themselves 2-0 down to the League One side. But four goals in the final 12 minutes saw the Black Cats through. The third round was more comfortable as they beat another League One side, Peterborough United, 2-0 at home.
The fourth round saw them take their first Premiership scalp when they beat Southamption 2-1, but they had to wait until the hour mark before Phil Bardsley broke the deadlock. Substitute Seb Larsson added a late second before the Saints pulled one back in injury time. This set up a quarter-final tie with Gus Poyet’s former club Chelsea. High-flying Chelsea had taken the lead early in the second half but there was then high drama with a last minute equaliser from Fabio Borini. This brought on extra time and it was all looking set for a penalty shoot-out until Ki Sung-Yueng grabbed the winner with two minutes left on the clock.
Not many gave Sunderland much hope in the two-legged semi-final against Manchester United, despite United struggling a little under new manager David Moyes. But they earned a narrow 2-1 lead after the home tie and went to Old Trafford determined to defend it. A goal by United’s Jonny Evans in the first half took the match to extra time and Sunderland were celebrating when Phil Bardsley looked to have scored the winner in the second period. But it was not to be as United scored a late equaliser. There then followed a farcical penalty shoot-out in which only three of the ten penalties hit the spot, but they went 2-1 in Sunderland’s favour to earn them a place in the final.
Not surprisingly, Manchester City are odds-on favourites to win this in ninety minutes with the best on offer being a miserly 1/3. Those who fancy a gamble on Sunderland winning though can get odds as high as 10/1 from some bookmakers. Most have gone for 4/1 or 5/1 for the draw.
The League Cup is open to teams in the top four divisions of English football. The trophy dates back to 1960-61 but was not always compulsory. When the prize for winning was increased to include a place in the Uefa Cup (now the Europa League) for the following season, interest grew among the top clubs. Since 1981, the rights to name the cup have been given to sponsors, and the first to take up that were the Milk Marketing Board and thus from 1981 to 1986 it was known as the Milk Cup (sadly not the Butter Cup). Since then, the trophy has been named after Littlewoods, Rumbelows, Coca-Cola, Worthington and Carling before the current sponsors named it the Capital One Cup last year.
|
0.999821 |
I provide fast, friendly tax services for individuals and families. I’ll carefully review your situation and circumstances to ensure that you don’t miss any of the tax deductions that are available to you. At the same time, I can optimize your whole family’s tax returns, making sure all your available options are carefully considered, and that deductions are all applied where they have the best result.
|
0.958326 |
How much do movers in Conroe charge? The moving cost depends on the size of your home and how far you're moving.
For example, moving a 2 bedroom home to Houston costs $750 - $910, to San Antonio costs $1010 - $1230, to Dallas costs $1000 - $1220, to Austin costs $910 - $1120, to Fort Worth costs $1020 - $1250, etc.
|
0.954701 |
The Oval at Kennington is known the world over as a top class cricket ground, holding the first international test match in England, but it played an important part in the development in international football too. The same person, Charles Alcock, was behind both events.
At the time Alcock was playing and organising affairs for both cricket and football. He invited Scottish clubs to send a team to England but there was little response, partly due to the cost of arranging the visit and partly because of differences between the rules adhered to in both countries.
In the end the side that contested the first international game at the Oval in 1870 consisted mostly of Scots playing their football in England.
Nowadays associated with the giant gas holders that have dominated its boundaries since 1853, the Oval was built during 1845 and saw its inaugural first-class cricket match in 1846. The ground was built by the newly inaugurated Surrey Cricket Club on ground rented from trustees to the Duchy of Cornwall, in land in South London that had previously been a market garden.
There is some controversy surrounding the first international football match although there is no dispute that it was between England and Scotland. The Oval did in fact host four matches between the two countries before the first match to be played in Scotland but those matches are not recognised by FIFA. This is partly because the English FA were arranging the whole thing, even down to picking both sides.
The first recognised international match was therefore the one held in Glasgow in 1872 when the English FA sent a team in response to an invite from Queen's Park FC. The return game at the Oval in 1873 therefore stands as the first official international football match on English soil.
Once established the national rivalry carried on and in 1879 Wales joined in, playing England at the Oval and losing two-one, with Ireland soon coming to what became the British Home Championship. The Oval remained the default home of the English national side in the south until 1889, the last match being another defeat by Scotland, this time 2-3.
Other grounds had been used around the country for international matches, mostly in the north-west, then in the midlands, as the game spread and newer, grander stadiums began to rise up. After that last match in 1889 internationals in the south used a number of different club grounds until 1923 when Wembley was opened.
In 1872 Charles Alcock went on to become the Secretary of Surrey Cricket Club and repeated his success with international cricket. The first international Tests, between Australia and England, had been played during a tour of Australia at the Melbourne Cricket Ground. Alcock saw to it that the return tour in 1880 would include a Test at the Oval, so he was able to repeat his football feat in the cricket world.
At the same time he was very active in the FA and instigated the FA Cup, ensuring that the final was held at the Oval, of course, in 1872, and for the following twenty years.
|
0.955099 |
Solar energy is the most abundant, renewable energy source in the world. Solar energy systems refer to technologies that convert the sun's heat or light to another form of energy for use US. Department of Energy. “Solar Energy Technology Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/solar-energy-technology-basics US. Department of Energy. “Solar Energy Technology Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/solar-energy-technology-basics US. Department of Energy. “Solar Energy Technology Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/solar-energy-technology-basics US. Department of Energy. “Solar Energy Technology Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/solar-energy-technology-basics National Renewable Energy Lab. “Solar Energy Basics”. July 25, 2014. http://www.nrel.gov/learning/re_solar.html National Renewable Energy Lab. “Solar Energy Basics”. July 25, 2014. http://www.nrel.gov/learning/re_solar.html National Renewable Energy Lab. “Solar Energy Basics”. July 25, 2014. http://www.nrel.gov/learning/re_solar.html National Renewable Energy Lab. “Solar Energy Basics”. July 25, 2014. http://www.nrel.gov/learning/re_solar.html .
There are two categories of technologies that harness solar energy, Solar Photovoltaics and Solar Thermal.
Solar Photovoltaic (or PV) is a technology that converts sunlight into direct current electricity by using semiconductors US. Department of Energy. "Photovoltaic Technology Basics". August 16, 2013. http://energy.gov/eere/energybasics/articles/photovoltaic-technology-basics US. Department of Energy. "Photovoltaic Technology Basics". August 16, 2013. http://energy.gov/eere/energybasics/articles/photovoltaic-technology-basics US. Department of Energy. "Photovoltaic Technology Basics". August 16, 2013. http://energy.gov/eere/energybasics/articles/photovoltaic-technology-basics US. Department of Energy. "Photovoltaic Technology Basics". August 16, 2013. http://energy.gov/eere/energybasics/articles/photovoltaic-technology-basics . In contrast, Solar Thermal is a technology that utilizes the heat energy from the sun for heating or electricity production US. Department of Energy. “Concentrating Solar Power Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/concentrating-solar-power-basics US. Department of Energy. “Concentrating Solar Power Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/concentrating-solar-power-basics US. Department of Energy. “Concentrating Solar Power Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/concentrating-solar-power-basics US. Department of Energy. “Concentrating Solar Power Basics”. August 16, 2013. http://energy.gov/eere/energybasics/articles/concentrating-solar-power-basics .
Solar is a renewable resource and does not emit any greenhouse gases in the energy generation process. However, the cost of solar in relation to other fuel sources is a barrier to adoption. Additionally, sunlight varies depending on geographic location, season, and time of day, which all creates limitations on its use.
Solar Photovoltaic (PV) technology converts the sun’s energy into direct current electricity by using semiconductors.
|
0.969218 |
NARRATIVE: At just after 2pm Saturday afternoon July 11, 2009 the Spokane Fire Department responded to a reported house fire at 1904 E. Gordon in the Northeast part of the city. Due to the fast action of the homeowner by calling the Fire Department and a quick coordinated fire attack from below the attic fire and ventilating the roof with a chainsaw the fire was kept to a minimum. Upon arrival of the first fire crew, smoke could be seen coming from every opening in the roof. A search of the house was made to make sure all occupants had gotten out. Simultaneously a hole was cut in the roof to ventilate the hot gasses out of the attic and a 1 ¾" fire hose was pulled to the upstairs and used to extinguish the fire. The utilities to the house were shut off for safety and an investigator was called to determine the cause of the fire. Fire crews had a knockdown of the fire about 15 minutes after arrival. There are no reports of injuries to either the homeowner or the fire crews. 4 Engine companies, 2 Ladder companies, a Rescue unit, 2 Battalion Chiefs and an investigator responded to the fire but crews began to be put back in service about 45 minutes after the fire attack began.
PROBABLE CAUSE: Under investigation but first look by responding crews it appears to be electrical.
DAMAGE EXTENT: Ceiling on the second floor, roof decking and some smoke/water damage on the second floor.
|
0.999999 |
Hallmark Channel is debuting its Christmas slate this weekend, airing holiday-themed films on Friday and its first new original movie of the season, “Christmas at Pemberley Manor,” on Saturday.
In other words, the network’s Christmas movies are starting with the airing of “Enchanted Christmas,” one of its 2017 original film, at 2 p.m. ET on Oct. 26 ― a full five days before Halloween.
The early start to yuletide programming has been as much a part of October as candy corn in recent years. The channel plans to broadcast nearly a full slate of Christmas programming, even on Halloween itself.
The formulaic holiday romance films have been one of the keys to the channel’s success, with last year’s October kickoff getting 17.6 million unique viewers, a record for the network, per Vox.
This year slate of 37 original Christmas movies will include 22 on Hallmark Channel and another 15 on sister network Hallmark Movies & Mysteries.
|
0.999028 |
An pitch for a sci-fi military RP.
You are a soldier working for a country, Avaria, in the far future of an alternate world. Your homeland is run by a ruthless and religious dictator who believes that every time he conquers a new country it brings closer the “Holy Day”. Your squad was tasked with scouting the border between your country and the one northwest of it, Drachma, to try and gather Intel on its military status. This mission has your squad traveling through a vast mountain range that separates the two powerful countries.
Characters will play as new soldiers fresh out of the academy tasked with joining a group of veterans on a mission. Though on the way an explosion kills the vets and leaves the recruits alone and stranded in a foreign mountain range and out of touch with HQ. The RP starts right after the explosion.
The beginning is a struggle for survival but the characters decisions may lead to them attempting to carrying out the mission they were assigned or turning on their home country in an effort to save the world.
This RP takes place in a world where technology advanced at a fast rate causing the average soldier to have advanced reflexes and abilities while wearing there armor. The only weakness is a microchip covered by a bullet and laser proof panel on the back of the armor that, if damaged, will render the suit useless. Laser and plasma rounds are standard issue but some soldiers prefer the old fashioned, but more reliable, bullets.
Magic is commonplace but takes years to master. Even then it is weak and can only be used for basics such as pyromancy, temporary ethereal shields, and short-ranged telekinesis.
Any suggestions to help the story are welcome.
|
0.9999 |
No one is perfect. In fact, most of us as a result of our upbringing and the way we have chosen to live our lives are riddled with inadequacies and personal shortcomings. A sizable part of becoming prepared to face adversity is mental preparation. Long before the power goes out or the taps run dry, we need to have thought about how we should best respond to hypothetical scenarios that we perceive as being possible if not probable.
About 10% of people who unexpectedly find themselves in dire straights be it from a natural disaster, infrastructure disruption, social unrest or other such serious lifestyle setback will immediately make the wrong decision and set about making their personal situation worse. I suspect that because most people never consider the possibility of finding themselves in a life altering predicament they do not have the basics of survival stored in the back of their brains for just such an event. As such, the first decisions they make tend to focus on their immediate comfort rather than their immediate needs. Whatever the situation, 1 in 10 will undertake a course of action that will leave them worse off than if they did nothing, sometimes, these decisions will kill them outright, such as stepping into a flooded basement without turning the electricity off.
About 80% of people in a disaster will mill about waiting for someone in authority to tell them what to do. The operative words in this statement are "in authority". Meaningful advice for some tends to have more of an effect if it comes from a politician, police officer or some such elevated person in the community. A good example of this is a weather related event. You are told that a serious storm is coming. You see your neighbour next door packing up his car and head out to see what's up. Your neighbour has lived in the area a lot longer than you, he says he's leaving because in the past, storms of similar magnitude have resulted in power problems, flooding or blown down roofs. No one else on the street seems to be getting out, so its easy to dismiss your neighbour as over reacting. He may well be, but he is choosing not to take a chance on calamity by staying. Most people presented with a similar situation will not choose to accept a course of action based on causal advice even from a well known friend. It will take an evacuation order to be get most people heading for a safer place. Even then there will be some who for whatever misguided reason will simply refuse to act in their own best interest and choose to remain in harms way. 8 out of 10 people will wait to be told what do do next even when what is eventually conveyed to them is common sense advice.
The final 10% are people who are strong willed independent thinkers who are prone to act after some careful consideration. We also call this type of person "a leader". These are the people to shout out to the 80% and say, "follow me, we're out of here." These are the people who after assessing the situation can and do look after themselves without needing reassurance and encouragement from others. These people act and react quickly and decisively without tending make matters worse for themselves in the process.
Statistics show that the majority of you reading this post fall squarely into that middle 80%. It is time for you to begin to learn what you need to do and to have on hand in order to survive adversity. You need to change they way you make decisions so that you are not waiting around for the nod of approval from the authorities before you begin to look after yourself. While we all can make bad decisions when it comes to choosing a particular course of action, having thought about what to do before you need to make those types of decisions for real, is a big advantage that will save you time and prevent you from making tactical errors during times of heightened stress and pressure.
Deciding today to practice being more decisive is a good start.
|
0.949323 |
Is it ok to be cautious about dating?
dating without being cautious is pretty damn stupid and anyone with their head on tight realizes this.
You'd have to be an idiot to not be cautious about dating. Or cautious about girls in general, for that matter. I'm a girl and I still don't understand how most of them think.
We gotta stop this prejudice of thinking that "all girls have the same mindset about men". That is lethal and dangerous.
Masteroflostrain, if you want to enjoy yourself in the dating scene: actually enjoy it. Accept the rejection, be happy you're making yourself look like a fool, and most importantly, love yourself. Nobody is attracted to somebody who cannot see the self-worth in themselves. Yeah, be cautious but only be cautious if they're socially, physically or psychologically dangerous. If they're not, stop catastrophising and muster up the confidence to research the complexity of love and just see where this kind of thing leads you to.
|
0.999632 |
Build a career in sales at a fast-growing technology company in a hot market. ProcessUnity, a leader in cloud-based risk and compliance solutions is expanding its sales and marketing team. We’re looking to hire a Sales Development Representative (SDR) to help us generate new business opportunities for our sales team.
ProcessUnity SDRs conduct high-level phone and email conversations with executives about their risk and compliance management challenges. When a prospect has a challenge that we solve, the SDR schedules a “discovery call” with our in-house product experts. A typical workday is comprised of about 100+ phone calls, numerous email communications, discovery calls and reporting. The marketing team supplies the SDR with leads that have requested information and provides various internet-based research tools for additional prospecting.
This is a full-time position that pays a generous base salary ($45,000) plus monthly and quarterly bonuses based on achieving performance goals. It requires daily attendance at our Concord offices (with the ability to work from home upon occasion). There will be occasional travel to industry conferences and trade shows. The SDR position has advancement potential within the sales, marketing and customer success organizations.
Our ideal candidate is a self-motivated team player with high social intelligence and a natural inclination for selling. She/he is very driven and can show evidence that they thrive in a competitive, merit-based environment. This individual also values networking and the benefits of being part of an agile, growing team. Above all, ProcessUnity is looking for a high-integrity, customer-focused team member that gets results.
Technology literacy – Comfort with Microsoft Windows, Microsoft Office, Web Browsers, Email, etc.
ProcessUnity offers a competitive compensation package, which includes comprehensive health and dental insurance, generous paid time off and a 401k.
|
0.999999 |
DEXP Z455 is one of the new kids on the block that should be noticed because it is a 4G Android device below $100 USD. It comes with excellent display parameters and screen size that is just okay for every kind of user.
At the performance and battery level, this device also seeks to satisfy the quest of users. At the camera department, users are in love with the interpolated cameras it comes with.
Here below are the full specifications of DEXP Z455 in matters such as price, performance, camera, network, battery and more features.
Primary design material in this device is plastic and dimensions are 146.5 x 70 x 10 mm. It weighs 180 grams. The smartphone comes in black and gold colors. It is not a water resistant device, but has fingerprint sensor, and also does not have face recognition technology.
Display type is IPS LCD capacitive multi-touch screen, which arrives without a secondary display. The display screen size is 5.45 inches, pixel density is 295 ppi, and pixel resolution is 1440 x 720. Further, display colors are 16 million.
