proba
float64 0.5
1
| text
stringlengths 16
174k
|
---|---|
0.968084 |
I've discovered that chestnuts are an ancestral type of food. Why is that? Because our ancestors wrote and sang songs about them.
Ha! Get it? I'm hilarious.
While developing this recipe, I realized that most people had never eaten chestnuts. When I was looking for them in several grocery stores, one person even asked "what are you going to do with chestnuts?", to which I wanted to reply "roast them on an open fire with Jack Frost nipping at my nose", but that seemed a tad bit too snarky to a complete stranger. So I very nicely replied "roast them and eat them!". I thought that answer was obvious, but this stranger had a perplexed look on his face as in he never really thought to eat chestnuts.
I don't eat chestnuts often: they're a lot of work to peel and can be pricey. I was only able to find chestnuts near me at an organic specialty market for $10/pound, and after doing some research online, that seems to be the status quo for organic pricing; I unfortunately couldn't find any price point data for any "big box" grocery stores.
Despite the price, I really think that everyone should try roasting their own chestnuts at least once. They're incredibly festive and taste wonderfully warm and nutty just out of the pan. The roasting is quite easy, but the hard part comes with having the patience to diligently cut the chestnuts open before roasting, and then to peel back the hot, but still firm, shell to try to get the nut out whole. I like chestnuts plain with a little salt, but I also like them with a little spice, which is the recipe I've provided for you below.
When I first set out to try to roast these chestnuts, I decided that I was going to invent a new way to roast them.... and I quickly failed. I knew that if you did not cut open the shells of chestnuts before, they were likely to explode. I decided that I was going to do an experiment to see how long it took a chestnut to explode and at what temperature, so I threw one in the oven to test. It was going to be my own foodie version of Myth Busters, but then I got scared and removed it before it was even in the oven for a full 5 minutes. Whomp whomp. Next, I decided to roast them in olive oil on the stove top, but that produced so much smoke that I immediately had to open all the windows and doors to air things out before I got a surprised visit from the fire department. After that, I decided that perhaps I could actually roast them in the fire in my fireplace, but after doing some research, I realized there was a high probability of losing both my pan and the chestnuts at the same time. Take it my advice: roasting in the oven is the easiest, safest way.
This recipe uses a red Thai curry seasoning, which I found at a specialty spice shop, but you could easily create your own blend, or use whatever curry you had on hand. I think that the spice and flavor or the curry combined with a little sea salt against the warm, nutty flavor of the chestnut is a real winner; it is almost like Asian spiced peanuts, but of course, a bit more festive for this holiday season.
In a large cast iron pan or baking sheet, place each chestnut X side up, making sure that each chestnut has a little space to itself.
Place the chestnuts in the oven, and let roast for 15 minutes.
After 15 minutes, remove the chestnuts from the oven, and let cool until they can be handled without burning your fingers, but not completely cool. They should still be warm.
Peel the chestnuts from their shell by firmly tugging back on the corners of the Xs , which should have opened slightly during roasting.
Discard the chestnut shells and place the nuts in a medium sized bowl.
After all nuts have been shelled and are in a bowl, drizzle with olive oil and gently stir to coat.
Add salt and curry, gently toss until chestnuts are evenly coated with spices.
*The Thai red curry blend I used contained black pepper, paprika, cumin, onion, garlic, coriander, lemongrass, cilantro, chili flakes, and ginger.
|
0.999415 |
Malinovsky and Guryev belonged to a faction of Russian scientists and statesmen who cherished the legacy of the programs Gottfried Leibniz drafted for Tsar Peter the Great in the early eighteenth century. The Russian Academy of Sciences was founded according to Leibniz's design, and, while it had been subjected to many assaults and subversions of its scientific and nation-building agenda, by British- and Venetian-linked political and science figures, it remained a center of Leibnizian endeavor. Members of the Academy corresponded with America on scientific research, and closely watched the creation of the American republic. An Academy member, Franz Epinus, drafted the Treaty of Armed Neutrality, under which Russia and other continental European powers protected shipping during the American War of Independence.
In education and culture, this faction was trying to make of Russia something other than the ``gendarme of Europe'' it became after the 1815 Treaty of Vienna. Leading German scholars, including the philologist Adelung, worked in St. Petersburg. Minister of Justice Derzhavin, a poet, was involved in the early stages of a great translation project, to put Greek and other classics into Russian. Count Rumyantsev was a bibliophile, whose collection became the kernel of the huge Moscow-based library, known in the twentieth century as the Lenin Library. (As of 1991, this largest library in Europe has suffered an unknown extent of destruction, as the collapsing former Soviet economy left it with no lights, minimal staff, water dripping onto the books, and cracks in the walls.) Malinovsky became the first headmaster of a secondary school called Tsarskoye Selo Lycée, whose original curriculum plan mandated two three-year courses: Russian, French, German, and Latin grammar (one collaborator on the project proposed to include Greek); religion, ethics, and philosophy; arithmetic, algebra, trigonometry, and physics; history, geography, writing, literature, and rhetoric; art, dance, fencing, riding, and swimming. Count A.K. Razumovsky, the Minister of Education, gutted the curriculum. What did a diplomat or civil servant need with chemistry and astronomy? he demanded. Even more objectionable to him would be the study of ``philosophical opinions on the soul, ideas and the world,'' which would confuse the youths. And Greek, Razumovsky insisted, was not needed by any Russian diplomat, who would fare quite well with French.
Especially after the murder, in 1837, of Tsarskoye Selo graduate Aleksandr Pushkin, the great poet who strove to make the Russian language capable of expressing universal ideas, Russian culture plunged into a relative dark age.
And was a profound economist.
Even during the era of the Holy Alliance, various Russian officials were protesting that without industrialization, Russia would suffer from its excessive dependency on Europe. For forty years after the Congress of Vienna, including the 1825-55 reign of Nicholas I, Russia kept a stiff protective tariff. Absent agrarian reform and a thorough industrial program, however, the tariff by itself would not guarantee strong national development. On the contrary, Russia under Nicholas plunged deep into debt to finance its ``gendarme'' military machine. The House of Stieglitz, court bankers to the tsar, arranged millions of rubles in loans from Baring, Hope and other London and Amsterdam banks, to finance the Russian military. British banks also had financial control of the first Russian railroad, built from St. Petersburg to Moscow in the 1840s, although Maj. G.W. Whistler, formerly of the U.S. Army Corps of Engineers, was the project's master engineer.
The Crimean War (1853-56) left Russia bankrupt. This violent falling out with England also opened the door for a resuscitation of Russia's American connection.
By the late nineteenth century, the American System was the cornerstone of economic development in the U.S. (increasingly under attack after the assassination of President Abraham Lincoln), Japan, and Russia. In Germany and France, political factions were seeking to bring their nations into accord with such policies. There was a potential alliance of industrial republics, stretching from the Atlantic to the Pacific, which would have destroyed the British Empire's trade and financial hegemony. The efforts to disrupt that potential, by the British and their allies on the continent, marked the road to World War I.
In Russia, measures begun during the 1860s alliance between Tsar Alexander II and President Lincoln helped to save the United States from dissolution in the American Civil War (the tsar sent the Russian Navy to protect American ports from the British), and placed at the disposal of Russian entrepreneurs the most advanced scientific and technological know-how, and economic science. In the decades that followed, a small but powerful faction in the Russian Ministry of Finance and among the country's entrepreneurs fought to copy the American System, against bitter opposition from the Russian landed nobility, backed by British and other international financiers.
As a result, Russia's industrial development in the 1890s was among the most rapid in the world.
Tsar Alexander II's abolition of serfdom in 1861 was the first step to prepare for Russia's large-scale industrialization. His regime then launched an overall economic plan, including financial reorganization, agronomy research, development of the petrochemicals industry, and building of a nationwide transportation and communications infrastructure centered on railroads.
At that time, over 95% of the population was illiterate. There was virtually no skilled labor. The landed nobility clung to the most primitive forms of cultivation, making Russian agriculture among the least productive in the world. The nobility forced onerous conditions for the abolition of serfdom, namely the payment of ``redemption'' fees by the peasants in compensation to their former masters.
The foremost statesmen who promoted the American System in Russia were the scientist Dmitri Ivanovich Mendeleyev (see accompanying article), otherwise known for his development of the Periodic Law in chemistry, and his friend and ally, Count Sergei Witte, Russian Finance Minister from 1892 to 1903. Their polemics in connection with the adoption of the protective tariff of 1891, and other writings, expound the economic ideas of Hamilton and List, as they were fought for in Russia at the turn of the century.
|
0.965615 |
When something is unnecessarily complex, it is _____.
Example: The statement "That solution is no longer unnecessary" is ______, couldn't we simply say "That solution is now necessary"?
Note that the word's original meaning is literally "twisted" or "coiled", but it is now commonly used (at least in the US) metaphorically to mean confusingly complicated, as attested in the Oxford definition.
I think the connotation of twisting back on itself is quite useful here. Not only does the double negative cause a "reversal" in meaning, but it is likely to make the reader go back and re-read the end of the sentence so that the reader's eyes trace a Z-shaped path across the sentence: it is both figuratively and physically contorted.
A similar word is tortuous, which also has its roots in physical twists and turns (compare contort) but which is now often used figuratively. I'm more reluctant to recommend tortuous as I think it's easily confused with either torturous or tortious, but it would otherwise also work here.
A Rube Goldberg or Goldbergian.
having a fantastically complicated, improvised appearance: a Rube Goldberg arrangement of flasks and test tubes.
deviously complex and impractical: a Goldbergian scheme for reducing taxes.
or bloated: excessive in size or amount.
I think convoluted would work well in this case.
(especially of an argument, story, or sentence) extremely complex and difficult to follow.
(technical) intricately folded, twisted, or coiled.
Similar definitions are available from Dictionary.com, Merriam-Webster, and Wiktionary.
In addition, the word convolute (and its conjugations) can be used in at least three different ways.
Convolution (noun): "Bill X has many convolutions designed to hide the politicians' true agenda."
Convoluted (verb): "The politicians intentionally convoluted Bill X in order to hide its meaning"
Convoluted (adjective): "Bill X was written in a very convoluted fashion in order to hide its true meaning."
Heath Robinson is typically used for an over-complex machine or design, but I think you could also use it for a describing a 'convoluted phrase'.
E.g. The statement "That solution is no longer unnecessary" is a Heath Robinson, couldn't we simply say "That solution is now necessary"?
The word you are looking for is cruft.
n. Excess; superfluous junk; used esp. of redundant or superseded code.
If you want an adjective not a noun, the corresponding derived term is crufty.
1.) being more than is sufficient or required; excessive.
3.) Obsolete. possessing or spending more than enough or necessary; extravagant.
Obscure: not clearly expressed or easily understood.
Obfuscated: something that has been purposefully made to be more difficult to understand or decode.
I'd be inclined to use kludgy.
Though the meaning of kludge has shifted somewhat over the decades (and was never particularly clear in the first place), a former coworker who was born and raised in Holland explained to me (ca 1976) that the Dutch word "kluge" (I think that's how he spelled it -- he pronounced it "clue-gay") had the idiomatic meaning "deviously clever" in Dutch.
While most etymologies tend to derive the term from a similar German word, I've always considered this Dutch origin to express the meaning most clearly -- something that's a little "too clever for its own good".
It refers more to wordiness than complexity, but it fits and is a nice Scrabble word.
to make something seem larger, more important, better, or worse than it really is.
"That solution is no longer unnecessary" is exaggerated, couldn't we simply say "That solution is now necessary"?
Searching for a complicated explanation over a simple one?
What's the word to describe this behaviour?
Is there an expression or word to describe a person who does something that is unnecessary?
What is the (single) word for: the art/science of naming a complicated matter in a single word?
single adjective capturing “unnecessary” and with the connotation of “dangerous”/“destructive”?
Verb for replacing common words with unnecessary jargon?
|
0.999999 |
Grasp a more nuanced definition of "compensation"
The Fair Labor Standards Act (FLSA) covers over 130 million workers in over 7 million worksites in the United States. Passed in 1938 as part of President Franklin Roosevelt's efforts to end the Great Depression, the law was designed to encourage employers to provide as many jobs as possible at wages an average family could live on. The FLSA created a minimum wage and stipulated overtime pay, encouraging employers to hire more workers, rather than have fewer employees work for longer hours.
Lately, the U.S. Department of Labor has strengthened its enforcement of the FLSA. In fact, FLSA claims numbered 5,393 in 2008, a 49% increase from 2004 figures. By early 2010, FLSA claims had surpassed other private-class actions in employment-related issues. To date, the DOL has recovered millions of dollars in back wages, including an $85-million settlement in 2010.
This training was developed to help organizations address this compliance trend. In particular, the program reviews a key element of the FLSA that DOL investigators are keen on: misclassification of employees (exempt versus non-exempt) and the corresponding miscalculation of wages.
|
0.997962 |
Consider the recursive relation fn = afn-1 + bfn-2.
Given f0, f1, n and X, you must find positive integers a and b such that fn = X.
There are multiple test cases in the input. Each test case is a line with four integers f0, f1, n, and (1 <= f0, f1, X <= 109 and 4 <= n <= 109). The input terminates with a line of the form "0 0 0 0" (without quotation marks) which should not be processed as a test case.
For each test case, write a single line containing the two required integers a and b. If there are multiple solutions, write the one with the minimum value of a. If there is no solution, print "No solution" (without quotation marks).
|
0.999956 |
PM Modi commenced his Israel visit, with a stirring welcome accorded to him by those including Israeli PM Benjamin Netanyahu who broke protocol to receive Modi at the Tel Aviv Airport.
Netanyahu welcomed Modi in Hindi uttering "Aapka swagat hai mere dost", while Modi said "Shalom".
Both leaders further highlighted the historic nature of the visit and the importance of India-Israel relations.
PM Modi in Israel: What's happening?
PM Modi is scheduled to visit Israel on July 4-6, becoming the first Indian PM to visit the country. Modi's visit also coincides with the 25th anniversary of India-Israel diplomatic relations. He had previously visited Israel as Gujarat CM a decade ago.
India was one of the first countries to recognize Israel in 1950 and established diplomatic relations with it in 1992.
India and Israel have many things in common. For one, they have both been former British colonies partitioned on religious lines and thrive in hostile neighbourhoods.
Both countries have further been victims of terrorism and has sizeable diaspora in each other's countries.
"We have been waiting for the last 70 years", said Netanyahu while highlighting the importance of the visit.
Pointing to vast avenues for bilateral co-operation, he stated, "We can do even more, even better together."
Acknowledging that he felt privileged to be the first Indian PM to undertake the "groundbreaking visit", PM Modi hoped that India and Israel can together work against terrorism.
Referring to both Modi and himself as 'tireless reformers', Netanyahu noted that both of them believe in securing a better future and in the strength of talent-based partnerships.
He further referred to India and Israel as sister democracies with "deep respect for the past and boundless optimism for the future".
Modi sought to build a strong security partnership with Israel to respond to shared threats to peace and prosperity, including terrorism.
He further noted that India was focusing on using technology to meet development priorities and provide a scope for strengthening links between academia, scientific research and business.
He further sought work with Netanyahu to evolve a clear action agenda to realize these expectations.
Netanyahu has been unusually warm to PM Modi and broke protocol to welcome him at the airport. Both leaders further shared several hugs. Netanyahu further accompanied Modi to various events including his visit to the Danziger flower farm, where a chrysanthemum flower was named 'Modi'!
India and Israel are expected to ink a number of MoUs across various areas including agriculture, water management, outer space co-operation and education.
India might also move towards boosting Israeli firms' role for 'Make in India' and ink agreements on defence and cyber security co-operation.
India hopes to finalize the Indo-Israeli business fund with a $40 million-corpus, which was approved by Israel recently.
Migrant crisis: Is Italy gearing up to close its ports?
Pointing to an unsustainable situation with respect to African migrants coming in through the sea, Italy has threatened to close off its ports to boats carrying them.
|
0.789443 |
When Apple released their new phone in September, they promised the release in October for their wireless earbuds, but they had to delay the launch due to issues with the device. In December, Apple released the AirPods, and they did not disappoint in what they promised.
While the AirPods may not be perfect and for everyone, they are my favorite device for 2016, and I recommend them to all that want a wireless audio solution that is clear and that allows for listening to audio while traveling in a noisy city where you have to know where you are going.
|
0.955629 |
Have you ever forgotten or been unable to pay a bill and had it go to collection? It happens from time to time, but there is no need to panic. When you are dealing with debt collectors and creditors, you still have rights due to the Fair Debt Collection Practices Act. If you are dealing with such issues, there are a few things that you need to know when debt collectors and creditors come knocking at your door or calling you on the phone.
Request the Information in Writing: A debt collector, within five days of contacting you, is required to provide you with written notice stating the creditor they are collecting for, the amount that you owe the creditor, and what action you can take if you feel that you do not owe the money. Do not rely on them to tell you over the phone. Instead, request that their communication with you be in writing.
Dispute the Debt in Writing if You do Not Think You Owe it: If you feel that you do not owe the money, within 30 days of receiving their written notice of the debt, send them a written notice saying that you do not owe the money. Make sure you keep a copy for yourself and send the letter by certified mail, so you have proof that they received it.
Keep Records of All Messages and Phone Calls: It is important that you document all phone calls that are made and keep all written correspondence to and from the debt collector. Write down the time and date of every call, whom you spoke to, and the summary of the conversation. Also save any voicemails that the creditor may leave.
Understand Restrictions of Debt Collectors: When a creditor calls you, there are certain things they can and can not do. They can not harass you with repeated calls, use obscene or abusive language, call you at work if you have asked them not to, call before 8 a.m. or after 9 p.m., talk to anyone but you or your attorney about the collection, falsely claim to be a law enforcement officer or attorney, or threaten to garnish your wages or sue you unless they actually intend to do it.
Stand Firm and Keep Your Conversations Short: When a debt collector calls they are interrogating you. They are trying to decide if you have the ability to pay the debt, so say as little as possible. Stay calm and stick to the facts regardless of what they say.
Negotiate with Them: Debt collectors are trying to get any payment they can get, which means they are likely to work out a deal with you and take less than the full amount of money that is due. Before paying the reduced amount, however, get the details of the deal sent to you in writing. Once you receive a written confirmation of the agreement, then you can send in your payment. Be sure to pay the debt in a cashier’s check instead of a personal check because you do not want them to have access to your bank account.
If you still have questions about what your rights are when it comes to dealing with collection agencies, we can help. Contact the Cornwell Law Firm and schedule a consultation today to speak with an attorney who is experienced in debt collection and knows what your legal rights are.
Is Credit Card Debt Dischargeable?
|
0.958743 |
And why is the wren "the king"? According to the book above, the appellation goes back to a fable apparently current in several cultures and in Greece and Roman tradition ascribed to Aesop: various birds vied with the eagle for the title of the king of birds. One by one, the eagle out-soared them. But the wren–the wren concealed itself in the eagle's feathers, and as it sensed the eagle was tiring, flew up and away, farther than the eagle could reach.
"…They were cut to the heart: and they gnashed with their teeth at him. But he, being full of the Holy Ghost, looking up steadfastly to heaven, saw the glory of God and Jesus standing on the right hand of God. And he said: Behold, I see the heavens opened and the Son of man standing on the right hand of God. And they, crying out with a loud voice, stopped their ears and with one accord ran violently upon him. And casting him forth without the city, they stoned him. And the witnesses laid down their garments at the feet of a young man, whose name was Saul. And they stoned Stephen, invoking and saying: Lord Jesus, receive my spirit. And falling on his knees, he cried with a loud voice, saying: Lord, lay not this sin to their charge: And when he had said this, he fell asleep in the Lord…."
A few years ago, I was in Paris and after wandering through the Latin Quarter and up toward the Pantheon, landed in front of a church where the denouement of this story is depicted above the entrance. I only slowly put the name of the church, St. Etienne du Mont, together with the story of St. Stephen (Stephen=Etienne en français). I stand by my earlier description of the scene (picture below): "Immediately above the doorway … Stephen is about to earn his way onto the church calendar despite the presence of an angel who, though appearing benificent, doesn't seem the least inclined to stay the hands of a bunch of guys who look not at all hesitant to cast the first stone." One detail of this image I didn't notice before: The sculpture was done in 1863, a good 240 years after the church was dedicated.
The charm and allure of travel: visiting new places, seeing new things, meeting new people, and perhaps choosing not to eat at a chain or “American cuisine restaurant when you’re in unfamiliar territory (that assumes of course that you’re motel stop for the night is within hailing distance of that non-chain eatery, but I digress).
Today we hit the road in Butte about half past 8 in the morning and got off the road–the same Interstate 90 on which we’d been pounding our way eastward all day–at about half past 8 in the evening. Our major stop during that 12 hours: the Little Bighorn battlefield, a little more than 60 road miles east and south of Billings. I’d been there before; Eamon and Sakura never had been, but were game.
I believe that around the year we visited, some Lakota or other Native American activists had caused a stir by daring to stage a parallel event and place their own memorial marker on the battle’s anniversary days, June 25 and 26. That was probably not the first time, but it was a prelude to something serious and enduring. I saw several red granite markers on the field–red, one assumes, in contrast to the white marble markers placed in 1890 to mark the locations of where members of Custer’s command had fallen–that noted the location where Lakota and Cheyenne fighters died “defending their homeland and their way of life (see photos below, and click for larger versions). And in an apparent answer to the red stones, several new white headstones have appeared noting the deaths of several of Custer’s Arikara scouts; these stones note the scouts died defending their way of life. (American history: It’s too new to be over.) Beyond the stone wars, there are other signs, too: Native American guides conducting tourists through the battle sites and a beautiful memorial to the tribes present at the battle on both sides and the losses they suffered there (bottom photo).
Anyway, we spent a couple of hours driving and strolling sections of the battlefield. I made my companions wait while I tried to record sound and take pictures and visit just one more thing over there I’ll be right back! When I finally returned to the car, I apologized and said I hope it didn’t seem to be a repeat of a long ago (1988, too) trip to the Antietam battlefield with Eamon and my brother John. Eamon was going on 9 and didn’t quite grasp what was so interesting in the landscape that every 90 seconds or so we had to pull over and start pointing and jabbering. His moment came when we made it to a famous bridge on the battlefield. Eamon climbed up on one of the sides and walked across Antietam Creek while I held my breath–it was a long way down.
After Little Bighorn, we got back on I-90 for the drive southeast into Wyoming (the route I hoped to take, U.S. 212, is closed about 50 miles east of the battlefield because of a big slide). We whirred past Sheridan and Gillette, the distant Devil’s Tower, and within sight of the Black Hills. We decided to call it quits in Spearfish instead of going on to Deadwood: cheaper motel (I got my room for fifty dollars cash paid to a Hungarian tourist. True story), earlier night.
Tomorrow, we’re looking to make Omaha. What’s between here and there?
From top: On Interstate 90, looking back from Big Timber to the Absaroka Mountains. Three photo panel from left: a stone marking the death of a civilian member of Custer’s regiment on the Little Bighorn battlefield; a stone marking the death of a Sans Arc Sioux warrior at the southern end of the battlefield, and stones for three Arikara scouts who died fighting with Custer’s command. Bottom: Sculpture at Native American memorial at battlefield, on the northern slope of “Last Stand Hill.” Click for larger images.
From “Bang the Drum Slowly,” by Mark Harris.
One thing he knew was north from south and east from west, which I myself barely ever know outside a ball park. We drove without a map, nights as well as days when we felt like driving nights, probably not going by the fastest roads but anyhow going mostly south and east. “Stay with the river,” he said.
“You are with it,” he said, and I guess we must of been. He traveled according to rivers. He never knew their name, but he knew which way they went by the way they flowed, and he knew how they flowed even if they weren’t flowing, if you know what I mean, even if they were froze, which they were for a ways, knowing by the way the bank was cut or the ice piled or the clutter tossed up along the sides when we ever got close enough to see the sides, which we sometimes did because he liked to stop by the river and urinate in it. He would rather urinate in the river than in a gas station. Once a couple years ago I caught him urinating in the washbowl in the hotel in Cleveland. I bawled the daylight out of him. “I wash it out,” he said. Maybe he did and maybe he didn’t. For a long time I kept an eye on him.
Call me Ishmael. Some years ago — never mind how long precisely — having little or no money in my purse, and nothing particular to interest me on shore, I thought I would sail about a little and see the watery part of the world. It is a way I have of driving off the spleen, and regulating the circulation. Whenever I find myself growing grim about the mouth; whenever it is a damp, drizzly November in my soul; whenever I find myself involuntarily pausing before coffin warehouses, and bringing up the rear of every funeral I meet; and especially whenever my hypos get such an upper hand of me, that it requires a strong moral principle to prevent me from deliberately stepping into the street, and methodically knocking people’s hats off — then, I account it high time to get to sea as soon as I can. This is my substitute for pistol and ball. With a philosophical flourish Cato throws himself upon his sword; I quietly take to the ship. There is nothing surprising in this. If they but knew it, almost all men in their degree, some time or other, cherish very nearly the same feelings towards the ocean with me.
There now is your insular city of the Manhattoes, belted round by wharves as Indian isles by coral reefs — commerce surrounds it with her surf. Right and left, the streets take you waterward. Its extreme down-town is the battery, where that noble mole is washed by waves, and cooled by breezes, which a few hours previous were out of sight of land. Look at the crowds of water-gazers there.
Circumambulate the city of a dreamy Sabbath afternoon. Go from Corlears Hook to Coenties Slip, and from thence, by Whitehall northward. What do you see? — Posted like silent sentinels all around the town, stand thousands upon thousands of mortal men fixed in ocean reveries. Some leaning against the spiles; some seated upon the pier-heads; some looking over the bulwarks of ships from China; some high aloft in the rigging, as if striving to get a still better seaward peep. But these are all landsmen; of week days pent up in lath and plaster — tied to counters, nailed to benches, clinched to desks. How then is this? Are the green fields gone? What do they here?
A day late and almost moreso, let me say "happy birthday" to one of the billions of our fellow earthlings who can no longer appreciate it. But unlike nearly all of those, this one — Brian O’Nolan/Flann O’Brien/Myles na gCopaleen (note to judy b: that gC combo is, for once, not a typo) — has occasioned uncounted hours of literary fun and amazement to uncounted masses, but most importantly to me and my friends.
He — Brian O’Nolan, who later became those other fellows — was born 94 years ago yesterday in Ireland somewhere. Through the usual peculiar circumstances of genius and screwed-up upbringing and abusive strait-laced education, he produced many thousands, or hundreds of thousands of pleasing words. In his mid-20s, he produced a novel that was a send-up of Joyce, modernist fiction and literary experimentation, Irish mythology and classic poetry, and, probably, people like me. The novel is called "At Swim-Two-Birds," and has gained enough currency that, well, it’s still in print. His second novel, "The Third Policeman," has built enough of a reputation that no less than the University of California at Berkeley, my current and no doubt temporary paycheck provider, has placed it more than once on its unofficial summer reading list. (For O’Nolan/O’Brien’s part, he reportedly became so upset by early rejection of this manuscript that, in reflecting on the nature of his story, he attempted to destroy it as sacrilegious).
Do not let us forget that I have to buy “Die Harzreise.” Do not let us forget that.
“Harzreise,” said Brinsley. There is a house in Dalkey called Heartrise.
Brinsley then put his dark chin on the cup of a palm and leaned in thought on the counter, overlooking his drink, gazing beyond the frontier of the world.
What about another jar? said Kelly.
Let them be endless as the stars at night, that stare upon the lovers in a ditch–so often would love-crazed Catullus bite your burning lips, that prying eyes should not have power to count, nor evil tongues bewitch, the frenzied kisses that you gave and got.
Before we die of thirst, called Kelly, will you bring us three more stouts. God, he said to me, it’s in the desert you’d think we were.
That’s good stuff, you know, I said to Brinsley. A picture came before my mind of the lovers at their hedge-pleasure in the pale starlight, no sound from them, his fierce mouth burying into hers.
Bloody good stuff, I said.
Kelly, invisible to my left, made a slapping noise.
The best I ever drank, he said.
Buy a scapular or a stud, Sir.
This interruption I did not understand. Afterwards, near Lad Lane police station a small man in black fell in with us and tapping me often about the chest, talked to me earnestly on the subject of Rousseau, a member of the French nation. He was animated, his pale features striking in the starlight and his voice going up and falling in the lilt of his argumentum. I did not understand his talk and was personally unacquainted with him. But Kelly was taking in all he said, for he stood near him, his taller head inclined in an attitude of close attention. Kelly then made a low noise and opened his mouth and covered the small man from shoulder to knee with a coating of unpleasant buff-colored puke. Many other things happened on that night now imperfectly recorded in my memory but that incident is still very clear to me in my mind. Afterwards the small man was some distance from us in the lane, shaking his divested coat and rubbing it along the wall. He is a little man that the name of Rousseau will always recall to me. …"
|
0.989334 |
For ethnic Chinese, regardless of nationality or political affiliation, see Han Chinese.
Chinese people are the various individuals or ethnic groups associated with China, usually through ancestry, ethnicity, nationality, citizenship or other affiliation. Han Chinese, the largest ethnic group in China, at about 92% of the population, are often referred to as "Chinese" or "ethnic Chinese" in English, however there are dozens of other related and unrelated ethnic groups in China.
Woman wearing yellow and green hanfu, a traditional dress of the Han Chinese.
A number of ethnic groups within China, as well as people elsewhere with ancestry in the region, may be referred to as Chinese people.
Han Chinese people, the largest ethnic group in China, are often referred to as "Chinese" or "ethnic Chinese" in English. The ethnic Chinese also form a majority or notable minority in other countries, and may comprise as much as 19% of the global human population.
Other ethnic groups in China include the related Hui people or "Chinese Muslims", the Zhuang, Manchu, Uyghurs and Miao, who make up the five largest ethnic minorities in mainland China with populations exceeding 10 million. In addition, the Yi, Tujia, Tibetans and Mongols each number populations between six and nine million.
The People's Republic of China (PRC) officially recognizes 56 distinct ethnic groups, many of whom live in the special administrative regions of the country. However, there exists several smaller ethnicities who are "unrecognized" or subsumed as part another ethnic group. The Republic of China (ROC or commonly Taiwan) officially recognizes 14 tribes of Taiwanese aborigines, who together with unrecognized tribes comprise about 2% of the country's population.
During the Qing dynasty the term "Chinese people" (Chinese: 中國之人 Zhōngguó zhī rén; Manchu: Dulimbai gurun i niyalma) was used by the Qing government to refer to all subjects of the empire, including Han, Manchu, and Mongols.
Zhonghua minzu (simplified Chinese: 中华民族; traditional Chinese: 中華民族; pinyin: Zhōnghuá Mínzú), the "Chinese nation", is a supra-ethnic concept which includes all 56 ethnic groups living in China that are officially recognized by the government of the People's Republic of China. It includes established ethnic groups who have lived within the borders of China since at least the Qing Dynasty (1644–1911). The term zhonghua minzu was used during the Republic of China from 1911–1949 to refer to a subset of five ethnic groups in China. The term zhongguo renmin (Chinese: 中国人民), "Chinese people", was the government's preferred term during the life of Mao Zedong; zhonghua minzu is more common in recent decades.
The Nationality law of the People's Republic of China regulates nationality within the PRC. A person obtains nationality either by birth when at least one parent is of Chinese nationality or by naturalization. All people holding nationality of the People's Republic of China are citizens of the Republic. The Resident Identity Card is the official form of identification for residents of the People's Republic of China.
Within the People's Republic of China, a Hong Kong Special Administrative Region passport or Macao Special Administrative Region passport may be issued to permanent residents of Hong Kong or Macao, respectively.
The Nationality law of the Republic of China regulates nationality within the Republic of China (Taiwan). A person obtains nationality either by birth or by naturalization. A person with at least one parent who is a national of the Republic of China, or born in the ROC to stateless parents qualifies for nationality by birth.
The National Identification Card is an identity document issued to people who have household registration in Taiwan. The Resident Certificate is an identification card issued to residents of the Republic of China who do not hold a National Identification Card.
Overseas Chinese refers to people of Chinese ethnicity or national heritage who live outside the People's Republic of China or Taiwan as the result of the continuing diaspora. People with one or more Chinese ancestors may consider themselves overseas Chinese. Such people vary widely in terms of cultural assimilation. In some areas throughout the world ethnic enclaves known as Chinatowns are home to populations of Chinese ancestry.
In Southeast Asia, Chinese people call themselves 華人 (Huárén), which is distinguished from (中國人) (Zhōngguórén) or the citizens of the People's Republic of China or the Republic of China. This is especially so in the Chinese communities of Southeast Asia. The term Zhongguoren has a more political or ideological aspect in its use; while many in China may use Zhongguoren to mean the Chinese ethnicity, some in Taiwan would refuse to be called Zhongguoren.
^ a b Who are the Chinese people? (in Chinese). Huayuqiao.org. Retrieved on 2013-04-26.
^ "World's Most Typical Person: Han Chinese Man". China Real Time. Wall Street Journal. March 4, 2011. Retrieved 2014-07-23.
^ "Brief Introduction Chinese nationality". Chinatraveldepot.com. Retrieved 2014-07-23.
^ Jenner, W.J.F. (2004). "Race and history in China". In Alan Lawrance. China Since 1919: Revolution and Reform: a Sourcebook. Psychology Press. pp. 252–255. ISBN 978-0-415-25141-9.
^ "Constitution of the People's Republic of China (Article 33)". People's Daily Online. May 2, 1982. Retrieved 2014-07-23.
^ "Nationality Act". Laws & Regulations Database of the Republic of China. 2006-01-27. Retrieved 2014-07-23.
^ "Nationality Act". National Immigration Agency, immigration.gov.tw. Archived from the original on 27 September 2007.
|
0.999999 |
Today was one to remember. This fantastic day started with a hearty breakfast of melon, eggs, and bell peppers. Breakfast is the most important meal of the day, and this breakfast gave the crew the much needed energy for the long day ahead. Thanks Wiggy! After our meal, the crew walked through the streets of Barcelona for the first time as one giant group. We were headed to a bike tour shop in the Historic Gothic Quarter neighborhood of Barcelona. Many staff and crew stopped in some of the numerous bakeries and coffee shops we saw on the way for a quick taste of Barcelona. Once we finally made it to the bike shop, we split up into two groups, and our journey through the city began. We got to see the beach, La Sagrada Famlia, La Catedral, and numerous other historic building and streets. The most impressive today was La Sagrada Famlia. Absolutely breathtaking. The day was hot and the bike ride was tiring, but luckily we packed salami and turkey sandwiches that held over our hunger until the bike tour was over. Once we got back to the shop, the crew split up and we were able to explore the city on our own. There are no words to describe the quality of food that Barcelona has to offer. After we split up, 2 other crew members and I went on a hunt for food. The first thing I bought was un Bocadillo de Pollo (chicken sandwich), I believe that this was the best chicken sandwich I have ever consumed in my life. All the ingredients were right in front of my eyes, and I witnessed the spiced chicken go straight from the refrigerated display to the griddle. It was complemented by a loaf of bread and a plethora of condiments. What an amazing sandwich. Best way to spend 4.5 Euros if that’s what you’re looking for. Next, I went to a Turkish restaurant down the street and had a chicken and beef kebab that was also very delicious. Prior to making our way back to the boat, we did some more walking around and stopped by the best gelato shop we have come across yet. It’s called Swiit, and it’s owned by a married couple, a man from Sardinia and a woman from The United States. We headed back to the boat for squeeze, something we do every night before dinner as a whole crew. Everyone holds hands in a big circle and each person has to say what they appreciated from the day, and answer a daily question that the skipper has to come up with. Today’s question was: Name a moment during the last 22 days where you saw someone, crew or staff, go out of their way to perform an act of kindness. After squeeze we had a sign-out night, and I was accompanied at dinner by seven other crew members. Emmalee, Jackie, Natalie, Tait, Lex, Jonas and Jake. We decided to try out a Tapas/Paella restaurant, and we ordered a LOT of food. Personally I went for Paella Bogavante. Again, like all the other food, it was absolutely amazing. To end the night, I went to the fair across from Argo and rode the ferris wheel with a good friend. In my personal opinion, day 22/90 was the absolute best one so far. It included food, biking, ice cream, sightseeing, and most importantly I got to share it with my crewmates. Me encanta Barcelona!
Pictured: Beach of Barcelona; Gaud Fountain; La Sagrada Familia; La Catedral; La Plaza Santa Jaume; Gelato.
|
0.999981 |
For the extreme-right movements in Europe and the U.K., see New Right (Europe). No, they're not the same.
The New Right (aka Reagan Conservatism) refers to a conservative movement which brought key elements of the American Right under the banner of red-baiting anti-communism. The movement was so named because it set itself apart from the isolationist and laissez-faire "Old" Right.
The New Right had its roots in the post-WWII era, beginning with the McCarthyite scare of the early 50s and the death of Ohio Senator Robert Taft. Its origins are often traced to William F. Buckley and his National Review magazine, founded in 1955. The term "New" Right was coined in 1962 in an article for "Young Americans for Freedom," and became a popular descriptor for them in '75. Other writers also cite such New Deal opponents of the 1950s as Clarence Manion and L. Brent Bozell, Jr. (who first attempted what later became the Southern strategy), Peter Viereck, who may have been one of the immediate intellectual forebears of the New Right (but would soon denounce what it became), and Friedrich Hayek.
Some commentators have called the "Three Legged Stool": big biz, the Christian Right, and foreign policy hawks.
Modern conservative thought began in the '50s, as a reaction to what many considered the consensus liberalism of post-WWII America and the onset of the Cold War. F.A. Hayek's The Road to Serfdom (1944), William F. Buckley's God & Man at Yale (1951), an early critique of liberal academia, and Russell Kirk's The Conservative Mind (1953) were important texts, along with the founding of National Review. Throughout the mid to late 1950s, this new-model conservatism gained momentum among college students and twenty-somethings; M. Stanton Evans documented this trend in his 1961 book Revolt on the Campus, which prematurely proclaimed the '60s a conservative decade.
Manion and Bozell first attempted to build a coalition fusing anti-New Deal fiscal conservatism with an inherently anti-civil rights "states rights" platform, and talked of forming a third political party during the late 1950s. The 1956 independent presidential campaign of T. Coleman Andrews running on such a platform went nowhere, carrying only one county each in Virginia and Tennessee, and 0.17% of the nationwide popular vote. Under the influence of Buckley they soon dropped the third party talk, and set out to draft Barry Goldwater to run as a Republican. Another meeting was sponsored in 1959 by Kent Courtney and endorsed by several others on the right (Utah governor J. Bracken Lee, Dan Smoot, Thomas J. Anderson) also calling for a new conservative party; Courtney would also soon get on the Goldwater bandwagon but continue advocating for a new third party on the far-right.
1960 proved a banner year for the New Right. In September, Buckley, Bozell, Evans and several other conservatives issued the Sharon Statement, setting down a series of principles for the conservative movement. These conservatives also founded Young Americans for Freedom (YAF), a student organization which remained a powerful national organization through the mid-'70s. The same year saw the publication of Barry Goldwater's book, The Conscience of a Conservative. Actually ghostwritten by Bozell, it became a best-seller and introduced conservative ideology to a broader audience.
“”Apparently, the rich had had it. They weren't going to take the likes of us anymore. They also were in no mood to respect their former president, Eisenhower, who was nearly booed down until the crowd finally got a look at his scarlet face and raging eyes. One furious look from the ancient lion shut them all up. He said something and then turned his back on a people he'd never much cared for.
The movement got a big boost when a tax revolt movement in the 1970s culminated in the passage of California Proposition 13 in 1978, rolling back property taxes. Viguerie asserted that the biggest boost, even more than the late 1970s tax revolt, was public opposition to the Panama Canal treaties and the New Right's ability to mobilize that opposition. He also cited as another big boost the influence of the Religious Right in flipping evangelical voters, a key constituency, from voting overwhelmingly for Jimmy Carter in 1976 to overwhelmingly for Reagan just four years later. The New Right soon had its biggest success when one of its own was elected president in 1980.
