proba
float64
0.5
1
text
stringlengths
16
182k
timestamp
timestamp[s]
url
stringlengths
15
1.72k
0.999999
Will mandatory Ebola quarantines make things worse? WASHINGTON - Mandatory 21-day quarantines on health care workers returning from Ebola-ravaged West Africa, like those put in place by three states, can have the unintended consequence of discouraging them from volunteering, a top federal health official said Sunday. Dr. Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, said in an interview with CBS' "Face the Nation" that as a physician and scientist, he would have recommended against a quarantine. "The idea of a blanket quarantine for people who come back could possibly have a negative consequence of essentially disincentivizing people from wanting to go there," Fauci said. "The best way to protect Americans is to stop the epidemic in Africa, and we need those healthcare workers to do that. So to put them in a position where when they come back that no matter what they're automatically under quarantine can actually have unintended consequences and that's the reason we're concerned about that." Kaci Hickox, the first traveler quarantined under Ebola watches in New Jersey and New York, criticized the way her case has been handled, raising concerns from humanitarian and human rights groups over unclear policies for the newly launched quarantine program. She has since hired a well-known civil rights lawyer, Norman Siegel, to get her out of isolation. Siegel told the New York Times in an interview: "The policy infringes on Kaci Hickox's constitutional liberty interests," he said. "The policy is overly broad as applied to Ms. Hickox and we are preparing to challenge it on her behalf." In a first-person account for the Dallas Morning News, Hickox said she was stopped at Newark Liberty International and was questioned over several hours after touching down Friday. She said none of those who questioned her would explain what was going on or what would happen to her. "One after another, people asked me questions. Some introduced themselves, some didn't. One man who must have been an immigration officer because he was wearing a weapon belt that I could see protruding from his white coveralls barked questions at me as if I was a criminal," she wrote. CBS News chief medical correspondent Dr. Jon LaPook spoke to Hickox, and said in an interview on CBS' "Face the Nation" that chief among her concern and that of others is the seeming ad-hoc way in which these quarantines have been implemented. Hickox told LaPook some evidence of this comes from the fact that her isolation room has no shower and only a simple porta-potty with minimal privacy, that she was for a time given only cold scrubs to wear, and all this despite that fact that she tested negatively initially. Hickox tested negative for Ebola in a preliminary evaluation. Hospital officials would not say whether she would remain in the hospital for the entire 21-day, state-ordered quarantine period or be moved to another location. Fauci, the NIH official, said active and direct monitoring can accomplish the same thing as a quarantine because people infected with Ebola do not become contagious until they start showing symptoms. Ebola is transmitted through direct contact with the bodily fluids of an infected person. Doctors Without Borders executive director Sophie Delaunay complained Saturday about the "notable lack of clarity" from state officials about the quarantine policies, and an American Civil Liberties Union official in New Jersey said the state must provide more information on how it determined that mandatory quarantines were necessary. New York Gov. Andrew Cuomo and New Jersey Gov. Chris Christie on Friday imposed a mandatory quarantine of 21 days - the incubation period of the deadly virus - on travelers who have had contact with Ebola patients in the countries ravaged by Ebola - Liberia, Guinea and Sierra Leone. A similar measure was announced in Illinois, where officials say such travelers could be quarantined at home. Was NYC Ebola patient's self-monitoring enough? Gov. Chris Christie, R-N.J., said he concluded the quarantine was necessary to protect public health in his state and that he thinks the Centers for Disease Control and Prevention "eventually will come around to our point of view on this." Christie said Fauci was counting on "a voluntary system with folks who may or may not comply." The governor pointed to an NBC News crew that had returned from West Africa was supposed to self-quarantine because its cameraman was hospitalized with Ebola. "Two days later they were out picking up takeout food in Princeton and walking around the streets of Princeton," he said. The cameraman has recovered and has been released from the hospital. The New York Times reports Gov. Cuomo said that it was important to bring the force of law into the debate. "If you had someone who didn't want to cooperate, you can enforce it legally, there's no doubt about that," he said on Radio 103.9, adding that it was "highly unlikely" that a health care worker returning from the affected West Africa nations would object. Cuomo insisted the measures were not meant to prod the Obama administration to adopt stricter rules. Fauci said Spencer did exactly what he should have done by putting himself in isolation as soon as he developed a fever. "No one came into contact with his body fluids," Fauci said. "The risk is essentially zero, vanishingly small." Fauci said the health care workers returning from treating Ebola patients are responsible and know that if they have symptoms there's the possibility of transmitting the disease. "They don't want to get anyone else infected," he said. As for the unintended consequences, he said, "If we don't have our people volunteering to go over there, then you're going to have other countries that are not going to do it and then the epidemic will continue to roar," he said. Samantha Power, the U.S. ambassador to the United Nations who is on a trip to West Africa to highlight the need for increased international support to combat Ebola, spoke of a need to ensure that returning U.S. health care workers "are treated like conquering heroes and not stigmatized for the tremendous work that they have done." A senior White House official said Saturday that how to treat health care workers returning from the affected West African countries continues to be discussed at meetings on Ebola as the administration continues to take a "careful look" at its policies. Dr. Irwin Redlener, a Columbia University professor and director of the New York-based National Center for Disaster Preparedness, said the logistics of the states' new quarantine policy are "a problem." "The challenge now is how you translate this quarantine plan to operational protocol," Redlener said. "Until Ebola is under control in Africa, we're never going to see the end of such cases coming to the United States," Redlener said.
2019-04-22T04:32:59
https://www.cbsnews.com/news/ebola-outbreak-will-mandatory-health-worker-quarantines-make-things-worse/
0.999999
Why haven't Meghan Markle and Prince Harry announced their own Twitter account yet? The Sussexes have their own Instagram page, but not a Twitter account. Last month, the royal family confirmed Prince William and Prince Harry were splitting households. Although it sounds like some kind of bitter divorce between the brothers, it's actually an inevitable move that makes complete sense as the two families pursue different royal futures. Two weeks ago, in the first proper demonstration of the divided households, Prince Harry and Meghan Markle unveiled their own personal Instagram account to the world. 'SussexRoyal' will be the platform where pictures of the couple's work and family life are posted, and it's entirely separate from the existing 'KensingtonRoyal' account they used to use, which now only hosts Prince William and Kate Middleton's #content. But, hang on a sec. What about a Twitter account? Twitter has always been used by the royal family to share more in-depth information on official visits the royals make, as well as details about their personal lives. But the Twitter account that previously housed William, Kate, Meghan and Harry has now been tweaked to make it clear it's only a page for the Cambridges - not the Sussexes. "The official account of The Duke and Duchess of Cambridge and the Royal Foundation, based at Kensington Palace," the bio reads, where previously it included the Duke and Duchess of Sussex, too. The account's icon has also been changed from a picture of the royal foursome to a family photo of William and Kate with their three children, Prince George, Princess Charlotte, and Prince Louis. So Meghan and Harry are effectively off Twitter - but where's their replacement account? The handle the Sussexes have used on Instagram is @SussexRoyal, which was previously held by driving instructor Kevin Keiley until the social network unceremoniously removed him from it (without asking, apparently) to make way for Meghan and Harry. Over on Twitter, something similar happened. The same Kevin Keiley also had the handle @SussexRoyal on Twitter, although he hadn't used it since around 2012, when he congratulated Gok Wan on a really solid TV series. Following the unveiling of Meghan and Harry's Instagram page, the Twitter account @SussexRoyal went down, saying it 'did not exist' for a day or so. But if the plan was for the Sussexes to launch their own Twitter account days after the Instagram one, it didn't work out like that. Because on April 3, good old Kevin was back in business on his OG Twitter handle, posting: "I am still the only @sussexroyal on twitter". It seems all the kerfuffle with Instagram and Twitter handles has reminded Kevin Twitter actually exists, because the driving instructor is now tweeting on his account pretty regularly. We do have another dog. We are very much doggy people. So where does that leave Meghan and Harry where Twitter is concerned? Are they just... not getting one, now that Kevin Keiley has reasserted his position as "the only @sussexroyal on twitter"? It might be that the Duke and Duchess of Sussex, the modern couple they are, have decided that Instagram is all they need to promote their work and lives. But if not - if they do plan on getting a Twitter account - they might want to hurry up and sort it out. Because with Meghan about to give birth any day now, Twitter would be the most obvious platform to share when she goes into labour, and when the baby is born, before any pictures are released. In the meantime, let's just let Kevin Keiley enjoy his own Twitter handle and his moment in the spotlight.
2019-04-21T21:35:09
https://www.cosmopolitan.com/uk/reports/a27138723/meghan-markle-prince-harry-twitter-account-sussex-royal/
0.998029
I have recently become involved in an ongoing discussion concerning the use of the stick in police dog training. I was not aware of the fact that there was so much confusion on this subject. The confusion stems from sport dog trainers applying their use of the stick to police service dog training. Many undereducated, sport trainers like to expound on the reasons why "their stick work" is the wrong type of training for police service dogs. In effect they are right, but for the wrong reasons. To fully understand this issue, a trainer needs to know how and why the stick is used in sport training and then how and why it is used in service dog training. Sport dog trainers use stick hits during a trial to stress the dog and thereby test his nerves. In sport training, the stick is often used to "clean the dog up" during the bark and hold exercises. The helper simply hits the dog (usually across the front legs or right between the ears) when it takes inappropriate bites on a standing still helper. The purpose for these hits is to teach the dog that he will be hurt if he does not bark at the helper when the helper is standing still. These stick hits are viewed as "helper corrections." Remember that in sport dog training, the majority of the dogs view the helper as their prey. The dogs approach the bark and hold exercise as a "baiting game." In other words, they look at the bark and hold as a challenge to the helper to move. If they bark hard enough or long enough, the helper is going to be flushed into an escape. When that happens the dog will chase the prey (helper) and bite. Sport trainers incorrectly feel that there is no place in police dog training where the helper should be correcting the dog. They say that the dog should never feel that he is being corrected by a suspect. Most sport trainers therefore feel that all corrections should come from the handler. On the surface this would seem to be a logical position to take, but in reality it's very bad advise that is often given to new inexperienced undereducated police canine handlers. To understand the reasons why this is the case, one must begin by understanding how the dog must view the helper in police work. The helper is not prey, he is a "fighting partner." There is a clear distinction here. A fighting partner can hurt you and must be taken very seriously. A fighting partner is not going to bolt and run like prey, he is going to stand and fight. So the bark and hold of a service dog is not and should not be approached with a "baiting mentality." The police dog should approach the helper in defense or fight drive and not prey drive. The dog should not sit directly in front of the helper in a sport style of a bark and hold. He should stand back out of harms way and bark with the intention of notifying his partner (the handler) that he has found the suspect. So the picture of a service dog approaching a helper (or suspect) is one of forwardness but balanced with caution. The dog will bark with a deep throated challenge but still may have the hair up on his back a little because he knows that he may be going into battle. Even though he has confidence in his ability to beat the suspect in a fight, he has an Adrenaline rush because he knows this is serious work. This is the difference between the two styles of bark and hold. Now to the question of a service dog being hit with a stick. I approach this matter by offering a question. What will happen to an improperly trained dog when he is sent after a suspect that is prepared to fight the dog even though he is being bit? I often wonder what these sport dogs (or improperly trained service dog) think when they realize that this guy is not a helper, he is really pissed and he is fighting seriously. I wonder what goes through the dogs mind when they get hurt for the first time in a real fight? In my opinion, this is not the time or place to find out that a dog does not have the fight drive to carry himself through this kind of situation. It is not fair for the dog or the handler. Now to the training. If every police dog went through good foundational defense training at a young age (18 to 30 months) there would not have to be a lot of stick work done on these dogs. Unfortunately most dogs that end up on police departments are sport dogs that have some type of training problems. This is based on the price departments are willing to pay. The dogs without training problems are sold for more money to sport people. Attaining these goals can be done with a variety of tools. It can be done with a prong collar and long line, an electric shock collar (topic of a entire article). It can be done by the helper putting the boots to the dog or it can be done with the stick. All of these tools are designed to put stress on the dog in training and none of these tools are recommended for an inexperienced handlers or helpers. The prong collar and electric collar require handler coordination and a great deal of experience with electricity. By using the stick an experienced helper can eliminate the inexperienced handler and deal with the dog himself. It's also easier to train a new helper to properly use a stick than to properly use an electric shock collar. When a sport dog is ready for this work he is sent into the helper. The helper is not looking for a typical prey bark and hold. He is looking for a drive change from prey to defense so initially we know this is not going to happen with sport dogs, so the dog is hit with the stick before he even has a chance to bark. Initially this causes confusion in the dog. Some go right in for a bite, others may back off in confusion. Those that go in for the bite are going to be hit until they release and back off. Here is where sport people get lost. They think the dog is being "cleaned up", when in fact he is learning that the helper can fight and hurt him. When the dog backs off and barks in a defensive posture he is rewarded with a bite. So the key to this training is to reward a drive change and not a mechanical bark bark bark. With some dogs, the initial stage of this work results in the complete elimination of prey drive. The dog's drives actually go down and the grip gets weak. This is to be expected. Until the dog learns how to defeat the new stronger tougher helper, many dogs go through this stage of drive loss. When this happens the training needs to focus on teaching the proper steps of defensive training. We need to develop the dog's fight drive in an appropriate step by step manner. So the point here is that when an experienced trainer applies this initial stick work, he is going to see right away where the holes are in the dogs earlier training. Once those holes are identified, the training program can be developed for those dogs that are genetically capable of accomplishing this work. Remember, not all dogs have the genetic makeup for fight drive. My definition of fight drive is "A dog that carries the forwardness of prey with the intensity of defense. A dog that is confident of his ability to beat the helper under every circumstance, in every environment with or without training equipment." Always remember, a police dog must learn how to work with confidence under stress. The police dog that does not view the helper or suspect as a fighting partner (that can hurt him) is going to fail much quicker than one that has had proper training in fight drive. The correct way to look at it is that a dog is not ready to work the street until it can function in "fight drive" (FD) and the stick is just one tool that can effectively add stress to training and help develop fight drive. In one final closing note, it is important to understand that when comparing dog trainers as a group, sport trainers are much better over all dog trainers (as a group) than police K-9 Handlers (as a group). When a good sport dog trainer makes the effort to get the proper training in police work, he will make the best instructor. I was recently reminded of this by my visit to the Rotterdam Holland police dog school. This is one of the best police k-9 schools in the world. They have 4 civilian trainers as instructors for the school. All are either KNPV competitors or KNPV Judges and competitors. When I questioned Jan de Bruin about this he smiled and asked me who the better dog trainers were. He said his K-9 Officers were the best dog handlers he could find in the department. That did not mean they were the best dog trainers. If you wish to learn more about this subject, see my video titled Training the Bark Hold for Police Service Dogs. This tape details the work to convert sport dogs to service dogs in fight drive. If you are new to bite training or service dog training I recommend you view the first in my series of protection dog training videos, The First Steps of Bite Training. If you would like to read more about the drives in protection training, refer to some of the articles I have written and posted to my website.
2019-04-23T04:22:45
http://leerburg.com/stick-k9.htm
0.999593
They were handing out coupon books at Costco today. The coupons are only good November 27th, 28th and 29th. There are a quite a few deals that some folks might be interested in. A pack of four $15 iTunes gift cards are normally $56, but with the coupon, they're $8 off for a total of $47.99 for $60 worth of cards. There's no limit. The 8GB iPod nano, normally $139.99, is $10 off with coupon for a final price of $129.99. Limit 1. A Philips 10.4" digital picture frame, normally $99.99 is $20 off with coupon. Final cost $79.99. No Limit. KitchenAid Professional HD mixer is $50 off with coupon. Normally $279.99, $229.99 after coupon. Limit 3. Hitachi 18 Volt Lithium 4 piece cordless tool kit with 1/2" drill, reciprocating saw, 6.5" circular saw, lantern, fast-charger, 2 batteries and carrying case. Normally $299.99, $199.99 after $100 coupon. Limit 1. Flip Ultra Camcorder, $30 off with coupon. No limit. $300 off a Vizio 55" 1080p 120Hz LCD HDTV, limit 2. $100 off a Garmin Nuvi 5.0" GPS, Limit 2. $55 off a TomTom 4.3" GPS, Limit 2. $35 off a Sony Blu-ray player, Limit 4. There will also be some really great deals on Costco.com from 11/27 through 12/14. A Galileo CT-1380 Catadioptric reflector telescope, normally $199.99, now $149.99 including shipping. ETQ 3200W generator, normally $349.99, now $249.99 (+$30 if you need the CARB approved version). Shipping included. Costco also usually gives away free copies of their Cooking The Costco Way cookbook on Black Friday. KitchenAid Professional HD mixer is $50 off with coupon. Normally $279.99, $229.99 after coupon. You may be able to save even more, depending on Costco's wording of their discount. KitchenAid has rebate offers available on their mixers, $30 - $50 dollars depending on the model, with forms available on their website kitchenaid.com Does Costco's listed price include this rebate, or can you get this in addition to Costco's discount? I was going to ask if limit 3 = 3 per store.
2019-04-24T15:50:49
https://captpackrat.livejournal.com/365729.html
0.998789
Critics Consensus: AHS returns in frightening form with "The End," a wickedly fun -- if unfortunately witch-free -- premiere that's equal parts camp, chaos, and Sarah Paulson chewing scenery like no one else can. Critic Consensus: AHS returns in frightening form with "The End," a wickedly fun -- if unfortunately witch-free -- premiere that's equal parts camp, chaos, and Sarah Paulson chewing scenery like no one else can. Season 8 opener: In the wake of the nuclear apocalypse, a select group survive in a sealed bunker. As tensions rise, the occupants question whether the real hell is outside, or locked in with them. The haunting setups are punctuated with showy flourishes of humor, making the start of "AHS: Apocalypse" feel just like Ms. Venable wants: a welcome beginning instead of a harrowing end. It's "American Horror Story," so I guess we should have expected the first episode of "Apocalypse" to be weird and confusing, but this one feels particularly obtuse. That's not a criticism - just a note about how extra-weird this season is shaping up . Apocalypse, on the basis of its first hour, will stand shoulder to shoulder with its predecessors. This was a silly, ghastly soufflé that bounced between horrific and hilarious and was never less than completely exhilarating. This is broad satirical stuff, sure, but it's notable that the show's writers can't be bothered to reach past punch lines about our own world's fads of five years ago. In true Horror Story fashion, the season's first supernatural moment comes paired with the season's first shower scene. Wednesday night's premiere of American Horror Story: Apocalypse marked a welcome return to camp for the long-running FX franchise. It's a bad omen if there ever was one and this has secret society written all over it. I'm pretty sure Miriam and Wilhemina served the residents human flesh in order to boost morale after they killed him. The world-building for Apocalypse is pretty impressive all around... If Apocalypse sticks to this arch, seductive palette, this could be the most delectable season yet. Only time will tell. If I had to describe this season's genre, it wouldn't be end-of-the-world horror. It would be The Simpsons parodies of end-of-the-world movies, as if a seven-minute "Treehouse of Horror" installment will be spread out over a season. The moments of genuine pain gleaned from the first moments of the [premiere] episode redeem the somewhat aimless, camping next 45 minutes.
2019-04-24T08:22:01
https://www.rottentomatoes.com/tv/american_horror_story/s08/e01
0.998692
When I started tracing my family tree I had not heard of Thomas Parsons: he was my gt gt gt grandfather, too far back in my family for any information to be handed down. I found him named as the father on the marriage certificate when his daughter, Maria Sarah Parsons married John Donville Taylor in 1840 at St Mary’s Ealing. He was just a name and occupation: shoemaker, so what was I able to find out about him? I found that Thomas Parsons was born around 1786 – 1791 according to the 1851 census (age 60) and his death certificate later that year (age 65). The 1851 census gives his birthplace as Harrow, Middlesex. So far I have not been able to locate Thomas's baptism. His trade (shoemaker) is the same as that of a Joseph Parsons, who with his wife Elizabeth, baptised nine children (John, James, George, Joseph, Samuel, Sarah, Charles, Mary Ann and another Joseph, the first having died in 1801) at Harrow between 1786 and 1803. Joseph Parsons senior was buried at Harrow in 1825, and was described as ‘from Brentford’; he may have lived with one of his children in Brentford after his wife died in 1818. Joseph and Elizabeth seem good candidates to be Thomas’s parents. Unfortunately there are no gaps in the first few baptisms to Joseph & Elizabeth to allow for an (unbaptised) Thomas. It is (just) possible that their eldest son baptised John in 1786 became known as Thomas. My first firm sighting of Thomas is at his marriage at Hanwell in 1813 to Lydia Harris. Their marriage day was about 11 months after the banns were published – unusual. Perhaps Thomas was waiting to finish his apprenticeship (although I would have expected him to have already accomplished this by the age of 26). Perhaps there were problems in his bride’s family requiring a delay (illness?), or they were unable to find a property to rent, or were waiting for Thomas to establish his trade so he could keep a wife and family? The newly married couple settled in Old Brentford and baptised their first nine children (Thomas, Joseph Samuel, Charlotte Lydia, Lydia, Mary Ann, Maria Sarah, Emma, James and Lydia Susannah) at the parish church of St Mary Ealing between 1814 and 1825. By the time their tenth and last child George Henry was born in 1828 the family were able to baptise him at St George’s church, Old Brentford, as it had been raised in status to a district chapelry that year. Thomas is not recorded in the 1826 Pigot directory for Middlesex in Old Brentford, but a James Parsons, boot and shoe maker is. Other local Parsons include a Henry & Martha Parsons, of Old Brentford, shoemaker who baptised three children at the same church as Thomas & Lydia in 1816 (Henry), 1819 (Martha Sarah) and 1821 (George): James and Henry may be related to Thomas. In 1839 Thomas’s wife Lydia died at the age of 54. She was buried at St George, Old Brentford, on May 12. In the Ealing Tithe Apportionment the following year Thomas Parsons was recorded as owning two adjacent houses, gardens and a workshop on the High Street, one house occupied by him and the other by Thomas Sweet. A Thomas Sweet death was registered in Brentford in the Jul/September quarter of 1841 and the 1841 census shows Thomas and his son Joseph Samuel occupying the adjacent properties, which later were to become number 281 and 282 High Street. Mary Ann Parsons married William Watson at Islington in 1841: William was the son of William Watson, staymaker and as Thomas Parsons’ neighbour was William Watson, staymaker it seems likely that William junior was his son. Thomas Parsons witnessed the marriage. Maria Sarah Parsons married John Donville Taylor at the parish church of St Mary, Ealing on February 6. Thomas is recorded on the certificate as a shoemaker and his son, Joseph Samuel, was one of the witnesses. Later in 1841 Thomas’s second eldest son, Joseph Samuel Parsons married Mary Ann Burness, who was born in Old Brentford, in Windsor. The couple settled in Old Brentford where Joseph Samuel was a watchmaker. The 1841 census may provide a clue about Thomas Parson’s birth, as living in his household was Harriet Marconi, aged 6, not born in Middlesex. The only woman in Thomas’s household following the death of his wife and departure of his two eldest daughters was Lydia, who was just 16 at the time of the census. It seems likely that Harriet was related to the Parsons family, although the 1841 census does not include relationship details as later censuses do. A Mary Ann Parsons married Louis Marconi at Teddington in 1827 and they had three (maybe four) daughters: Frances (Fanny), Caroline, Harriet and possibly Ann S. Louis Marconi was ‘customs’ in the 1841 census and he died in the July/September quarter of 1841: so it is possible the youngest daughter Harriet was sent to live with relatives when her father was ill. As Mary Ann Marconi (nee Parsons) was born in Wembley (in Harrow parish), according to the 1851 census, it is possible she was the same-named daughter of Joseph & Elizabeth Parsons baptised at Harrow in 1800. In March 1847 William Wood stole a pair of men’s boots and a pair of low shoes from the High Street shop, having spoken to Lydia Susan Parsons, Thomas’s daughter. William Wood was tried at the Old Bailey, found guilty and imprisoned for 3 months. The trial records include other snippets of information, for example that Thomas's name appeared in his boots and shoes. Two years later in 1849 Lydia Susannah Parsons married Robert Gainsford, a gardener, at the parish church, Acton. Witnesses to the marriage were Mary Ann Marconi (her aunt?) and George Henry Parsons, her younger brother. The 1851 census shows Thomas living on his own at the same High Street property as in 1841, with his son Joseph Samuel next door. Thomas died on 3 November 1851 of ‘Inflammation of the larynx’ and his death was registered by Elizabeth Taint on 7 November; his age at death was noted as 65. He was buried at Old Brentford on 9 November. I wondered why Elizabeth Taint registered his death rather than one of his children and in November 2015 Peter Stuart emailed 'Elizabeth Taint was my wife's 4th Great Grandmother and she was a professional nurse. Maybe she registered the death as she was present at death or had nursed him'. Thanks to Peter for this information. The will was proved at London (prerogative Court of Canterbury) on 25th November by his executors, son Joseph Samuel Parsons and son in law William Watson. The following year his son James Parsons married Caroline Priscilla Norminton at Heston parish church (he professed to be a gent but was a grocer in subsequent census returns). George Henry Parsons, younger brother, witnessed the marriage. In 1860 Thomas’s youngest son George Henry married Harriet Jane Gainsford: sister to Robert who married Lydia Susannah Parsons eleven years previously. One final link between the Gainsford and Parsons families: the youngest son of Robert Gainsford senior, Charles James, married Catherine Piper in 1861. Following Charles James’s death 6 years later she married George Henry Parsons, who lost his wife Harriet Jane in 1871. Writing up these notes was useful in highlighting what I did and more importantly what I did not know about Thomas. It also made me revisit conclusions I had reached previously and I hope it will be a useful starting point to start to fill in some of the gaps: notably his baptism; I would like to find out more about the other Parsons who were contemporaries of Thomas, who lived in Brentford and who also were shoemakers: were they related to Thomas or just concidences? I hope to be able to add some firmer conclusions in the future. FreeBMD; ancestry.co.uk for censuses and parish records; birth, marriage and death certificates; published extracts from the Ealing Vestry Minutes held at Leicester University Library; Old Bailey web site; Ealing Tithe Apportionment.
2019-04-18T10:29:38
http://bhsproject.co.uk/families_parsons.shtml
0.990087
What is the Melissa Virus? The Melissa virus was an e-mail virus first released on March 26, 1999. The virus spread so rapidly that e-mail systems were overloaded by the virus propagating itself and became the fastest spreading virus to date. The virus would infect a machine with an e-mail message. The e-mail message's subject indicated that the message contained a file that the user had requested. After opening the attached the virus infects the machine and spreads to other e-mails using macros in Microsoft Word 97 and Microsoft Word 2000 files. These macros mass-mailed new copies of themselves to the first fifty addresses in the infected user's address book if they are using Microsoft Outlook 97 or 98. While the virus itself was not initially designed to be malicious, the fact that it overloaded e-mail servers was enough to substantiate legal proceedings on the author of the virus. The author was found to be David L. Smith of New Jersey, who named the virus after a Miami stripper. He received twenty months in federal prison and a $5000 fine. It is estimated that the virus reached thousands of computers in hours with damages estimated at more than $80 million.
2019-04-21T10:09:04
https://www.computerhope.com/jargon/m/melissa-virus.htm
0.999993
Interviewer: Rate the following activities in order from most important to least important: changing oil, hockey, collecting bee boxes, eating chocolate cake and watching TV. Aardvark in question: Hockey,watching TV, changing oil, collecting bee blocks, eating chocolate cake. I don’t like sweets. Interviewer: Who would you rather have on your rec team: Ulf Samuelsson or Darius Kasparaitis? Aardvark in question: Darius Kasparaitis. I like his aggressive physical playing style. He would add some ‘pop’ to the Aardvarks lineup. Aardvark in question: Anything by Tom Petty. Aardvark in question: Dwight Thompson reminds me of a young Dmitri Mironov. Jason Gulay reminds me of a middle-aged Brian Leetch. Aardvark in question: Ontario or Saskatchewan. Aardvark in question: 10 times. It is important to be clean after a good game. Aardvark in question: Arborg is my favourite. FB is my least.