Other features include 18:9 aspect ratio, 75 percent screen to body ratio, 2.5D curved glass, scratchproof screen, oleophobic coating, etc.
There is dual primary camera of 8 MP to the rear interpolated to 13 MP with another 0.3 MP, which comes with LED flash. Also, to the front, the camera is 2 MP interpolated to 5 MP. The front camera, made for selfies is also accompanied by a LED flash option. Accordingly, video performance is 1080p@30fps.
In a similar way, other salient features of the cameras are geotagging, touch focus, face detection, panorama, HDR, auto focus, and more.
Android OS v8.1 Oreo Go Edition comes with DEXP Z455. Surely, it must be able to upgrade to the latest Android if need be later. Further, MediaTek MT6580M accompanies it, together with process technology 28nm and 32-bit architecture.
The CPU is a simple component of 1.3 GHz Quad-core Cortex A7, while the GPU is Mali 400 MP2.
There is internal memory 1GB of RAM that cannot be increased. However, the 8GB of ROM can be increased up to 32GB external storage with a micro-SD card. Sensors are accelerometer, proximity, and light.
DEXP Z455 is a 4G Android phone which means that it can operate on GSM, HSPA and LTE networks. In other words, 2G, 3G, and 4G are in the smartphone. Also, there are two nano/hybrid SIM card slots in the device.
Other salient components are Bluetooth v4.2, Wi-Fi, mobile hotspot, GPS, A-GPS, GLONASS, headphone jack, and micro USB 2.0. However, there is no HDMI, NFC, or infrared in the DEXP Z455.
Powering the device is a Li-Ion 3400 mAh non-removable battery which has neither wireless charging nor fast charging technology. Standby time and talk time for the DEXP Z455 are 300 hours and 22 hours respectively.
DEXP Z455 price is stated to be $98 USD. Price may differ from country to country. As regards availability, the smartphone is now in the market having been released a few days ago.
|
0.942256 |
This article is about the United States institution. For other uses, see National Academy of Engineering (disambiguation).
The National Academy of Engineering (NAE) is an American nonprofit, non-governmental organization. The National Academy of Engineering is part of the National Academies of Sciences, Engineering, and Medicine, along with the National Academy of Sciences (NAS), the National Academy of Medicine, and the National Research Council.
The NAE operates engineering programs aimed at meeting national needs, encourages education and research, and recognizes the superior achievements of engineers. New members are annually elected by current members, based on their distinguished and continuing achievements in original research. The NAE is autonomous in its administration and in the selection of its members, sharing with the rest of the National Academies the role of advising the federal government.
The National Academy of Sciences was created by an Act of Incorporation dated March 3, 1863, which was signed by then President of the United States Abraham Lincoln with the purpose to "...investigate, examine, experiment, and report upon any subject of science or art..." No reference to engineering was in the original act, the first recognition of any engineering role was with the setup of the Academy's standing committees in 1899. At that time, there were six standing committees: (mathematics and astronomy; physics and engineering; chemistry; geology and paleontology; biology; and anthropology. In 1911, this committee structure was again reorganized into eight committees: biology was separated into botany; zoology and animal morphology; and physiology and pathology; anthropology was renamed anthropology and psychology with the remaining committees including physics and engineering, unchanged.
In 1913, George Ellery Hale presented a paper on the occasion of the Academy's 50th anniversary, outlining an expansive future agenda for the Academy. Hale proposed a vision of an Academy that interacted with the "whole range of science", one that actively supported newly recognized disciplines, industrial sciences and the humanities. The proposed creation of sections of medicine and engineering was protested by one member because those professions were "mainly followed for pecuniary gain". Hale's suggestions were not accepted. Nonetheless, in 1915, the Section of Physics and Engineering was recommended to be changed to physics only, and a year later the Academy began planning a separate section of engineering.
That same year of 1913, the Academy was requested to investigate the great slide in Culebra Cut late in 1913 which ultimately delayed the opening of the Panama canal by ten months. The study group, commissioned by the United States Army Corps of Engineers and although composed of both engineers and geologists resulted in a final report prepared by two geologists Charles Whitman Cross and Harry Fielding Reid. The report, submitted to President Wilson in November 1917, concluded that claims of repeated interruptions in canal traffic for years to come were unjustified.
During this time, the United States confronted the prospect of war with Germany and the question of preparedness was raised. Engineering societies responded to this crisis by offering technical services to the Federal government such as the Naval Consulting Board of 1915 and the Council of National Defense of 1916. On June 19 of that year, then US President Woodrow Wilson requested the National Academy of Sciences to organize a "National Research Council" albeit with the assistance of the Engineering Foundation. (pg. 569) The purpose of the Council (at first called the National Research Foundation) was in part to foster and encourage "the increased use of scientific research in the development of American industries... the employment of scientific methods in strengthening the national defense... and such other applications of science as will promote the national security and welfare."
During the period of national preparations, an increasing number of engineers were being elected to the physics and engineering section of the Academy, this did not however, resolve the long-standing issue of where to place applied sciences such as engineering in the Academy. In 1863, the founding members who were prominent military and naval engineers comprised almost a fifth of the membership. during the latter part of the 19th century, this engineering membership steadily declined and by 1912, Henry Larcom Abbot, who had been elected in 1872, was the sole remaining representative of the Corps of Engineers. With the Engineering Division in the wartime National Research Council being used as a precedent, the Academy established its first engineering section with nine members in 1919 with civil war veteran Henry Larcom Abbot as its first chairman. OF those nine members, only two were new members, the others had transferred from existing sections; "... of the 164 members of the Academy that year, only seven chose to identify themselves as engineers."
"(T)o stimulate research in the mathematical. physical, and biological sciences. and in the application of these sciences to engineering, agriculture. medicine. and other useful arts. with the object of increasing knowledge, of strengthening the national defense, and of contributing in other ways to the public welfare."
In 1960, Augustus Braun Kinzel, an engineer with the Union Carbide Corporation and a member of the Academy, stated that the "..engineering profession was considering the establishment of an academy of engineering..." confirmed by the Engineers Joint Council of the national engineering societies to afford themselves of opportunities and services similar to those the Academy provided in science. The question being, whether to affiliate with the National Academy or setup a separate Academy.
The Academy worked with the Engineers Joint Council le by President Eric Arthur Walker as the prime mover, to make plans to establish a new National Academy of Engineering that's independent, with a congressional charter of its own. Walker noted that this moment offered a "...singular opportunity for the engineering profession to participate actively and directly in communicating objective advice to the government..." on engineering matters related to national policy. A secondary function was to recognize distinguished individuals for their engineering contributions.
Ultimately, the initial organizers decided to create the Academy of Engineering as part of the National Academy of Sciences (NAS). On December 5, 1964, marking, "a major landmark in the history of the relationships between science and engineering in our country," the Academy approved the Articles of Incorporation of the new academy and its twenty-five charter members met to organize the National Academy of Engineering (NAE) as an autonomous parallel body in the National Academy of Sciences, with Augustus B. Kinzel as its first President. OF the 675 members of the National Academy of Sciences at that time, only about 30 called themselves engineers. The National Academy of Engineering then were a "purposeful compromise" given the fears of the NAS of expanded membership by engineers.
In 1966, the National Academy of Engineering established the Committee on Public Engineering Policy (COPEP). In 1982, the NAE and NAS committees were merged to become the Committee on Science, Engineering, and Public Policy. In 1967, the NAE formed an aeronautics and space engineering board to advise NASA and other Federal agencies chaired by Horton Guyford Stever.
In 1971, the National Academy of Engineering advised the Port Authority of New York and New Jersey not to construct additional runways at JFK airport as part of a $350,000 study commissioned by the Port Authority. The Port Authority accepted the recommendations of the NAE and NAS.
In 1975, the NAE added eighty-six new engineer members including noted civil engineer and businessman Stephen Davison Bechtel Jr. In 1986, Tha NAE issued a report encouraging foreign investment, calling for stronger Federal action. That same year, NAE member Robert W. Rummel (1915-2009), space expert and aerospace engineer, served on The Presidential Commission on the Space Shuttle Challenger Accident.
In 1989, the National Academy of Engineering in conjunction with the National Academy of Science advised the Department of Energy on a site location for the then proposed Superconducting Super Collider (SSC) from a number of States proposals.
In 1995, The NAE along with the NAS and the National Academy of Medicine reported that the American system of doctoral education in science and engineering, while "...long a world model, should be reshaped to produce more 'versatile scientists,' rather than narrowly specialized researchers". Again in 2000, NAE returned to this education theme with its detailed studies of engineering education as part of its "Engineer of 2020 Studies" project. The reports concluded that engineering education must be reformed or American engineers will be poorly prepared for engineering practice. Soon after, the American Society of Civil Engineers adopted a policy advocating for the reconstruction of the academic foundation of the professional practice of civil engineering.
In February, 2000, a National Press Club luncheon during National Engineers Week 2000 sponsored by the NAE, astronaut/engineer Neil Armstrong announced the 20 top engineering achievements having the greatest impact on the quality of life in the 20th century. Twenty-nine professional engineering societies provided 105 nominations which then selected and ranked the top 20 achievements. The nominations were pared to less than fifty and then combined into 29 larger categories.
"Thus, bridges, tunnels, and roads were merged into the interstate highway system, and tractors, combines, robot cotton pickers, and chisel plows were simply lumped into agricultural mechanization."
Some of the achievements, though, such as the telephone and the automobile which were not invented in the 20th century were included because of the impact they had were not really apparent until the 20th century. The top achievement, electrification is essential for almost part of modern society and has "...literally lighted the world and impacted countless areas of daily life, including food production and processing, air conditioning and heating, refrigeration, entertainment, transportation, communication, health care, and computers." Later in 2003, the National Academy of Engineering published A Century of Innovation: Twenty Engineering Achievements that Transformed our Lives.
The NAE's achievements list was criticized for ranking space technology (listed as "Spacecraft") twelfth instead of number one despite NAE recognizing in its report that the Soviet Union's Sputnik "shocked the world and started a space race that launched the greatest engineering team effort in American history." (NAE, 2000) Time magazine ran a similar poll of 20th-century accomplishments, and its website users ranked the first Moon landing in 1969 in second place versus NAE's 12th. The NAE listing was also criticized for not recognizing the role physics played in laying the foundations for the engineering accomplishments such Michael Faraday and Joseph Henry for electrification. NAE's list ranked electronics based upon two inventions, the transistor and integrated circuits, even it neglected to mention their physicist inventors, John Bardeen, Walter H. Brattain, William B. Shockley, Jack Kilby and Robert Noyce. Another commentator noted that the list ignored the St. Lawrence seaway and power project, built between 1954 and 1959 and by extension the Panama Canal. The St. Lawrence seaway was "...one of the largest transborder projects ever undertaken by two countries and one of the greatest engineering achievements of the 20th century."
It was also noted that these 20th-century accomplishments did not come without impacts on the environment or societies. Electrification as an example, resulting in fossil-fuel-burning power plants, airplanes and automobiles which emit greenhouse gases while electronics manufacturing leaves heavy-metal byproducts.
The Grand Challenges confront wicked social issues that are inherently global in nature and require technological innovations and applications of systems thinking. Further, NAE argues that the solutions call upon engineers to persuasively influence "...public policy, transfer technical innovation to the market place, and to inform and be informed by social science and the humanities." The NAE's Grand Challenges overlap with the United Nations' Millennium Development Goals and its 2015 successor, the Sustainable Development Goals (SDGs) which all depend upon "a strong engineering component" for success.
The Academy introduced its "Grand Challenges for Engineering" project in 2007 with the commissioning of a blue ribbon committee composed of leading technological thinkers from around the globe. The committee, led by former Secretary of Defense William Perry was charged with the task of identifying "..key engineering challenges for improving life in the 21st century." NAE's intent was to develop a set of challenges of such importance that they warranted serious investment and if successful, would "lead to a marked improvement in our quality of life." The project received "...thousands of inputs from around the world to determine its list of Grand Challenges for Engineering, and its report was reviewed by more than 50 subject-matter experts, making it among the most reviewed of Academy studies." In February 2008, the committee announced 14 Engineering Grand Challenges fitting into four broad categories: energy, sustainability, and global climate change; medicine, health informatics and health care delivery systems; reducing our vulnerability to natural and human threats; and advancing the human spirit and capabilities. NAE noted that a number of engineering schools had developed coursework based upon Grand Challenge themes.
NAE noted in its report that the Grand Challenges for Engineering were not "...ranked in importance or likelihood of solution, nor was any strategy proposed for solving them. Rather, they were offered as a way to inspire the profession, young people, and the public at large to seek the solutions." NAE also stated that the Grand Challenges were "...not targeted to any one country or corporate sector... (and)... are relevant to everyone in every country. In fact, some of them bear on the very survival of society. If solving these challenges can become an international movement, all will benefit."
One writer favorably observed that the Academy's list of 20th-century engineering achievements was dominated by devices and when asked to project advances for the 21st, the result was again, device dominated. With respect to the Grand Challenges, the NAE reframed its discussion from being device centric to addressing complex or wicked social issues that cannot be solved by technology alone, i.e. more devices. With the Grand Challenges though, NAE "...charted a course for... (engineering)... to move from devices to global social challenges, and has identified a number of exciting ones."
One critical reaction to the NAE's challenges noted that engineers today are the "...unacknowledged legislators of the world... (and by)... designing and constructing new structures, processes, and products, they are influencing how we live as much as any laws enacted by politicians. The author argued that NAE's Grand Challenges should have included the "...challenge of thinking about what we are doing as we turn the world into an (engineering) artifact and the appropriate limitations of this engineering power." This is already happening in the Netherlands with its Delta Works as an example of a society being an engineered artifact but also with a community of philosophers of engineering and technology.
Another commentator observed that challenges with respect to sustainability concentrated on specific elements of the problem without addressing "... "what level of energy use would be sustainable on a global scale." While India and China are 1000-1500 Watt per person societies, the United States requires 12,000 W per person. An estimate of a sustainable level of power consumption made by a Swiss group is 2,000 W per person. Similar questions were raised on the NAE's challenge for access to clean water. The average daily per capita water consumption in American cities varies from 130 to 2000 liters (35 to 530 gallons).
Research experience based upon a project or independent research related to a NAE Grand Challenges.
Interdisciplinary curriculum materials inclusive of "..public policy, business, law, ethics, human behavior, risk as well as medicine and the sciences."
Entrepreneurship inclusive of skills to translate "...invention to innovation... (and)... develop market ventures that scale to global solutions in the public interest."
Global dimension and perspective necessary to "..address challenges that are inherently global as well as to lead innovation in a global economy."
Service learning that develops and engages the engineer's social consciousness and its willingness to bring to bear the profession's technical expertise on societal problems thru programs such as Engineers Without Borders, or Engineering World Health.
While the National Academy of Engineering's GC SCholars (GCSP) program was primarily focused on undergraduate level curriculums, STEM focuses on K–12 education. The question for STEM educators was how to prepare K-12 students to participate in solving the wicked problems associated with the Grand Challenges. One response was to align STEM program theories of learning and International Technology and Engineering Educators Association (ITEEA, formerly ITEA) Technological Literacy Standards with the National Academy of Engineering's Grand Challenges in order to guide current and pending curriculum development. NAE's objective was also to inform instructional practices, particularly dealing with the connections among science, technology, engineering, and mathematics education. The Technological Literacy Standards were funded by the National Science Foundation and NASA and NAE's Technology Education Standards Committee led the Academy's efforts on the standards.
As a result of NAE's Grand Challenge efforts, three national engineering academies–The National Academy of Engineering of the United States, The Royal Academy of Engineering of the United Kingdom,and the Chinese Academy of Engineering–organized a joint Global Grand Challenges Summit, held in London on March 12–13, 2013. In September 2015 a second Global Grand Challenges Summit was held in Beijing, with more than 800 attendees invited by the three academies. The third Global Grand Challenges Summit, was hosted by the NAE in the United States in 2017.
The Frontiers of Engineering program assembles a group of emerging engineering leaders - usually aged 30–45 - to discuss cutting-edge research in various engineering fields and industry sectors. The goal of the meetings is to bring participants together to collaborate, network, and share ideas. There are three Frontiers of Engineering meetings every year: the U.S. Frontiers of Engineering Symposium, the German-American Frontiers of Engineering Symposium, and the Japan-America Frontiers of Engineering Symposium. The Indo-U.S. Frontiers of Engineering Symposium is held every other year.
The goal of the diversity office is to participate in studies addressing the issue of increasing and broadening a domestic talent pool. Through this effort the NAE convenes workshops, coordinators with other organizations, and identifies program needs and opportunities for improvement.
As part of this effort the NAE has launched both the EngineerGirl! and Engineer Your Life webpages.