“”Gingrich assumed that when he became speaker, he could co-opt the radical outsiders he brought with him to Washington. It never happened. Their disdain for Washington, government, and Congress continued, even during their majority status. And, as Sean Theriault writes in The Gingrich Senators, many of them migrated to the Senate, making its culture more partisan and combative.
The break with Reagan-Bushism has been in the offing for a long time. After the fall of the Berlin Wall and the effective end of the Cold War, the New Right coalition turned on each other. The Old Right was revived (under the paleoconservatism label) by people such as Pat Buchanan; a new populism fed into movements such as the Reform Party, whose members included a young Donald Trump; the Goldwater Republicans were effectively supplanted by a newer, some would say nastier, brand of conservatism typified by conservative talk radio, Pat Robertson's Christian Coalition, and in 1994 by the Newt Gingrich-led Republican takeover of the United States House of Representatives. This brand of conservatism influenced the George W. Bush administration.
↑ 2.0 2.1 Perlstein, Rick. Before the Storm: Barry Goldwater and the Unmaking of the American Consensus. 2001, Hill and Wang.
↑ There was a major split in YAF in the late '60s, due to the rise of the libertarian movement within its ranks and disillusionment over Vietnam and Watergate. YAF still exists today, but in a much-diminished capacity.
↑ "What Is The Alt Right?"
↑ "The Fight for the Alt-Right: The Rising Tide of Ideological Autism Against Big Tent-Supremacy"
↑ "Vox Popoli: What the Alt Right is - Vox Day"
↑ "The Alt Right and the Impossibility of Conservatism"
This page was last modified on 21 March 2019, at 21:41.
|
0.980133 |
Dưới đây là các giường ngủ với giá rẻ & Buổi ăn sáng tại các thành phố điểm đến phổ biến nhất. Chọn một địa điểm để mở rộng tìm kiếm của bạn để tất cả tài sản gần thành phố ưa thích của bạn. Chọn trước bây giờ để dự trữ ngay lập tức trực tuyến.
Hostel - The Best Hostel in Milan, is a Villa situated in the center, only 5 minutes by walk to the main street.
Guesthouse - Amici guesthouse is situated in a top and strategic location in Milan. This excellent position, optimally served by bus, tram and subway, allows to reach important places of the city in few minutes.
Hostel - The Hostel Galla, newly built hostel is situated behind Via Nicola Porpora, in a small private road (Via Galla Placidia, 5).
Hostel - L'ostello si trova a soli 1 km da San Siro stadio, mentre la stazione ferroviaria Cadorna 4 fermate di metropolitana. Duomo dista 6 fermate di metro dall'ostello e Stazione Centrale di Milano dista 15 minuti di metropolitana di distanza.
Bed and breakfast - This is sort of apartment along with kicchen facility and belcony.Specially decoreted with a romentic view.Strategically situated with in short walking distance from Rome's main Termini Station.
Rome, Via Napoleone Iii, 75-1St Flr.
Hostel - A new CHERRY HOSTEL which has spacious space for everyone, offers comfortable and low budgeted rooms with all types of rooms you need.
Bed and breakfast - Relaxon B&B is located in the historical centre of downtown Rome within a short walking distance from the Termini Railway Station and all major sites.
Hostel - Close to the Vatican City, BellaRoma Hostel is a new place in Rome designed for young low budget travellers. Established this year 2004, BellaRoma Place is a sister of Pensione Ottaviano Hostel and Sandy Hostel.
Hostel - Located near the Colosseum & the Roman Forum, Sandy Place has grown to be one of the most popular budget accomodations in Rome.
Bed and breakfast - A brand new accommodation strategically situated within short walking distance from Rome's main Termini Station. Each room has been tastefully decorated with a global theme.
Hostel - ...cheap and chic lounge for young people...colorful with a wonderful view on the mount Etna!
Bed and breakfast - The idea behind our Bed&Breakfast SolSicily is to offer a 3-star service at an affordable price.
Hostel - L’Ostello è una struttura ricettiva caratterizzata dalla condivisione degli spazi d’accoglienza con altri ospiti e da un costo medio-basso.
Hostel - Hostel and Hotel Bella Capri is located in the most central part of the City,right in front of the port and next to the Bus station to Pompei and Amalfi Coast.
Hostel - La Controra is a former monastery with garden, transformed into a friendly hostel in the centre of Naples.
Hotel - Hotel D'Anna is a comfortable two-star hotel, family management since 1949, located in Corso Arnaldo Lucci 199, about 30 meters from Central Station in Piazza Garibaldi, near the business center and the historic center of Naples.
Hostel - New cozy backpackers Heaven right across central railway station and local trains to Pompeii and Sorrento.
Hostel - Hostel Agata is a great places to strart!Many services are included are prices.Better conditions impossible!
House rental - In the heart of Sicily lies Caccamo among prickley pears,solitude and enchantment.
Bed and breakfast - Il B&B Terraferma è immerso in un raffinato paesaggio di campagna.
Bed and breakfast - Is offered as a unique character and exclusive, designed to offer Tourists familiar hospitality and charm at the same. B&B Etna Taormina offers double, triple and quadruple bedrooms, spacious and comfortable, with attention to detail.
giường giá rẻ nhất và bữa sáng và rẻ B & B trong Italy - Bed Breakfast Reservations.
|
0.970967 |
Everyone is talking about cloud solutions today, but not everyone means the same thing when they do, such as the types of services that meet their requirements. While there is this general idea behind the cloud, there are many iterations that companies look to in order to actually use the technology. Cloud platforms offer a variety of ways for businesses to increase their IT capacity or functionality without having to add infrastructure, personnel, and software.
Here are six different types of cloud services and a little bit about what they offer to businesses.
A/S Cosesy is a company that has been specialized in IoT Cloud technology for home security systems since 2010. Its IP-based solution has brought home security to a new level, offering 24/7 surveillance on Internet-connected hardware, a feat that out-competes the more traditional GSM solutions. Using IoT P2P technology for all encrypted connections, the Cosesy Cloud is low-cost, scalable, and handles high volume simultaneous alarm systems.
IntelliVision is a leading software and solutions B2B company in the intelligent video analytics, smart camera, and automated monitoring market, where it provides solutions for security, surveillance, traffic/transportation, automotive, robotics, drones, smart home/IoT, mobile, and retail analytics solutions. IntelliVision's analytics add the “Brains behind the Eyes” for cameras by analyzing the video content, extracting meta-data, sending out real-time alerts, and providing intelligence on the video. With its advances in smart camera, PC/server, and Cloud analytics technologies, its solutions are being deployed in cameras for the Smart Home, Smart Business, Smart Machine, Smart Transit, Smart Retail, and in many applications.
Ayla Networks, from its inception, was to enable the Internet of Things. Dedicated to solving the idiosyncrasies of developing and managing connected devices, Ayla provides a number of products that enable customers to quickly connect any device to the cloud and applications, and make meaningful decisions from their data. Ayla's Agile IoT Platform, Agile Mobile Application Platform, and Ayla Insights, provides device manufacturers with the connectivity, security, and feedback loop needed to create better products and more engaging user experiences.
TriClouds Technology is a leading provider of IP Surveillance solutions, offering a wide range of services from residential to business. It provides telecom operators and large retailers with a complete cloud platform to enable IoT solutions, including data and video, end-to-end. Its cloud solution delivers an end-to-end platform that runs across devices, clouds and apps to create secure connectivity, data analytics and feature-rich customer experience.
The Kalay Platform delivers end-to-end solutions to meet fast-developing and changing IoT environment. With a strong focus on the technology builds for intelligent relationships and communication between devices, the Kalay Platform structure can easily integrate and expand your family of devices. It empowers IoT consumer devices like no one else, enabling solution providers and technology brands to combine product offerings with cloud services.
Following the successes of its Orbweb.me, the company recently launched an IFTTT-like IoT platform called GoToMyThings (GTMT), designed as a service portal for users to manage, monitor and sync their connected devices. The platform now supports smart home devices such as IP cameras, switches, lighting, smart doorbells, gateways, sensors, thermostats, vehicles, and more by various partners of different brands. This platform is designed to enable cross-device communication where all of the connected devices are interoperable.
|
0.999955 |
We are constantly suggesting the best meals to eat and the ones to ignore for diabetics as well as suggesting low calorie food options. You can find selected restaurants offering diabetic meals as well as low calorie diet food options. if you are concerned about foods with high sugar or high cholesterol levels. You can also find instructions on picking the right food from the menus while looking for the best restaurants in Brian Head, UT.
So far service in Brianhead has been the worst ever, that being said, this restaurant (Cedar Breaks Lodge) has completely changed my view. Larita was so nice and an excellent server. We loved her! Food was delicious and coming from someone who works in hospitality, I completely recommend this restaurant and Larita!!
My friend and I came here over Memorial Day weekend. Was kind of surprised how dead it was inside for being a holiday weekend. Sat at the bar and had burgers, fries, and a few drinks. The burgers were huge and came with all the fixings. I had the sweet potato fries and my friend had the onion rings. Yummy stuff but couldn't finish it all. Our bartender, Tanner, was super friendly and tried to find us the Tigers ballgame on TV (they didn't have the channel) so my date watched golf instead (snooze fest to me, lol). Great friendly service and decent food. The drinks were a little pricey ($10 for a glass of house chardonnay) but nothing too crazy. Not a bad way to spend a Sunday afternoon.
Overpriced, bland food, not great service. Took almost an hour to get our meals. We had two burgers, soup, and a salad. The bread on the burgers tasted like cardboard and the meat was dried out. (Fries were good) Soup looked great but had no flavor. Server was rude slow and took her sweet time when she only had 3 tables to cover.
I feel like the people that are giving this place good reviews have never had good pizza. I tried both the pizza and the calzones and both are underwhelming although they do pass as food. The sauce was bland...needs garlic badly. Service sucked...at the end of the night they actually had the nerve to rush us out of there before they were even supposed to be closed on a Saturday night. We still had a pitcher of beer to finish. This is where I have to tell you about the horrible mozzarella caprese salad that we ordered on the recommendation of the cashier/waiter. It consisted of refrigerated greenish tinted red roma tomatoes, with chopped romaine lettuce and rather than fresh mozzarella, like a caprese salad is supposed to have, it was grated pizza quality mozzarella cheese.
Went to this place for pizza on July 5th, I know they close at 9:00 but they had people waiting for their pizza to be cooked and yet when we walked in at 9:03 they turned us away. The place had several people eating and like I said, some were waiting for theirs to be finished. They are the only pizza place in Brian Head and I think it's incredibly rude they turned us away. We wanted to take our food togo and it would have not prevented them from getting out of there any later.
Felt amazing after eating here! Ordered the beef fajitas for 2, delicious, great big meal after skiing! It was great and definitely one of the better places to eat on the mountain. We loved their chips and salsa too. My husband didn't want a 2nd round of them but when the waitress must've saw the sad look on my face cuz she winked and brought me more! I love her! Make sure to keep your orders simple and clear. When I wast here some a-holes ordered a confusing order to a waitress who didn't speak much English, then got pissed when it came out slightly wrong! Hello?! Don't be an a hole.
|
0.947798 |
For days I have been deliberating on my feelings about Kingdom Hearts III. Days of wondering what is good, bad, missing?
As a long time Kingdom Hearts fan, like many of you, I have been waiting for a long time to see the end of the Xehanort saga and I have many emotions surrounding the overall experience. There is this overall feeling of disappointment that drowns my entire experience regarding the game.
Kingdom Hearts had a slow and methodical combat system the rewarded timing and precision to your actions. Kingdom Hearts II had a diverse and wide range of skills to customize your combat experience to your liking or to fit your situation. Kingdom Hearts III has many abilities that give you more delicate and exciting ways to mash the X button to win. I felt there was no third dimension when it came to abilities since every ability was the best option. The lack of reaction commands that KHII had is also a slight disappointment that I would be fine with if they didn't replace it with many different dominant strategies. Triangle becomes the "Do a ton of damage for no reason" button that provides no diversity in which or when to press it. The pacing also is very strange. The worlds are very few, very long and in general very linear. There are exceptions to this (Toy Box and San fransokyo) but this game suffers in general with a slow and meandering pace until the final arc where things finally pick up. Other than my general complaints the gameplay out of context is fine and fun enough even though the game itself suffers from a low difficulty and a lack of critical mode.
I do not fall into the camp of people who find the story of these games beyond dumb and write them off but to say there is no problems would also be an understatement. The biggest problem the game suffers from is being narratively one sided. The Disney worlds just don't add anything to the plot outside of introducing villains to Sora and reintroducing them to us the players. Now the choice of villains for said worlds I personally find fantastic (Marluxia in the Kingdom of Corona and Vanitas in Monstropolis) The villains for these worlds offer a sort of poetic feeling as their own plot are thematically relevant to the compartmentalized Disney stories. Even with the excellent choice I can't shake the feeling of irrelevance these worlds hold to the overarching narrative. The positives the story holds in general is how they handle the ends to the individual organization members. When one is defeated they are given a moment of redemption that feels rewarding and heart felt and this sentiment stretches even to the main antagonist. I get a feeling that Sora genuinely forgives these people and is happy they are able to move on. Speaking of Sora this game also gives Him, Donald and Goofy some of the most charming character chemistry the series has ever had and that alone let's me enjoy them as characters.
This field is where I think the game excels the most. The attention to detail that every place and character model has is stunning. As well as graphical cohesion within the individual worlds is wonderful. Like when the cast goes to The Caribbean you see the textures for the main trio holds a more realistic and washed out palette to match the art direction. I also appreciate the animations and how they also are very fluid, and in the case of Disney worlds, accurate. I think of Woody in Toy Box as the prime example. His cartoony and over the top run from the movies is retained here. Also a shout out to the frame rate being an, almost, consistent 60fps for the entire experience. Overall I say the visuals are the most stand out fantastic feature this game holds.
The new music this game has is nothing short of brilliant. I still listen to the Scala ad Caelum theme every day. I like the general softer sound this soundtrack has and in comparison to the other KH games it holds up along with the best. The big problem though is that this game has a habit of re-using music verbatim from previous games. I think of the song "Lord of the Castle" as the example. It is used un-remixed from the 1.5HD collection and to me I feel that is a waste. Since KHIII has an overall softer tone to its music when an old song is just simply copy and pasted I get a sense of musical whiplash. I mean, they remix plenty of songs like "Unforgettable" so I don't see why they don't remix others. Other than my big complaints the soundtrack is really stellar.
Kingdom Hearts III is a celebration and ending to this era of Kingdom Hearts games but I feel it has a hard time escaping the shadows of its predecessors. I referenced context earlier and that is where this game is shot in the foot. As an end to a plot I cannot remove it from the previous games where, in comparison, it falls short. The experience feels like a regression and most egregiously a disappointment. Now was this game a bad experience? No. I personally had a ton of fun especially in the final act where everything goes from mediocre to great. Especially the Final Boss which is a perfect end cap to the story.
To those long time fans I say Yes but you know you've already played it. To newcomers? No. To you the story will be a nonsensical mess with mediocre and repetitive combat that has little room for character building and self expression. Basically like this game your enjoyment will also suffer from context.
|
0.965413 |
Idea for a TV show: "Britain's Least Haunted"
Basically, Professor Richard Dawkins (check contract availability; otherwise Simon Hoggard) shows up at a house or castle which has a lot of colourful local legends, and then stays there overnight, and literally nothing happens except that Dawkins stares coldly into the camera and reads the temperature out every fifteen minutes. For eight hours at a stretch.
I am not necessarily anticipating huge numbers of viewers for this show, but it could be the backbone of a "Discovery: Atheism" subscription channel, and based on the observed behaviour of the book-buying public, I am pretty sure that quite a lot of militant atheists would be happy to subscribe to the thing and never get round to watching it.
|
0.953806 |
What are things I need to consider when designing around the HMC?
User defined address mapping can increase performance. For example, accessing a vault from a local quadrant will have lower latency accessing that vault from a link outside the quadrant. Making small adjustments to ensure these efficiencies can increase performance results.
The main point is that the basic mechanics of memory use will be the same, but now you have multiple banks in each vault, plus you can use the HMC to stir the address bits around however you want (i.e. you can do all the banks first and then the vaults or all the vaults first and then the banks). In this way, you have a lot of flexibility in how to order the address so that you can do what you are currently doing, but with greater flexibility.
If you are using large packets (i.e. 128 byte packets, 64 byte packets) you should see close to the theoretical numbers for HMC bandwidth. This is especially true if you are not using all four links on the part. If you start doing small scatter-gather traffic patterns, you may see that drop if you are using all four ports, but again if you are just using 1 to 2 ports, you may still see max bandwidth even with smaller packet sizes.
Due to the internal 32-byte granularity of the DRAM data bus within each vault in the HMC, inefficient utilization of this bus occurs when starting or ending on a 16-byte boundary rather than a 32-byte boundary. An extreme example of this would be the host issuing a series of 16-byte read requests. Each read request would fetch 32 bytes from the DRAM and return half of the data in the response packet, throwing away the other 16 bytes of data. For bandwidth optimization it is advantages to issue request with 32-byte granularity. See page 118 of attached specification document.
The address mode is selected such that sequential request are generally mapped to different vaults and then different banks within a vault, thus avoiding bank conflicts. This is enforced if the maximum block size chosen is the same size as the requested block size, then a request streams addressing pattern, which is generally incremental in nature, but when a maximum block size is chosen that is larger than the largest packet size used by the host, that results in the possibility of having multiple packets addressing the same MAX clock, thus the same bank within a vault. For example, if the host issues multiple 32B requests, it would issue a request stream that increments bits 5 and above. This may result in trying to access four 32B blocks within the same 128B MAX block. The bank conflict management within each vault controller can re-order certain number of requests to avoid bank conflicts, but if the requests stream floods a vault controller with many request trying to access the same bank, desired bandwidth will drop. Therefore, it is important for the system architect to configure the maximum block size based upon the most frequently requested data size.
The HMC controller is a fully pipelined block designed to maximize throughput. While both read and write operations require multiple clock cycles to complete, the controller allows users to issue many read and/or write requests to the controller before the first response is returned by the HMC. This pipelining of read and write requests greatly improves the throughput of the memory for user applications.
What kind of addressing scheme should I use for my workload!
If I want to use HMC Chaining, what are the most optimal configurations in terms of performance and latency?
|
0.932031 |
One of the waste products from Bitcoin mining is the heat that is given off by the GPUs. On cold days could this excess heat be used to warm a home, essentially creating a data furnace? When it gets warmer then the rig can be optionally shut down.
As I understand it, the income generated from mining bitcoins at least pays for the electricity so long as you have a rig that is capable of meeting the difficulty. This would therefore imply that so long as you have already got a suitable rig lying around the house (e.g. for gaming) then running it up during the day would be useful. If the house also had solar panels then that would also benefit the earning potential.
Are there any calculations available to support/refute this?
Yes, you can use a Bitcoin mining rig to heat your home.
Your technical ability to maintain the equipment, and your time available to do so. If it has a problem and you don't have time to fix it, you stop earning mining income.
There's no guarantee that mining earnings will pay for the electricity to run them, let alone pay for the cost of the equipment and the labour incurred maintaining it - this is dependent on the demand for Bitcoins, and your costs. There's always a risk that the exchange rate will drop to the point where it's not worth mining at all, or that new technology (eg ASICs) will make your hardware obsolete before it's paid for itself.
Any web-based profitability calculators that exist won't necessarily take into account all the factors above, and none can predict the Bitcoin exchange rate, so their usefulness will be minimal. I recommend just creating a spreadsheet to do the calculations. To include the value of the heat output in your calculations, consider what you would need to otherwise spend to obtain the same heat output, and include that figure as profit on top of the mining profit (but also of course account for the cost of electricity to run the rig).
To predict the electricity usage of a particular setup, see this hardware comparison - a carefully built rig can run 4 graphics cards which might output 600-800W (or more) of heat. Using a desk fan (or similar) to keep strong air flow on the rig should reduce the potential of a convective flow of air taking the rig's heat straight up to the ceiling, where it won't be felt in cold weather.
I live in Florida so it's not very cold but when it does dip down I just start mining :D and tuck myself into bed!
By the way, most people have to pay for electricity to heat their homes anyway so the fact you get Bitcoins is just an added bonus to the mining-for-heating!
ASICs might make a data furnace idea easier since they take up much less space to generate high hash rates per watt. The Block Erupter USB project puts an ASIC in a powered USB stick package. Imagine a series of these ASICs coupled to a standard home baseboard radiator heat sink and controlled by a low power Rasberry Pi computer with Wifi to the net.
As long as you are buying a device that breaks even on power, the primary cost factor is upfront cost to buy the hardware. Right now, they cost about $200 per Block Erupter for 300 Mhash/sec at around 3 Watts of power.
At that price, getting to the 1200 Watts typical for a room heater would cost $80K for 400 units. However, you could recoup this investment by selling the bitcoins generated. After deducting power costs, you could recoup the cost in only a year at current difficulty levels. Break even could take much longer than a year though as many ASICs are now hitting the market and will increase difficulty levels. But the point remains that after recouping your hardware cost the heat becomes free.
For those of you living in California this is not a big deal, but free heat to anyone living in Scandinavia would certainly be appreciated.
Not the answer you're looking for? Browse other questions tagged mining-setup mining-hardware or ask your own question.
disregard power costs for mining in the winter?
Can you use an external PCI expansion box for mining?
How many Watts can I safely draw from a typical US home circuit for Bitcoin mining?
Can I use one graphics card for games and one for Bitcoin mining, without losing performance?
Which bitcoin miner ASIC can use without leave power on computer?
Can a competitive miner be crafted at home?
Can I use a Gridseed ASIC miner with a Raspberry Pi 3 B?
|
0.994187 |
If you read the essay, you'll see that Olson argues mostly on the basis of constitutional law, and he states his case eloquently. But constitutional, states-rights issues are beyond what I want to address here (and I've handled them ad nausea previously). My basic point all along is that on a national controversy this big, it's best to let the will of the voters prevail, for no court ruling will have the same kind of popular legititmacy as that found in a majority vote of the electorate.
And that is precisely the problem with the conservative position on gay marriage. When it comes to issues of constitutional import, and rights that have been clearly delineated as "fundamental" for more than a century, the vote of the populace doesn't trump constitutional considerations. You cannot have a debate about the legality of gay marriage that is disentangled from the Equal Protection issue or the Due Process Clause. This is the entire point of the Bill of Rights and the 14th Amendment. We have a Bill of Rights and an Equal Protection Clause to protect the rights of the minority from the federal government, from our state government, from the police, from the IRS, and yes, from discriminatory referenda by voters themselves.
Simply because a majority of citizens are against gay marriage doesn't mean that gay marriage should be outlawed. As Olson noted, a vast majority of Americans were against interracial marriage at the time of Loving v. Virginia in 1967. A majority of Americans were also in favor of the "separate but equal" policies that were invalidated by Brown v. Board of Education in 1954. These are not novel arguments, but they are arguments that conservatives seem to have great difficulty addressing.
As has been noted here before, I have yet to hear a single conservative take on Olson from a purely legal perspective -- in light of marriage being deemed a fundamental right since the 1880s, in light of Loving v. Virginia, and in light of the Equal Protection Clause of the 14th Amendment -- and make a legally coherent argument against his position. The bottom line is that marriage is a fundamental right, and it is the government's burden to demonstrate that Proposition 8 is critical to advancing a compelling governmental objective that is at least partially secular. These are indisputable principles of constitutional law, and all conservatives want to do is call Olson a turncoat and shriek about judicial activism.
|
0.9392 |
Charles-François Gounod (/ɡuːˈnoʊ/; French: [ʃaʁl fʁɑ̃swa ɡuno]; 17 June 1818 – 17 or 18 October 1893) was a French composer, best known for his Ave Maria, based on a work by Bach, as well as his opera Faust. Another opera by Gounod still performed is Roméo et Juliette.
Gounod died at Saint-Cloud in 1893, after a final revision of his twelve operas. His funeral took place ten days later at the Church of the Madeleine, with Camille Saint-Saëns playing the organ and Gabriel Fauré conducting. He was buried at the Cimetière d'Auteuil in Paris.
Charles Gounod in 1859, the year of the premiere of Faust.
Gounod was born in Paris, the son of a pianist mother and an artist father. His mother was his first piano teacher. Gounod first showed his musical talents under her tutelage. He then entered the Paris Conservatoire, where he studied under Fromental Halévy and Pierre Zimmerman (he later married Anne, Zimmerman's daughter). In 1839 he won the Prix de Rome for his cantata Fernand. In so doing he was following his father: François-Louis Gounod (d. 1823) had won the second Prix de Rome in painting in 1783. During his stay in Italy, Gounod studied the music of Palestrina and other sacred works of the sixteenth century; he never ceased to cherish them. Around 1846-47 he gave serious consideration to joining the priesthood, but he changed his mind before actually taking holy orders, and went back to composition. During that period he was attached to the Church of Foreign Missions in Paris.
Gounod late in his career.
During 1855 Gounod wrote two symphonies. His Symphony No. 1 in D major was the inspiration for the Symphony in C composed later that year by Georges Bizet, who was then Gounod's 17-year-old student. In the CD era a few recordings of these pieces have emerged: by Michel Plasson conducting the Orchestre national du Capitole de Toulouse, and by Sir Neville Marriner with the Academy of St. Martin in the Fields.
Fanny Mendelssohn, sister of Felix Mendelssohn, introduced the keyboard music of Johann Sebastian Bach to Gounod, who came to revere Bach. For him The Well-Tempered Clavier was "the law to pianoforte study...the unquestioned textbook of musical composition". It inspired Gounod to devise a melody and superimpose it on the C major Prelude (BWV 846) from The Well-Tempered Clavier Bk. 1. To this melody in 1859 (after the deaths of both Mendelssohn siblings), Gounod fitted the words of the Ave Maria, resulting in a setting that became world-famous.
Gounod wrote his first opera, Sapho, in 1851 at the urging of his friend, the singer Pauline Viardot; it was a commercial failure. He had no great theatrical success until Faust (1859), derived from Goethe. This remains the composition for which he is best known; and although it took a while to achieve popularity, it became one of the most frequently staged operas of all time, with no fewer than 2,000 performances of the work having occurred by 1975 at the Paris Opéra alone. The romantic and melodious Roméo et Juliette (based on the Shakespeare play Romeo and Juliet), premiered in 1867, is often in the repertoire of the world's opera houses but has never come close to matching Faust's popular following. Mireille, first performed in 1864, has been admired by connoisseurs rather than by the general public. The other Gounod operas are rarely performed.
From 1870 to 1874 Gounod lived in England, at 17 Morden Road, Blackheath. A blue plaque has been put up on the house to show where he lived. He became the first conductor of what is now the Royal Choral Society. Much of his music from this time is vocal, although he also composed the Funeral March of a Marionette in 1872. (This received a new lease of life in 1955 when it was first used as the theme for the television series Alfred Hitchcock Presents.) He became entangled with the amateur English singer Georgina Weldon, a relationship (platonic, it seems) which ended in great acrimony and embittered litigation. Gounod had lodged with Weldon and her husband in London's Tavistock House.
He performed publicly many times with Ferdinando de Cristofaro, a mandolin virtuoso living in Paris. Gounod was said to take pleasure in accompanying Cristofaro's mandolin compositions with piano.
Later in his life Gounod returned to his early religious impulses, writing much sacred music. His Pontifical Anthem (Marche Pontificale, 1869) eventually (1949) became the official national anthem of Vatican City. He expressed a desire to compose his Messe à la mémoire de Jeanne d'Arc (1887) while kneeling on the stone on which Joan of Arc knelt at the coronation of Charles VII of France. A devout Catholic, he had on his piano a music-rack in which was carved an image of the face of Jesus.
He was made a Grand Officer of the Légion d'honneur in July 1888. In 1893, shortly after he had put the finishing touches to a requiem written for his grandson, he died of a stroke in Saint-Cloud, France.
Gounod is commemorated in many street names across France, including in the communities of Rueil-Malmaison, Versailles, Palaiseau, Jarny, Rombas, Bousse, Cattenom, Vandœuvre-lès-Nancy, Jarville-la-Malgrange, Saulxures-lès-Nancy and Kingersheim.
"During the spring of 1862, Gounod was taking a holiday in northern Italy, and on the evening of April 24 wandered alone by the picturesque shores of Lake Nemi. He was attracted by the sound of far-off music floating on the stilly air and, looking in the direction from whence it proceeded, saw an Italian peasant passing, singing his native melodies to the accompaniment of his guitar. Gounod's attention was immediately arrested, and so enchanted was he by the musical performance, that for some distance he unconsciously followed the singer, and then at length ventured to speak to him. Said the composer of the immortal Faust to an intimate friend: 'I was so enraptured that I regretted I could not purchase the musician and his instrument complete; but this being an impossibility, I did the next best thing—I bought his guitar and resolved to play it as perfectly as he did.' So great an impression did this incident make on Gounod, that upon returning to his hotel he immediately inscribed in ink on this guitar, 'Nemi, 24 Aprile, 1862,' in memory of the happy occasion. This inscription, written there by the master, may be seen in the photo of the instrument here reproduced, being placed on the unvarnished table just beneath the bridge.
Faust: "O merveille! ... A moi les plaisirs"
The Act I finale of Gounod's Faust (1859), sung by Enrico Caruso and Marcel Journet in 1910.
Performed by Charles W. Clark in 1913.
Performed by the Soni Ventorum Wind Quintet.
^ Harding, James. Gounod, Stein & Day, 1973.
^ Slonimsky, Nicholas, ed. Baker's Biographical Dictionary of Musicians, 7th ed.
^ a b c d Grove Dictionary of Music and Musicians, 5th ed. 1954.
^ Cooper M. French Music from the death of Berlioz to the death of Fauré. Oxford, Oxford University Press, 1951.
^ Giroud, V. French Opera: A Short History. Yale University Press, 2010.
^ "Plaque № 5286". Openplaques.org. Retrieved 2014-06-02.
^ Weldon G. My Orphanage and Gounod in England. London, 1882.
^ Huebner S. The Operas of Charles Gounod. Oxford. Oxford University Press, 1990.
^ a b Philip J. Bone, The Guitar and Mandolin, biographies of celebrated players and composers for these instruments, London: Schott and Co., 1914.
^ While this entire section is a direct quotation it is clearly incorrect in some aspects. E.g. Lake Nemi is not in northern Italy, it is south of Rome.
Wikimedia Commons has media related to Charles Gounod.
"Charles Gounod: Works". Retrieved 31 March 2005.
Herbermann, Charles, ed. (1913). "Charles-François Gounod" . Catholic Encyclopedia. New York: Robert Appleton Company.
|
0.999997 |
What should I do with these strange lights? - Lights, Lights, Lights! - PlanetChristmas!
|
0.949474 |
The 1980 Cleveland Browns season was the team's 35th overall, and 31st season in the National Football League. The Browns finished the regular season with eleven wins and five losses, and their first division title in since 1971, winning a tiebreaker with the Houston Oilers. The 1980 Cleveland Browns were known as the Kardiac Kids for having several games decided in the final moments. The 1980 season was the first time that Cleveland had qualified for the postseason since 1972. Also, for the second straight year, Browns head coach Sam Rutigliano was named NFL Coach of the Year, and quarterback Brian Sipe was named the league's Most Valuable Player.
Rallying from a 10–0 first-half deficit against Cincinnati, the Browns came back to beat the Bengals 27–24 to finally snare the Central championship by having Don Cockroft kicked the game-winning 22-yard field goal with 1:25 left, then the Bengals tried to come back when got as far as the Cleveland 14 before time ran out.
The Browns played their first home playoff game in nine seasons against the Raiders, in what has become known as the Red Right 88 game. The Browns marched to the Oakland 13 in the waning seconds trailing by 14–12, but Brian Sipe's pass into the end zone for Hall of Fame tight end Ozzie Newsome was intercepted, ending Cleveland's season.
Five Players had 50 or more receptions, led by running back Mike Pruitt. Pruitt also rushed for 1,034 yards and six touchdowns. Running back Calvin Hill, recorded six touchdowns among his 27 catches. Wide receiver Ricky Feacher grabbed just 10 passes, but four went for scores, including two within a matter of minutes in the division-clinching win over the Bengals.
The following were selected in the 1980 NFL Draft.
The 2007 Cleveland Browns had a season similar to the Kardiac Kids, with several games being decided in the final minutes or in overtime. One game in particular against the Baltimore Ravens, which the Browns won in overtime because of a reversed call on a field goal by kicker Phil Dawson, led the Cleveland Plain Dealer to publish an editorial calling the 2007 Browns "The 'Son of the Kardiac Kids'" . The similarities have been at least acknowledged by the organization, with offensive coordinator Rob Chudzinski being quoted in the article calling his team "The Kardiac Kids' little brother."
AFC Divisional Playoff Game (Home) January 4, 1981 – Browns 12, Oakland Raiders 14 In sub-zero conditions on Cleveland's windy Lakefront, the Browns and Raiders battled into the waning moments of the contest. Down 14–12 and having mounted a 72-yard drive, the Browns were within striking distance at the Oakland 13-yard line with less than a minute remaining. Although it was only second down, Don Cockroft had already missed two field goal attempts in the swirling winds. Browns Coach Sam Rutigliano chose a more aggressive strategy, opting to go for the kill and pass the ball on second down instead of conservatively running the ball and then, perhaps, settling for a last second field goal. The play called was Red Right 88, which was intended for Dave Logan. However, Ozzie Newsome managed to get clear in the Raiders endzone and Sipe fired the ball to him—but the wind managed to interfere with the plan and heartbreak was the outcome for the frozen 77,655 Cleveland faithful: the ball was intercepted by Oakland Cornerback Mike Davis. The 1980 season will be remembered fondly albeit bittersweet, but the game would go down in Browns history (along with The Drive and The Fumble) as one of the franchises sadder moments.
^ "1980 NFL Draft Listing - Pro-Football-Reference.com". Archived from the original on 2009-07-26. Retrieved 2009-07-24.
^ Although quarterback Otto Graham had more overall passing yards with the Browns from 1946 to 1955, only the last six of these seasons were in the NFL; Graham's first four seasons were in the AAFC. Pro-Football-Reference.com: For combined seasons, from 1920 to 1980, played in the NFL, playing for the Cleveland Browns, played QB, sorted by descending Passing Yds.
This page was last edited on 2 January 2019, at 22:04 (UTC).
|
0.999991 |
living? Give at least three examples of living standard indicators and their development.
1. Business cycle is the consequent changes in the output of products and services in a national economy. Business cycle is usually measured with GDP. There are two main stages in a business cycle - rise and decline. Decline is traditionally associated with the rise of unemployment and growth of inflation. In turn, these factors can cause significant social consequences. That is why policy makers are interested in smoothing of severity of a business cycle.
|
0.95616 |
What did man eat first – the chicken or the egg?
A major research project that will examine the history of people and chickens has been awarded £1,940,000 from the Arts and Humanities Research Council.
Because no single discipline or explanation seems adequate to understandthis practice, the search draws data from biology, anthropology, ancient history, mythology, religion, and ecology. Some have dismissed religious explanations as ar- bitrary and tautological, but the information provided in this article shows that religious beliefs are important.
The answer I propose is: (1) only at a certain point in human cognitive evolution did it become possible for Homo sapiens to transcend certain biological limitations of the human brain by cultural means; and (2) this increased mental facility was made necessary by the reliance on larger and more cohesive social groups, itself a product of hominin evolution.
In this dissertation, I examine the magical practices of Roman farmers, primarily through the Latin farming manuals.
|
0.99715 |
so for the past few years I've been dealing with insecurities and just hating myself in general. Last year I had a counselor in my school who I used to talk to but she had to leave. For the past year I'm not really sure what's been wrong with me- I flinch at unexpected noises and I question every single thing I do. I'm not sure whats wrong with me but I've been so scared of loud noises and It's gotten to the point where when a teacher raises his/her voice i shiver and want to cry.
I'm tired of feeling this way and I'm not sure what to do. We have a new counselor in school but I'm nervous to talk to her. We also have a psychologist but I feel awkward contacting him.
Sorry to hear that you have been dealing with a lot of insecurities and self-hate. We can't diagnose but flinching and being sensitive to noises can be related to may different things including problems with your ears, high anxiety in general and even certain learning difficulties. It sounds like you are unsure of yourself, which can be linked with anxiety, but even on it's own is worth seeking counselling for.
It can be nerve wracking approaching a new counsellor but counsellors should understand that, so it's definitely worth trying to talk to the counsellor.
|
0.91711 |
The Kuehneosaur Icarosaurus siefkeri, an early specialised gliding lizard-like form from the Late Triassic of New Jersey. These animals were convergent with, but unrelated to, the Weigeltisaurids of the late Permian.
Along with the Archosauromorpha, the Lepidosauromorpha are one of the two main groups of Diapsid reptiles that emerged from younginiform-like ancestors some time during the middle or late Permian. All of these animals started out as small and lizard like, but the Archosauromorphs quickly developed large size and specialised forms, to dominate the Mesozoic world, wheras the Lepidosauromorphs retained their original lizard-like appearance and structure.
Although the archosaurian affinities of dinosaurs, crocodiles, pterosaurs and birds are clear, and likewise the lepidosaurian affinities of lizards, snakes, and the tuatara and its relatives, the problem is in deciding where the other various specialised forms that emerged during the Triassic period go on the reptilian evolutionary tree. Are Ichthyosaurs, Plesiosaurs, Thalattosaurs, Hupesuchians, Drepanosaurs, Choristoderans, and the Chelonia (turtles and tortoises; which are among the most ancient and specialised of all extant amniotes) closer to the lepidosauromorph or the archosauromorph stem, or did they branch off at an earlier time? The controversies are far from being solved.
|
0.999141 |
A guarantee when planting with puddling. A sentence summing up the article (appears on the image): planting is an important, delicate step, it stresses the plant, and it should therefore be carefully handled, as it will determine the plant’s growth over the months and years to follow.
It entails soaking the entire root system of a plant before planting it in a thick mud consisting of a planting medium that has been diluted in water beforehand.
Traditionally, this planting medium was made using cow pats, clay and water. Today many ready-to-use planting mediums are commercially-available, and all you need to do is add water until it gets to pouring consistency.
This coating is intended to ensure good recovery of trees and shrubs after planting, especially in the case of late planting.
The growing medium is not intended only for plants sold with exposed roots, it is also recommended for container-bought vegetables.
The root growing medium is a kind of coating that will facilitate root growth by allowing homogeneous contact with the earth, thus avoiding any risk of drying out.
When planting plants, you need to activate their root system to encourage it to quickly develop in the soil in which they are planted.
Don’t forget to cut slightly damaged roots with sharp shears to make a clean cut from which new roots will shoot.
To encourage rooting and regrowth, it is recommended to add some fertiliser and root growth stimulator into the planting hole.
|
0.999637 |
List of books in category "Politics: International Relations"
ChemInform Abstract: Use of the Stille Coupling Reaction on Heteroaromatic Cations: Synthesis of Substituted Quinolizinium Salts.
ChemInform Abstract: First Total Synthesis of (-)-Aplyolide A.
Dipyrrolo[1,2-a;2′,1′-c]pyrazines. Part 6. Electrophilic Substitution in a Series of Dipyrrolo[1,2-a;2′,1′-c]pyrazine and 5,6-Dihydrodipyrrolo[1,2-a;2′,1′-c]pyrazine Derivatives. Phosphorylation of Dipyrrolo[1,2-a;2′,1′-c]pyrazines.
Ein Stern mit großer Eigenbewegung?
ChemInform Abstract: An Asymmetric Total Synthesis of (-)-Fumagillol.
ChemInform Abstract: Polymer Nomenclature and Structure: A Comparison of Systems Used by CAS, IUPAC, MDL, and DuPont. Part 1. Regular Single-Strand Organic Polymers.