2019-04-23T09:08:32
https://aardvarkshockey.ca/2016/02/24/guess-that-aardvark-5/
0.999678
A causal acquaintance once told me a story of their expansive exploration into the world of dog and puppy registries. They stopped looking after discovering that there are well over 30 different registries: AKC, APR, UABI, UKCI just to name a few. About any registered dog can be registered with a number of registries. So you register your dog with 10 different registries and you have ten different registration certificates stamped with that registries seal of approval. Does that make your dog healthier, have a better temperament, more fitting by the breed's standard, or even potentially more important, genetically sound? Is any registry an indication of the over all quality of a given puppy or dog? Bottom line is NO, absolutely not. The two things that influence all the above are first the breeder and second the crap shoot called genetics. Over the years I have heard many amazing statements concerning registries. Comments like "if a puppy isn't AKC registered it's inferior, it came from a puppy mill, it may not even be a pure bred". The truth is, probably more than ninety-five percent of dogs who have been registered via a registries other than AKC are also eligible for AKC registration or are dully registered with AKC already. To prove my point I have several dogs registered with four or five different registries including my beloved champion Pekingese "Suzy". She has been shown and denoted a champion in three of those registries to date, without issue or problem. When talking to other breeders especially show breeders, I would purposely mention my group winning APR champion Pekingese. Many would be like "that does not mean anything it's not AKC". Then I would tell them she is also a group winning UABI champion, again, that does not mean anything either it's not AKC. I waited a bit and told them she was also an AKC champion. Her first time in the AKC show ring she took a five point major over specials (the highest score you can get in AKC). Then everyone was like WOW she must be nice! Yes "Suzy" is nice but is of the same high quality before you knew she was AKC registered. The point is she is what she is, a beautiful, sweet, quality Pekingese regardless of which registries she is a member of and/or denoted champion within. Don't get me wrong, it's not that registries are not important in most instances, they are it's just there are many good registries to choose from choose which ever one or ones you like based on the different benefits you seek. You may like United All Breed because they automatically put three generations of pedigree on their certificates, or the scoring system of their dog shows. You may choose the American Canine Association because they have health tracking on their registrants. APR for their wonderful, friendly, speedy, customer service or that they have a monthly drawing to pay for your new puppy. You may prefer UKC, AKC, or, well you get the idea. Hopefully, I've given you some logical helpful advice on the subject. Thank-you for taking the time to read these important tips on registries, and as always, we'd be more than happy to assist anyone in determining registry availability.
2019-04-20T14:10:54
http://squawcreekkennels.com/articles/dog-registries
0.999659
Neurons in brain talk to each other at synapses which connect neurons into vast communicating synaptic circuits. Synapses are specialized intercellular junctions that are diverse and dynamic. The number, locations, and distinct functional properties of synapses confer onto synaptic circuits an enormous complexity that is essential for information processing by these circuits. Insight into how synaptic connections in such circuits are specified represents a multifaceted problem that includes four interrelated questions: 1. How does a neuron identify the correct target neurons for synapse formation? 2. How does a neuron form a synapse on specific parts of that target neuron, e.g., distal dendrites or axon hillocks? 3. How is the decision reached, whether to keep or to discard a given synapse after it has been formed? 4. How is the functional diversity of synapses generated and controlled? Clearly synapse formation means more than just establishing contacts, and includes specification of the dynamics and types of these synaptic contacts. Although much remains to be clarified, the available data suggest that axonal pathfinding is a major component in establishing synaptic specificity, that initial formation of synapses is fueled by mechanisms that involve multiple cell adhesion molecules, and that the development of synaptic properties and use of a synapse are crucial in the decision about whether or not a synapse survives.
2019-04-21T16:09:04
https://link.springer.com/chapter/10.1007/978-0-387-32562-0_1
0.999704
The United States Congress was unable to establish legislation that would delegate funds for the 2014 fiscal year, which resulted in regular government operations grinding to a halt and bringing the United States government to an effective shutdown from October 1 through to October 16. The shutdown was known to have caused grave uncertainty for many people, because somewhere around 800,000 federal employees were indefinitely furloughed for the duration of the shutdown, with another 1.3 million required to report to work without any known payment dates. Why was there a shutdown? The two chambers of Congress could not agree on reaching a funding resolution, with the deadlock primarily centering on two bills, the Affordable Care Act and the Continuing Appropriations Resolution, 2014. The latter was passed by the House of Representatives on September 27 2013, but a more-stripped down edition than was preferred by the Democratic Party, which was depending on their key health policy to be bringing in the golden torch home, so-to-speak. This saw the House reinstating the measures that were removed by the Senate on September 29, but the Senate continued to disagree with the bill, in an effort to discourage the passing of the Affordable Care Act. By the time the two parties warmed to the idea of a settlement bill, it was already the end of September 30 2013, causing the federal government to shut down due to a lack of suitable funds at the start of the fresh new 2014 fiscal year. It came to an end when late in the evening of October 16, Congress passed the Continuing Appropriations Act 2014. President Obama signed it shortly afterwards, a little after midnight on October 17, ending the government shutdown but only with the debt limit initially set until February 7 2014. The Republicans lead the House of Representatives, and many senators, like Ted Cruz, and conservative groups of the sorts of Heritage Action, stood in the way of the passing of the bill, because it was inclusive of Obamacare. In response, the Democrats chose to amend many portions of the resolution to maintain funding for the new fiscal year, but to no avail. The Tea Party Republicans even went so far as to say that the health care law should not be funded, and would not stop budget negotiations unless they saw this law completely removed from the bill, even if that meant that a government shutdown would be in order. There was a long period of budget impasse, and yes, it eventually did lead to the American government to shut down. The Bureau of Indian Affairs ran essential programs during the shutdown, such as firefighting and police services, but tribal governments and impoverished reservations were stripped of funding. Programs such as those that provide income, food, transportation and foster care to communities were all closed off. Businesses were also deeply affected; many companies had to furlough almost half of their staff, some couldn’t make deliveries or receive payments for work already performed, loans were delayed for SMEs, and even imports and exports at docks saw an interruption. Washington, D.C. can only approve its local budget once the Congress stamps it with its seal of approval so the shutdown affected the city much more than its neighbouring states. Neighbourhood trash collection, motor vehicle services, and payments to personnel, judges and government workers were delayed for a long time, and government workers were made to come to work with no hope of seeing a paycheck anytime soon. 16 of the 58 immigration courts were closed, so decisions on political asylum cases were postponed, and this is the United States: it already has too high of a buildup of work. Low-income children fell out of access to comprehensive education and nutritious meals, US officials meetings with European Union diplomats, with respect to the proposed Transatlantic Free Trade Area, was curtailed because they could not travel to Brussels, museums and national parks were closed, tourism-related sales, stays at luxurious hotels, fine dining at restaurants amongst local communities were all stopped, so the tourism industry experienced a severe financial loss. The Democrats and the Republicans were blaming each other throughout the course of the shutdown but the public mood seemed one of high disappointment with government leaders, all-sides basically, but to be more specific, especially members of Congress, according to several polls conducted at the time, from a Fox News poll to a Gallup poll. Pre-shutdown the general sentiment amongst the American public with regards to the Affordable Care Act was divided, largely because most people had no clue what the law was about and how they were going to be affected by it, while many, surprisingly, were confused if this government health insurance plan would hamper the private health insurance plans running in the country, which it wouldn’t because they are on two separate divisions: public and private. Americans, collectively, for the most part, were against the shutdown and wanted the healthcare law to be handled separately over the negotiations that were going on in Washington about funding government operations. Tell me more about the intercontinental reactions! Many members of the American media were blamed for their consistent side-favouring coverage, this time with the Democrats being the beneficiaries of all of the favouritism rather than the Republicans, while response to the situation at home and in other countries was one of staunch criticism. Painted as being a disillusionment for voters, a grave reminder of how this could possess a mammoth risk to the global economy because of which public expenditure needs to always be controlled and harsh austerity measures implemented even if they are not always well-liked, and even political gerrymandering that is so widely active in America contributing to the shutdown, it was indeed a time of high-pressure and intense disparagement from our intercontinental friends. The dollar fell early on October 1st and since the Republicans took control of the Senate in 2010, brawls in Congress have become commonplace. Many government staff continued to work despite the shutdown, although they were informed to stay at home without work and pay. Meanwhile, investors were looking at the prospect of another debt deal, rather than a budget which signaled a global indifference to the situation, despite the threat the shutdown possessed to America. January 14 2014 finally saw a bipartisan compromise reached through September 30, just a couple of days before funding for federal agencies is clocked to fall. The $1.1 trillion measure covers money for US government operations, war financing, such as for defense exercises in Afghanistan, veterans benefits and improved postal services; President Obama has urged Congress to quickly pass the 2014 spending bill. The American public will be pleased to know that the battle over Obamacare was set aside, because it was included in the bill unopposed, just to avert another possible shutdown that has been looming for sometime now. The federal government has been operating with the aid of a temporary bill that expired on January 15, so another brief bill to finance the government for the next few days is expected to be launched, to permit the Congress some room to approve the comprehensive bill that would be signed into law by President Obama. This entry was posted in Current Affairs, Global & International and tagged America, Democrats, Republicans, United States. Bookmark the permalink. Previous: Poverty, Agriculture & Climate Change: What to do with Bangladesh? Next: Pop Culture & Lectures: Can They Work Together?
2019-04-25T20:45:09
https://politicsinbritain.ideasoneurope.eu/2014/01/16/congress-reaches-a-1-1-trillion-plan/
0.999992
Recently National Geographic has published photos from one of the most dramatic dinosaur fossils ever found, an unidentified nodosaur. What are nodosaurs? They are a family of dinosaurs closely related to the more well-known ankylosaurs, sharing the same basic body plan that resembles a four-legged armored tank, but lacking the club tail that distinguishes ankylosaurs. One of the best known nodosaurs is a dinosaur called Gastonia. Nodosaurs have recently been in the news, as just last month National Geographic unveiled a dinosaur that is among the most well-preserved ever found. An as-yet-unnamed nodosaur was discovered by an employee of the Suncor corporation while working in the oil sands of Alberta. The find was unusual for several reasons. First, the area it was found was a marine environment during the Cretaceous, and all the fossils found there previously were marine creatures. Second, the front half of the dinosaur was spectacularly preserved and fully articulated. That amazing fossil recently went on display at the great Royal Tyrrell Museum in Drumheller, Alberta. Fabulous nodosaur fossil from Alberta. Photo credit: Robert Clark, National Geographic. Of the nodosaur family, one of the best known members is Gastonia. Although there are quite a few different members of the nodosaurine family, many of the fossils are quite rare and mostly incomplete. Gastonia is one of the exceptions, with several fairly complete skeletons and close to a dozen skulls which is extraordinary for this group of dinosaurs. The first Gastonia fossils were found in 1989 in Utah, and the animal was formally described in 1998. The name honors a paleontologist named Rob Gaston who owns a dinosaur replica producing company (Gaston Designs, Inc.) in Fruita, Colorado. Gastonia, and all its closely related cousins are most famous for their armor. The spikes and plates that helped protect this heavy and probably slow-moving herbivore certainly made it difficult for a predator to easily attack. The heavy defense allowed Gastonia to use its toothless beak to munch on low-growing plant material without having too much worry about attacks from would-be predators such as Utahraptor. Gastonia, like all nodosaurs, was covered in osteoderms, which are bony deposits that sit in the dermal layer, or skin, of an animal. These certainly gave the animal quite a bit of protection, but Gastonia also featured a large bony plate on its back, and a number of bony spikes that were presumably on its side and back. These were covered in keratin, which is a common protein that many animals have covering bony horns. These vertical spikes would have been a very unwelcome sight for a potential predator, and although nodosaurs like Gastonia lacked the bony club tail that its more famous cousin Ankylosaurus wielded, it is probable that some of its spikes were lined up horizontally on the tail which Gastonia could swing to great effect. Although we know quite a bit about Gastonia, the newly discovered nodosaur will help answer many questions about this interesting dinosaur family since the fossil is so well preserved compared to the vast majority of nodosaur fossils. Because it was found in a fully articulated position (although only the first half or so of the animal was found) with skin impressions, osteoderms and spikes still attached, scientists will now have a much better understanding of many aspects of these dinosaurs, including how their bodies were arranged. This entry was posted in dinosaur museums, dinosaurs, Fossil of the Month, Natural History Museums and tagged dinosaur museums, dinosaurs, Fossil of the Month, Gastonia, Natural History Museums. Bookmark the permalink. I’m going to have to get to Drumheller this year and check that out! I wish I could get there this year, but I’ll probably have to wait a while. What a great fossil! Let me know how it is in person after you visit!
2019-04-23T00:57:17
https://allosaurusroar.com/2017/06/09/allosaurus-roars-fossil-of-the-month-gastonia/
0.998515
The main reason to understand and explain the behaviour of the graphs is to make secure and profitable trades during the game. The basic concept is to find short periods of quick to sharp rates to make Back↔Lay trades. In practice when we make trades (Back↔Lay) for a short periods we call it Scalping. From now on these short periods that give the opportunity of scalping we call it Scalping Windows (SW). It is very important to predict periods of Scalping Windows during a football match. Probably, it is the main target of a trader in football. Just after the Pressure Period ends it is usually fundamental, that there is a Scalping Window as it shown in figure 4.4. Figure 4.5 shown some standard SW during a game. Usually there is a SW after time t0 and some minutes after a goal. A SW sometimes generates at the very last minutes of the end of the game. Of course there are more SW during a match as it has been explained above. Figure 4.4: Typical behaviour of a Pressure Period and a Scalping Window. Figure 4.5: Idealized behaviour during a live Football match with two goals scored. In this paragraph we are going to practice our knowledge so far about graphs. We will try to investigate Pressure Periods (PP) and Scalping Windows (SW) in Under 1.5, Under 2.5 and Under 3.5 markets. When the game started the price was about 1.70. There was a clear pressure period PP1 at the start of the game until time t0 and then the idealized average curve until time tE. There is a small SW1 just after PP1 and we can distinguish some very short PP and SW. The reason there are no many SW is that there is no goal. When the game started the price was about 3.80. There was a clear pressure period PP1 at the start of the game until time t0 and then a clear linear curve until time tG1. There is a small SW1 just after PP1. There were no PP after the goal, but there were a clear and very sharp SW2 for a long period. Under 1.5 market usually presents a SW just after the first goal. When the game started the price was about 1.80. There was a clear pressure period PP1 at the start of the game for a long period until time t0 and then a clear linear curve until time tG1. There is no clear SW just after PP1. Maybe there was a SW but for a very short period. There were a short PP2 after the goal, and a clear sharp SW2 for a long period. There were also a PP3 at price 1.60 and then a clear SW3. When the game started the price was about 2.20. There was a clear pressure period PP1 at the start of the game until time t0 and then a clear SW1 just after PP1. There is also another short PP2 and SW2 before the first goal. After the goal there was a clear PP3 and a very sharp SW3 after. Another 2 PP4-SW4 and PP5-SW5 are clearly distinguished. After the second goal there is a clear PP6 and a very sharp SW6 after. When the game started the price was about 1.55. There was a clear pressure period PP1 at the start of the game until time t0 and then a clear SW1 just after PP1. There is also another short PP2-SW2 before the first goal. After the first goal there was a clear PP3 for a long time and a very sharp SW3 after. After the second goal there is a clear PP4-SW4 case, the same after the third goal PP5-SW5. When the game started the price was about 1.65. There was a clear pressure period PP1 at the start of the game until time t0 and then a clear SW1 just after PP1. The curve after t0 was steady and linear with very few short SW. It is very important to notice a PP2 before the goal. That means the team pressured to score and the prices couldn’t reduce. There is also another short PP3-SW3 quite long time after the goal. When the game started the price was about 2.00. There was a clear pressure period PP1 at the start of the game until time t0 but not so clear SW. There is a PP2-SW2 & PP3-SW3 during the game. That means the game was very strong with a lot of opportunities to score. It is very interesting to notice the pressure PP4 just before the first goal, a sign that there was a pressure for scoring. A clear PP5-SW5 and PP6-SW6 exist just after the first and second goals. When the game started the price was about 1.65. There was a clear pressure period PP1 at the start of the game until time t0 but not so clear SW. Although there was one goal the graph didn’t has clear PP and SW. That probably means the game was not so strong for scoring. There is a PP2-SW2 after the goal and a PP3-SW3, PP4-SW4 before the end of match. When the game started the price was about 1.70. There was a clear pressure period PP1 at the start of the game until time t0 and a clear very sharp SW1. Although there was only one goal the graph has many PP and SW that probably means the game was very strong and there were many opportunities for scoring. As a conclusion, it is obvious that understanding and studying Betfair Graphs we can conclude very useful results for our Trading and investment. Almost all Betfair graphs follow some simple rules presented in this text. A careful understanding of the theory presented in this text can give us the opportunity to make scalping in specific periods, instead off blind trials. Although football trading graphs for Under goals are steady, in the case of a goal (peak) you can lose a big percentage of your initial stake. In www.betpractice.com there is statistical research to understand the possibility of having a goal during a Scalping Window period. So, if you only trade in Scalping Windows periods, you can make profitable trading inside them. A Scalping Trader has to carefully interprete graphs and statistics and that's why he needs a theory.
2019-04-19T13:07:26
https://www.betpractice.it/post/105-the-science-of-betfair-graphs
0.999999
I disconnected EZOfficeInventory from my Zendesk account. How can I reconnect? 1) Remove the EZOfficeInventory app from the Zendesk Portal. 2) Disconnect Zendesk from your EZOfficeInventory account. 3) Connect Zendesk from your EZOfficeInventory account.
2019-04-21T00:23:40
https://faq.ezofficeinventory.com/faq/disconnected-ezofficeinventory-from-zendesk/
0.999999
Click the link below that corresponds to your browser and follow the instructions. For convenience, you may want to print this page so that you have it handy as you set your default page. 1.In the View menu, click Internet Options. 2.In the Home page section, type http://www.247shop.co.uk into the Address text box. 1.Click on the Eit menu. 3.Open up the Web Browser folder on the left-hand side.. 5.In the Home Page box, type http://www.247shop.co.uk in address box. 6.Click the OK button at the bottom of the box. 7.Click on the Home icon in your browser. 1.In the View menu, click Options and choose the Navigation tab. 2.In the Page text box, choose Start Page. 3.In the Address text box, type http://www.247shop.co.uk. 5.Now click the Home button in the toolbar. 1.In the Tools menu, click Internet Options. 1.In the Edit menu, click Preferences. 2.Click the "Navigator Starts with Home Page" button in the upper box. 3.In the "Location:" text box in the middle of the window, type http://www.247shop.co.uk. 1.In the Options menu, click General Preferences. 3.In the Startup section, select Home Page Location. 4.In the text box immediately below Home Page Location, type http://www.247shop.co.uk. 6.Now click the Home button in the toolbar.
2019-04-19T19:15:18
http://247shop.co.uk/browser-homepage.php
0.99951
I use the Sage automorphism_group function to find the group that leaves an adjacency matric, say C, invariant under a similarity transformation. But sometimes it seems the results are for matrices on a vertex space that is not the same as the original, but is reordered. A simple example on a 3-vertex graph: o--o--o. but R is what Sage gives. invariant. The last matrix is the C matrix where the vertices are indexed in reverse order. Does Sage have some canonical way it orders the vertices in graphs and groups? A bit more info, maybe. The order of the irreducible representation table seems to give a hint. If the trivial representation is the first row (which it is for some graphs), it appears (from a few tests) that the vertices retain their original order to align with C. If the trivial representation is the last row then the matrix C' is the adjacency matrix (suggesting a reordering of the vertices). I have no idea why this should be related if it is. Bottom line for me is I cannot apply any matrices from the group that come from the matrix() method to C or other objects in my original vertex space since they are ordered differently. I don't see how to find the vertex order sage uses. Any help or insight appreciated. could give you some clues. Sorry. In this case, a group is just a group. Is there a theorem that says there should be a connection? It's not as if we are giving a subgroup of the easy representation of the permutation group on all vertices; I can't find a matrix() method for G or H. Thanks for the answer Kcrisman. I looked at automorphism_group?? and I may have found the answer. There is a keyword option 'translation' which gives a dict for mapping from vertices of the graph (dict keys using python indexing from 0) to the permutation elements (1,2,3,...) which must be positive integers. When I printed the dict for a simple graph the 0th vertex is mapped to the last integer, the others appear to be mapped to the same integer as the python index (since those are positive and non-zero). Does this sound right? I will be experimenting with this "reordering" and I'll let you know if it worked. Thanks, you might have solved another group-graph puzzle for me. yes, typically the mapping from a graph with vertices 0..n-1 in Sage in situations like these is done by making vertex 0 vertex n. That way most of the vertices have the same numbers. I found there is a translation table keyword option for the automorphism_group() call which returns a table showing which vertex indices (which go from 0 to n-1, where n is the group order) match the cycle labels (which go from 1 to n since they must all be > 0 integers). The table tells you how Sage is internally ordering the vertices so you can match up the output group matrices with your original vertex vector space. This helps align your adjacency matrix with the outputs from the automorphism_group method and other items calculated from that group like the matrices. Get more info by typing D.automorphism_group?? where D is a graph based on your input adjacency matrix. Thanks to krisman for suggesting I look at D.automorphism_group?? info.
2019-04-22T14:29:29
https://ask.sagemath.org/question/9315/does-sage-keep-the-order-of-vertices-in-a-graph-and-its-group-or-scramble-them-for-me-it-sometime-scrambles-them/
0.999999
What is the difference between all types of Markov Chains? I have been looking for some good material covering Markov Chains but everything seems so difficult to me... After reading about the subject, I figured out that there is basically three kinds of processes: discrete-time, continuous-time and decision Markov Processes. I started reading Introduction to Probability Models, Tenth Edition, from Sheldon M. Ross, about discrete-time processes and then, after judging myself introduced to the subject tried to read about continuous-time processes and got confused. Could someone give me an explanation about the subject (like the other Markov Chains topic: What is a Markov Chain?), focusing on differences and at least one simple application ? I also would be glad if you could suggest books that don't use a very complicated language to explain the subject. The book I cited above seems cool (although I have lots of doubts over the formulas/proofs and the math notation) but there are too many people telling the book doesn't explain the subject properly. A Markov chain is a discrete-valued Markov process. Discrete-valued means that the state space of possible values of the Markov chain is finite or countable. A Markov process is basically a stochastic process in which the past history of the process is irrelevant if you know the current system state. In other words, all information about the past and present that would be useful in saying something about the future is contained in the present state. A discrete-time Markov chain is one in which the system evolves through discrete time steps. So changes to the system can only happen at one of those discrete time values. An example is a board game like Chutes and Ladders (apparently called "Snakes and Ladders" outside the U.S.) in which pieces move around on the board according to a die roll. If you are looking at the board at the beginning of someone's turn and wondering what the board will look like at the beginning of the next person's turn, it doesn't matter how the pieces arrived at their current positions (the past history of the system). All that matters is that the pieces are where they currently are (the current system state) and the upcoming die roll (the probabilistic aspect). This is discrete because changes to the system state can only happen on someone's turn. markov chain is a special type of stochastic process where the outcome of an xperiment depends only on the outcome of the previous xperiment. It can be found in natural and social sciences e.g a random walker and the number of each species of an ecosystem in a given year. There are some excellent sources on the web. IMO one of the best is the notes of David Anderson at the University of Wisconsin, although they may be more advanced than what you are looking for. Not the answer you're looking for? Browse other questions tagged statistics stochastic-processes markov-chains or ask your own question. What is the difference between a Markov process and a Markov chain? Why are inter arrival times in the continuous version of discrete-time Markov chains always exponentially distributed? When the sum of independent Markov chains is a Markov chain? What are some modern books on Markov Chains with plenty of good exercises? Requirements for approximating general stochastic processes as the limit of a sequence of Markov Chains?