This program area studies connections between engineering, technology, and the economic performance of the United States. Efforts aim to advance the understanding of engineering's contribution to the sectors of the domestic economy and to learn where engineering may enhance economic performance.
The project also aims to investigate the best ways to determine levels of technological literacy in the United States among three distinct populations in the United States: K-12 students, K-12 teachers, and out-of-school adults. A report (and associated website), Technically Speaking, explains what "technological literacy" is, why it's important, and what is being done in the U.S. to improve it.
This program, recognizing that the engineering profession has often been associated with causing environmental harm, looks to recognize and publicize that the profession is now at the forefront of mitigating negative environmental impacts. The program will provide policy guidance to government, the private sector, and the public on ways to create a more environmentally sustainable future.
The Center for the Advancement of Scholarship on Engineering Education. was established to advance engineering education in the United States, aiming for curriculum changes that address the needs of new generations of engineering students and the unique problems they will face with the challenges of the 21st century.
The Center worked closely with the Committee on Engineering Education, which works to improve the quality of engineering education by providing advice to policy makers, administrators, employers, and other stakeholders.
The Center is no longer active within the National Academy of Engineering.
The Center for Engineering, Ethics, and Society seeks to engage engineers and the engineering profession in identiftying and resolving ethical issues in associated with engineering research and practice. The Center works is closely linked with the Online Ethics Center.
To publicize the work of both the profession and the NAE, the institution puts considerable efforts into outreach activities.
A weekly radio spot produced by the NAE is broadcast on WTOP radio in the Washington, DC area and the file and text of the spot can be found on the NAE site. The NAE also distributes a biweekly newsletter focusing on engineering issues and advancements.
In addition, NAE has held a series of workshops titled News and Terrorism: Communicating in a Crisis, in which experts from the National Academies and elsewhere provide reporters, state and local public information officers, emergency managers, and representatives from the public sector with important information about weapons of mass destruction and their impact. This project is conducted in collaboration with the Department of Homeland Security and the Radio and Television News Directors Foundation.
In addition to these efforts the NAE fosters good relationships with members of the media to ensure coverage of the work of the institution and to serve as a resource for the media to use when they have technical questions or would like to speak to an NAE member on a particular matter. The NAE is also active in "social media," both to reach new and younger audiences and to reach traditional audiences in new ways.
The Academy awards several prizes, with each recipient receiving $500,000. The prizes include the Bernard M. Gordon Prize, the Fritz J. and Dolores H. Russ Prize, and the Charles Stark Draper Prize. They are sometimes referred to collectively as the American version of a Nobel Prize for engineering.
The Bernard M. Gordon Prize was started in 2001 by the NAE. It is named after Bernard Marshall Gordon, the founder of Analogic Corporation. Its purpose is to recognize leaders in academia for the development of new educational approaches to engineering. Each year, the Gordon Prize awards $500,000 to the grantee, of which the recipient may personally use $250,000, and his or her institution receives $250,000 for the ongoing support of academic development.
The Fritz J. and Dolores H. Russ Prize is an American national and international award established by the NAE in October 1999 in Athens, Ohio. The prize has been given biennially in odd years since 2001. Named after Fritz Russ, the founder of Systems Research Laboratories, and his wife Dolores Russ, it recognizes a bioengineering achievement that "has had a significant impact on society and has contributed to the advancement of the human condition through widespread use." The award was instigated at the request of Ohio University to honor Fritz Russ, one of its alumni.
The NAE annually awards the Charles Stark Draper Prize, which is given for the advancement of engineering and the education of the public about engineering. The recipient receives $500,000. The prize is named for Charles S. Draper, the "father of inertial navigation", an MIT professor and founder of the Draper Laboratory.
^ a b c d e f g h i j k l m n o p q r s t u v w x y z aa Rexmond, Cochrane (1978). The National Academy of Sciences: The First Hundred Years, 1863-1963. NAP. pp. 209–211. ISBN 0-309-02518-4.
^ Cochrane (1978), citing George Ellery Hale, "National Academies and the Progress of Research. III. The Future of the National Academy of Sciences," Science 40:907-919 (December 15, 1914); 41:12-25 (January I, 1915). Hale's complete study was published as National Academies and the Progress of Research (Lancaster, Pennsylvania: New Era Printing Co., n.d.).
^ a b c Pursell, Carroll. "Engineering Organization and the Scientist in World War I: The Search for National Service and Recognition." Prometheus 24.3 (2006): 257-268.
^ "Executive Orders". 15 August 2016. Retrieved 27 September 2018.
^ A Chronicle of Public Laws Calling for Action by the National Academy of Sciences, National Academy of Engineering, Institute of Medicine, [and] National Research Council. Washington, DC: National Academies. 1985. p. xiii. NAP:11820. Retrieved 22 March 2014. .
^ William Henry Welch NAS.
^ a b c d e f "ENGINEER COUNCIL TO JOIN SCIENTISTS". New York Times. 1963. Retrieved 2017-11-02.
^ "Unit Formed to Aid NASA". New York Times. 1967. Retrieved 2017-11-02.
^ "PORT AUTHORITY DROPS BAY PLAN". New York Times. 1971. Retrieved 2017-11-02.
^ "ENGINEERS' GROUP ADDS 86 MEMBERS". New York Times. 1975. Retrieved 2017-11-02.
^ "Academy of Engineers Says U.S. Should Welcome Foreign Investors". New York Times. 1990. Retrieved 2017-11-02.
^ "THE SHUTTLE FINDINGS: HARSH CRITICISM AND THE REACTIONS". New York Times. 1986. Retrieved 2017-11-02.
^ "U.S. PLANS TO PICK SITE FOR ATOM SMASHER IN 1989". New York Times. 1989. Retrieved 2017-11-02.
^ "Scientists and Engineers Need Broader Training, Report Says". New York Times. 1995. Retrieved 2017-11-02.
^ National Academy of Engineering (NAE). (2004).The engineer of2020: Visions of engineering in the new century, National Academies,Washington, DC.
^ National Academy of Engineering (NAE). (2005). "Educating the engineer of 2020: Adapting engineering education to the new century." National Academies, Washington, DC, 192.
^ a b Becoming a Member, NAE website.
^ About NAE, National Academy of Engineering.
^ a b c d e Goodwin, Irwin. "Engineers proclaim top achievements of 20th century, but neglect attributing feats to roots in physics." Physics Today 53.5 (2000): 48-49.
^ "A Century of Innovation: Twenty Engineering Achievements that Transformed our Lives". National Academies Press. Retrieved 2010-09-26.
^ a b "Greatest Engineering Achievements of the Twentieth Century". National Academy of Engineering. Retrieved 2010-09-26.
^ Macfarlane, Daniel. "Caught between Two Fires." International Journal, vol. 67, no. 2, 2012, pp. 465-482, ProQuest Central; Research Library.
^ a b c d e Petroski, Henry. "Great Achievements & Grand Challenges." Civil Engineering Magazine Archive 80.2 (2010): 48-57.
^ a b c d e f Workshop on developing a national network of Grand Challenge Scholars Programs, 2010, National Academy of Engineering, Washington, DC. Accessed at on November 3, 2017.
^ Olson, Steve. Grand Challenges for Engineering: Imperatives, Prospects, and Priorities: Summary of a Forum. National Academies Press, 2016.
^ O'Leary, Maureen. "Grand Challenges for Engineering." The National Academies in Focus, vol. 8, no. 1, 2008, pp. 20-21, ABI/INFORM Collection; ProQuest Central.
^ a b c d Front Matter." National Academy of Engineering. 2016. Grand Challenges for Engineering: Imperatives, Prospects, and Priorities: Summary of a Forum. Washington, DC: The National Academies Press. doi: 10.17226/23440.
^ a b c Mitcham, Carl. "The true grand challenge for engineering: Self-knowledge." Issues in Science and Technology 31.1 (2014): 19-22.
^ Fang, Xing, et al. "Environmental impacts on surface water and groundwater for expanding urban water supply capacity using stone quarries." World Environmental and Water Resources Congress 2009: Great Rivers. 2009. Citing McGhee and Steel 1991.
^ a b EbD and the NAE Grand Challenges for Engineering." Technology and Engineering Teacher, vol. 71, no. 6, 2012, pp. 3, Education Database; ProQuest Central.
^ Pearson., Greg. "ITEA Technological Literacy Standards". National Academy of Engineering. National Academy of Engineering. Retrieved 3 November 2017.
^ Regli, William, and Jeff Heisserman. "Report from the Royal Academy of Engineering's Global Grand Challenges Summit." Computer-Aided Design 11.45 (2013): 1485-1487.
^ "Homepage". EngineerGirl. Retrieved 27 September 2018.
^ "CASEE". NAE Website. Retrieved 27 September 2018.
^ "OEC - Home". www.onlineethics.org. Retrieved 27 September 2018.
^ William A. Wulf and George M.C. Fisher "A Makeover for Engineering Education" Issues in Science & Technology Spring 2002 p. 35-39.
^ "GPS, dialysis inventors win top awards". Chicago Tribune. 2003-02-19. Retrieved 2011-01-11.
^ Laura A. Bischoff (2001-01-31). "First Russ Prize to be Awarded". Dayton Daily News. Retrieved 2011-01-11.
^ Rex Graham (2007-01-11). "Y.C. Fung Wins Russ Prize". Medical News Today. Retrieved 2011-01-11.
^ "Leroy Hood wins 2011 Russ Prize". Ohio University. 2011-01-05. Retrieved 2011-01-11.
^ a b "Gordon Prize information". Archived from the original on 2006-12-07. Retrieved 2006-12-12.
^ "Fritz J. and Dolores H. Russ Prize". NAE. Retrieved 2010-12-28.
|
0.99386 |
Does aspartame in diet sodas cause any health hazards?
Question: Is aspartame a real health problem in diet sodas?
Hello sir.Thanks for your query.
Aspartame is one among the most common artificial sweeteners which are used especially in sodas, soft drinks as you rightly mentioned.Expert agencies in the US and elsewhere that have evaluated aspartame have found it safe for use in humans.Research has not found that aspartame use is linked to an increased risk of cancer.
The Food and Drug Administration (FDA) regulates the use of aspartame and other artificial sweeteners in the United States while the European Food Safety Authority (EFSA) assesses the safety of this sweetener in the European Union.Both of them agree that studies done so far have not found such a link.
|
0.999986 |
The Revenge Tragedy in Hamlet Shakespeares very tragic play Hamlet is generally regarded by literary critics as a revenge tragedy. This essay seeks to explain how Hamlet satisfies the requirements of a tragedy. These three revenge plots play a major role in presenting to the audience the theme of revenge through a series of developed plans to trick one another.
Shakespeare first uses the revenge theme to create conflict between Hamlet and Claudius. Hamlet is a revenge play. At this time, Shakespeare wrote Hamlet, this was a very common genre.
It had certain conventions: a villain commits a murder; the son of the murdered man insists revenge; he carries out his duty and pledge, but in so doing destroys himself. This playwithinaplay not only helps Hamlet to judge Claudiuss guilt, but also acts as a spur for his own revenge: it shows him the murder that was done to his father and the murder that could be done to his uncle. Hamlet Essay The act of revenge never fails to accomplish Shakespeares goal of keeping the audience in their seats.
Hamlet, William Shakespeares most well written play carries the theme of revenge or redemption throughout the play. The playwithintheplay serves to emphasize that Hamlet is not the traditional revenge play. The hero, after the Ghost's words have been confirmed, he yet spares Claudius' life because the King is praying. revenge in hamlet Essay Question# 1 In Shakespeares play, Hamlet, the theme of revenge is reoccurring within at least three different characters First and foremost is Hamlet, secondly there is Laertes and the third character being that of Fortinbras.
An author of the essay" The Play within a Play: Hamlet, Prince of Denmark" reports that the ghost demands vengeance, but Hamlet is unsure whether he should believe the ghost and begins to look for ways to prove that what the ghost says is true revenge in hamlet Essay Question# 1 In Shakespeares play, Hamlet, the theme of revenge is reoccurring within at least three different characters. First and foremost is Hamlet, secondly there is Laertes and the third character being that of Fortinbras.
Hamlet Play within a play How is The Mousetrap set? The play presented within Hamlet is actually called The Murder of Gonzago. The plot of it closely resembles the actual murder of Hamlet's father, and the reason that hamlet chooses to have it performed is to trap Claudius into revealing his guilt.
|
0.996446 |
From which region did AI-Idrisi belong?
Which one of the following is a local wind?
At times media is prevented from publishing a story, this is called___________.
Mullah Abdul Ghaffur and Virji Vora owned number of ships.
Our Earth is like an aquarium.
Shopping malls and complexes are found mostly in urban areas.
What were Hanafi and Shafi'i?
These are the two schools of law of the medieval period of Islam.
Why are companies required to show the same advertisements again and again?
Companies show the same advertisements again and again so that people remember them.
Rainfall is very important for the survival of plants and animals. It brings fresh water to the earth's surface.
What do you mean by 'terrace farming'?
Where are RMPs mostly found?
RMPs stands for Registered Medical Practitioners and they are easily available in rural areas.
What Minhaj-i-Siraj thought about Raziyya?
You are an artisan standing on a tiny wooden platform held together by bamboo and rope fifty metres above the ground. You have to place an inscription under the first balcony of the Qutub Minar. How would you do this?
and false decorum of the princely life.
I have left your town.
And yet Rana why have you kept up enmity against me?
Rana you gave me a cup of poison.
Rana I will not be destroyed by you.
And yet Rana why have you kept up?
Why do you think Mirabai left the Rana's palace?
Briefly explain the major features of tropical evergreen forests.
What is the Mid-day Meal Programme? Can you list three benefits of the programme? How do you think this programme might help promote greater equality?
What is the difference between the work that MLAs do in the assembly and the work done by government departments?
Where do you think large farmers would sell their cotton? How is their situation different from Swapna?
Enlist the causes why media is not said to be independent?
Answer the question based on the extracts given below.
The boys' school had no such courtyard and our playground was just a big space attached to the school. Every evening, once school was over, the boys watched as hundreds of school girls crowded the narrow streets. As these girls walked on the streets, they looked so purposeful.
This was unlike the boys who used the streets as a place to stand around idling, to play, to try out tricks with their bicycles. For the girls, the street was simply a place to get straight home. The girls always went in groups, perhaps because they also carried fears of being teased or attacked.
(a) 'The boys' school had no such courtyard". Which courtyard is being talked about?
(b) For what purpose did the boys use the street?
What is a chain of market? Do you think that everyone gains equally in the market?
Enlist the major features of the tribal societies.
Interpret and compare the two above figures and answer the question Gates are opened and closed during which situation?
|
0.999687 |
Glaciers, ice sheets and ice caps cover around 11% of the earth’s land surface. At least 50% of the beds of these ice masses have temperatures at melting point due to the high pressure beneath the weight of the ice masses (Oswald and Gogineni, 2012). Liquid water is therefore present at the ice-bedrock interface in these areas. Additionally, erosion is a frequent feature of larger ice masses, and involves crushing and fracturing of bedrock. Consequently, recently crushed and wetted rock is a common feature of glacier and ice sheet beds. The adage that “where there is water, there is life” holds true for all glacier beds sampled to date, and for the only subglacial lake directly sampled beneath Antarctica, Subglacial Lake Whillans. Still, there is a large spectrum of different aquatic subglacial habitats beneath glaciers and ice sheets. The subglacial environments host genetically and functionally diverse microbial ecosystems capable of accelerating rock weathering (Montross et al., 2013), influencing global carbon cycles (Wadham et al., 2012) and productivity in adjacent oceans (Death et al., 2014).
How long can life survive beneath large ice masses?
However, the maintenance and longevity of these ecosystems is currently an area of uncertainty. Subglacial debris contains chemicals such as sulphides and organic matter that provide energy to sustain subglacial life (Hamilton et al., 2013). This is particularly important in areas close to the margin where melting water from the surface enters through moulins and crevasses and transports O2 and other biologically useful compounds such as DOC (dissolved organic carbon), POC (particulate organic carbon) and nutrients (such as Nitrogen and Phosphorus) to the bed. However, in the interior zones of ice sheets, the direct input of these species to the bed is negligible because hydrological connections between surface and bed do not exist. The O2 that is added to the bed in these locations is limited to gas bubbles in the basal ice which is geothermally melted or melts as regelation waters form and refreeze as ice flows around irregularities of the bedrock . This is problematic for the longer term maintenance of life in subglacial lakes and other aquatic environments beneath the ice sheet interiors, such as swamps and ice stream beds, because there is a lack of dissolved oxygen, and there is little energy derived from oxidants interacting with organic matter and sulphides. Further, the supply of potentially reactive organic matter, for example within former marine sediments, is finite and decreases over time, Therefore, subglacial life beneath ice sheet interiors is destined to expire unless new and sustainable sources of energy can be generated at the bed.