Peter W. Davis, Ryszard W. Adamiak, Ignacio Tinoco Jr.
|
0.884468 |
Bandwidth extension is an effective technique for enhancing the quality of audio signals by reconstructing their high-frequency components. In this paper, a novel blind bandwidth extension method is proposed based on phase space reconstruction. Phase space reconstruction is introduced to convert the low-frequency modified discrete cosine transform coefficients of wideband audio to a multi-dimensional space, and the high-frequency modified discrete cosine transform coefficients of the audio signal are reconstructed by a non-linear prediction model. The performance of the proposed method was evaluated through objective and subjective tests. It is found that the proposed method achieves a better performance than the typical linear extrapolation method, and its performance is comparable to the conventional efficient high-frequency bandwidth extension method.
According to formal and informal listening tests, the listeners usually prefer the bandwidth-limited audio signals over the heavily distorted full-band signals. So, the high-frequency components (HFC) of audio signals are partly or completely discarded in many audio coding methods at low bit rates in order to increase coding efficiency. If a high-frequency reconstruction module is embedded into audio codecs, the quality of the reproduced audio signals could be improved.
Bandwidth extension (BWE) plays an important role in high-frequency reconstruction of audio signals. Generally, BWE can be divided into non-blind BWE and blind BWE. In the non-blind BWE method, some side information, such as time/frequency envelope of high-frequency (HF) band, noise floor, level of inverse filtering, and additional sine signals, should be extracted and coded in advance at the encoder and transmitted together with the encoded low-frequency components (LFC). At the decoder, the components in the low-frequency (LF) band were copied into the HF band based on the received side information . This method is often called spectral band replication (SBR) [2, 3]. A well-known audio codec utilizing SBR is high-efficiency advanced audio coding (HE-AAC) [4, 5], which has been applied in mobile multimedia players, mobile phones, and digital radio services. In addition, the non-blind BWE methods used in extended adaptive multi-rate - wideband (AMR-WB+) and audio/video coding standard for mobile multimedia applications (AVS-M) also exhibit good BWE performance by adopting a linear prediction model to describe the spectral envelope and extending the bandwidth of audio signals based on the time/frequency envelope. Compared to LFC coding, non-blind BWE can help an audio codec to produce a much higher decoding quality with side information, but it takes up more channel resource for transmission. Thus, the non-blind BWE method is unusable when the transmission channel cannot afford enough bit rates for additional side information.
For the blind BWE, the HFC of audio signals are often completely discarded at the encoder, and there is no side information related to the HFC for coding and transmission. Only the LFC are coded at the encoder. The high-frequency reconstruction completely depends on the decoded LFC. Blind BWE can be easily applied within different audio codecs. Traditional blind BWE methods have been studied extensively for narrowband speech based on the speech generation model . However, there is as yet no efficient method for blind BWE of audio signals. A straightforward method is to linearly extrapolate the HFC from the LFC under the assumption that the audio amplitude spectrum with logarithm scale is linearly declined with the frequency increase [8, 9]. However, this assumption of audio amplitude spectrum is not true in most cases due to the complicated characteristics of the audio spectrum. Actually, audio signals have more non-linear characteristics, and an efficient non-linear prediction method is essential for reconstructing the HFC in blind BWE. Efficient high-frequency bandwidth extension (EHBE) could reproduce some new HF harmonic components using non-linear filtering methods. In the EHBE method, after the highest octave presented in the decoded LF information was extracted as the fundamental by a band-pass filter, the harmonics could be created by half-wave rectification. Then, the desired part of the complete harmonic signal was extracted by another band-pass filter and scaled by gain G. Combined with the delayed input signals, the full-frequency audio signals could be obtained. Due to frequency mixing, auditory distortion is also perceived following the application of the EHBE method.
In this paper, a blind high-frequency reconstruction method of audio signals based on phase space reconstruction (PSR) and non-linear prediction is proposed. Here, PSR is used to convert the LF modified discrete cosine transform (MDCT) coefficients of wideband audio to a multi-dimensional space. In order to improve the performance, the energy and harmonic components of the reconstructed HF spectrum are further adjusted according to listening perception. The objective and subjective evaluations show that the proposed method achieves a better performance than linear extrapolation (LE) method and is comparable to the EHBE method .
The outline of this paper is as follows: First, we describe the PSR of audio signals and discuss the calculation of embedding dimension and embedding delay related to PSR. Section 3 describes the high-frequency reconstruction principle of audio signals, followed by a more detailed description of the prediction of the HF-MDCT coefficients and the adjustment of energy and harmonics of HFC. The performance of the proposed method is evaluated in Section 4. Finally, the conclusions are given in Section 5.
Motivated by the previous works [11, 12], the PSR method, which is similar to the delay reconstruction method , is used to convert the LF-MDCT coefficients into a multi-dimensional space. A non-linear prediction model is built up in the phase space to simulate the hidden relationship between the given phase points and the unknown MDCT coefficients. By using this model, we can restore the audio spectrum of the HF components from the LF components in the phase space. So, the primary problem is how to build a multi-dimensional phase space from a one-dimensional audio signal.
where y k , k = 1,2,…, M-(m-1)τ is a m-dimensional row vector, and it represents a phase point in phase space, the embedding dimension m represents the minimum dimension number of phase space, and the embedding delay τ describes the distance between adjacent components of each phase point. Thus, once the phase space of LF-MDCT coefficients is reconstructed, the relationship between the phase points and MDCT coefficients can be described by a non-linear model. The HFC of audio signals can be intra-frame restored from these phase points in phase space based on non-linear prediction, according to the assumption of the strong correlation between HF and LF spectra of the audio signals.
According to the PSR principle, we can obtain the phase points y5, y6,…, containing the HF-MDCT coefficients, x(7), x(8),…. The (linear or non-linear) relationship between phase point y5 and its adjacent phase points, such as y3 and y4, can be used to predict the component x(7) included in phase point y5. Once the component x(7) within the phase point y5 is determined, we can use a similar method to estimate the component x(8) within phase point y6, and so on. This procedure does not stop until the final component corresponding to the cutoff frequency of the full band is determined.
In order to reconstruct the phase space, two important parameters m and τ should be calculated in advance. The details of calculating embedding dimension m and embedding delay τ will be given in the following two sub-sections.
The embedding delay τ should be neither too small nor too large. If τ is too small, the difference between the adjacent components of each phase point in the phase space will become too small. If τ is too large, there will be no any correlation between adjacent components of each phase point in the phase space. These two cases will not correctly reflect the true relationship between the MDCT coefficients, and the PSR will be ineffective. We found that for the MDCT spectrum of audio signals, a slight change of τ will lead to the adjacent phase points becoming completely uncorrelated. In this case, BWE from LF to HF is impossible. Therefore, a trade-off of embedding delay τ is crucial for the PSR.
where x ¯ denotes the mean of LF-MDCT coefficients, and i = 0,1,2, …, M - 1 is the index of R(i).
It is found that the phase space will be reconstructed as long as the embedding delay τ is limited to a certain range, even though τ has a small deviation. Here, when the first zero value or the first minimum value of R(i) appears, the corresponding index i is chosen as the embedding delay τ. This can reduce the computational complexity since it does not need to compute all R(i).
In this paper, we adopt the false nearest neighbors (FNN) method to calculate the embedding dimension m. The basic idea is to gradually determine the false nearest neighbors of each phase point by increasing the dimension number of phase space. The dimension number that makes the adjacent phase points completely unfolded is chosen as the final embedding dimension m.
D 2 k d + 1 = D 2 d k + x k + τd - x NN k + τd 2 .
f d k = D 2 d + 1 k - D 2 d k D 2 d k 1 2 = x k + τd - x NN k + τd D d k .
If f d (k) > fD, the phase point y k NN is determined as the false nearest neighbor of the phase point y k , where fD is a threshold value used for verifying whether the nearest neighbor of phase point is false or not. Here, fD is a fixed value between 10 and 50.
In order to find the embedding dimension m, the Euclidean distance D d (k) and Dd + 1(k) between each phase point and its nearest neighbors are first calculated by increasing the dimension number of phase space d with step length 1 given the embedding delay τ. Then, f d (k) is obtained by Equation (6). By comparing f d (k) with fD, the false nearest neighbors for all the phase points are verified. Furthermore, the percentage of the false nearest neighbors in all nearest neighbors of all phase points is defined as β(d).
In our experiment, the initial value of d is set to 1. If β(d) > βD, where βD is a percentage threshold between 5% and 10%, d is increased by 1. The comparison between β(d) and βD will not stop until β(d) < βD. The value d that makes β(d) to be less than βD is chosen as the final embedding dimension m.
Once the embedding delay τ and the embedding dimension m are determined, the phase space can be reconstructed from audio spectrum by Equation (2). In order to visualize the structure of audio spectrum, the phase space could be mapped into three-dimensional space. As a visualized example, we selected an audio signal produced by a violin to analyze the phase trajectories in the reconstructed phase space. The semitone of violin segment is D4, and the pitch is about 296 Hz. Embedding delay and embedding dimension were set to 3 and 1, respectively. Audio signals with the length of 20 ms were transformed by MDCT. The spectral envelope was removed to obtain the fine spectrum of audio signals, and the phase space was reconstructed. The trajectories of the fine spectrum in the phase space for LF and HF signals are demonstrated in Figures 1 and 2, respectively. It is manifest that the phase trajectories turn dispersed with the increase of frequency, but nearly all the phase vectors are localized in a certain range to form a hyper-ellipsoidal structure. Similar results have been obtained for audio spectra of other orchestral instruments, symphony, and pop music in our experiments. This indicates that audio spectrum is characterized by regular dynamic structure and is predictable. Moreover, the audio spectra of some percussion music and live background sound were also analyzed in three-dimensional phase space. Although the phase vectors of these two cases are scattered in a disorderly way over a certain area, the trajectories of both LF and HF fine spectra show similar characteristics of randomness. Based on this fact, the non-linear prediction method is introduced in this paper to recover the HF fine spectrum from the LF spectrum.
Example of phase trajectory for LF fine spectrum of audio signal.
Example of phase trajectory for HF fine spectrum of audio signal.
Step 5. Take an inverse MDCT of full-band audio signals.
Block diagram of the proposed high-frequency reconstruction method.
Step 1 and step 5 are well known, so we will not discuss them here. Step 2 has been described in Section 2. In this section, we will discuss step 3 and step 4, respectively.
Once the phase space is reconstructed based on LF-MDCT coefficients, the HF-MDCT coefficients can be predicted according to the hidden relationship between the given phase points and the unknown MDCT coefficients . In this paper, the non-linear prediction method is utilized to obtain HF-MDCT coefficients based on the laws that the adjacent phase points have similar characteristics. We use 2τ phase points at the bottom of Equation (2) to predict the HF-MDCT coefficients because they have more relationship with HF-MDCT coefficients. The high-frequency band is divided into L regions in terms of 2τ interval, and the cutoff frequency of audio signals is located in the L th region.
The block diagram of the non-linear prediction method of HF-MDCT coefficients is shown in Figure 4. At first, the LF phase point corresponding to the predicted HF-MDCT coefficient is determined, and its neighbors are selected from the LF phase points. Then, the weight parameters of non-linear prediction are calculated from the neighbors though the recursive least square (RLS) algorithm, according to minimize the weighted error. Finally, the HF-MDCT coefficients are recovered by using non-linear prediction point by point until the frequency reaches up to the cutoff frequency 14 kHz.
Block diagram of non-linear prediction of HF-MDCT coefficients.
h x = 1 1 + e - x .
In Equation (7), the region index l of high-frequency band starts to count from 1 and those phase points used for prediction are updated by circularly increasing kc. Thus, we can use Equation (7) to predict the HF-MDCT coefficients within the L bands.
where D i , i = 1, 2,…, p is the Euclidean distance between x(k1), i = 1, 2, …, p, and x(kc + 2τl), kc = M - 2τ + 1, M - 2τ + 2,…, M, l = 1, 2, …, L, Dmin is the minimum value of D i , i = 1, 2,…, p.
Q i = R i - 1 Z i γ + Z i T R i - 1 Z i .
R i = 1 γ R i - 1 = R i - 1 Z i Z i T R i - 1 γ + Z i T R i - 1 Z i .
where i represents the index of sub-bands, Msub is the number of MDCT coefficients in the i th sub-band, and j is the index of MDCT coefficients in the i th sub-band.
η i = S e i S e i - 1 , i = 1 , 2 , ⋯ N sub - 1 .
where AD is the threshold value of ξ and here it is set to 0.95.
where i represents the index of HF sub-bands, Msub is the number of MDCT coefficients in the i th sub-band, and j is the index of MDCT coefficients in the i th sub-band.
We found that the harmonic components are not sufficient in the reconstructed HF spectrum. It is necessary to adjust the high-frequency harmonic components with some LF harmonic components. Our experiments have shown that the audio quality can be improved by introducing some LF harmonic components into the HF spectrum. We use the following four steps to adjust the harmonic components.
Step 4. Modify high-frequency spectrum energy with the aforementioned method.
Thus, we finish the reconstruction of the HF-MDCT coefficients. The full-band MDCT coefficients are obtained by connecting the LF-MDCT and HF-MDCT coefficients. The audio signals in the time domain can be reconstructed by an inverse MDCT.
In this section, the reconstructed audio signals that are independent of audio codecs are firstly used for objective evaluation. According to the definition from the International Telecommunication Union-Telecommunication Standardization Sector (ITU-T) , super wideband (SWB) audio signals with a 14-kHz bandwidth were sampled at 32 kHz and were transformed into frequency domain though MDCT with a Kaiser-Bessel window. Every 20 ms, the most recent 1,280 audio samples were fed to the MDCT and were transformed into a frame of 640 spectral coefficients centered at 25-Hz intervals. First, the last 360 coefficients of these audio signals above 7 kHz were discarded to obtain the wideband (WB) audio signals with a 7-kHz bandwidth. Then, the proposed BWE method was employed to extend the bandwidth of these WB audio signals to 14 kHz. Finally, we compared the performance among the proposed method, LE method, and EHBE method. Here, the half-wave rectification was used as the non-linear device in our experiment with respect to EHBE method, and it provides the best performance compared with other non-linear devices according to the experimental results.
In the objective evaluation, 18 audio files were chosen for testing. The length of each audio signal is between 10 to 20 s, and they were sampled at 32 kHz. These audio signals used for testing were divided into three types: simple audio, complicated audio, and singing audio. Each type includes six audio files. For simple audio signals, the number of instruments performed is less than four. For the complicated audio signals, the number of instruments performed is much larger than four. Here, singing with accompaniment is called singing audio. Moreover, the input of BWE is WB audio signals generated from SWB audio signals, and its level was normalized to -26 dBov.
where i denotes the index of audio frame, and P i and P ^ i are the power spectra of the original SWB audio signals and the extended audio signals, respectively. Nhigh and Nlow are the indices corresponding to the upper and lower bound of the frequency band from 7 to 14 kHz.
LSD results with a 95% confidence interval for the three BWE methods are shown in Figure 5. Through Figure 5, we found that the LSD of the complicated audio signals is larger than the other types of audio signals. The reason is that many instruments are involved in complicated audio signals, and their energy in the HF spectrum is relatively high and not easy to accurately estimate. For simple audio signals, the energy attenuation of true HF components is obvious; thus, it may lead to low distortion. In addition, we can also find that the LSD of the PSR method is lower than EHBE and LE methods for complicated audio signals and singing audio signals. For simple audio signals, the LSD of the PSR method is a little higher. This may be because the energy attenuation of the extended HF spectrum in the PSR method is heavier than that of the true HF spectrum for harmonic-like signals.
LSD with 95% confidence intervals for the three BWE methods.
An example of a symphony spectrogram reconstruction is shown in Figure 6. From the spectrogram, we can find that the spectra derived from LE and EHBE have some artifacts. This may cause the audio quality to be degraded. This result is identical to the objective evaluation.
An example of audio spectrogram reconstruction. (a) Original spectrum. (b) Discarded spectrum. (c) Reconstructed spectrum by LE. (d) Reconstructed spectrum by EHBE. (e) Reconstructed spectrum by PSR.
Besides objective evaluation, our PSR method and the referential methods were applied into the G.722.1 WB audio codec at 24 kb/s in order to further evaluate the subjective quality of BWE methods. The extended audio signals were compared with the SWB audio signals reproduced by G.722.1C at the same bit rate by using a multiple stimuli with hidden reference and anchor (MUSHRA) listening test .
Fifteen male and five female expert listeners took part in the test with headphones. The test was arranged in a quiet room. The listening files in Additional file 1 include six audio signals, where five audio signals were used for test and one audio signal was used for training listeners. In MUSHRA listening test, the original audio signal was considered as a hidden reference and the low-pass filtered audio signal with bandwidth of 3.5 kHz was used as an anchor. The audio quality for G.722.1 codec, G.722.1C codec, LE method, EHBE method, and the proposed PSR method was evaluated for subjective listening test with a 100-point scale (100~80, excellent; 80~60, good; 60~40, fair; 40~20, poor; 20~0, bad). The result is illustrated in Figure 7 with a 95% confidence interval.
Mean subjective scores with 95% confidence intervals for the MUSHRA listening test.
As shown in Figure 7, the subjective scores for the three different kinds of audio signals are similar in the MUSHRA test. In addition, the audio quality of G.722.1 with PSR is better than the original G.722.1 WB audio codec, but is inferior to the G.722.1C SWB audio codec. LE method shows its lower performance compared with PSR and EHBE methods. Both PSR and EHBE are preferred over the G.722.1 WB audio codec, while EHBE is better than the proposed PSR method on average. According to the informal listening tests, the tonal distortion which is caused by the non-linear filtering in EHBE is not sensitive to the listeners because the phase of the extended spectrum is comparatively continuous. Moreover, the PSR method can also reproduce the SWB audio signals whose subjective quality is similar to the EHBE method. So, the proposed PSR method is able to improve the quality of the WB audio signals decoded by G.722.1.
This paper presents a blind bandwidth extension (BWE) method of audio signals. Our BWE method consists of phase space reconstruction and high-frequency reconstruction of the audio signals. This blind BWE method incorporates both non-linear prediction and linear prediction. The objective tests show that the audio quality with the proposed method is a little bit better than the LE method and EHBE method. This BWE method was proved to be effective in quality enhancement of audio signals. In addition, the proposed method, LE method, and EHBE method were employed to extend the bandwidth of the audio signals decoded by the ITU-T G.722.1 WB codec. Subjective test results presented in this paper show that the proposed method greatly improved the auditory quality of the WB audio signals decoded by G.722.1. The bandwidth extension performance of the proposed method is higher than that of the typical LE method and is comparable to that of the conventional EHBE method.
This work was supported by the National Natural Science Foundation of China under grant numbers 61072089 and 60872027, and the Beijing Natural Science Foundation Program and Scientific Research Key Program of Beijing Municipal Commission of Education (no. KZ201110005005). The authors wish to thank Dr. Christian Ritz, an associate professor in the University of Wollongong, for polishing the English language and for commenting on our paper. The authors also wish to thank the anonymous reviewers for their valuable comments that helped in significantly improving the presentation of our paper.
|
0.999914 |
Family photo of 12-year-old Charlie Bothuell. Bothuell went missing in Michigan and was found in the basement of his father and stepmother's home in Detroit.
(CNN) — Twice each day, 12-year-old Charlie Bothuell V says in court documents, he was forced to do 100 push-ups, 200 sit-ups and 100 jumping jacks. He told child welfare investigators in Michigan that he’d have to curl a 25-pound weight on each arm and do 5,000 revolutions on an exercise machine, and if he didn’t finish in less than an hour, he’d have to do the routine again, according a petition filed in Wayne County court in Michigan this week.
The Detroit boy said that he feared being “in trouble again” for not completing his work-out routine. Sometimes he couldn’t finish because he was in too much pain, he said.
Charlie made national news in June when his father Charlie Bothuell IV said his son went missing for 11 days, prompting a search that involved the FBI and that ended bizarrely when the child turned up barricaded in the father’s basement.
The father was talking live on air with HLN’s Nancy Grace when he learned that state police had discovered his son, appearing shocked when Grace told him that she’d just received breaking news about it.
On her show, the elder Bothuell became visibly upset. He started breathing hard and clutching at his chest, and told Grace that he had no idea how his son could have been in the basement.
Bothuell added that his home has been searched repeatedly by law enforcement trying to find his son. Police and the FBI also have said they searched several times and didn’t see the boy and now indicate he might have moved during the 11 days — they won’t say yet specifically what their investigation revealed.
At the time, Detroit Police Chief James Craig reacted to the discovery of the boy with his own disbelief.
This week, Detroit Police Sgt. Michael Woody reiterated how surprised police were that the boy turned up in the basement. He told CNN, “It’s possible” that investigators “didn’t see” the boy while they searched the home from attic to basement.
The department is reviewing its procedures, he added.
A petition, signed Monday, and filed in Wayne County juvenile court describes allegations of abuse that the boy says he endured from his father and stepmother, Monique Arnel Dillard-Bothuell.
Neither have been charged; in fact, no one has been charged with anything in the case.
Wayne County child protective services opened an investigation of the family June 23 as FBI agents were looking into the boy’s disappearance.
On June 25, the documents say, the boy was found in the basement of the Bothuell home. He was taken to a hospital and a doctor examined him, finding a “half circular scar” on the 12-year-old’s chest.
The boy said that scar was a “result of his father driving a PVC pipe into his chest.” The child was “also observed to have old scars on his buttocks from being hit with the pipe,” the document states.
The boy said that the stepmother accused him of lying about whether he’d finished his workout, and put him in the basement on June 14.
The boy told interviewers that he showered and put on his pajamas for the evening before entering the kitchen where his stepmother was “very upset regarding the workout,” the petition states.
The petition states the boy said he climbed over a drum and that she added boxes to conceal him, and then went upstairs, called his father and said that the boy was missing, that she’d looked “everywhere” for him. Police said it was a 55-gallon drum, clarifying the petition’s description as a “5-gallon” drum.
“Charlie V reported Mrs. Dillard-Bothuell never brought him food, or anything to drink the entire time he was in the basement,” the petition states. When the house fell silent, he would run upstairs to grab food.
The boy told interviewers that he heard authorities come to the house while he was in the basement.
The Wayne County prosecutor’s office will decide whether criminal charges will be filed but had no public statement Thursday.
A hearing was held in the case Thursday but state authorities would not discuss it, citing their regulations in cases involving children. Developments included a psychological evaluation being ordered for the 12-year-old to determine whether his father can have visitation rights, and discussions of petitions on termination of parental rights.
Meanwhile, police told CNN that they have no reasons to disbelieve Charlie’s claims. Police Sgt. Woody added that full results of the investigation have yet to be released.
Efforts to reach Mark Magidson, an attorney for the boy’s father and stepmother, were not immediately successful Thursday afternoon.
And police were not commenting on the boy’s whereabouts beyond telling CNN that he is living with a relative for the time being.
Another hearing is scheduled for July 17.
|
0.999998 |
Is the typeface useful? Utility is a relative quality. A typeface can be useful for setting large amounts of text in a wide variety of applications, like Times Roman. A typeface might also be useful in a more limited sense, like conveying style and grace—like Snell Roundhand.
|
0.956763 |
Lemon grass or oil grass (Cymbopogon citratus) is a popular herbal plant and culinary vegetable originating in South and Southeast Asia, but naturalized in numerous other parts of the world. The leaves of the plant have long been used both as a culinary and medicinal herb and highly appreciated for their strong, pleasant, lemony fragrance. Infusions made from either the fresh or dried leaves of the plant have traditionally been employed for the treatment of a variety of ailments and medical conditions.
These range from gastrointestinal problems, nervous system disorders, cough, rheumatism, nausea and vomiting to abdominal, joint or muscle pain. Research has uncovered the plant also possesses anticancer, antioxidant and anti-inflammatory properties in addition to being a mild natural analgesic and diuretic. Lemon grass and its essential oil are used in stress relief therapies.
What does lemon grass look like? Lemon grass is a sort of grassy plant known for its lemony or citrusy fragrance. From afar, the plant looks like a huge, green tuft of grass with slender and stiff stems and rhizome roots. The stems, although very similar in appearance to flexible blades of grass projecting their ends downward, are actually quite fibrous and tough. If removed together with a part of the root system, lemon grass stems look a lot like larger, tougher scallions.
1) Exhibits analgesic effects. Lemon grass exhibits anti-inflammatory and antispasmodic effects which is why it is commonly used for the treatment and management of various conditions characterized by pain as a result of inflammation or spasms, including muscle pain and muscle spasms, abdominal cramps as a result of indigestion, joint pain caused by rheumatism etc.
Essential oils in lemon grass leaves and essential oil such as myrcene are believed to be responsible for the anti-inflammatory and analgesic effect of the plant and may be found in concentrations of 12 and up to 25% in the essential oil (Myrcene mimics the peripheral analgesic activity of lemongrass tea).
2) Offers antioxidant protection. Chlorogenic acid, caffeic acid, isoorientin, isoscoparin, orientin and luteolin are just a few of the many antioxidants found in lemon grass (Free radical scavengers and antioxidants from Lemongrass Cymbopogon citratus). Antioxidants scavenge free radicals and protect cells and DNA against damage that may cause them to go haywire and turn cancerous.
In addition to his, by preventing free radical damage from building up in the body, antioxidants from lemon grass also help keep inflammation levels low, which is equal to lower risks of developing chronic disease (heart disease, diabetes, cancer, obesity).
3) Natural antibacterial, antifungal and antiseptic. Geraniol and neral, two forms of citral (also called lemonal), a constituent of lemon grass and lemon grass essential oil (up to 85% of volatile oil content) have been found to exhibit a potent antibacterial action against various pathogens, inhibit sepsis development as well as bacterial growth without the pathogens developing resistance to the plant compounds. Citral constituents are also found in lemon balm, lemon and verbena.
Lemon grass essential oil has been shown to also be extremely efficient against fungi causing skin fungal infection or mycosis (Essential oils of peppermint, orange or lemongrass kill most strains of fungal and bacterial infections). The main component, citral, is particularly effective against Candida albicans (Anti-Candida albicans activity of essential oils including Lemongrass (Cymbopogon citratus) oil and its component, citral).
4) Boasts anticancer properties. Lemon grass and its derivate essential oil appear to be particularly effective against liver and colon cancers as well as leukemia (Citral: a cytotoxic principle isolated from the essential oil of Cymbopogon citratus against P388 leukemia cells). Citral and monoterpene compounds in general are the ones with the strongest in vitro and in vivo antitumor activity as far as plant essential oils are concerned. Preliminary researcht has also revealed that farnesol, another constituent of lemon grass essential oil, boasts antitumor properties.
5) Has a beneficial action on the nervous system. A Japanese study on rodents has found that linalool, a compound from lemon grass and its essential oil, can effectively reduce stress markers. Drinking lemon grass tea and using its essential oil for stress relief are two natural practices for better coping with stress naturally.
7) Natural mosquito repellent. Naturally-occurring compounds in lemon grass and its essential oil, notably citral, are effective insecticides which efficiently repel mosquitoes. However, the constituents responsible for the lemony fragrance of the plant have been shown to attract bees.
Side effects. Though research is poor, there are studies that show that compounds from lemon grass may inhibit cell division. While this mechanism can help stop cancer cell division and spread (metastasis), it would appear it might endanger normal fetal development in the womb.
Moreover, some rat studies show high doses of myrcene and citral (two major compounds in lemon grass) may prove toxic for unborn babies, hence the recommendation to avoid lemon grass during pregnancy, or at least consult your doctor in order to establish safe doses. Major compounds in the plant, notably citral, may engender allergic reactions.
|
0.955095 |
Answering a question about mixed gender Freemasonry in Denmark, a Dutch freemason mentioned the Maria Ordenen. Never having heard of it, the world wide web was consulted to see what this order could be. It proves to be a fairly big order in Scandinavia and a little abroad with 41 lodges in Norway, 15 in Sweden, 6 in Denmark, 1 in Iceland, 2 in Finland and 2 in Germany with a number 7500 members. If this is true, a lodge has well over 100 members.
Information is (naturally) mostly available in Scandinavian languages, but in in Google translation, the Norwegian Wikipedia page is quite informative.
The order was founded in 1916 in Norway by Dagny Kristensen who led the order for almost 40 years. The name refers to the many Marias mentioned in the Bible and elsewhere. The order would be even more secretive than Freemasonry, since not only member lists are not public, but neither are the by-laws, but recently the ordered has opened up a bit. The order operates “close to Freemasonry”, probably meaning that they use their buildings and that many members are wives of Freemasons. Just as a large part of Scandinavian Freemasonry, the Maria Ordenen requires a belief in God of its members. They also have to be at least 25 years of age.
There is a seven grade system and the symbolism is more focused on the woman.
It all sounds a bit like the order of the Weavers in Netherlands who also operate “closely to Freemasonry”, with a similar structure, but with different symbolism.
Are there more countries with such initiatives?
The Honorable Order of Universal Co-Masonry (before April 2017 “The Honorable Order of American Co-Masonry”) is what remained when the American federation of Le Droit Humain split off the Supreme Council in Paris. Some lodges (6) decided to keep working under Le Droit Humain, the majority (8) formed the new order The Honorable Order of American Co-Masonry and the members of 4 other lodges spread over lodges of the two new orders.
From the viewpoint of the Honorable Order, they are the continuation of the mixed gender order that started in the USA in 1903. The headquarters of what used to be the American Federation are now the headquarters of the Honorable Order. The current American Le Droit Humain is the split-off in this scenario.
Be that as it may, since 1994 there were two branches from the same tree.
Both Le Droit Humain and the Honorable Order grew since. Le Droit Humain has some 16 lodges, the Honorable Order 29. What is perhaps a little ironic, the Honorable Order is nowdays an international order again with lodges in Argentinia and Chile (one each) and two in Brazil.
It is good to (virtually) run into people, since the website of the Honorable Order does not seem to say anything about the foreign lodges, but now I was able to make the respective country-pages more complete.
|
0.981587 |
Mix and match different throw pillows for your home with the confidence of a professional using these five easy to follow tips.
Throw pillows can complete the look of your home, just like the right pair of shoes can make or break an outfit. They are one of the last accessories to be added, but can set the tone for the entire style of a room. Because there are many options to choose from at a wide range of prices, adding pillows to your sofa or bed is the easiest and most cost effective way to completely change the feel of the space. They provide a pop of color, texture, and pattern and can be restyled often to easily refresh your decor.
But as wonderful as that all sounds, mixing and matching throw pillows can seem like an impossible decorating task to get right. As you scroll through your favorite blogs or flip through a magazine, you may see sofas adorned with over seven different pillows at a time and wonder just how they choose so many that all seem to go together. Going into a store and choosing one pattern and one solid for pillows is easy. But finding that right assembled collection that gives the look of a professional decorator's touch can be overwhelming.
Even though there is a bit of an art to doing this, choosing complimentary pillows isn't as hard as it seems as long as you keep a few tips in mind.
CHOOSE ONE LARGE PRINT, ONE SMALLER PRINT, AND A SOLID TO ANCHOR THE MIXTURE.
If you are just starting out, the easiest way to begin mixing and matching throw pillows is to choose two pillows with prints that coordinate together in terms of scale and colors and then add in one solid colored pillow in a shade that matches the prints.
As you get more confident with this basic skill, you'll find that it is easier to add to the combination of three. But starting with a trio allows you to see exactly how different prints and shades of colors can play off one another and how that solid colored pillow can bring everything together for one complete look.
Make choosing coordinating pillows less overwhelming by sticking to a single color palette and work with shades. Now this doesn't mean that you have to choose three completely blue pillows. Maybe there is a floral pillow that you fall in love with that also has shades of tan and green to the pattern. That is completely fine. But then you need to choose the rest of your pillows keeping that color palette in mind. Find coordinating blue shades that will also compliment the other colors in the original pattern. Fill in with some neutrals. You just need to keep all the colors complimentary.
One pillow in your trio should have some type of texture to it. Maybe it is a woven pillow in a solid color. Maybe it is a plain pillow with embroidery on the front. Or it could be created out of a houndstooth wool. A textured pillow has anything that makes you want to reach out and touch it. Texture is important because it is what moves you away from just having three pillows that coordinate in color to having a collection with interest and dimension.
You don't need to buy all square 16x16 inch pillows. Buy some that are larger and others that are smaller. Add in a rectangular or even circular pillow with the square ones. Start with a standard 22 or 24 inch pillow in back and get smaller and more varied as you progress forward.
NOT EVERYONE SHOULD BE SCREAMING "LOOK AT ME!"
You don't want any one pillow to compete with another that you've chosen. If things are in dramatically different colors or everything has a different texture or embellishment, your collection of pillows is going to look chaotic. It is going to seem like you just went out buying random pillows that caught your eye with no consideration of who it was going to sit beside.
Have one standout or statement pillow and then find ones that will compliment it.
What you are looking for is to find that sweet spot where you love the way different patterns and colors blend together into one cohesive set. It can actually become an addicting past time once you get the hang of it. The result should look like you have a collection of pillows amassed over time, but that you knew exactly what you were looking for when shopping for them.
Ultimately, this is a design skill that is unique to each individual person. What one homeowner views as the "perfect combination" may not look that way to another. These tips are guidelines to help build confidence in your own abilities. I encourage you to play around with choosing different pillows in the store or online to experiment and get a feel for what looks good together, even if you don't intend on purchasing anything right now. The more you mix and match, the better you will get at finding what appeals to you.
Something else to keep in mind.......Some of the prettiest pillows can be pricey and you may believe it isn't possible to be able to have a collection and still afford something nice. But remember that even the dollar store has pillows. There is nothing wrong with spending a little more on a statement pillow and placing it in front of a solid colored one you bought for $5 at Dollar General.
And a final tip for you today......If you are shopping online, Pier1 Imports has a section on their website where the pillows are divided into collections of coordinating pillows for you to shop from which makes this whole process virtually painless.
It doesn't matter what the style of your home is, what your favorite colors are, or the budget you are constrained by. And you don't have to be a designer to have a well styled home. Mixing and matching throw pillows is something anyone can do to increase the decorative appeal of their room as long as you can remember a couple tips to help you do it.
|
0.999993 |
I love creating personalized gifts for my family. Check out this adorable, oh-so-easy-to-make teacup garden that you can customize for Mom on Mother’s Day.
Step 1: Draw a fun design on your teacup and saucer using the oil-based paint pens. Some design ideas: 1. Let your kid color his own for his grandma; 2. Label each cup with your fave tea flavor and then plant the herb; 3. Create a modern, geometric design.
Step 2: Pop into a preheated 400° oven and bake for 20 minutes. Let cool.
Step 3: Fill your teacup with a layer of rocks to help keep the water from rotting the roots, and pot your plant.
Step 4: Give to someone you love.
|
0.985038 |
Create a flyer for "Working Across Cultures"
Very good exercise to do with students. Many good ideas supplementing the Gannon - Journey... Book. I will adopt it as a teachers source and recommend it for the students if they need to practice more.
You can never get enough information about working in different cultures. Another aspect/point of view is excellent.
The exercises are useful tools in creating lively lessons. Descriptions are brief and clear and the accompanying commentaries provide the necessary background for debriefing. With some modifications, many of the exercises could be used for both culturally homogenous and heterogeneous participants.
I really like the text as it is insightful. Have used some of the material for class discussions and exercises.
I found it really useful and helpful. My course consists of lectures and practical courses. It is important to make such practical experiences what can ease the preparation for real multicultural environment. This book is a great help for achieving this purpose.
|
0.99968 |
"There is only one thing bigger than Mother Nature and that is Father Profit, and we have not even begun to enlist him in this struggle."
This book changed my thinking substantially. I no longer look at global climate change the way I did before, and I believe I'm much better informed on the topic having read this book. Friedman's treatment of climate change within the context of several interrelated issues such as petrodictatorship, energy poverty, biodiversity, ecology, and the ethics behind the issues makes for not only interesting reading, but a much more compelling overall argument on why a green revolution is not just needed, but inevitable.
Friedman's book confirms my belief in TANSTAAFM which is a term I coined which plays off of TANSTAAFL. Replace the final "L for lunch" with "M for market". There ain't no such thing as a free market. As much as I'm a free market advocate, the truth is no market of truly free. Government regulation and special interest influence on government regulation is a fact of life as long as human beings with their penchant for power and money are in the equation. That is why the quote at the top is the one I found the most insightful. The only way to put market forces to work for good is to have price incentives and profit motives that support good stewardship of our planet's resources.
|
0.943709 |
Unroll the pastry and use an ovenproof frying pan as a guide to cut out a disc from the pastry.
Preheat the oven to 180˚C/160˚C fan/gas mark 4. Heat the sugar in the ovenproof frying pan over a medium-high heat. Cook for 5-7 minutes, until the sugar has turned a deep caramel colour.
Immediately remove from the heat and stir in half of the butter.
Arrange the apple quarters in a circle in the pan; start around the edges and work your way in, placing the rounded side down and packing them in very tightly. Dot the remaining butter around the apples.
Return the pan to the heat and cook for 10 minutes until the apples have started to soften and brown.
Remove from the heat and place the puff pastry disc over the top of the apples, tucking in the edges. Use a small, sharp knife to make a few slits in the top.
Transfer the pan to the oven and bake for 40-45 minutes until the pastry is golden brown and crisp.
Allow to cool for five minutes, then run a knife around the edge of the dish and invert the tarte onto a large serving plate that is deep enough to hold the juices. Serve warm or at room temperature with whipped cream.
|
0.9999 |
Like her mother, the girl had special abilities in styling and in her dress.
in styling and from her dress.
in styling and in her dress.
in the styling and in the dress.
in styling and her dress.
in her style and in her dress.
"Styling" and "her dress" are two different objects of the same verb "had." As such, the two words need to employ parallel structure and be in the same form. The answer choice that features a parallel structure is "in her style and in her dress."
The school sought to create well-rounded individuals, making students who were painters, musicians, and participating in athletics.
who were painters and musicians and participate in athletics.
who were painters, musicians, and participate in athletics.
who were painters, musicians, and athletes.
who were painting, musicians, and participating in athletics.
who were painters, musicians, and participating in athletics.
The list in the underlined portion of the sentence features three objects attached to the same verb, but these three objects are different kinds of words, describing different things. Any list like this one must feature a parallel structure, where all the items match in terms of tense and word form. The only answer choice to have such a parallel structure is "who were painters, musicians, and athletes."
The new organization needed people who could write, sell, and marketing their products.
who could write, sell, and marketing their products.
who could write, sell, and in marketing their products.
who could writing, sell, and marketing their products.
who could write, sell, and market their products.
who could write, selling, and marketing their products.
The list contained in the underlined portion of the sentence features unlike elements, meaning that the verb describes unlike objects. The list needs to feature a parallel structure of elements that each have the same tense and word form. The only answer choice that features a correct parallel structure is "who could write, sell, and market their products."
Whether or not a protest was made, every decision was either reviewed or debating by the committee.
either reviewed or debating by the committee.
either reviewed or debated by the committee.
either reviewed or debating in the committee.
either reviewed or debating by a committee.
either be reviewed or debating by the committee.
In any "either . . . or" phrase, the elements compared must be of the same type, so that an equal comparison can be made. In the sentence, "reviewed" and "debating" do not follow such a parallel structure, because "reviewed" is a past tense verb while "debating" is a present participle. The only answer choice that employs parallel structure correctly is "either reviewed or debated by the committee."
His management style was to always be remarkably energetic, neither too intense nor too calming.
neither too intense nor too calm.
neither too intensely nor too calming.
neither too intense, nor too calming.
neither too intense nor too calmed.
neither too intense or too calming.
"Intense" and "calming" are two different parts of speech, but are joined in the same "neither...nor" phrase. In any such phrase, the two items described must have a parallel structure. The only answer choice with a parallel structure is "neither too intense nor too calm."
The boys had to choose either playing with the new video game or to run outside.
either playing with the new video game or to be run outside.
either playing with the new video game or running outside.
either playing with a new video game or to run outside.
either playing with the new video game, or to run outside.
either playing with the new video game or to run outside.
Any "either...or" construction has to feature a parallel structure that includes each item given, and this sentence uses a gerund and an infinitive. The two forms must be the same to be grammatically correct. Therefore, the correct answer choice is "either playing with the new video game or running outside."
From a young age, she enjoyed outdoor activities like hiking, climbing, and her kayak.
like hiking, climbing, and kayaking.
like hiking, to climb, and her kayak.
like hiking, climbing, and her kayak.
like hiking climbing and her kayak.
such as hiking, climbing, and her kayak.