2019-04-25T14:40:15
https://math.stackexchange.com/questions/22982/what-is-the-difference-between-all-types-of-markov-chains
0.999999
I have another article about Apple and privacy, but I had to post this tweet. As many people know, Apple has a variety of products and services that work well together. As he mentions, there are two separate issues: "How well they work together" and their "Walled Garden". There is no other company in the world that has as many profitable products and services that work as seamlessly together as Apple's products and services. That isn't just marketing jargon, it is undeniable fact. In the world of creating Operating Systems, Apple really has only two competitors to speak of and everyone knows that is Microsoft and Google. These companies have different approaches, though. However, in either case, Apple has wider range of hardware and software. Microsoft does not compete with Apple in the phone market and Google barely competes with them in the desktop/laptop/tablet market. Therefore, Microsoft and Google clients don't have the benefit of being able to seamless move from the phone, to the tablet, to the desktop, to the laptop. Even when you flip on the TV, AppleTV has advantages with access to iTunes on your computer, your photos instantly appearing in the Photos app, you Podcasts showing up, etc. As MKBHD mentions, "everything you could ever want" is inside the garden. That sounds pretty good, actually, However, he also says "these walls around the garden are really tall and they don't want you exploring outside those walls". Personally, I think this statement is a bit crazy. First off, yes Apple makes it very comfortable in their garden. In fact, it is like living on a continent with everything you need. If you want Disney World, it is in there. If you want, a trip to the Safari, it is in there. That being said, they don't let all of their goodies outside of the wall. In other words, if you want to ride the biggest roller coaster in the world, it isn't available outside those walls, if you want the best beaches in the world, it isn't available outside those walls, etc. That being said, MKBHD makes the point that they don't want you looking outside those walls. Is that really true? Does Apple stop Google from putting Chrome, Google Play, Google Assistant, YouTube, GMAil, etc inside their walls? If I can see how great Google does these things, aren't I more susceptible to being moved to other Google devices? Microsoft has their incredible office suite on MacOS and iOS. Isn't that letting me peak outside the walls when Apple has their own suite of apps? Heck, they allow Adobe Premier and even Windows to run on Macs. As I said, they have an open gate where pretty much anyone can come in, but they don't let all of their goodies out. He also talks about how Apple devices work so well together that they become "hooks" into buying more Apple products. He shows how well the iPhone works with the Mac, then talks about how that hooks you into buying AirPods, Apple Watch, and HomePod. Of course, Apple wants you to buy their products, so they work to make the experience so great that you want to buy more. This is what they call "smart business". In fact, you could say it is one of the best business models if you care about market cap, revenues, and profits. Also, he mentions how, if you want to leave Apple's Ecosystem, your AirPods aren't as useful. Of course, Apple makes hardware that works well together. If you leave, you lose that benefit. You aren't stuck with anything, though. If I wanted to get out of Apple products, I would just sell the stuff on eBay, Amazon, Gazelle, etc. There are many ways to get rid of tech you no longer want. As an example, I wanted to upgrade my old speakers. However, if I bought new speakers, my old speakers would be rendered obsolete in my home. Does that mean I am stuck with those old speakers until I die? No, it means that I could sell them and use that money toward new stuff. In the case of Apple, that old stuff typically holds its value better than the competition, so you won't take as big of a hit selling an iPad as an Android tablet. Of course, you could get rid of the iPhone and still use your iPad or iPod Touch to control your HomePod and use your AirPods, so if you were someone that bought into the entire ecosystem, chances are you could still use a lot of stuff if you just got rid of an iPhone. The Mac and iPad don't require you to use an iPhone. He also discusses moving from Apple Music to Spotify because it is "clearly better". Obviously, this is bias because it isn't backed up by facts. JD Power actually did a study in Sept 2016 and Apple Music came in first and Rhapsody came in second for Consumer Satisfaction. Also, moving your entire library over isn't even possible because Spotify doesn't match your music. So much for being "clearly better". Once again, he talks about the hooks into the iPhone. If you buy an Apple Watch, you are aware that you need an iPhone to use it. It is like saying the new tires on your car are a hook into keeping the car for a while. Yes, when people buy an accessory for a specific product, they do that will full knowledge that it is an accessory. If I (hypothetically) decide to move from Rolex to Apple Watch, chances are, I won't be keeping around that watch winder or my other Rolex bands because they have no use without that type of watch. They aren't really hooks, though. No one is keeping their Rolex because they bought an expensive band. They just sell it all off and start over. Personally, I have written about accessories that I have purchased for my Jeep Wrangler. They can be expensive and they will not transfer to most new vehicles. If I get rid of my Jeep, my only option is to sell the Jeep with the accessories or to take them out and sell them. I can tell you it is easier to sell an Apple Watch than a bumper for a 2017 Jeep Wrangler. You could be missing out? So, his main point is that even if another phone comes out with better features, the hooks into the Apple ecosystem make many still want to stay with Apple. This is actually true for the most part. When it comes to picking which tech I buy, I am not solely basing that decision on specs. Most Mac owners know what I am referring to, but it is how hardware and software work together. Apple is in another league in that area which is why MKBHD uses an iMac and Final Cut Pro X for editing his videos instead of a maxed out PC running Premier. Personally, I think we are getting to a point of "pick your spec". Everyone went crazy because Google Pixel 2 had the best DxOMark phone camera rating when it came to market. DxOMark picks the specs that they value the most and come up with their score in that manner. They talk to companies like Google so that they can make their cameras in such a way that it performs best in their rating system. It doesn't mean that everyone values the way a camera works in the same way as DxOMark's rating system. Some like a camera that is best in low light, some want it to shoot video the best, some are mainly concerned with it shooting RAW rather than all of the processing done in phone, or frames per second. These tests tell you how things do in specific categories, but the rating score is subjective. In other words, these "best DxOMark" or best "DisplayMate" scores are measured within specific criteria and that criteria may be different from person to person. The iPhone X had the highest score ever from DisplayMate, did everyone throw out their Android phones and switch to iOS on that day? No, because even Android owners live in an ecosystem. If they have apps that only work on Android and they need them, they aren't switching to iOS on a whim. It works both ways. I actually fell into a category of "ecosystem" users that stayed with Apple because of Airplay. Back when I had an iPhone 4s, I held onto it a year longer than I would have because of Airplay. I have Airplay built into my receivers, Airport Express units, and speakers around the house. At the time, there weren't any other alternatives, other than spending a fortune for Sonos Connects, so I kept the iPhone 4s for a year longer than I would have because I was waiting on a larger phone from Apple. I looked at Android and I could not find any way around this issue and rumors were already out that Apple was coming out with the Plus model phones. However, was this a bad thing? I value having music, in a high quality, in multiple places in my home and only Apple affordably fed that market at the time. When it comes down to it, we all have our choices to make. I am not trapped by Apple products. I have sold much harder things to get rid of on eBay (5 tires for a Jeep, for example) and I am not trapped by the fact that I own a HomePod. I could sell it tomorrow without much of a problem. Outside of getting rid of actual products, I already own Windows computers (including Windows running on Macs), so I could move to Microsoft without much issue. I see the ecosystem as a huge reason I stay with Apple and find it to be the thing that separates them from being solely concerned with specs that really don't add as much satisfaction as features like Airdrop, Airplay, Continuity, Messages, etc. In short, no one is really trapped by Apple's ecosystem. Most say it is one of the main reasons they stay with Apple, but it is because it provides a better, unique experience across multiple devices than any competitor can offer. It is like saying Tesla plans to lock their clients in because no one else has a battery powered car than can go to 60mph in 1.9 seconds. These are unique features, but they aren't locking anyone in. To wrap up....I agree that Apple's ecosystem of devices keeps people buying Apple products and services. I believe it is because people make the choice to take advantage of the ecosystem because the ecosystem makes their lives easier in many different ways. No one is "walled in", though. People always have choice and many are choosing to buy Apple products. It is never "too late" to change things up when you can sell the HomePod, Apple Watch or any Apple product tomorrow. The fact that people don't want to lose Apple's unique features is more about choosing to live in the garden rather than being trapped in the garden. I have been asked about Apple's privacy versus their competition. Since Apple doesn't tout privacy in their ads, and I have referred to it in the past, I decided to post excerpts from a few articles on the subject (there is link to the longer article in the title of each section). I am not personally endorsing any of these specific articles, so if you have an issue with what they say, I suggest contacting them through the link to the article. "First and foremost, there’s the issue of these companies’ business models. The goal of each outfit is to make the most money it can for its shareholders, naturally, and in that sense Apple — pricing its products at a premium — is the most visible example of the maxim. But $1,000 iPhones and pricey accessories aside, at least the company is only buttering its bread on one side. Google, by contrast, not only sells phones and other devices, but also makes money off the ads (and the user data) that appear on those handsets, laptops and tablets. Amazon’s gadget-oriented business model wants to sell you things (like Amazon Echos) that will help sell you more things (through voice ordering) — a dizzying value proposition. And then there’s Facebook, which doesn’t appear to be selling its users much of anything at this point. But look more closely and you discover Facebook’s users (and their kids’ bath time photos) are themselves the products unwittingly feeding the social network’s revenue model." "This is therefore one area where Apple trumps the competition thanks to the firm’s commitment to user privacy. Apple has been a frequent proponent for privacy, having famously denied the FBI the backdoor it wanted for the iPhone used by one of the San Bernardino shooters in 2016. This means that not only will Apple only record people after they have requested the virtual assistant, unlike Google and Amazon, it will also not gather information on users for the purpose of advertising and marketing." Apple, by virtue of its business model, has no interest in storing my personal data any longer than it absolutely has to, and no interest in monetizing my behavior.So not only does it keep Siri offline until it hits the trigger phrase, once it goes online it generates an anonymous token ID and transmits all data with end-to-end encryption. That way, never have to worry about entire meeting transcripts being stored in logs, employees violating my privacy and snooping on me, or my past data being exposed over due to some future bug, partnership, or request. That's not to say I don't want Apple using my data to provide me with better direct services. I just want my data to be used for my benefit, not for the company's bottom line. Not unless I start getting a share of the money they make off of it. (Which is way more valuable than any 'free" app or service offered as compensation to date.)" "Siri might hear you loud and clear on the new HomePod smart speaker, but Apple won't. Apple introduced the Siri-powered device Monday at the Worldwide Developers Conference, making it clear from the get-go that voice commands will be anonymized and encrypted. Voice assistants have already taken over homes with the Amazon Echo, Google Home and Microsoft's Cortana speakers. They've all raised privacy issues of their own, but Apple adds some scale to the concerns. As the largest tech company in the world, Apple is often in the crosshairs of hackers and governments. For example, the number of security orders from US law enforcement to Apple doubled to about 6,000 during the second half of 2016, compared with the first six months of the year, the company disclosed in late May. The HomePod won't always be listening to its users. Like Amazon and Google's voice assistant, a person activates it with a wake word or phrase. With the HomePod, it'll be "Hey Siri." "Our team cares deeply about your privacy," Apple Senior Vice President of Marketing Phil Schiller said at Monday's keynote. "It has that magic phrase, 'Hey Siri.' Until you say it, nothing's being sent to Apple." When the data does get sent, anonymization and encryption means your voice commands aren't tied to your Apple ID, and even the company isn't able to clearly view it. So far, data stored on Amazon's servers is not anonymized. Google Home's assistant is able to access a user's search and location history and stores data on voice commands until it's been deleted. The FBI declined to disclose how often it requests voice data from Amazon's Echo, but the retail giant has shown that it can retrieve Alexa recordings from specific users in a criminal investigation. The encryption for HomePod conversations sticks with Apple's push for user privacy from the government, a mindset that also helped the company fight off the FBI's demands to unlock the San Bernardino terrorist's iPhone in 2016." "Apple is stepping up its artificial intelligence efforts in a bid to keep pace with rivals who have been driving full-throttle down a machine learning-powered AI superhighway, thanks to their liberal attitude to mining user data. Not so Apple, which pitches itself as the lone defender of user privacy in a sea of data-hungry companies. While other data vampires slurp up location information, keyboard behavior and search queries, Apple has turned up its nose at users’ information. The company consistently rolls out hardware solutions that make it more difficult for Apple (and hackers, governments and identity thieves) to access your data and has traditionally limited data analysis so it all occurs on the device instead of on Apple’s servers." Out of the box, I really liked the packaging. The Stormtrooper and gun (which can be put in his hand or not used at all) are fitted into the package rather than strapped into the package. This means that you just open up the box and pop the Stormtrooper and gun out. Once you have it out, they suggest that you charge it. The charger is in a small pull out box below the Stormtrooper. I charged it up and installed the iOS app on my iPhone. The setup requires you to connect your mobile device to a network setup by the Stormtrooper and he says the password you need to use (make sure you write this down). I would much rather have a Bluetooth setup for ease of use anywhere, but I got it connected and then connected it to my wifi system via the app. I also updated the firmware. It can take a while before you can actually start enjoying the Stormtrooper, but I didn’t find this to be unusual. I have other battery operated devices that take just as long to get up and running. After theStormtrooper was setup, he runs through some head and body movements to calibrate. He has motors in the neck, arms, legs and sensors in his feet. He also has a video camera in his helmet and an array of microphones. The design of the Stormtrooper is first rate, for the most part. His arm and head movements are what you would expect, though his head can move up and down and side to side, so it has a lot of flexibility. However, he is extremely slow especially when compared to the Droid robots made by Sphero. I have the R2D2 (I will review him eventually) and it can run circles around the Stormtrooper. The Stormtrooper just slowly shuffles along and he also makes a bit of noise when doing so. The app gives you the option to scan your face into his memory as a “Commander”, “Captain”, “Lieutenant”, or “Resident Scum”. You can also go into the “Settings” and turn off or on sound effects and music. Currently it has a few different “Take Command” features. “Training”, Mission” and “Sentry”. The “Training” area lets you set up “Actions” in different categories like “Action”, “Recon”, “Security”, etc. You can name actions anything you like, but there are numerous actions you can choose from. The options typically have the robot say something like “I’ll secure the area” or other patrol oriented verbalizations. The list of movements range from him surveying the area by moving around his head or a combination of head and arm movements. Once you select what you want him to say and how you want him to move, you just name the action and save it. Now that you have an action setup, you go back into the main “Training” section and choose “Practice”. This allows you to see him perform the actions that you set up. You can also control his head movements and make him walk in different directions with some on screen controls. If you turn on “streaming” it will show you video on the screen of what he sees. I like this area a lot. It allows you to make him talk, move around, view the area he is surveying, etc. You can also go into “Manage Actions” which allows you to delete, change the name, or assign the action to a different category. On the main screen, you can also select “Mission”. This will pop up choices of “Easy”, “Normal”, and “Hard”. This is a little game with a grid that you move around in a virtual world that is split with the area you are in. It is a bit weird but I guess is so you can see where he is in your space and the virtual world space. In this world you navigate him to positions on the screen where he will observe and interact with a virtual object. While I wasn’t really blown away by the game play, I do see that they have a lot of potential to make game play better given all of the high tech features built into the Stormtrooper. On the main screen, the final option is “Sentry”. This allows you to start or create a patrol. He will survey and march along the area you designate and when he senses motion he will ask for a password. If you say the correct password he will clear you, if not, he will tell you to move along in no uncertain terms. I personally own the excellent Sphero R2D2 robot which is a lot cheaper than the Stormtrooper. I find the R2D2 to be more fun to operate because he moves around so much faster. However, the Stormtrooper is a much more sophisticate robot with a camera, microphones, and sensors. It has robotics built into his arms and legs and neck. Therefore, UBTECH has a lot of room to improve the experience if they choose to update the app. I really hope they do because the Stormtrooper looks fantastic and has a lot of potential that is somewhat letdown by some areas of the app. Of course, the Stormtrooper will always move around slower than R2D2, but the virtual gameplay could be a lot better. All in all, I like the Stormtrooper, but I think it could be even better with some app updates. So, everyone with an iPhone, iPad, Android based phone needs a portable battery charger. While they may have one already, they probably don't have one like this one. While there are sleeker portable chargers, most of them don't deserve to be left out on display. That is what makes this charger so cool. You can leave it out where you will always know where it is, while still waving your Cowboy fan flag! Of course, this is only 3600mAh charger while you can get slightly less expensive, thinner Belkin 5000mAh (see below) that will take up less space in a bag. However, I like having both since this one can be at the ready when I am tracking down my other chargers.
2019-04-24T06:05:37
https://www.uofmtiger.com/blog/previous/2
0.999897
In this video I'm gonna show essential programming language for Ethical Hacker Since programming is essential for hacking because a hacker is someone who breaks a protocol or an application security which is programmed in a certain programming language and to hack an application a hacker needs to understand the logic of that app, find flaw and the exploit it. So a hacker must learn a couple of programming languages to complete his task. So check out the important programming languages for hackers There are lots of computer languages but few are required for hacking purpose because in most cases it depends upon a target. There are basically three sections ― Web Hacking and Pentesting, Exploit Writing & Reverse Engineering and each of it requires different coding. Do you think any other programming language is essential for wannabe hackers and security researchers? if yes then please comment below. ► Connect with me! ◄ Facebook - http://bit.ly/2tbOg3b Google+ - http://bit.ly/2jrWz6g Instagram - http://bit.ly/2tbR14z ★★★Watch my most recent videos★★★ How to use keylogger and steal passwords 100% working 2016 tricks [Easy Tutorial] https://youtu.be/bRxjiX88rLo How to Convert Text to Audio without Software Notepad Trick [EASY TUTORIAL] https://youtu.be/GRvCCwTHY7A How to lock and unlock your PC with use pen drive [Easy Tutorial] https://youtu.be/O897Kj_LIog How to FIX MSVCR71 DLL File Missing Error [EASY TUTORIAL] https://youtu.be/IsFUm3qX19c Best Prank Websites To Fool Your Friends And Make Fun [Easy Tutorial] https://youtu.be/UlJP7GtLJNw How to Make USB Hacking Device [EASY TUTORIAL] https://youtu.be/ha9kIC0FW5I How to make simple keylogger using notepad [EASY TUTORIAL] https://youtu.be/cHNUvCOYXXU How to setup a Gmail auto response/vacation responds [Easy Tutorial] https://youtu.be/bbk-meSVX6M Best blue death screen prank [Easy Tutorial] https://youtu.be/gxiXULj_vBc How to Tag All Facebook Friends Using One Click 2016 [Easy Tutorial] https://youtu.be/EkxuJVhQ5j0 How to password protect any folder without using software [Easy Tutorial] https://youtu.be/5V6WRsv_Wo4 How To Accept All Friend Requests At Once 2016 [Easy Tutorial] https://youtu.be/tlw7e2jMhVE How to invite your all friends at once to your Facebook Page 2016 Working tricks [EASY TUTORIAL] https://youtu.be/468Fmc2QdAw How To Hide Your Any Size Files Inside Any Image [EASY TUTORIAL] https://youtu.be/RB6eXEYAd8s Hide Or Unhide Any Local Disk Drive In Windows Using CMD [EASY TUTORIAL] https://youtu.be/-kSr_3UmS8w How to Wipe All Partitions on USB Flash Drive on Windows [EASY TUTORIAL] https://youtu.be/nkH0DyeAuNA How to take a screenshot on a PC with two simple methods [EASY TUTORIAL] https://youtu.be/so4dxm23TkA And talking about subscribing, please subscribe to my channel, if you enjoyed this video and want more how-to, Thanks so much for watching! Ravi Suhag is self-taught coder and hacker & is considered one of India's top hackers with multiple awards and accolades up his sleeve. Ravi Suhag is one of us, yet so different. Ravi was born and brought up in a village in Haryana and studied in a Hindi medium school, in a classroom under a tree. Ravi was always curious, though he had no access to formal education in electronics; he was always the one who would break little electronic things, trying to figure out how they operated. Ravi created his first circuit in class 7 and soon a small inverter, all from scrap. He studied to get into IIT, failed, cried, even fainted; but he did not lose hope. He had a dream to create his own venture, so he cut down his expenses, lived in a 5X8 feet room, taught physics to kids, sold health insurances, gave workshops in colleges and eventually created his company during his years at engineering college. Ravi credits his mentor for seeing the potential in him and motivating him to work and build things. He learnt front end, back end and other technical aspects of creating a website, all in just a month. Till date, Ravi has participated in 13 hackathons and won 11 of them. While people believe in doing one thing at a time, he believes in “being all you can be.” Ravi is an entrepreneur, designer, web developer, computer architect and poet, with an ardent desire to explore his passion completely and be much more. Josh Talks collects and curates the most inspiring stories of India and provides a platform to showcase them. Speakers from diverse backgrounds are invited to share their stories, highlighting the challenges they overcame, on their journey to success and realizing their true calling. Watch more awesome videos from JoshTalks at: www.joshtalks.com We release new talks every week, SUBSCRIBE to our channel and press the bell icon to never miss an update from us. Hackers thrive on human error, but a new method of coding is ending that. Recent developments by the HACMS (High-Assurance Cyber Military Systems) program at DARPA has allowed computer scientists to use mathematical proofs to verify that code—up to 100,000 lines of it at a time—is functionally correct and free of bugs. Kathleen Fisher, professor of computer science and former program manager at DARPA, explains how this allows coders to build a thin base of hyper-secure code that is verified to be functionally correct, "and then you can have lots of software running on top of it that doesn’t have that same level of assurance associated with it but that you can prove: it doesn’t matter what it does, it’s not going to affect the operation of the overall system." To illustrate this technology in the real world, Fisher tells the story of how this new method of coding defended a Boeing Little Bird helicopter from a "red team" of hackers charged with causing havoc in the system and bringing that baby down. So is there anything hackers can't hack? Now there is, thanks to the beauty (and rigor) of formal mathematics. Read more at BigThink.com: http://bigthink.com/videos/kathleen-fisher-how-coders-are-creating-software-thats-impossible-to-hack Follow Big Think here: YouTube: http://goo.gl/CPTsV5 Facebook: https://www.facebook.com/BigThinkdotcom Twitter: https://twitter.com/bigthink Transcript: HACMS is a program at DARPA that ran for four-and-a-half years that was focused on using techniques from what is called the 'formal methods community', so techniques based on math more or less, to produce software for vehicles that came with proofs that the software had certain desirable properties; that parts of it were functionally correct, that there were no certain kinds of bugs in the software. And the consequence of those proofs is that the system is much harder to hack into. So the formal methods community has been promising for, like, 50 years that they could produce software that proveably didn’t have certain kind of vulnerabilities. And for more or less 50 years they have failed to deliver on that promise. Yes, they could produce proofs of correctness for code but for ten lines of code or 100 lines of code—not enough code to make a difference for any kind of practical purpose. But recently there have been advances in a bunch of different research areas that have changed that equation, and so now formal methods researchers can prove important properties about code bases that are 10,000 or 100,000 lines of code. And that’s still small potatoes compared to the size of Microsoft Windows or the size of Linux which are millions, hundreds of millions of lines of code. But when you start to get to 10,000 or 100,000 lines of code there are really interesting software artifacts that fit in that size. Things like compilers and microkernels, and you can leverage those kinds of exquisite artifacts to build much more complex software systems where only a small part of the system has to be verified to be functionally correct, and then you can have lots of software running on top of it that doesn’t have that same level of assurance associated with it but that you can prove: it doesn’t matter what it does, it’s not going to affect the operation of the overall system. So, for example, HACMS researchers used the high-assurance code and put it on a Boeing Unmanned Little Bird which is a helicopter that can fly completely autonomously or it can fly with two pilots. And this helicopter has two computers on it: one is the mission control computer that controls things like 'fly over there and take a picture' or 'fly over there and take a picture', and communicate to the ground station or the operator who’s telling the helicopter what to do. It also has a flight control computer that controls things like altitude hold and stability, sort of the mechanics of flying the helicopter at any given time period. So the researchers put seL4 microkernel, which is a verified microkernel guaranteed to be functionally correct, on the mission control computer, and they used it to create different software partitions. So one of those partitions was responsible for communicating with the ground station. Another one of those partitions was responsible for operating the camera that the helicopter had. The researchers verified that the code in the 'communicate with the ground station' was functionally correct and isolated from the software in the 'control the camera' part. So the camera part was all the legacy software that had previously been on the helicopter to control camera operation. HACKER VS PROGRAMMER | Who is best ? | Who Has More Knowledge ? If you enjoyed my FIRST Top 5, be sure to subscribe and share the video. Have any request? Send me what you want featured on the channel! Want to create channel art/logo? Be sure to message me! I upload just about every week depending on the time I have. Comment down any suggestions for the channel, anything helps. Content on this channel will vary, I usually upload what ever interest me. Thanks!, for watching Top 5 Best Hacking Movies.
2019-04-22T06:34:08
https://upge.wn.com/?activate=0&from=worldhackersandcoders.com&ads=1&title=World+hackers+and+coders&auto=World+hackers+and+coders&author=system&template=cheetah-photo-search%2Findex.txt&query=World+hackers+and+coders&pagenum=5
0.999999
Given that Graves at Sea only have a demo, single and split it's surprising to see that they have over 6,000 'likes' on Facebook, making them one of the more popular bands that have a very minimal amount of releases. It's probably helped that the group have toured extensively over their decade-long career, having formed in 2002. A series of line-up changes has plagued the band since they began, and even now members are scattered throughout the United States but they still are able to come together to make a record. The latest release being the EP This Place is Poison. The short, two-track EP starts out promisingly enough with a heavily distorted guitar that's breaching maximum fuzz. The riffs accompanying the guitar are a mellow, crushing groove/doom hybrids made up by the deepest power chords available. There is also a solo present later into the song, however it goes largely unnoticed as it's layered below the other instruments. The drum track follows along in the background with the same snare-percussion-snare beat for almost the entire duration of the song, with a few seconds of exception. The vocals are high pitched rasps that verge on the border of black metal influence, and are heard very clearly belting out the lyric "You can check out anytime, but you can never leave", an obvious tip of the hat to "Hotel California" by The Eagles; this isn't surprising, as there's a clearly prevalent classic rock influence doused over the content. The second track is made up of two Black Sabbath covers, both of which are performed surprisingly well. For those unaware, "Orchid" is an instrumental song devoted to marching drum beats, tambourines, acoustic finger picking and the occasional audio snippet; the song itself has a gloomy Native American vibe to it, and Graves at Sea have managed to carry that feeling over well. "Lord of this World" has been made all the more heavy by the band's signature guitar tuning and fuzz-to-the-max distortion level, making the song even darker than the original. This time around, the main vocals are a little deeper but still raspy and rough; this element needs some slight improvement, as the vocalist comes across as though he's struggling to maintain the growls. The second set of vocals that appeared in the first track also make their appearance, teaming up in a duo with the deeper set. The bass also makes an audible appearance later into the track with deadly, thunderous thumping. While the audience only gets one glimpse at the creative potential possessed by Graves at Sea in This Place is Poison, the band's rendition of two classic Black Sabbath songs carries over fairly well and shows that they are able to improve the wheel, so to speak. In fact, the cover songs are more welcomed than the title track in many regards, especially due to the cringe-worthy chorus line that's ripped straight from "Hotel California. Despite that, this short little doom EP is worth banging your head to for a couple of listens.
2019-04-20T22:32:36
http://www.volumesofsin.net/2014/06/review-graves-at-sea-this-place-is.html
0.997636
Bodoland Territorial Council (BTC) administration announced ₹2 lakhs financial assistance to the Boxer Angkushita Boro,finalist in AIBA youth World Boxing championship in Guwahati. Doneswar Goyary, BTC executive member for sports and youth welfare department extending his best greeting to Angkushita Boro said that BTC administration is giving financial assistance to Boro for her execellent performing in the boxing event. <h2>BTC announces ₹2 lakhs for Angkushita</h2><br /><p>Bodoland Territorial Council (BTC) administration announced ₹2 lakhs financial assistance to the Boxer Angkushita Boro,finalist in AIBA youth World Boxing championship in Guwahati.</p> <p> <p>Doneswar Goyary, BTC executive member for sports and youth <a href="/taxonomy/term/2003">welfare</a> department extending his best greeting to Angkushita Boro said that BTC administration is giving financial assistance to Boro for her execellent performing in the boxing event.</p> <p> <p>&nbsp;</p> <p> <p>&nbsp;</p> <br />This post <a href="https://www.assamtimes.org/node/20350">BTC announces ₹2 lakhs for Angkushita</a> was originally published on <a href="https://www.assamtimes.org/">Assam Times</a>.
2019-04-18T18:42:46
https://www.assamtimes.org/node/20350
0.998292
If reviews are any indication, the "Hunger Games" film franchise need not fear the sophomore slump. Building on the success of the 2012 film, the sequel "The Hunger Games: Catching Fire" is earning excellent reviews. Many critics are praising director Francis Lawrence, who took over the series from Gary Ross, and star Jennifer Lawrence (no relation), reprising her role as the heroine and reluctant revolutionary Katniss Everdeen. The Times' Kenneth Turan calls "Catching Fire" "an effective piece of melodramatic popular entertainment that savvily builds on the foundation established by the first "Hunger Games" movie." With regard to Francis Lawrence, Turan writes, "the expansion in size and scope this project's larger budget allows proves well within his power." That said, the film is anchored by its star: "Lawrence's intertwined strength and vulnerability as Katniss were the sine qua non of the first film, and she is the sequel's biggest asset as well. Now an Oscar winner for 'Silver Linings Playbook,' Lawrence has clearly taken this role very much to heart, throwing herself into it to such an extent that she creates genuine emotion from what is essentially pulpy material." The New York Times' Manohla Dargis says the film is "largely satisfying as far as screen adventures go, and comes fully loaded with special effects and action scenes, and embellished with the usual brand-name character actors." Dargis also agrees that Jennifer Lawrence's Katniss is the film's greatest asset: "A thrillingly atypical heroine, Katniss is the heart, soul and bloodied embodiment of the series and the primary reason that both the book and screen versions soar above the usual adventure-fiction slag heap." Joe Morgenstern of the Wall Street Journal deems "Catching Fire" "exceptional entertainment, a spectacle with a good mind and a pounding heart. Francis Lawrence directed, expertly, from a sharp, lucid screenplay by Simon Beaufoy and Michael deBruyn. The cinematography, by Jo Willems, is especially spectacular in IMAX." Once again, it all comes back to Jennifer Lawrence: "none of it would work — not the action, the adventure, the political subtext or the humor — without the strength and beauty that Ms. Lawrence brings to the central role. … It's hard to believe how far this young star has come in the three years since her breakout role in 'Winter's Bone,' but she's an archer in her own right. Everything she does flies straight and true. The Boston Globe's Ty Burr calls "Catching Fire" "a muscular, engrossing, unexpectedly bleak epic of oppression and insurrection, directed with dramatic urgency and a skilled eye." (It's also better than the book, he says.) "Everything about the sequel feels bigger, more charged with import, and seen with greater resolve." Burr adds that "the core cast performs ably," and as for Jennifer Lawrence, "any blockbuster series would be lucky to have her." Ann Hornaday of the Washington Post says that "fans of 'The Hunger Games' should find 'Catching Fire' a superlative advancement of the franchise. Director Francis Lawrence … smoothly steers the characters through their latest course of depredations and abuse, allowing plenty of moments to simply sit back and groove on the eye candy." At nearly two and a half hours, though, the film "may well strike non-'Games' players as insufferably sluggish." As for the film's heroine, Hornaday says, "the engine of the entire operation is Jennifer Lawrence, who in Katniss has found a character that chimes perfectly with her own persona as an earthy, blunt-speaking ingenue suddenly thrust into a world of celebrity and media-fueled idol worship." And the San Francisco Chronicle's Mick LaSalle writes that the film "doesn't settle for halfhearted gestures." He continues: "Jennifer Lawrence does not act like someone in an action movie but like someone in a life-and-death drama that happens to have lots of running and jumping. Director Francis Lawrence makes sure that not a single performance is tossed off. Every effort is made to portray this awful future world as something real and to have the actors react with the right sense of terror and entrapment." Those elements "take the movie far," LaSalle says, but the problem is that the film "is based on the middle book in a trilogy, and that means that it doesn't really end. Instead it stops just as it's getting interesting."