Hydrogen seems to be the miraculous diet!
A major advance in our understanding of the maintenance of life in subglacial environments was the recent discovery that H2 is produced by subglacial crushing. This is an important energy source for microbial food chains, because physical energy is transferred, via surface chemical (free-radical) energy, to biological activity and energy. Experiments show that around 10-20 nmol H2 is produced per gram of crushed rock after 120 hours (Telling et al., 2015). Even if they sound very small, these concentrations are significant since only sub-nanomolar concentrations of H2 are required to sustain microbial growth near 0°C (Hoehler, 2004). Hydrogen is utilized by many types of microbes, and is generated abiotically via the interaction of silica surface radicals with water.
Next time you look at an otherwise dull grey meltwater stream draining a glacier, think of the crushing and the hydrogen that has been liberated by glacier erosion. The grey coloration arises from suspended sediment concentrations of about 1kg/m3 of meltwaters, and the sediment is typically silt- to clay-sized [Credit: Martyn Tranter].
Production of H2 supports the base of microbial food webs in fault and hydrothermal zones. Therefore, it is no stretch to suppose that this could be the case beneath glaciers. The H2 production rate from experimental rock crushing exceeds that required to support measured rates of methane production in the upper centimetre of South Western Greenland subglacial sediments. Additionally, rates of methane production in these subglacial sediments increased 10 times with the addition of excess H2 at 1°C (Stibal et al., 2012). A range of aerobic and anaerobic bacteria thought to be capable of oxidizing H2 as a source of energy have been found in subglacial sediments. Adding H2 to subglacial sediments from Robertson Glacier provided compelling evidence that the non-biological H2 produced during rock crushing could provide the sustain H2-oxidizing microbes (Telling et al., 2015).
Subglacial Lake Whillans is the first Antarctic subglacial lake to be sampled via a direct access hole. Water and sediment from the lake contain microbial life (Christner et al., 2013). Examination and experimentation on these unique samples is currently ongoing at the University of Bristol, where we hope to show that even already heavily weathered sediment produces hydrogen and supports microbial ecosystems when crushed and wetted. Subglacial microbes really do have a crush on glacier erosion, but don’t say it with chocolate or flowers, say it with hydrogen.
Martyn Tranter is a polar biogeochemist, resident at the Bristol Glaciology Centre, University of Bristol, UK. Contact Email: [email protected].
Fig. 1: Schematic representation of major changes in the Arctic regions caused by global warming [Credit: Fig. 1.2 of AMAP (2017), adapted from US National Center for Atmospheric Research (NCAR)].
The Arctic is changing rapidly and nothing indicates a slowdown of these changes in the current context. The Snow, Water, Ice and Permafrost in the Arctic (SWIPA) report published by the Arctic Monitoring and Assessment Program (AMAP) describes the present situation and the future evolution of the Arctic, the local and global implications, and mitigation and adaptation measures. The report is based on research conducted between 2010 and 2016 by an international group of over 90 scientists, experts, and members of Arctic indigenous communities. As such, the SWIPA report is an IPCC-like assessment focussing on the Arctic. Our Image of the Week summarizes the main changes currently happening in the Arctic regions.
What is happening to Arctic climate currently?
The SWIPA report confirms that the Arctic is warming much faster than the rest of the world, i.e. more than twice the global average for the past 50 years (Fig. 2). For example, Arctic surface air temperature in January 2016 was 5°C higher than the average over 1981-2010. This Arctic amplification is due to a variety of climate feedbacks, which amplify the current warming beyond the effects caused by increasing greenhouse gas concentrations alone (see the SWIPA report, Pithan & Mauritsen (2014) and this previous post for further information).
Fig.2: Anomaly of Arctic and global annual surface air temperatures relative to 1981-2010 [Credit: Fig. 2.2 of AMAP (2017), revised from NOAA (2015)].
This fast Arctic warming has led to the decline of the ice cover over both the Arctic Ocean (sea ice) and land (Greenland Ice Sheet and Arctic glaciers).
For sea ice, not only the extent has dramatically decreased over the past decades (see Stroeve et al. 2012 and Fig. 3), but also the thickness (see Lindsay & Schweiger, 2015). Most Arctic sea ice is now first-year ice, which means that it grows in autumn-winter and melts completely during the following spring-summer. In contrast, the multiyear sea-ice cover, which is ice that has survived several summers, is rapidly disappearing.
Fig. 3: Arctic sea-ice extent in March and September from the National Snow and Ice Data Center (NSIDC) and the Ocean and Sea Ice Satellite Application Facility (OSI SAF) [Credit: Fig. 5.1 of AMAP (2017)].
In terms of land ice, the ice loss from the Greenland Ice Sheet and Arctic glaciers has been accelerating in the recent decades, contributing a third of the observed global sea-level rise. Another third comes from ocean thermal expansion, and the remainder comes from the Antarctic Ice Sheet, other glaciers around the world, and terrestrial storage (Fig. 4, see also this previous post and Chapter 13 of the last IPCC report).
Fig. 4: Global sea-level rise contribution from the Arctic components (left bar), Antarctic Ice Sheet and other glaciers (middle-left bar), terrestrial storage (middle-right bar) and ocean thermal expansion (right bar) [Credit: Fig. 9.3 of AMAP (2017)].
Besides contributing to rising sea levels, land-ice loss releases freshwater into the Arctic Ocean. Compared with the 1980-2000 average, the freshwater volume in the upper layers of the Arctic Ocean has increased by more than 11%. This could potentially affect the ocean circulation in the North Atlantic through changes in salinity (see this previous post).
Other changes currently occurring in the Arctic include the decreasing snow cover, thawing permafrost, and ecosystem modifications (e.g. occurrence of algal blooms, species migrations, changing vegetation, and coastal erosion). You can have a look at the main Arctic changes in our Image of the Week.
The SWIPA report highlights that the warming trends in the Arctic will continue, even if drastic greenhouse gas emission cuts are achieved in the near future. For example, mean Arctic autumn and winter temperatures will increase by about 4°C in 2040 compared to the average over 1981-2005 according to model projections (Fig. 5, right panel). This corresponds to twice the increase in projected temperature for the Northern Hemisphere (Fig. 5, left panel).
Fig. 5: Autumn-winter (NDJFM) temperature changes for the Northern Hemisphere (left) and the Arctic only (right) based on 36 global climate models, relative to 1981-2005, for two emission scenarios [Credit: Fig. 2.15 of AMAP (2017)].
The Arctic Ocean could be ice-free in summer by the late 2030s based on extrapolated observation data. This is much earlier than projected by global climate models.
Permafrost extent is projected to decrease substantially during the 21st Century. This would release large amounts of methane in the atmosphere, which is a much more powerful greenhouse gas than carbon dioxide.
Mean precipitation and daily precipitation extremes will increase in a warming Arctic.
Global sea level will continue to rise due to melting from ice sheets and glaciers, ocean thermal expansion, and changes in terrestrial storage. However, uncertainties remain regarding the magnitude of the changes, which is linked to the different emission scenarios and the type of model used.
A potential economic benefit to the loss of Arctic sea ice, especially in summer, is the creation of new shipping routes and access to untapped oil and gas resources. However, besides this short-term positive aspect of Arctic changes, many socio-economic and environmental drawbacks exist.
The number of hazards has been rising due to Arctic changes, including coastal flooding and erosion, damage to buildings, risks of avalanches and floods from rapid Arctic glacier melting, wildfires, and landslides related to thawing permafrost. Furthermore, Arctic changes (especially sea-ice loss) may also impact the climate at mid-latitudes, although many uncertainties exist regarding these possible links (see Cohen et al., 2014).
Mitigating climate change by decreasing greenhouse gas emissions. Implementing the Paris Agreement would allow stabilizing the Arctic temperatures at 5-9°C above the 1986-2005 average in the latter half of this century. This would also reduce the associated changes identified on our Image of the Week. However, it is recognized that even if we implement the Paris Agreement, the Arctic environment of 2100 would be substantially different than that of today.
Adapting to impacts caused by Arctic changes.
Advancing our understanding of Arctic changes through international collaboration, exchange of knowledge between scientists and the general public, and engagement with stakeholders.
Raising public awareness by sharing information about Arctic changes.
AMAP (2017). Snow, Water, Ice and Permafrost in the Arctic (SWIPA) 2017. Arctic Monitoring and Assessment Programme (AMAP), Oslo, Norway. xiv + 269 pp.
Gloriously cloudless day for the fieldtrip to the Ötztal Alps [Credit: C. Reijmer].
Glaciologists often undertake fieldwork in remote and difficult to access locations, which perhaps explains why they happily travel to similar locations to attend meetings and workshops. The Karthaus Summer School, which focuses on Ice Sheets and Glaciers in the Climate System, is no exception. The idyllic village of Karthaus, located in the narrow Schnalstal valley in Südtirol (Italy), has been hosting this 10-day glaciology course nearly every year since 1995. In September, an international crowd of some 30+ PhD students and postdocs, and 11 lecturers assembled in Karthaus for the 2017 edition of this famous course, for an intensive program of lectures, food, some science, more food (with wine!), and lots of socialising.
The lecture theatre with a backdrop of green hills, on the day the cows came down from the hills [Credit: D. Medrzycka].
A typical morning of the course involved four hours of lectures, which covered a wide range of topics including continuum mechanics, thermodynamics, ice-ocean interactions, ice cores, geophysics, and geodynamics, with a special focus on numerical modelling and its applications for investigating ice-climate interactions. The lectures covered fundamentals processes, their applications and limitations, and current knowledge gaps for a wide range of complex concepts related to ice dynamics. All our lecturers happily answered our (many) additional questions during the coffee and cake breaks, enjoyed in the fresh mountain air outside the lecture theatre.
The biggest challenge was not the group work itself, but trying to not get distracted by the sun and the hills surrounding us [Credit: V. Zorzut].
After a three-course lunch, we spent the afternoon sessions applying the theory learned in the morning lectures. The group projects were designed to get us to go into more detail on certain topics, and work on real-world applications for specific research problems. We presented the results of our work at the end of the course during a 15 minute group presentation. For those who could afford a bit of free time after these sessions, the rest of the afternoon could be spent either hiking or trail running in the steep hills overlooking the village (trying to beat I. Hewitt’s time up Kruezspitze), playing football, chilling in the sauna, or catching up on some sleep before dinner.
Everyone who has ever attended the Karthaus course mentions the food, complementing both the quality and (legendary) quantity of it. Every evening, we were served a memorable five course meal accompanied by generous amounts of local wine. Dessert was followed by musical entertainment, with inspired performances by Frank Pattyn on the piano. On the last evening, Frank was accompanied by Johannes Oerlemans who treated us to two of his original tango arrangements on the guitar, followed by a passionate rendition of Jacques Brel’s Le port d’Amsterdam by our own Kevin Bulthuis (vocals). We wrapped up each day of the course in the local bar, socialising, playing card games, sampling the local beers, and making our way through the many different flavours of schnaps and grappa. Big thanks to the owners, Paul and Stefania Grüner, and staff (with a special shout-out to Hannes) of the Goldene Rose Hotel, and the village of Karthaus, for taking great care of us!
Frank Pattyn (piano) and Johannes Oerlemans (guitar) performing an original tango arrangement [Credit: D. Medrzycka].
On the penultimate day of the course the group headed to a number of glaciers in the Ötztal Alps. The excursion, which happened to take place on a perfectly cloudless day, gave us the opportunity to observe first hand the changes affecting glaciers in the region, and the impact of these retreating ice masses on the landscape and humans inhabiting it. It also provided a much needed break from the intense week! After walking down the ski slopes of the Hochjochferner, a small valley glacier accessible by cable car from Kurzras, we stopped to enjoy the sun and have lunch at the Schöne Aussicht (Bellavista) hut (2845 m a.s.l.). Those with more energy scrambled up to the ridge running along the Italian/Austrian border (3270 m a.s.l.), through at times knee-deep snow, to take a peak at the Hintereisferner, a valley glacier on the Austrian side of the border. Four of us continued on along the ridge, and by chance visited the laser scanner (LiDAR) system operated by researchers from the University of Innsbruck, used to monitor changes in surface elevation on the glacier.
Standing on the ridge running along the Italian/Austrian border. View onto the Hintereisferner [Credit: D. Medrzycka].
The 10 day course was certainly an intensive (and intense) experience, and I would recommend it to all glaciology students without reservations, whether they are looking for a basic introduction to ice dynamics, or aiming to fill a few knowledge gaps. Whilst some of the topics covered in the course were only remotely related to my own PhD research (and far out of my comfort zone!), the lectures and project work forced me to think in alternate ways. Although I may have finished the course with more questions than I had at the start, I now know where to go look for the answers!
A big part of the experience was without a doubt the social aspect of the course. Between the never ending and excellent food (as a result of which some of us developed “food babies”), and the long evenings at the local bar (resulting in increasing amounts of sleep deprivation), there were plenty of opportunities to talk science, gain new insights into our ongoing research, and discuss ideas for future projects. As with all great Summer Schools, one of the major perks was the opportunity to hang out with fellow students, expand our network of fellow researchers, and establish the groundwork for continued professional collaborations. Huge thanks to the convenor, Johannes Oerlemans, the village of Karthaus, and all the lecturers and fellow students for a memorable 10 days! I am looking forward to working with all of you in the future.
The crowd of the Karthaus summerschool: 2017 edition [Credit: C. Reijmer].
Dorota Medrzycka is a PhD candidate at the University of Ottawa (Canada), working with Luke Copland. Her research focuses on the dynamics of glaciers and ice caps in the Canadian High Arctic, with a focus on ice flow instabilities (including glacier surging). Her project combines field studies and remote sensing techniques to monitor ice motion, and gain insight into the factors controlling the variability in ice dynamics in the Canadian Arctic. Contact: [email protected].
Our image of the week shows the area around the calving front of Petermann Glacier through the spring, summer, and autumn of 2016. Petermann Glacier, in northern Greenland, is one of the largest glaciers of the Greenland Ice Sheet. It terminates in the huge Petermann Fjord, more than 10 km wide, surrounded by 1000 m cliffs and plunging to more than 1100 m below sea level at its deepest point. In 2010 and 2012, the glacier caught the world’s attention with two large events, which caused the glacier to retreat to a historically unprecedented position.
In Fig. 1 we see the changes happening through the season on Petermann glacier – and they are huge. The animated map highlights many different processes. As areas emerge from the Polar night at the start of spring, the shadows quickly shorten and the light levels become noticeably higher. This is followed by the melting of the snow, first on south-facing slopes, and eventually to on the high-elevation areas in the mountains. As the sun returns, meltwater starts forming on the surface of the glacier, this is visible as vast turquoise lakes. Finally, the sea ice in the fjord succumbs to the seasonal warming of the ocean and atmosphere, it thins, and then completely disintegrates at around day 205.
The change in the glacier is perhaps the most interesting phenomenon. It is possible to observe the glacier flowing and advancing into the fjord. In addition, several large rifts near the front open through the course of the year. These will eventually spread across the front of the glacier and a new, huge iceberg will be born. These rifts are being closely monitored, and it is likely that when the iceberg calves it will bring cause Petermann Glacier to retreat to a new historical minimum.
The image above is an example of a new type of map, it takes cartography into the 4th dimension—time. Technological advances have only recently made it possible to create a map like this; with the launch of Landsat 8 and Sentinel-2 it is now possible to receive regular, high-resolution, and free satellite images of high latitude areas. These data have been projected onto a new, high quality digital elevation model (Howat et al., 2013) to create this map.
Image of the week – Learning from our past!
Figure 1: Peak global mean temperature, atmospheric CO2, maximum global mean sea level (GMSL) and source(s) of meltwater over the past 3 million years. The light blue area on each bar indicates the uncertainty associated with the maximum global mean sea level , and the pie charts denote the fraction (not location) of ice retreat in Greenland and Antarctica [Credit: Dutton et al. (2015)].
Understanding the climate evolution of our planet is not an easy task, but it is essential to understand the past if we are to predict the future! Historic climate cycles provide us with a glimpse into a period of time when the Earth was warmer than it was today. Our image of the week looks at these warmer periods of time to see what they can tell us about the future! For example, during the Pliocene, the global mean sea level was greater than 6 m higher than it is today… so what can these historic records tell us about the future of the ice sheets and their contribution to sea-level rise?
We will work forward in time from 3 million years ago to present-day and examine the evidence we have about the past climate of Earth. In this time period there have been cycles of warm and cool climate (glacials and interglacials – see our previous post). Here we will examine those interglacial periods where the climate was warmer than the preindustrial period (before 1750).