The list featured in the underlined portion of the sentence contains unlike items (two gerunds and one straightforward noun) as its objects. A list that forms the objects of the sentence must feature a parallel structure, so that the verb is describing similar objects. The only answer choice with the correct parallel structure is "like hiking, climbing, and kayaking."
The veteran favored his left leg because of an old war injury in his right leg that never healed properly or settling well.
that never healed properly nor settling well.
that never healed properly or settled well.
that never healing properly or settled well.
that never healed properly or settling well.
that ever healed properly or settling well.
The underlined portion of the sentence features an "or" phrase with two different kind of verb phrases as the final elements of a dependent clause. The phrase actually needs to feature a parallel structure among its two parts. The only answer choice with a proper parallel structure is "that never healed properly or settled well."
As a ballplayer, he was creative, imaginative, and worked hard.
creatively, imaginative, and worked hard.
creative, imaginative, and he worked hard.
creatively, imaginatively, and worked hard.
creative, imaginative, and worked hard.
creative, imaginative, and hard working.
The list contained in the underlined portion of the sentence has three items with three different forms: two adjectives and a verbal phrase. Any such list needs to have a parallel structure, where all three items are similar. The only answer choice to feature such a parallel structure is "creative, imaginative, and hard working," in which "hard working" is a participle.
The obstacle course was fun for the new recruit, as he enjoyed running, crouching, and to find new paths.
as he enjoyed running, crouching, and finding new paths.
as he enjoyed running, crouching, and to find new paths.
as he had enjoyed running, crouching, and to find new paths.
because he enjoyed running, crouching, and to find new paths.
as he enjoying running, crouching, and to find new paths.
The list that forms the objects of the second independent clause contains objects that have different forms. Any such list needs to feature all three items as similar things that can be compared. The only answer choice with such a parallel structure is "as he enjoyed running, crouching, and finding new paths."
|
0.999174 |
What are the most common causes of bedwetting?
Bedwetting is usually a combination of factors and is rarely caused by a physical anomaly. It can happen that a child produces more urine at night than other children. Stress can also play an important role.
Bedwetting never happens because your child drank too much during the evening. And your child also doesn't wet the bed because it sleeps too deeply. However, your child doesn't wake up as easily.
The cause of bedwetting is often that the child has not learned (yet) to become aware of a full bladder during the night. A full bladder transmits a signal to the brain. The brain must then learn that this signal means a need to wake up. During the day, children are much more aware of this process. That is why children are usually sooner potty-trained during the day than at night.
Luckily, it means that there is no physical issue. There's only an issue with timing! And the timing of going to the bathroom can be taught through training.
|
0.838482 |
Why Doesn’t Intel Just Buy AMD?
Would it be worth it for Intel to buy out the last real x86 competitor?
In a world where ARM (NASDAQ:ARMH) is now a viable alternative instruction set architecture in the broad computing market (tablet, notebook, desktop) and, indeed, some could say the dominant architecture, why doesn't Intel (NASDAQ:INTC) put an end to AMD by simply buying it?
While also unlikely, it really does seem that, other than the shut-AMD-down-in-PCs angle, Intel could get everything that it needs vis-à-vis graphics from NVIDIA, and would even be able to completely dominate HPC with NVIDIA hardware/software. If NVIDIA, under Intel's wing, were to build its GPUs on Intel's in-house process, then Intel/NVIDIA could potentially increase its GPU market share to such a degree that it could potentially put an end to AMD/ATI, as AMD would not be able to compete on performance or power consumption.
It also helps that NVIDIA's balance sheet is clean as a whistle, with billions in net-cash. Further, ex-Tegra (which is losing money), NVIDIA's cash flow (which is already robust) would look even better under Intel's wing. The main thing blocking such a deal, in this Fool's view, is that NVIDIA CEO Jen-Hsun Huang seems dead set to leading NVIDIA to glory on its own (which, if successful, could generate more value for shareholders than an Intel buyout would).
The real reason that Intel is unlikely to buy AMD is simple -- there are better buys out there, including Intel/AMD competitor NVIDIA. Further, with Intel continuing to push AMD out of the x86 business with its own products, it seems that the idea of buying AMD is only compelling from a graphics perspective, or perhaps to keep AMD's x86 business out of the hands of a competitor (although the cross-licensing deal between AMD/Intel would make this difficult for a competitor, anyway).
AMD doesn't really seem to be a compelling take-out target in a world where ARM is so pervasive and where everybody is investing heavily in graphics. There's still probably a good amount of value in AMD's GPU IP, but the value will diminish as others ramp investments and AMD cuts R&D. In short, AMD needs to build value organically to drive a meaningful share price increase.
|
0.912631 |
How much does it cost to go to school for a International Economics major and what are the most affordable colleges? The average annual out-of-state cost for a bachelor program in International Economics is $51,167 with an estimated average four year degree total cost of $204,668. The most affordable bachelor program is offered by Weber State University at an annual $24,860 out of state total cost. This represents a 51% discount from the national average program cost. University of California Los Angeles has the nation's most popular bachelor program for International Economics with 37 degrees awarded per year.
|
0.963339 |
What is the best part about being a software developer?
I love writing code. It feels like playing a logic puzzle game, but the rules are always changing so it never gets boring.
I also love the autonomy and flexibility. This is something that doesn't come automatically with every development job, but if you build a reputation for delivering without being micromanaged, a good manager will leave you alone and let you do your thing.
Thoughts on the Low Code Development trend?
Right now software development is a pain point for businesses. Humans are expensive and unpredictable. Businesses would like to reduce costs and get the messy humans out of the way so they can make more money. Low code development is the seed of the slow process to replace developers.
I have no doubt that most developers will eventually, over several decades, be replaced by low and no-code visual development tools. They aren't advanced enough to replace us now, but they will be.
When banks first started installing ATMs in the 1960's, I imagine bankers didn't take them very seriously. ATMs were dumb, clunky machines that customers didn't understand and didn't want to use. It took about 50 years, but ATMs have nearly replaced tellers. They can do almost everything a teller can, only faster and without the awkward small talk.
We're deceiving ourselves if we think software development is different. The tools will start with routine tasks, like building relational databases and RESTful APIs, and grow from there. Eventually, the average business person will be able to build tools that now take a team of developers, testers and product managers.
The good news is that we don't need to panic about our job security. It will take decades for the tools to advance enough, and the businesses to adapt enough to replace developers. By then, many of us will be nearing retirement, and there will still be room for us to work on legacy projects.
The bad news is that demand for developers will stop growing long before we can actually be replaced. To keep our wages from flattening out, we'll need to continuously refresh our skill set and stay out of areas that are being automated.
As a society, we also need to build a safety net for people whose jobs are automated away. Whether it's through job retraining programs or something like a universal basic income, we have to find some solution to the fact that jobs are changing too fast for most humans to keep up. And we have to stop telling ourselves that this could never happen to us.
Your Twitter bio says "Success is getting a different error message." Explain.
The most important thing that software development has taught me is that failure is a necessary step on the path to success. If you keep making the same mistake and getting the same error message, you're not learning and you'll never succeed. On the other hand, if you're not getting any error messages, it's NOT because you're awesome--it's because you're too afraid to build anything!
If your code, your career, your life is breaking in NEW ways, you're doing it right.
Your Github page says "One day there was a girl with a dream to build." Tell us about this.
I put that up there because it sounded good and went well with the design of the site. Honestly, though, I recoil a bit when I read it. It strikes me as fake and "canned". I didn't really have a dream to build. I had a dream to get the hell out of banking, and to find a job that felt meaningful and put more than just a few crumbs on the table for my kids.
Luckily it turned out that being a developer was much more than that for me. Code is this beautiful link between the logical and creative sides of my brain. It's something I would do for fun if I didn't do it for work. I count myself very, very lucky to have a job like that.
Tell us about your ebook "How to Become a Web Developer".
Changing careers and teaching myself to code was difficult and confusing. I wished I'd had a guide book that would tell me what to focus on learning, what to expect in interviews, and how to get my first job. I also wanted to be reassured that it was possible--that I could actually be successful jumping into a completely different career without getting a new degree.
How to Become a Web Developer is the book I wish I'd had. If you're looking to become a software developer, you can find it on Amazon.com. You also might be interested in the blog post I wrote for FreeCodeCamp: How to Become a Web Developer Without Losing Your Mind.
What dev tools do you use?
My preferred tools are: a Mac or Linux machine, Vim text editor, and Tmux session manager. Tmux makes it feel like you have an unlimited number of monitors, because you can flip back and forth between sections of code, Bash sessions, etc. You can also have other developers SSH into your Tmux session so you can code together.
I like these tools because, even though they're hard to master, they give you an incredible amount of power. On Unix-based systems (Mac and Linux), you're only limited by your own knowledge (and possibly your user permissions). The downside is that you can also get yourself into a lot of trouble if you're not careful.
At work I currently use a Windows laptop and Intellij IDE. I absolutely hate working on Windows because it's very inflexible and too much of the functionality is hidden. I find Intellij decent to work in, but it's very memory-hungry and can crash if you don't have enough available memory.
To beginners, I recommend using a Mac if you can afford one, since it's the most user-friendly platform for developers. Installing Ubuntu or Fedora on a PC is a good alternative if you don't want to drop $800 on a laptop. I'd recommend Atom for a text editor since it's free and very simple to use, but also has plenty of plugins that can make life easier once you've gotten the basics down.
Thoughts on open source software?
It's like a Utopian fantasy. The idea that software developers across the world work together to solve common problems, and then freely give away those solutions so others can expand and improve them--I wouldn't believe it if I didn't know it was real.
Imagine what we could accomplish as a species if other fields, like medical research, open-sourced some of their best tools and techniques. What if, instead of trying to patent every newly discovered gene, scientists shared the information openly so others could use it to create gene therapies, trace a person's heredity, or whatever else they could think of?
Pick one online service where you would want to get a first hand and behind the scenes look at how the developers work.
I would love to see inside Atlassian. Their tools--Confluence, Bitbucket, HipChat--are so beautifully designed and virtually bug-free.
State a challenging question you would pose to a developer interviewee.
"Imagine I'm a robot that knows nothing about laundry. Explain to me how to wash a load of laundry."
I asked this question because I wasn't trying to assess their knowledge of a particular language. I wanted to know how well they could break down the problem in a familiar domain (most people have done laundry at some point) and transform it into a step-by-step process. There was no way they could have anticipated the question, so I got a unique opportunity to watch their thought process.
One candidate was especially detailed. "This is clothing. First, we need to sort the clothing into dark and light piles. Anything darker than this item should go in the dark pile..."
I also remember a candidate who had trouble breaking the process down into an ordered list of steps. He ping-ponged back and forth from washing, to drying, to sorting, back to washing. He got sidetracked and talked about why a robot would do laundry, but he never gave me a real list of steps.
I wouldn't have hired or disqualified a candidate solely based on their response to a question like that, but it did help me get a sense of how each candidate thought.
Pay attention to both your technical skills and your job search skills. If you're having trouble getting interviews, you need to work on networking with other humans. If you're having trouble passing technical interviews, you should focus on your technical skills.
Your skills and experience are the assets that keep you employed. Don't let them decay. Fight to get onto projects that will teach you something new. Fight for the opportunity to go to conferences, or just spend work hours taking an online course. If your employer doesn't value continuous learning, find one that does.
|
0.992509 |
The Middle Ages was a period of enormous historical, social, and linguistic change, despite the continuity of the Roman Catholic Church.
Linguistic and cultural changes in Britain were accelerated by the time of the Norman Conquest in 1066, when words from French began to enter the English vocabulary.
The Beowulf poet and other Christian writers were fascinated with the conflict between the heroic code of their pagan ancestors, which stressed blood revenge, and the Christian religion's emphasis on forgiveness.
Linguistic and cultural exchange characterized the period of a French-speaking ruling class in England.
The linguistic, political, and cultural climate in Britain by the 1360s allowed for a "flowering" of Middle English literature in the writings of Geoffrey Chaucer, William Langland, and the Gawain poet.
In terms of English history, the time span between the collapse of the Roman Empire and the Renaissance is called the Middle Ages, and the adjective "medieval" refers to whatever was made, written, or thought during the Middle Ages. The Middle Ages was a period of enormous historical, social, and linguistic change, despite the continuity of the Roman Catholic Church.
The Anglo-Saxon invaders, who began their conquest of southeastern Britain around 450, transcribed and transliterated works into Old English. Linguistic and cultural changes in Britain were accelerated by the time of the Norman Conquest in 1066, when words from French began to enter the English vocabulary. Until the close of the fourteenth century, French was the language of conducting business in Parliament and in a court of law. Awareness of a uniquely English literature did not actually exist until the end of the war begun by Edward III in 1336 to enforce his claim to the French throne. Geoffrey Chaucer's decision to emulate French and Italian poetry in his own vernacular prompted a changed in the status of English.
Britain was largely Christian during the Roman occupation. After the collapse of the Roman Empire, peoples belonging primarily to three Germanic tribes invaded Britain: the Angles, the Saxons, and the Jutes. Christian missionaries were sent from Kent in southern England and from Ireland to consolidate religious control of Britain. The conversion of the people was completed in 731, according to Bede's Ecclesiastical History of the English People. Before the Christian conversion, there had been no books. Anglo-Saxon heroic poetry was part of an oral tradition. The Beowulf poet and other Christian writers were fascinated with the conflict between the heroic code of their pagan ancestors, which stressed blood revenge, and the Christian religion's emphasis on forgiveness. Formulaic phrases, irony, and harsh struggles characterize Old English poetry.
The Normans, an Anglo-Saxon tribe of Germanic ancestry whose name is a contraction of "Norsemen," conquered England in the Battle of Hastings. They adopted the French language and Christian religion of the land. Henry II, the first of England's Plantagenet kings, acquired vast provinces in southern France through his marriage to Eleanor of Aquitaine, the divorced wife of Louis VII of France. Linguistic and cultural exchange characterized the period of a French-speaking ruling class in England. Latin remained the "international" language of learning, theology, science, and history. The Norman aristocracy spoke French, but intermarriage with native English nobility and everyday exchange between masters and servants encouraged bilingualism. Celtic languages were spoken in Ireland, Wales, Cornwall, and Brittany. Many literary texts written in Anglo-Norman England were adapted from French and Celtic sources.
The growth of international trade and influence of the merchant class came amidst calamities and upheavals of the fourteenth century. To finance his wars, Edward III was obliged to negotiate for revenues with the Commons in the English Parliament, allowing the institution to replace the church as a major political force. The linguistic, political, and cultural climate in Britain by the 1360s allowed for a "flowering" of Middle English literature in the writings of Geoffrey Chaucer, William Langland, and the Gawain poet. Chaucer drew from the work of ancient Roman poets, yet he never achieved the laurels accorded to Petrarch during his own time. William Langland, author of Piers Plowman, presented a clear-sighted vision of social and religious issues in his writing. In the fifteenth century, morality plays personified the vices and virtues as they struggle for the soul of "mankind" and "everyman." Julian of Norwich and Margery Kempe provided insights into the female perspective of the church and its doctrines. Sir Thomas Malory defined the English form of the sage of King Arthur and his knights in Morte Darthur.
|
0.999783 |
The AI vision was articulated over seventy years ago when Alan Turing proposed the Turing Test as a measure of machine intelligence and Isaac Asimov published his Three Laws of Robotics. Artificial Intelligence (AI), since then, has been defined as a pool of technologies that enable machines to perceive their surrounding environments, reason over their context and ultimately act in a way similar to humans. AI makes machines intelligent and enables them to perform complex tasks such as understanding problems, learning and perceiving situations, planning strategies about confronting problems and ultimately controlling other machines. Over the years the acceptance of Artificial Intelligence has grown significantly which has led to a more advanced and better AI technology and a broader range of applications. In following paragraphs we briefly explore the past, the present and the most important: The Future of Artificial Intelligence.
For nearly six decades AI has been evolving at a steady pace. Its evolution is reflected in the improvement of AI technologies such as machine learning and AI programming, but mainly in the evolving intelligence of AI applications. In 1958 the Lisp programming language was invented at MIT by John McCarthy. Lisp is considered as one of the languages that is best suited for developing AI applications. Then years later, in 1968, a programmer called Richard Greenblatt, built an intelligent knowledge-based chess-playing program, which managed to achieve a class-C rating in tournament play. This chess-playing programme was a forerunner for several other AI applications, including programmes that beat the chess world champion.
Another important milestone was for AI was in 1979, when INTERNIST a knowledge-based medical diagnosis program was developed that could leverage clinical knowledge to reach its diagnosis. This was one of the first expert systems in the medical domain. Beyond medical and gaming applications, Allstar Advice Inc. developed the first commercial strategic and managerial advisory system was made in 1987. The system was called Alacrity and was able to parse and interpret financial models and financial statements based on a collection of over 3,000 rules.
Another path-breaking moment was in 1997, when the world watched IBM’s Deep Blue chess machine defeat the then world chess champion, Garry Kasparov. In the same year, the first official RoboCup soccer tournament was organized with the participation of almost 40 teams of interacting robots. This milestone signaled the rise of sophisticated robots and their use in various applications. Till 2005, Honda’s ASIMO robot, an artificially intelligent humanoid robot, was the first machine that was able to walk as fast as a human. ASIMO was used to deliver trays to customers in restaurants. Two years later the Checkers game was solved by a checkers-playing computer program that cannot lose. Ever. This was created by a team of researchers from the University of Alberta, Canada. At the same time, Google started its efforts towards building a self-driving car, which were officially announced in 2009.
Vacuum cleaners, which incorporate AI based controllers in order to provide thorough coverage of the space to be cleaned. AI technology enables vacuum cleaners such as iRobot’s Roomba to adapt to real world clutter and furniture. Also, AI empowered cleaners are able to keep track of their position, based on the use of visual landmarks within the space.
State-of-the-art smart cars, which come with a host of AI based features for increased safety and comfort, such as automatic braking, anti-lock braking systems (ABS), collision avoidance systems, alerts about pedestrians, airbag control, traction control systems, electronic stability control systems, intelligent cruise controls and more.
Self-driving cars, which are an extension of state-of-the-art cars with autonomous driving capabilities. Following Google’s announcements about its autonomous car vision, Tesla provided, in 2012, a working implementation of a semi-autonomous car. Nowadays, most car manufacturers are implementing roadmaps for rolling out self-driving vehicles shortly after 2020. As part of their self-driving vehicles strategies, manufacturers are also establishing exclusive partnerships with institutes that are at the forefront of AI research in order to endow their cars with the ability to reason about the driving context and take optimal driving decisions.
Personal Assistant Robots, which provide one of the most tangible applications of AI in the consumer space. Assistive robots engage in tasks such as the provision of information to their users, the signaling of alerts in emergency cases, as well as the entertainment of the users. One example is ASUS Zenbo robot.
The above list is not exhaustive, yet it is representative of real-life uses of the AI today. This increased penetration of robots in pragmatic applications is accounted to the radical advances in AI technology. Indeed, during the last couple of years, we have witnessed new milestones in the evolution of AI technology. One year ago, in March 2016, general-purpose rather than application specific AI was demonstrated, as Google’s AphaGo system beat Lee Sedol, a 9 dan professional Korean champion in the “GO” game. Even though this sounds similar to Deep Blue’s achievements, it is associated with some fundamental advancements comparing to older AI platforms. In particular, AlphaGo used reinforcement learning and neural networks, which provided much more than a brute force calculation of all available options in the game. Reinforcement learning and neural networks operates in a way similar to the human brain. This allowed AlphaGo to be successful in the GO game, which in orders of magnitude is much more complex than chess.
In the future, AI will continue to evolve in a way that will enable new disruptive business models and functionalities. It will also play a key role in improving quality of life through enabling humans to complete tasks more efficiently and in less time. In this direction, emerging deep learning technology is expected to play a key role in analyzing more inputs in a timely fashion, while at the same time identifying complex patterns beyond what machine learning can currently provide.
Embedded AI: AI will be increasingly embedded in devices in various contexts, including cars, consumer devices, search engines and more. We can expect most of the future devices that comprise the Internet-of-Things to employ AI capabilities.
AI machines becoming more efficient than people: In the contexts where pure information processing, than creativity, is required, AI machines will be much more efficient than people. Likewise, people will increasingly like to get service from machines rather than humans due to their efficiency and zero-error performance.
Increased penetration in daily life activities: Personal assisted robots will proliferate and start helping people in accomplishing more and more tasks. AI will assist people in tasks such as medical treatments, food preparation and support with laborious activities.
Self-driving vehicles and safer transport: The advent of AI-enabled self-driving cars will reduce the count of accidents significantly, saving millions of lives and leading to huge economic savings.
Augmenting human abilities: AI devices and robots will in the future give us superhuman abilities, by extending our current capabilities in terms of faster processing of information, as well as in terms of performing manual tasks that are not possible nowadays.
Some of our best friends will be robots: Future robots are likely to be our companions in addition to being valuable assistants. To this end, future robots may be also able to understand human behavior, while feeling our emotions. As depicted in the movie, HER this relationship might not sound appealing today but will provide a radically new human-centric dimension to AI.
And yet it is never possible to completely predict the future of technology and where it’s headed. We do have good evidence that AI will positively disrupt our everyday lives, while changing the world for the better and we should prepare to experience this revolution and embrace all that it have to offer.
|
0.999999 |
Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability.
The memory type, custom interface and proprietary nature of mobile devices requires a different forensic process compared to computer forensics. Each device often has to have custom extraction techniques used on it. Mobile devices can be used to save several types of personal information such as contacts, photos, calendars and notes.
As a field of study forensic examination of mobile devices dates from the late 1990s and early 2000s. The role of mobile phones in crime had long been recognized by law enforcement. With the increased availability of such devices on the consumer market and the wider array of communication platforms they support (e.g. email, web browsing) demand for forensic examination grew.
In comparison to computer forensics, law enforcement are much more likely to encounter a suspect with a mobile device in his possession and so the growth of demand for analysis of mobiles has increased exponentially in the last decade.
Early efforts to examine mobile devices used similar techniques to the first computer forensics investigations; analyzing phone contents directly via the screen and photographing important content. Over time commercial tools appeared which allowed examiners to recover phone memory with minimal disruption and analyze it separately.
In more recent years these commercial techniques have developed further and the recovery of deleted data from proprietary mobile devices has become possible with some specialist tools.
As mobile device technology advances, the amount and types of data that can be found on a mobile device is constantly increasing. Evidence that can be potentially recovered by law enforcement agents from a mobile phone may come from several different sources, including SIM card, Handset and attached memory cards.
Traditionally mobile phone forensics has been associated with recovering SMS and MMS messaging, as well as call logs, contact lists and phone IMEI/ESN information. Newer generations of smart phones also include wider varieties of information; from web browsing, Wireless network settings, e-mail and other forms of rich internet media, including important data now retained on smartphone 'apps'.
The European Union requires its members countries to retain certain telecommunications data for use in investigations. This includes data on calls made and retrieved. The location of a mobile phone can be determined and this geographical data must also be retained. Although this is a different science than forensic analysis which is undertaken once the mobile phone has been seized.
Main article: digital forensic process The forensics process for mobile devices broadly matches other branches of digital forensics; however, some particular concerns apply. One of the main ongoing considerations for analysts is preventing the device from making a network/cellular connection; which may bring in new data, overwriting evidence. To prevent a connection mobile devices will often be transported and examined from within an Faraday cage (or bag).
Seizing mobile devices is covered by the same legal considerations as other digital media. Mobiles will often be recovered switched on; as the aim of seizure is to preserve evidence the device will often be transported in the same state to avoid a shutdown changing files.
The second step in the forensic process is acquisition, in this case usually referring to retrieval of material from a device (as compared to the bit-copy imaging used in computer forensics).
Because of the proprietary nature of mobiles it is often not possible to acquire data with it powered down, most mobile device acquisition is performed live. With more advanced smartphones using advanced memory management, connecting it to a recharger and putting it into a faraday cage may not be good practice. The mobile device would recognize the network disconnection and therefore it would change its status information that can trigger the memory manager to write data.
Most acquisition tools for mobile devices are commercial in nature and consist of a hardware and software component, often automated.
As an increasing number of mobile devices use high-level file systems, similar to the file systems of computers, methods and tools can be taken over from hard disk forensics or only need slight changes.
The FAT file system is generally used on NAND memory. A difference is the block size used, which is larger than 512 bytes for hard disks and depends on the used memory type, e.g., NOR type 64, 128, 256 and NAND memory 16, 128, 256, or 512 kilobyte.
Different software tools can extract the data from the memory image. One could use specialized and automated forensic software products or generic file viewers such as any hex editor to search for characteristics of file headers. The advantage of the hex editor is the deeper insight into the memory management, but working with a hex editor means a lot of handwork and file system as well as file header knowledge. In contrast, specialized forensic software simplifies the search and extracts the data but may not find everything. AccessData, Sleuthkit, and EnCase, to mention only some, are forensic software products to analyze memory images. Since there is no tool that extracts all possible information, it is advisable to use two or more tools for examination. There is currently (February 2010) no software solution to get all evidences from flash memories.
Physical acquisition implies a bit-by-bit copy of an entire physical store (e.g., a memory chip). A physical acquisition has the advantage of allowing deleted files and data remnants to be examined. Physical extraction acquires information from the device by direct access to the flash memories. Generally this is harder to achieve because the device vendors needs to secure against arbitrary reading of memory so that a device may be locked to a certain operator. A physical extraction is the method most similar to the examination of a personal computer. It produces a bit-by-bit copy of the device's flash memory. Generally the physical extraction is then split into two steps, the dumping phase and the decoding phase.
Logical acquisition implies a bit-by-bit copy of logical storage objects (e.g., directories and files) that reside on a logical store (e.g., a file system partition). Logical acquisition has the advantage that system data structures are easier for a tool to extract and organize. Logical extraction acquires information from the device using the vendor interface for synchronizing the contents of the phone with a personal computer. This usually does not produce any deleted information, due to it normally being removed from the file system of the phone. However, in some cases the phone may keep a database file of information which does not overwrite the information but simply marks it as deleted and available for later overwriting. In this case, if the device allows file system access through their synchronization interface, it is possible to recover deleted information. A logical extraction is generally easier to work with as it does not produce a large binary blob. However a skilled forensic examiner will be able to extract far more information from a physical extraction.
The user interface can be utilized to investigate the content of the memory. Therefore the device is used as normal and pictures are taken from the screen. This method has the advantage that the operating system makes the transformation of raw data into human interpretable information. In practice this method is applied to cell phones, e.g., Project-a-Phone, PDAs and navigation systems. The disadvantage is that only data visible to the operating system can be recovered and that all data are only available in form of pictures.
External memory devices are SIM cards, SD cards, MMC cards, CF cards, and the Memory Stick. For external memory and the USB flash drive, appropriate software, e.g., the Unix command dd, is needed to make the bit-level copy. Furthermore USB flash drives with memory protection do not need special hardware and can be connected to any computer. Many USB drives and memory cards have a write-lock switch that can be used to prevent data changes, while making a copy. If the USB drive has no protection switch a write blocker can be used to mount the drive in a read-only mode or, in an exceptional case, the memory chip can be desoldered. The SIM and memory cards need a card reader to make the copy. The SIM card is soundly analyzed, such that it is possible to recover (deleted) data like contacts or text messages.
This section describes various possibilities to save the internal storage, nowadays mostly flash memory.
Mobile devices do not provide the possibility to run or boot from a CD, connecting to a network share or another device with clean tools. Therefore system commands could be the only way to save the volatile memory of a mobile device. With the risk of modified system commands it must be estimated if the volatile memory is really important. A similar problem arises when no network connection is available and no secondary memory can be connected to a mobile device because the volatile memory image must be saved on the internal non-volatile memory, where the user data is stored and most likely deleted important data will be lost. System commands are the cheapest method, but imply some risks of data loss. Every command usage with options and output must be documented.
AT commands are old modem commands, e.g., Hayes command set and Motorola phone AT commands, and can therefore only be used on a device that has modem support. Using these commands one can only obtain information through the operating system, such that no deleted data can be extracted.
A flasher tool is a programming hardware and/or software that can be used to program (flash) the device memory, e.g., EEPROM or flash memory. These tools mainly originate from the manufacturer or service centers for debugging, repair, or upgrade services. They can overwrite the non-volatile memory and some, depending on the manufacturer or device, can also read the memory to make a copy, originally intended as a backup. The memory can be protected from reading, e.g., by software command or destruction of fuses in the read circuit. Note, this would not prevent writing or using the memory internally by the CPU. The flasher tools are easy to connect and use, but some can change the data and have other dangerous options or do not make a complete copy.
Existing standardized interfaces for reading data are built into several mobile devices, e.g., to get position data from GPS equipment (NMEA) or to get deceleration information from airbag units.
Not all mobile devices provide such a standardized interface nor does there exist a standard interface for all mobile devices, but all manufacturers have one problem in common. The miniaturizing of device parts opens the question how to test automatically the functionality and quality of the soldered integrated components. For this problem an industry group, the Joint Test Action Group (JTAG), developed a test technology called boundary scan.
Despite the standardization there are four tasks before the JTAG device interface can be used to recover the memory. To find the correct bits in the boundary scan register one must know which processor and memory circuits are used and how they are connected to the system bus. When not accessible from outside one must find the test points for the JTAG interface on the printed circuit board and determine which test point is used for which signal. The JTAG port is not always soldered with connectors, such that it is sometimes necessary to open the device and re-solder the access port. The protocol for reading the memory must be known and finally the correct voltage must be determined to prevent damage to the circuit.
The boundary scan produces a complete forensic image of the volatile and non-volatile memory. The risk of data change is minimized and the memory chip must not be desoldered. Generating the image can be slow and not all mobile devices are JTAG enabled. Also, it can be difficult to find the test access port.
Commonly referred to as a "Chip-Off" technique within the industry - this is the last and most intrusive method to get a memory image is to desolder the non-volatile memory chip and connect it to a memory chip reader. This method contains the potential danger of total data destruction: it is possible to destroy the chip and its content because of the heat required during desoldering. Before the invention of the BGA technology it was possible to attach probes to the pins of the memory chip and to recover the memory through these probes. The BGA technique bonds the chips directly onto thePCB through molten solder balls, such that it is no longer possible to attach probes.
Here you can see that moisture in the circuit board turned to steam when it was subjected to intense heat. This produces the so-called "popcorn effect."
Desoldering the chips is done carefully and slowly, so that the heat does not destroy the chip or data. Before the chip is desoldered the PCB is baked in an oven to eliminate remaining water. This prevents the so-called popcorn effect, at which the remaining water would blow the chip package at desoldering.
There are mainly three methods to melt the solder: hot air, infrared light, and steam-phasing. The infrared light technology works with a focused infrared light beam onto a specific integrated circuit and is used for small chips. The hot air and steam methods cannot focus as much as the infrared technique.
After desoldering the chip a re-balling process cleans the chip and adds new tin balls to the chip. Re-balling can be done in two different ways.
The first is to use a stencil. The stencil is chip-dependent and must fit exactly. Then the tin-solder is put on the stencil. After cooling the tin the stencil is removed and if necessary a second cleaning step is done.
The second method is laser re-balling; see. Here the stencil is programmed into the re-balling unit. A bondhead (looks like a tube/needle) is automatically loaded with one tin ball from a solder ball singulation tank. The ball is then heated by a laser, such that the tin-solder ball becomes fluid and flows onto the cleaned chip. Instantly after melting the ball the laser turns off and a new ball falls into the bondhead. While reloading the bondhead of the re-balling unit changes the position to the next pin.
A third method makes the entire re-balling process unnecessary. The chip is connected to an adapter with Y-shaped springs or spring-loaded pogo pins. The Y-shaped springs need to have a ball onto the pin to establish an electric connection, but the pogo pins can be used directly on the pads on the chip without the balls.
The advantage of forensic desoldering is that the device does not need to be functional and that a copy without any changes to the original data can be made. The disadvantage is that the re-balling devices are expensive, so this process is very costly and there are some risks of total data loss. Hence, forensic desoldering should only be done by experienced laboratories.
Early investigations consisted of live analysis of mobile devices; with examiners photographing or writing down useful material for use as evidence. This had the disadvantage of risking the modification of the device content, as well as leaving many parts of the proprietary operating system inaccessible.
In recent years a number of hardware/software tools have emerged to recover evidence from mobile devices. Most tools consist of a hardware portion, with a number of cables to connect the phone to the acquisition machine, and some software, to extract the evidence and, occasionally, to analyse it.
Some current tools include those by Accessdata MPE, Radio Tactics, eDEC Digital Forensics, Cellebrite UFED, Micro Systemation XRY, Oxygen Forensic Suite 2, Paraben Device Seizure and MOBILedit! Forensic.
In general there exists no standard for what constitutes a supported device in a specific product. This has led to the situation where different vendors define a supported device differently. A situation such as this makes it much harder to compare products based on vendor provided lists of supported devices. For instance a device where logical extraction using one product only produces a list of calls made by the device may be listed as supported by that vendor while another vendor can produce much more information. Furthermore different products extract different amounts of information from different devices. This leads to a very complex landscape when trying to overview the products. In general this leads to a situation where testing a product extensively before purchase is strongly recommended. It is quite common to use at least two products which complement each other.
For a detailed discussion see Gubian and Savoldi, 2007. For a wide overview on nand flash forensic see Salvatore Fiorillo, 2009.
Anti-computer forensics is more difficult because of the small size of the devices and the user's restricted data accessibility. Nevertheless there are developments to secure the memory in hardware with security circuits in the CPU and memory chip, such that the memory chip cannot be read even after desoldering.
|
0.94245 |
Is there any other significant issue in American political life, besides Israel, where (a) citizens split almost evenly in their views, yet (b) the leaders of both parties adopt identical lockstep positions which leave half of the citizenry with no real voice? More notably still, is there any other position, besides Israel, where (a) a party's voters overwhelmingly embrace one position (Israel should not have attacked Gaza) but (b) that party's leadership unanimously embraces the exact opposite position (Israel was absolutely right to attack Gaza and the U.S. must support Israel unequivocally)? Does that happen with any other issue?
Not that I can think of, off the top of my head.
|
0.999988 |
Make domain notification more salient – Customer feedback for Have I been pwned?
TL;DR: Make domain-level notification (1) more obvious to find and (2) more salient in the registration form.
* "Domain search" promises, well, one-time domain search.
I suggest you add either a separate label on top bar with a separate form. Or change existing "Domain search" into "Domain search+notification" (yes, it's longer, so see other suggestion below).
On https://haveibeenpwned.com/DomainSearch there is only one salient title "Domain search / Search for pwned accounts across an entire domain". No title about "notification".
* to add between the "Domain name" entry box and the "Would you like..." another sub-title (h1, h2, whatever) reading "Notify me domain-wide" or similar.
* to change the checkbox label to at least include the word "notification" or "notify", like "Subscribe me for domain-wide notification".
This would make the feature easier to find, which will improve your interesting service.
Good point, I missed it too.
Note that when we verify a domain, which I did via a txt record, we are then told we can delete the record. What happens if the domain changes hands? I'd suggest the txt record should stay and that it should be checked before new notifications.
|
0.968209 |
how long does it take for ad banners to stop after purchasing premium credits? I bought 100000 page views yesterday and my acct is still showing "Premium status of your board: Non-premium (0 premium page views remaining)" and the banners are still on.
Normally the ads stop the same day that you purchase the credits but sometimes it takes an extra day before PayPal gets the money distributed (no idea why). Another thing that sometimes affects it is when Thor is doing one of his "holidays" but in those cases he normally tells Lesigner Girl he is going to be gone and she does something when she gets in from her "day job."
Thanks Rick. I'll just be patient then. I'm sure people are enjoying the holiday weekend.
I don't have access to board premium payments, but based on our previous correspondence, I trust that you have paid for the credits, so I added them to your board and sent an email to Thor to let him know that I did this.
I saw where you said you are uncertain how long 100,000 views will last. Although there is no way to be absolutely certain, you might be able to estimate it. I want to stress the word, "might", because I don't want it to sound like a guarantee, and there are a few factors that determine how long your credits will last.
Premium users like David will not deplete any of your premium credits, as long as they are logged in to their premium Runboard account.
In your board's miscellaneous options, if you have checked the option to display ads to logged in users, then logged in users will see ads, and those views will not deplete your credits.
If you have checked the option to display ads to logged out users, then lurkers who aren't logged in to a Runboard account will see ads, and those views will not deplete your credits.
To get a rough estimate of how long 100,000 credits might last, look at the miscellaneous options in your board's control panel, then look at the board statistics in your board's control panel.
If the option to display ads to logged out users is not checked in your miscellaneous options, follow the "Not logged in" column in your stats down to the bottom. Between the last 7 days daily average, last 30 days daily average, and 90 days daily average, find the biggest number of the three, and write it down. If the option to display ads to logged out users is checked, write a "0" instead.
If the option to display ads to logged in users is not checked, follow the "Logged in, non-premium" column down to the bottom. Between the last 7 days daily average, last 30 days daily average, and 90 days daily average, find the biggest number of the three, and write it down. If the option to display ads to logged in users is checked, write a "0" instead.
Now, add together the two numbers you wrote down. Then, take 100,000 and divide it by that sum. If, if, if your board's traffic doesn't increase, and if your premium users don't drop their premium status, you might be able to expect 100,000 credits to last at least that many days.
If you have chosen to display ads to both logged in users and logged out users, then everyone will see ads unless they are logged in to a premium user account, and those views will not deplete your credits.
Displaying ads to logged out users but not to logged in users can be a good way to reward people for creating a Runboard account and logging in to them when they lurk, which could entice them to post since they are already logged in to an account. However, advertising this fact could also result in more premium credits being depleted, because some people might create Runboard accounts just to avoid seeing ads. This is yet another factor to consider.
Thanks LG, you're a great help.
Truthfully I wasn't all that concerned with how long they'll last, I figured I'd just wait and see. Traffic isn't what it once was on the BOTB so I expect it to be quite a while. I will however definitely check all the settings and make sure we're as optimized as possible without being annoying to the people viewing the board. I "used to be" a Premium member, like David but let that go a while ago and will keep my current status because otherwise I won't know quickly when they expire (without logging in to the control panel that is).
I started a new board ([sign in to see URL]) on August 16, 2017. Through the set up process I saw references to choices I could make if it was a premium board. I've searched high and low for something to tell me how to make it a premium board, and I can't find anything (I did find how to make me a premium user, but nothing for the whole board).
Please tell me where to find that option.
Hi Miz Robbie! Welcome to Runboard!
Choose the board's name and then click on Manage.
Once you get to the boards Control Panel, scroll to the very bottom and there is a box to Purchase premium credits.
Once purchased, if you want your credits to last longer, go to Set misc board options and check the box that says: Display ads to logged out users on your board?
Susa, thank you for your speedy reply!
I had read those instructions elsewhere, but when I try to follow them I get through all those steps except there is no box to purchase premium credits.
I have some vague memory (and I haven't found anything to verify it) that new boards get a one-month ad-free period before the ads kick in. And, indeed, there haven't been any ads on my new board yet. Could it be the case, assuming my memory is correct, that the box doesn't show up until after the first month is up?
|
0.99697 |
Address these problems to get everyone working together.
Selling complex solutions is a team effort. If you’re going to cut the big deals, you’ll need to get everyone in the company to push to make it happen. Unfortunately, many companies have problems getting the operational groups — the non-sales guys — to work closely with the sales team to close business. Engineers want to do engineering, field techs want to stay in the field, support groups want to keep their stats low, and so forth. According to Sharon Daniels, CEO of the sales training firm Achieve Global, these are the five most common blunders that cause teams and companies to fail when it comes to working together to make big-ticket sales, and what you can do to fix the problems.
1. Booking too much work.
staff to ignore requests from the sales team.
How to stop it: Keep track of the amount of effort “donated” to the sales team, then adjust operational schedules to account for sales overhead.
Why it happens: Typically operational budgets are determined based upon their own goals, so there’s little incentive to spend in order to help sales.