2019-04-19T05:13:19
https://www.latimes.com/entertainment/movies/moviesnow/la-et-mn-the-hunger-games-catching-fire-movie-reviews-20131122-story.html
0.993911
To combine two different paths into one path, you need to join the endnode of one path to the endnode of the other path. To join two endnodes, overlap the two endnodes on top of each other, then combine the paths, then join the endnodes. These steps assume that you have already drawn two line segments e.g. using the Bezier Curves and straight lines tool. 1. Use the Edit path nodes tool to overlap the endnode of one path on top of the endnode of the other path. The more accurately they overlap the more successful the node joining will be. You may need to zoom in to get greater accuracy. 2. Use the Select objects tool to draw a box around both segments. 3. In the main menu select Path | Combine. 4. With the combined segments still selected, click on the Edit path nodes tool to display all nodes in both segments. 5. With the Edit path nodes tool still selected, draw a box around the nodes that you want to join. (The box outline may not appear, but the endnodes have been selected). 6. Click on the Join selected endnodes button in the toolbar.
2019-04-24T16:43:21
http://bucarotechelp.com/design/graphics/92041101.asp
0.999905
As the nation expanded westward, the dispute over slavery intensified. Citizens of Southern slave states clashed with Northern activists who were morally opposed to slavery. Would the new territories extend slavery, or prohibit it? Former president Thomas Jefferson, in his late 70s at the time of the Missouri Compromise, once described the difficult situation slavery presented. "We have the wolf by the ears," he declared, "and we can neither hold him, nor safely let him go. Justice is in one scale, and self-preservation in the other." When Missouri sought statehood in 1819, the question of whether it would be admitted to the Union as a slave or free state set off a fierce sectional debate between Northern and Southern legislators. Missouri's ratification would inevitably upset the tenuous balance between slave and free states in the U.S. Senate. To quell the controversy, statesman and orator Henry Clay worked out a compromise of three parts: Maine would separate from Massachusetts and be admitted as a free state; Missouri would enter the Union as a slave state; and the remaining territory of the Louisiana Purchase, which lay north of the 36-30 parallel, would be closed off to slavery. The extension of slavery was again an issue when California, heavily populated by settlers during the Gold Rush of 1849, applied for entrance to the Union as a free state. Pro- and anti-slavery factions also squabbled over the land recently acquired from the Mexican Cession, which included what is now Arizona, New Mexico, Utah, Nevada, and parts of Colorado and Wyoming. Supported by Senators Stephen A. Douglas of Illinois and Daniel Webster of Massachusetts, Henry Clay again suggested a compromise. California would enter the Union as a free state while the remainder of the land acquired from Mexico, divided into the territories of New Mexico and Utah, would determine slavery status by "popular sovereignty," allowing the inhabitants to decide for themselves. In addition, the compromise outlawed the slave trade (not slavery) in the District of Columbia while it enacted a stricter fugitive slave law to facilitate the retrieval of slaves who had run away to the North. The compromise, while not wholly satisfactory to either the North or the South, temporarily preserved the Union. Eager to see Western territories settled, Stephen A. Douglas, Senator from Illinois and Chairman of the Senate Committee on Territories, pushed the Kansas-Nebraska Act through Congress in 1854. Because most of the Western territories lay north of the dividing line legislated by the Missouri Compromise, they were already off limits to slavery. Southern representatives acted to preserve their predominance in the Senate by stalemating applications that would grant the territories statehood. Circumventing this problem, the Kansas-Nebraska Act essentially overrode the Missouri Compromise and allowed slavery to spread into the territory only by "popular sovereignty." The result was a frenzied scramble of pro- and anti-slavery settlers into the area, and violent confrontations between the two groups. Angelene Forester remembers Walter Freeman's first patient — her mother Ellen Ionesco.
2019-04-26T13:16:55
https://www.pbs.org/wgbh/americanexperience/features/lincolns-political-landscape/
0.999787
The introductory paragraph of any paper, long or short, should start with a sentence that piques the interest of your readers. In a wellconstructed first paragraph, that first sentence will lead into three or four sentences that provide details about the subject or your process you will address in the body of your essay. How can the answer be improved? Your entire essay will be a response to this question, and your introduction is the first step toward that end. Your direct answer to the assigned question will be your thesis, and your thesis will likely be included in your introduction, so it is a good idea to use the question as a jumping off point. A killer opening line and catchy introduction are exactly what you want for your essay. You want to write an essay introduction that says, READ ME! To learn how to write an essay introduction in 3 easy steps, keep reading! An introduction is the most important part of an essay as it sets the standard and lets the reader know what you have in store for them. Writing a catchy or surprising introduction is a must for a good essay and should leave your audience wanting more. Because the introduction is the first portion of your essay that the reader encounters, the stakes are fairly high for your introduction to be successful. A good introduction presents a broad overview of your topic and your thesis, and should convince the reader that it is worth their time to actually read the rest of your essay. The introduction of the essay. The function of the Introduction is to serve as a 'map' of the essay, outlining to your reader the main argument and points which you develop in your essay. Most introductions begin with an orientation in the form of a brief general statement that leads the reader into the topic showing how the specific topic relates to Every essay or assignment you write must begin with an introduction. It might be helpful to think of the introduction as an inverted pyramid. In such a pyramid, you begin by presenting a broad introduction to the topic and end by making a more focused point about that topic in your thesis statement.
2019-04-18T16:47:55
http://feclsa.com/q4cy2k3c6.html
0.998922
I think we need to sort of recollect the context. use drugs violated in multi various ways from forced in and coerced sterilization. around family planning choices and pregnancy. something wrong with their child if they're using drugs. of heroin on menstrual cycles, for example, and they are significance. their pregnancy because they didn't know they were pregnant. And of course this happens not infrequently among women who use heroin. On motherhood, child custody issues in so many countries. Their registration systems and other mechanisms that track women who use drugs. custody simply because of their drug use. causal relationship between drug use and quality of parenting. Criminalization exposes women who use drugs to additional violence. in so-called rehabilitation centers, from staff, in those centers. the context of intimate partners. police assistance in the cases of domestic violence. perhaps the male partner accusing the woman of being a drug user. drugs, so that's another example. of the environment created by prohibition and criminalization. are suspended when it comes to people who use drugs. And with women there are variations on the theme. Another I think example might be project prevention. which is in my mind akin to eugenics, it's horrific. We see women having their children taken away. I think this is such a significant issue. It plays out differently in different countries. I mentioned drug use in registration systems. difficult to break out of the structure. it's a mystery how and when you might get off the list. take it in their own hands to remove the child from the mother. And again, I need to stress this is in cases where drug use is the only issue. There is no evidence of neglect or bad parenting. Children are taken away simply because the parent or parents are using a substance. incarceration of women that we're seeing in many countries. including women that have also functioned as drug couriers in some countries. something which obviously isn't always the case. important international document that countries committed themselves to. And of course the declaration of human rights is one of those documents. we actually wouldn't have the problem that we have today. are a lot less important in hierarchy of those documents. in fact is the human rights document. in the uncomfortable corner is really important. So what are those examples? sort of my heart is what happens to women when you think about drugs. in her best interests not to admit that to her physician. risks having her baby being taken away immediately after delivery. and actually reports her to the police. where the intentions in principle of the local legislation are probably not mean. children have the best possible start of their lives. what is dramatically undermined in that process. So for me that's something that I feel very strongly about. Access to harm reduction services. whether harm reduction services or drug treatment services. of that is potentially having their children taken away. with and that's one very dramatic example of violation of human rights of women. how quickly Latin American prisons are filling with women. Again, that's another clear example. they are filling out the prisons, and why? because they are very often single parents that have no support. And who very often get caught in this drug trafficking reality. there is no one that basically stands up for them. that are sort of more important in that economic chain. Women are just let to fend for themselves. human rights violation, it's quite impressive. be thinking more about because the cost overleap incredibly high. have a thoughtful response to this issue. as they're often defined by law enforcement. Are really not helpful if people have no choice. field will confirm that drug treatment will work if people want it. also if they in fact have the sort of social supports to make it viable. who are in very dependent economic relationship with their partners. under those circumstances something that again, may have good intention. oppressing those that are most in need and are most vulnerable.
2019-04-23T19:58:45
https://zh-tw.coursera.org/lecture/drugs/video-9-prohibitionist-drug-policies-violations-of-human-rights-of-women-who-use-eNhNa
0.999999
Here's a quick resume of the current setup I am using. I've been using AD groups to deploy applications from SCCM with query-based collection membership for devices. In short, this means that in AD a computer is added to a group and whenever SCCM runs AD Group discovery and sees a change, the collection which queries that group also updates that group and the application is deployed on the target computer. This was done in order to preserve the historical AD structure and method of deploying applications (previously done with GPOs). This works flawlessly and is relatively quick. Since we do not have a way to remove applications as of now, I am trying to trigger an uninstall deployment whenever a computer is removed from an AD group. I cannot push an uninstall deployment method on a collection that would include all systems except those that are members of the deployment group since this would break systems with the target application installed before SCCM implementation. There is however something that I have tested with a single application which consists of deploying a configuration baseline to all systems that detects if that particular application is installed. I then create a collection that excludes the "Install target software" collection and queries for compliant computers. I then deploy an uninstall application on the resulting collection therefore uninstall the application from the member systems. It seems to work properly for now. I am using configuration baselines because of their ability to run powershell scripts as part of the compliance process. My question is, is it against best practice to have a lot of configuration baselines? I have around 40+ applications that are deployed through SCCM and it would require the same amount of configuration baselines to ensure application are uninstalled in sync with AD group membership. Thanks. I am new to active directory and I am having issues with folder rights. This is my situation - Folder Structure Folder A Subfolder B Subfolder C Share folder "A" with GrpAdmin Read only Change Security for Folder "B" with user Teacher - who is a member of GrpAdmin - to have full Control User Teacher still cannot create files in folder B. Do i need to share folder B with user Teacher? I am having an issue with our client push. When I push the client to our machine it installs fine but it gets a incompatiable version and will not automatically assign the site code. I can manually set the site code as a local admin and it works fine. I am thinking this may be a problem with the way I have the boundaries set up in SCCM. My question is, if I change the boundaries or boundary groups in SCCM will I need to extend AD again? Or does the changes automaitcally get replicated to AD? Thanks! How do I deploy an application to a AD Group/User Collection? Install Active Directory Domain Services Now that we have the VMs created, and the OS installed on both, we need to first install/setup Active Directory (AD). When you log into a new installation of Server 2012, Server Manager will auto launch. From Server Manager, click on Manage, and choose ‘Add Roles and Features’. On the Add Roles and Features Wizard, read the information on the Before You Begin dialog, and then click Next. On the Installation Type screen, select ‘Role-based on feature-based installation’ and then click Next. On the ‘Server Selection’ screen, since we are installed Active Directory on this local system, ensure that it is selected, and click Next. Side note: Windows Server 2012 has a new feature that allows you to remotely install Roles and Features on other systems. On the Server Roles screen, select ‘Active Directory Domain Services’. When you select ‘Active Directory Domain Services’, immediately you will be presented with the following dialog. Click Add Features. On the Features screen, accept what has already been selected by default, and click Next. On the AD DS screen, read the information presented, and click Next. On the Confirmation screen, check the ‘Restart the destination server automatically if required’ checkbox, and then click Install. Note: You are not required to check the ‘restart’ checkbox, however, you’re going to have to restart the system anyways after the installation, so you might as well let the system do it for you. Note: When you check off the ‘Restart the destination server automatically if required’ checkbox, you will immediately be prompted with the following dialog. Click Yes. On the Results screen, click Close. After the system restarts, and Server Manager launches, you will have to promote the server as a domain controller. This is because Active Directory has been installed, but that process does not automatically promote the server. Click on the ‘Promote this server to a domain controller’ link. On the Deployment Configuration screen, select ‘Add a new forest’ since this is the first domain controller in our lab. Then enter a root domain name, and click Next. In my example I am using “SC.LAB” for System Center Lab (since I will be installing all other System Center products in my lab eventually). For the Domain Controller Options, select the appropriate Forest functional level, and Domain functional level. This is more applicable if you already have an existing domain and are adding a new domain controller. But since this is the first domain controller in our new domain, then we’ll use the highest level, that of Windows Server 2012. Also, don’t forget to create the Directory Service Restore Mode password. Then press Next. On the DNS Options screen, you can ignore this warning message and click Next. On the Additional Options screen, click Next. On the Paths screen, normally you would change the location for the database, log files, and SYSVOL, but since we are just in a lab environment, we’ll leave it at the defaults and click Next. On the Review Options scree, review what you have entered/selected, and click Next. The Prerequisites Check screen will check and confirm that everything passes before promoting the system as a domain controller. You will notice in my screenshot, that I have 1 warning because I didn’t set a static IP for the server yet. After installation completes, the system will automatically restart. You will then be presented with the login screen. Something to note here, that because we were originally logged in with a local account, the first time you want to log on using a domain account you will have to type the domain\username; in my example SC\Administrator. When you login, you will then see in the Server Manager, that AD DS is now listed, along with DNS. Now all that you need to do is assign a static IP to your domain controller. To do this, in Server Manager, select Local Server from the panel on the left. From there, click on the Ethernet link labelled ‘IPv4 address assigned by DHCP, IPv6 enabled’. This will cause the Networks Connections explorer to open. From here, right click on the Ethernet network that is displayed. This is in fact the network connection that we configured when we first created the VM. On the Ethernet Properties dialog, select ‘Internet Protocol Version 4 (TCP/IPv4)’ and click the Properties button. Within the Internet Protocol Version 4 (TCP/IPv4) Properties dialog, enter a static IP, gateway, and DNS that is applicable to your network. Once all the items have been entered, click OK. You will also have to click Close on the Ethernet Properties dialog as well. Congratulations, you now have a domain setup in your lab environment. Add Systems to Your Domain Now that you have your domain setup, you need to add your other VM (the one that we will use for DPM) to the domain before being able to install DPM. Log into the system you want to add to the domain. To do this in Server 2012, launch Server Manager, and click on Local Server. Then click on the computer name. This will launch the System Properties dialog. From this dialog, click the Change button. From this dialog, select the Domain option for ‘Member of’, and enter the domain name you want to join and press OK. After pressing OK, you are immediately presented with a Windows Security dialog, in which you need to enter the credentials of an account that has Domain Admin rights. Enter the credentials and click OK. Once the system is successfully joined to the domain, you will receive the following Welcome message. Press OK. After you press OK to the Welcome message, you will receive a second prompt, indicating that you need to restart the system for the changes to take effect. You will be back on the System Properties dialog. Press Close. When you press Close, you will receive yet another prompt about restarting the system. You can choose to Restart Now or Restart Later, but you won’t be able to install DPM without the VM being added to the domain. After the system restarts, you will then be presented with the login screen. Something to note here, that because we were originally logged in with a local account, the first time you want to log on using a domain account you will have to type the domain\username; in my example SC\Administrator. Now we have our Active Directory server setup and ready, and the VM we will be installing DPM on is joined to the domain. I have a problem at work where my new sccm 2012 server discovered way to many users. I had enabled the Active Directory Forest discovery and I thought it was only supposed to discover the forest and possibly add those as boundaries, but now I have 44.000 users from other locations I do not want in the DB. Is there a quick way to clean the DB for these users? The server is not in prod, but don't want to start over for I've already created some tasks and packages. I have since then setup the user discovery from the right ou, but is it safe to just select all -> delete? tried with a few, but its an extremely slow process. I'm going on vacation soon, so if that's what it takes, I can live with it And it's safe to delete users? It's only the users from the sccm db. It will never touch AD? Edit: All the objects that I want to delete has the Agent Name: "SMS_AD_SECURITY_GROUP_DISCOVERY_AGENT" Hi there, Just getting into SCCM 2012 and I have a question about what might be the best way to setup my boundaries. I would like to use our AD sites as it seems to be the least administrative heavy option, however because of our configuration I'm not sure it is possible. The way our AD sites are configured is this - we have all of our major offices with domain controllers created as a site in AD with all of their subnets defined, however we have branch offices that do not have domain controllers in them as they have too few clients located there. Those subnets are defined in the main office AD site instead of having their own site - which from what I have read is the MS best practice. My question is, is there a way to utilize these AD sites as boundaries and somehow override those specific subnets that are for branch offices, or do I have to scrap the AD site plan and do all of these boundaries as ip subnets and manually add the approriate ones to boundary groups? Thanks! Coenie posted a topic in How do I ? I am running MS SCE2010 on a windows server 2008R2. It installed ok, it complained about a few GP's, but I fixed those. Now I have a few problems, in the middle of the night, it insatlls and updates my servers, which I do not want, with my GP, I configured that to never do that, but with SCE2010, I don't know how exactly to configure it to only notify of updates, but to NOT download them or install them on my servers. Also, I'm trying to install the agent on PC's and it continues to fail on one laptop. The agent on all other PCs installed ok except with one laptop. I'm not sure where to go for the logs, as the failure notice is very generic and doesn't do anything good. Does anyone have any recomendations? Good morning, I'm setting up a system based on this guide: http://www.windows-noob.com/forums/index.php?/topic/1782-how-can-i-deploy-applications-based-on-ad-security-group-membership-for-computers-using-a-task-sequence/ Here's what I'd like to do: When I set up a computer association, I'd like SCCM to check what AD groups the old computer is a member of, and add the new computer to the same groups as part of the replace task sequence. That way, the migration would "migrate" the user's software along with user preferences and settings. Is this possible? The only way I've found is to write a powershell script that would copy a computer's AD groups. Would I need to write this script and have the replace task sequence run the script? The script would have to create the computer in AD and move the group settings. Thanks for any thoughts or ideas. I tried to modify the schema following this guide in preparation for SSCM installation. http://www.windows-noob.com/forums/index.php?/topic/489-how-can-i-configure-sccm-2007-sp1-in-windows-server-2008/ I am an Schema Admin but I am running this command on my SSCM server itself not on the DC, does it matter? and I am getting the following errors. Any ideas? <10-24-2011 15:08:28> Modifying Active Directory Schema - with SMS extensions. <10-24-2011 15:08:28> DS Root:CN=Schema,CN=Configuration,DC=mydomain,DC=com <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-Site-Code. <10-24-2011 15:08:29> Defined attribute cn=mS-SMS-Assignment-Site-Code. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-Site-Boundaries. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-Roaming-Boundaries. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-Default-MP. <10-24-2011 15:08:29> Defined attribute cn=mS-SMS-Device-Management-Point. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-MP-Name. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-MP-Address. <10-24-2011 15:08:29> Defined attribute cn=mS-SMS-Health-State. <10-24-2011 15:08:29> Defined attribute cn=mS-SMS-Source-Forest. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-Ranged-IP-Low. <10-24-2011 15:08:29> Defined attribute cn=MS-SMS-Ranged-IP-High. <10-24-2011 15:08:29> Defined attribute cn=mS-SMS-Version. <10-24-2011 15:08:29> Defined attribute cn=mS-SMS-Capabilities. <10-24-2011 15:08:30> Failed to create class cn=MS-SMS-Management-Point. Error code = 8202. <10-24-2011 15:08:30> Failed to create class cn=MS-SMS-Server-Locator-Point. Error code = 8202. <10-24-2011 15:08:30> Failed to create class cn=MS-SMS-Site. Error code = 8202. <10-24-2011 15:08:30> Failed to create class cn=MS-SMS-Roaming-Boundary-Range. Error code = 8202. <10-24-2011 15:08:30> Failed to extend the Active Directory schema, please find details in "C:\ExtADSch.log".
2019-04-26T09:40:48
https://www.windows-noob.com/forums/tags/AD/
0.999005
Is Transcend Premium 300x UHS-I card overrated? I have an Asus Eee PC 4G (or 701) running Full XP SP3 (with IE8 and Office 2003) beautifully from a (now rather old) SanDisk Extreme Full-Size SDHC 30MB/s Class 10 Card, with the pagefile set to the Card, since July 2010. It has just an 8 GB (soldered) SSD inside, which came with Xandros (and which remains there untouched), and came with 1 GiB RAM, which I maxed out (= 2 GiB for that machine). On Xandros the battery lasts somewhat longer, but there's hardly anything that can be done usefully on that. I'm considering upgrading it by replacing its older SanDisk Extreme Full-Size SDHC 30MB/s Class 10 Card by the 45MB/s, which tests I've posted at the beginning of this thread, now that I bought the 95MB/s, about which I posted above. Since they both fully saturate the USB 2.0 interface, those 45MB/s cards (which are already EoS, AFAIK) are a great choice! The second you said, a hard disk will always drain more power that a solid state device. Sorry to disappoint Wonko, but where in my previous reply do you read such statement? I'm asking if running the OS from an SD card, not from an SDD or HDD storage would have a noticeable difference on battery life. On this point I'm not an expert. Doesn't help that some reviewers mention SSD as more power hungry than HDD for laptops: http://hackaday.com/...p-battery-life/ while what I'm interested right now is to try something like dencorso mentions. Looks fun. Isn't a SD card a "solid state device"? Try with a Multimeter (Amperometer) on a USB connected SD card reader + SD card in it, and compare with another on a USB controller+rotational hard disk. HInt: last time I checked most USB 2.0 card readers declared themselves as "low power" devices (200 mA), whilst all USB 2.0 HD controllers declared themselves as "high power" devices (500 mA) and a few hard disks exceed those specs and actually need a "Y USB cable". Thanks for the link on the SD power consumption. It is indeed very low in terms of power consumption, they average less than 1 W for normal read/write operations. So, I'm still in doubt. Which storage would consume less power? Any trustworthy information published where one can read about SD power consumption (comparative analysis per model and so forth)? This is the same 45 MB/s Full-Size SDHC card from my initial posts in this thread, but there it's tested on my Asus A-7V600-X / Athlon XP 3000+ desktop, while here it's tested on an actual Asus Eee PC 900 (not the same I run from an SDHC card, but generally the same hardware). Please notice that the Eee PC Card-Reader is optimized for giving great 4K Random Writes, which means someone at Asus had thought it might conceivably be used for booting (or, perhaps, that also may mean the ICH6-M is really better for booting). The above quote is from post #4, but newly reformatted for easier comparison. Yep, but as you can see the actual power consumption depends on BOTH "peak" and " idle" AND on amount of time these two states are into in a given timeframe. To take your 840 Evo as an example, it's power consumption is clearly given largely by it's "idle" state, with "burst" of "full power" that last very, very little (because the thingy is d@mn fast).
2019-04-20T12:50:05
http://reboot.pro/topic/19861-is-transcend-premium-300x-uhs-i-card-overrated/page-3
0.999996
I apologize if this is a very elementary question, but I'm having trouble finding an answer to it. As we all know, there are many kinds of marriages which one can generally term "halachically disallowed" (incestuous, Jew and non-Jew, mamzer and non-mamzer, kohen and convert, kohen gadol and widow, etc.). I'd like to know which of these are invalid (in the sense of halachic impossibility: any attempt by the people in the relevant categories to get married is just void ab initio and has no legal force) and which are forbidden (in the sense that a marriage can in fact occur, assuming other ordinary conditions are met, but it will be an aveira and those involved will be duty bound to divorce). The distinction is often not really made clear in secondary sources. One example I do know about involves polygyny: excluding Yemenites, after the takana of Rabbeinu Gershom, it's forbidden for a married man to marry, but if he does, it's still a valid marriage and requires a get for its dissolution. But what about, e.g., the marriage of a kohen and a convert? The source is a Mishna (Kidushin 3:12) which states that if Issur Karet is involved (excluding Niddah) then the Marriage is invalid (i.e. they are not married). Any offspring of such a union would be Mamzerim. In all other forbidden cases, the marriage is valid, yet forbidden. Some forbidden marriages cause the offspring to be mamzerim, some to be Chalalim and some to simply be blemished. List of Karet-unions; marriage not possible. יח: וְאִשָּׁה אֶל אֲחֹתָהּ לֹא תִקָּח לִצְרֹר לְגַלּוֹת עֶרְוָתָהּ עָלֶיהָ בְּחַיֶּיהָ: ‏ Sisters, if first wife-sister is still alive. כ: וְאֶל אֵשֶׁת עֲמִיתְךָ לֹא תִתֵּן שְׁכָבְתְּךָ לְזָרַע לְטָמְאָה בָהּ: ‏ Married to another. Just in shorter form: basically, immediate relatives and non-Jews -- no marriage at all. Other prohibitions -- yes marriage, though prohibited. Not the answer you're looking for? Browse other questions tagged halacha marriage . Who is Patur from Marriage?
2019-04-19T22:29:07
https://judaism.stackexchange.com/questions/51149/marriage-invalidity-versus-prohibition
0.998489
Mulesoft's founder Ross Mason on making connections quicker using APIs. Mulesoft started as a specialist software company for investment banks but since then has morphed into one of the leading exponents of those keystones of versatility, APIs. The company is known for its Anypoint platform which can be used to connect apps, data and devices anywhere, on-premises or in the cloud. It has customers including Boeing, Marks & Spencer, Target, Unilever, MasterCard, Audi, ESPN, Coca-Cola, Unicef and News Corp. Mason: "The thing that we have capitalised on is that we have stayed laser-focused on connectivity." The company was founded by Ross Mason, who is also VP of corporate strategy. ZDNet caught up with him to talk about the journey so far. ZDNet: Where did it begin? Before doing this I was in investment banking in London. I did a number of large scale projects in the City, the last of which was an investment banking trading platform. It was the genesis for starting the company and the first time that I had worked in an investment banking environment. I couldn't believe how painful it was. Basically we had to connect up seven systems and it took €30m and took a year and a half and every day I came to work well aware of how difficult it was to get things done. I used to go home in the evenings, very late at night and complain to my girlfriend (now wife) and I think two months into it she got frustrated and said, 'Well, if it's that bad, do something about it'. So then I thought about quitting my job but, I thought, that's not the solution. So that got me thinking and I thought, well the technology is one area where I could have an impact. So I thought, what would my teams need to build the types of software that we are building in the bank. They were connecting to back-end systems and every time they went to connect something they had to re-invent the wheel. Every time. On top of that they needed to know way too much about the underlying environment in order to be successful. I thought I would build a platform for connecting data within a banking environment. So a lot of what I optimised for was latency and throughput, which used to be a banking problem but is now kind of everybody's problem, so it was kind of lucky that I started there. So it just grew from there, and those early days were about creating a better piece of software for connecting applications. So since then it has been a story of steady growth? Well, not quite. There was an up and a down. At that time, there was a lot of open source software emerging, and commoditising going on in the software market. We realised that the real value here wasn't to commoditise. The connectivity and integration market isn't actually a market - it's an activity that goes on and it hadn't been productised. So there was a ton of value in actually going in and productising the way in which you actually connected these applications. So we went down a different path, so rather than being an open source company, we became a commercial company that used open source, really, as a distribution mechanism. And that worked out really well because everybody else, who went the other way, hasn't really done much to monetise on an open source piece of software. Then the financial crisis hit and we had a lot of financial companies, so that hit us pretty hard. We thought, why should we be in this punch-up with the other integration providers when we can look at where things are going next and build on that. Within a year SaaS applications where emerging and so what we moved to building was an application which allowed anyone to connect in the cloud. The idea really was, we are capturing the enterprise market with our enterprise products so why not capture a larger piece of the line of business IT market with the cloud platform. So, what actually happened was that it took about 18 months to build the cloud platform and in that time, loads of large companies were saying, "Hey, we're getting out of this, we are not going to spend our time building datacentres, we're moving to the cloud". That would be around 2012, 2013. So what we ended up having was this platform that we thought we were building for SMB and we hardened that for enterprise use-cases and so we ended up with this kind of hybrid platform approach where you can have things on premise or in the cloud. That, of course, is what everybody else is now doing, so there is a bit of luck in there, but the thing that we have capitalised on is that we have stayed laser-focused on connectivity. We know that the one thing that the enterprise has got to get good at is change. It means being able to compose, re-compose, plug-in, plug-out based on the business needs and the changing needs of the consumer and our platform has evolved to just crush that niche, which now is not a niche but a very big market. How much of your business is now in the cloud? If you look at the last three years, in year one, 2013, we probably did 15 to 20 percent of our business on the cloud. And that was a real mixed bag of stuff. Then in 2014 we drove about 35 percent through the cloud and it was all enterprise. Last year, 2015, I can't remember the exact figure but it was around 70 percent doing cloud and APIs and we will probably track the same this year. That doesn't mean that there is an exodus away from on-premise - we are doing on-premise as well - but every one of those deals is using cloud as well. To give you some idea of what is really happening, there has been an adoption of cloud options so we are an indicator that that is all in flux at the moment. So you look at a company like Unilever, they are running what they call their "second speed IT platform" on the cloud. So if you think of someone like Unilever and how much they do in digital marketing and digital branding, that all runs on our platform. That gives you some idea of the scale. They have really pushed us to make what is available in the enterprise available on the cloud which is unusual when you look at most cloud platforms. So your experience is that organisations really understand this shift? No. They understand that they have got to change. A year or two ago we were still evangelising that. Now they are trying to understand what that change looks like. What is actually fuelling the growth of our business is that we have got a pretty directed point of view and some pretty good proof-points in the market with different sorts of organisations. Taking this API-led approach actually works, it starts to unlock the organisation; it starts to drive modularity and the way that you can build apps and the way that you can engage different types of consumer in the organisation. Q: And the key is the API? It's the key because it allows you to have a different conversation with the business. Instead of having to deliver every project yourself, you can take tranches of those projects and you can say to the different departments, we are going to give you the assets and you can build those projects yourself. And actually, the business tends to be OK with that. Like with digital initiatives, they still want to get involved with that but if you are in business analytics and all you want is a data feed, it can take you 13 weeks to get a data feed. Give it to them through a set of re-usable resources or APIs, and then you have a simplified way of unlocking that data every time they want to try something new, is a much simpler way of doing things. Turnaround times will be two weeks versus three months.