Approximately 3 million years ago during the mid-Pliocene period, the earth experienced climate cycles every 41,000 years, and the atmospheric CO2 ranged from 350 to 450 ppm compared to around 400 ppm today and 250 ppm preindustrial. During the Pliocene period, peak global mean temperatures were on average 1.9ºC to 3.6ºC warmer than preindustrial temperatures. Ice sheet modelers have used these changes in climatic conditions to estimate the retreat of the Antarctic and Greenland ice sheets, which predicted the global mean sea level to rise ~6 and ~7 m, respectively (see our Image of the Week). Others have used geochemical methods to reconstruct historic sea level, which suggest that the global mean sea-level rise was 21 ± 10 m! While these studies provide great reason to be alarmed, they are unfortunately plagued with uncertainty that makes it challenging to provide any robust estimates of future sea-level rise based on the Pliocene period. Fortunately, more data is available from time periods closer to the present.
Approximately 400,000 years ago, the earth experienced an unusually long period of warming, where the global mean temperature was estimated to be 1-2ºC warmer than preindustrial levels (see our Image of the Week). This period is known as MIS 11. Historic records such as pollen records, biomolecules, and ice-rafted debris suggest that the Greenland ice sheet severely retreated to the extent that forests developed on Southern Greenland! Ice sheet modelers estimate that this retreat in Greenland could have contributed 4.5 – 6 m to the global mean sea level rise. Paleoshoreline reconstruction at sites across the globe suggests that that the global mean sea level rise was ~6 – 13 m, which supports the large retreat experienced by the Greenland ice sheet and suggests that the Antarctic ice sheet likely experienced significant retreat as well if those higher estimates of sea level rise (~13 m) occurred.
Approximately 125,000 years ago, the earth experienced a period of warming approximately 1ºC warmer than preindustrial levels, known as MIS 5e. This warmer period has significantly more data available compared to the other time periods. It is often the case that more recent times have more abundant data and in this caseshorelines that developed during MIS 5e provide an excellent record of global mean sea level being an estimated 6 – 9 m higher than present.
Modeling studies suggest that at this time 0.6 – 3.5 m of sea level rise can be attributed to the retreat of the Greenland ice sheet and ~1 m can be attributed to thermal expansion and the melt of mountain glaciers (see Figure 2). Therefore, despite a lack of mass loss records of the Antarctic ice sheet at this time , it is likely that it underwent considerable retreat to enable contributing to the additional sea level rise.
Figure 2: Compilation of MIS 5e reconstructions for peak GMSL, the Greenland ice sheet contribution, and bets estimate of the total sea level budget [Credit: Dutton et al. (2015)].
The further back in time, the larger the sources of uncertainty. Hence, there is fairly limited data regarding the Pliocene that may be used to help predict future conditions. Additionally, it’s important to remember that the climatic cycles in the Earth’s history resulted largely from changes in the Earth’s orbit. This is why the CO2 level associated with MIS 5e and 11 are similar to preindustrial levels, and yet these periods experienced significant increases in global mean temperature accompanied by rises in the global mean sea-level.
what we do know from the past is that both ice sheets experienced significant mass loss during these warm periods that directly impacted sea-level rise.
Today, the CO2 concentrations are around 407 ppm and the peak global mean temperature is approximately 1ºC warmer than preindustrial times (see the Image of the Week). For reference, the Paris Climate Accord is trying to bring our world leaders together to keep the peak global mean temperatures lower than 2ºC above pre-industrial levels. While the cause of the warming periods might be different, what we do know from the past is that both ice sheets experienced significant mass loss during these warm periods that directly impacted sea-level rise. Therefore, it’s very important to monitor and improve our future projections of mass loss from these ice sheets in order to better understand how sea-level rise will affect us.
Image of The Week – The Pulsating Ice Sheet!
During the last glacial period (~110,000-12,500 years ago) the Laurentide Ice Sheet (North America) experienced rapid, episodic, mass loss events – known as Heinrich events. These events are particularly curious as they occurred during the colder portions of the last glacial period, when we would intuitively expect large-scale mass loss during warmer times. In order to understand mass loss mechanisms from present-day ice sheets we need to understand what happened in the past. So, how can we better explain Heinrich events?
During a Heinrich event large swarms of icebergs were discharged from the Laurentide Ice Sheet into the Hudson Strait and eventually into the North Atlantic Ocean. This addition of fresh water to the oceans caused a rise in sea level and a change in ocean currents and therefore climate.
We know about these events by studying glacial debris that was transported from the ice sheet into the oceans by the icebergs and eventually deposited on the ocean floor. From studying ocean-sediment records we know that Heinrich events occurred episodically during the last glacial period but not on at a regular intervals. Interestingly, when compared to temperature records from Greenland ice cores, it can be seen that the timing of Heinrich events coincides with the cold phases of Dansgaard–Oeschger (DO) cycles – rapid temperature fluctuations which occurred during the last glacial period (see our previous post).
What do we think causes them?
a) Ice sheet at it’s full extent, grounded on a sill (raised portion of the bed, at the mouth of the Hudson Strait). Notice the sill is around 300m below sea level at this time.
b) A pulse of sub-surface water (purple) warms by a few degrees, encouraging iceberg calving at the glacier front and causing the ice begin to retreat from the sill.
c) As the ice retreats, it becomes unstable due to an inwards sloping bed (see our previous post on MISI). This leads to sudden rapid retreat of the ice – characteristic of Heinrich events.
d) Due to ice loss and thus less mass depressing the bed, the bed will slowly rise (Glacial Isostatic Adjustment), eventually the sill has risen to a level which cuts off the warmer water from the ice front and the ice can slowly advance again.
Once the ice has advanced back to it’s maximum extent (a) it will slowly depress the bed again, allowing deeper, warmer water to reach the ice front and the whole cycle repeats!
The authors of this study used this model to simulate Heinrich events over the last glacial period and were able to accurately predict the timing of Heinrich events, as known from ocean sediment records. Check out this video to see the model in action!!
This study shows that the proposed mechanism probably controlled the onset of rapid mass-loss Heinrich events in the past and more generally that such mechanisms can cause the rapid retreat of marine terminating glaciers. This is important as it adds to our understanding of the stability (or instability) of present day marine terminating glaciers – such as the West Antarctic Ice Sheet! If such rapid mass loss happened regularly in the past we need to know if and how it might happen in the future!
such mechanisms can cause the rapid retreat of marine terminating glaciers.
|
0.941307 |
If you were a miner, what are the steps you would take to create the extra (21,000,012.5th) bitcoin?
Where in the source code is this exactly (link)?
Why can't this be done by a non-miner?
Also, which forks are/were vulnerable?
There are two components to CVE-2018-17144. There is a crash bug and an inflation bug. Both are triggered by almost the same scenario: a transaction contains an input multiple times.
In general, how this would work is as follows: lets suppose a miner has an unspent output A for 1 BTC. They create a transaction with that input in twice, so input 1 spends from output A and input 2 also spends from output A. The output of that transaction has a value of 2 BTC. Note how the output's value is larger than the value of output A, but if you had output A twice, the value is correct.
The miner would then take this transaction and include it in a block that he is mining. Once the miner find a block with his transaction included in it, he broadcasts it to the Bitcoin network.
When a Bitcoin Core 0.14.x node receives this block, it will validate the block, but it will skip the duplicate input check because of the false parameter on this line. So the transaction the miner made will pass this step of validation, and the other transaction validation steps, including input script validation, until it reaches this loop. In this loop, the inputs to the transaction are being marked as spent in the UTXO database. The first time the duplicated input is seen, it is marked as spent. But the second time it is seen, the coin is already marked as spent so coins->vout[nPos].IsNull() will be true. This means that it will go into this if statement and subsequently hit the assert statement that follows. The assert causes the software to crash.
For Bitcoin Core 0.15.0 - 0.16.2, the behavior is different. This is due to the change in how the UTXO database is structured. Everything is largely the same until the same loop is reached. Here, instead of returning whether the output was spent, SpendCoin actually returns whether the input exists in the database. So the first time, it will pass as expected, but the second time, instead of returning false, it still returns true.
Looking at SpendCoin, you can see that it only returns false when it is unable to fetch the coin (object representing a UTXO) from the database. With the new database structure, this makes sense as the output should be removed from the database when it is spent. But, if you look a few lines down, you see that it only deletes the coin when it is marked as FRESH. In the case the coin was FRESH, SpendCoin would delete the object on the first pass so the second pass the coin would not be found and thus it would return false. This triggers the assert following the function call causing the node to shutdown.
If the coin was not FRESH, the coin object itself is not deleted, but its contents are cleared. This means that the second time the input is seen, if the coin was not FRESH, SpendCoin would still return true as the object still exists in memory, which means that it passes the assert that follows the SpendCoin (which caused the crash when the coin was not FRESH). Then validation continues as normal, and the output this transaction created is added to the UTXO database, which means that money that shouldn't exist now exists in the UTXO database.
So now the question is, when are UTXOs marked as FRESH? They are marked FRESH when they are added to the UTXO database. But the UTXO database is still only in memory (as a cache). When it is saved to disk, the entries in memory are then no longer marked as FRESH. This saving to disk happens after every block (as well as at other times, but that is not important).
Thus, if a miner has an output that was part of a transaction that has already confirmed, and he spends the output twice in the same transaction (so the transaction has two inputs that refer to the same output), and this transaction is not broadcast to the network but instead included in a block that he mines, he is able to create a new output that has twice the value of the output that he spent, thereby creating coins.
The reason that this cannot be done by a non-miner is because transactions that are received outside of blocks are still checked for duplicate inputs. The transaction will be rejected as invalid and not added to the node's mempool, so the transaction will never get into a block. It is only transactions with duplicate inputs that get into blocks that trigger this vulnerability, and thus only miners can do this as they must knowingly insert an invalid transaction into their block.
Any fork whose software includes commit eecffe50efc3944d713c701fa375dacbf17fb7cf. This would mean any software forked from or pulled in changes from Bitcoin Core after November 10th, 2016.
Not the answer you're looking for? Browse other questions tagged reward-schedule error weaknesses source-code or ask your own question.
|
0.938092 |
A decimal point is a small dot used in writing a decimal fraction or a mixed number.
Notice that in a decimal fraction, 0 is usually placed before the decimal point.
In a mixed number, the decimal point separates the whole number part from the fractional part.
In a decimal fraction, we don't read the zero on the left of the decimal point.
In a mixed number, the decimal point is read as "and" and we do read the number on the left of the decimal point.
In money, the decimal point is used to separate dollars and cents.
$5.64 is read as five dollars and sixty-four cents.
|
0.955731 |
Blowout Sale! Up to 75% off on Philosophy at Translate This Website. Top brands include imusti, Brand: Northwestern University Press, CreateSpace Independent Publishing Platform, Xlibris, The MIT Press, Oxford University Press, Rowman Littlefield Publishers, Camden House, Penguin, Brand: State University of New York Press, Cambridge University Press, Brilliance Audio, Blackwell Publishers, SUNY Press, Brand: Univ Of Minnesota Press, Routledge, Cosimo Classics, & Vintage Books. Hurry! Limited time offers. Offers valid only while supplies last.
|
0.955627 |
In the presidential election of 2008, the Democratic ticket of Senator Barack Obama of Illinois and Senator Joseph Biden of Delaware defeated the Republican nominees Senator John McCain of Arizona and Governor Sarah Palin of Alaska. Obama became the first African American to be elected president and the first to receive a major party's nomination for the presidency.
Early in the election year, the debate on issues initially focused on the merits of continuing the ongoing war in Iraq conducted by the incumbent administration of George W. Bush, but later turned during the fall general election campaign to the sudden financial crisis, which was signaled most dramatically by the collapse in mid-September of Lehman Brothers, one of Wall Street's most prominent investment firms. In the wake of the financial disruptions, concerns over the future of the economy, which would show the first signs of a steep recession before the November election, would come to dominate the election. The campaign also was interrupted as the Congress dealt with hastily-drafted proposals by the Bush administration to alleviate the risk of failure of the nation's largest banks and other financial firms.
Senator McCain secured the Republican nomination after a series of primary elections which at various points included former New York City Mayor Rudolph Giuliani, a front-runner in early polls; former Tennessee Senator Fred Thompson; Arkansas Governor Mike Huckabee; former Massachusetts Governor Mitt Romney; and Texas Congressman Ron Paul. McCain overcame early problems in the organization of his campaign to win key victories in the primaries in New Hampshire, South Carolina, Florida and Texas. At the Republican Convention, he was nominated on the first ballot and surprisingly selected Governor Palin, who had served as governor for only two years, as his running mate.
As the Democratic primary season commenced, Senator Hillary Clinton of New York was widely viewed as the front-runner for the nomination. In the Iowa caucuses, however, Obama won an unexpected victory, aided by many young campaign workers. Obama effectively contrasted his theme of 'change' with that of 'experience' emphasized by the Clinton supporters during a time in which polls reported significant public disapproval with the current direction of the country. Obama also stressed his vote in the Senate against continuation of the war in Iraq, one of the few differences in policy between the two candidates. Mrs. Clinton was able to recover from her Iowa loss with an upset win over Obama in New Hampshire, but by June Obama had obtained primary wins and commitments from delegates to assure his nomination.
The general election campaign, similar to that of the Democratic contest for the nomination, also focused on the choice between change offered by Obama, as a first-term senator, and the experience of McCain, the popular war hero and veteran senator. McCain's support of the Iraq war also became a key point of attack by the Democrats. Both candidates proposed reforms of the health care system, with McCain backing a market-based approach to reduce existing costs while Obama pledging to extend coverage to those lacking public or private health insurance. Early in the campaign, McCain appeared out of touch with most voters by responding to a question about how many homes he and his wife owned by saying that was unsure of the number and would need to have his staff reply later to the inquiry. McCain's choice of Governor Palin as his running mate, viewed by analysts as an effort to change the likely course of the campaign, also increasingly became criticized as she made statements indicating a lack of knowledge of foreign policy and other issues.
On September 15, the day on which Lehman Brothers filed for bankruptcy, McCain also declared that "the fundamentals of our economy are strong," while he conceded evidence of "tremendous turmoil in our financial markets and Wall Street." The shadow of the economic crisis would continue to undermine the Republican campaign, with both McCain and Obama interrupting their schedules to return to Washington to vote in support of the $700 billion bailout package for the financial industry. The sudden disruption of the economy, coupled with the drop in stock prices, real estate values and uncertainty over job security, would continue to plague the McCain campaign.
Obama and Biden won a comfortable victory over McCain and Palin, securing 53% of the popular vote to 46% for the Republicans and 365 electoral votes to 173 for McCain and Palin. The Democrats received the largest percentage of the popular vote for their party since the landslide election of the ticket of Lyndon Johnson and Hubert Humphrey in 1964.
|
0.999984 |
How to Use rsync to Backup Your Data on LinuxHow to Backup Linux? 15 rsync Command Examples Installation # Ubuntu sudo apt-get install rsync # CentOs yum install rsync Backup (내부 백업) # Directory1 에서 Directory2로 백업 rsync -av --delete /Directory1/ /Directory2/ Options -a 재귀 (디렉토리로 반복), 링크 (심볼릭 링크로 심볼릭 링크 복사), perms (사용 권한 유지), 시간 (수정 시간 보존), 그룹 (그룹 보존), 소유자 (소유자 보존), 장치 파일 보존 및 특수 보존 파일. (단 전송시 타임..
How to convert video to animated gif image on Linux sudo apt-get install ffmpeg imageMagick # sudo yum install youtube-dl .... # 프레임 추출, out.gif 으로 병합되어 추출된다. # ffmpeg -t -ss -i out%04d.gif ffmpeg -t 5 -ss 00:00:10 -i funny.mp4 out.gif # 만약 프레임을 추출만 했다면 병합한다. # convert -delay x -loop 0 out*gif convert -delay 1x20 -loop 0 out*.gif animation.gif # GIF 크기 줄이기 convert -layers Optimize animation.gif ..
How to save YouTube videos on Linux sudo apt-get install youtube-dl # sudo yum install youtube-dl .... # 다운로드 youtube-dl https://www.youtube.com/watch?v=ykp8fxHWcVo [youtube] ykp8fxHWcVo: Downloading webpage [youtube] ykp8fxHWcVo: Downloading video info webpage [youtube] ykp8fxHWcVo: Extracting video information [download] Destination: She Has Two Left Feet!-ykp8fxHWcVo.f137.mp4 [download] 100% o..