Where it leads: The sales group become identified as a foreign entity and even as an "enemy" to be avoided and thwarted.
How to stop it: Make it clear to every organization that they exist purely to serve the needs of the customer - as defined by the sales team.
Why it happens: Sales teams often forget that their success, long term and short term, is heavily dependent upon the quality of their internal relationship.
How to stop: Make it clear to every organization that they exist purely to serve the needs of the customer - as defined by the sales team.
|
0.997339 |
Write a letter to a dead person.
Laurel chooses Kurt Cobain because her sister, May, loved him. And he died young, just like May did. Soon, Laurel has a notebook full of letters to people like Janis Joplin, Amy Winehouse, Amelia Earhart, Heath Ledger, and more -- though she never gives a single one of them to her teacher. She writes about starting high school, navigating new friendships, falling in love for the first time, learning to live with her splintering family. And, finally, about the abuse she suffered while May was supposed to be looking out for her. Only then, once Laurel has written down the truth about what happened to herself, can she truly begin to accept what happened to May. And only when Laurel has begun to see her sister as the person she was -- lovely and amazing and deeply flawed -- can she begin to discover her own path.
Author Ava Dellaira’s debut novel Love Letters to the Dead is a poignant and beautiful contemporary novel. While I didn’t quite enjoy it as much as I would have hoped and as much as the hype led me to believe, it was certainly a work of art in itself.
When Laurel’s English teacher assigns the class to write a letter to someone dead, Laurel fills her notebook with stories from her life – ranging from starting high school, meeting and making new friends, and falling in love for the first time. But can these letters overpower the grief she’s experiencing from her sister’s death?
Laurel is going through quite a tough time during the course of this story. Her faults, her fears, her passions – they all felt real. Her determination and innocence was something that I really enjoyed about her; and her optimism and kindness even when she was going through such a grim time makes it almost impossible for you not to like her.
I think if there’s one critique I had with Love Letters to the Dead it involves the pacing. I felt that the pacing was too slow, and that nothing especially noteworthy happened until approximately page 175. I caught myself skimming occasional paragraphs up until that point, and I feel it would have helped if there was a little less focus on the romance and the beautiful prose, and more on the storyline.
All in all, this is a beautiful story. It’s not about grief as you may expect – although that’s certainly part of it, but not the main focus – but rather about healing, about finding yourself and the true power of friendship and words. It’s about falling in love. It’s about delicate family relationships. And it’s about how bonds between siblings are some of the most powerful things we have.
What I told you about saving people isn’t true. You might think it is, because you might want someone else to save you, or you might want to save someone so badly. But no one else can save you, not really. Not from yourself.
Sorry for the slow pace, but this sounds like a great story overall. I’m excited that the characters are so well done, since that’s often a favorite aspect of mine in contemporary novels. I bought this one the week it came out; just need to find time to read it!
It’s definitely dark and emotionally draining, but, on the other hand, it’s a journey about remembering what you have and overcoming grief, so it can go either way. 😀 I’m glad you’re interested in it again though! I agree – it’s awesome when supporting characters feel like main characters! Thank you!
I have a friend who wasn’t quite mixed with this one so I’m glad it wasn’t the same for you. It sounds so intense, it’s always interesting to have a book like that. thanks for the review.
I can definitely see how people might have mixed reactions on this one. If you don’t click with it, it’s one of those books that might really annoy you, but if you connect to it right off the bat, it’s beautiful and heartbreaking. It’s definitely intense! 😉 Thank you for the lovely comment!
At first when I read the title of the book, my first reaction was, I don’t think I would enjoy a book with this title, but after reading your fabulous review I now want to read it and soon. I found this review of this book was one of your very best reviews, so very well written. Thanks!
Haha…I was the same way! 😉 Glad you’re interested though! Thank you!
I am really excited to read this book, I think it is coming out in a perfect time in life.
Glad you’re excited for it!
It’s definitely intense Lily – and even though it wasn’t perfect, it was still really enjoyable! 😀 Yeah, I’m the same. If everything else in the book turns out to be amazing and there’s just one minor flaw (like the pacing for this one), I’m usually able to overlook that. Thank you!
Pacing can seriously kill a book. Even if everything else was amazing, slow pacing almost always does in me. Although I may have more patience if I knowing going into the book (such happened with the Night Circus) so I may just give this a shot! You’ve definitely sold me on the characters 😀 It makes me so happy when the secondary characters are just as developed as the main ones.
Yeah, it definitely can. 🙁 Glad you’re still going to give it a shot though! I know…it’s always so exciting to have such amazing characters!
The eerily realistic cast of characters almost makes me want to push through my block on books involving the death of siblings, but I just can’t. I’m glad you enjoyed this, and I’m sure it’s as beautiful as you say, but there are like 3 or 4 premises that destroy me if they show up in a book that I’m reading, and this is one of them.
Jessica, I don’t blame you at all. This is definitely a book that can hit close to home for some people, and if this is one of the premises that has the potential to destroy you, I’d definitely give this one a miss, even if it does have such great reviews.
Beautiful review Zoe, I am glad you really enjoyed this one! I have this one on my shelf to read shortly too. I like how May is flawed because it makes her more realistic. And the side characters sound great too!
Thanks Jeann! I’ll definitely be on the lookout for your review – I hope you enjoy it as much as I do! 😀 And yes! Flawed characters are always the best because they’re easier to connect with!
Seriously, Zoe, this is a gorgeous review <3 I'm glad this was such a touching book for you. It's genuinely been on my TBR for God knows how long, but I keep pushing it back for other reads. Apparently I've been a total donut for doing that!
One of the last books I read (The Strange and Beautiful Sorrows) had the same pacing issue. The first couple of hundred pages or so were quite slow-moving, and things didn't pick up speed until halfway through. Sometimes it's worth it though – the wait – because once books like these find their footing, they're normally HOLY COW kinda good.
I saw your review and I absolutely agree. It's usually worth the wait, but sometimes it's just so hard to be patient. But, yes, once they find their footing, they're "blow-me-away" kinds of reads!
This book truly made me cry, and I think it’s because I remember my own grief. I don’t think I’ve completely healed after my Grandma died last year. We were close. This book just reminded me of how I felt like, and how I wrote on my diary, pretending I was writing to my grandmother. Anyway, I know that this book will touch anyone who would read it, as it did you. Lovely review, Zoe!
It's definitely touching! Thank you!
Awwww, this must be one of the most heartfelt reviews of this book that I’ve come across. You made me teary-eyed a bit and I haven’t even read the book yet so I don’t really know the context 🙂 Thank you for your insights, Zoe. This is probably the review that REALLY convinced me to read Love Letters to the Dead, as soon as I can. Awesome review!
Aww…thanks Faye! You just made my day!
Glad I convinced you! I'll definitely be on the lookout for your review!
I liked the letter format of this book, i thought it was very unique I have to admit it caught me off guard. I wish my book had not expired before coming out 🙁 but thus life. I will have to catch up with the rest of it through the library.
It is DEFINITELY compelling and character-driven, which is nice because there seem to be less and less of those releasing in the YA genre right now. I love a dark book once in a while as well, so you’re not alone – haha!
This definitely does sound like a great story! I feel like it’s so unique because they’re writing letters to the dead in order to deal with their own grief and struggles and there’s something kind of poetic in that I think 🙂 And I love the idea of fresh characters that all receive special attention so that none of them are stereotypes!
I’ve had my eye on this book for a while so it’s great to hear that you enjoyed it! The idea of writing letters to the dead is certainly very intriguing. Thank you so much for writing this review! I think it’s one of the most in-depth reviews I’ve read for this book and now, I’m really so much more excited to pick this one up!
It is quite the unique concept, isn’t it?
Glad it sounds up your alley Annie!
I’m not very far in so far, but I can already tell how emotionally poignant it really is. I feel like almost every word packs a punch, especially the ones involving May. I’ve just been introduced to the side characters and they do seem quite intriguing.
Lovely review <33 This book really had an effect on you, and this review definitely showcases that.
LOL…haha! 😉 I’ll definitely be on the lookout for your review though!
“ I feel like almost every word packs a punch, especially the ones involving May.” That’s EXACTLY how I felt while reading. Ava is such a poetic and powerful writer, isn’t she?
I’ve wanted to read this since I saw Emma Watson tweet about it. I’ve been hearing good things about it and I really can’t wait to read it!
Wait…Emma Watson tweeted about it? God…I’m so out of the loop – LOL! Glad you’re excited for it though!
Oh, this book. It’s one of my favorite reads from 2014 so far! It was so beautiful and heartbreaking. It took a while for me to get into it, but by the end… sobbing. I’m sorry you didn’t enjoy it as much due to the hype, but I completely agree with you in that this is a beautiful, beautiful story.
I hope it doesn’t let you down Jasprit! It’s absolutely gorgeous!
I am so jealous that you got to read this book! Ah I seriously cannot wait to read this!
Thank you Paulina! Glad it sounds like something you’d enjoy!
Okay, these characters just sound super awesome. I need to read this! Everyone has been raving about it. I’m not sure about the pacing, though, since slow books could easily bore me. Anyway, definitely picking up a copy when it becomes available in our bookstore!
Yeah! Hope you enjoy it!
I like the sound of this one excerpt for the pacing. I’ll have to check to see what the total page count is, because if 175 is the half-way mark, then I’ll pass. If not, I’ll add it to the pile. Thanks!
And BTW the page count is 323, so it’s just under the halfway mark by a little bit. Hopefully that doesn’t keep you from reading it though because everything else is so wonderfully done that it’s almost easy to overlook the pacing issue.
|
0.95407 |
What's the difference between a tornado watch and a tornado warning?
Despite the fact that meteorologists are now better able to predict them, tornadoes can strike with little warning. Therefore, it's best to be prepared well before a tornado approaches. For tips, handy checklists (including ones you can personalize yourself) and planning advice to cover a variety of situations, get the I.I.I.’s Know Your Plan app. It's a great tool to help get you and your family—including pets—organized and ready to act more quickly if disaster strikes.
Check your utility lines and appliances for damage. If you smell gas, open the windows and turn off the main valve. Don't turn on lights or appliances until the gas has dissipated. If electric wires are shorting out, turn off the power.
Make a detailed list of all damaged or destroyed personal property. If you have a home inventory, it will be extremely useful here. Don't throw out damaged property until you have met with an adjuster.
Don't rush to sign repair contracts. Do your homework, deal with reputable contractors and get references. Be sure of payment terms and consult your insurance adjuster before you sign any contracts.
Talk to your insurance professional if you have any questions about any part of your insurance coverage.
Next steps link: Another atmospheric hazard that can strike quickly is lightning—stay safe by learning the difference between lightning myth and fact.
|
0.998649 |
Which beer do brewers prefer? I once went for a drink with a man who makes some of Britain's best-selling lagers, the sort that pretend to come from continental Europe, Australia and America but are really made "under licence" in such places as south London and West Yorkshire. "What will you have?" I asked. "A pint of Fuller's London Pride," he responded expectantly.
I sometimes find myself in social mode in Britain's - once the world's - brewing capital, Burton-on-Trent. If my fellow drinkers work at different breweries, their ecumenical choice is always Marston's Pedigree.
I have just been in Burton for a massive sampling in the company of three-dozen working brewers, two-thirds of than from various corners of Britain, the rest from another nine or 10 countries, ranging from Finland to New Zealand. They were to spend two days tasting their way, in groups of four or five, through 862 lagers, ales, porters, stouts and barley wines from 30 countries.
Taking into account different strengths, and the distinctions between cask, keg, bottles and cans, there would be 50-odd awards. Entries ranged from Aass Fatol of Norway, and John Willie Lees's Moonraker from Manchester to the proudest brews of Vietnam and Swaziland. By the end of the two days, each judge would have sampled about 100 beers, and the verdicts would decide the 1994 Brewing Industry International Awards.
It is all very well to decorate a beer label with grand-looking gold medals from the 1909 World's Fair in Ruritania but a brewer would much prefer to win in Burton.
These biennial awards, established a century ago at the height of British imperial influence, are unusual in their geographical compass, and in the fact that they are judged exclusively by working brewers. It is all very well to decorate a beer label with grand-looking gold medals from the 1909 World's Fair in Ruritania but a brewer would much prefer to win in Burton.
The competition is held in stone-cloistered rooms, lit by stained-glass windows, in Burton town hail, originally the Liberal Club. It was given to the town by Michael Thomas Bass, third patriarch of the brewing dynasty. Outside sits a statue of Michael Arthur Bass, first Baron Burton.
There was no question of my being allowed judge but I was - after several special pleadings - allowed to sample, and to talk with panellists after they had voted. I sat next to Vera Honigova, who is in charge of quality at the biggest lager brewery in Prague. She was enjoying the lagers but having some difficulty with the fruitier flavours of the ales. Her friend Kiki Fredman had no such problems. "British ales? I love them!" she rejoiced. Her brewery, in lager-drinking Sweden, has just launched a pale ale. I tried it later, and found it deliciously honeyish.
"I haven't had a bad beer all week," the American judge told me. Such enthusiasm was not evident when the panels were actually in action. In August, when the Campaign for Real Ale holds its annual judging, activists will be heard praising the soothingly rich maltiness of this brew, the appetisingly hoppy dryness of that one. When brewers judge beers, they aim to identify faults, and to eliminate on that basis.
One judge complained that the hops in a particular beer were "biting my nose". Another found a beer so bitter that it was "shrinking my tongue. Seamus McGardle of Guinness, rejected a lager on the grounds that it was cabbagey. "Sulphur dioxide," pronounced Esko Pajunen from Finland. He is another lager-brewer whose company has recently launched an ale, as Finland's answer to Newcastle Brown.
The classic Continental lagers do have a slightly sulphurous note, though it is most often compared to onion or parsnip. Have a sniff next time you sample a L�wenbrau or a Grolsch. This characteristic, called dimethyl sulphide, derives from Continental malts and methods. Without a hint of it, a lager does not taste truly Continental. With too much, it smells like soup.
The most traditional lagers come from the Czech Republic and Germany, but those two countries were together represented by only six breweries. When the town hall Wurlitzer struck up rising chords to indicate section winners, one brewery, Dominion of New Zealand, had won seven awards for lagers and three for ales.
Whatever they themselves drink, brewers clearly think that beers need to be rather bland and sugary-tasting to sell well.
I expressed surprise, and one of the organisers reminded me that the judges were charged with identifying beer that were not only well made but also likely to be commercial. Whatever they themselves drink, brewers clearly think that beers need to be rather bland and sugary-tasting to sell well.
"A really characterful beer could never win," one judge shrugged. With prizes for Fosters and Castlemaine, but none for Pete's Wicked Ale or Chimay Grande Reserve, I could only agree.
When it came to cask-conditioned ales (with 267 entries), I found it easier to go along with the judges. Bass, seized the mild-ale award with its chocolatey Highgate Dark. Mansfield Brewery won prizes for two nutty-tasting bitters. The section for extra-strong bitters was deservedly conquered by the aromatic, dry, hoppy Spitfire Ale, from Shepherd Neame of Faversham, and the same brewery's Bishop's Finger came second, with the robust Firkin Dogbolter, from London, third.
Then there was the question of which beer the brewers drank after judging hours. The beers were numbered, not named, but a clamour of judges found their way to one in particular. When all was revealed, that turned out to be Timothy Taylor's very hoppy Landlord Bitter, from Keighley, Yorkshire.
The overall winners were announced yesterday. Champion draught Lager was Coors Extra Gold from Colorado, brewed under licence by Scottish and Newcastle in Manchester. The top cask-conditioned ale was Riding Bitter from Mansfield. Other champions: bottled lager, D B Export Thy, New Zealand; mild, Cameron's, Hartlepool; keg ale, Bombardier, Bedford; strong brew, Stallion Stout, Barbados.
|
0.994531 |
When would I use an interrobang?
An interrobang is a punctuation mark that combines a question mark (?) and an explanation mark (!).
What?! It cost how much‽ Are they questions or explanations? Instead of typing two punctuation marks, you can type an interrobang.
If you're preparing a print document, you can find 4 variations of the interrobang in the font Wingdings2. For web documents, type ‽ in the HTML code. But, the symbol doesn't exist in most fonts on mobile devices.
|
0.999989 |
Asbestos hazards are of concern to many home and building buyers. Home inspections may visually identify some asbestos hazards, but further asbestos inspections and testing are often needed.
Asbestos-containing material became a high profile public concern after federal legislation known as AHERA (Asbestos Hazard Emergency Response Act) was enacted in 1987. AHERA requires that all schools be inspected for asbestos-containing building materials, and that appropriate management plans be developed. As a result, many real estate buyers are now concerned about the risks of asbestos containing building materials.
It is known that asbestos fibers increase the risk of lung cancer and other respiratory diseases. If the asbestos-containing material is damaged and friable (meaning it crumbles under hand pressure) then it is advisable to have the asbestos-containing material abated. If the asbestos-containing material is not friable (for example, vinyl asbestos floor tiles or asbestos-shingle siding) or is friable but undamaged, then the EPA currently recommends that you leave the asbestos-containing material alone.
Abatement of asbestos-containing material means that is should be repaired, removed, enclosed, or included in an Operations and Maintenance plan. Repair, removal, or enclosure of asbestos-containing material should only be performed by trained and licensed asbestos abatement contractors. A general contractor's license is not sufficient. Asbestos abatement contractors have to be specifically trained in asbestos handling and disposal procedures.
The EPA includes the following five facts in their book: Managing Asbestos in Place • A Building Owner's Guide to Operations and Maintenance Programs for Asbestos-Containing Materials.
Note that this is an excerpt, and you should read the whole book before drawing conclusions.
Fact one: Although asbestos is hazardous, the risk of asbestos-related disease depends upon exposure to airborne asbestos. In other words, an individual must breathe asbestos fibers in order to incur any chance of developing an asbestos-related disease. How many fibers a person must breathe to develop disease is uncertain. However, at very low exposure levels, the risk may be negligible or zero.
Fact two: Based on available data, the average airborne asbestos levels in buildings seem to be very low. Accordingly, the health risk to most building occupants also appears to be very low.
Fact four: EPA only requires asbestos removal in order to prevent significant public exposure to airborne asbestos fibers during building demolition or renovation projects.
Fact five: EPA and OSHA recommend a proactive, in-place management program whenever asbestos-containing material is discovered. Management of asbestos in-place means having a program to ensure that the day-to-day management of the building minimizes release of asbestos fibers into the air, and ensures that if asbestos fibers are released, either accidentally or intentionally, proper control and cleanup procedures are implemented.
For information on asbestos-containing building materials, visit the EPA asbestos website or the EPA Asbestos and indoor air quality website.
To conclusively identify the material, it is necessary to take samples and send them for laboratory analysis. If you need an in-depth investigation of the asbestos conditions at your site, contact a firm specializing in asbestos investigations.
Pre-purchase inspection standards specifically exclude asbestos inspection, except for pointing out suspect asbestos to a client under certain circumstances. Heimer Engineering's pre-purchase inspections do not include asbestos testing. Heimer Engineering's Professional Engineers advise you of visibly detectable suspect asbestos, just as other Home Inspectors do. Heimer Engineering does not misrepresent this as an asbestos inspection. Asbestos testing should be performed by an experienced and properly licensed and insured Environmental Testing firm with experience in asbestos testing.
|
0.999739 |
A RELIEF ROUTE FOR DOWNTOWN DANBURY: In 1957, the Connecticut State Legislature ordered a study for a 3.5-mile-long, four-lane surface arterial connecting the then-proposed I-84 at the Danbury-Bethel border (near EXIT 8) with downtown Bethel. The proposed arterial, which was to have widely-spaced, at-grade intersections, was designed to alleviate anticipated congestion on the CT 53 (Main Street) corridor between Danbury and Bethel. However, the study determined that the proposed arterial would provide little traffic relief for the CT 53 corridor some two miles to the west.
Following two reports prepared for the city of Danbury and the Danbury Chamber of Commerce, the Connecticut State Legislature called for a new study, "Highway Planning Study of Bethel Connector to Route Interstate 84," in 1961. The new study called for the construction of the four-mile-long, four-lane CT 58 Expressway, known in the study as the "Danbury-Bethel Connector." It was to extend south from the intersection of I-84 and CT 39 (at EXIT 5) in Danbury, and end at the intersection of existing CT 58 (Putnam Park Road) and CT 302 (Greenwood Avenue) in Bethel.
WESTERN ALIGNMENT: Beginning at I-84, this alignment was to veer west of both downtown Danbury and the CT 53 corridor, then turn east toward the CT 58 / CT 302 intersection in Bethel.
CENTRAL ALIGNMENT: Beginning at I-84, this alignment was to veer east of downtown Danbury, but was to closely parallel the CT 53 corridor to Bethel. This recommended alternative was projected to provide the most traffic relief for the corridor.
EASTERN ALIGNMENT: Beginning at I-84, the first mile of the eastern alignment shared that of the central alignment. However, this alignment veered east of the CT 53 corridor in the vicinity of the Danbury railroad station.
Why has our department selected to spend the funds to realign this portion of Route 58 instead of spending the funds on an I-84 connector? The Route 58 project is part of the two-lane, two-way improvement project and is not related to the expressway program, of which an I-84 connector would be considered. Several bills were introduced in the 1969 State Legislature relative to an I-84 connector. The Department's position favored an allotment to study the feasibility type location priority for such a project. None of these bills passed.
Given the then-active proposals to construct the US 7 and CT 25 expressways, both of which would have provided north-south service through Fairfield County, the state quietly shelved the CT 58 Expressway proposal.
Patriot Drive, a new four-lane arterial route that runs from Liberty Street north to White Street (in the area of the Danbury Metro-North rail station), opened in 1975. This route parallel to Main Street (CT 53) provides improved traffic distribution in downtown Danbury, and serves to relieve congestion on Route 53. Subsequently, Liberty Street, which links Patriot Drive to Route 53, was widened to four lanes.
Additional improvements to the street and arterial network may be made as ConnDOT improves I-84 through Danbury.
SOURCE: "Route 58 Realignment: Public Hearings," Connecticut Department of Transportation (1970); Housatonic Valley Council of Elected Officials; Scott Oglesby.
CT 58 shield by Barry L. Camp.
|
0.974362 |
Compiling an outstanding annual report.
The proxy should have a date line, signature line and a space for printing the shareholder’s name. Also include information as to how the proxy should be filed (many are filed with the secretary of the corporation), and the deadline (the date and time). Regarding the time, be sure to include the applicable time zone where the meeting will take place (e.g., Eastern Standard Time, Central Standard Time, etc.). Some states, such as Indiana, Arizona and parts of Kentucky do not observe daylight saving time. The proxy and ballot will generally need to be returned to the secretary of the corporation via fax, e-mail or regular mail.
|
0.998332 |
Physical activity is the movement of body with muscles by using energy. Exercise, walking, climbing the stairs, briskly pushing, dancing are the physical activities. To maintain body fit and healthy should do physical activity. Moderate physical activities are bicycling, dancing, golf, water aerobics, tennis, walking briskly etc. vigorous physical activities are running, jogging, walking very fast, swimming, aerobics, and basketball. Review articles are the summary of current state of understanding on a particular research topic. They analyze or discuss research previously published by scientist and academicians rather than reporting novel research results. Review article comes in the form of systematic reviews and literature reviews and are a form of secondary literature. Systematic reviews determine an objective list of criteria, and find all previously published original research papers that meet the criteria. They then compare the results presented in these papers. Literature reviews, by contrast, provide a summary of what the authors believe are the best and most relevant prior publications. The concept of "review article" is separate from the concept of peer-reviewed literature. It is possible for a review to be peer-reviewed, and it is possible for a review to be non-peer-reviewed.
|
0.901305 |
U.S. Bancorp Piper Jaffray was one of ten firms that settled in April of 2003 with the Securities Exchange Commission and other federal regulators. The landmark settlement, however, was not the first regulatory action taken against Piper Jaffray. It was preceded by a number of other fines for violations on the part of the firm.
In August of 2000 Piper Jaffray proffered positive research to ThermaSense, a medical firm it was interested in providing investment banking services to. Piper Jaffray won the business of the firm, and $3.8 million in investment banking fees. Such exchanges of positive research for investment banking business constitute "conflict of interest" by fair dealing standards.
According to a January 2002 lawsuit that was filed in Montana, between 1997 and 2001 Thomas O'Neill, a former stockbroker for Piper Jaffray, performed over 5,000 unauthorized trades that cost 38 of Piper Jaffray's customers a total of $2 million. The accounts O'Neill targeted were held predominantly by elderly citizens (the State Auditor's office determined that the average age of the 38 clients was 62). The heavy trading, performed without the knowledge or consent of the clients, generated commission for O'Neill and banking fees for Piper Jaffray. The firm did not intervene despite warning signs that O'Neill's trades were illegitimate. The lawsuit may cost Piper Jaffray up to $32 million - $30 million in fines and $2 million in client restitution. A hearing will take place in September of 2003.
Piper Jaffray was fined by the NASD in June of 2002 for attempting to use its analyst research as leverage to gain a stock underwriting position. Scott Beardsley, a Managing Director of Piper Jaffray warned Antigenics Inc. on December 27, 2001, that Piper Jaffray would withhold its research on the company unless it was permitted to underwrite its secondary stock offerings. Piper Jaffray carried $250,000 of the fine and Scott Beardsley was charged $50,000.
On April 28, 2003, Piper Jaffray was one of ten firms that settled with the SEC, NASD, NYSE, NASAA, and the New York Attorney General. In the press release issued by the SEC regarding the massive settlement, Piper Jaffray was specifically mentioned for having distributed "research reports that were not based on principles of fair dealing and good faith," accepting "payments for research without disclosing such payments" (regulators have assessed the amount earned at approximately $1.8 million), and making "undisclosed payments for research" (approximately $430,000). Piper Jaffray agreed to pay a $32.5 million fine to settle these securities fraud charges. The breakdown of the settlement required $12.5 million to be paid as a penalty, $12.5 million to be paid into a restitution "distribution fund" for Piper Jaffray's customers, and $7.5 million to be put toward funding "independent research."
A securities fraud lawsuit by the SEC was filed against Piper Jaffray on the same day in New York. Piper Jaffray agreed to settle the lawsuit, though it did not admit guilt.
Between 1999 and 2001, research analysts were unduly influenced by investment banking. The bankers played a role in evaluating the performance of research analysts, and analyst compensation was linked to investment banking business.
The research Piper Jaffray published on Esperion Theraputics and Triton Network Systems was unreliable because it "lacked a reasonable basis and/or was imbalanced."
The firm failed to acknowledge the role that research played in a portion of the $1.8 million it received in underwriting fees for a number of IPOs and public offerings between June 1999 and 2001. Further, Piper Jaffray did not make a point of disclosing what it paid to other investment firms for the publication of research on the companies it worked with.
The firm did not hold its investment bankers and research analysts up to the standards explicated by the NYSE, NASD, and federal government.
|
0.975054 |
How do I ensure that plant operational expenditure is optimal and cost-effective?
Industry knowledge must be combined with advanced software to support the decision-making process.
Synergi Plant includes several risk-based methods that enable analysts to identify the most critical inspections in the system. This allows inspection tasks to be prioritized as a function of their associated risk - the higher the risk, the more important the maintenance task.
Several standards provide important elements to the concept of condition-based maintenance. Synergi Plant allows you to combine data from your plant to industry knowledge captured in standards and transform into effective and actionable plan.
Risk based methods combined with a powerful plant integrity management system which is based on several standards ensure the best resources are allocated to the most important maintenance tasks.
|
0.944827 |
The "Großer Saal des Wiener Musikvereins" (Great Hall of the Vienna Music Society) is a concert hall situated in the first district of Vienna and one of the World′s grand venues for classical concerts. Every Year on the first of January, the traditional "Neujahrskonzert" (New Years′ Concert) is performed here by the Vienna Philharmonic Orchestra.
According to some reasonably reliable sources, more than a billion people watch (and listen to) this concert every year in the concert hall or via TV and radio. Therefore, many visitors of Vienna consider a concert there the highlight of their visit to Austria.
The Musikverein was founded in 1812 as "Society of Music Friends in Vienna" - a symptom for the emerging financial confidence and self-awareness of the Viennese middle-class. Since 1831, the society organised concerts in a small hall with only 700 seats. With the growing cultural significance of music performances, the society soon realised that it was in urgent need of a bigger venue.
In 1863 - the re-development of the Ringstraße and Imperial madness met their climax - Emperor Franz Joseph I gave a piece of land to the opposite of the Karlskirche to the society. Match this with two other developments here on Karlsplatz Square: The construction of the Künstlerhaus, similarly in historicist style, as a new home to the historicists in fine arts. And the opposition through the construction of the Secession as an exhibition venue for modern artists - in response to the Künstlerhaus and the Imperial establishment.
The construction of the Secession was done with the financial aid of private investors (most notably Ludwig Wittgenstein′s father), and not with the support of the Emperor.
For the construction of the "Musikverein", the society hired one of the most popular Ringstraße architects, Theophil Hansen (he of the Academy of Fine Arts, the Stock Exchange, the Houses of Parliament or the Museum of Applied Arts). He created a massive building in neo-Classical (pseudo-Greek) style, which was officially opened in 1870. The "Goldene Saal", the bigger one of two original halls, was immediately famous for its excellent acoustics. Even today, it is considered to be among the best concert halls of its size in the World.
To some extent, this was luck - professional studies in acoustics were not done until well into the 20th century; when the architect chose proportions, materials, arrangement of decoration and ornaments and the structure of the boxes, he made exactly the right decisions without the theoretic foundations that architects have today.
In 2002, four small concert halls were added in the basement of the Musikverein. Apart from rehearsals and small concerts, they are used for conferences and receptions. They were designed by the Austrian star-architect Wilhelm Holzbauer and named according to the main "ingredient": Glass, metal, stone and wood.
Attractions nearby include the Karlskirche Church, the Wien Museum, the previously mentioned Secession and Künstlerhaus, the Academy of Fine Arts and the Naschmarkt. The Staatsoper, the Albertina and the rest of the Hofburg are within easy reach. So are the Schwarzenbergplatz and the Belvedere Palace and Austrian Gallery.
|
0.967368 |
There are new rules introduced in the MLB that are going to be put into effect this season. All of these rules aim to speed up the play of the game and decrease the total game time. In the past years, the average game length has increased to an all time high because of various factors.
Although baseball has been affectionately known as “America’s pastime,” the MLB is trying to appeal to a younger crowd. By picking up the pace of play, the MLB hopes to gain viewers in a younger demographic. The first rule that the MLB will start to enforce states that the batter must keep one foot in the box throughout the at-bat period, except for special situations (foul balls, wild pitches, stolen bases, etc. This will hopefully reduce the time between pitches, where batters usually adjust their batting gloves or engage in other pre-batting rituals. Another rule aims to cut down on the time between innings, when players are adjusting from offense to defense. In nationally broadcast games, this time will be limited to 2 min and 45 seconds, while locally broadcast games will be cut at 2 min and 25 seconds. In addition, pitchers have to end their warm-up pitches with at least 30 seconds remaining, and batters must enter the box with at least 5 seconds outside.
These rules will absolutely accelerate the game, but is it worth it? Baseball has been a very traditional game throughout history, so these changes will undoubtedly create bad sentiments among older fans. There’s a rule that already exists that the MLB will most likely start to enforce more strictly: the pitcher has 12 seconds to deliver the next pitch after he receives the ball, as long as the bases are empty. The average time between pitches has hovered around 21 seconds from 2008-2011, but has increased to 23 seconds in 2014.
As someone who grew up watching baseball and appreciating the sport, a part of me supports these rules. For fans watching the game on TV and listening on the radio, increasing the pace of play will increase viewership. It’s easy for these fans to switch to a different channel if they become bored with the game. Increasing the speed and excitement will make it more captivating for these audiences. For those watching live games at ballparks, I think the rules will have little to no effect on ticket sales or popularity of attendance. These fans come to the park for an event, most likely one where they plan to enjoy themselves eating, drinking, and watching a good game. For them, it’s not as if they have an important meeting after the game; they are there to enjoy themselves.
|
0.999716 |
When did the U.S. Supreme Court get its own building?
Surprisingly, the U.S. Supreme Court did not receive its own building until 1935. The Court had met for more than 145 years before it moved into the Supreme Court Building, located at First and East Capitol Streets NE, in Washington. In 1929, Chief Justice William Howard Taft (a former president of the United States) managed to convince Congress to fund a building for the U.S. Supreme Court.
|
0.989655 |
Make cream of chicken soup. In a medium saucepan, combine chicken broth and ½ cup of milk. Bring to a boil. In a small bowl, whisk together the flour, ½ cup of milk, and seasonings until thickened (to avoid lumps, sprinkle flour into the milk slowly and whisk briskly). Pour the flour mixture into the saucepan with broth mixture and cook over low heat, whisking often. Continue to simmer and stir for 10 minutes (note: if you choose to use canned cream of chicken soup, heat in a medium saucepan). Place shredded chicken on the bottom of a 9x13 baking dish. To the cream of chicken soup, add ½ cup of milk, sour cream, cream cheese, green chilies, enchilada sauce, and green onion. Mix to combine and cook for 2-3 minutes. Pour over the chicken and top with shredded cheese. Bake at 350°F for 30 minutes, or until bubbly. Serve over cooked rice.
|
0.945411 |
What are the pros and cons of settling my past-due credit card balance for less than I owe?
When you settle your credit card debt, the credit card company agrees to accept less than your outstanding balance as full payment. This may sound like the perfect solution to your money troubles, but there are drawbacks to debt settlement.
A lower credit score: Generally speaking, creditors only consider settling with cardholders who are delinquent. During those months of missed payments, your credit score will fall. Once the settlement is complete, the creditor will report your debt as satisfied, but not “paid in full,” doing further damage to your credit score.
Taxes owed: If the amount of the forgiven debt exceeds $600, the card company will report the full amount to the IRS on form 1099-C. Unless you were insolvent (your debts exceeded your assets) before the creditor agreed to settle, you will be required to pay income tax on the amount of the forgiven debt. If you don’t have the money to pay the IRS what you owe, you will likely have to pay a late fee plus interest on the outstanding balance.
Cash required: The card company will expect you to make the settlement payoff in one lump sum or over a few months. If you have no personal assets to draw on, you’ll need to borrow the money from friends, family or another source. If you pull money from a retirement account prematurely, you’ll pay a 10 percent penalty plus tax on the withdrawal.
Before you make efforts to settle your debt, consult with a reputable credit counselor. (Read “How do I choose a good credit counseling agency?”) If bankruptcy is a possibility, consult a reputable advisor about that as well.
If you still see debt settlement as your best option, contact and work with your creditors directly rather than hire a debt settlement company. Debt settlement firms, which attempt to settle customers’ debt for a fee, are expensive and can’t guarantee they will succeed. And hiring a debt negotiator doesn’t stop collection efforts—you could still get collection calls and even be sued and have your wages garnished. You may be able to get concessions (such as a reduced interest rate, lower monthly payments and waived late fees) from your creditors on your own, and that may be enough to get you back on track.
|
0.999942 |
"Atal ji and Sena founder Balasaheb Thackeray shared close relations when the Sena supremo was alive.
"It was due to the perseverance and struggles of Atal Ji that the BJP was built brick by brick".
The former Prime Minister was admitted in the hospital after complaining of chest congestion, his urine output was on the lower side in June and also kidney tract infection.
Highlighting his efforts at bridging the gap between US-India relations, the article said: "As the Cold War ended, he moved nonaligned India closer to the United States, welcoming President Bill Clinton to India in 2000 and strengthening bonds with pledges of support for the United States after the terrorist attacks of September 11, 2001". He said that the former prime minister was an inspiration to him and that his death was a huge loss to the nation.
His body was being transferred on Thursday evening to his Delhi residence.
Union Home Minister Rajnath Singh and BJP National President Amit Shah had visited Vajpayee on Saturday.
A large crowd of mediapersons and others have gathered outside the hospital in south Delhi to get updates on Vajpayee's health, affecting the movement of traffic on the road today. Earlier in the day, political leaders cutting across partly lines thronged the hospital to enquire about Vajpayee's health.
Congress President Rahul Gandhi wrote, "Today India lost a great son. His ascent to the premiership signaled the renewal of the party, which had grown to become the main opposition to the Indian National Congress before eventually overtaking that party".
The free-tuition initiative began more than a decade ago when NYU created an endowment for that objective . Tuition had been set at $55,018 for the coming year.
"Extremely sad to hear of the passing of Shri Atal Bihari Vajpayee, our former Prime Minister and a true Indian statesman".
After Modi, Railway Minister Piyush Goyal and BJP MP Meenakshi Lekhi also paid a visit.
"In Atalji's demise, the nation has lost a stalwart who was known for statesmanship and astute leadership".
India under the governance of Vajpayee had witnessed major historic events like in May 1998, India conducted underground nuclear tests in Rajasthan's Pokhran desert.
While India's nuclear weapons program is believed to date to the 1980s, New Delhi had long insisted its atomic program was purely for peaceful purposes. His attempts to bring peace between two warring countries, though unsuccessful, ensured a begrudging respect from Pakistan and admiration from Indians.
Loftus-Cheek made his first appearance under Sarri in Chelsea's preseason friendly against Lyon earlier this month. Meyer, also 22, left the club and joined Crystal Palace, hoping to prove himself in the Premier League.
Bollywood star Saif Ali Khan is a Nawab by birth and he is the 10th in line to attain the Nawab status in the Pataudi family. She took to her Instagram handle, shared an image of the national anthem and wrote: "Happy Independence Day".
|
0.999838 |
You've probably heard that drinking wine may be good for your health. Studies have shown that drinking moderate amounts of wine may help control blood pressure and the risks of heart disease. Wine may also reduce the risk of strokes and gallstones.
A moderate amount of wine is up to two glasses per day for men, one glass for women. Those over 65 should stick to one drink per day. Excessive drinking may lead to health problems such as cancer, stroke, fetal alcohol syndrome, and damage to the heart, pancreas, and liver.
Researchers have found that a moderate amount of ethanol increases good (HDL) cholesterol and prevents the formation of bad (LDL) cholesterol. Ethanol also prevents the formation of blood clots that could lead to a heart attack or stroke. Red wine contains antioxidants, which may be helpful in preventing certain diseases. You don't need to drink wine to benefit from antioxidants, however; they're available in fruits, vegetables, and red grape juice. Red wine is also rich in polyphenols, compounds associated with heart health. Polyphenols are also found in chocolate, tea, berries, and olive oil.
So should you start drinking wine? The American Heart Association says that if you do not currently drink, you shouldn't start drinking for health benefits. You can lower your risk of cardiovascular disease by exercising regularly and eating a low-fat diet. If you enjoy a glass of wine with dinner, consider it only a small part of your overall health strategy.
|
0.947593 |
Jack Leroy "Jackie" Wilson, Jr. (1934 – 1984) was an American soul singer-songwriter and performer. A tenor with a four octave vocal range, he was nicknamed "Mr. Excitement" (due to his fervor when performing, with his dynamic dance moves, singing and impeccable dress), and was important in the transition of rhythm and blues into soul. He was considered a master showman, and one of the most dynamic and influential singers and performers in R&B and rock 'n' roll history. Gaining fame in his early years as a member of the R&B vocal group Billy Ward and His Dominoes, he went solo in 1957 and recorded over 50 hit singles that spanned R&B, pop, soul, doo-wop and easy listening.
His major hit « Reet Petite » was reissued in 1986 following the showing of a clay animation video on the BBC Two documentary series Arena. The video was directed by Giblets, a London-based animation studio.
The reissued version proved so popular that in December 1986, almost three years after Wilson's death, the song became a No. 1 in the UK for four weeks (selling over 700,000 copies), some 29 years after its chart debut. This was the record for the longest time between a song's debut on the chart and it reaching number one.
During a 1975 benefit concert, he collapsed on stage from a heart attack and subsequently fell into a coma that persisted for nearly nine years until his death in 1984, at the age of 49. By this time, he had become one of the most influential artists of his generation, a R&B superstar known for his extraordinary, operatic multi-octave vocal range.