2019-04-22T04:49:23
https://www.zdnet.com/article/mulesoft-using-apis-to-unlock-the-enterprise/
0.999104
What is China's annual 'Two Sessions' event? Thousands of delegates from around China are gathering in Beijing for this week's annual session of the country's rubber-stamp legislature and its advisory body. The 'Two Sessions' include the plenary sessions of the National People’s Congress (NPC), the country’s top legislature, and the Chinese People’s Political Consultative Conference (CPPCC), a body that advises the government on a range of issues. The event is more a chance for the ruling Communist Party leadership to directly communicate its message than for actual debate or passage of laws. The session also provides an opportunity for party leaders to sum up the past year's achievements and lay out their priorities for the coming 12 months. It also offers a rare glimpse of President Xi Jinping, Premier Li Keqiang and other top officials going about the business of governing Chinese style, as the world's most populous nation faces challenges from a slowing economy to a radical decline in its birthrate. This year, 2,975 delegates have been selected to sit in the NPC, the symbolic legislature, representing cities, provinces and regions from across China, along with the People's Liberation Army. They are joined by 2,158 members of the legislative advisory body, the CPPCC, which meets concurrently. Delegates, led mostly by retired government officials, can discuss proposals for legal and regulatory changes, but have no powers of enforcement. Rather than geographic regions, they generally represent social and professional sectors, including farmers, workers, government officials and professionals in the field of science, technology, business, finance, education, agriculture and entertainment.
2019-04-19T10:44:07
https://www.dailymail.co.uk/news/fb-6768625/What-Chinas-annual-Two-Sessions-event.html
0.999999
Yesterday I taught a Stand Up Paddleboard class. I have only been teaching SUP about 4 years, and I have to say I really enjoy it. It is a very different experience than kayaking. I was actually surprised to be teaching yesterday at all, I am pretty obsessed with watching the enrollment on my classes and yesterdays SUP class was empty right up until Thursday night or Friday morning. I thought the class would cancel. But come Friday afternoon I had a participant. But just one. A lot of times it doesn't make financial sense to run a class with just one student, but in a case like this with very little set up time, I would imagine we break even. I am always happy to teach, particularly a fun class like this. Yesterdays class was actually the first SUP class of the year for me, and so before hand I took some time to refresh myself not he curriculum and then I started thinking about my goal for the day. I always start a class by a sling that of my students. What is your goal for the day? What brought you to my class? For a lot of people it is just something fun to do, but in reality the answers can be many and varied. Not for SUP specifically but for any class, it may be a lead into a bigger outdoor outing, or it may be something along the lines of I am missing this skill in my personal skillset. I want to know what those needs are before the class so I can make sure I give you what you need, or are looking for. Yesterdays participant was really just wanting to try something new. Simple. As we got onto the boards I realized she had some slight mobility issues with her right knee, and it made the transition from sitting to standing on the board difficult. We spent about three quarters of the class trying to get her to a point where she could move that knee in a manner to get her from sitting or kneeling to standing. In the process she got proficient in turning and even a good forward stroke. We practiced getting back onto the board after she fell off in the process of trying to stand. She had a great attitude and despite not being able to stand up, she was having fun. We talked more about goals, and I realized that for both the student and myself it isn't so much about choosing a goal, it is about defining success. What does success look like in any given situation? She made it clear that her definition of success was having a good time, something she felt she had already accomplished. I too had already accomplished my goal for the day, which was to have a nice day on the water. Success doesn't require lofty goals. As I thought about her problem I knew I really wanted to get her standing on the board. I thought about something one of my friends said about our current fleet of boards, she didn't think they were very stable. I thought about what other more experienced SUP instructors would do in the situation. There's a line from a Gene Hackman movie - When I get in jam, I like to think of a guy smarter than me. And I think "what would he do?" So I paddled along and realized I needed to get her on a bigger and more stable board. I needed to give it one more shot to get her standing. The board I was paddling was an older board that while only 6 inches longer was a bit more stable than her board. But back in my storage container - which is at the lake we were paddling on - we had an 11 foot board. We headed back to where we started and I went and grabbed the other board. I quickly switched the fin to the new board and attached her leash to it as well. Then I thought of my friend who is a better SUP paddler than me, and I thought what would she do? I pulled her board out into about 2 feet of water, and straddled the front of it, making it more stable. With the wider, longer board and me supporting it she was able to make the transition to standing. I then gently got off the board and allowed her to paddle away. I quickly got onto my board and followed her. She left the course ecstatic. Literally dancing on air, with her definition of a successful day extremely elevated. I guess you could say the moral of the story is to set your goals high, but honestly I think it is to have a good time, and work hard to give others a good experience. I think the Appalachian Trail is dead.
2019-04-24T14:10:02
http://www.paddlingotaku.com/2018/06/setting-goals.html
0.999999
The four-day Martin Luther King holiday weekend will see Universal's Ride Along 2, Paramount's 13 Hours: The Secret Soldiers of Benghazi and Lionsgate's Norm of the North all enter the marketplace. While it isn't expected to match the $48.6 million four-day debut of its predecessor, Ride Along 2 is expected to open in first place over the holiday frame. BoxOffice expects 13 Hours to get off to a solid fourth place start this weekend and Norm of the North to open softly in sixth place. Meanwhile, Disney's Star Wars: The Force Awakens, which has led the weekend box office over each of the past four frames, should find itself in a very close race for second place with Fox's The Revenant. BoxOffice feels that The Revenant will have the advantage for second place over the three-day weekend, but that Star Wars: The Force Awakens will have the slight edge over the four-day frame thanks to the potential of a stronger Monday performance. - The Ice Cube and Kevin Hart led Ride Along opened with $48.6 million over Martin Luther King Jr. weekend back in 2014 and displayed healthy holding power throughout its run. - On Twitter in the days leading up to release, Ride Along 2 is trending significantly higher than last year's The Wedding Ringer and slightly ahead of last year's Get Hard. - Films that skew towards African American audiences have a strong history of performing well over Martin Luther King weekend. - Pre-release excitement for Ride Along 2 doesn't feel as strong as the pre-release excitement that surrounded Ride Along. Sequel fatigue will likely be a factor for Ride Along 2. - As a sequel, the film is likely to be more front-loaded than its predecessor was. That may help a bit this weekend, but will hurt in the long run. - The film currently has a Tomatometer of just 7 percent on Rotten Tomatoes. While Ride Along 2 should be largely critic proof, the film's poor early critical reviews won't provide a boost either. - Similarly themed films such as Zero Dark Thirty, Lone Survivor and American Sniper have all excelled in recent years during the month of January. - 13 Hours has performed well on Twitter in the weeks leading up to its release, though a sizable percentage of the film's tweets have been negative in tone. The film continues to generate a higher amount of tweets than Ride Along 2 has. - 13 Hours will likely receive added boosts from conservatives and from Michael Bay fans. - The politics that have surrounded the 2012 Benghazi attack are likely to keep some potential moviegoers away. - 13 Hours doesn't have the awards season prestige that Zero Dark Thirty and American Sniper both had. - The film has a relatively modest estimated location count of 2,300 and will face tough direct competition from The Revenant this weekend. - There is a strong history of lower profile family films exceeding expectations over Martin Luther King weekend, with a recent example being 2014's The Nut Job, which opened with a four-day take of $25.7 million. - With The Peanuts Movie, The Good Dinosaur and to a lesser extent Alvin and the Chipmunks: The Road Chip all approaching the end of their respective runs, there isn't much competition in the marketplace this weekend for families with younger children. - Norm of the North hasn't received the type of marketing push that animated films normally get. In a similar situation, last year's Shaun the Sheep Movie (also a Lionsgate release) opened with respective three-day weekend and five-day takes of $4.0 million and $5.6 million. - While there is plenty of room in the current marketplace for films aimed at families with younger children; families with older children are sure to choose Star Wars: The Force Awakens and to a lesser extent Daddy's Home instead this weekend. - Norm of the North has been performing quite softly for an animated film on Twitter. BoxOffice projects this weekend's top ten films will total $176.6 million over the four-day frame. That would represent a 20 percent decline from the $220.7 million top ten total of the Martin Luther King four-day holiday frame last year. Warner's American Sniper led that frame with a record-breaking $107.2 million performance, while The Weinstein Company's Paddington launched with $25.5 million and Sony's The Wedding Ringer opened with $24.0 million. Check out our complete four-day forecast in the table below.
2019-04-25T00:06:27
http://cms.pro.boxoffice.com/featured_stories/2016-01-weekend-forecast-ride-along-2-the-force-awakens-the-revenant-13-hours-norm-of-the-north
0.999924
What is wrong with these drivers? Are they brain-dead from the steering wheel up? Yesterday lunchtime I encountered not one, not two but three incidents of thoughtless and illegal driving. First was the lady in the Mercedes who stopped her car two-thirds of the way over a Zebra crossing (US: crosswalk). I glared and walked round. Then there was the smartly dressed lady in a silver Maserati dialling a number on her hand-held mobile (US: cell phone*). As a frequent urban cyclist I am particularly sensitive to drivers who are not in full control of their vehicles. Before I could react the lights changed and off she drove phone still in hand. As luck would have it I met her again several blocks later as she was feeding a parking meter. I introduced myself and in my best über-polite manner pointed out the nature of my concerns, observed that if she could afford a Maserati she could certainly afford a hands-free car kit and suggested she treat herself to one. Finally there was the Volvo driver who decided that stopping at red lights was optional. I was at a junction, the lights had changed fully to red and as I started to cross this driver, half a block away, decided stopping was not for him. I narrowly missed having my toes run over and I gave the side of his car a good thwack with the flat of my hand as it whistled by. Mary says I shouldn't do this as some drivers are very protective of their vehicles. If he had stopped to remonstrate with me I would be polite but am quite prepared to engage the 'very loud shouty circuit' if needed and go verbally postal. This is the kind of driving up with which I will not put. * I love the Italian use of the diminutive for these: telefonino - little telephone. What was Miss Masterati's reaction to be being chastised? I once read sage advice to the effect that there are only two reasons for giving feedback. Either you want them to change their behaviour or you want to vent your feelings. Be aware which you are doing so if you do let rip then you should not be surprised or frustrated if they do not change. I wanted Miss Maserati to change her behviour so I was careful not to pass judgement on her driving. I did articulate my fear of being knocked down by drivers not in control of their vehicles in order to evoke sympathy. Then I suggested, not told, her to "treat" herself to the hands-free. Her response was muted partly due to the fact that she still had the phone to her ear through the whole transaction. Who knows, it may make her think and go legal. At least I tried. You'd have a field day with the mad drivers here in Sicily! I don't drive but you take your life in your hands as a pedestrian. You have to step out onto zebra crossings as if you stand on the pavement you will be there all day. Then you just have to convince yourself they will not mow you down - they only look as if they will. I did enjoy your post and admire your restraint!
2019-04-26T02:42:30
http://blog.mmenterprises.co.uk/2006/10/if-you-can-afford-maserati.htm
0.984646
Client's financial aims and objectives. Savings/investment period: short-term, medium-term, long-term. What amount of cash would you need to cover unexpected emergencies? Level of risk/Client attitude to risk: 100% capital security, medium level risk with the chance of earning an above average return, high risk with no upside or downside on the return or ultimate value of the initial investment e.g. stock market investments. Taxation implications: what is the most tax efficient choice? Interest rates are at 40-year lows. Nevertheless, you will earn a better rate by choosing periods of say 30, 45 or 60 days compared with using a demand deposit account. When comparing interest rates, it's important to check the Compound Annual Return (CAR). A 3-year return of 18 per cent is not the same as 6% per annum, because of the effects of compound interest. If security is important, a Fixed Rate Bond can be a good choice as you will receive a fixed interest return, after an agreed number of years. Tracker Bonds are popular medium term investment products that can provide 100 per cent security or at least a fixed percentage of the capital guaranteed. Trackers are generally based on the performance of one, or more international stock markets. The key issue with Trackers is the performance of the chosen markets and the lock-in of your investment for the agreed period. In preference to investing directly in the stock market, there is the option of pooled investments via Unit Trust or Unit Linked Funds. These investments can be in shares, State fixed-interest bonds and property. A certain number of units are purchased in the fund with your investment. A Fund Manager manages the fund which can go up or down in value, depending on the changes in the value the underlying assets. The principal difference between a Unit Linked Fund and a Unit Trust is that the Unit Linked Fund has a life insurance policy attached to it. Depending on the degree of acceptable risk, an investment mix ranging from spectrum of a zero risk fixed interest fund to for example a high risk Japanese equities fund, with much to choose from in-between, can be recommended to the investor. Secure Funds (low risk) where investments have 100 per cent security (short of a collapse of the financial system). Balanced Funds (medium risk) these investments are made in a wide range of domestic and overseas assets, with the objective of achieving enhanced capital growth. Specialist Funds (higher risk) These investments are made in a specific asset, e.g. shares or property; or a specific region e.g. Ireland, UK, US, Ireland to achieve high long-term growth. The decline in equity returns is prompting life insurers to consider withdrawing from the 'with profits' product market. However, there are some Assurers still left offering reasonably good initial gurantees - most notably Hibernian Celebration Bond. Investors in with-profits policies, such as lump sum with-profits bonds or regular payment endowments, receive two types of bonus. Once paid, an annual bonus cannot be taken away provided the policy is held to maturity. However, insurers are under no obligation to pay any terminal bonus, whatever the estimates that are given in annual policy statements. Some life companies have cut these bonuses four times in 2001 and the reductions are having a significant impact on maturity values. The penalties for surrendering policies early have also been increased. The life insurers 'smooth out" bonuses in the good years so that payments can be made in bad return periods. However, the sharp decline in equity values has prompted the steep fall in bonus values. However, in the light of many of the poor current returns in equity unit-linked investment bonds the with profit bonds still appear good value. Here, the stronger the financial position of the with profit life company, the greater is its ability to weather the downturn in the investment market. Contact us for a personal investment report. Warning: The value of your investment may go down as well as up. You may get back less than you put in.
2019-04-18T20:32:46
http://ellison.ie/index.php/investments/investments
0.999184
What started as barely an idea sketched on butcher's paper in Marion Potts' small Melbourne office, went on to garner rave reviews in London and New York and become a pivotal moment in the Malthouse Theatre artistic director's career. Moving on: Marion Potts' new role with the Australia Council will charge her with developing strategies for the country's theatre companies. Meow Meow's "kamikaze cabaret" Little Match Girl, which premiered at the Malthouse in 2011 under Potts' guiding hand, is one of the productions she is most proud of in almost five years with the company. Potts announced on Tuesday that she will leave the Malthouse in late March to take up the role of Director of Theatre with the Australia Council, replacing Lyn Wallis. In her new role, Potts will be responsible for strategy and spending for the country's theatre companies. "I'll be providing strategic advice as to how to optimise the spending for theatre," she said. "It's a hugely responsible role that I will take very seriously. Australian artists have an enormous amount to offer, our imaginations are superlative and our creative fearlessness is world class." Her other major achievement at the Malthouse had been "shifting the culture", particularly in terms of roles both on stage and behind the scenes for women, she said. "The female director in residence program was a very important initiative," said Potts from the Sydney Festival, where Malthouse show Blak Cabaret opened on Tuesday night. The 2013 director in residence, Roslyn Oades, went on to have her latest production premiere at the 2014 Melbourne Festival, while 2014 director in residence Clare Watson has since been appointed artistic director of Melbourne's St Martin's Youth Theatre. "I'm really proud of that," Potts said. "It just goes to show that if you do take a leadership position to certain industry needs they can actually change the balance." Increasing opportunities for indigenous performers and works, something her predecessor Michael Kantor had begun, was another highlight, particularly The Shadow King, which fused Aboriginal culture and Shakespeare's King Lear. "Creating diversity for the company and on stage is important, [as well as] continuing Michael's work on the indigenous program," Potts says. . "I feel really proud that I was able to shepherd The Shadow King through its various stages of developments, and it has now been accepted at the Barbican in London." The Shadow King was among a raft of Malthouse productions to tour overseas, including The Good Person of Szechuan, which travelled to China in October. The Malthouse has also collaborated with companies and festivals in India, Mexico and Belarus under Potts' directorship, which she credits to the philanthropy of Maureen and Tony Wheeler and Carrillo Gantner. "We couldn't have done that without [their] visionary support." But the experience of Meow Meow's ecstatic reception overseas (it received Helpmann Awards in Australia, a five-star review in The Times of London and saw the Australian artist named among The New Yorker's top performers of the year. "That experience was quite pivotal for me and the Malthouse," Potts said. "Little Match Girl started as an idea that Meow Meow [Melissa Madden Gray] and I talked about in my little office at the Malthouse, we barely had a piece of butcher's paper to write it down on, and that travelled to London. "[Its] wing span [stretched] between small theatres and garages in Melbourne ... to where people were doing fantastic things to London. "[We realised that] the Malthouse can be a fantastic conduit between the two."
2019-04-24T01:10:37
https://www.smh.com.au/entertainment/theatre/marion-potts-to-leave-melbournes-malthouse-theatre-for-the-australia-council-20150120-12u72b.html
0.998496
On the June 19 edition of "This Week" on ABC, John McCain whined about "isolationism" within the Republican Party, especially given objections to President Obama's military action in Libya. First, we need to define the terms. Merriam-Webster defines isolationism as "a policy of national isolation by abstention from alliances and other international political and economic relations." Is opposition to the attack on Libya isolationist or non-interventionist? There is a difference between being an isolationist and a non-interventionist, and McCain is more than a little dishonest to pretend the two are equal. I recognize the need for America to be engaged in the world, especially economically. I am a strong proponent of international trade. But, while I am not a pacifist, I believe military action should always be the last resort, and then only to protect national security interests. The attack on Libya fails that test. On the national security angle, McCain said Muammar Gaddafi has American blood on his hands. This is true, and this is why Ronald Reagan bombed Libya in the 1980's. (Tragically, we failed to end Gaddafi's life.) But Libya has been contained for two decades, and the relationship between the US and Libya has improved. In 2004, the Bush administration lifted economic sanctions and restored diplomatic relations with Libya. So after two decades, why are we going back now? What makes Gaddafi a threat now, when he was not a threat just seven years ago? Bringing up our hostilities with Libya in the mid-1980's is a shamefully dishonest attempt to distract from the real reason we are there - to prevent Gaddafi from going after his own people. If we are going to have a legitimate debate about military intervention in Libya, let's at least discuss the real reasons for it. It is also important to uphold the rule of law. The Constitution is clear that Congress declares war, not the President, and Congress tried to take some of its Constitutionally-mandated authority back with the War Powers Act. President Barack Obama has simply ignored his legal obligations under the WPA, dishonestly claiming that our military action against Libya does not constitute "hostilities." I am surprised he can say that with a straight face. The Hypocrite-In-Chief has also abandoned his own position. Obama said four years ago that "The President does not have power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation." Pretending that this "kinetic action" does not constitute a military attack does not erase the facts, not does it free Obama from his legal responsibilities. If we are going to intervene, why not intervene militarily in Sudan, where genocide has been taking place for years? Why not intervene in Syria to stop the abuses of that government? For that matter, why not act militarily against China, which is well known for human rights abuses against its own people? We simply cannot be the world's police force, nor should we be. This does not mean that we should not use other means at our disposal to pressure governments on human rights. From diplomacy to sanctions, we can advocate for human rights around the world as well as provide a good example for others to follow. But military intervention often breeds resentment, even when done on humanitarian grounds. It should be reserved for self-defense only.
2019-04-23T12:37:55
http://www.sstibbs.com/scott/2011_archives/blog_2011_103.html
0.998955
How are we being manipulated by advertisers? - People may believe that applying makeup will make you beautiful, but the girl in the ad has been unrealistically changed. - It is very easy to manipulate people people through images. - It is sometimes difficult to see the manipulation in advertising.
2019-04-20T01:06:31
https://www.jessicaohanley.com/teaching--learning/category/related-concepts
0.998324
RE LAST week's front page story: 'Building sell-off to hit voluntary groups'. RE LAST week&apos;s front page story: &apos;Building sell-off to hit voluntary groups&apos;. The key fact the article fails to mention is that this financial year H&F Council is spending £4.5million on the voluntary sector. This figure is up on previous years and is similar to much larger boroughs like Westminster. We also spend nearly double what Haringey and Hackney do - about £2.5m each. We fund 69 organisations through our 3rd Sector Investment Fund and another 146 through our fast track small grants scheme. Of course, councils face a grim future as the current deficit will inevitably lead to cuts in funding from central government. Smarter use of our property assets is a way to protect local services delivered by the voluntary sector. The council has reduced the amount of office space it uses and we expect the voluntary sector to do the same. This is about protecting front-line services, not cuts. While we have made no decision about the future of Pallingswick House, we are proud of our year-on-year council tax cuts and make no apologies for ensuring that every penny of council tax payer&apos;s money is spent wisely. In such a tough economic climate, it would be foolish not to consider selling underused publicly-owned buildings that are hugely expensive to run.
2019-04-19T00:27:07
https://www.mylondon.news/news/local-news/foolish-not-sell-buildings-6001689
0.999988
How does the 'Batman v Superman' origin compare? David James/Warner Bros.; Warner Bros. Batman v Superman: Dawn of Justice may be the first time fans have seen the Dark Knight and the Man of Steel go head-to-head on the big screen, but it’s certainly not the only time they’ve watched Bruce Wayne’s parents die. Batman’s origin story — his parents were shot by a mugger when he was a boy so he dedicates his life to fighting crime, grows up and follows through — is now national mythology. And yet for some reason, every new adaptation insists on depicting that brutal murder all over again. See them all, ahead. Gotham’s version of the Wayne deaths is pretty straightforward: young Bruce Wayne and his parents walk down an alley, only to be stopped by a mugger emerging from the darkness. Its only addition is a young Selina Kyle (Catwoman), watching from an overhead fire escape. But like the rest of the series’ treatment of Batman mythology, it feels like an unnecessary add-on. Plus, if the whole idea was to depict life in Gotham City before Batman, the shoehorning in of young Bruce (and an origin story anyone watching the show would already be familiar with) only served to dilute that premise. Kudos to the Hanna-Barbera cartoon for keeping its version of the Wayne deaths kid-friendly. There’s no blood or corpses here; just the mugger’s hand reaching desperately, a flash of deadly lightning, and the look on young Bruce’s face. As superhero adaptations like Batman v Superman become increasingly unfit for young viewers, it’s refreshing to revisit a story that kept its audience in mind. The workaround is good, too; it just lacks some of the symbolic power of other adaptations. It’s a nice change of pace to see Batman’s origin told so quickly, quietly, and subtly. After all, the specifics of the crime aren’t necessarily important; it’s a mythic event that affected young Bruce Wayne on a profoundly psychological and spiritual level. This animated version represents it as nightmarish, all colors and symbols and effect. That Scarecrow gas – it’ll get you every time. Every Batman game in the Arkham series includes at least a cursory reference to the Wayne murder, often a side quest that involves heading over to Crime Alley and paying respects to the family chalk outline. In the first game, Arkham Asylum, the experience is much more interactive. A fear gas-infected Batman hears his parents’ final dialogue as he walks down the alley, finally arriving not at a chalk outline but to a vision of his parents’ actual corpses. Trippy and haunting, this version even plays into the plot of the game. Yes, for those who haven’t seen it: Batman v Superman does indeed open with yet another flashback to the Wayne murder. In some ways, it’s actually some of the strongest filmmaking in the movie, as the very human tragedy that inspired Batman is juxtaposed against the entirely alien confrontation between Superman and Zod. Bruce Wayne even finds a newly orphaned girl in the Metropolis wreckage, but can only watch helplessly as Superman unintentionally recreates the Wayne tragedy on a macro scale. This powerfully sets up their later confrontation, but the premise is squandered when the whole conflict turns on a connection no one even bothered to point out previously. The deluge of onscreen Wayne deaths has also made it significantly harder to pull any emotional power from the event. The long-running series of cartoons helmed by Bruce Timm stands as one of the most definitive versions of the DC universe. Yet even though the Timmverse started and ended with Batman, it often demurred from depicting the crime that formed him. When it finally did, in an episode of Justice League Unlimited, it added an interesting twist: An adaptation of the iconic comic book story “For the Man Who Has Everything,” the episode featured Batman ensnared by a telepathic alien plant, giving him a vision of a world in which his father successfully disarmed the mugger. Batman never smiles, so the look of joy on his face as he sits entranced by this dream world is both alarming and heartbreaking. “Tell me kid, you ever dance with the devil in the pale moonlight?” The Joker’s version of the Samuel L. Jackson Pulp Fiction speech, delivered to a frightened and newly-orphaned Bruce Wayne, is the characteristically Tim Burton twist that distinguishes his Wayne murder. That, and the fact that the Joker is the involved at all. The man who created Batman is sometimes identified as “Joe Chill,” but more often he’s simply depicted as an anonymous mugger who slides in and out of the night, a stand-in for Crime and Evil as a whole. The Joker, too, is typically vague about his origin story (“you wanna know how I got these scars?”). Burton answered both mysteries, which in turn diminished their power. The Brave and the Bold was typically one of the more light-hearted Batman adaptations, ready for fun and unafraid of camp. But it could still get serious, as in “Chill of the Night.” Written by Paul Dini (one of the masterminds beyond the original Batman: The Animated Series), the episode featured Batman finally facing down the man who killed his parents. Its retelling of the origin is balanced between seriousness and fun (this Thomas Wayne, for instance, is fittingly voiced by former TV Batman Adam West). There’s also the indelible visual later in the episode of an elder Joe Chill getting beaten by a cadre of Batman’s iconic villains (“So it’s your fault Batman’s always on our backs?”). One reason all these recent onscreen Wayne deaths feel a little silly is because the Batman Begins version already seemed so definitive. Christopher Nolan added a dash of Peter Parker-type guilt to Batman’s origin, making it Bruce who wanted to leave the opera early, and Bruce who begged his mother to wear the pearls that caught Joe Chill’s eye (the scene change from movie theater to opera parallels Nolan’s desire to elevate Batman from comic book fun to artistic seriousness). Another plus: the rest of the movie features Batman coming to grips with the reality of this incident and how it affected him. It’s not gratuitous, but central to the story. Batman v Superman mirrored a lot of lines and visuals from Frank Miller’s iconic graphic novel The Dark Knight Returns, but fans interested in an adaptation of the story would probably do better just to watch the two-part animated movie from a few years back. Director Jay Oliva faithfully recreates Miller’s version of the origin, as a deeply repressed trauma that bubbles up to torture an elder Bruce Wayne watching Gotham fall apart. This Bruce tried to retire the Batman persona, but the entire family wine cellar can’t repress the formative darkness still simmering at the heart of his soul. It requires only the merest trigger (like a late-night showing of The Mask of Zorro, or a news story about a young boy killed by crime) to come roaring back, setting Bruce on track for what is still, perhaps, the greatest Batman story ever told.