C10k problem 대규모 TCP / WebSocket 동시 연결 테스트에 대한 기록 ErDoy: [Linux] 시스템 최적화 - 동시사용자 늘리기위한 커널 조정 글자는 읽을 수 있었지만, 실행과 확인을 못 해 봤음. -.- 리눅스는 소켓및 네트워크 연결도 파일로 관리한다. 일반적으로 한계접속은 보통보다 많은 연결을 할 수 있도록 충분히 설정 되어 있지만 필요하다면 조정 가능하다. 유닉스/리눅스의 경우 imit, ulimit. unlimit 명령어로 조정이 가능하다고 한다. 설정 확인 # 소프트웨어 한도 # 소프트웨어 한도는 하드웨어 한도까지는 변경이 가능. # 하드웨어 한도를 넘어서기 위해서는 관리자권한 필요. ulimit -Sa (-a 동일) core file size (blocks) 0 data..
How to scan Linux for vulnerabilities with lynis lynis를 이용한 리눅스 취약점 검사하기 wget https://cisofy.com/files/lynis-2.5.1.tar.gz tar xvfvz lynis-2.5.1.tar.gz -C /opt cd /opt/lynis ./lynis --check-all -Q ll /var/log/lynis* # 경고 확인 grep Warning /var/log/lynis.log # 제안 확인 grep Suggestion /var/log/lynis.log System tools 시스템 바이너리 Boot and services 부트로더, 시작 서비스들 Kernel 런 레벨,사용되는 모듈,커널 설정,코어 덤프 Memory and pro..
|
0.962927 |
Meanwhile, Paul's cons unexpectedly lead him into darker territory as his lies begin to catch up with him).
1, the play explores the existential premise that everyone in the world is connected to everyone else in the world by a chain of no more than six acquaintances, thus, " six degrees of separation ".
Awards and nominations edit Original Broadway production edit Original London production edit 2017 Broadway revival edit See also edit References edit "Pulitzer Prize for Drama" pulitzer.
Paul claims he is in New York to meet his father, who is directing a film version of the.Channing was nominated for the Academy Award for Best Actress for her performance in the film.The next morning Inger Elliott found Hampton in bed with another man and later called the police.A Tierra del Fuegan.The Elliotts told Guare about the story and it inspired him to write the play years later.The writer John Guare was a friend of Inger McCabe Elliott and her husband Osborn Elliott."Six Degrees' Inspiration Hampton Dies".
Public transportation, by Bus : M104, M10, M27, M50, M6, M7, or M42 bus.
Film adaptation edit Main article: Six Degrees of Separation (film) Guare adapted the play for a film released in 1993 directed by Fred Schepisi.
In October 1983 Hampton came to the Elliott's george c marshall nobel peace prize New York apartment and they allowed him to spend the night.Channing had starred previously in John Guare's.6 Kelly Bishop played the role of Ouisa as a replacement on Broadway, and Laura Linney made her Broadway debut as a replacement for the role of Tess.Soon afterwards Rick commits suicide.In the week ending June 11, the days leading to the Tonys, Six Degrees brought in 271,320 up from 259,703 the previous week, but still just.1 percent of its gross potential.In desperation, Paul calls the Kittredges for assistance.
|
0.995087 |
Experience two of the top destinations in Southern Africa – the Kruger National Park and Victoria Falls. For many travelers to Africa, a visit to the Victoria Falls is a must. Known as one of the natural wonders of the world, it has a width of almost 2 kilometers and a height of over 100m which makes it the world's largest expanse of falling water. The Zambezi River and Victoria Falls form a natural border between Zambia and Zimbabwe. The spray from the falls creates a natural rain forest around the falls and viewing the falls is excellent from both sides. A visit to Victoria Falls offers much more than just a scenic experience and there is plenty to do and see on both sides of the falls. From adrenaline activities to craft markets – the Victoria Falls has a lot to offer. Activities include white water rafting, gorge swings, kayaking, helicopter and microlight flights, village walks and a sunset cruise on the Zambezi River.
The Kruger Park is South Africa’s premier game reserve and is home to over 500 bird species and 147 different mammals including the Big 5. The Kruger Park has a high density of animals and some of the animals one can expect to encounter include lions, leopards, rhinos, elephants, giraffes, as well as large herds of zebras and antelope. Surrounding the Kruger Park are private game reserves and many of the fences separating the private reserves from the Kruger have been removed allowing animals to roam free. This makes the Kruger Park area an ideal safari destination and there are a variety of tour options available. Accommodation options range from luxury lodges to budget camping. Most Kruger Park safaris are conducted in especially adapted open vehicle which provide excellent viewing opportunities. Many of the safaris include nature/game walks and sunset/evening game drives.
There are a variety of tours available that include both the Kruger National Park and Victoria Falls. Ranging from budget camping safaris to comfortable accommodated tours, we offer tours of varying duration's. Some of the safari options include a visit to Botswana and the Okavango Delta, well others are part of longer overland adventure tours.
|
0.999996 |
I’m 22 years old and what is this.
The future open web must be easier to use than the current social web, and knowing what to do with your own data cannot be a prerequisite. We will have passive users of the web, and the web needs them. If we exclude them, we risk creating a walled garden that lacks the perspectives and experiences of different types of people.
|
0.943794 |
Lamb and Seddon's 1904 design for a new Imperial Monumental Halls. The Gothic Revival tower would have been the tallest building in the UK with a similar floor area to the Abbey next door. Several different pictures from different angles were created.
The Imperial Monumental Halls and Tower was a proposed Gothic complex designed for a site in London adjacent to Westminster Abbey. The plans, exhibited at the Royal Academy in March 1904, included a 167-metre-high (548 ft) tower that would have dominated the Clock Tower and Victoria Tower of the nearby Houses of Parliament. It was never built.
The design by John Pollard Seddon – then diocesan architect for London – and Edward Beckitt Lamb (son of Edward Buckton Lamb) was based on earlier schemes that each had proposed separately, and was one of many extensions proposed for Westminster Abbey in late 19th and early 20th centuries by architects such as George Gilbert Scott, George John Shaw Lefevre, James Fergusson, and Henry Travis. In particular, the clergy at Westminster Abbey were concerned that the church was becoming crowded with monuments, and more space was needed. Some of the proposed designs were considered by a Royal Commission in 1891. The issue issue was given added impetus after the coronation of King Edward VII and Queen Alexandra in August 1902 by a desire for Westminster Abbey to become a fitting Imperial monument, to compete with the baroque St Paul's Cathedral where Queen Victoria had commemorated her Diamond Jubilee in 1897.
The architects aspired to create a grand and expensive monument to "form a worthy centre to the metropolis of the Empire 'upon which the sun never sets'".
The complex was planned to be joined to the Great Cloister of Westminster Abbey, leading to a 65-foot-wide (20 m) reception hall beneath the tower, with the main body of the building - the Great Monumental Hall - stretching 192 feet (59 m) along Great College Street, incorporating smaller side halls. The halls would have ended with a double transept at the south end, 157 feet (48 m) wide and 47 feet (14 m) deep.
The soaring Memorial Tower included a high-level open ambulatory, surmounted by a corona topped by a lantern with bells. It was intended to hold monuments and imperial trophies in galleries on the lower floors, with archives on the upper floors.
It would have been the tallest building in the UK, significantly higher than the 111 metres (364 ft) dome of St Paul's Cathedral. The complex would have had a similar floor area to Westminster Abbey itself, and would have overshadowed the Houses of Parliament close by.
The scheme of work would have included the completion of the tower over the crossing at Westminster Abbey. The Builder magazine criticised the scheme as exhibiting a degree of megalomania.
|
0.996105 |
The polymerase chain reaction (PCR) is a molecular biology method that exponentially amplifies very small quantities of DNA (e.g., one or a few copies). The result is millions of copies of a specific DNA sequence that can be used to detect the presence of a specific microorganism or pathogen. The method was direst developed 30 years ago (1983) by Kary Mullis. I came across a nice review detailing the advancements of PCR over the past 30 years in Genetic Engineering & Biotechnology News. Below is an excerpt from this article.
Novel techniques, automated machines, sophisticated synthetic and bioprospected polymerases, and developments in symbiotic sequencing technologies have transformed PCR into a multifaceted, adaptable molecular tool.
Such advancements, however, have tethered PCR to expensive laboratories, requiring ever more specialized equipment and technicians. Looking to the future, improvements in PCR technologies will simplify and speed up the process, reduce costs, and enable miniaturization of PCR devices, taking diagnostics out of the lab and placing it firmly at the point of care (POC).
PCR is increasingly used to interrogate the genomes of humans, animals, bacteria, and viruses in different ways. Though the process has long been routinely used for detection of infectious diseases such as malaria and flu, quantitative PCR (qPCR) and digital PCR (dPCR) have significantly increased the sensitivity and precision of such tests.
The ability to identify single nucleotide polymorphisms (SNPs) or regions of DNA associated with infectious disease drug resistance is crucial to effectively treating diseases, and thereby preventing further spread within the population, or overprescribing therapeutics that will have no benefit.
The development of dPCR has seen advances in the precision and sensitivity of PCR for absolute quantification of nucleic acid targets, key capabilities for the detection and treatment of food-borne pathogens such as salmonella and E. coli, as well as rare mutations such as those seen in cancerous cells.
Neoplastic cells have been successfully detected in the sputum, urine, and stool of patients with lung, bladder, and colon cancer respectively, and circulating tumor cells have been shown to be a useful biomarker for metastatic breast cancer.
In addition, the development of dPCR as a noninvasive prenatal testing (NIPT) diagnostic using maternal blood is a promising focus of current research.
Though PCR is now used for a multitude of diagnostic applications, from infectious diseases to NIPT, these tests are costly, and it can take weeks to return results to the patient. As technology moves forward, and more complex automated devices allow for real-time results with higher specificity and resolution, affordability and accessibility are expected to improve. But such gains have yet to materialize.
As the cost of standard polymerases falls, new, high-priced PCR machines, which require costly reagents and polymerases, are incrementally introduced to maintain the market share of nextgen technologies.
Rather than allowing more accessibility, these new PCR machines require increasingly well-stocked labs and well-trained staff. The infrastructure and skill levels required prohibit the use of such tests outside the developed world. Reversing this trend requires new thinking and disruptive, game-changing technology.
Recent advances in microfluidics now allow for POC PCR. This technology will make PCR-based diagnostic testing accessible in various settings worldwide, especially in remote, underserved communities where the detection of drug resistance markers for infectious diseases could revolutionize healthcare provision.
Microfluidic techniques have developed from the advent of dPCR, which relies upon the ability to generate small-reaction volumes in an accurate and repeatable manner. Single-molecule isolation technologies have shown promise of late, with Quanterix utilizing single-molecule array technology to produce an extremely sensitive assay.
Innovative researchers have been applying microfluidics techniques to PCR, with the recent production of thermal cyclers utilizing microwells, capillaries, and microdroplet formation. Companies such as RainDance Technologies and QuantaLife provide extremely high levels of sensitivity with their microdroplet PCR devices. Further microfluidic advancement is pivotal to future advances in amplification techniques and nucleic acid detection.
Microfluidics technology increases the speed of PCR by orders of magnitude. Speed is only theoretically limited by the processivity of the polymerase and the length of the region to be amplified.
In reality, the limiting factor is often the time it takes to cycle the reaction mixture through the reaction temperatures, so-called ramping. Ramping in conventional PCR machines is time- and energy-intensive due to the thermal mass of the block and is not readily made portable.
Improvements in buffer systems and engineered enzymes have increased the speed of standard benchtop thermal cyclers. Typically, however, these methods still take over 90 minutes, with 40 minutes being considered fast. This is far too long to be practical in a clinical POC setting.
Very few commercially available devices are capable of truly rapid PCR, none of which can be considered portable. BJS Technologies, though it doesn’t utilize true microfluidics technology, has developed the xxpress benchtop microwell thermal cycler. This device is capable of 40 cycles in just 10 minutes because it has a ramp rate of 10°C per second.
Microfluidic PCR systems fall into two categories—microwell reactors and continuous flow. Microwell thermal cyclers are essentially miniaturized versions of traditional PCR machines, reducing the input and chamber volumes such that the time it takes to heat and cool the reaction mix is likewise reduced.
Roche’s LightCycler holds PCR mix within capillaries, thereby increasing the surface-to-volume ratio and reducing the cycle time. Despite a runtime of approximately 30 minutes, the LightCycler technology has been commercially successful.
Continuous flow devices, on the other hand, require heating zones of different temperatures, over or between which the reaction mixture is passed in microfluidic channels. This lab-on-chip approach greatly reduces energy consumption, as once heat has been added to the system it only has to be maintained and not ramped. Provided there is good thermal contact between the flowing reaction mixture and the heaters, extremely rapid PCR can be achieved.
With microfluidic channels, surface area is increased and the time to reach thermal equilibrium at any given temperature zone becomes fractions of seconds. This equates to rapid ramping. An additional benefit of continuous flow devices is that they utilize disposable plastic microfluidics cassettes in lieu of large batch processing machines, lowering the cost per test and eliminating the possibility of cross-contamination between samples.
The increased surface-to-volume ratio in microfluidic PCR is not without its challenges. Polymerase can become denatured on the walls of microfluidic channels, and primer concentration often has to be increased for the same reasons. Inhibition can be overcome by careful choice of materials and utilizing surface chemistry to increase hydrophobicity.
Alternatively, active or passive passivation layers can be used to decrease the high adsorption rate of reagents by the materials. Pumping mechanisms and channel dimensions also require careful consideration because of their effect on laminar flow and dispersion. Research teams worldwide are optimizing continuous flow PCR, with advances in materials, heating and cooling systems, and connectors, all required to provide more efficient integrated systems.
Continuous flow PCR was born out of capillary electrophoresis in the early 1990s. It was pioneered by Andreas Manz, who has been central in the early development of microchip devices for chemical and biological analysis. However, during this time it was not commercialized.
More recently, academic labs, such as that of Niel Crews, have further developed the early iterations of continuous flow PCR, although the majority of these devices have only been used in the research setting. Thermal Gradient has produced a commercially available continuous flow PCR device capable of sub-10 minute runtime by pumping PCR reaction mix through a sandwich of two or three heating zones.
The single-use devices are intended for integration into POC devices. While rapid PCR would save time and money for researchers, it could also save lives if put into the hands of healthcare workers as part of a POC diagnostic test.
Continuous flow PCR is ideal for POC applications with amplification of DNA possible in just a few minutes, microfluidic PCR opens up the possibility for rapid diagnostic testing. When combined with automated sample preparation and DNA detection technologies, such as QuantuMDx’s Q-POC device, the development of which also benefits from microfluidics engineering, a portable, fully integrated POC diagnostic device could extend MDx to resource-limited settings.
Continuous flow PCR, with low power, sample size, and reagent volume requirements, is ideal for inclusion in a handheld device, which will be produced at much lower cost than traditional PCR machines due to the lack of robotics. Per-test costs also will be lower due to the much smaller volumes of reagents required.
Moreover, due to the speed of of amplification the speed of molecular analysis will be improved, and with assay times in the 10-minute range, this makes it relevant to in-field or in-clinic MDx testing.
The resulting sample-to-result device will not only be less costly than traditional PCR machines but significantly easier to operate, negating the need for well-stocked laboratories and highly skilled technicians. Such a technology leap could provide resource-scarce settings with access to the high-quality PCR-based diagnostic testing that is available in the developed world.
Providing diagnostic results in minutes rather than days, weeks, or months could revolutionize healthcare worldwide by surmounting many of the obstacles associated with traditional healthcare provision models in the developing world.
Lack of reliable electricity supply, clean water, transportation (particularly cold chain transportation for reagents), and highly skilled technicians are all hurdles that could be overcome by a simple POC test. Such a test would make complex diagnostics affordable and accessible, and could improve outcomes through early detection and treatment of disease.
Advancements in speed, accuracy, and cost control will open up developed and developing healthcare economies to the advantages of state-of-the-art PCR and related diagnostic technologies, including reduced test costs as healthcare costs skyrocket, reduced waiting times as hospitals overflow, and improved accuracy for priority diagnostics.
This will aid in diagnosis and treatment of patients worldwide, whether for a drug-resistant infectious disease, cancer, or a genetic condition. The development of such cutting-edge diagnostics is dependent on the creation of novel rapid microfluidic PCR methods, and the resulting technologies are now set to change the basis of genetic diagnosis.
|
0.906242 |
Arthur became famous for the Zimmermann Note, which was his telegram to the German diplomat in Mexico, giving the latter permission to propose to Mexican President Venustiano Carranza an alliance between Mexico and Germany against the United States.
The note mentioned that the Germans would aid Mexico in recovering Mexico's "lost territories Texas, New Mexico, and Arizona."
Why would Arthur Zimmermann send such a note?
The Germans were struggling in the fight of World War I. They knew they would have a big military advantage if they were to employ unrestricted submarine warfare. But at the same time doing so would provoke the United States to enter the war on the side of Germany's enemies, the Allies.
Zimmermann figured it would be therefore a good idea if the US were perhaps distracted by a war with Mexico or Japan, or preferably both. He sent the message on January 16, 1917.