His stagecraft in his live shows inspired James Brown, Michael Jackson and Elvis Presley, and a host of other artists that followed. Presley was so impressed by Wilson that Elvis made it a point to meet him, and the two instantly became good friends. In a photo of the two posing together, Presley's caption in the autograph reads "You got you a friend for life."
Wilson was sometimes called "The Black Elvis". Reportedly, when asked about this Presley said, "I guess that makes me the white Jackie Wilson." Wilson also said he was influenced by Presley too, saying "A lot of people have accused Elvis of stealing the black man’s music, when in fact, almost every black solo entertainer copied his stage mannerisms from Elvis."
A two-time Grammy Hall of Fame Inductee, Wilson was inducted to the Rock and Roll Hall of Fame in 1987. In 2004, Rolling Stone magazine ranked Jackie Wilson #69 on their list of the 100 Greatest Artists of All Time.
On August 17, 2013 in Cleveland, Ohio Jackie Wilson was inducted into The Official R&B Music Hall of Fame.
Michael Jackson honored Jackie Wilson at the 1984 Grammy Awards. Jackson dedicated his Album of the Year Grammy for Thriller to Wilson, saying, "In the entertainment business, there are leaders and there are followers. And I just want to say that I think Jackie Wilson was a wonderful entertainer..."
Enjoy Jackie Wilson’s fabulous style and voice!
|
0.999737 |
How can you differentiate your practice on Google from your competitors? Search engine optimization (SEO) is the process of organizing, developing, and writing your content in a format that search engines and users love. The digital landscape is in a constant state of flux, but our digital specialists are constantly researching search engine algorithms and testing different strategies.
A blog is a regularly updated website or web page on which individuals, small groups, or businesses can post their thoughts, opinions, and knowledge in a short-form article or journal format. It can be used as a strategy to increase content and your practice’s online visibility with the ultimate goal of increasing patient flow.
|
0.978141 |
The national debt of the United States was $22.03 trillion (as of April 4, 2019). This is the total debt, or unpaid borrowed funds, carried by the federal government of the United States, which is measured as the face value of the currently outstanding Treasury securities that have been issued by the Treasury and other federal government agencies. The terms national deficit and national surplus usually refer to the federal government budget balance from year to year, not the cumulative amount of debt. A deficit year increases the debt, while a surplus year decreases the debt as more money is received than spent.
The US national debt can be divided between intragovernmental debt and publicly held debt.
Debt held by the public, such as Treasury securities held by investors outside the federal government, including those held by individuals, corporations, the Federal Reserve System, and foreign, state and local governments.
Debt held by government accounts or intragovernmental debt, are non-marketable Treasury securities held in accounts of programs administered by the federal government, such as the Social Security Trust Fund. Debt held by government accounts represents the cumulative surpluses, including interest earnings, of various government programs that have been invested in Treasury securities.
Historically, the US public debt as a share of gross domestic product (GDP) has increased during wars and recessions, and subsequently declined. The ratio of debt to GDP may decrease as a result of a government surplus or due to growth of GDP and inflation. For example, debt held by the public as a share of GDP peaked just after World War II (113% of GDP in 1945), but then fell over the following 35 years. In recent decades, aging demographics and rising healthcare costs have led to concern about the long-term sustainability of the federal government's fiscal policies. The aggregate, gross amount that Treasury can borrow is limited by the United States debt ceiling.
As of December 31, 2018, debt held by the public was $16.1 trillion and intragovernmental holdings were $5.87 trillion, for a total or "National Debt" of $21.97 trillion. Debt held by the public was approximately 76.4% of GDP in Q3 2018. In 2017, the US debt-to-GDP ratio was ranked 43rd highest out of 207 countries. The Congressional Budget Office forecast in April 2018 that the ratio will rise to nearly 100% by 2028, perhaps higher if current policies are extended beyond their scheduled expiration date. The United States has the largest external debt in the world and the 14th largest government debt as a % of GDP in the world.
The United States government has continuously had a fluctuating public debt since its formation in 1789, except for about a year during 1835–1836, a period in which the nation, during the presidency of Andrew Jackson, completely paid the national debt. To allow comparisons over the years, public debt is often expressed as a ratio to gross domestic product (GDP).
The United States public debt as a percentage of GDP reached its highest level during Harry Truman's first presidential term, during and after World War II. Public debt as a percentage of GDP fell rapidly in the post-World War II period, and reached a low in 1974 under Richard Nixon. Debt as a share of GDP has consistently increased since then, except during the presidencies of Jimmy Carter and Bill Clinton.
Public debt rose sharply during the 1980s, as Ronald Reagan cut tax rates and increased military spending. It fell during the 1990s, due to decreased military spending, increased taxes and the 1990s boom. Public debt rose sharply during George W Bush's presidency and in the wake of the 2007–2008 financial crisis, with resulting significant tax revenue declines and spending increases.
In their September 2018 monthly report published on October 5 and based on data from the Treasury Department's "Daily Treasury Statements" (DTS), the Congressional Budget Office (CBO) wrote that the federal budget deficit was c.$782 billion for the fiscal year 2018—which runs from October 2017 through September 2018. This is $116 billion more than in FY2017.:1 The Treasury statements as summarized by in the CBO report that corporate taxes for 2017 and 2018 declined by $92 billion representing a drop of 31%. The CBO added that "about half of the decline ... occurred since June" when some of the provisions of the Tax Cuts and Jobs Act of 2017 took effect, which included the "new lower corporate tax rate and the expanded ability to immediately deduct the full value of equipment purchases".
According to articles in the Wall Street Journal and in the Business Insider, based on documents released on October 29, 2018 by the Treasury Department, the Department's new projection estimates that by the fourth quarter of the FY2018, it will issue c. $1.338 trillion in debt. This would be the highest debt issuance since 2010, when it reached $1.586 trillion. The Treasury anticipates that the total "net marketable debt"—net marketable securities—issued in the fourth quarter will reach $425 billion; which would raise the 2018 "total debt issuance" to over a trillion dollars of new debt, representing a "146% jump from 2017". According to the Journal that is the highest fourth quarter issuance "since 2008, at the height of the financial crisis." As cited by the Journal and the Business Insider, the primary drivers of new debt issuance are "stagnant", "sluggish tax revenues", a decrease in "corporate tax revenue", due to the GOP Tax Cuts and Jobs Act of 2017, the "bipartisan budget agreement", and "higher government spending".
As of December 31, 2018, debt held by the public was $16.1 trillion and intragovernmental holdings were $5.87 trillion, for a total of $21.97 trillion. Debt held by the public was approximately 77% of GDP in 2017, ranked 43rd highest out of 207 countries. The Congressional Budget Office forecast in April 2018 that the ratio will rise to nearly 100% by 2028, perhaps higher if current policies are extended beyond their scheduled expiration date.
The national debt can also be classified into marketable or non-marketable securities. Most of the marketable securities are Treasury notes, bills, and bonds held by investors and governments globally. The non-marketable securities are mainly the "government account series" owed to certain government trust funds such as the Social Security Trust Fund, which represented $2.82 trillion in 2017.
The government controls the Public Company Accounting Oversight Board, which would normally criticize inconsistent accounting practices, but it does not oversee its own government's accounting practices or the standards set by the Federal Accounting Standards Advisory Board. The on- or off-balance sheet obligations of those two independent GSEs was just over $5 trillion at the time the conservatorship was put in place, consisting mainly of mortgage payment guarantees and agency bonds. The confusing independent but government-controlled status of the GSEs has resulted in investors of the legacy common shares and preferred shares launching various activist campaigns in 2014.
U.S. federal government guarantees are not included in the public debt total, until such time as there is a call on the guarantees. For example, the U.S. federal government in late-2008 guaranteed large amounts of obligations of mutual funds, banks, and corporations under several programs designed to deal with the problems arising from the late-2000s financial crisis. The guarantee program lapsed at the end of 2012 when Congress declined to extend the scheme. The funding of direct investments made in response to the crisis, such as those made under the Troubled Assets Relief Program, are included in the debt.
The U.S. government is obligated under current law to make mandatory payments for programs such as Medicare, Medicaid and Social Security. The Government Accountability Office (GAO) projects that payouts for these programs will significantly exceed tax revenues over the next 75 years. The Medicare Part A (hospital insurance) payouts already exceed program tax revenues, and social security payouts exceeded payroll taxes in fiscal 2010. These deficits require funding from other tax sources or borrowing. The present value of these deficits or unfunded obligations is an estimated $45.8 trillion. This is the amount that would have had to be set aside in 2009 in order to pay for the unfunded obligations which, under current law, will have to be raised by the government in the future. Approximately $7.7 trillion relates to Social Security, while $38.2 trillion relates to Medicare and Medicaid. In other words, health care programs will require nearly five times more funding than Social Security. Adding this to the national debt and other federal obligations would bring total obligations to nearly $62 trillion. However, these unfunded obligations are not counted in the national debt, as shown in monthly Treasury reports of the national debt.
GDP is a measure of the total size and output of the economy. One measure of the debt burden is its size relative to GDP, called the "debt-to-GDP ratio." Mathematically, this is the debt divided by the GDP amount. The Congressional Budget Office includes historical budget and debt tables along with its annual "Budget and Economic Outlook." Debt held by the public as a percentage of GDP rose from 34.7% GDP in 2000 to 40.5% in 2008 and 67.7% in 2011.
Social Security payroll taxes and benefit payments, along with the net balance of the U.S. Postal Service, are considered "off-budget", while most other expenditure and receipt categories are considered "on-budget". The total federal deficit is the sum of the on-budget deficit (or surplus) and the off-budget deficit (or surplus). Since FY1960, the federal government has run on-budget deficits except for FY1999 and FY2000, and total federal deficits except in FY1969 and FY1998–FY2001.
For example, in January 2009 the CBO reported that for fiscal year 2008 (FY2008) the "on-budget deficit" was $638 billion, offset by an "off-budget surplus" (mainly due to Social Security revenue in excess of payouts) of $183 billion, for a "total deficit" of $455 billion. This latter figure is the one commonly reported in the media. However, an additional $313 billion was required for "the Treasury actions aimed at stabilizing the financial markets," an unusually high amount due to the subprime mortgage crisis. This meant that the "debt held by the public" increased by $768 billion ($455B + $313B = $768B). The "off-budget surplus" was borrowed and spent (as is typically the case), increasing the "intra-governmental debt" by $183 billion. So the total increase in the "National debt" in FY2008 was $768B +$183B = $951 billion. The Treasury Department reported an increase in the National Debt of $1,017B for FY2008. The $66 billion difference is likely due to "supplemental appropriations" for the War on Terror, some of which were outside the budget process entirely until President Obama began including most of them in his FY2010 budget.
Since 2010, the U.S. Treasury has been obtaining negative real interest rates on government debt, meaning the inflation rate is greater than the interest rate paid on the debt. Such low rates, outpaced by the inflation rate, occur when the market believes that there are no alternatives with sufficiently low risk, or when popular institutional investments such as insurance companies, pensions, or bond, money market, and balanced mutual funds are required or choose to invest sufficiently large sums in Treasury securities to hedge against risk.
Economist Lawrence Summers has stated that at such low interest rates, government borrowing actually saves taxpayer money and improves creditworthiness.
Two economists, Jaromir Benes and Michael Kumhof, working for the International Monetary Fund, published a working paper called The Chicago Plan Revisited suggesting that the debt could be eliminated by raising bank reserve requirements and converting from fractional reserve banking to full reserve banking. Economists at the Paris School of Economics have commented on the plan, stating that it is already the status quo for coinage currency, and a Norges Bank economist has examined the proposal in the context of considering the finance industry as part of the real economy. A Centre for Economic Policy Research paper agrees with the conclusion that "no real liability is created by new fiat money creation, and therefore public debt does not rise as a result."
For the first time, in the second quarter of 2018, Foreign Direct Investment in the US was negative. Prior to the change in foreign investment trajectory, some analysts expressed concerns of exposure to potential financial or political risk should foreign banks stop buying Treasury securities or start selling them heavily. This was addressed in a June 2008 report issued by the Bank of International Settlements, which stated: "Foreign investors in U.S. dollar assets have seen big losses measured in dollars, and still bigger ones measured in their own currency. While unlikely, indeed highly improbable for public sector investors, a sudden rush for the exits cannot be ruled out completely."
According to Paul Krugman, "America actually earns more from its assets abroad than it pays to foreign investors." Nonetheless, the country's net international investment position represents a debt of more than $9 trillion.
Debt held by the public is expected to rise from 78% of GDP ($16 trillion) at the end of 2018 to 96% GDP ($29 trillion) by 2028. That would be the highest level since the end of World War II.
Many American and other economic analysts have expressed concerns on account of the People's Republic of China's "extensive" holdings of United States government debt, as part of their reserves.
The National Defense Authorization Act of the fiscal year 2012 included a provision requiring the Secretary of Defense to conduct a "national security risk assessment of U.S. federal debt held by China." The Department issued its report in July 2012, stating that "attempting to use U.S. Treasury securities as a coercive tool would have limited effect and likely would do more harm to China than to the United States. As the threat is not credible and the effect would be limited even if carried out, it does not offer China deterrence options, whether in the diplomatic, military, or economic realms, and this would remain true both in peacetime and in scenarios of crisis or war."
A significant number of economists and analysts dismiss any and all concerns over foreign holdings of United States government debt denominated in U.S. dollars, including China's holdings.
According to the Government Accountability Office (GAO), the United States is on a "fiscally unsustainable" path because of projected future increases in Medicare and Social Security spending.
According to the Treasury report in early October, summarized by Business Insider's Bob Bryan, the US federal budget deficit rose as a result of the Tax Cuts and Jobs Act of 2017 signed into law by President Donald Trump on December 22, 2017 and the Consolidated Appropriations Act, 2018 signed into law on March 23, 2018.
Debt levels may affect economic growth rates. In 2010, economists Kenneth Rogoff and Carmen Reinhart reported that among the 20 developed countries studied, average annual GDP growth was 3–4% when debt was relatively moderate or low (i.e. under 60% of GDP), but it dips to just 1.6% when debt was high (i.e., above 90% of GDP). In April 2013, the conclusions of Rogoff and Reinhart's study came into question when a coding error in their original paper was discovered by Herndon, Ash and Pollin of the University of Massachusetts, Amherst. Herndon, Ash and Pollin found that after correcting for errors and unorthodox methods used, there was no evidence that debt above a specific threshold reduces growth. Reinhart and Rogoff maintain that after correcting for errors, a negative relationship between high debt and growth remains. However, other economists, including Paul Krugman, have argued that it is low growth which causes national debt to increase, rather than the other way around.
Commenting on fiscal sustainability, former Federal Reserve Chairman Ben Bernanke stated in April 2010 that "Neither experience nor economic theory clearly indicates the threshold at which government debt begins to endanger prosperity and economic stability. But given the significant costs and risks associated with a rapidly rising federal debt, our nation should soon put in place a credible plan for reducing deficits to sustainable levels over time."
Economists also debate the definition of public debt. Krugman argued in May 2010 that the debt held by the public is the right measure to use, while Reinhart has testified to the President's Fiscal Reform Commission that gross debt is the appropriate measure. The Center on Budget and Policy Priorities (CBPP) cited research by several economists supporting the use of the lower debt held by the public figure as a more accurate measure of the debt burden, disagreeing with these Commission members.
In April 1979, however, the United States may have technically defaulted on $122 million in Treasury bills, which was less than 1% of U.S. debt. The Treasury Department characterized it as a delay rather than as a default, but it did have consequences for short-term interest rates, which jumped 0.6%. Others view it as a temporary, partial default.
U.S. official gold reserves as of 31 July 2014[update] total 261.5 million troy ounces with a book value of approximately $11.04 billion.
Foreign exchange reserves $140 billion as of September 2014[update].
Total U.S. household debt, including mortgage loan and consumer debt, was $11.4 trillion in 2005. By comparison, total U.S. household assets, including real estate, equipment, and financial instruments such as mutual funds, was $62.5 trillion in 2005.
Total U.S. Consumer Credit Card revolving credit was $931.0 billion in April 2009.
The U.S. balance of trade deficit in goods and services was $725.8 billion in 2005.
The entire public debt in 1998 was attributable to the cost of research, development, and deployment of U.S. nuclear weapons and nuclear weapons-related programs during the Cold War.
A 1998 Brookings Institution study published by the Nuclear Weapons Cost Study Committee (formed in 1993 by the W. Alton Jones Foundation), calculated that total expenditures for U.S. nuclear weapons from 1940 to 1998 was $5.5 trillion in 1996 Dollars. The total public debt at the end of fiscal year 1998 was $5,478,189,000,000 in 1998 Dollars or $5.3 trillion in 1996 Dollars.
^ "Debt to the Penny". United States Department of the Treasury. Retrieved April 4, 2019.
^ "Federal debt basics – How large is the federal debt?". Government Accountability Office. Retrieved April 28, 2012.
^ "Historical Tables – Table 1.2 – Summary of Receipts, Outlays, and Surpluses or Deficits (-) as Percentages of GDP: 1930–2017" (PDF). Office of Management and Budget. Archived from the original (PDF) on April 17, 2012. Retrieved April 16, 2012.
^ "The 2014 Long-Term Budget Outlook in 26 Slides – Congressional Budget Office". cbo.gov.
^ About 0.8% of debt ($1009 billion) is not covered by the ceiling, per The Debt Limit: History and Recent Increases, p. 4. (Note: This includes pre-1917 debt), fpc.state.gov; accessed August 24, 2016.
^ a b "The World Factbook — Central Intelligence Agency". www.cia.gov.
^ a b c d "The Budget and Economic Outlook: 2018 to 2028 – Congressional Budget Office". www.cbo.gov.
^ "Congressional Budget Office – Historical Data on the Federal Debt". cbo.gov. 2010. Retrieved January 3, 2012.
^ a b Monthly Budget Review for September 2018 (PDF) (Report). Congressional Budget Office. October 5, 2018. p. 5. Retrieved October 30, 2018.
^ a b c d e f Davidson, Kate (October 29, 2018). "Treasury Expects to Issue Over $1 Trillion in Debt in 2018". Washington, DC: Wall Street Journal. Retrieved October 30, 2018. Debt issuance this year could be highest since 2010, the Treasury said, as higher government spending and stagnant tax revenues have pushed the deficit higher.
^ a b c d e Bryan, Bob (October 30, 2018). "The US will issue over $1.3 trillion in new debt in 2018, the highest amount since the depths of the recession". Business Insider. Retrieved October 30, 2018.
^ Daily Treasury Statement (DTS) (PDF) (Report). Treasury Department. October 29, 2018. Retrieved October 30, 2018.
^ The Bureau of the Fiscal Service (July 31, 2018). "Debt to the Penny". www.treasurydirect.gov. Treasury Department. Retrieved October 30, 2018.
^ "The 2012 Annual Report of the Board of Trustees of the Federal Old-Age and Survivors Insurance and Federal Disability Insurance Trust Funds" (PDF). Ssa.gov. Retrieved 2016-08-27.
^ "Social Security Trust Fund 2010 Report Summary". Ssa.gov. Retrieved May 18, 2011.
^ "Federal debt basics – What is the difference between the two types of federal debt?". Government Accountability Office. Retrieved April 28, 2012.
^ "Measuring the Deficit: Cash vs. Accrual". Government Accountability Office. Retrieved January 19, 2011.
^ Fannie Mae, Freddie Mac to Be Kept Off Budget, White House Says (September 12, 2008), Bloomberg.com.
^ Barr, Colin (September 7, 2008). "Paulson readies the 'bazooka'", CNN.com; retrieved January 17, 2011.
^ Timiraos, Nick (March 3, 2014). "Investor Fires Salvo Against Fannie, Freddie-Viewed March 2014". WSJ. Retrieved August 24, 2016.
^ a b Congress of the United States, Government Accountability Office (February 13, 2009). "The federal government's financial health: a citizen's guide to the 2008 financial report of the United States government", pp. 7–8, gao.gov; retrieved February 1, 2011.
^ Peter G. Peterson Foundation (April 2010). "Citizen's guide 2010: Figure 10 p. 16". Peter G. Peterson Foundation website; retrieved February 5, 2011.
^ "Government – Debt Position and Activity Report". www.treasurydirect.gov.
^ CBO – The Budget and Economic Outlook: Fiscal Years 2012 to 2022 – See Historical Budget Data Supplement, Cbo.gov, January 2012.
^ "The World Factbook". Central Intelligence Agency.
^ OECD. "OECD Statistics". Stats.oecd.org. Retrieved 2016-08-27.
United States Department of the Treasury, Bureau of the Public Debt (December 2010). "The debt to the penny and who holds it". TreasuryDirect. Retrieved August 26, 2012.
^ a b "CBO Budget and Economic Outlook 2009–2019". CBO. Retrieved November 21, 2016.
^ Table 1.1 – Summary of Receipts, Outlays, and Surpluses or Deficits (-): 1789–2017 Archived July 6, 2012, at the Wayback Machine, Whitehouse.gov; accessed August 24, 2016.
^ "TreasuryDirect Historical Debt Outstanding". Treasury Direct. Retrieved November 26, 2016.
^ a b "Money in budgets, but supplementals aren't going away". Politifact. Retrieved November 26, 2016.
^ "Why the U.S. Government Never, Ever Has to Pay Back All Its Debt", The Atlantic, February 1, 2013.
^ Jaromir Benes and Michael Kumhof (August 2012) "The Chicago Plan Revisited", International Monetary Fund working paper WP/12/202; accessed November 6, 2016.
^ "The economic crisis: How to stimulate economies without increasing public debt" Archived September 16, 2012, at the Wayback Machine, Centre for Economic Policy Research, August 2012.
^ "Treasury Direct-Monthly Statement of the Public Debt Held by the U.S." (PDF). September 2014. Retrieved November 30, 2014.
^ a b Major Foreign Holders of Treasury Securities (Report). Department of the Treasury/Federal Reserve Board. March 15, 2019.
^ Amadeo, Kimberly (January 10, 2011). "The U.S. debt and how it got so big". About.com. Retrieved July 7, 2007.
^ Schoen, John W. (March 4, 2007) "Just who owns the U.S. national debt?" MSNBC.com; retrieved January 17, 2011.
^ "foreign debt by year".
^ Krugman, Paul (2012-01-01). "Nobody Understands Debt". New York Times. Retrieved 2012-02-04.
^ "US Net International Investment Position from BEA". February 1, 2019. Retrieved April 1, 2019.
^ a b CBO The 2018 Long-Term Budget Outlook, cbo.gov; accessed March 1, 2018.
^ a b Huntley, Jonathan (July 27, 2010). "Federal debt and the risk of a fiscal crisis". Congressional Budget Office: Macroeconomic Analysis Division; retrieved February 2, 2011.
^ "... Should Americans be concerned that China has started dumping some of its Treasury holdings? After all, it raises serious questions about whether China will keep lending Washington money to help finance the federal deficit in the future.": From "China is dumping U.S. debt", CNN.com, September 11, 2015.
^ :"... What about indebtedness to foreigners? ... To acquire [U.S. gov't bonds], China must export goods to us, not offset by equivalent imports. That is a cost to China. It's a cost Beijing is prepared to pay, for its own reasons: export industries promote learning, technology transfer and product quality improvement, and they provide jobs to migrants from the countryside. But that's China's business. For China, the bonds themselves are a sterile hoard. There is almost nothing that Beijing can do with them; ... its stock of T-bonds will just go on growing. And we will pay interest on it, not with real effort but by typing numbers into computers. There is no burden associated with this; not now and not later." From "In Defense of Deficits" by James K. Galbraith, The Nation, March 4, 2010.
"What Policies for Global Prosperity?" by Warren Mosler, September 23, 2010.
^ Pullen, John Patrick (December 20, 2017). "Here's When the GOP Tax Reform Bill Will Take Effect". Fortune. Retrieved December 23, 2017.
^ Werner, Erica; DeBonis, Mike (March 22, 2018). "House approves jam-packed $1.3 trillion spending bill". The Washington Post. ISSN 0190-8286. Retrieved October 30, 2018.
^ Bryan, Bob (October 15, 2018). "The US budget deficit ballooned to $779 billion this year, the highest since 2012, driven by Trump's tax law and the massive budget deal". Business Insider. Retrieved October 30, 2018.
^ U.S. House of Representatives Republican Caucus (May 27, 2010). "The perils of rising government debt", budget.house.gov; retrieved February 2, 2011.
^ Herndon, Thomas. "Herndon Responds To Reinhart Rogoff". Business Insider. Retrieved April 22, 2013.
^ Weisenthal, Joe. "Reinhart And Rogoff Admit Excel Blunder". Business Insider. Retrieved April 22, 2013.
^ Herndon, Thomas, Michael Ash, and Robert Pollin, "Does High Public Debt Consistently Stifle Economic Growth? A Critique of Reinhart and Rogoff" Archived April 18, 2013, at the Wayback Machine, University of Massachusetts – Amherst Department of Economics, April 15, 2013.
^ "Reinhart-Rogoff recrunch the numbers".
^ a b Krugman, Paul (May 27, 2010). "Bad analysis at the deficit commission". The New York Times: The Opinion Pages: Conscience of a Liberal Blog. Retrieved February 9, 2011.
^ Vikas Bajaj (April 17, 2013) "Does High Debt Cause Slow Growth?", The New York Times; retrieved May 7, 2013.
^ Matthew O'Brien, "Forget Excel: This Was Reinhart and Rogoff's Biggest Mistake", The Atlantic; accessed November 6, 2016.
^ Bernanke, Ben S. (April 27, 2010). "Speech before the National Commission on Fiscal Responsibility and Reform: Achieving fiscal sustainability", Federalreserve.gov; retrieved February 2, 2011.
^ Ferguson, Niall (November 3, 2009). "Interview with Charlie Rose" Archived January 19, 2011, at the Wayback Machine. Charlie Rose [website]; retrieved February 6, 2011.
^ CBO-Updated Budget Projections 2016–2026, cbo.gov; retrieved May 11, 2016.
^ CBO-Projection of Federal Interest Payments, cbo.gov, September 3, 2014.
^ a b Horney, James R. (May 27, 2010). "Recommendation that president's fiscal commission focus on gross debt is misguided", Center on Budget and Policy Priorities [website]; retrieved February 9, 2011.
^ United States Treasury, Bureau of the Public Debt (April 30, 2010). "Monthly statement of public debt of the United States", TreasuryDirect; retrieved February 9, 2011.
^ "CBO-Social Security Policy Options-July 2010" (PDF). Retrieved May 18, 2011.
^ Gordon, John Steele. "A Short Primer on the National Debt". Wsj.com. Retrieved 2016-08-27.
^ a b "Debt Is (Mostly) Money We Owe to Ourselves". Krugman.blogs.nytimes.com. Retrieved 2016-08-27.
^ "Who Rules America: Wealth, Income, and Power". Ucsc.edu. Retrieved 2016-08-27.
^ Baker, Dean. "David Brooks Is Projecting His Self Indulgence Again". cepr.net. Retrieved September 23, 2016.
^ "Cheating Our Children". The New York Times. March 29, 2013.
^ Carney, John. "Has the United States Ever Defaulted on Its Debt?". CNBC. Retrieved January 18, 2013.
^ Comstock, Courtney. "10 Things You Need To Know About The Debt Ceiling". The Fiscal Times. Retrieved January 18, 2013.
^ Zweig, Jason. "Own Government Bonds? Here's Why You Should Be Worried". The Wall Street Journal. Retrieved January 18, 2013.
^ Marron, Donald. "The Day the United States Defaulted on Treasury Bills". Retrieved January 18, 2013.
^ O'brien, Matthew. "Here's What Happened the Last Time the U.S. Defaulted on Its Debt". The Atlantic. Retrieved January 18, 2013.
^ Siegel, Robert. "When Did The U.S. Last Default On Treasury Bonds?". NPR. Retrieved January 18, 2013.
^ a b United States Department of the Treasury, Bureau of the Public Debt (2010). "Government – Historical Debt Outstanding – Annual", TreasuryDirect.gov; retrieved January 16, 2011.
^ a b The Executive Office of the President of the United States, Office of Management and Budget (April 10, 2013). "Federal debt at the end of year: 1940–2018"; "Gross domestic product and deflators used in the historical tables: 1940–2018", Budget of the United States Government: Fiscal Year 2014: Historical Tables, pp. 143–44, 215–16, Government Printing Office website; retrieved November 27, 2013.
^ The Executive Office of the President of the United States, Office of Management and Budget (February 14, 2010). "Historical Tables: Table 7-1; 10-1", The White House; retrieved February 15, 2010.
^ a b United States Department of Commerce, Bureau of Economic Analysis. "National Economic Accounts: Gross Domestic Product: Current-dollar and 'real' GDP", BEA.gov; retrieved August 3, 2011.
^ MeasuringWorth.com (December 14, 2010) "What was the U.S. GDP then?", MeasuringWorth.com; retrieved January 30, 2011.
^ United States Congress, Government Accountability Office (March 1, 2001). Financial Audit: Bureau of the Public Debt's Fiscal Years 2000 and 1999 Schedules of Federal Debt GAO-01-389 United States Government Accountability Office (GAO); retrieved August 6, 2012.
^ a b United States Congress, Government Accountability Office (November 1, 2002). Financial Audit: Bureau of the Public Debt's Fiscal Years 2002 and 2001 Schedules of Federal Debt GAO-03-199 United States Government Accountability Office (GAO); retrieved February 2, 2011.
^ United States Congress, Government Accountability Office (November 5, 2004). Financial Audit: Bureau of the Public Debt's Fiscal Years 2004 and 2003 Schedules of Federal Debt GAO-05-116 United States Government Accountability Office (GAO); retrieved January 16, 2011.
^ a b United States Congress, Government Accountability Office (November 7, 2006). Financial Audit: Bureau of the Public Debt's Fiscal Years 2006 and 2005 Schedules of Federal Debt GAO-07-127 United States Government Accountability Office (GAO); retrieved February 2, 2011.
^ a b c United States Congress, Government Accountability Office (November 7, 2008). Financial Audit: Bureau of the Public Debt's Fiscal Years 2008 and 2007 Schedules of Federal Debt GAO-09-44 United States Government Accountability Office (GAO); retrieved January 29, 2011.
^ United States Congress, Government Accountability Office (November 10, 2009). Financial Audit: Bureau of the Public Debt's Fiscal Years 2009 and 2008 Schedules of Federal Debt GAO-10-88 United States Government Accountability Office (GAO); retrieved February 2, 2011.
^ United States Congress, Government Accountability Office (November 8, 2010). Financial Audit: Bureau of the Public Debt's Fiscal Years 2010 and 2009 Schedules of Federal Debt GAO-11-52 United States Government Accountability Office (GAO); retrieved February 2, 2011.
^ a b United States Congress, Government Accountability Office (November 8, 2012). Financial Audit: Bureau of the Public Debt's Fiscal Years 2012 and 2011 Schedules of Federal Debt GAO-13-114 United States Government Accountability Office (GAO); retrieved November 27, 2013.
^ United States Congress, Government Accountability Office (December 12, 2013). Financial Audit: Bureau of the Fiscal Service's Fiscal Years 2013 and 2012 Schedules of Federal Debt GAO-14-173, United States Government Accountability Office (GAO); retrieved July 2, 2014.
^ GAO-Financial Audit-Bureau of the Fiscal Service's Fiscal Years 2014 and 2013 Schedules of Federal Debt, treasurydirect.gov, November 2014.
^ GAO-Financial Audit-Bureau of the Fiscal Service's Fiscal Years 2015 and 2014 Schedules of Federal Debt, treasurydirect.gov, November 2015.
^ "Government – Historical Debt Outstanding – Annual 2000–2015".
^ "Government – November". treasurydirect.gov.
^ "GDP (Official Exchange Rate)". CIA World Factbook.
^ "GDP (Purchasing Power Parity)". CIA World Factbook.
^ U.S. Department of the Treasury, Bureau of the Fiscal Service (July 13, 2014). "Status report of U.S. Treasury-owned gold".
^ U.S. Department of the Treasury, Bureau of the Fiscal Service (March 14, 2016). "United States Debt Clock".
^ Board of Governors of the Federal Reserve System (March 9, 2006). "Z.1-Flow of Funds Accounts of the United States", pp. 8, 102. Board of Governors of the Federal Reserve System [website]; retrieved January 29, 2011.
^ Board of Governors of the Federal Reserve System (June 5, 2009). "G.19-Consumer Credit". Board of Governors of the Federal Reserve System [website]; retrieved January 30, 2011.
^ United States Department of Commerce, United States Census Bureau (February 19, 2006). Archived copy at the Portuguese Web Archive (July 10, 2009).. U.S. Census Bureau [website]; retrieved January 30, 2011.
^ Preliminary Annual Report on U.S. Holdings of Foreign Securities, treasury.gov, August 29, 2014.
^ "...the total figure will likely be equal to the $5 trillion national debt. In short, one quarter to one third of all military spending since World War II has been devoted to nuclear weapons and their infrastructure ..." p. 33, Steven I. Schwartz; Nuclear Weapons Cost Study Committee (November 1995). "Four Trillion Dollars and Counting". Bulletin of the Atomic Scientists. Educational Foundation for Nuclear Science, Inc. 51 (6): 32–53. ISSN 0096-3402. Retrieved August 24, 2016.
^ Historical Budget Tables, whitehouse.gov; accessed August 24, 2016.
^ Cecchetti, Stephen G. et al. (March 2010). "The future of public debt: prospects and implications", p. 3. Bank for International Settlements [website]; retrieved July 4, 2011.
^ "Debt to the Penny (Daily History Search Application)".
^ "The United States enters the twilight zone – MuniLand". Reuters. May 3, 2012.
^ "Table 7.1 – Federal Debt at the End of Year: 1940–2016". Historical Tables. Office of Management and Budget. Archived from the original on May 16, 2011. Retrieved May 16, 2011.
^ "The-privateer.com, 1940–1960". The-privateer.com. Archived from the original on July 16, 2011. Retrieved May 18, 2011.
^ "The-privateer.com, 1961–1971". The-privateer.com. Archived from the original on July 16, 2011. Retrieved May 18, 2011.
^ "The-privateer.com, 1971–1979". The-privateer.com. Archived from the original on May 13, 2011. Retrieved May 18, 2011.
^ "The-privateer.com, 1979–1986". The-privateer.com. Archived from the original on July 16, 2011. Retrieved May 18, 2011.
^ "The-privateer.com, 1987–1997". The-privateer.com. Archived from the original on July 16, 2011. Retrieved May 18, 2011.
^ a b "The Debt Limit: History and Recent Increases" (PDF). Retrieved May 18, 2011.
^ "Republicans Raise US Debt Ceiling to $9 Trillion, Caused by Iraq War and Tax Breaks for the Rich". Usliberals.about.com. Archived from the original on August 7, 2011. Retrieved August 7, 2011.
^ "FINANCIAL AUDIT- Bureau of the Public Debt's Fiscal Years 2008 and 2007 Schedules of Federal Debt" (PDF). Retrieved 2011-08-07.
^ "Understanding the Federal Debt Limit". The Concord Coalition. Archived from the original on June 10, 2010. Retrieved August 7, 2011.
Wikimedia Commons has media related to United States government debt.
|
0.968078 |
[b][u]Personality:Damon was originally a very free-spirited young man, who was best friends with his younger brother Stefan Salvatore, who was instantly smitten with the vampire Katherine Pierce. His carefree life fell apart when Stefan betrayed Damon by alluding to their father that Katherine was a vampire; information that resulted in Katherine being trapped and taken to a church to be burned. Damon was very naive as a human, loving Katherine deeply and recklessly, regardless of the consequences and not caring that his father was shamed of him, and doing whatever he could to get her back, even if it resulted in his death.
As a human, Damon also held a sense of duty as he enrolled in the confederacy, however their father saw him as very irresponsible and reckless, proving he was very much a free spirit who did things on a whim, taking no mind to what people thought. Damon could be considered much the opposite to his brother in many regards. Whilst they both were respectful and polite, Damon had a dark side which came to play when he fell in love with Katherine, he willingly drank her blood and conspired with her to kill innocent humans, a trait which passed on to his vampire lifestyle.
[b][u]History of how your character became what he/she is now?
Damon wanted to give up his human life and spend an eternity with Katherine, and he begged Stefan to keep the secret from their father, who was a member of the Town Council and a vampire-hater. When Stefan inadvertently revealed that Katherine was a vampire, she was taken away by the townspeople. Their father was furious and scolded Damon for trying to conceal her secret and protect her. Damon was furious with Stefan, but Stefan agreed to work with him to rescue her. In the midst of their daring plan, they were both shot and killed by Giuseppe, who was ashamed of his sons for sympathizing with and loving a vampire. They both died with Katherine’s blood in their systems, but Damon awakened first and witnessed the burning of Fell's Church, where the townspeople had imprisoned the vampires, including Katherine.When Stefan awoke the next morning, Damon told him that Katherine’s death meant his reason for living was gone, and he wouldn't complete his transition into a vampire. Later that day, when Stefan returned after being unable to resist feeding on his own father, and inadvertently completing the transition, he forced Damon to drink from a young woman’s neck, causing Damon also completed his transition. He promised Stefan an eternity of misery, not for making him turn but for the fact that Katherine had turned Stefan as well, instead of just Damon. At some point Damon received a daylight ring from Emily Bennett. She told Damon that she had spared the vampires in the church, which Damon kept secret from Stefan until 145 years later, when he would be able to free Katherine from the church.
[b][u]General History: He was born in 1840 and lived in the colonial town of Mystic Falls with his brother Stefan and his father, Giuseppe Salvatore. He became a vampire in 1864. At the time of his return to Mystic Falls, Damon and Stefan hadn't seen each other in fifteen years due to their bitter, violent relationship.
Damon’s sole purpose in coming back to Mystic Falls was to free Katherine Pierce, the vampire who turned him and the woman he deeply loved. After realizing that Katherine never loved him, Damon started working with Stefan and Katherine’s descendant and doppelgänger, Elena Gilbert, whom he eventually falls in love and begins a romantic relationship with. He currently lives with his girlfriend, Elena (when she isn't away at college), and her brother, Jeremy Gilbert in the Salvatore Boarding House. For the majority of the first season, Damon was the main antagonist but began to change because of Elena and sometimes his brother.
Because of the impact Elena has had on him, he protects her, her family, and frequently her friends. Damon has been helping Elena with her new found vampirism.
His best friend is Elena Gilbert. After Alaric's death, he continues to think of him as his best friend, "brother", and drinking buddy.
Accepted, Welcome to Crystal Waters!
|
0.878432 |
Thalamic control of human attention driven by memory and learning.
The role of the thalamus in high-level cognition-attention, working memory (WM), rule-based learning, and decision making-remains poorly understood, especially in comparison to that of cortical frontoparietal networks [1-3]. Studies of visual thalamus have revealed important roles for pulvinar and lateral geniculate nucleus in visuospatial perception and attention [4-10] and for mediodorsal thalamus in oculomotor control . Ventrolateral thalamus contains subdivisions devoted to action control as part of a circuit involving the basal ganglia [12, 13] and motor, premotor, and prefrontal cortices , whereas anterior thalamus forms a memory network in connection with the hippocampus . This connectivity profile suggests that ventrolateral and anterior thalamus may represent a nexus between mnemonic and control functions, such as action or attentional selection. Here, we characterize the role of thalamus in the interplay between memory and visual attention. We show that ventrolateral lesions impair the influence of WM representations on attentional deployment. A subsequent fMRI study in healthy volunteers demonstrates involvement of ventrolateral and, notably, anterior thalamus in biasing attention through WM contents. To further characterize the memory types used by the thalamus to bias attention, we performed a second fMRI study that involved learning of stimulus-stimulus associations and their retrieval from long-term memory to optimize attention in search. Responses in ventrolateral and anterior thalamic nuclei tracked learning of the predictiveness of these abstract associations and their use in directing attention. These findings demonstrate a key role for human thalamus in higher-level cognition, notably, in mnemonic biasing of attention.
|
0.964677 |
Modern entertainment magic, as pioneered by 19th century magician Jean Eugène Robert-Houdin, has become a popular theatrical art form. In the late 19th and early 20th centuries, magicians such as Maskelyne and Devant, Howard Thurston, Harry Kellar, and Harry Houdini achieved widespread commercial success during what has become known as "The Golden Age of Magic". During this period, performance magic became a staple of Broadway theatre, vaudeville, and music halls. Magic retained its popularity in the television age, with magicians such as David Copperfield, Doug Henning, Penn & Teller, and David Blaine transitioning away from traditional venues.