2019-04-20T17:33:30
https://ew.com/gallery/death-batmans-parents/
0.999868
Do You Have an Idea What Will Happen if Global Warming Continues? Have you ever wondered what will happen if global warming continues at the ongoing rate? In this article, we will give you a rough idea as to how things will change if the near-surface temperature of the Earth continues to rise. Global warming is happening, and there is no dearth of evidence to prove that. We are left with two options: either turn a blind eye towards the evidence, or acknowledge it and put in efforts to reduce the impact of this disaster. As for the evidence, the most crucial is perhaps the fact that the average near-surface temperature of the planet has increased by 1.8 °C over the last century. While those who have turned a blind eye towards this phenomenon are least bothered, those who know the seriousness of this environmental issue are left wondering as to what will happen if it continues unabated? In order to get an answer to that question, we need to take into consideration the various effects of this phenomenon on the Earth. What is Going to Happen if Global Warming Continues Unabated? If the near-surface temperature continues to soar, it will melt the water stored in the form of huge glaciers in the polar regions and mountains. Melting of glaciers will affect the humans as well as animal species on the planet. A significant amount of freshwater is stored in these glaciers and if they melt, all the water will be drained into the oceans, leaving us devoid of water to drink. Animals will be affected as large-scale melting of glaciers will result in loss of habitat for several species. In fact, the Polar bears and Arctic foxes are already facing the threat of habitat loss due to excessive melting of ice in their natural habitat. It will also trigger extinction of plants and animals, as these species will not be able to sustain the climate change triggered by global warming. In fact, a look at the number of animals extinct in the last 100 years just adds to the grave concerns about the ability of various species to adapt to the rapid change in climate. One of the most prominent examples of animal extinction due to rising temperature is that of the Monte Verde toad, endemic to the tropical rainforests of Costa Rica. If the water stored in these glaciers drains into the oceans, it will add to the volume of water in the ocean basins and result in abnormal rise in sea level. Melting ice may be the major contributor to the rise in sea level, but factors such as thermal expansion (i.e., expansion of water by heating) of the upper layer of oceans will also add to this problem. Rising sea level will submerge the low lying coastal areas, as increasing water in various oceans of the world will encroach upon the land and flood them. A large number of countries will be affected by this phenomenon, including low lying countries, such as Bangladesh, and tiny islands, such as Maldives. A significant percentage of the world population lives in big cities in the coastal areas, such as New York and Mumbai. If ocean water encroaches upon land, these cities won't be spared either. In other words, this will result in habitat loss for humans. More importantly, the economy of these countries, as well as the whole world, will face a major setback if these cities go underwater. In fact, the sinking of Maldives has already begun. Yet another bad news for humans would be the spread of tropical diseases. If the rise in temperature of the planet continues, the difference between the climate in polar areas and tropical areas will be diminished. As the whole planet will experience a tropical climate, malaria and other such diseases, which are restricted to the tropical areas, will spread out to the subtropical and polar areas. Warm climate will also help the disease-spreading insects, such as mosquitoes, to flourish in these regions. Not to forget, the planet will also be subjected to extreme weather conditions as a result of incessant warming. The climate pattern will undergo a drastic change, and untimely rains and droughts will become more frequent. Similarly, the frequency of hurricanes will increase, as the rise in temperature will heat the ocean water, thus providing a nourishing environment for these natural disasters. The rise in the number of hurricanes over the last decade comes as an apt evidence of the same. At the end of the day, the species that will be the worst affected will be humans. We may be the most intelligent species on the planet, but we are also the most dependent of the lot. It's worth noting that these are just some assumptions as to what may happen if ... In reality, the effects of global warming on the Earth may be less severe than this―as we will adapt to the climate change―or much worse than this. The fact that we are dependent on the nature makes us the most vulnerable to this phenomenon and thus, the onus is on us to put in some efforts to save our planet.
2019-04-21T14:57:45
https://helpsavenature.com/what-will-happen-if-global-warming-continues
0.998628
Anna Karenina: I feel so guilty, so terribly guilty. Q: Is 'Anna Karenina' based on a book? Q: What is 'Anna Karenina' about? Q: How far apart are St Petersburg and Moscow? "Anna Karenina" is based on a novel by Leo Tolstoy. I have not read Tolstoy's novel, but it is apparent from the thickness of the novel and the length of this film that this adaptation is heavily abridged. The story is simple; Anna Karenina is married to Karenin but has an affair with Vronsky. The film features impressive sets and costumes. There are depictions of upper-class Russian rituals such as drinking games, dancing and a stage production. These are for the most part well-done, although the stage production seemed drawn out. Greta Garbo as Anna, Fredric March as Vronsky and Basil Rathbone as Karenin lead the cast. It is an impressive roster, and all of them give solid performances, especially Rathbone and Garbo, but the characters they played were not exceptionally interesting. Freddie Bartholomew is notable as Sergei, Anna's astute young scientist of a child that has some touching scenes with Garbo. This film is watchable and has a number of decent scenes, but never gains much momentum beyond a basic love story. Sadly I didn't form any strong attachments to the characters such that I was even indifferent to Anna's final fate at the end of the story. I'm not sure how other adaptations of the novel compare, but this one is somewhat flat despite having three accomplished performers in the lead parts.
2019-04-21T01:06:17
https://www.imdb.com/title/tt0026071/?ref_=pro_tt_pub_visitcons
0.996636
Our aim is to help Australian businesses generate more sales through advertising with phone words. We have over 7000 quality phone words available and over 30,000 different combinations. We can assist by providing you with effective marketing tools to cost effectively enhance your business branding. Maintaining a positive brand image is vital to your business success. 1300 Australia can offer a range of phone words or inbound numbers which can deliver enhanced awareness, greater reach and better customer relations – all which have a beneficial effect on the bottom line. Phone words are the most popular type of inbound number followed by standard 1300 numbers, 1800 numbers and 13 numbers. 1300 numbers are the most commonly requested phone word. 1300 numbers allow a customer to call you from anywhere in Australia from a fixed line with low untimed charges. 1300 numbers can provide the same functionality as 13 numbers, but without high rental fees. 1300 numbers are great for small businesses looking to show increased scale. Depending on your service provider 1300 numbers can be dialed from overseas. The international number is dialed first, followed by the country code and then the 1300 number. No area code is required. An international call rate is charged to the caller which is great for international opportunities and online businesses. 1800 numbers are the next most popular type of phone words. 1800 numbers allow your customers to call you free of charge from a fixed line anywhere in Australia. Customers love 1800 numbers, because they know their call costs are covered. 1800 numbers are great for businesses that may have customer service centers or consumer hotlines. 13 numbers are a premium service phone word allowing your customers to call you from a fixed line anywhere in Australia with low untimed call charges. A significant government charge is applicable to 13 numbers. 13 Numbers are the most expensive type of phone word, but they are also the shortest making them the easiest to remember. 13 Numbers have an annual connection and registration fee. These numbers are great for medium to large businesses that have high call volumes and hence can justify the cost over a large number of calls.
2019-04-22T02:39:16
https://1300australia.com.au/our-products/
0.999304
Is there a way to stream audio via WebSocket and get Speech to Text results AND get a copy of the recording on Azure Storage? We are currently using Bing Speech with LUIS, but looking to convert to Speech service. Right now we have multiple recorders that operate in the browser, Flash, WebRTC, HTML5. Each of these has to connect to Bing Speech to Text to get realtime translation and LUIS results to drive actions in the application. Additionally we are currently streaming the audio to Amazon S3. Ideally we would like to stream the audio only once, and have it picked up by Microsoft from Speech to Text AND be able to retrieve a URL for later use. Having to maintain two streams has led to a number of problems where one isn't a consistent recording, and the transcription we get from Bing doesn't match what we have in our recording. We would use this recording for review in the application, and as a possible training cohort to improve Speech to Text results using Custom Dictionary and Custom Acoustic Models. If not, is this on Microsoft's roadmap? This is a big enough problem for us that we are considering moving compute/AI platforms one way or the other, especially as we have to reimplement to Speech Service by end of year.
2019-04-22T02:30:02
https://cognitive.uservoice.com/forums/912208-speech-service/suggestions/36433966-is-there-a-way-to-stream-audio-via-websocket-and-g
0.999999
My goal is to send collected data via FSR sensor between two board arduino via bluetooth. I want to know if the created code can be correct or not. I couldn't test it because I haven't materials. Can one help me and inform me if this code works? Results can be displayed in the serial monitor? Really, I want your help this day (I have a deadline). Thank you in advance. That's going to fill RAM pretty quickly. delay(1000);And that's going to make reception very slow, and increase the chances you'll overflow the receive buffer. I want to ask you if the proposed code can achieve the bluetooth communication and send data between sender and receiver. Results can be displayed in the monitor of sender and receiver? I didn't know if this code is correct and functinal or not. Please could you inform me if this code works or not. I want to explain more. If I have two arduino board Due and I want to establish the communication bluetooth(HC-05) between this two board and send data. Could I have ,for example, this result (attached) at the serial monitor of sender and the received data in the serial monitor of the receiver? 1. I hope that your setup is as follows (Fig-1) containing a pressure sensor, two Arduinos (UNO and NANO), two BT Module (HC05), and two Serial Monitors (SM1 and SM2). 2. You know that the Serial Monitors are connected to the UNOs via their respective Hardware UART (UART) Ports. Because the Arduino has only one UART Port, you must use a Software UART Port (SUART) to connect the BT Module. 3. A SUART Port can be created by including the following codes in the sketch. 4. All available functions/methods of UART Port are also applicable for the SUART Port except that the void serialEvent() handler which is exclusively reserved for UART Port. 5. In UART/SUART Protocol, data exchange takes place one character at a time over a frame. The frame is composed of a Start Bit, 8-bit ASCII Code of the character, optional parity Bit, and the STOP Bit.. 6. When a valid character arrives at the Receiver Section, it immediately (after validity check) enters into a 64-byte wide (with last byte always as null-byte) unseen FIFO type buffer. 7. The presence of a character in the FIFO buffer of Step-6 can be checked by executing the if(mySUART.available()>0) structure. 8. The topmost character of the FIFO buffer of Step-6 can be brought into a user defined variable by executing the instruction byte x = mySUART.read(); method. Now based on the above information, try to revise your original sketch/write some meaningful codes, test them and post the results in this thread. My question is about the successful bluetooth communication between two arduino. I just want to know if the proposed code can establish the bluetooth communication between two arduino or not without using the SoftwareSerial.h library. You may revise the codes of your original sketch in the light of the following codes. This code is it available for arduino Due and bluetooth H-05? I have tested these codes for UNO and NANO. They should work well with DUE. If you are using DUE, you don't need to use SUART Ports as a DUE has as many as 4 UART Ports. "don't need to use SUART Ports as a DUE has as many as 4 UART Ports" That means It is not necessary to use the SoftwareSerial.h library and SoftwareSerial declarations in the code? I must delete the indicated part from code? The code still working? Please help me, I'm beginner on arduino. If you have DUE+DUE, try the codes of my post using direct connections between UART1 and UART1 and then try using BT HC5. Yes, i have the communication between two Due. So, if I used my proposed code at the begining , it will be a succesful communication and data transmission? I haven't materials to do the experience but I need a functional and correct code. Could you help me to have the correct structure of the sender Due and the receiver Due? You have an analog type pressure sensor at the Sender DUE-1. Do you want to send the calibrated or raw pressure signal to Receiver (DUE-2) using BT HC5? DUE2 will receive the data, and it will display the pressure signal on the Serial Monitor of DUE2. Build the hardware slowly, add the software components slowly and then come up with a working project. In this Forum it is very difficult to talk/write with out experimental evidence. You need to collect your all hardware components.
2019-04-25T20:40:42
https://forum.arduino.cc/index.php?topic=573727.0
0.999999
Season in a paragraph: Bass opted out of the final year of his previous contract after his first season in Boston, but re-signed with the Celtics on a somewhat affordable three-year, $19.4 million deal (he seemingly could have commanded a bit more on the open market). Despite being shuffled in and out of the starting lineup this season -- including one game during the playoffs -- Bass started 74 of 87 total contests (regular season and playoffs) and overcame a sluggish start to play his best basketball in the postseason. Diminished playing time drove down his regular-season stat line, but Bass carved out a defined defensive-minded role late in the year and used it to excel into playoffs. Season highlight: With Kevin Garnett sitting out an extended stretch late in the regular season due to left ankle inflammation, Bass took his game to another level and it spilled into the postseason. Tasked with defending Carmelo Anthony in an opening-round series against the Knicks, Bass used his combination of size and athleticism to make everything difficult for a player who finished third in the league's MVP voting. Anthony often got his points, but not without a high shot volume. Rivers went so far as to suggest that Bass played a "perfect" game early in the series and Bass kept his focus on the defensive end. Season lowlight: Slow out of the gates, Bass got bumped from the starting lineup for short stretches in the first half of the season. Twice rookie Jared Sullinger took his spot -- including just three games into the season, then again in February before a back injury ended Sullinger's campaign -- and Jason Collins, who would be shipped out at the February trade deadline, took over a starting role for a stretch in late December. The soft-spoken Bass endured it all, including another shuffle to the bench when Jason Terry got moved to a starting role for one game in the playoffs to add additional ball-handling to the lineup. Teacher's notes: The 2012-13 season probably didn't play out like Bass expected, a healthy return for Jeff Green and the arrival of Sullinger muddied up the power forward spot a bit (along with Rivers' desire to take some of the wear and tear off Garnett by pairing him with a pure center like Collins at times). Bass, a consummate professional, rode the playing time wave and still powered through some rocky waters early in the year. Here's what we liked about Bass' season: According to Synergy Sports defensive data, he allowed 0.756 points per play, which ranked him in the 91st percentile among all league defenders. Narrow that list to all players with at least 600 total possessions defended, and Bass ranked third in the league behind only David West and Kendrick Perkins (and one spot ahead of Defensive Player of the Year Marc Gasol). No one is suggesting Bass deserved All-Defensive consideration, but he did an excellent job of limiting opponents and making things difficult (either using his athleticism away from the basket, or his strength to battle with those bigger than him). And his offensive numbers were not that bad, either (0.954 points per play, 71st percentile). But here's a few things we didn't like: Bass' rebound rate was a career-worst 11.2 percent (including a mere 15.2 percent on the defensive glass); his turnover rate spiked (10.9 percent); and he never quite found a way to become a consistent offensive threat, particularly without Rajon Rondo on the floor, as his shots per game fell 3.4 shots from last season. The plus-minus numbers don't help his cause as the Celtics were plus-160 without Bass on the floor; minus-178 when he was. We saw the impact player that Bass can be at the end of the season, but he needs to bring that consistently -- all while finding a way to still get his shots -- in order to maximize his talent. What's next?: Bass will earn $6.5 million next season, a somewhat economical number if he remains a starter, but it's a bit more daunting if Sullinger can return to starter form after back surgery. Bass has never really thrived in a bench role and clearly benefits from extended floor time. With the starting unit, he's been able to thrive while focusing on his defensive efforts. Off the bench, it might be more imperative to get him going again offensively (at least if Boston's bench struggles to put points on the board as much as it did for most of this past season). If the Celtics are confident in Sullinger's long-term health, it might make Bass a potential trade asset this offseason, but his versatility -- and his shut-his-mouth-and-do-his-job mentality -- is quite a luxury for Rivers. Honor roll: Click HERE to read past report cards. Don't agree with teacher? Just want to sound off on Bass' 2012-13 season? Leave your thoughts in the comments section.
2019-04-25T23:50:05
http://www.espn.com/blog/boston/celtics/post/_/id/4705113/report-card-brandon-bass-2
0.998255
With a few notable non-scary exceptions ("Stand By Me" and "The Shawshank Redemption"), Stephen King hasn't had much luck having his written work translated to the silver (or small) screen. And as one of today's most prolific and popular novelists, much of his work has been adapted. Not that I've seen all of it, far from it. But most of what I've seen has disappointed. Add to the list of disappoints, "Apt Pupil". The horror in this film is not supernatural, but psychological. It chronicles the improbable story of a young teen who discovers that an elderly neighbor is an ex-Nazi death camp commander. Instead of dropping a dime on the old butcher, he blackmails him! And not for money, but for his insight, insight into the nature of evil. And this from a 14-year old? The story didn't wash. The movie is created well, with decent acting, but the direction seemed to wander. At times I felt that the movie was taking a creepy, dark turn to plumb the depths of human depravity, then it would skip off into something more akin to a murder mystery. Sort of schizophrenic, as if the director wasn't quite sure of the type of movie he was making. I wouldn't recommend this movie.
2019-04-24T14:26:06
https://www.imdb.com/title/tt0118636/
0.99752
1. Took notes on Interstate Relations, the Admission of New States, and States Rights v. Nationalists. 2. We also completed a cooperative learning activity. Be sure to get it from the Tuesday folder. Today in class we read and discussed the McCulloch v. Maryland case study. We also took notes on the significance of McCulloch v. Maryland. Be sure to get the notes from a friend. In 4th block we took notes on Interstate Relations. Today in class we took notes on Federalism. Be sure to get the notes from a friend. We also started our study of McCulloch v. Maryland. The homework is to read 4.1 and 4.2. Today in class we completed the test for Chapter 3. We also started our study of Chapter 4: Federalism. If you were absent, you will need to get the video notes from a friend. Today in class we finished our study of Chapter 3. We took notes on informal changes to the Constitution. We also reviewed for tomorrow's test. The homework is to prepare for the Chapter 3 test (Wednesday). How is the Constitution more democratic today than it was at the time of ratification? Provide THREE specific examples. 1. Finished our discussion of the evolution of the three branches. 2. Took notes on the formal amendment process. 3. Discussed the formal amendment process. 4. Started an individual assignment about the 27 formal amendments to the Constitution. Today in class we completed a chart on the powers and evolution of the three branches of government. Today in class we finished our notes on the principles of the Constitution, discussed checks and balances, and discovered the significance of Marbury v. Madison. Read the rest of Chapter 3. The homework is to read Chapter 3, Section 1 and 2.
2019-04-19T14:54:58
http://mrseggenberger.weebly.com/american-government-daily-assignments/archives/02-2012
0.998706
Two-factor authentication (2FA) has been around for a long time, at least in sci-fi. Remember this exchange from 1969? Captain Kirk: Computer, this is Captain James Kirk of the USS Enterprise. Destruct sequence 1: code 1-1A. Computer voice: Voice and code 1-1A verified and correct. Sequence 1 complete. Two-factor authentication like this seems like a great idea today, when hardly a week goes without a story in the news about user IDs and passwords being stolen and misused by hackers. Of course, the most common second factor today isn’t a voice print, but a code the company sends to either your mobile device or a token device that you’ve been issued. Essentially, the company is requiring not only “something you know” (your user ID and password), but also “something you have” (your phone or token). That way, even if hackers steal your user ID and password, they should be unable to gain access to your account. Of course, the second factor doesn’t have to be a code. For example, at your ATM, you probably have to supply both your PIN and your physical bank card. Biometrics (“something you are” rather than “something you have”) are gaining ground, too, working hard to catch up with sci-fi — not just voice printing, but fingerprints, facial recognition, retina scans and more. However, it is important to understand biometrics and 2FA are not the same thing. In fact, in both fiction and reality, biometrics often replace, rather than supplement, a user ID and password. The thumb prints in Back to the Future 2 and the retina scans in Minority Report are high-tech versions of swiping your employee badge to get into the building when you go to work — not 2FA, but just single-factor authentication using a different factor. What’s not to love about 2FA? Two-factor authentication improves security by making a hacker’s job tougher. But (of course there’s a “but”!) 2FA comes at a price (both figurative and literal), and it’s not foolproof. The figurative cost of 2FA is inconvenience. Users don’t want to have to enter yet another factor on top of the complex passwords that IT is already making them invent and constantly change. And sometimes the code they’re sent won’t work, forcing them to request another and another until one is finally accepted or they just smash the token in frustration. Speaking of tokens: The last thing users want is a pocket or drawer full of key fobs. Using a phone to get the code is more acceptable to most users; after all, most people keep their phones with them. Usually. But what happens if you’re on a business trip and your phone is safely on the nightstand at home? Or it’s lost or just refuses to take a charge today? There’s that “f” word again: frustration! The literal cost is, of course, money. Tokens are expensive to acquire, dole out, maintain and replace. Using SMS codes on smart phones also requires a certain amount of infrastructure, software, maintenance and user support. And course the cost of technologies like iris scanners is still prohibitive in most scenarios. Plus, remember the user frustration we just talked about? That hits the bottom line, too, in the form of lost user productivity and lots and lots of helpdesk calls. Beyond the various costs of 2FA, there are the security concerns. Sci-fi gets it right: two-factor authentication just isn’t as good as it’s cracked up to be. While we may not yet have to worry about androids that can mimic your voice and shape-shifters that can assume your form down to your fingerprints, hackers can and do already intercept SMS codes and impersonate users through social engineering to redirect where the texts are sent. Do biometrics seem more secure? In 2006, the Mythbusters team was able to fool a fingerprint scanner by copying the fingerprint they needed onto latex, gel, and even paper! Of course, technology keeps evolving and those copies probably wouldn’t work today, but hackers are increasingly inventive and sophisticated, too. Even if you could afford to keep buying the latest technology, do you really want to bet your security on the good guys staying ahead? If not, what’s the next logical step? Adding more factors to the authentication process. Watch for our upcoming blog, “What is multi-factor authentication?” to learn more. Contact us learn more about SecureAuth and how to prevent the misuse of stolen credentials or request a demo.
2019-04-19T18:23:16
https://www.secureauth.com/blog/what-is-two-factor-authentication
0.999073
Hopfield networks are a kind of recurrent neural network which implements an associative memory. The behavior of the network can be modeled in terms of minimizing an energy function. Understand why the dynamics of the network can be described in terms of an energy function. What happens if you try to store too many memories in a Hopfield net? An online course by Geoff Hinton, who invented many of the core ideas behind neural nets and deep learning. Lecture "Dealing with spurious minima" Lecture "Hopfield nets with hidden units" Skim the introductory networks for a general motivation of neural nets. The argument about variational energy and the mathematical analysis of Section 42.7 are optional. Boltzmann machines (and in particular, [restricted Boltzmann machines (RBMs)](restricted_boltzmann_machines) ), are a modern probabilistic analogue of Hopfield nets. The mean field approximation updates in an Ising model have a similar form to Hopfield nets.
2019-04-21T05:14:21
https://metacademy.org/graphs/concepts/hopfield_networks
0.999883
Am I too old and cranky for third wave coffee? I like espresso. I like it to taste like coffee but I am happy to expand my horizons. In that spirit, I have been trying out many local roasts in the Toronto area. Most of these coffees are from craft shops that roast medium or lighter and that list flavors like "berry" on the label. What I find is that a happy balance is achievable with some coffees (especially medium espresso roasts), but I have only gotten rich coffee taste from half a dozen shots. Worse, I drink decaf later in the day, and the only decafs that are not downright tart are Sumatran blends that go too far into the dark and roasty end of things. I think my equipment and technique are adequate. My coffee is at least as good as I get in cafes (to my taste). I get great naked PF pours, things are clean, temps, water, timings, frothing are well controlled. I am learning to tease out the flavors of berry, chocolate, etc. I would seem to be progressing but, still, so few really good shots - especially with decaf. Perhaps I am trying too hard. Perhaps I just need to recognize that my tastes are pretty much set, stick with traditional beans and techniques and avoid third wave. The alternative seems to be preinfusion, profiling, more sophisticated machine, etc. - complex and expensive. Would all this new stuff provide real new experiences, or would I just be using a bunch of gimcrackery to make third wave coffee taste more traditional? In that case, I should just make traditional coffee. Note, I am not asking how to do it. I am asking if doing it allowed you to love new tastes provided by the third wave, or if it just ended up in making difficult coffee taste less..... well.... difficult. It has cost me some time to get used to fruity thrid wave coffee, but for me there is no way back. Once I had experienced that roast flavor is just bitterness diverting you from the real sweetness I could no longer stand overroasted traditional coffee. Nevertheless the coffee which is served in most third wave cafes is not to my taste. It often tastes underdevelopped, sour and blant. In contrast to that I prefer a syruppy ristretto-like shot which is more concentrated and sweet. I use a Faema Lambro, a fifty year old commercial lever which - to my taste - is well suited to bring out my prefered taste. To my mind you do not need to invest heavily in fancy equipment. If you have an understanding of what is going on in your portfilter, you can brew a complex coffee even with a traditional hx machine or lever. My best investment was my grinder, a Mahlkönig Pro M Espresso, which has its flaws but grinds the beans more unimodally, comparable to a EK43. This has brought my 3rd wave espresso to a new level. The alternative seems to be preinfusion, profiling, more sophisticated machine, etc. - complex and expensive. Would all this new stuff provide real new experiences, or would I just be using a bunch of gimcrackery to make third wave coffee taste more traditional? In spite of the fact that I have been drinking espresso for the past forty years, I don't think my opinion counts, in fact I did not even know about 3rd wave until 45 days ago . But I think I can share something in this respect. Looking for fresh roasted beans for traditional espresso, I purchased few domestic blends. Among them Hologram. Well, I tried it and soon I realized that obviously I was not able to make a good espresso, or maybe that blend was too difficult for me. I really tried hard. Changing dose, grind size, time, pressure. Nothing. To me, it was absolutely undrinkable. Fortunately one day, browsing Counter Colture web site I noticed that they were going to offer Hologram at the next 'Tasting at Ten' at their Training Center in my town. Well, what better opportunity to learn something and see how to properly fix a 3rd wave espresso, than seeing it done by the producer? So I went to the event with a friend of mine. Well, I am very happy I went. I had the opportunity to discover right away that the problem was not my skills, nor my espresso machine or the grinder. It was exactly the same taste and I really didn't like it. Funny because while I drank it all, sip by sip to to better understand all flavors, my friend put it back on the table after two sips (he too drinks traditional espresso). On the other hand the cappuccino was what I think the best cappuccino ever. Probably because in addition to being really good, the flavor was something new to me, but I am still making cappuccino with Hologram at home. So long story short, based on my little single experience, maybe with time I will learn to like "fancy" espresso too, but at least I know that in this specific case it was not a matter of hardware. When I opened my coffee bar I made the business decision to offer only one blend for all my espresso drinks. I wanted to keep thinks simple and consistent. I wanted to develop a brand flavor profile for MY coffee. Little did I realize at the time how hard it would be to find one coffee that excelled equally well as both straight espresso and milk drinks. Dark, chocolatey comfort espresso drinks very well straight, but gets lost even in a cortado, let alone a 12oz latte. All but the most acidic of light roasts are heavenly in lattes, but will pucker the tradition espresso drinker. I finally settled on a blend that seems to satisfy most, including myself. I blend 4 coffees pre-roast so the grind stays consistent, yet the flavors still poke through. I roast it "medium", 50/55 Agtron. Almico wrote: Dark, chocolatey comfort espresso drinks very well straight, but gets lost even in a cortado, let alone a 120z latte. All but the most acidic of light roasts are heavenly in lattes, but will pucker the tradition espresso drinker. Interesting. My experience is almost exactly the opposite! I generally prefer fruity espresso straight (or with sugar), and find that dark chocolate-y blends hold up better to milk. I do too. But the vast majority of my customers do not. I keep two drips pots going at all times. One dark, one medium. I sell them pretty much 55% dark/45% medium roast. The only way I can get "fruity" coffee by them is in a capp or latte. My experience is different again. I find chocolate nutty expressos are fine with milk or on their own, but fruity coffees are best brewed in a V60. cunim wrote: ... Would all this new stuff provide real new experiences, or would I just be using a bunch of gimcrackery to make third wave coffee taste more traditional? In that case, I should just make traditional coffee. I think that the "new stuff" does "provide real new experiences," and the "gimcrackery" makes it easier to get there. That being said, I home-roast now. I always try a variety of roasts levels with a new bean, and it is only occasionally that I'll get a bean that I find shines best with a very-light roast. Those roasts are usually brewed with a V60, just because I find a pour-over easier first thing in the morning. cunim wrote: I like espresso. I like it to taste like coffee but I am happy to expand my horizons. In that spirit, I have been trying out many local roasts in the Toronto area. Most of these coffees are from craft shops that roast medium or lighter and that list flavors like "berry" on the label. What I find is that a happy balance is achievable with some coffees (especially medium espresso roasts), but I have only gotten rich coffee taste from half a dozen shots. Worse, I drink decaf later in the day, and the only decafs that are not downright tart are Sumatran blends that go too far into the dark and roasty end of things. I get the sense you are asking whether some kind of expenditure is "worthwhile" with respect to stereotypical third wave coffee. I have never had much luck with packaged coffees. Too roasty or too sour. I am too cheap to buy expensive coffee and the few times I do I find myself disappointed. I homeroast and have greatly enjoyed all roast levels I do using the Rao curve, which ensures balance and sweetness. For me, getting a roaster was the best investment. It paid for itself in a few years. I don't have to buy laughably expensive equipment to attempt god shots. I control everything from bean to cup. This is very interesting to read as someone who got into espresso last month. Living in San Diego, there are a bunch of micro-roasters to try. That being said I've been used to drinking milk drinks from my parents superautomatic machine with beans bought from Costco. When beginning to try espresso in shops I personally could not stand the bright, acidic, tastes of the third wave coffee wherein every single espresso blend there is an Ethiopian included and IMO just makes it sour. That being said, I recently tried the espresso blend by James Coffee Co and really enjoyed it where if putting it into a flat white gave a really strong blueberry taste to it. The fruitiest taste I've ever and was very surprised. The "zesty" tangerine, orange flavors were just acidic to me from different places such as Bird Rock. Now, I recently tried a brand new blend by Mostra Coffee which they removed their Ethiopia Yirgacheffe and replaced it with a bean from the Philippines. That being said, I love it. It's closer to traditional espresso, not bright, and just a very slight fruity flavor which they describe as stone fruit. One of the first espresso that I enjoy to drink as a straight shot. Probably will go through a few lbs of this.