Check this event in the WWI Timeline.
The telegram was intercepted and decoded, however, and made US President Woodrow Wilson rub his eyes twice. Five weeks later the US declared war on Germany, thus entering Word War I.
|
0.999885 |
There were a quite a few framedrops during battles, so i stopped the game, lowered the resolution to 2x and it just wouldn't load. Sooner or later, it did load. But all I saw was a really zoomed in version of the title screen.
I thought that it might've been a bug with the build i used, so I updated to the build 5.0-4889, with the same settings, and it just crashed the emulator by instant.
I tried to disable the textures, and then the game worked again. I also tried to enable custom textures again, but this time with Direct3D and OpenGL, and both worked.
I thought that it might've something to do with the ram, but i couldn't prove it like this, I thought, so I went all the way back to the stable release of dolphin 5.0, trying Direct3D 12, and I checked the ram usage from the task manager, and it went up to 6 GB on dolphin alone before the emu noticed me that it failed to load the textures(The textures are ~1.35GB btw). I tried to load the game once more on the build 5.0-4889 again with the same settings as I originally had, except for that i used 2x resolution intstead. The ram went up to ~1.7GB before it crashed or "stopped working" as windows likes to call it.
TL;DR: Xenoblade + Vulcan + Custom textures + Prefetch Textures = crash on load using the latest build, for me.
Btw using prefetch textures all the time except for those times i told that i disabled custom textures.
|
0.952582 |
A system, apparatus and method of improving network data traffic between interconnected high-speed switches are provided. As is well known, when a packet of data is longer than a path maximum transmission unit (PMTU), the packet will be fragmented. In the case of the invention, the packet is fragmented by a transmitting router connected to a high-speed switch. When a receiving router, which is also connected to an high-speed switch, begins to receive the fragments, it will check to see whether its sub-network may handle data of a substantially longer length than the length of the fragments. If so, the receiving router will collect the fragments, reassemble them into the original packet and transmit the reassembled packet to its destination.
The present invention is directed to network communications. More specifically, the present invention is directed to a system, apparatus and method of improving network data traffic between interconnected high-speed switches.
With the advent of high bandwidth-consuming applications such as on-line content, e-commerce, network databases, streaming media etc., Scalable POWER_Parallel (SP) systems are increasingly being used. An SP system is a distributed parallel data processing system that incorporates a central switch. The central switch (or SP switch) is a high-speed switch that is used to provide a high efficiency interconnection of processor nodes. (SP systems and SP switches are products of IBM Corporation.) Particularly, a high-speed switch such as an SP switch may support Maximum Transmission Units (MTUs) as large as 64 kbytes (i.e., packets of 64 kbytes). By contrast, an ordinary Ethernet connection may support an MTU of 1500 bytes (i.e., packets of 1500 bytes). An MTU is the maximum size of a packet that an intermediate link can process without fragmenting the packet. Thus, each data transaction between any two nodes of an SP switch may be of 64 kbytes long. However, when two SP switches are interconnected via an ordinary Ethernet fabric, the data packets may not exceed 1500 bytes. This is a rather drastic loss of performance.
What is needed, therefore, is a system, apparatus and method of improving network data traffic between interconnected high-speed switches.
The present invention provides a system, apparatus and method of improving network data traffic between interconnected high-speed switches. As is well known, when a packet of data is longer than a path maximum transmission unit (PMTU), the packet will be fragmented. In the case of the invention, the packet is fragmented by a transmitting router connected to a high-speed switch. When a receiving router, which is also connected to an high-speed switch, begins to receive the fragments, it will check to see whether its sub-network may handle data of a substantially longer length than the length of the fragments. If so, the receiving router will collect the fragments, reassemble them into the original packet and transmit the reassembled packet to its destination.
FIG. 1 depicts an exemplary SP system.
FIG. 2 depicts a conceptual view of FIG. 1.
FIG. 3 depicts a network of two SP systems that is based on an Ethernet interconnect.
FIG. 4 is a flowchart of a process that may be used to implement the invention.
FIG. 5 depicts a representative IP header in byte format.
FIG. 6 is an exemplary block diagram of a computer system according to the present invention.
With reference now to the figures, FIG. 1 depicts an exemplary SP system. The exemplary SP system contains two frames 110 and 112 and a control workstation 108. The two frames 110 and 112 contain each 16 nodes (i.e., nodes 102) and an SP switch (switches 104 and 106). The two frames 110 and 112 are connected to each other by switch-to-switch cable 114 and are each connected to the control workstation 108 by a serial cable (i.e., cables 116 and 118).
Note that a frame is a containment unit consisting of a rack to hold workstations, together with supporting hardware, including power supplies, cooling equipment and communication media such as a system Ethernet. Note further that each node 102 is a workstation packaged to fit in the SP frame. A node ordinarily is devoid of a monitor and keyboard. Therefore, access to the nodes 102 is generally through the control workstation 108. Lastly, note that although the SP system is shown to contain two frames having each 16 nodes, the invention is not thus restricted. Any SP system may be used (e.g., one or more than two-frame SP systems having more than or less than 16 nodes). Hence, the two-frame SP system is used for illustrative purposes only.
FIG. 2 depicts a conceptual view of the SP system in FIG. 1. In this figure, switch 205, which is one of the SP switches (e.g., switch 104) of FIG. 1, is shown to have a plurality of nodes 210 attached thereto. Also attached to the SP switch 205 is a router 215. The router is, for all intent and purpose, another node since it occupies a node slot. Through the router 215, the SP system may access other networks such as Asynchronous Transfer Mode (ATM) network 230, Internet/Intranet 240 and Fiber Distributed Data Interface (FDDI) network 250 etc.
As alluded to before, data packet transaction between a node 210 and another node 210 or between the router 215 and a node 210 may be 64 kbytes long. Data traffic between the SP system 100 of FIG. 1 and another SP system through FDDI 250 and ATM 230 networks may occur at an equivalent speed. However, data traffic between the SP system of FIG. 1 and another SP system through Internet/intranet 240 (if it is based on a regular Ethernet Interconnect) may only occur at an MTU of 1500 bytes. The present invention provides a mechanism by which data transfers between two SP switches via a regular Ethernet interconnect may be improved.
FIG. 3 depicts a network of two SP systems that is based on an Ethernet interconnect. As mentioned before, the network may be the Internet or an intranet or any other network so long as it is based on an interconnect that transacts data at a relatively much slower speed than the speed with which data is transacted within the systems. The network contains two SP switches (i.e., two SP systems). SP switch 1310 has attached thereto a plurality of nodes (i.e., node1-1 312, node12 314 through nodelN 316, N being an integer) and a router1 318. Likewise SP switch II 330 has attached thereto a plurality of nodes (i.e., node21 332, node2-2 334 through node2-N 336, again N being an integer) and a router2 338. Data exchange between the two SP systems occur via a regular Ethernet interconnect supporting an MTU of 1500 bytes.
In the past, when a node from SP system I (e.g., node1-1 312) wanted to communicate with a node in SP system II (e.g., node2-2 334), node1-1 312 had two options. The first option was to turn on path MTU discovery. By doing so, node1-1 312 would determine that the MTU along the path is 1500. Consequently, node1-1 312 would break the data up into packets of 1500 bytes or less before sending the data to router1 318. Router1 318 would then transmit the packets over the Ethernet interconnect to router2 338 which would pass the packets to node2-2 334. Thus, the large bandwidth provided by the 64-Kbyte-MTU would not be utilized. Instead, much smaller packets (1500 bytes or less) would be used, thereby adversely affecting performance.
The second option was for node1-1 312 to turn off path MTU discovery and send the packets out assuming that the entire path MTU is 64 Kbytes. In this case, however, upon receiving a packet larger than 1500 bytes, router1 318, which would be aware that the Ethernet interconnect only supports up to 1500-byte-packets, would break the packet into fragments of 1500 bytes or less. The fragments would be passed to router2 338 which in turn would pass them to node2-2 334. Upon receiving all the fragments, node2-2 334 would reassemble them back into the original packet. Here then, although the large bandwidth would be exploited within SP system I, it would not be used within SP system II.
The invention uses fragment-reassembling routers (as well as the second option mentioned above) to exploit the large bandwidth available in both SP systems in the network. To continue with the previous example, after router1 318 breaks a packet into fragments of 1500 bytes or less, it will send the fragments to router2 338. Router2 338 will collect the fragments, reassemble them into the original packet and send the reassembled packet to node2-2 334. Thus, if a packet of 64 kbytes was sent by node1-1 312 to router1 318 within SP system I, after reassembling the fragments into the packet, a packet of 64 kbytes would be sent by router2 338 to node2-2 334 within SP system II.
To use the invention, however, a router must first determine whether the MTU of the outgoing data is much greater (i.e., greater by a factor of three or more, for instance) than the MTU of the incoming data. If so, instead of passing the incoming fragments as they are being received to their destination, the router may collect them, reassemble them into the original packet and send the reassembled packet to its destination. Again to continue with the example above, if router2 338 determines that the MTU of the outgoing data (MTU within SP system II) is much greater than the MTU of the incoming data (i.e., MTU of the Ethernet interconnect), which in this case it is, the router2 338 may collect the fragments, reassemble them into the original packet and send the packet to node2-2 334. Note that router2 318 will perform a similar function.
Nonetheless, to use the invention, certain rules may need to be followed. For example, a timeout must be specified beyond which fragments may have to be delivered to their destination node instead of a reassembled packet. After all, waiting indefinitely (or for an inordinate amount of time) for a fragment may defeat the purpose of the invention. Further, out-of-order fragments should be sent to the receiving node without re-assembly. This is because fragments may be sent along different paths. For example, if SP switch II 330 represents switch 104 of FIG. 1, then some fragments may go through router3 (not shown) which may be attached to switch 106 of FIG. 1 to be delivered to node2-2 334. Therefore, when out-of-order fragments are received, they must be sent out immediately, lest the router waits indefinitely for some of the fragments.
Note that in describing the invention, an outgoing MTU greater than an incoming MTU by a factor of three was used. However, the invention is not thus restricted. For example, an outgoing MTU that is greater than an incoming MTU by a factor of more than or less than three may be used. Thus, the use of an outgoing MTU greater than an incoming MTU by a factor of three is for illustrative purposes only.
FIG. 4 is a flowchart of a process that may be used to implement the invention. The process starts when data is being received by a reassembling router (step 400). At that time a check will be conducted to determine whether a fragment of a packet is being sent (step 402). This check can easily be done by scrutinizing the IP (Internet Protocol) header of the fragment.
To illustrate, each packet or fragment being sent on a network contains an IP header. FIG. 5 depicts a representative IP header in byte format. Version 500 is the version of the IP protocol used to create the data packet and header length 502 is the length of the header. Service type 504 specifies how an upper layer protocol would like a current data packet handled. Specifically, each data packet is assigned a level of importance. Total length 506 specifies the length, in bytes, of the entire data packet, including the data and header.
IP identification 508 is used when a packet is fragmented into smaller pieces while traversing a network. This identifier is assigned by the transmitting host so that different fragments arriving at the destination host can be associated with each other for re-assembly. For example, if while traversing the network a packet is fragmented by a router, the router will use the IP identification number in the header of the packet with all the fragments. Thus, when the fragments arrive at their destination they can be easily identified.
Flags 510 is used for fragmentation and re-assembly purposes. The first bit is called “More Fragments” (MF) bit and is used to indicate whether the packet is fragmented. For example, if the bit is set in the IP header of a current fragment, then there is at least one fragment that follows the current fragment. If the bit is not set, the current fragment is not followed by another fragment and the receiver may begin re-assembling the packet. The second bit is the “Do not Fragment” (DF) bit, which suppresses fragmentation. The third bit is unused and is always set to zero (0).
Fragment Offset 512 indicates the position of the fragment in the original packet. In the first packet of a fragment stream, the offset will be zero (0). In subsequent fragments, this field indicates the offset in increments of 8 bytes. Thus, it allows the destination IP process to properly reconstruct the original data packet.
Time-to-Live 514 maintains a counter that gradually decrements each time a router handles the data packet. When it is decremented down to zero (0), the data packet is discarded. This keeps data packets from looping endlessly on the network. Protocol 516 indicates which upper-layer protocol (e.g., TCP, UDP etc.) is to receive the data packets after IP processing has completed at the destination host. Checksum 518 helps ensure the IP header integrity. Source IP Address 520 specifies the transmitting host and destination IP Address 522 specifies the receiving host. Options 524 allows IP to support various options (e.g., security).
Returning to FIG. 4, the check in step 402 may be done by scrutinizing Flags 510. Particularly, if the bit in Flags 510 is set, then the data being received is a fragment of a packet. If it is not a fragment, then the data is processed as customary before the process ends (steps 404 and 406). If however, the data is a fragment of a packet, the reassembling router will receive the fragment (step 408) and then check to see whether the outgoing MTU is greater than the incoming MTU (step 410). If so, the router will keep the fragment and wait for more fragments (steps 414 and 416). While waiting for more fragments, the router will be mindful that the timeout is not exceeded. If it is exceeded, the router will send the fragment to its destination. Further, the router will check that the fragment is not an out-of-order fragment. This can be checked by scrutinizing fragment offset 512. Out-of-order fragments are sent right away to their destination. If it is not an out-o-order fragment, it will be collected and when all the fragments are received, the router will reassemble them into the original packet and send the packet to its destination (steps 416, 418, 420, 422, 424 and 426).
After sending the packet to its destination, the router may check to see whether fragments of another packet are being sent. If so, the process jumps back to step 408; otherwise, the process ends (steps 428 and 430). Incidentally, the check in step 410 may be done only once (i.e., the first time the router receives fragments after being initialized).
With reference now to FIG. 6, a block diagram illustrating a data processing system is depicted in which the present invention may be implemented. Data processing system 600 is an example of a client computer. Data processing system 600 employs a peripheral component interconnect (PCI) local bus architecture. Although the depicted example employs a PCI bus, other bus architectures such as Accelerated Graphics Port (AGP) and Industry Standard Architecture (ISA) may be used. Processor 602 and main memory 604 are connected to PCI local bus 606 through PCI bridge 608. PCI bridge 608 also may include an integrated memory controller and cache memory for processor 602. Additional connections to PCI local bus 606 may be made through direct component interconnection or through add-in boards. In the depicted example, local area network (LAN) adapter 610, SCSI host bus adapter 612, and expansion bus interface 614 are connected to PCI local bus 606 by direct component connection. In contrast, audio adapter 616, graphics adapter 618, and audio/video adapter 619 are connected to PCI local bus 606 by add-in boards inserted into expansion slots. Expansion bus interface 614 provides a connection for a keyboard and mouse adapter 620, modem 622, and additional memory 624. Small computer system interface (SCSI) host bus adapter 612 provides a connection for hard disk drive 626, tape drive 628, and CD-ROM/DVD drive 630. Typical PCI local bus implementations will support three or four PCI expansion slots or add-in connectors.
An operating system runs on processor 602 and is used to coordinate and provide control of various components within data processing system 600 in FIG. 6. The operating system may be a commercially available operating system, such as Windows XP™, which is available from Microsoft Corporation. An object oriented programming system such as Java may run in conjunction with the operating system and provide calls to the operating system from Java programs or applications executing on data processing system 600. “Java” is a trademark of Sun Microsystems, Inc. Instructions for the operating system, the object-oriented operating system, and applications or programs as well as the invention may be located on storage devices, such as hard disk drive 626, and may be loaded into main memory 604 for execution by processor 602.
Those of ordinary skill in the art will appreciate that the hardware in FIG. 6 may vary depending on the implementation. Other internal hardware or peripheral devices, such as flash ROM (or equivalent nonvolatile memory) or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIG. 6. Also, the processes of the present invention may be applied to a multiprocessor data processing system.
The depicted example in FIG. 6 and above-described examples are not meant to imply architectural limitations. For example, data processing system 600 may also be a notebook computer or hand held computer or kiosk or a Web appliance.
transferring the packet to its destination.
2. The method of claim 1 wherein if all the fragments are not received within a predefined time, the fragments are sent to their destination without being reassembled into the packet.
3. The method of claim 1 wherein out-of-order fragments are sent to their destination without being reassembled into the packet.
4. The method of claim 1 wherein the fragments are reassembled into the packet if the maximum length of the data allowed by the sub-network is greater than the length of the fragment by a pre-defined threshold.
transferring the combined pieces of data.
code means for transferring the packet to its destination.
7. The computer program product of claim 6 wherein if all the fragments are not received within a predefined time, the fragments are sent to their destination without being reassembled into the packet.
8. The computer program product of claim 6 wherein out-of-order fragments are sent to their destination without being reassembled into the packet.