The escapologist and magician Harry Houdini took his stage name from Robert-Houdin and developed a range of stage magic tricks, many of them based on what became known after his death as escapology. Houdini was genuinely skilled in techniques such as lockpicking and escaping straitjackets, but also made full use of the range of conjuring techniques, including fake equipment and collusion with individuals in the audience. Houdini's show business savvy was as great as his performance skill. There is a Houdini Museum dedicated to him in Scranton, Pennsylvania.
Harry Houdini was a Hungarian-American illusionist and stunt performer, noted for his sensational escape acts. He first attracted notice in vaudeville in the US and as Harry Handcuff Houdini on a tour of Europe, where he challenged police forces to keep him locked up. Soon he extended his repertoire to include chains, ropes slung from skyscrapers, straitjackets under water, in 1904, thousands watched as he tried to escape from special handcuffs commissioned by Londons Daily Mirror, keeping them in suspense for an hour. Another stunt saw him buried alive and only just able to claw himself to the surface, while many suspected that these escapes were faked, Houdini presented himself as the scourge of fake spiritualists. As President of the Society of American Magicians, he was keen to uphold professional standards and he was quick to sue anyone who imitated his escape stunts. Houdini made several movies, but quit acting when it failed to bring in money and he was a keen aviator, and aimed to become the first man to fly a plane in Australia.
Erik Weisz was born in Budapest to a Jewish family and his parents were Rabbi Mayer Sámuel Weisz and Cecília Steiner. Weisz arrived in the United States on July 3,1878, on the SS Fresia with his mother, the family changed their name to the German spelling Weiss, and Erik became Ehrich. The family lived in Appleton, where his father served as Rabbi of the Zion Reform Jewish Congregation, according to the 1880 census, the family lived on Appleton Street. On June 6,1882, Rabbi Weiss became an American citizen, losing his tenure at Zion in 1887, Rabbi Weiss moved with Ehrich to New York City, where they lived in a boarding house on East 79th Street. He was joined by the rest of the family once Rabbi Weiss found permanent housing, as a child, Ehrich Weiss took several jobs, making his public début as a 9-year-old trapeze artist, calling himself Ehrich, the Prince of the Air. He was a cross country runner in his youth. When Weiss became a magician he began calling himself Harry Houdini, after the French magician Jean Eugène Robert-Houdin.
David Blaine is an American magician and endurance artist. He is best known for his feats of endurance, and has set. Blaine revolutionized the way magic is shown on television by focusing on spectator reactions and his idea was to turn the camera around on the people watching instead of the performer, to make the audience watch the audience. The New York Times noted that hes taken a craft thats been around for hundreds of years and done something unique, according to the New York Daily News, Blaine can lay claim to his own brand of wizardry. The magic he offers operates on a personal level. Blaine was born and raised in Brooklyn, New York, the son of Patrice Maureen White, a teacher, and William Perez. His father was of half Puerto Rican and half Italian descent, when Blaine was four years old, he saw a magician performing magic in the subway. This triggered a lifelong interest for him and he was raised by his single mother and attended many schools in Brooklyn. When he was 10 years old, his mother married John Bukalo and they moved to Little Falls, New Jersey, when Blaine was 17 years old, he moved to Manhattan, New York.
On May 19,1997, Blaines first television special, David Blaine and it really, really does break new ground, said Penn Jillette of Penn and Teller. When asked about his style, Blaine explained, “Id like to bring magic back to the place it used to be 100 years ago. ”Time commented, His deceptively low-key. Jon Racherbaumer commented, Make no mistake about it, the focus of show, boys. It is really about theatrical proxemics, about the show-within-a-show and the spontaneous, USA Today called Blaine the hottest name in magic right now. According to CNN, Blaines only communication to the world was by a hand buzzer. BBC News reported that the coffin had six inches of headroom. During the endurance stunt Blaine did not eat and drank only two to three US tablespoons of water a day. An estimated 75,000 people visited the site, including Marie Blood, Harry Houdinis niece, who said, My uncle did some amazing things, on the final day of the stunt, April 12, hundreds of news teams were stationed at the site for the coffin-opening.
|
0.999998 |
If you die with unpaid credit card debt, what happens to it? Whether it must be paid and by whom, depends upon several factors. A common misconception is that your credit card debt will be inherited by your spouse or heirs, requiring them to pay off the debt. Under the laws of the State of Michigan, the only time another person, including a spouse, is required to pay the debt, is if the debt was a joint obligation, or if someone co-signed the debt. For example, if you and your spouse have a joint credit card (upon which you are both account holders), then the surviving spouse remains liable for the entire debt. If the debt was solely in the name of the deceased, no one else can be made to make payment of the debt. Debt collectors may try to make your heirs believe otherwise, but it is imperative that you know your rights.
However, creditors can make a claim and seek repayment from the Estate of a of the debtor. For example, if a person dies leaving $10,000 in credit card debt and has $100,000 in estate assets, estate assets may be used to pay the debt, provided the creditor follows the necessary steps to obtain payment. If a debtor dies leaving more debt than assets and there is no joint card holder, the credit card company is typically unable to collect the debt.
If a loved one dies and you receive calls from a debt collector, it is important that you know your rights. Debt collectors often call the loved ones of a deceased debtor in an attempt to obtain payment. Typically, they play on your sense of "fairness" and try to get someone to pay the bill, even though that person may not be legally responsible for the debt. If you receive such a call, do not make payment. You should contact an attorney to discuss your rights and obligations.
|
0.997592 |
The player starts the game by picking which camp counselor he/she wants to control. Each of the counselors is stationed in a different cabin across the map, and they have certain strengths and weaknesses, most prominently in terms of their speed and how high they can jump. No matter which character the player chooses, the player character starts out with an unlimited supply of rocks that he can throw at enemies (i.e. zombies, wolves, and bats), which sometimes leave behind vitamin jars to restore lost health, or more powerful weapons, such as a machete or a torch that shoots short range fireballs. The player's ultimate goal is to obtain the pitchfork and to kill Jason. To get it, the player must venture to a cave where he will have to defeat the flying head of Jason's mother, which will have to be defeated several times before she will leave the pitchfork behind. Jason's mother returns to the cave after a battle with Jason.
|
0.999979 |
Is Android POSIX-compatible? I know it uses the Linux kernel, but I'm not sure if that means it's POSIX compatible, as the POSIX standard deals more with userland functions. So, is it compatible?
For example, if I use only ANSI and POSIX functions in my C program, would it compile and run on Android without needing any code-changes?
GNU libc (glibc) is too big and complicated for mobile phones, so Android implements its own special version of libc which is Bionic libc, which itself does not fully support POSIX , one of the most lacking features in the android Bionic libc is pthread_cancel() so if you don't use it your code will probably do fine.
And also as @code monkey mentioned you can take a look to the bionic source code. You can find additional information here .
Android is not fully POSIX compatible. First what I can notice is default c library. As you may know it is called glibc. But Android has its own c library - bionic. Here are some notes.
Some functions within Bionic's POSIX and system call headers are stubs or wrappers for Android-specific behavior, causing unintended behavior in some instances.
Wide characters. Google's NDK doesn't support wide chars properly in C or C++. With the CrystaX NDK, you get full standard compliant wide characters support. You can easily port existing code that uses wide characters/strings/streams or write new code.
The most recent toolchains The CrystaX NDK includes the most recent versions of GCC and Clang compilers as well as stables. This allows developers to use new language abilities (such as new C++ 11 features). All compilers are built with high- and low-level optimizations which enables generation of the most efficient code for target hardware.
C++11 support Since the CrystaX NDK includes the most recent versions of GCC and Clang, it supports many new C++ 11 features listed on C++0x/C++11 Support in GCC and C++98 and C++11 Support in Clang. In addition, the CrystaX NDK offers fully working C++ 11 classes std::thread, std::mutex, std::chrono etc. These classes are not available in the Google NDK because of lack of functionality in Android Bionic libc. We have investigated this problem and fixed it, so in the CrystaX NDK you can just use them and forget about ifdefs.
Objective-C support The only languages the Google NDK supports are C and C++. The CrystaX NDK adds support of Objective-C in addition to C and C++. Only the core language is supported as of now; work on Cocoa-like libraries is in progress. To start using Objective-C in your project, just add source files with the extension .m (Objective-C) or .mm (Objective-C++) and specify them in LOCAL_SRC_FILES in Android.mk.
To be continued... If you don't see some great feature here, don't hesitate to contact us and ask for it. You can also use our issue/bug tracker to report bugs or feature requests. And, of course, contributions are welcome!
0 remaining missing POSIX libm functions.
Although bionic aims to implement all of C11 and POSIX, there are still (as of Oreo) about 70 POSIX functions missing from libc. There are also POSIX functions such as the endpwent/getpwent/setpwent family that are inapplicable to Android because it lacks a passwd database. As of Oreo, libm is complete.
Some functions deliberately do not conform to the POSIX or C standards for security reasons, such as printf which does not support the %n format string.
I know this answer is bit outdated, but it would supplement answers above.
Yes, Android is not POSIX-compatible, mainly because of it's libc (Bionic) restrictions. However, using CrystaX NDK you may not feel that difference so hard - just because using CrystaX NDK development for Android become much more POSIX-compatible. We've implemented many libc parts (buggy or absent in Bionic) on our own in libcrystax.so, core of CrystaX NDK, and did it without altering of typical development flow. We're going to improve it further, since libcrystax don't yet support full POSIX set, but as of now, it supports many things such as wide characters and string, full support for locales (locale-specific input and output), full math library including complex and type-generic functions, fully working backend for Standard C++ Library (two implementations available, on your choice - GNU libstdc++ or LLVM libc++) and tons of other fixes and improvements.
Just to show how CrystaX NDK makes native development for Android easier - we've included Boost 1.57.0 into CrystaX NDK 10.1.0, which we have built from it's sources without any modifications - just because in CrystaX NDK Boost stay on top of much more POSIX-conformant base than in Google's NDK.
Not the answer you're looking for? Browse other questions tagged android c posix or ask your own question.
Can a program call fflush() on the same FILE* concurrently?
What are the most important POSIX functions not available in Android?
|
0.982562 |
Is it possible for Lady Gaga to look like a normal human being? That is the question on many a persons mind these days. Generally, we would have said no, she's clearly been beamed down from another planet, and abandoned here, because her own race found her hard to deal with on a daily basis as well.
Personal comments aside, and much to our shock, evidence has emerged that goes some way to suggesting that Lady Gaga might be a normal human being after all. Of course, it has taken a world class talent to reveal the other side to Gaga.
Wolfgang Tillmans is a German photographer and artist, and is easily one of the most important and influential contemporary figures in the art world today. Perhaps most notably, in 2000, he was the first photographer, and first non-English artist to be awarded the Turner Prize.
Tillmans has recently done a photoshoot for i-D Magazine, which features Lady Gaga looking as normal as possible. That is, if you're able to over look the shoes. The feature in the magazine is not about Gaga, but rather about the photographer himself, his attentiveness to the photographic medium and his insightful view of the world around us.
The shoot easily proves that Tillmans is not scared of a challenge, and that it is wholly possible for Lady Gaga to be considered a normal human being…just.
|
0.949493 |
A British couple got the best wedding surprise ever when their dream ceremony in Italy was gatecrashed by Justin Bieber and his new fiance Hailey Baldwin.
Rebecca Reed-Sperrin and Stefan Johansen tied the knot at the exclusive Belmond Hotel Caruso in Ravello on the picturesque Amalfi coast.
But the couple were stunned to see Bieber and Baldwin watching the nuptials from their private suite on the hotel grounds, where rooms go for £3,700 a night.
Bieber, 24, and Baldwin, 21, had been enjoying some time away from the limelight at the Italian retreat just days after getting engaged earlier this month.
The couple, who arrived in Italy after announcing their engagement, watched on as Mr Johansen, 31, and Miss Reed-Sperrin, 32, became husband and wife.
Miss Reed-Sperrin, who got engaged to her man at the hotel 18 months ago, said: 'It was surreal. We had no idea that Justin was going to be there before flying out.
'They came a few days after us and ever since they arrived there were at least 30 or 40 teens outside the hotel.
'There was security everywhere. It's usually such a quiet resort. One of my friend's spotted them watching during the speeches. We were talking on microphones so they would have been able to hear us.
However, a drone the couple had booked to film Miss Reed-Sperrin and Mr Johansen's big day was cancelled due to extra security around Bieber.
But Miss Reed-Sperrin, now enjoying a dream honeymoon in Capri, said Bieber's cameo made her special day 'even more spectacular'.
She said: 'He definitely didn't steal my thunder. It was great to have that extra wow-factor. It's nice that he stayed back.
The star-studded crowd watched on as project manager Mr Johansen, from Richmond, South West London, went about his speech none the wiser.
Miss Reed-Sperrin, who works in the oil trading industry, said Mr Johansen 'had no idea' that Bieber was listening to his every word.
She said: 'They were both stood there for a good ten minutes. Stefan didn't even realise they were there until afterwards.
'It's a good job to be honest, because if he had known it probably would have made him more flustered.
Bieber and Baldwin are thought to have left their private apartment in Italy following their four-day getaway.
|
0.970643 |
If you are considering a gold bullion investment, then you may want to look at British gold coins, and compare them with coins minted in other countries. For a long time the only gold coins that investors were interested in were gold Krugerrands, but other countries started to follow the lead of South Africa eventually and offer standard gold bullions which were very attractive to investors and quickly became popular. These coins include American Eagles, Canadian Maple Leaf, Chinese Panda, Mexican Libertads and many others. If you are going to compare British gold coins with other types of bullion, you need to make sure that the comparisons are thorough, so you can find the best coins for your investment needs.
One option if you want to invest in recognized gold bullion which are popular are Australian Gold Nuggets. These options are minted by the Australian government, and they come in standardized sizes to make investing in them easy and worry free. This is also true of many British gold coins as well, because the newer issues contain a specific weight and purity of gold that is displayed on the coin. Many of the old British coins may have various amounts of gold included, but these are usually purchased for their numismatic value rather than their bullion value.
When it comes to gold value, British gold coins offer the same benefits that all gold coins do. As long as you choose British Sovereign gold coins or other solid and popular bullion coins it does not matter which country they come from for many investors. There are some tax considerations though, and you should research the tax implications on your investments before you choose the right types of coins. British gold coins may be exempt from the VAT, or value added tax, and this can help increase the returns you will see if you choose these coins instead of other types.
British bullion, however, is not a highly popular choice among investors because it carries higher than average dealer mark ups and may be harder to sell compared to its American, Canadian and South African counterparts. British coins of older mintages similar to Russian gold coins are considered more collectibles rather than an investment mechanism and are purchased for their rarity factors dictating significantly higher price than their actual metal value.
|
0.999927 |
IIf a rental house needs to be tented for termites who pays for the tenant's lodging during that time?
It will take 3 days to fumigate. Does the tenant pay for security if desired while the house is tented?
You need to check your Residential Lease Agreement for specifics to your state. In California, the California Residential Lease Agreement item #31 TEMPORARY RELOCATION states that "Subject to local law, Tenant agrees, upon demand of Landlord, to temporarily vacate Premises for a reasonable period, to allow for fumigation (or other methods) to control wood destroying pests or organisms, or other repairs to Premises. Tenant agrees to comply with all instructions and requirements necessary to prepare Premises to accommodate pest control fumigation or other work, including bagging or storage of food and medicine, and removal of perishables and valuables. Tenant shall only be entitled to a credit of Rent equal to the per diem Rent for the period of time Tenant is required to vacate Premises". So, in this case, the tenant would only get comped for the 3 days of fumigation. As for "security", I would think that the tenant has Renters Insurance and thus all contents inside the Premises would be covered. The tenant should confirm this with their insurance company.
|
0.999974 |
(CNN) -- Before he died, Heath Ledger had two films in production: "The Dark Knight," the latest chapter in the Batman saga, and "The Imaginarium of Doctor Parnassus," the latest film from director Terry Gilliam.
Heath Ledger's Joker character, here on the "Dark Knight" poster, is the focus of the film's marketing effort.
Ledger's death has affected both of them in different ways.
The actor, who died Tuesday of unknown causes at age 28, had finished filming "The Dark Knight" late last year. It's due to be released in July. But marketing of the film, currently in post-production, has been thrown into turmoil, the trade paper Variety notes.
The early push for the film has focused on Ledger's villainous Joker character, including a poster with a shrouded Joker scrawling "Why So Serious?" in blood on misty glass.
The trade paper speculates that the marketing campaign will be changed abruptly.
Watch complete coverage of the sudden death of Heath Ledger.
The role as arch villain The Joker disturbed Ledger, according to The Associated Press. He called the character a "psychopathic, mass-murdering, schizophrenic clown with zero empathy."
Although unusual, Ledger's death does not mark the first time a major star has died while a film has been in production.
Dean was nominated for an Oscar for his performance, his second posthumous Oscar nomination after "East of Eden."
Brandon Lee died during filming of 1994's "The Crow," prompting director Alex Proyas to use a stunt double and special effects. Oliver Reed had a heart attack during the making of 2000's "Gladiator"; technology made it possible for director Ridley Scott to use a double as a stand-in with Reed's face computer-generated in.
Gilliam's film, which concerns prime Gilliam material such as a magic mirror, a traveling show, the devil and a rougish character played by Ledger, is more problematic.
The cast had just completed filming in London, which actor Christopher Plummer characterized as "cold as bejesus" to Entertainment Weekly. "You know how damp it gets in London. And at night the temperature drops horribly, and that little breeze gets up. You have to wear tons of stuff," he said.
Plummer said that Ledger had a "terrible, lingering bug in London, and he couldn't sleep at all. We all -- I thought he'd probably got walking pneumonia," he told EW.
Gilliam has had challenges before. During the making of his film "The Man Who Killed Don Quixote," the Monty Python troupe member coped with filming near a NATO shooting range, a flash flood and a star with a herniated disc, a final indignity that prompted financiers to pull the plug.
But nothing approaches Ledger's death. Indeed, part of the reason Gilliam was able to obtain the film's relatively paltry $30 million financing was because of Ledger's agreement to star, according to Variety.
Ledger and Gilliam had become close during the making of Gilliam's "The Brothers Grimm" and Ledger had plans to become a feature director himself, several sources have reported. The actor had directed a handful of music videos, including one for Ben Harper, with whom he formed a record company.
Last month, Gilliam told Variety, "He's going to be a much better director than I will ever be."
Plummer told EW that "Parnassus" had "an enormous amount left to do." After a short break, the cast was going to re-convene in Vancouver, British Columbia, primarily for technical and special-effects work.
|
0.972639 |
"On ne doit pas.." How we can understand instantly this sentence is talking about We or People?
Hi Alican, you can't really. It would made clear from the context of the conversation though. I.e. the previous sentence(s) will have introduced the context for either 'we' or people in general.
|
0.999735 |
JjamBbong is a Korean version of Chinese spicy seafood noodles. It is as popular as JaJangMyun (blackbean paste noodles) in Korea. You need a lot of ingredients to make this, but it is not that difficult to make and does not take a long time. Do you like spicy seafood dishes? Then, you have to try these noodles someday.
In a large pan, add 6½ cups of water, 1 dried anchovy pack, and 8 pieces of kelp. Once it starts to boil, boil it for 5 minutes on medium. The broth is the secret to delicious Korean soups.
Meanwhile, cut the vegetables: ⅔ cup cabbage, 1 cup onion, ⅓ cup carrot, 1 handful spinach, 9 mushrooms, 1 hot green pepper, 1 hot red pepper, and 1 green onion.
Prepare the seafood: Wash 15 mussels, remove the skin and organs of 12 jumbo shrimp, and cut ⅔ cup of squid to bite sized pieces.
After 5 minutes, remove the kelp from the broth.
Boil 10 more minutes, and then remove the anchovy pack. Keep the temperature on medium. You will get about 6 cups of broth at the end.
In a heated pan, fry 3 or 4 Tbsp of hot pepper oil and ½ Tbsp of minced garlic together for 10 seconds on high.
Add the cabbage, onion, and carrot.
Add the seasonings: 3 Tbsp of red pepper powder, 2 Tbsp of cooking wine, 4 Tbsp of soup soy sauce, and 2 pinches of black pepper. Boil for about 7 minutes on medium high.
While the soup is boiling, boil the water for the noodles. Follow the instruction for the noodles you have.
After boiling the soup for 7 minutes, add the prepared seafood: shrimp, mussels, and squid.
In the boiling water, add the noodles and cook for about 7 more minutes.
Add 1 handful of spinach. Boil for 5 more minutes on high.
When the soup is almost done cooking, add the green onions.
Add the peppers. Cook 1 more minute and turn off the heat.
By this time, your noodles will be done. Rinse the noodles in cold water several times.
To serve, place some noodles in a bowl and then pour the soup with seafood and vegetables on top. Since this recipe is for 3 servings, give 5 mussels and 4-5 shrimp for each serving.
This is my lunch; it looks very delicious. Assa, it is time to try it! I am very happy about this Jjambbong recipe. I hope you can try this someday.
Thank you I have been enjoying all of your recipes!! I love you!!
Fabulous recipe!! Tried it tonight and it was absolutely delicious!!! Thanks for sharing!
I am Muslim too, and I omitted the wine and it still tastes great! Although I have no idea if it tastes the same, but my friends and I enjoyed it well.
|
0.999984 |
The risk of having PSS is higher among people who were admitted to an intensive care unit (ICU) and for those who have been in the hospital for extended periods of time. PSS can affect people of any age, but a study from the University of Michigan Health System, published in 2010 the medical journal JAMA, found that older severe sepsis survivors were at higher risk for long-term cognitive impairment and physical problems than others their age who were treated for other illnesses. Their problems ranged from not being able to walk, even though they could before they became ill, to not being able to do everyday activities, such as bathing, toileting, or preparing meals. Changes in mental status can range from no longer being able to perform complicated tasks to not being able to remember everyday things.
For some patients, the cause of their PSS is obvious. Blood clots and poor blood circulation while they were ill may have caused gangrene and the need for amputations of fingers, toes, or limbs. Damage to the lungs can affect breathing. For example, in another University of Michigan Health System study, published in 2012 in the journal Shock, researchers found that sepsis survivors may be more vulnerable to developing viral respiratory (lung) infections.
Other organs may be damaged as well, such as the kidneys or liver.
These lasting physical issues can be explained, but there is more to PSS that cannot yet be explained, such as the disabling fatigue and chronic pain that many survivors experience. Others complain of seemingly unrelated problems, like hair loss that may occur weeks after their discharge from the hospital.
Many sepsis survivors also report symptoms of post-traumatic stress disorder (PTSD). Researchers have already recognized that ICU stays can trigger PTSD, which can last for years.
In other words, healthy people may be expected to rebound quickly from such a serious illness, but healthier people may actually have the opposite experience.
What can be done about PSS?
Post-sepsis syndrome must be recognized by the doctors and other healthcare professionals who care for sepsis survivors so that patients can be directed to the proper resources. Resources may include referrals for emotional and psychological support (counseling, cognitive behavioral therapy or neuropsychiatric assessment) or for physical support such as physical therapy or neurorehabilitation.
Some people who believe they have signs of PSS might find it difficult to speak to healthcare professionals about their problems. This letter, addressed to people who work in the healthcare field, helps explain some of the issues involved in PSS. If you feel this letter would be helpful, please feel free to print it out.
What is post-ICU syndrome and is it the same thing as PSS?
Post-ICU syndrome (PICS) is a recognized problem that can affect patients who have spent time in an intensive care unit or ICU, particularly if they have been sedated or placed on a ventilator. It is not unusual for someone in an ICU to become delirious – sometimes called ICU delirium. The longer a patient is in such a unit, the higher the risk of developing delirium or PICS. A study published in the New England Journal of Medicine found that some of these patients continued to have cognitive (mental) problems a year after discharge.
The difference between PICS and PSS rests in the other issues that a sepsis survivor may experience, as PSS is not just a change in cognitive function.
|
0.994622 |
Does mixing tea cancels out the effects of each teas?!
Question: Does mixing tea cancels out the effects of each teas?
In a supermarket, I've purchased a bottle of tea, which was a refrigerated mixture of 11 types of teas. Each teas have different benefits for the human body, and green tea was one of the mixtures. The tea I've purchased does not contain any artificial ingredients such as sugar, or honey.
Does mixed tea have more benefits, or does it cancels out all of the benefits of each tea?
Well first of all sugar and honey are not artificial ingredients. Even processed sugar which has been bleached and therefore has lost much of it fiber content and beneficial sides of it still isn't artificial.
Usually when the mix different teas or juices it is designed to give you multiple benefits. They won't combine things whose benefits will cancel each other out. They may add one thing to help make up for something that another does that isn't' beneficial. For example caffeine depletes the body of B vitamins, calcium, and potassium. So they may add juice or even the supplements themselves to make up for it.
That being said though you may be better off getting organic juices and teas yourself and making something that you know you will like. Most store bought item, especially those that add nutrients to make healthier use the cheapest things they can get a hold of which often mean they wont' do what they are intended for. Most companies just want to cash in on the growing health consciousness of the consumer but rely on their ignorance to keep making money.
I don't really think anything in a bottle is healthier than anything you can brew at home. I'm sure in the oils of the tea, which you would see if you ever drank any fresh brewed, there are compounds you won't find in fruits or vegetables or not in the same concentrations. Tea is healthy go ahead and brew some for yourself.
More likely it has the same benefits as one type of tea. I doubt that there is enough of any single tea to give you the full benefits of the single tea. Just enjoy it. Tea doesn't have anywhere near the nutrients of fresh fruits and vegetables.
|
0.999933 |
This year it is 500 years since Martin Luther affixed his theses to a church door. The reformation, or rather maybe the printing press, changed society and beget wars. What will happen when the Internet changes how we get and disseminate information?
Let's first look at what similarities and differences exist between the effect of the printing press on society and the Internet's effect on society.
With regards to religion, Protestantism supplanted a hierarchical system of clergy, a body of people with relationships between them, with the "leaf nodes" being the common church goers. People lived in kingdoms, principalities and similar, where power was effectively shared between the king or other leader, and the church.
With Lutheranism the king could get rid of the power of the Roman church, and with the direct relationship between scripture and the believer, there was a new concept of identity and self, which both factors may have facilitated the nation state (see Fukuyama: Political Consequences of the Protestant Reformation, Part I , Part II ).
One may even argue that it influenced Catholic France through among other factors the French revolution, and led to Napoleons' Grande Armée which size dwarfed any other armies in Europe, People where energized to fight not for the church, but for other things such as universal ideas and the nation of France. These ideas later turned into the nation state as a war machine, where a certain loyalty with and fealty to the church and a willingness for sacrifice, had been outcompeted by having the same feelings towards the nation state instead.
The printing press led to a more direct relationship between the reader and a rich selection of standardized, mass-produced messages. Radio and television would later severely limit the selection of messages and hence funnel people's thinking into narrower tracks, and in some ways veer closer to a similar grip as that of the medieval Catholic Church, but in the service of the state. Radio may have been instrumental to totalitarianism.
Let's here exclude texts that were of immediate practical use such as on engineering or agriculture, and in doing so I believe the second factor becomes of most importance. Not so that the first factor, the quality of the work is unimportant, but rather that its quality should be viewed in its normative power for how people interact, which is a combination of the accessibility and the power of its ideas.
A thorough examination of the impact of Protestant ideas is beyond the scope of this text, mainly because I do not have the overview of it, but let's just settle for that the ideas did have an enormous impact and not bother too much about in what ways. Then we are left with the analysis that these ideas shaped the interactions between people in new patterns. In Fukuyama's texts he makes a difference between Lutheranism which tended to convert whole countries and principalities top-down, and Calvinism which spread more inconspicuously throughout the fabric of society.
Let's now look at the Internet. Just as with the printing press, a discourse gets delivered to your very own eyes, and you are required to believe in the text rather than to be commanded or prodded into believing in something, as was more the ways of the Catholic Church. And maybe it is this impossibility of commanding somebody to comply to the tenets of a text, where the concept of predestination is conceived.
Why would one embrace a discourse from a book or from the Internet?
The Internet provides both reasons. The first one is prevalent in spades, and is what we refer to as the "filter bubble". The second one is seen in crypto currencies, which are creatures wholly dependent on the Internet and impossible to fathom without it, where a coin's success is completely dependent on other people's valuation of it.
The first reason, to confirm and complete already held views, can be a bit dangerous insofar that it may lead people into believing that they are more powerful in the world than they are, and that their peers are people that are actually surrounding them, instead of being spread out on the Internet. And of course it can nurture parochial views that are incompatible with interaction with other people holding different views. Some of these bubble communities — such as the flat earthers — have their fair share of people in them who cannot function in society in a productive way, which implies they are not locii of tremendous world-changing power.
The big effect of the Internet bubbles right now is in disinformation, that people do not know what facts to believe in. Partly this is due to some of the facts previously held as true were merely articles of belief meant to function as a glue in society.
When this glue comes undone, we may veer more towards anarchy or libertarianism. Crypto currencies can here be seen as a part of the new glue to hold society together, but that power also means that they may become brutal forces of change. The danger of disinformation on the other hand lies mainly in having difficulty to respond to nation states less affected by the chaos of the Internet, mainly Russia and to some extent China. However those countries may suffer much more gravely once the effects of the Internet hits them. As the entrepreneur Naval Ravikant said, China's monetary policy (to shut out crypto currencies) now boils down to its firewall policies.
The world completely went off the gold standard in the 1970s, and the flaws of "fiat" currencies (as currencies not backed by gold or similar are called) have been amplified by the super speed of computers, where the life cycle is accelerated by operations and communications close to the speed of light and the speed of logic gates. In fact, the fiat monetary system and its accompanying belief system can be seen as the original computer & network-driven filter bubble.
Fiat currencies are connected to the nation state, since they get their value from being the unit for paying taxes and are defended by the monopoly of violence of the nation state. If we assume the nation state will be weakened by the Internet and by crypto currencies, fiat currencies will also be weakened (directly so by crypto currencies obviously). Incidentally the Euro fiat currency has put itself into a strange predicament by being used in a geographic area without the rigor of the nation state.
|
0.99921 |
Telltale Games announced that the second episode for Batman: The Telltale Series is going live a lot sooner than you think. In fact, you'll be able to get your first taste of the episode during the weekend PAX West event in Seattle, Washington.
A press release was sent out indicating that during a special Crowd Play event this weekend at PAX West, gamers will get their first look at Batman: The Telltale Series' second episode, between September 2nd and September 5th. After that you'll have to wait a while to get your hands on the episode, but you can pick up a physical copy from retailers for the Xbox One, PS4 and PC starting September 13th, which contains a special season pass disc for all five episodes for this season's Batman: The Telltale Series. Those living in Europe will also be able to get their hands on the physical disc starting September 16th, just a few days after it launches in North America.
Following the season pass being made available at retailers on September 13th, Telltale will allow gamers to digitally download the standalone version of the second episode for PC, PS4 and Xbox One starting September 20th. The game will be available from the Steam store, the PlayStation Network, the Xbox Store and Telltale's storefront for digital distribution.
Unfortunately for gamers who have other systems that are not the PS4, Xbox One or PC, there is no definitive release date on when the second episode will be available. They do announce that sometime during the month of September they'll announce the release dates for Batman: The Telltale Series on mobile devices and older home consoles.
I'm sure you're curious what the second episode is actually about? It's entitled "Children of Arkham" and picks up where the last episode left off. The first episode was pretty action-packed, giving gamers a very different kind of Telltale title where the combat was fast and furious and there were even some options in how to plan out Batman's attacks ahead of him executing them, which seemed to fit in line with Batman's tactical prowess.
The visual art-style of the game has centered around Telltale's attempts to bring a "comic book to life". The outlined ink look gels well with Telltale's take on the Batman, which seems to be a little bit of a mix of "Batman: Year One", Rocksteady's Batman: Arkham series and its own take on the iconic hero. One thing that definitely stands out with this rendition of the character is that Telltale isn't afraid to get very, very violent. Players even get to choose some segments that determine just how far Batman goes when it comes to said violence.
As mentioned, you can look to get in some play time for the second episode of Batman: The Telltale Series at PAX West if you're attending the event this weekend. After that, you can get the game and the rest of the episodes from the season pass disc at retailers starting September 13th, or you can get your hands on the second episode as a standalone entry starting September 20th.
|
0.953677 |
Country Joe And The Fish were one of the many "psychedelic" bands to emerge from the San Francisco Bay Area during the hippie explosion of 1966-67. They differed from most of their contemporaries (among them Jefferson Airplane, Big Brother and the Holding Company, the Grateful Dead and the Quicksilver Messenger Service) in having a background in the student movememt centred on the University of California in Berkeley, which lent a political edge to their songs. Most of them were written by band leader and singer Joe McDonald, who, unlike the majority of apolitical, middle-class hippies, came from a left-wing family and inherited a concern for social justice from his Communist parents.
Country Joe and the Fish lasted until 1971, but their heyday was from 1967 to 1969, with the first two albums Electric Music for the Mind and Body and I-Feel-Like-I'm-Fixin'-to-Die establishing their reputation. They are featured in both Monterey Pop, D.A. Pennebaker's documentary film of the 1967 festival, and Michael Wadleigh's Woodstock, which also contains Country Joe's famous rendition of his "Fish Cheer" ("Gimme an F...") and his anti-Vietnam War song "Fixin' To Die Rag". They visited Britain several times in this period, although their performances (at underground venues like Middle Earth and the Roundhouse) were not heavily publicised.
Although San Francisco was renowned as the home of the hippie movement, it was the Los Angeles groups who had made "West Coast" music popular with the audience who listened to John Peel on Radio London - the Byrds, Love, the Doors, the Buffalo Springfield and more pop-oriented acts like the Beach Boys, the Mamas and Papas and the Association. One of the first "San Francisco" albums featured by Peel on his Perfumed Garden show was Electric Music for the Mind and Body, at the time only available as an import on Vanguard Records (although a British release of the LP on Fontana soon followed). He was particularly taken with the track "Not So Sweet Martha Lorraine", which he played regularly (it appears twice as a show-opener on surviving recordings of the Perfumed Garden). Lead guitarist Barry Melton became one of Peel's favourite musicians, and his work on the second album I-Feel-Like-I'm-Fixin'-to-Die was singled out for high praise when Peel played it on Top Gear in 1968.
Later Peel recalled that Electric Music for the Mind and Body was the soundtrack to his one deliberate LSD trip, at UFO Club in 1967 ("It was jolly nice. I've always rather flippantly said it was rather like going to Stratford-on-Avon: once you'd done it I didn't see any need to do it again". Quoted by Jonathon Green in Days in the Life, London 1988). In his later years, Peel stated that Electric Music for the Mind and Body was the one album of 1967 he could still listen to for pleasure (for example, see Peeling Back The Years 2 (Transcript)).
In the 1970s, Country Joe McDonald returned to his roots as an activist folk singer and worked mostly as a solo artist. He visited Britain several times, touring and performing on radio and TV, including an unlikely appearance on the TV show of model and singer Twiggy, when he duetted with her on his song "Here I Go Again" after her version had been a UK Top 20 hit in 1976. In addition, he recorded three Peel sessions (see below).
None by Country Joe And The Fish, but three solo sessions credited to Country Joe McDonald. Any commercial release of sessions?
1. Recorded: 1970-06-29. First broadcast: 04 July 1970. Repeated: ?
3. Recorded: 1977-06-29. First broadcast: 11 July 1977. Repeated: ?
The listing below was researched from the database of this site and is incomplete. Please add any further information if known.
19 July 1967: Porpoise Mouth (LP - Electric Music For The Mind And Body) Vanguard - JP: "Hope it's not necessary to explain why that's called Porpoise Mouth..."
|
0.981507 |
Are You Aware Of Incidental Exercise?
Incidental exercise is the workout you get when exercising isn't your primary motivation. Activities like walking to the store, riding your bike to work or working in your garden are examples of incidental exercise.
Walk or ride your bicycle to the store: Don't be so quick to hop in the car. Think about the distance to your destination. If your destination is only a mile away, walk. If it's less than three, you'll be surprised to find that riding your bicycle will often take less time than driving your car.
Take the Stairs: Decide on the number of flights you can walk without getting too sweaty, and never take an elevator/ lift for fewer flight of stairs. Increase the number of stairs as you get more fit.
Park farther away: Parking at the back of the lot not only gets you a little exercise, it reduces the chances of getting cramped. You'll also find that the time spent walking a few extra yards is usually less than the time spent fighting for a close parking spot.
Forget the email and phone: If you need to talk to someone in your office, go find them. You'll get a bit of exercise, and you'll find that people are more willing to help you out once they can put a face with a name. You might even end up making some friends.
Stand when you can: Standing burns more calories than sitting, but more than that, sitting decreases your metabolism, sending your body into hibernation mode. Make a rule that you must pace while talking on the phone.
Walk for fun: When planning your Saturday out with the family, forget going to the movies. Go on a walk or a bicycle ride through the park. Go on a hike. You'll get a good workout while connecting with your family.
Start a garden: Get exercise, time outdoors and delicious, healthy food all at once by starting a garden.
What is making you wait? Get going!
|
0.999986 |
I'm clueless when it comes to writing descriptions, so here's just a bunch of stuff I like instead.
I believe that "every exquisite thing", refers to the minuscule yet beautiful aspects of our lives, that we don't usually or naturally think of as we go about our day to day lives, therefore, until we realise the true aspects that make our lives worthwhile, we won't realise the 'exquisite things' that are always there for us.
And because some people ignore the exquisite things, they are reserved for the people who openly acknowledge them :) Love this!
This isn't a love poem, just a Merry Christmas to you!
One of my most memorable and of course epic moment from the Doctor Who franchise would definitely be from the 9th Doctor, portrayed by Christopher Eccleston in the episode: 'The Doctor Dances'. Exclaiming the well-known quote: "Everybody lives!". For the first time for the 9th Doctor, he was able to save the lives.
|
0.932844 |
How does one even know if a family ever experienced a stillborn birth, or death of a small child between censuses, if the child never appeared in a census to begin with? Just curious, as I came across some stillborn record births and it occurred to me that I wouldn't even look at these if I never had any reason to believe there was such a birth.
CENSUS RECORDS PLACE OUR ANCESTORS in a specific place at a specific time, so we are then able to look for OTHER RECORDS IN THAT SPECIFIC PLACE that have survived from the time period our ancestors lived.
-- the RESEARCH OUTLINE from http://www.familysearch.org/Eng/Search/RG/frameset_rhelps.aspfor the state or country where the ancestors lived. Expect to find a listing of the types of vital records and the dates when they began to be kept.
-- the HANDYBOOK FOR GENEALOGISTS mentioned often in ol' Myrt's columns, which list specific counties in each state and when records began to be kept, including which have been known to survive.
-- USGenWeb - Visit http://www.USGenWeb.com to see what is known about surviving records by other experienced researchers for those areas where your ancestors once lived.
-- STATE OR TERRITORIAL CENSUS - Find out about these at USGenWeb or in the HANDYBOOK.
-- The (FHL) FAMILY HISTORY LIBRARY CATALOG at http://www.familysearch.orgBe sure to look for each locality at the county (or town level in New England) in the appropriate states. Remember the microfilm of public vital records is a priority, and the FHL has records from over 80 countries throughout the world. Once you find a likely microfilm, print out the page, and take it with you to your local LDS Family History Center to order the microfilm. It will cost about $5.50 and will arrive in a few weeks. Good luck!
I agree with you that it is important to document "complete" families, not just the one son or daughter of our direct lineage. I certainly would not wish to exclude a sibling from a family unit merely because he didn't live the ten years between enumerations.
|
0.993789 |
By now, you’ve probably heard about all the great things virtualization can provide. There are a number of options available that can help businesses both large and small. While it can’t solve every problem, it can provide significant benefits to your business and the way you manage IT resources.