2019-04-20T15:26:02
https://www.home-barista.com/knockbox/am-i-too-old-and-cranky-for-third-wave-coffee-t57672.html
0.99987
=Current process= As of March 2015, Geni now supports both adoptive and foster relationships. See http://www.geni.com/blog/new-on-geni-adoption-387942.html for more information. =Past workaround= Before March 2015 there were several workarounds due to Geni not supporting adoptions at the time. Be aware that these profile workarounds may still be present on the tree. Option 1 Add a spouse to the person adopted. (This will create an "alternate identity" Profile.) Add the "Birth name" or "Adopted name" to the alternate identity created accordingly. Mark "gender" as unknown (This will make the profile green in tree view.) Now you can add the birth or adoptive parents and family to the alternate profile. Option 2 Given an individual with one set of parents (biological or adoptive) Find or create the other set of parents (adoptive or biological). If the other set of parents should not be connected to the tree other than through the adoptive relationship, temporarily create one of them as a sibling to one of the existing parents; this relationship will be removed at the end of this process. Create another node for the individual in question by adding a child to the parents found or created above. Merge the two child profiles Click "Move this person" on the more menu, which creates a floating node in the sidebar on the right Drag and drop that floating node onto the other child profile Select "They are the same person" You will be immediate prompted to resolve this "parent conflict" -- choose "complete it later" at the bottom of the dialog Removed the bogus sibling relationship from step 1, if any View the child's tree Click the "edit" link on the node of one of the bogus siblings Click the tab labeled "Relationships" Wait 5-10 seconds for the site to find the cycle Click the "Remove Connection" button next to the bogus parent-child relationship ("... is ...'s son/daughter") If you used these options but would now like to use the new feature here is how you would fix this. Option 1 *Add the alternate profile to a spouse or partner of the the main profile. *In the relationship tab of the main profile, delete the relationship between the main profile and adoptive profile. *Merge the two profiles. *In Relationship tab, set the correct relationship of parents. Option 2 *In Relationship tab, set the correct relationship of parents.
2019-04-18T17:19:31
https://wiki.geni.com/index.php?title=Adoption&action=edit
0.999981
AAPL is trading at a premium to all four valuations above. When also considering the NPV MMA Differential, the stock is trading at a 161.8% premium to its calculated fair value of $85.49. AAPL did not earn any Stars in this section. AAPL earned no Stars in this section. The company has paid a cash dividend to shareholders every year since 2012 and has increased its dividend payments for 7 consecutive years. The NPV MMA Diff. of the $104 is below the $2,800 target I look for in a stock that has increased dividends as long as AAPL has. If AAPL grows its dividend at 10.5% per year, it will take 11 years to equal a MMA yielding an estimated 20-year average rate of 3.01%. The 11 years is more than the 10 years maximum I like to see. Peers: The company's peer group includes: Microsoft Corporation (MSFT) with a 1.6% yield, Oracle Corp. (ORCL) with a 1.5% yield and Alphabet Inc. (GOOG) with a 0.0% yield. Conclusion: AAPL did not earn any Stars in the Fair Value section, did not earn any Stars in the Dividend Analytical Data section and did not earn any Stars in the Dividend Income vs. MMA section for a total of zero Star. This quantitatively ranks AAPL as a 0-Star Avoid stock. Using my D4L-PreScreen.xls model, I determined the share price would need to decrease to $83.49 before AAPL's NPV MMA Differential increased to the $2,800 minimum that I look for in a stock with 7 years of consecutive dividend increases. At that price the stock would yield 3.3%. Resetting the D4L-PreScreen.xls model and solving for the dividend growth rate needed to generate the target $2,800 NPV MMA Differential, the calculated rate is 19.2%. This dividend growth rate is higher than the 10.5% used in this analysis, thus providing no margin of safety. AAPL has a risk rating of 2.25 which classifies it as a Medium risk stock. AAPL is a premium brand with high demand. It has a strong product pipeline with the opportunity to gain share in many end markets. With a low free cash flow of 24% (down from 26%), relatively low debt to total capital of 50% (up from 46%) and large cash holdings, AAPL in well positioned to grow its dividend for years to come. AAPL short dividend growth history keeps it out of my Dividend Growth Portfolio. The stock is trading well above is calculated fair value price of $85.49. As such, I will not likely to add to my position in the stock in the near future. Full Disclosure: At the time of this writing, I was long in AAPL (15.7% of my High Dividend Growth Portfolio).
2019-04-19T06:17:42
https://www.dividend-growth-stocks.com/2018/09/apple-inc-aapl-dividend-stock-analysis.html
0.999997
I have a scientific question, can light pass through light or would the beams cause some kind of resistance and stop mid way? Best Answer: Light waves pass through each other. In the region of overlap, the amplitudes of the waves add together. You will see interference patterns in this area. After the waves pass, they both continue on as if they never encountered each other. Yes you can pass light beams through each other. It gets more interesting if they are laser beams but flashlight beams cross without visibly affecting each other. Try it. Yes, it will pass through. You can test this for yourself with two flashlights set at 90 degree angle to each other. Test with two flashlights or cell phones.
2019-04-24T20:36:35
https://answers.yahoo.com/question/index?qid=20180719205525AARVRTx
0.999937
The paper Visualizing Business Ecosystems: Applying a Collaborative Modelling Process in Two Case Studies was presented at the Australasian Conference on Information Systems (ACIS 2019), Sydney, Australia. The authors (Anne Faber, Adrian Hernandez-Mendez, Sven-Volker Rehm and Florian Matthes) report from case studies of two companies that have instantiated ecosystem models following a collaborative approach. The paper has won the ACS Best Paper Prize (third place). The team of Florian Matthes, consisting of Ingo Glaser, and Elena Scepankova, has published their recent results on Classifying Semantic Types of Legal Sentences: Portability of Machine Learning Models at the 31st international conference on legal knowledge and information systems (Jurix). The paper is going to be presented at the conference from 12-14 December 2018, Netherlands, Groningen. Paper titled Paper titled Automatic Relation Extraction for Building Smart City Ecosystems using Dependency Parsing accepted at NL4AI. Understanding and analysing rapidly changing and growing business ecosystems, like smart city and mobility ecosystems, becomes increasingly difficult. However, the understanding of these ecosystems is the key to being successful for all involved parties, like companies and public institutions. Modern Natural Language Processing technologies can help to automatically identify and extract relevant information from sources like online news and blog articles and hence support the analysis of complex ecosystems. In this paper, we present an approach to automatically extract directed relations between entities within business ecosystems from online news and blog articles by using dependency parsing. In the era of digitalization, IT landscapes keep growing along with complexity and dependencies. This amplifies the need to determine the current elements of an IT landscape for the management and planning of IT landscapes as well as for failure analysis. The field of enterprise architecture documentation seeked for more than a decade for solutions to minimize the manual effort to build enterprise architecture models or automation. We summarize the approaches presented in the last decade in a literature survey. Moreover, we present a novel, machine-learning based approach to detect and to identify applications in an IT landscape.
2019-04-26T05:43:31
https://wwwmatthes.in.tum.de/blog/blogView?id=thb3mrinl9a1&page=2
0.999907
How Students May Be Cheating Their Way Through College Concern is growing at the nation's colleges and universities about a burgeoning online market, where students can buy ghost-written essays. Schools are trying new tools to catch it. Concern is growing at the nation's colleges and universities about a burgeoning online market, where students can buy ghost-written essays. Schools are trying new tools to catch it. UNIDENTIFIED STUDENT: I was kind of lost on what to do. And, like, even though I did my best to manage, deadlines come closer and closer, and it's just the pressure. SMITH: This student, a college freshman, says one night, when she was feeling particularly overwhelmed, she tweeted her frustration. UNIDENTIFIED STUDENT: It was like, someone please help me write my essay, and within the first few minutes, it was, like, five, six replies. SMITH: Send us the assignment; we'll write it for you, they offered. The student, who asked that her name not be used for fear of repercussions at school, picked one that cost $10 a page and breathed a sigh of relief. In the cat-and-mouse game of academic cheating, students know plagiarism will get caught by computer programs that automatically compare essays to a massive database of other writings. But to students like this one, buying an original essay seemed like a good workaround. UNIDENTIFIED STUDENT: Technically, I don't think it's cheating because, like, you're paying someone to write an essay, which they don't plagiarize, but they write everything on their own. SMITH: So they may not be plagiarizing, I say, but aren't you? UNIDENTIFIED STUDENT: That's just kind of a difficult question to answer. I don't know how to feel about it. It's kind of like a gray area. ASHLEY FINLEY: That - it just breaks my heart to think that this is where we're at. SMITH: Ashley Finley with the Association of American Colleges and Universities says campuses are buzzing about how to curb the rise in what they call contract cheating. Obviously, students buying essays is not new, but Finley says what used to be a small side hustle has grown through the Internet into a global industry of so-called essay mills. FINLEY: Definitely. This is really getting more and more serious. I think it's part of the brave new world, for sure. UNIDENTIFIED PERSON #1: Get instant help with your assignment. SMITH: The essay mills market aggressively online. UNIDENTIFIED PERSON #2: Don't lag behind, join the majority. UNIDENTIFIED PERSON #3: Don't worry, be happy. TRICIA BERTRAM GALLANT: Yeah, they - they're very crafty. SMITH: Tricia Bertram Gallant, head of academic integrity at UC San Diego, says companies are brazen offline as well; they leaflet on campuses, post ads in toilet stalls and fly banners over Florida beaches on spring break. They also bait students with emails that look like they're from official college help centers and Bertram Gallant says they pay social media influencers to promote them. BERTRAM GALLANT: It's very much a seduction. So you can maybe see why students could get drawn into the contract cheating world. SMITH: YouTube has cracked down on essay mills, pulling thousands of videos that they say promote dishonest behavior. But new ones constantly pop up, and their hard sell flies in the face of their small print that essays should be used only as a guide, not as a final product. Several essay mills declined or didn't answer our interview requests, but one called EduBirdie answered questions by email and offered up one of its writers. April Short (ph), a former teacher from Australia, says the idea that students may be turning in her work as theirs doesn't bother her. APRIL SHORT: These kids are so time-poor, and I don't necessarily think that being able to create an essay is going to be a defining factor in a very long career. And I actually applaud students that look for options to get the job done and get it done well. DAN ARIELY: Yeah, that's it. I mean, you know, this just shows you the extent of ability to rationalize all kinds of bad things we do. SMITH: Duke University psychology professor Dan Ariely says the rise in contract cheating is especially worrisome because more begets more; dishonest behavior, he says, is not just about a few bad apples. ARIELY: Instead, what we have is a lot, a lot of blemished apples, and we take the cues for our behavior from what we see people around us doing. SMITH: To curb essay-buying, schools are starting to use new technology, just as they did to fight plagiarism. BILL LOLLER: So the new product is called Authorship Investigate. SMITH: Bill Loller with the company Turnitin says the new software inspects document metadata, like when it was created, by whom and how many times it was edited. Then it looks at style. Everyone has a kind of writing fingerprint, Loller says, like whether you double-space after a period or whether you use Oxford commas. By comparing that to a student's other work, Loller says, suspicions can be confirmed or alleviated in minutes. LOLLER: At the end of the day, you get to a really good determination on whether the student wrote what they submitted or not. SMITH: Eventually, schools hope students will get the message that buying essays is risky on many levels - some companies' essays have been horribly written and even plagiarized, and when buyers complained, some companies turned to blackmail, threatening to tell their school they were cheating. But ultimately, experts say, fear of getting outed by shady businesses or by the latest technology may not deter students. Tricia Bertram Gallant from UC San Diego says the only right way to dissuade them from buying essays is to remind them why it's wrong. BERTRAM GALLANT: If we engage in a technological arms race with the students, we won't win. Our solution has to be about creating a culture where integrity and ethics matter. SMITH: And she says, only when learning is valued more than grades will students believe that cheating on essays is only cheating themselves. Tovia Smith, NPR News.
2019-04-19T23:51:11
https://www.npr.org/2019/04/08/710953499/how-students-may-be-cheating-their-way-through-college?utm_medium=RSS&utm_campaign=nprprogramsmorningedition
0.999999
George F. Will is a national columnist for the Washington Post. Without a definitive judicial ruling or other galvanizing event, a perennial American argument is ending. Capital punishment is withering away. It is difficult to imagine moral reasoning that would support the conclusion that an injustice will be done when, years hence, the death penalty finally is administered to Dzhokhar Tsarnaev, the Boston Marathon terrorist who placed a bomb in a crowd and then strolled to safety. Sentencing to death those who commit heinous crimes satisfies a sense of moral proportionality. This is, however, purchased with disproportionate social costs, as Nebraska seems to be concluding. Nebraska is not a nest of liberals. Yet soon its unicameral (and officially nonpartisan) Legislature may send to the governor a bill, passed unanimously by its Judiciary Committee, abolishing the death penalty. The 49-member Legislature has voted for it twice, 30-13 and 30-16. Gov. Pete Ricketts, a Republican, vows to veto it. This comes at a time when, nationwide, exonerations of condemned prisoners and botched executions are dismayingly frequent. Nebraska's death penalty opponents, including a majority of Nebraskans, say it is expensive without demonstrably enhancing public safety or being a solace to families of murder victims. Some Nebraska families have testified that the extended legal processes surrounding the death penalty prolong their suffering. That sentiment is shared by Bill and Denise Richard, whose 8-year-old son was killed by Tsarnaev. Last month, the U.S. Supreme Court heard oral arguments about whether one component of a three-drug mixture used in lethal injection executions — and recently used in some grotesquely protracted ones — is unreliable in preventing suffering that violates the Eighth Amendment proscription of "cruel and unusual punishments." States use the drug in question because more effective drugs are hard to acquire, partly because death penalty opponents are pressuring drug companies not to supply it. For this, Justice Antonin Scalia blamed a death penalty "abolitionist movement." Justice Samuel Alito asked, "Is it appropriate for the judiciary to countenance what amounts to a guerrilla war against the death penalty, which consists of efforts to make it impossible for the states to obtain drugs that could be used to carry out capital punishment with little, if any, pain?" Justice Anthony Kennedy wondered, "What bearing, if any, should be put on the fact that there is a method, but that it's not available because of opposition to the death penalty? What relevance does that have?" The answers are: Public agitation against capital punishment is not relevant to judicial reasoning. And it is not the judiciary's business to worry that a ruling might seem to "countenance" this or that social advocacy. The conservative case against capital punishment, which 32 states have, is threefold. First, the power to inflict death cloaks government with a majesty and pretense of infallibility discordant with conservatism. Second, when capital punishment is inflicted, it cannot later be corrected because of new evidence, so a capital punishment regime must be administered with extraordinary competence. It is, however, a government program. Since 1973, more than 140 people sentenced to death have been acquitted of their crimes (sometimes by DNA evidence), had the charges against them dismissed by prosecutors, or been pardoned based on evidence of innocence. For an unsparing immersion in the workings of the governmental machinery of death, read "Just Mercy" by Bryan Stevenson, executive director and founder of the Equal Justice Initiative. Third, administration of death sentences is so sporadic and protracted that their power to deter is attenuated. And the expensive, because labyrinthine, legal protocols with which the judiciary has enveloped capital punishment are here to stay. Granted, capital punishment could deter: If overdue library books were punishable by death, none would be overdue. But many crimes for which death is reserved, including Tsarnaev's crime of ideological premeditation, are especially difficult to deter. Those who favor capital punishment because of its supposed deterrent effect do not favor strengthening that effect by restoring the practice of public executions. There has not been one in America since 1937 (a hanging in Galena, Missouri) because society has decided that state-inflicted deaths, far from being wholesomely didactic spectacles, are coarsening and revolting. Revulsion is not an argument, but it is evidence of what former Chief Justice Earl Warren called society's "evolving standards of decency." In the essay "Reflections on the Guillotine," Albert Camus wrote, "The man who enjoys his coffee while reading that justice has been done would spit it out at the least detail." Capital punishment, say proponents, serves social catharsis. But administering it behind prison walls indicates a healthy squeamishness that should herald abolition.
2019-04-24T08:14:29
https://www.news-leader.com/story/opinion/contributors/2015/05/20/will-withering-death-penalty/27650121/
0.999926
Pastor Rick Warren and former British Prime Minister Tony Blair shared an evening conversation Sunday in front of more than 2,600 people about faith, the Middle East, globalization, and 9/11. Speaking at the seventh Saddleback Civil Forum, Blair told Warren that he believes the most important issue in the long term is centered on faith. As diverse people are forced to live together, he said at Saddleback Church in Lake Forest, Calif., the key question is, "How do we find common understanding?" "Faith teaches you to understand there is something more important than yourself, which is an important principle in working toward a better world. If individuals can see people of faith in action, helping in support of others, it makes this process of globalization easier," Blair said. The former prime minister also said, "If faith doesn't have a major role, then the risk is a process of globalization without values, without beliefs, without conviction." Warren, who founded one of the largest churches in America, invited Blair to participate in the forum on "Peace in a Globalized Economy." Past civil forum guests include former President George W. Bush, Rwandan President Paul Kagame, and then presidential candidates Barack Obama and John McCain. Blair, who serves as the Envoy of the Quartet (United States, the United Nations, the European Union and Russia) on the Middle East, also said that he wants to see a world "where people of different faiths can reach out and understand about someone's faith that is different than their own." "In this world, faith is part of the future and of progress – not a distant relic of the past," he said. Warren shared that people should not just tolerate people of different faiths than theirs, but treat others with dignity. "Interfaith dialogue doesn't mean compromising your faith or finding the lowest common denominator, but explaining each other's faith for better understanding," Warren explained. One of the highlights of the night was when Blair received standing ovations for his leadership during the 9/11 attacks on the United States. "In the face of evil, bystanders are no better than perpetrators," Warren said to Blair. "I can say on behalf of America, thank you for your leadership." Blair said that some people questioned his ardent support for the United States after the 9/11 attacks. But he explained that his response to the terrorist attacks was not only about supporting America, but about defending a belief system. "For me, 9/11 was not simply an attack on America," Blair said. "It was an attack on a belief system, which we share. People would say, 'Why were you so much with America?' I used to say, look, it wasn't for America, it was for our own country. If we weren't going to stand with you at that time, then we weren't showing conviction in our values, because that was what was being attacked." Regarding the Middle East, Blair spoke about how people want democracy but the challenge is developing how that would look practically. He said democracy is more than the right to vote every four years, but "the right to vote should lead to other freedoms." Blair also warned that when a country is in disarray and disorganized, extreme Islamists are "very organized." "That's why we must get behind the people and support … we must help them construct the institution and systematic change," he stressed. Blair, who is founder of the Tony Blair Faith Foundation – which promotes respect and understanding between major religions – also shared his thoughts on what makes a good leader. "Leadership is not about not being a normal human being-you are." Blair said. "As that mantle of responsilbity floats by, it's despite your fear and despite your self doubt and everything that you know could go wrong, you take the mantle and put it on. "Great leaders are very humble and know their own weaknesses." At the end of the night, Rick Warren and his wife Kay presented Blair with the third International Medal of PEACE for promoting reconciliation and advancing the goals of the PEACE initiative: Promote reconciliation, Equip servant leaders, Assist the poor, Care for the sick, and Educate the next generation. "Tony Blair's commitment to reconciliation and peace in the Middle East is something we want to honor, and the Network of Purpose Driven Churches in 168 countries have chosen him as the recipient of the Third annual International Medal of PEACE," said Warren as he presented the award. Past winners of the PEACE medal include former President George W. Bush in 2008 for his work in caring for those infected with AIDS in Africa, and Rwandan President Paul Kagame for his work on reconciliation following his country's genocide.
2019-04-18T17:05:31
https://www.christianpost.com/news/rick-warren-tony-blair-talk-about-faith-mideast-9-11-49308/
0.999932
LONDON (AFP) - Celtic's Brendan Rodgers distanced himself from replacing Arsene Wenger on Saturday (April 21) amid reports that Luis Enrique was being lined up by Arsenal to succeed their veteran manager. Wenger, whose position has long been under intense scrutiny, announced Friday he would be bringing down the curtain on his near 22 years in charge of the north London club at the end of the season. Rodgers has been touted as a potential successor but the former Liverpool boss told BBC Scotland: "There's nothing really in it. I have always said I'm extremely happy here." Rodgers has revived his reputation in nearly two years in Scotland after a troubled end to his three-and-a-half years at Liverpool in 2015, leading Celtic to the brink of back-to-back domestic trebles in Scotland. Arsenal haven't won the Premier League title since 2004 and now face a second successive campaign where they will finish outside the top four. They'll also likely need to win the Europa League - Wenger's men are in the semi-finals - to qualify for Europe's elite Champions League tournament. Wenger had faced repeated calls to quit from frustrated Gunners' fans but the 68-year-old Frenchman had remained steadfast in wanting to carry on. Yet for all that he won three Premier League titles and a record-breaking seven FA Cups, the pressure caused by more than a decade without the English title and the more recent failure to qualify for this season's Champions League, finally appear to have taken their toll. Getting Arsenal back among a top four now featuring Manchester City, Manchester United, Liverpool and Tottenham would be a feather in the cap of whichever Gunners manager achieved the feat. "They want to get back towards Champions League football," said Rodgers. "It's a fantastic club but, for me, my only focus is on Celtic and doing the very best I can for them." Another possible contender, former Arsenal captain Patrick Vieira, also ruled himself out of the running. The manager of MLS side New York City told US media: "I am always flattered to hear my name linked with different football clubs. That is good for your ego but at the same time, I am happy here." Meanwhile, the Daily Mail reported Enrique was being lined up to replace Wenger," saying only an "unexpected glitch in talks that are "well-advanced" could derail the appointment of the 47-year-old former Barcelona boss. Enrique, who played for both Barcelona and arch-rivals Real Madrid, is currently on sabbatical in Spain. The Mail said Arsenal's new director of football relations Raul Sanllehi, who forged a close relationship with Enrique at Barcelona, had made an approach, with the two men recently seen having dinner together at an exclusive London club. Arsenal chief executive Ivan Gazidis refused to mention specific candidates to succeed Wenger during a press conference on Friday, although he did say he wanted the club to continue to play a similar brand of football. "We are not going to find a replacement for Arsene Wenger for a variety of reasons," said Gazidis. "It's going to be a condensed summer with a World Cup in the middle and a shortened transfer window, so I think for all of us having that clarity sooner is better," he explained, with Germany coach Joachim Loew also linked with the job. Gazidis added: "It is important to me we continue the football values that Arsene has instilled in the club." Former Arsenal striker Ian Wright, who played under Wenger, found it hard to believe his old boss had resigned with a year left on his current deal. "Arsene Wenger is a man of principle, honesty and integrity - that is why I am convinced he has been sacked and not resigned," Wright told Saturday's edition of The Sun tabloid. "For all the vitriol and abuse thrown at him, Arsene has never been a man to walk out before the end of a contract." Despite the tense nature of his relationship with Arsenal fans in recent years, Wenger is expected to get a warm reception when he begins his farewell tour on Sunday as the Gunners host West Ham.