9. The computer program product of claim 6 wherein the fragments are reassembled into the packet if the maximum length of the data allowed by the sub-network is greater than the length of the fragment by a pre-defined threshold.
code means for transferring the combined pieces of data.
means for transferring the packet to its destination.
12. The apparatus of claim 11 wherein if all the fragments are not received within a predefined time, the fragments are sent to their destination without being reassembled into the packet.
13. The apparatus of claim 11 wherein out-of-order fragments are sent to their destination without being reassembled into the packet.
14. The apparatus of claim 11 wherein the fragments are reassembled into the packet if the maximum length of the data allowed by the sub-network is greater than the length of the fragment by a pre-defined threshold.
means for transferring the combined pieces of data.
at least one processor for processing the code data to receive data sent to a sub-network, the data being a fragment of a packet of a particular length, to compare the length of the fragment with a maximum length of data allowed by the sub-network, to collect, if the maximum length of the data allowed by the sub-network is greater than the length of the fragment, all the fragments of the packet, to reassemble the fragments into the packet, and to transfer the packet to its destination.
17. The system of claim 16 wherein if all the fragments are not received within a predefined time, the fragments are sent to their destination without being reassembled into the packet.
18. The system of claim 16 wherein out-of-order fragments are sent to their destination without being reassembled into the packet.
19. The system of claim 16 wherein the fragments are reassembled into the packet if the maximum length of the data allowed by the sub-network is greater than the length of the fragment by a pre-defined threshold.
at least one processor for processing the code data to receive data sent to a sub-network, the data being of a certain length, to compare the length of the data with a maximum length of data allowed by the sub-network, to collect, if the maximum length of data allowed by the sub-network is greater than the length of the data, different pieces of data being sent to the sub-network, to combine the different pieces of data to coincide to the maximum length of the data, and to transfer the combined pieces of data.
|
0.999947 |
Before starting recipe for cookies, cake etc... Combine 1 tsp unflavored gelatin with 3 tblsp cold water and 2 tblsp plus 1 tsp boiling water. This mixture will substitute for 1 egg in a recipe.
Tofu is great for egg substitutions in recipes that call for a lot of egg (like quiches). To substitute for only one egg in a recipe, whip 1/4 cup tofu and add to your cooking.
1 whole egg = 2 tbsp water and 1 tbsp oil and 2 tsp baking powder.
To make one egg use 2 tbsp water and 2 tsp baking powder.
To make one egg white, dissolve 1 tblsp plain agar powder in 1 tblsp water. Whip, chill and whip again.
1 heaping tblsp soy powder and 2 tblsp water = 1 egg.
1 tblsp soy milk powder and 1 tblsp cornstarch and 2 tblsp water = 1 egg.
One average size banana = one egg, adds flavor to product. Product may be gummy.
1/4 cup soymilk in place of each egg.
3 tablespoons pureed fruit = 1 egg.
Substitute 3 tablespoons mayonnaise for each egg called for in a recipe.
1/4 teaspoon agar powder and 1/4 cup lukewarm water and 1 teaspoon low sodium baking powder . Whisk all ingredients together well before adding to recipe .
1/2 tablespoon agar flakes and 1/4 cup water and 1 teaspoon low sodium baking powder- In a large microwave safe container, combine water and agar with top on cook on high in microwave for 45 seconds. Carefully remove container from microwave and whisk baking powder into mixture. Use caution, the baking powder causes a rapid expansion of the liquid and has a tendency to foam over.
2 tablespoons liquid (room temperature water or milk or substitute) and 1 tablespoon potato starch or tapioca starch and 1 /2 tablespoon shortening and 3 /4 teaspoon low sodium baking powder.
1 tablespoon any mild flavored oil + 1 tablespoon apple cider or wine vinegar or lemon juice and 1 teaspoon low sodium baking powder and 1 teaspoon potato starch or cornstarch or arrowroot + enough carbonated water[plain soda water) to equal a total of 1 /4 cup . Combine all ingredients in a medium size bowl to allow room for the ingredients to increase in volume as baking soda and vinegar react. Whisk, then add per mix or recipe instructions.
1 tsp of arrowroot powder + 1 tsp of water, sometimes you may want to add a little extra milk or water or oil to make up for the bulk that you would get with a real egg. Good for pancakes and waffles.
As bad as this may sound 15 ml (0.51 oz) Vinegar = 1 egg. Mainly used in baking, products will stale quickly, use within four days. Freeze until used. Adds flavor to product. Product may be gummy.
1 tsp yeast dissolved in 1/4 cup warm water = 1 egg.
Mix about 1/4 tsp. with about 1/4 cup of water. Let stand. It thickens, and can be whipped like an egg white. It's okay to replace one egg.
Mix 2 cups water and 1 cup flour in a blender until thick. Cook in a double boiler 45-60 minutes. With a mixer, whip in 2 Tbsp. cooking oil and 1/4 tsp salt. use 2 or 3 Tbsp. for binder in hamburgers or meat loaf.
Add 1 tsp cold water to 2 egg whites. Makes 3 egg whites.
Snow can be used as an excellent substitute for eggs in puddings, pancakes, etc. Two heaping tablespoons snow will take the place of 1 egg, and the recipe will turn out equally well. Use fresh-fallen snow or the under-layers of older snow. The ammonia in snow imparts to its rising properties, and the exposed surface of the snow loses ammonia by evaporations very soon after it has fallen.
Sprinkle powdered milk over egg whites, then beat them with fork until smooth. Add food color, and beat until blended. This makes one-fourth cup, which is equal to 1 large egg. If you use this homemade substitute for scrambled eggs, cook it in vegetable oil or margarine so the eggs won't be too dry.
Try substituting 1 banana or 1/4 cup apple sauce for each egg called for in a sweet, baked recipe. These will flavour the recipe, however, so make sure banana or apple will taste good in it.
This is the one most often used in baking; it's really only good for recipes that call for 1 or 2 eggs. To make one egg use 1 tsp Ener-G Egg Replacer powder + 2 tbsp water. It's made from potato flour and other vegan leaveners, this powder can be found in most health food stores.
Eggs have three main functions in cooking and baking; they add moistness, they bind ingredients together, or they leaven. How do you know what the egg is in your recipe? If the egg is the main liquid ingredient, it adds moistness. If the recipe has one egg but a fair amount of baking powder or soda, (or if there are no other components in the recipe that would be able to hold the other ingredients together, like bread crumbs, nuts, flour) the egg is the binder. If there are no other rising agents, the egg is the leavening.
To maintain the integrity of your recipe, you shouldn't try to replace more than two eggs.
Two tablespoons per egg of any liquid, like juice, milk or soy milk, will do just fine. To add moisture and flavor to baked goods requiring eggs, substitute ½ (half) mashed banana or 1/4 (one-fourth) cup of applesauce or pureed fruit for each egg. Keep in mind that because these add moisture to a recipe, you might have to bake for a bit longer than the recipe calls for.
Use one mashed banana per two eggs in baked sweets.
Try blending two ounces of silken or soft tofu per egg with the liquid in the recipe.
One tablespoon of arrowroot or one tablespoon soy flour and two tablespoons water mixed together also work when added to the ingredients.
Try a mixture of 2 tablespoons flour, two tablespoons water, ½ (half) tablespoon oil and ½ (half) teaspoon baking powder.
Add an extra half teaspoon of baking powder per egg. Or, you can substitute an acidic liquid (buttermilk or thinned and beaten yogurt) for the liquid required in the recipe. To avoid a bitter final product, limit the amount of baking powder of baking soda to one teaspoon per cup of flour.
Consider the way you want to make your batter. Add air to lighten by creaming together the sweetener and the fat before adding dry ingredients. Whipping the liquid ingredients together in a food processor for 30-45 seconds works, as well.
Successful eggless baking will be more successful if you don't take for granted the type of flour you use. For example, whole wheat flour contains gluten, which can make a chewy end product.
Try replacing some of the whole wheat flour with whole wheat pastry flour or any other flour that doesn't contain gluten, like brown rice flour, buckwheat flour, soy flour, corn flour, millet flour, amaranth flour, or quinoa flour. Keep in mind, however, that gluten helps baked goods rise, and substituting with a low-gluten flour may not always work.
For egg-based recipes such as quiches and custards, however, the substitutes should be used for only half of the eggs. And the fat that's added prevents them from working in recipes calling for beaten whites, such as meringues and souffles.
|
0.984373 |
I'm afraid it's a mild morning and raining lightly, though seems to be snowing at the top of the mountain.
Snow down to base later on and overnight, allowing me to report fresh cm in my report tomorrow? Yes please!
|
0.993362 |
As the world broke 2014's heat record, an infographic on how the weather went to the extremes with heat, snow, wildfires and flooding.
From heat waves to cyclones, flooding to drought, 2015 proved to be a wild year for extreme weather across the globe.
Millions of acres of forests burned. Thousands of people died from heat, and thousands more lost their homes to flooding and storm surges. In August, fueled by global warming and El Nino, three major hurricanes were spinning in the Pacific at once. To top it off, the world had its hottest year on record, breaking the record set in 2014 and shattering heat records on every continent, including Antarctica.
|
0.993824 |
If I were to write a post about attending blog conferences, what sort of questions would you like to see answered?
Instead of answering the sort of questions which were posted in response, I'll answer the very questions which were posted.
I think so. That is, the ones I've paid to attend have been worth the money for me. You have to decide for yourself if it's worth it for you. I don't mean to be vague, but you know your money situation better than I do, so, you know: do what works for you. I feel like I should also include the phrases, "Make it work," and, "Pray about it."
I suppose what is good to do at each conference; is it better for learning, networking, freebies, etc.?
Different conferences cater to different audiences; there are conferences which focus on design, food, etc., and this is where 'knowing your niche' comes in to play. To find out what will be going on, read the conference's blog and agenda, but also ask around: what do past attendees of the conference think?
As for my own experience: If you want to learn, go to evo conference, which hosts world-class instructors and panelists on topics ranging from Food Photography to Apps, Gadgets, and Online Tools. Evo also caps their attendance, ensuring manageable (and therefore accessible) class sizes. For networking, any conference is good, I think, because networking is up to you: how are you reaching out, and to whom? BlogHer, because of its size (3600+ attendees in San Diego this year), is good for networking and for freebies, which leads me to: freebies. The more sponsors there are at a conference, the more likely there is free stuff to take home. Again, from the conference's site you can learn about which sponsors and companies will be in attendance.
How to get beyond the social awkwardness when you go alone.
Is going alone awkward? If you're more comfortable being in a group, make arrangements before you go (or while you're there) to meet up with people. Perhaps you'd be willing to share a hotel room with someone (or some two, or some three) -- instant buddy, someone with whom you can check in and compare schedules. Maybe there's someone who you've known online only (you comment on each others' blogs regularly, or chat on twitter) who will also be at the conference: this is the perfect time to be introduced face-to-face! Set up a lunch date, or arrange to go to a party together. We know each other because of the Social in Social Networking, and online can carry over easily to (what the kids are calling) IRL. Be proactive.
How much does it cost to go to one? Lodging/attendance/food etc.?
This depends on the conference.
Lodging for most conferences is available at a nearby hotel, which will usually offer a conference-related discount (often including free wifi during the conference). Remember that the cost will be lower for you if you share a room (do pay attention to occupancy in regards to rates), and if you're in need of a roommate, there are usually message board-type places linked on the conference's site to help you find what (in this case who) you're looking for.
For food, many conferences include meals and/or snack breaks, and there might be food in the form of appetizers (and more!) at parties. Check your conference's schedule. If you're visiting a different city, you may want to plan on spending money to dine at local (famous?) restaurants.
Speaking of Visiting A Different City, another cost is transportation. I like going to evo because it is in Park City, and while I do stay at The Canyons, I can drive, making it very affordable. Just like finding a roommate, consider carpooling to your conference's location (I know a few who drove from Utah to San Diego for BlogHer this year). If you do end up flying, perhaps the fates will be on your side and you'll get to fly with friends (like I did last year on the way to BlogHer). And if you fly, when you get there: will you rent a car? Take a cab (can you split the fare with a friend?)? Does your hotel offer a shuttle?
How do you get invited to the cool parties?
There are so many parties and events, and once you've registered for the conference you'll likely get email alerts about needing to send in your RSVP for this party or that event. Pay attention and reply quickly, though because those events fill up quickly.
The other answer? For the non-conference-affiliated parties? Honestly? By knowing cool people. This is a (harsh?) reality, and a lot of people get their feelings hurt by being excluded. If there aren't many parties on your schedule be prepared to hear about a party you didn't get invited to, and DON'T WORRY ABOUT IT BECAUSE YOU'RE HAVING FUN ANY WAY. Seriously. At BlogHer in New York last year, I was invited to quite a few cool parties, and it was all because of who I know, people who were kind enough to include me on their list(s). This year in San Diego, I did get invited to a couple of parties, but not nearly as many, and there were plenty of parties I wasn't invited to. Still? Fun time, and never without something to do.
How do you get companies to give you free stuff at them?
What benefit would there be for an unknown/introverted blogger to attend?
To have a good time. To get out of the house. To meet people you've only seen online. To spread the word about your blog. To visit a new city. To say you went. To take classes specific to being a blogger. To learn more about the industry. To connect with brands/companies. To get free stuff. To party. To go on vacation.
How do you even find out about them?
Listen (read) about what other people are saying about them, and then 'like' the conference on facebook or subscribe to their newsletter. You could even post a facebook status or send out a tweet which says something like, "Which blog conferences would you recommend and why?"
Is it bad to take as much free stuff as you can? I'm seeing bloggers say it's tacky, and yet it's all I want.
When people talk about tacky, they're talking about when people act tacky, as in: people get invited to a party, and instead of spending time there, attendees hear about The Great Swag, so they enter as soon as the doors open, make a mad dash for (and fight each other over) the gift bags, and then leave. (This may or may not have happened at a conference which I didn't attend.) (But I heard that it did.) You can get free stuff, but be (or at least act) gracious: thank the host/rep, ask questions about the company (or party host if applicable), don't just take the stuff and run. There's time to get all the stuff you want: take the stuff and then make conversation and THEN run. Just kidding. But you never know, by engaging after (or before) receiving The Stuff, you may establish a connection which would result in being able to host a giveaway, or partnering with a company on a campaign, or becoming the next face of Your Favorite Laundry Detergent. You just never know.
Yes. Absolutely. If you're going to a conference, invest in business cards. They don't have to be fancy; in fact, the ones I hate to receive have a piece of gum or whatever stapled to them, or are 'creatively' shaped. I just want a card I can put in my card holder with the rest of them. You can get cards at a reasonable price at vistaprint.com, or you could try your luck at any number of giveaways on stationery blogs and the like.
Include contact information, but be brief also (tricky). My card includes: a photo, my name, my commenting name (~j.), my blog url, email address, phone number, city & state (in case a company says, "I'd like to work with a Utah blogger for this project..."), twitter handle, and blog facebook page url. On the reverse side of my card, I have my blog header.
I'd say to order 200-500 cards. They're always good to have on hand (says me).
Is the point of attending one to promote your blog, or do you just go to have a good time?
Yes. (heh) If I'm being honest, the main reason I wanted to go to BlogHer last year, initially, was to be in New York City. Turns out, I was also at a great conference with awesome parties (in the best city in the world). You can go to promote your blog and you're likely to have a good time, and vice versa.
What do you learn there? What kind of classes are taught?
Many different kinds of classes are taught, like I mentioned above. Check the agenda to see if what the conference offers is your cup o' tea. As for what you learn . . . among other things you certainly learn a lot about people and the politics of blogging.
Do popular bloggers get offended when they introduce themselves and people have no idea who they are?
Did I ever tell you about the time I saw Ree Drummond? Yeah, The Pioneer Woman? (Man, you know what, this deserves its own post, so I'll just abbreviate the experience here.) It was at a party, she was standing in a circle with some of my friends, I entered the circle, and someone said, "Jenny, this is Ree." I looked at her face, looked at her name badge, looked back at her face and said, "Oh, yes. I've heard of you." *AHEM* Did I know she was the owner of her own empire? No, I did not. Her reaction? She smiled and went back to talking to my friends who, I am certain (now) were horrified and/or confused and/or embarrassed. She was classy. And doesn't even remember it, I Am So Sure.
I've also seen Not Classy, but for the most part, when bloggers throw fits because of not being recognized it's not because they're a Popular Blogger, but rather it's because they only think they are.
I hope that helps. If not, please clarify in the comments section. And, please join the conversation(s) on my blog's facebook page.
You know how I hate people? You know. But you make going to a conference sound really fun.
Great post! You've almost made me want to start up my blog again.
Can Used To Be Crappy Now Non Bloggers attend?
I could testify in a court of law that Formerly Phread makes a great conference roommate, if you're in the market for one.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.