The goal of application virtualization is to isolate applications from the underlying operating system while providing the same functionality and user experience as if the applications were actually installed. Some of the benefits gained from using this technology include centralized app management, fast deployment, simplification of upgrades, multiple versions of an app on the same machine, and maintaining the OS environment. Want to roll out the latest desktop operating system but still need to run old business apps that won’t work with the latest OS? Virtualization may provide a solution for you.
Want to save on power costs, reduce space requirements and embrace the green movement? This is perhaps the most obvious benefit as the ability to run multiple virtual machines on the same physical machine requires less hardware and power consumption. Because of this increased hardware utilization, there’s also a greater return on investment.
With virtualization, the time to provision a new server or desktop is drastically reduced allowing faster deployment and recovery times. Load balancing, failover/redundancy, and scalability can also be quickly implemented and achieved economically. Additionally, the ability to capture and restore snapshots on the fly, not only allows for recovery options but also greater testing possibilities.
There are many companies that now provide virtualization solutions including Citrix, Microsoft, and VMWare. There are also open source and no/low cost options available as well. However, they each have differences not only in how they accomplish the virtualization but in how they are implemented. The right product or mix of products should meet the needs of your business and be beneficial to your environment. Keep in mind that once you’ve determined which solution is right for your business, it will need to be managed and maintained like any other technology.
|
0.915231 |
In N. Ireland can u get a divorce fast and cheap if so how and where I have been split for the last 5 years and have no kids with x wife?
Yes a 'no fault' divorce (where you both agree to get on with it), is relatively inexpensive and you could probably even get through with it without lawyers if you are averagely intelligent. But if your 'ex' has really split, i.e. is nowhere to be found, or won't cooperate, that's when time and money comes into play.
|
0.82261 |
Following the death of Chingiz Khan, the Mongol empire was effectively divided into four sections, or ulus (inheritances), each governed by one of the sons of Chingiz. They remained politically united under the great khan, but their existence established the basis of future independent Mongol kingdoms. Ogedei was the selected successor to Chingiz, and was officially proclaimed great khan in 1229. While he and his successors still controlled the entire empire, they largely concentrated their attention on Mongolia and China. The rest was governed by the other sons of Chingiz. The north-western section was handed to the family of the deceased Jochi (the Golden Horde, alternatively known as the Jochid ulus as they became subdivided into several inheritances), thanks to which they inherited dominion over the Alani.
This ulu also contained a strong contingent of Jalayirs, one of the core tribes of Mongols who were present at the founding of both the Mongol empire and its predecessor, the Khamag Mongol empire. Elements of their people could also be found in Persia, where they founded the Jalayirid sultanate to succeed the Golden Horde's rival ulu in the south-west of the empire, the Il-Khanate.
It was Jochi's son, Batu Khan, who inherited the westernmost section of this ulu as the Blue Horde (west of the Volga), with Orda leading the eastern section as the White Horde. Chagatai Khan (the second son) inherited Mughulistan, while Tolui governed Persia. However, much of Batu's western territory was yet to be conquered by the Mongols. All they had done was stake a claim to it by conducting expeditions through its vast lands. Batu Khan set about this task with eagerness, and the Golden Horde territories eventually encompassed the Aral Sea region, the Black Sea steppes, the Ural Mountains, the Volga, western Siberia, and various principalities of the Rus.
The Kipchaks or Qıpčaqs were one of the most important Turkic peoples of this period, and under the Mongol khans they dominated the western and central Eurasian steppe. Kipchak (or Gypjak) lies just outside Ashgabat in today's Turkmenistan. The Kipchaks appear in the various Arabo-Persian, Byzantine Greek, Latin, Slavic, Mongol, Chinese, Georgian and Armenian accounts under several names, aside from variants of Qıvčaq, Qıbčaq, and Qıpčaq. Versions can be found such as Qaŋlı (Latin Cangle - or Cangitai for their eastern branch), and Cuman (Quman for their western branch), plus a version of the latter which entered into the Slavic languages: Половци.
Son of Great Khan Chingiz. Governed Central Asia in his name.
Jochi's legitimacy as the eldest son of Great Khan Chingiz Khan has always been open to question, as he had been born shortly after the return of his mother, Börte, from captivity by the Merkits. It is probably thanks to this (at least in part) that he is overlooked as his father's successor as great khan. Jochi dies approximately six months before his father but his family are confirmed as rulers of the Golden Horde by Chingiz Khan himself. Between them, the Blue Horde and White Horde inherit just four thousand of the original Mongol troops and have to recruit heavily from amongst the population of their captured territories, which introduces a very heavy Turkic identity into the horde.
Son. Gained the Blue Horde as his inheritance.
Shiban is too young when his father dies to gain any territories himself, despite being one of Jochi's sub-commanders of the subsidiary White Horde. Instead, his descendants, the Shaibanids (the Grey Horde), carve out their own territory in the fifteenth century in Turkestan when they conquer Transoxiana and Southern Khorasan at Herat. Batu's other brother, Orda, commands the White Horde.
Batu Khan begins the invasion and conquest of the lands of the Rus, with Subedei agreeing to accompany him. They cross the Volga and within a year have conquered the Volga Bulgars, Alani, and Kipchaks. Then, having been refused in their demand that Yuri II of Vladimir submits, they take the city of Riazan on the River Oka after a five-day catapult assault. Then they take Kolumna and Moscow, and defeat the grand duke of Suzdal leading the most powerful force in the northern half of the Rus lands. During the invasion, Kiev is conquered by Danylo Romanovych of Halych-Volynia, creating another target for a Mongol attack.
Cumans and Kipchaks (possibly one and the same people according to details shown in the main introduction, above), and other nomadic groups flee the Rus lands to seek refuge in Hungary. As Batu Khan sees these people as his subjects, news of their departure is not welcomed and plans are laid to pursue them. Novgorod survives the tidal wave of conquest because the Mongols are unable to find a route through the marshes. Instead, they attack Kozelsk, which inflicts an unusual defeat on their vanguard before falling. Its entire population is slaughtered as an example. Kiev also falls after a brave defence (by 1240), even though Prince Michael of Kiev flees beforehand. The city is largely destroyed.
After devastating the already-subjugated Crimea and subduing Mordovia and Kipchaks on the steppes in 1238, Batu Khan and Subedei turn their attention to Europe in 1239. The Mongols enter Galicia, capturing the capital and destroying the cathedral there. Both Poland and Hungary are conquered in 1241, with European defeats at Liegnitz and the River Sajo. However, the death of Ogedei Khan causes the Mongols to withdraw, with Batu Khan intent on securing his conquests in the lands of the Rus. He holds onto Galicia, though, which remains a Mongol possession until his death. Even after relinquishing direct control, the Mongols retain suzerainty over the state.
With rising tensions between Great Khan Guyuk Khan and Batu Khan, it is only the former's early death that prevents a civil war from erupting between them. Oghul Ghaymish becomes regent during the election process that selects the next great khan, but the mighty empire has been shown to be prone to disunity.
Son. Possibly a convert to Christianity.
With the death of the formidable Batu Khan, the Mongols are driven out of Galicia. Even so, with the Golden Horde remaining located mostly to the south and east of Galicia, they retain suzerainty over the state. The following year, Sartaq dies after just a year as khan of the Blue Horde, possibly poisoned by his uncle, Berke.
Brother or son. Acceded aged 10.
Regent. Gained power in the same year.
Brother of Batu Khan. Converted the Blue Horde to Islam.
A Mameluke who had been born a Kipchak Turk and who had been captured by Mongols and sold as a slave, now becomes sultan of Egypt. Sultan Baybars makes the sultanate a force to be reckoned with against later Mongol incursions. Meanwhile, at Karakorum, there is disagreement about the choice of successor as great khan. The two claimants, Kublai Khan and Ariq-Boke, engage in civil war which lasts four years. During this period, the slaughter of so many thousands of Muslims at Baghdad in 1258 by Hulegu of the Il-Khanate has enraged Berke Khan. War erupts between the two, with the side-effect that Berke is forced to cancel a planned invasion of Europe. Alughu is appointed to take control of the Chaghatayid khanate by Ariq-Boke, deposing Orqina Khatun in the process. He also takes advantage of the unstable situation by revolting against Ariq-Boke's rule of the west and gaining the allegiance of the governors of Transoxiana.
With both German crusaders and Lithuanians from the Baltics impinging on the territories of the various Rus principalities that are still vassals of the Golden Horde, Mongke Temur sends troops to Novgorod to eject the Livonian Knights.
Smolensk is the last of the independent principalities of the Rus, but it now falls to Mongke Temur. The following year he defends his Rus vassals by dispatching a Mongol-Rus force to ward off the Lithuanians, an action requested by Duke Lev I of Halych-Volynia.
Son of Toqoqan. Gt-grandson of Batu. Overthrown by Nogai Khan.
By the time he overthrows Tode Mongke and replaces him with Tole Buga, Nogai Khan is a powerful kingmaker and ruler of his own subsidiary Golden Horde khanate. Known as the Nogai Horde, it encompasses a large chunk of territory on the northern side of the Caspian Sea, and the entire section between the eastern Caspian and the Aral Sea. While not strictly independent, Nogai rules the people of his horde directly, and it survives him as a confederation of about eighteen Mongol and Turkic tribes.
Son of Tartu. Gt-grandson of Batu.
Tole Buga is not happy with the direct threat to his own power that is posed by Nogai Khan. The loyalty of the Rus principalities is divided between the two of them and the unity of the Golden Horde is threatened. When Tole attempts to bring matters to a head, he is outmanoeuvred by his supposed subordinate and is arrested. Nogai has his replacement, Toqta, execute him.
Son of Mongke. Last non-Muslim khan.
Toqta Khan attempts to end the semi-independent rule of the Rus vassal princes by sending his brothers at the head of an army that devastates no less than fourteen towns. Toqta himself forces Grand Prince Demetrius of Vladimir to abdicate, which is an important victory in itself as he is an ally of Nogai Khan of the Nogai Horde. The Rus record the campaign as the 'harsh-time of Batu returns'.
With the death of Kublai Khan, the Yuan dynasty survives under his successor, but the Mongol empire effectively ceases to exist. There are no further Khakhans (great khans), and command of the empire's territory is now permanently divided into four distinct and fully independent kingdoms: the Golden Horde (made up of the Blue Horde and White Horde), the Il-Khanate, Mughulistan, and Yuan China itself.
The power struggle between Toqta and Nogai Khan flares up into open conflict, but Toqta loses the first battle. Nogai does not follow up on his victory, so the following year Toqta is able to inflict a decisive defeat upon him. With the threat of a break-away khanate ended, the Golden Horde is fully under the control of one khan again. Nogai's son, Chaka, flees first to the Alani and then to Bulgaria where he briefly gains the throne as emperor. Soon afterwards, with the Bulgarians aware of Toqta's anger at this, Theodore Svetoslav sends Chaka's head to his Mongol overlord and replaces Chaka on the Bulgarian throne. Nogai's territories, which reach from the Crimea and the southern Rus principalities to Wallachia, are divided by Toqta between Nogai's brother, Sareibugha, and his sons.
The accession of Buyan of the White Horde is far from universally accepted by his own relatives. Led by his cousin, Kobluk, they win support from Du'a of Mughulistan. Buyan fights them on several occasions and seeks help from Toqta as the senior khan of the Golden Horde. Toqta warns off the Chaghatayids, and supplies military help. In the end, Buyan is able to defeat his opponents and emerge victorious.
Grandson of Mongke Temur. Converted to Islam.
The princes of Moscow and its subsidiary states have been receiving the support of Ozbeg, partially because the khan's sister, Konchaka, is married to Yuri Danilovich of Moscow. The princes of Moscow are opposed by the princes of Tver, their westward-leaning relatives, and it is the most senior of these, Mikhail of Tver, who defeats Yuri at a village named Bortenevo. Mikhail also manages to capture Yuri's wife, who subsequently dies in his keeping. Yuri announces to Ozbeg that Konchaka had been poisoned, so he and Mikhail are summoned to the Golden Horde's capital of Sarai for trial. Mikhail is found guilty and is beheaded the following year, while the yarlik (effectively a patent of office for the title of 'Grand Prince of Vladimir') is granted to to Moscow.
The sons of Mikhail, Dmitry (or Dmitri) and Alexander Mikhailovich, fight a series of battles against Yuri Danilovich of Moscow. By intriguing with the Mongol royal court, Dimitry manages to gain the yarlik for Vladimir in 1322. Yuri is killed by Dimitry in 1325, before he can clear his name and regain the yarlik. Ozbeg arrests Dimity for the murder and executes him in 1326.
The brothers and co-rulers of Halych-Volynia, Andrei and Lev II, die together in battle against the Golden Horde, leaving no heir. Their sister, Maria, becomes the heiress of Galicia-Lvov. Already married to Trojden I of Masovia, the duchy is drawn closer to the Polish crown, removing it from Mongol influence.
Baskaki Shevkal, cousin to Ozbeg Khan, is killed in Tver along with his Tartars, and rebellion is ignited against the Golden Horde's overlordship. Grand Prince Alexander Mikhailovich of Tver is forced to flee, first to Novgorod which refuses him, and then to Pskov. Not only does Pskov welcome him, it makes him the ruling prince. The Golden Horde sends an expedition that consists of 50,000 Mongol-Tartars and Muscovites led by Ivan Danilovich, brother and successor of Yuri. The uprising in Tver is brutally suppressed, and Ozbeg appoints Ivan as grand duke of Vladimir in 1328, which marks out his seat at Moscow as a position of some power.
Lithuania defeats the boyars of the Rus and occupies Kiev and its surrounding territory. The loss of this vassal state by the Golden Horde removes not only it from their control, but also cuts off Wallachia whose ruler, Basarab I, effectively becomes independent, although this has increasingly been the case for several years. However, despite this setback, Ozbeg is still able to threaten the Bulgars, Byzantium, and the Lithuanians themselves.
Almost as soon as he has gained the throne, Arpa Keun of the Persian Il-Khans faces an invasion by the Golden Horde under Ozbeg Khan. This is defeated, but the following year he is attacked by Oirat 'Ali Padsah, the governor of Baghdad. Padsah defeats him on 10 April 1336 near Maraga and soon afterwards he is captured and killed, ending the Mongol-descended Il-Khan dynasty. This triggers a period in which several rival Mongol successor states, such as the Chobanids and the Jalayirids, jostle for control. The latter seize Baghdad and rule south-western Persia from there. The entire region undergoes a period of anarchy and civil war.
Son. Possibly murdered by Jani Beg.
Brother. Assassinated by Berdi Beg.
Jani Beg leads a massive Crimean Tartar force against the Crimean port city of Kaffa. The assault turns into a siege which is lifted by a Genoese relief force. Two years later, Jani Beg returns, but the second attack against Kaffa is defeated by an outbreak of Black Plague. There is a possibility that Jani Beg's army catapult their infected fellow troops into Kaffa so that the defenders will become infected. The ploy fails to bring the city to its knees, but infected Genoese sailors subsequently take the Black Death with them back to Italy.
With the assassination of Jani Beg, the political cohesion of the Golden Horde begins to disintegrate. Berdi Beg is probably behind Jani Beg's death, and his reign as khan is not universally accepted. The khanate goes from being able to claim titular dominance over the three ulus (Blue Horde, White Horde, and Chaghatayids) and actual dominance over the Rus to internecine warfare and the possibility of complete dissolution. Their territory is curtailed to the southern Ukrainian steppes and the Crimean peninsula.
Son. No heir. Assassinated by Qulpa.
Berdi Beg is assassinated, and again a brother is the culprit. The Blue Horde collapses, becoming engulfed in a period of anarchy. A rash of short-lived khans attempt to reign during this brief period, the first of them being Berdi Beg's brother, Qulpa. Some khans rule only segments of the horde, competing against rival claimants, while military governors occasionally exercise de facto control.
Brother. Assassinated by Nawruz Beg.
Brother. Assassinated after less than 6 months.
Descended from the same Borjigin clan as Chingiz Khan, Mamai is a powerful military leader in the Golden Horde and also governor of the Crimean peninsula. During the khanate of Berdi Beg, Mamai had gained the office of beylerbay, making him head of the supreme court along with giving him the offices of military general and minister of foreign affairs. Since then he has been playing power politics with the shifting allegiances and claims for power. Now he supports the claim by Abdullah Khan to rule the Blue Horde and firmly establishes himself as the true power behind the weakened throne. His puppet khans are shown as insets.
Governor of Crimea. Military general & de facto Blue Horde ruler.
Son of Ozbeg Khan. Puppet under Mamai.
Opposed Abdullah Khan and Mamai.
Urus Khan of the White Horde succeeds in dominating the fragmented Blue Horde for approximately two years, one of its longest periods of near-stability since the murder of Jani Beg. When Urus succeeds to the position of khan of the White Horde in 1374, the Blue Horde continues its internecine fighting once more, and Mamai is probably glad to see the back of a khan that he cannot manipulate.
Khan, not under Mamai's dominance.
Khan, but again under Mamai's dominance.
The Blue Horde is heavily defeated by the Muscovites under Demetrius Donski at the Battle of the River Vozha. Two years later the horde is defeated again by the Rus, at the Battle of Kulikovo. Mamai begins putting together a retaliatory force but is defeated by Toqtamish Khan of the White Horde in a battle on the banks of the River Kalka. Mamai flees to his base in the Crimea where he is assassinated in Kaffa in the same year by the Genoese, who are still upset that a unit of Genoese crossbowmen had been totally annihilated by the Rus while in the service of the Blue Horde. The horde itself is fully reunited with the White Horde to form a greater Golden Horde.
|
0.999656 |
There are schools offering clinical psychology degrees in California!
Each year, roughly 0.2% of California students graduate with degrees in clinical psychology. In other words, every year an estimated 1,365 clinical psychologists graduate from California's 30 clinical psychology schools.
University of California-San Diego, which is located in La Jolla, is the top-ranked school in California that has a clinical psychology program. It received a ranking of 12th in the country in 2010. 2 students graduated with a degree in clinical psychology from University of California-San Diego in 2010. Students at University of California-San Diego paid $11,306 per year in tuition fees.
The second-ranked school in California that has a clinical psychology program is Biola University. Biola University, which was ranked 21st in the country in 2010, is located in La Mirada. 29 students graduated with degree in clinical psychology from Biola University in 2010. Tuition at Biola University was $28,852 per year.
Pepperdine University, which was ranked 21st nationwide in 2010, is the third-ranked school in California that has a clinical psychology program. It is located in Malibu. 192 students graduated with degree in clinical psychology from Pepperdine University in 2010. Pepperdine University charged in-state students $39,080 in tuition fees per year.
A clinical psychology degree from a California school... what next?
The government projects that the number of clinical psychologists in California will grow by 7%. By 2018, there will be an estimated 23,800 clinical psychologists working in California.
Take a look at the graphs and charts below for additional California statistics regarding a career in clinical psychology and to compare salaries with a variety of related fields such as clinical psychology or sports psychology.
|
0.94727 |
New rules passed by NHTSA this week call for better head restraints and rear seat belts.
NEW YORK (CNN/Money) - December 13, 2004 - The National Highway Traffic Safety Administration passed two new regulations this week designed to make car seats safer.
On Tuesday, the agency announced a new standard for head restraints aimed at reducing the number of whiplash injuries. The following day, NHTSA unveiled a rule requiring lap and shoulder safety belts for all rear center seats.
More than 270,000 whiplash injuries occur annually in motor vehicle crashes, the agency said.
The new standard will require that head restraints be higher and positioned closer to the head. It will also mandate that all head restraints be adjustable and that they lock in place once adjusted.
"By standardizing the best practices in head restraint performance, we can reduce the most common form of injury in rear-end collisions," said NHTSA Administrator Jeffrey W. Runge, M.D. "Many of these injuries are more than just a pain in the neck. They become chronic, painful, debilitating and costly."
All passenger vehicles, including pick-ups and sport/utility vehicles, that are manufactured starting in September 2008 will have to comply with the head restraint standard. NHTSA estimates the cost per vehicle of meeting the standard at about $4.51 for front seats and $1.13 for rear seats equipped with head restraints.
In recent tests by the Insurance Institute for Highway Safety, most of 73 seat/head restraint combinations received a rating of "Poor" for protecting occupants in slow to moderate-speed rear-end collisions.
Car manufacturers will also have to comply with the new rear center safety belt rule by 2008. Currently, 23 percent of new cars and about half of new light trucks -- a designation that includes SUVs -- have only a lap belt in the rear center seating position.
The new seatbelt rule will save and estimated 10 to 23 lives each year and will prevent 245 to 495 injuries a year, according to the agency.
The Frankel Grade, according to the Congress of Neurological Surgeons, serves as a classification guide for spinal injuries. When a spinal cord injury occurs, patients are often told they have an injury at a given spinal cord level and are given a qualifier indicating the severity of injury, such as "complete" or "incomplete."
Tommy Rezza has a C classification injury.
A Complete neurological injury. No motor or sensory function detected below level of lesion.
B Preserved sensation only. No motor function detected below level of lesion, some sensory function below level of lesion preserved.
C Preserved motor, nonfunctional. Some voluntary motor function preserved below level of lesion but too weak to serve any useful purpose, sensation may or may not be preserved.
D Preserved motor, functional. Functionally useful voluntary motor function below level of injury is preserved.
E Normal motor function. Normal motor and sensory function below level of lesion, abnormal reflexes may persist.
November 22nd, 2005 - WASHINGTON Sport utility vehicles made by Hyundai Motor Co., Honda Motor Co., DaimlerChrysler AG and Subaru of America Inc. earned top honors in new crash tests of sport utility vehicles, minivans and sedans. The majority of vehicles reviewed received either four or five stars Monday in frontal- and side-impact protection, according to the National Highway Traffic Safety Administration.
Top five: The Hyundai Sonata sedan and Tucson SUV, Honda Odyssey minivan, Mercedes-Benz ML Class SUV and Subaru B9 Tribeca SUV. All received five stars for front- and side-impact protection.
Runnersup: The Volkswagen Passat, Chevrolet Impala, Dodge Dakota, Nissan Armada and Ford Freestar.
Three stars: The Toyota Scion xB, Chevrolet Cobalt, Kia Rio and Pontiac Grand Prix.
Top rollover protection: The Pontiac G6 two-door coupe. The government estimated it has a 9 percent chance of rolling over.
Rollover tests: Every vehicle tested except the Pontiac G6 received four out of five stars. The rollover test simulates a driver steering sharply in one direction, then sharply in the other at speeds up to 50 mph.
Worst side-impact protection: The Mitsubishi Lancer. The four-door version was the only model to get two stars on side-impact protection for the driver. The score was based on previous testing and denotes a 21 to 25 percent chance of serious injury in a crash.
Mitsubishi response: Spokesman Dan Irvin noted that it was an old test and said that side curtain air bags will become standard equipment in the 2007 model year. The Lancer received top scores in frontal protection.
The ratings: For frontal tests, five stars means there is a 10 percent or less chance of serious injury. Four stars estimates a 11 percent to 20 percent chance of serious injury. NHTSA conducts the front-impact test at 35 mph; the side-impact test is conducted at 38.5 mph.
(July 3, 2007) New York state police are continuing to investigate a crash that occurred early Monday on the New York state Thruway in Ontario County.
Troopers were called to the westbound lanes of the Thruway just before 4:45 a.m., when it was reported that a Mercury Mountaineer sport utility vehicle had overturned, said Sgt. Michael Kopp. Eight people four adults and four children were in the vehicle at the time of the crash, said Trooper Timothy Brennan.
The accident took place near mile marker 337, near Exit 43 in Manchester.
Brennan said the driver, Belinda K. Sweeney, 28, of Liverpool, Onondaga County, was traveling west and swerved several times to avoid striking a deer. The vehicle overturned and came to rest upright along the north side of the Thruway, he said.
One passenger Edward B. Wood, 33, of Liverpool was ejected from the vehicle.
He was the only person not wearing a seat belt, Brennan said. Wood sustained serious injuries including a collapsed lung and a ruptured spleen.
Sweeney and her mother, Bonnie K. Sweeney, 53, of Syracuse, were also seriously injured in the crash. Belinda Sweeney injured her neck and back, and Bonnie Sweeney, who was sitting in the front passenger seat, sustained a head injury, Brennan said.
All three people were transported to Strong Memorial Hospital for treatment.
Wood and Bonnie Sweeney were both listed in guarded condition; Belinda Sweeney was discharged, according to a hospital spokeswoman.
The fourth adult and the four children in the vehicle who were between 7 and 14 years old were not seriously injured, he said.
The deer ran away from the scene.
Troopers said that the crash did not block any lanes on the Thruway and had little impact on traffic because of the time of day.
Belinda Sweeney was ticketed for unsafe lane change, Brennan said.
|
0.950188 |
French right-wing politician. Born 1928 in La Trinité-sur-Mer in Bretagne.
A paratrooper in the French campaigns in French Indochina in 1953 and in Algeria in 1957, he was elected to the National Assembly in 1956, representing the nationalist/populist movement, the Poujadistes.
In 1972, he founded the extreme right-wing party Front National. For years, his party remained at the fringe of European politics. In 1974, he ran for President, but garnered only 0.74% of the votes, and in 1981, he failed to get the 500 signatures necessary to run.
In the course of the 1980s, however, the Front National managed to achieve a more acceptable image, bolstered by a general political drift to the right in Europe. In the 1988 election, he captured 14.38% of the votes, and in 1995, 15.3%.
In the 2002 election, facing divided opponents headed by conservative incumbent Jacques Chirac and socialist Lionel Jospin, Le Pen managed to make it past the first round, with 17.02% of the vote, to Chirac's 19.67% - enough to gain him one of the two places in the run-off second round. A shocked left immediately resolved to oppose him by whatever means necessary, even if this meant voting for their long-time opponent Chirac.
Concurrently with his French political ambitions, Le Pen had managed to gain a seat in the European Parliament. However, he was removed from this in April 2000, following a conviction for assault on a socialist candidate during the 1997 elections.
March 11, 1986 - convicted for making antisemitic remarks, at the court in Aubervilliers.
November 16, 1987 - fined 3,000 and 5,000 French Francs at the Paris courts for inciting to racial discrimination, having (in 1984) described the presence of immigrants in France as "a veritable invasion".
December 18, 1991 - Fined 100,000 Francs at the court at Versailles, for a statement made in a radio transmission in 1987, in response to a question about the Nazi gas chambers: "I have not studied the question, but I believe that this was a mere detail in the history of the Second World War."
June 3, 1993 - fined 10,000 Francs for antisemitic remarks about a former cabinet minister.
July 4, 1997 - fined 5,000 Francs for racist remarks aimed at the then-chairman of SOS Racisme, Fodé Sylla.
December 26, 1997 - Fined a symbolic 1 Franc for having remarked, a few weeks earlier, that "In a book of 1000 pages about World War II, the concentration camps would take up two pages, and the gas chambers 10-15 lines."
All these fines are well within Le Pen's means. His personal fortune is valued at approximately 2-3 million Euro, mostly the result of a legacy he inherited in 1976 from a member of the wealthy family that owns the concrete company Ciments Lambert. Le Pen lives with his second wife Jany Le Pen in a palatial home in the Montetout area of Saint Cloud, an upscale suburb of Paris. According to Capital, Le Pen lost over a million Euro in failed investments during 1980.
Le Pen is the father of three daughters, Marine, Marie-Caroline and Yann, all active members of the Front National.
|
0.974548 |
The 2010 NASCAR Sprint Cup Series was the 62nd season of professional stock car racing in the United States, the 39th modern-era cup series, and the first Cup season of the 2010s, the 21st century's second decade. Beginning at Daytona International Speedway, the season included 36 races and two exhibition races. The season concluded with the 2010 Ford 400 at Homestead Miami Speedway. During the 2009 off season, NASCAR announced a few calendar changes, including a standardized start time. Rick Hendrick won the Owners' Championship, while Jimmie Johnson won the Drivers' Championship with a second place finish at the final race of the season. Chevrolet won the Manufacturers' Championship with 261 points. Johnson extended his record of consecutive championships with a 5th title in a row.
There were 43 full-time teams in 2010.
Roush Fenway Racing removed one of their cars because of the five to four car maximum rule.
Richard Petty Motorsports and Yates Racing merged to form one team. Richard Petty Motorsports switched from Dodges after the merger to Yates Racing with Fords.
Richard Childress Racing removed one of their cars to form a three car team.
Martin Truex, Jr. left Earnhardt Ganassi Racing's No. 1 car to drive for Michael Waltrip Racing's No. 56 in 2010, replacing Michael Waltrip, who ran a partial schedule with the team's No. 51 and Prism Motorsports No. 55. Truex, Jr. signed a multi-year agreement, with options for further years.
Jamie McMurray moved from Roush Fenway Racing to replace Truex, Jr. in the No. 1 for Earnhardt Ganassi Racing.
It was announced in January as part of the annual preseason media tour in Charlotte that, after years of restrictions, drivers would be let loose as it were, popularly referred to as "Boys, Have At It". Rules were altered to allow for "bump drafting", especially at Daytona and Talladega. On February 10, the green-white-checker finish rule was altered in all three major series (including the Nationwide and Camping World Truck Series) to allow for up to three attempts for said finish. Starting with the Shelby American, NASCAR extended its post-race inspections to include the first car out of the race that was not involved in a wreck; in other words, the first start and park.
At Martinsville, spoilers returned to the Car of Tomorrow after the finish of the 2009 Aaron's 499 that saw Carl Edwards' car becoming airborne and flying into the catch fencing after colliding with eventual winner Brad Keselowski on the last turn.
On May 11, the NASCAR Hall of Fame was officially opened in Charlotte, North Carolina. The three-story building houses historic artifacts, interactive displays and the shrine for inductees. The Charter Class of 2010 — made up of seven-time champions Richard Petty and Dale Earnhardt, NASCAR founder Bill France, Sr. and his son and owner/driver Junior Johnson — were inducted on May 23.
The total scheduled distance of the season was 14,461.9 miles (23,274.2 km), but race distances could be shorter or longer depending on weather and green-white-checker finishes. The final schedule was released on September 15, 2009.
Note:All times are when the race begins, not when the pre-race shows begin. Delays of the races are not shown on this list.
For the 2010 season, all races adopted standardized start times; east coast day races began at 1:00 p.m. ET, west coast day races began at 12:00 p.m. PT (3:00 p.m. ET), and most night races began at 7:30 p.m. ET. These changes were intended to alleviate fan confusion over the inconsistent scheduling practices of previous seasons, allow teams a "shorter" race day due to the earlier start times, and to provide more "flexibility" in the event of rain delays. The Coca-Cola 600 maintained its traditional early-evening start time, while the Coke Zero 400 was delayed due to weather.
The Autism Speaks 400 was moved before the NASCAR Sprint All-Star Race and the Coca-Cola 600.
The Subway Fresh Fit 600 and Samsung Mobile 500 switched their dates.
Fox Sports, their corporate sibling Speed, TNT, and ESPN/ABC are in the fourth year of a seven-year television contract scheduled to expire after the 2014 season. Showtime is going to show a highlights show for the first time.
Fox Sports broadcast the first 13 races, including the Budweiser Shootout, the 52nd Daytona 500, and the Coca-Cola 600. With Dover moving to mid-May, Fox ended their coverage with the 51st Coca-Cola 600. The Sprint All-Star Race XXVI along with the Gatorade Duels, practice sessions, and all qualifying and practice sessions (except for Daytona qualifying, which aired on Fox) were all broadcast on Speed. The network's Gopher Cam mascot, Digger, returned for on-screen displays.
Time Warner's Turner Sports division (through TNT) broadcast the next six races, including the Coke Zero 400 at Daytona in its limited commercial interruption wide open coverage format. That race will also be telecast in 3-D on both NASCAR.com and DirecTV. TNT's coverage will begin with the June Pocono race and end with Chicagoland. Qualifying and practice sessions will remain on Speed. Adam Alexander will be the new lead announcer, with Lindsay Czarniak hosting pre-and-post-race shows, replacing Bill Weber and Marc Fein respectively.
ESPN carried the remaining races, beginning with the Brickyard 400. ABC, which formerly carried the last 11 races of the season, will carry the Saturday night races in Bristol, Richmond, and Charlotte. Although previously races could not be moved from ABC to ESPN, early start times and ABC's plans to expand its Sunday morning political shows meant that NASCAR had to allow most Chase races to move to ESPN. This was met from criticism from most of ABC's southern-based affiliates, who had originally counted on NASCAR on those Sundays for ratings gains against the NFL.
Most qualifying sessions will air on ESPN2, practice sessions and some qualifying will be shared by SPEED and ESPN2. Qualifying for the Pep Boys Auto 500 and AMP Energy 500 air on Speed because they are Saturday afternoon sessions during the college football season. Additionally, Jerry Punch was replaced in the play-by-play position by Marty Reid; Punch will return to the pits where he worked at ESPN until 2000.
CBS-owned pay cable premium service Showtime carried a weekly one-hour highlight show titled Inside NASCAR every Wednesday at 10 pm ET/PT, with the series premiere on February 10. Chris Myers, who also hosts FOX's NASCAR coverage, will serve as host, joined by SPEED's Randy Pemberton & Michael Waltrip, and ESPN's Brad Daugherty, with the shows taping at the NASCAR Hall of Fame Studio 43. 38 episodes are planned, covering the season.
Speedway Motorsports, Inc.-owned Performance Racing Network carried events from those SMI tracks, and will jointly produced the Allstate 400 at the Brickyard with the Indianapolis Motor Speedway Radio Network.
In Canada, TSN and TSN 2 will have full coverage for the 2010 season.
In Australia, Fox Sports showed all Sprint Cup races live across their networks. Network Ten also showed races on its digital sports multichannel, ONE.
In Portugal, all races from the 2010 season were telecast on SportTv 3, while in Sweden, Viasat Motor televised the races.
In nearby Finland, Nelonen Sport Pro telecasted the season's events.
In Spain, Teledeporte telecasted six races of the season.
In Latin America, Speed Channel broadcast all Sprint Cup races and Nationwide races live.
In France, ABMoteurs broadcast all Sprint Cup races live.
In the United Kingdom, it was originally thought that Sky Sports had not secured the rights to the series for 2010. However, this changed in early February as Sky announced that they will show live coverage of the Daytona 500, with an hour-long highlights package for the rest of the races, on the Monday following each race. The remainder of the season, starting with the Shelby American, were shown on Open Access 3.
Beginning at Martinsville, NASCAR used the 2010 owner's points standings. Teams in the top 35 positions were guaranteed entry into the race; those below had to qualify on time.
Changes after Phoenix race: No. 7 team moves into the Top 35, replacing the No. 34 team.
Texas: The No. 34 entry moves up to 34th, No. 37 falls to 35th, No. 7 is 36th, one point out of safety (Fifteen points separate 33rd (No. 38 team) and 36th).
Talladega: No. 34 team moves up to 33rd, No. 7 is 34th, No. 38 team is 35th, No. 37 team is two points out of safety.
Richmond: Front Row Motorsports cars are 34th (No. 34), 35th (No. 37), and 36th (No. 38).
Darlington: No change in and out initially. No. 7 entry penalized 25 points for violating NASCAR rules and slips to 35th.
Pocono: After a 150-point penalty, the No. 38 team falls out of the Top 35, while the No. 7 moves in.
(key) Bold – Pole position awarded by time. Italics – Pole position set by final practice results. * – Most laps led. Bold italics – Drivers currently in "wild card" qualifying positions for the Chase.
The Rookie of the Year Award winner was Kevin Conway. Conway ran 28 races with a best finish of 14th. The ony other competitor, Terry Cook, managed to run only three races.
^ "Truex Jr. will make move to MWR for 2010 season". NASCAR. July 7, 2009. Retrieved August 23, 2010.
^ Pearce, Al (September 16, 2009). "McMurray poised to replace Truex Jr. at Earnhardt Ganassi Racing". Autoweek. Retrieved August 23, 2010.
^ "2010 Schedule". www.jayski.com. Archived from the original on August 19, 2010. Retrieved August 22, 2010.
^ a b "After Falling Asleep At Wheel, Changes Coming". Orlando Sentinel. Retrieved 15 February 2016.
^ "Races will start at consistent times". ESPN.com. Retrieved 15 February 2016.
^ "Race Summary". NASCAR.com. Archived from the original on 4 July 2010. Retrieved 4 July 2010.
^ "Nine of 10 Chase races on ESPN". ESPN.com. ESPN. 2010-01-13. Archived from the original on January 19, 2010. Retrieved 2010-01-14.
^ "No more NASCAR". huewen.com. Keith Huewen. 2010-01-09. Archived from the original on February 3, 2010. Retrieved 2010-01-17.
^ "Daytona 500 live in UK". huewen.com. Keith Huewen. 2010-02-05. Archived from the original on February 9, 2010. Retrieved 2010-02-12.
^ "NASCAR gets new UK TV deal". autosport.com. Haymarket Publications. 2010-02-25. Retrieved 2010-02-25.
^ "Maunfactuer Standings". Archived from the original on August 13, 2010. Retrieved September 1, 2010.
|
0.947444 |
Edgar published his new volume of poems, sponsored by the cadets, in New York around April 1831. It was 124 pages, printed on cheap paper, entitled "Poems by Edgar A. Poe... Second Edition" dedicated to "To the U.S. corps of cadets". In the book appeared several poems from the 1829 volume, among others, revised versions of "Tamerlane" and "Al Aaraaf". Six poems from the previous volume were dropped and six new added, e.g. "To Helen" and "The Doomed City". The book did not get much attention and the reviews described it as promising but bizarre and obscure. The cadets thought even worse of it, probably expecting the satirical work he had written at West Point. This they apparently found as "ridiculous doggerel" by a "cracked" author.
American culture at the time fostered a preoccupation with death, and Edgar's poems reflects much of his thoughts of death and the afterlife. This can be seen in, among other poems, "Al Aaraaf", "Evening Star", "To Helen", "Israfel", "The Valley of Nis", "Irenë", "A Paean", and "The Doomed City". In Edgar's work there's often a fine line between life and death. In "Irenë" for example the speaker is uncertain whether a woman is dead or asleep and in "To Helen" he mixes the living with a lifeless statue.
This "obsession" with death is hard to explain but it is said that when adults lose someone they learn to live with it by gradually withdrawing their involvement with the person, while children have difficulties in understanding death and tend to look for a substitute. Edgar did not find this substitute and an underlying denial for death can have influenced his poems.
Edgar was the fourth generation of Poes in Baltimore. His paternal great-grandfather, John Poe, came to America from northern Ireland before the American Revolution. Among the Poes who had lived in Baltimore was Edgar's grandfather General David Poe, who left behind his wife, his daughter Maria, and his son David Poe, the actor who disappeared or died.
Maria Clemm got her name from her husband, William Clemm Jr., whom she married at the age of 27. She gave birth to three of his children. About eight and a half year after the marriage, William Clemm died leaving Maria with their children and without property except for a parcel of land.
In his teens Henry had joined the navy, or merchant marine, and visited remote parts of the world such as the West Indies, South America and possibly Russia. Later on he worked in Baltimore law office and during that time he published about twenty stories, poems, and sketches under the initials "W.H.P.". Although growing up in different families and different cities, Edgar and Henry tried to stay in touch with eachother. Henry had written to Edgar and visited him and Rosalie in Richmond and he had also accompanied Edgar and his friend Ebenezer Burling to see Elmira Royster. Edgar on his side had turned to Henry when in trouble, but he found Henry "entirely given up to drink & unable to help himself, much less me.". After his court-martial Edgar again sought Henry's help but again discovered that "he cannot help me".
Edgar's reunion with Henry lasted for only six months, for Henry died August 1, 1831, and his funeral was held the following day. He was said to have died of "intemperance" and apparently he had not been able to give up his drinking. Henry was 24 when he died, just as Eliza had been when she died, and considering Henry's suicidal slides, that may not have been a coincidence. Many of his poems concern women who through death abandon their loved ones, who longs to join them.
Last modified: February 17 2015 15:18:19.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.