2019-04-26T02:44:48
https://www.straitstimes.com/sport/football/football-rodgers-rules-out-replacing-wenger-as-arsenal-eye-enrique
0.99794
Gordon Brown today launched Labour's election campaign with an appeal to disillusioned voters to 'take a second look' at his party's policies. Under the slogan 'A Future Fair for All', the Prime Minister put activists on a war footing and accused the Tories of being out of touch with Britain's 'mainstream majority'. Mr Brown signaled that the economy will dominate his appeal to voters - with efforts to secure recovery making up three of his four key themes. 'My message to the people of Britain today is simple,' he told the high-profile gathering at Warwick University. But the slogan drew immediate ridicule from rival party leaders who said he had presided over a 13-year failure to make Britain fairer. Tory leader David Cameron said: 'The truth is it's the very people that Gordon Brown says he's fighting for who have actually suffered the most. Gordon Brown told his audience that Labour were 'the changemakers' in the election and set out the four key themes for the campaign. 'First, we must secure the recovery, not put it at risk. Second, we must support new industries and future jobs. Mr Brown's rallying speech, on his 59th birthday, had raised speculation that he was set to announce an earlier election date than the anticipated May 6 poll. Mr Brown's confident speech contained no pre-election policy announcements but it represented a significant escalation of preparations for the poll. He arrived on stage to the strains of Jackie Wilson's "(Your Love Keeps Lifting Me) Higher and Higher" after speeches from cabinet colleagues including Chancellor Alistair Darling and Business Secretary Lord Mandelson. He accused the Tories of planning a series of cuts that would hit the 'mainstream majority' and harm the economy: spending cuts this year; an end to cancer and GP guarantees; axing some child benefit and children's centres; tax cuts for wealthy estates; retaining hereditary peers and overturning the ban on fox hunting. And he seized on recent Tory document that mistakenly claimed more than half of girls in some parts of the UK were pregnant by the age of 18 - it is in fact 5%. 'Can they claim they know the aspirations of mainstream Britain when they so clearly understand so little of how we live?' he asked to cheers. 'When it comes to the most vulnerable people in our society, if you put partisan point scoring before a consensus on social care, real families really suffer. 'If you frighten people with made up figures on crime, real families really suffer. 'And if you talk Britain down in the middle of a recession and undermine confidence, real families really suffer. Mr Brown's speech comes as Labour's election co-ordinator Douglas Alexander said the party wanted to tap into a 'submerged optimism' among voters about the future. 'If you look at the voters' mood there is anxiety and anger over bankers' bonuses, expenses and the recession, a general sense of grumpiness,' the International Development Secretary told The Guardian. 'But sitting beneath that is a submerged optimism. What people want is a sense of a better future to come. 'We are not denying times are tough, but it has been a different kind of recession. Why is crime down, not up? Why is unemployment half what some people expected, including the Government? Mr Alexander said middle-income female voters with children were being targeted by Labour warnings that they would lose children's centres and tax credits if the Tories took power. Ministers will be sent out across the country as part of what the party said would be a 'street by street' fight for victory in the general election. The weekend will also see Labour mailshots sent to thousands of voters in key marginal seats and local parties given 'Operation Fightback' packs including magazines, stickers and 'key doorstep messages' for campaigning 'throughout the weekend and coming weeks'. But party sources played down suggestions that today's high-profile event signalled that Mr Brown had decided on an earlier election than the anticipated May 6 poll. Unlike other parties, cash-strapped Labour is not holding a full spring conference so this weekend's 300-strong event is being used to effectively launch the campaign. Political differences over how best to tackle the UK's record £178 billion deficit have dominated exchanges in the run up to the election. Shadow chancellor George Osborne said the PM should stop 'dithering' and name the date for the election - which must be held by June 3. 'In the end the public have to decide in an election. I want that election as soon as possible. 'Instead of Gordon Brown having election rallies why doesn't he stop dithering and tell us when the election is actually going to be,' he said. Shadow chancellor George Osborne said: 'Gordon Brown had nothing positive or new to offer Britain in today's speech and is taking people for fools. 'He asks Britain to take a second look at Labour when the public have been looking at them for 13 years and know they have failed. 'They have failed on fairness and failed to find a credible plan for economic recovery. Five more years of Gordon Brown won't change anything.
2019-04-24T01:05:50
https://www.dailymail.co.uk/news/article-1252476/Election-lose-declares-Brown-launches-Operation-Fightback.html
0.999025
We are told that in this week's Torah portion, Parashat B'ha-a lot'kha, "Miriam and Aaron spoke despairingly of Moses and the Cushite woman he had married." They said, "Has Adonai spoken only through Moses? Has God not spoken through us as well?" The real questions of this episode are: What prompts Moses' sister and brother to protest against him? Why does it appear to be a public matter rather than a private, "intra-family" discussion? Some commentators express surprise, claiming that there is no apparent explanation for Miriam's and Aaron's criticism of Moses. Others argue that the explanation is clearly offered in the text. Are we not told, they point out, that Moses' sister and brother condemn him for his marriage to a Cushite woman and for acting as if God speaks exclusively through him? Those maintaining that there is no apparent explanation for Miriam's and Aaron's criticism respond that while the Torah text provides a hint of an explanation, it does not offer any evidence that Moses claimed to speak "exclusively" for God. Given this justified difference of opinion, the real question is: How do we make sense of this troubling Torah story? Why do Miriam and Aaron speak against their brother, and why is Miriam more severely punished? The crux of this issue is whether Aaron and Miriam are upset with Moses for marrying a second wife (other than Zipporah), or are they upset because she is not an Israelite? In the first scenario, the commentators, including Rashi, read into this that we should only have one husband or wife in our lives. This answer is convenient in hindsight. Looking back at the Torah, many characters have multiple wives after Moses, and this is simply the medieval commentators placing their own values on the issue. The second reason for the complaint is even more interesting. During Biblical times, it was common for Israelites to marry someone from a different tribe or religion. However, by the time the medieval commentators made their remarks, this was not the norm. Many read into this that we are only to marry Jews and should be chastised if we intermarry. While some may carry this view, I think the scenario is much more nuanced. The fact that Miriam is punished for her complaint shows that God understands that not every Jew will marry another Jew, including Moses! In our time, intermarriage is certainly prevalent. There are those who simply shun others who marry a non-Jew. I would like to suggest that instead of pushing intermarried couples away, we should take the time to embrace them and reach out (keruv) and welcome them. At Agudas, we have recently created a new keruv committee that works on ways we can reach out to intermarried families and substantiate that there is a place for all at Agudas. We are working diligently at changing our literature and website, while creating programs to help make our synagogue even more inviting and welcoming. It does seem poignant and apropos when we read the words Moses uttered to his non-Jewish father-in-law, "Come with us and we will be generous with you." I have said it before and I say it again, All Are Welcome!
2019-04-20T19:04:24
http://www.rabbijeffreyabraham.com/congregation-sons-of-israel/2016/3/19/cho62ngcoux5yvsxajr4o5mgy1fjvk
0.99864
What's the difference between a platform-based business model and a platformed enterprise? A platformed enterprise (PE), however, is more about strategic alignment -- focused on orchestrating all elements of an enterprise (including its extended ecosystem) around differentiated, sustainable value creation. With this definition in mind, I'd argue that 100% of Apple's revenue comes from being a PE. Just like a technology platform that defines the standards and rules for applications that sit on top, Apple has applied a brand- or enterprise-level platform (Think Different) that defines the rules and standards required to seamlessly interconnect everything that sits on top; all of its products behave according to the rules of the platform, enabling flexibility and endless extendibility into new markets. A PE is an apple tree that grows apples (PBBMs). But a large, complex organization can't take a solitary apple (PBBM) and expect it to produce more fruit anytime soon. Disruptors born in the internet age are accomplished at PBBMs precisely because they are also PEs. They serve specific customers with specific jobs to be done, and orient their entire business around differentiated value creation across a wider ecosystem. The PE enables organizations to simplify complexity, and therefore expand far beyond the boundaries of traditional firms. Platformed enterprises require a fundamentally different mindset than traditional business -- it's a shift from a mechanistic, linear "machine-based" metaphor to a biological, living-systems metaphor. A living system is inherently adaptable and resilient, able to self-organize around shared purpose and complementary value exchange. However, these "tack-on" PBBMs do nothing to evolve the overall organization to succeed in today's complex, fast-paced environment. The underlying platform-based mindset and operational approach must be applied to the entire business. If you're not jiving with my tree metaphor, think in terms of operating systems. You can't run Apple's Keynote on a typical PC. You can either run Keynote on a stand-alone Apple computer that's disconnected from your network, or you change your entire operating system so that everything plays by the same rules. If your organization is running off of the traditional operating system that we inherited from Henry Ford 100 years ago, tacking on a platform-based business model will only get you so far. You'll need to shift your business to an entirely new operating system to compete head-to-head with Internet-era-born disruptors. For more on platformed enterprises, start following our series on the Value Platform, a strategic model designed to help traditional businesses evolve to a more future-ready operating system.
2019-04-25T12:15:27
https://fartherbound.com/news/2019/1/18/whats-the-difference-between-a-platform-based-business-model-and-a-platform-based-business
0.996922
How much is Corey Maggette Worth? Corey Maggette Net Worth and salary: Corey Maggette is an American professional basketball player who has a net worth of $30 million. Born in 1979 in Melrose Park, Illinois, Corey Maggette played college basketball in North Carolina at Duke University from 1998 until 1999 when he was drafted with the 13th overall pick to the Seattle SuperSonics. He was promptly traded to the Orlando Magic without suiting up for the SuperSonics. Maggette played for the Los Angeles Clippers from 2000 until 2008, the Golden State Warriors from 2008 until 2010, the Milwaukee Bucks from 2010 until 2011, the Charlotte Bobcats from 2011 until 2012, and the Detroit Pistons from 2012 until 2013. He made one appearance in the playoffs with the Clippers during the 2006 season. Maggette and the Clippers played 12 games; he averaged 15.3 points per game during the postseason run. As of the fall of 2014, Maggette is currently a free agent and coaches basketball at a Newport Beach-area high school. Maggette is active in several off-the-court charitable events, working with children to help get them excited about reading when he was parts of the Clippers. He established the Corey Maggette Flight 50 Basketball Camp in 1999, which attracted hundreds of participants every year. A few years later, he created the Corey Cares Foundation to help with at-risk youth in his community.
2019-04-24T01:51:05
https://www.celebritynetworth.com/richest-athletes/nba/corey-maggette-net-worth/
0.999969
Would Edmund Burke have been a member of the 'Tea Party,' or could he even have been the GOP's next presidential candidate? Find out in this lesson when you learn more about the ideology and works of this fundamental but forgotten political theorist. With as crazy as politics (and politicians) can seem in the U.S., we might have a hard time figuring out exactly what each individual or faction is trying to accomplish. However, we can usually at least tell the difference between the two major political parties: Democrats and Republicans. For the most part, Democrats are considered 'liberal,' advocating more government spending and involvement as well as dramatic social and political change. On the other hand, Republicans tend to favor lower taxes and a system that preserves a people's traditional sociopolitical values and institutions known as conservatism. American conservatives actually owe their origins (probably much to their chagrin) to a British political philosopher, Edmund Burke. The political ideas contained in Burke's speeches and writings from the mid-to-late 18th century were crucial in the formation of modern conservatism worldwide. Despite his underlying influence, however, Burke has been largely forgotten or neglected by political theorists in the modern era. 1) Sociopolitical change should be gradual and continuous. Being conservative, Burke strongly believed in the preservation of certain values and institutions (i.e. social stratification), but thought they should adapt to fit changing ideas and circumstances. Many in America today follow similar trains of thought, such as the many conservatives who fight to preserve Christian ethics as fundamental principles to our society. 2) Politics is based on practical experience rather than theoretical principles. One of the major critiques Edmund had of the French Revolution was that much of the action taken during the conflict was based on abstract (and so unsound) concepts. He held that sociopolitical systems were built from ages of mindfully deliberate human interaction, and that this wealth of experience was worth much more than an abstraction. 3) Societies and their members create their identities. With so many different types of people living in America, we might find it difficult to describe a coherent 'American society.' According to Burke, though, each society has its own distinct identity and it gives that identity to its members, and vice versa. For instance, American society identifies its members as diverse people, and likewise, America's diverse citizenry identifies American society as the 'melting pot' we know it as today. Come take a closer look at some of Burke's ideas in a few of his works, which sometimes have even more to do with America than you might think! When Americans think about the Revolution, it's culturally ingrained in us to see the British as our enemies, so it might be hard for some of us to imagine there was anyone pulling for us back in England. Though a prominent British politician of his day, Edmund Burke was a native Irishman who openly opposed British oppression not only in Ireland but in India and the American colonies, as well. Between 1774 and 1775 - as things were really heating up across the Pond - Burke delivered two Speeches on Conciliation with America, in which he urged the British government to consider the costs of aggression with the colonies resulting from inflexibility and a refusal to acknowledge the colonists' rights and roles as British subjects. Of course, Burke was unable to prevent hostilities from escalating to all-out war in the American colonies, and this was precisely the sort of useless waste that he wanted to avoid. When he wrote this critique of the French Revolution in 1790, Burke was able to fully expound on why such revolutionary activities should be avoided. As a conservative, Edmund favored more restrained policies and actions based on real principles rather than abstract concepts when it came to changing governmental institutions. Violent conflicts like the French Revolution, then, were too much of a shock to the sociopolitical system, which led Burke to predict other bloody conflicts that eventually came true with the conquest and fall of Napoleon. While a traditionalist at heart, Burke thought these traditions could (and should) gradually adapt to peoples' changing sensibilities. In his mind, that was the only real way that you could prevent people from condemning these traditions and effectively destroying the nation's sociopolitical foundations in the process. Even before he had spoken out against the violence of the French Revolution, Edmund had already described the eventual outcome of a sociopolitical movement based on bloodshed in trying to avoid that fate in the Colonies. You've probably heard the phrase 'Absolute power corrupts absolutely,' and it's definitely related to Burke's sentiment here. Although he firmly believed in the exercise of executive authority, he understood the inherent risks in allowing any one individual or group to have too much.
2019-04-22T18:41:01
https://study.com/academy/lesson/edmund-burke-philosophy-works-quotes.html
0.998253
1. Install the rear door frame first. 2. Set the door frame pin into the hole on top of the body side, just behind the rear door opening. 3. Position the top of the door frame against the metal sport bar and press onto the side bar making sure not to pinch the material of the sports bar covers and to ensure it is properly positioned on the seal above the front of the rear door. 4. Loosely install the rear knob (long knob) to hold the door rail in position. 5. Carefully set the front of the front door frame in the rubber seal at the top of the windshield. 6. Clip the front of the door rail over the side bar making sure that the material for the side bar cover is not pinched by the door frame. 7. Position the rear of the front door frame to lay on top of the front of the rear door frame. Ensure the seals are installed correctly to avoid water leaks. 8. Loosely install both knobs beginning with the front knob (long knob). Then, install the middle knob (short knob) through the front and rear door frames and screw into the top of the B-pillar. 9. Tighten the front knob, then the rear most knob, and then the middle knob. Repeat this procedure for the other side.
2019-04-21T18:40:30
http://www.jeeclub.com/reco-542.html
0.999698
A method and system includes updating an accumulated dispense value from within a toner dispense actuation loop and adjusting the accumulated dispense value by receiving dispense values from at least one control loop element that operates asynchronously from the toner dispense actuation loop. A temporary accumulated dispense value is stored when it is greater than or equal to a predetermined dispense saturation upper limit, or is less than or equal to a predetermined dispense saturation lower limit. An adjusted accumulated dispense value is calculated by subtracting the accumulated dispense value from the temporary accumulated dispense value and multiplying the difference by a predetermined optimized limit gain. A new accumulated dispense value is calculated by adding the adjusted accumulated dispense value to the accumulated dispense value. A toner dispense motor is activated for a time period equal to the on time value, and the on time value is subtracted from the new accumulator value. 1. A computer-implemented method comprising: receiving, by a processor, dispense values from at least one control loop element regarding an amount of marking material needed to be dispensed for a printing engine; accumulating said dispense values within a computer readable storage medium as an accumulated dispense value, using said processor; comparing said accumulated dispense value with a predetermined upper limit dispense value and a predetermined lower limit dispense value, using said processor; setting a temporary value equal to said predetermined upper limit, using said processor, when said accumulated dispense value is greater than or equal to said predetermined upper limit dispense value; setting said temporary value equal to said predetermined lower limit, using said processor, when said accumulated dispense value is less than or equal to said predetermined lower limit dispense value; subtracting said accumulated dispense value from said temporary value to obtain an intermediate value and multiplying said intermediate value by an optimized limit gain to produce an updated dispense value, using said processor; adding said updated dispense value to said accumulated dispense value to produce an updated accumulated dispense value, using said processor; comparing said updated accumulated dispense value with a time limit, using said processor; and activating a toner dispense motor for said time limit and subtracting said time limit from said updated accumulated dispense value, using said processor, when said updated accumulated dispense value exceeds said time limit. 2. The computer-implemented method according to claim 1, said at least one control loop element comprising a pixel counter dispense loop. 3. The computer-implemented method according to claim 1, said at least one control loop element comprising a toner concentration (TC) sensor dispense control loop. 4. The computer-implemented method according to claim 1, said optimized limit gain including a user defined and optimized value for a specific developer housing. 5. The computer-implemented method according to claim 1, said toner dispense motor comprising a DC motor operating under control of said updated accumulated dispense value. 6. The computer-implemented method according to claim 1, said computer readable storage medium being decoupled from and operating asynchronously from said at least one control loop element. 7. A computer-implement method comprising: updating, by a computing device, an accumulated dispense value from within a toner dispense actuation loop; adjusting, by said computing device, said accumulated dispense value by receiving dispense values from at least one control loop element that operates asynchronously from said toner dispense actuation loop; one of, storing, by said computing device, a temporary accumulated dispense value equal to a predetermined dispense saturation upper limit when said accumulated dispense value is greater than or equal to said predetermined dispense saturation upper limit; and storing, by said computing device, said temporary accumulated dispense value equal to a predetermined dispense saturation lower limit when said accumulated dispense value is less than or equal to said predetermined dispense saturation lower limit; calculating, by said computing device, an adjusted accumulated dispense value by subtracting said accumulated dispense value from said temporary accumulated dispense value and multiplying the difference by a predetermined optimized limit gain; determining, by said computing device, a new accumulated dispense value by adding said adjusted accumulated dispense value to said accumulated dispense value; and activating a toner dispense motor for a time period equal to an on time value, and subtracting said on time value from said new accumulator value based on determining, by said computing device, when said new accumulated dispense value is greater than or equal to said on time value. 8. The computer-implement method according to claim 7, said updating of said accumulated dispense value being performed at a first frequency. 9. The computer-implement method according to claim 7, said toner dispense motor comprising a DC motor located within a developer housing of a printing engine. 10. The computer-implement method according to claim 7, said at least one control loop element comprising at least one of: a pixel counter dispense control loop transmitting dispense values to update said accumulated dispense value at a second frequency; and a toner control sensor dispense control loop transmitting dispense values to update said accumulated dispense value at a third frequency. 11. The computer-implement method according to claim 10, said second frequency being equivalent to processing each received image panel, and said third frequency being equivalent to a predetermined period of time. 12. The computer-implement method according to claim 10, said pixel counter dispense control loop transmitting said dispense values equivalent to a pixel time value equal to a product of a pixel counter value and a pixel gain value. 13. The computer-implement method according to claim 10, said toner control sensor dispense control loop transmitting said dispense values equivalent to a toner control sensor time value equal to the sum of a proportional gain component of an error signal and an integral gain component of said error signal. 14. A printing device comprising: a toner concentration (TC) controller that has a dispense time accumulator buffer; at least one control loop that transmits a dispense value to one of increment and decrement said dispense time accumulator buffer; a toner dispense actuation loop that controls a toner dispense motor based on updating a value of said dispense time accumulator buffer; and a developer housing that includes said toner dispense motor, toner, a developer and a toner concentration (TC) sensor for a printing engine, said at least one control loop comprising a toner concentration (TC) sensor dispense control loop that generates said dispense value based on said toner concentration (TC) sensor in said developer housing by summing a proportional gain component of an error signal with an integral gain component of said error signal. 16. The printing device according to claim 14, said at least one control loop comprising a pixel counter dispense loop that generates said dispense value based on a pixel counter element equal to a product of a pixel counter value with a pixel gain value. 17. The printing device according to claim 14, said toner dispense actuation loop updating said value of said dispense time accumulator buffer at a first frequency different from at least one second frequency of said at least one control loop transmitting said dispense value to one of increment and decrement said dispense time accumulator buffer. 18. The printing device according to claim 14, said toner dispense motor comprising a DC motor. 19. A printing device comprising: a toner concentration (TC) controller that has a dispense time accumulator buffer; at least one control loop that transmits a dispense value to one of increment and decrement said dispense time accumulator buffer; a toner dispense actuation loop that controls a toner dispense motor based on updating a value of said dispense time accumulator buffer; and a developer housing that includes said toner dispense motor, toner, a developer and a toner concentration (TC) sensor for a printing engine; said toner concentration (TC) controller calculates an adjusted dispense time accumulator buffer value by determining a difference between said dispense time accumulator buffer value and one of an upper and a lower saturation limit, by determining a product by multiplying said difference by a predetermined optimized limit gain value, and by determining a sum of adding said product to said dispense time accumulator buffer value. 20. The printing device according to claim 14, wherein said printing engine comprises one of an electrostatic and a xerographic printing engine. The embodiments herein generally relate to printing devices and, more particularly, to an optimized limit gain component for a dispense time accumulator of a toner concentration control for dispensing toner in a developer housing of a printing engine. In general, all printing engines have some form of "Toner Concentration (TC) Control" to maintain the desired amount of toner in a developer housing, which is usually achieved by means of dispensing toner into the developer housing by actuation of the dispense motor to maintain the desired image quality metrics. For cost savings, it is desirable to use DC motors instead of servo or stepper motors. To enable this, the concept of a dispense time accumulator/buffer is commonly used to enable decoupling of controls and actuation. Use of this concept moves the dispense model away from simple classic continuous or discrete time-invariant systems, making it more complicated. However, one cannot directly apply the commonly used anti-windup architecture (which is directed toward the Integral (I) part of a Proportional-Integral (PI) control loop) that is applied only to synchronous, coupled systems. Therefore, the embodiments herein implement an equivalent anti-windup component in an accumulator/buffer that is decoupled and asynchronously operating from any control loop. Since all actuators have physical limitations, a DC motor in a developer housing having a limited and finite velocity may have severe consequences for a PI (Proportional, Integral) controller, where integral action is an unstable mode. While this does not cause any difficulties when the loop is closed, a feedback loop will be broken when an actuator saturates (because the output of the saturating element is not influenced by its input). The unstable mode in the controller may then drift to very large values. When the actuator desaturates, it may take a long time for the system to recover, or it may also oscillate several times between high and low before the system recovers. Integrator windup occurs due to the saturation in the actuator where the control signal saturates immediately when the step is applied. The control signal then remains in saturation level and the feedback is broken and the integral part continues to increase because the error is positive. The integral part starts to decrease when the process output has become larger than the setpoint, but the process output remains saturated because of the large integral part. Slowly, the process output decreases towards the setpoint. The net effect of this process is a large overshoot called, "integrator windup." The controller operates linearly only if the process output is in the range of the minimum and maximum output, and the controller output saturates when the process output is outside this range. A controller models in parallel form with the anti-windup scheme having extra proportional band variables equal to the minimum and maximum output based on the integral part. Thus, integrator windup can be avoided by making sure that the integral is kept to a proper value when the actuator saturates so that the controller is ready to resume action, as soon as the control error changes. However, anti-windup architectures have been only applied to synchronous, coupled systems and not to asynchronous, decoupled systems such as a Toner Concentration Control loop having an accumulator/buffer. The embodiments herein provide a way of achieving an equivalent anti-windup component as an optimized limit gain in systems that use a decoupled, asynchronous dispense time accumulator/buffer. In accordance with one embodiment, a computer-implemented method receives dispense values from at least one control loop element regarding an amount of marking material needed to be dispensed for a printing engine and accumulates the dispense values within a computer readable storage medium as an accumulated dispense value. The accumulated dispense value is compared with a predetermined upper limit dispense value and a predetermined lower limit dispense value. A temporary value is set equal to the predetermined upper limit, when the accumulated dispense value is greater than or equal to the predetermined upper limit dispense value. Alternatively, the temporary value is set equal to the predetermined lower limit, when the accumulated dispense value is less than or equal to the predetermined lower limit dispense value. The accumulated dispense value is subtracted from the temporary value to obtain an intermediate value. The intermediate value is then multiplied by an optimized limit gain to produce an updated dispense value. The updated dispense value is added to the accumulated dispense value to produce an updated accumulated dispense value which is compared with a time limit. A toner dispense motor is activated for the time limit and the time limit is subtracted from the accumulated dispense value, when the updated accumulated dispense value exceeds the time limit. In accordance with another embodiment, a computer-implement method updates accumulated dispense value from within a toner dispense actuation loop, and adjusts the accumulated dispense value by receiving dispense values from at least one control loop element that operates asynchronously from the toner dispense actuation loop. A temporary accumulated dispense value is stored when the accumulated dispense value is greater than or equal to a predetermined dispense saturation upper limit, or when the accumulated dispense value is less than or equal to a predetermined dispense saturation lower limit. An adjusted accumulated dispense value is calculated by subtracting the accumulated dispense value from the temporary accumulated dispense value, and multiplying the difference by a predetermined optimized limit gain. A new accumulated dispense value is calculated by adding the adjusted accumulated dispense value to the accumulated dispense value. A toner dispense motor is activated for a time period equal to the on time value, and the on time value is subtracted from the new accumulator value based on determining when the new accumulation variable is greater than or equal to the on time value. In accordance with an additional embodiment, a printing engine system includes a toner concentration (TC) controller that has a dispense time accumulator buffer and at least one control loop that transmits a dispense value to increment or decrement the dispense time accumulator buffer. A toner dispense actuation loop controls a toner dispense motor based on updating the value of the dispense time accumulator buffer. The developer housing includes the toner dispense motor, toner, a developer and a toner concentration (TC) sensor for the printing engine. With these features, the embodiments herein provide an equivalent anti-windup component as an optimized limit gain in systems that use a decoupled, asynchronous dispense time accumulator/buffer. FIG. 6 is a schematic diagram that illustrates a multipass color electrophotographic imaging machine in which embodiments herein may be deployed. FIG. 1 is a block diagram illustrating toner concentration modeling that may be implemented for each developer housing 44, 54, 56, or 58 of the imaging machine of FIG. 6 discussed below in order to carry out embodiments herein. FIG. 1 represents actual response times and propagation delays due to toner mixing and transport within the development housing 131, as well as delays between density sensing and toner dispensing to generate appropriate control signals for toner concentration controller 132. These are generally fixed values, but may be adjusted periodically or otherwise to account for machine aging. In addition, time delays and behavioral values of the various elements of the developer housing module 131 are characteristic of, and unique to each different type of imaging machine. A toner concentration controller 132, which may be implemented by ESS 32 (shown in FIG. 6), responds to signals from module 131 to control replenishment of toner from, for example, toner supply 51 of FIG. 6. A controller 132 also responds in a conventional manner to print-by-print pixel counter information to replenish toner based on coverage area of original document 16 and to image density sensor 146 that supplies a feedback signal to electrostatic controller 144 every ten to one thousand print cycles. The optional electrostatic voltmeter 148 can cyclically supply a feedback signal to electrostatic controller 144 to maintain electrostatic set points within predetermined ranges. Optionally, a photoreceptor cyclic module 150 may be provided to model the behavior of photoreceptor 10 to compensate for start-up transient conditions. Power supplies 162 and halftone module 160 receive outputs from the electrostatic controller for adjustment on a per print basis. Parameters of development housing module 131 represent actual developer housing dynamics of the imaging machine. Toner concentration sensor 100 indicates the actual concentration of toner in the developer mixture 46 of FIG. 6 at a specific point in the flow path of the development unit, while development roll 152 is equivalent to development roll 48 of FIG. 6, for example. Time delays 151, 153, and 155 are based on the type and characteristics of the particular imaging machine. Such delays, among other things, reflect the time period for transport of developer material between and among the developer reservoir, transport rolls, developer rolls at the development stations during development of the latent image, or other behavioral characteristics of the developer housing or the imaging machine that impact toner density. A density sensor 146 senses actual print density of the developed latent image at a sample interval of, for example, ten to one thousand prints, in order to compensate for long-term drift. The density signal is applied to the toner concentration (TC) controller 132 and the electrostatics controller 144. The acquisition of density data, usually obtained from a test patch on or near the developed latent image, requires a very high bandwidth in a data path between the density sensor and the ESS 32, which processes the density data in order to generate and transmit the appropriate toner concentration adjustment or correction signals. Electrostatic voltages of the electrostatic development fields may be measured using an electrostatic voltmeter 148, the resulting measurement being transmitted from the voltmeter 148 to the electrostatic controller 144. A model of short-term photoreceptor (P/R) cyclic behavior 150 may be incorporated into the electrostatics controller 144 to enable correction for start-of-run transients. Pixel counter 157 provides the primary print-by-print information with which toner dispense is regulated by toner concentration controller 132. Toner concentration controller 132 also receives signals from the actual toner concentration (TC) sensor 100, which corresponds to sensed toner concentrations at the toner concentration sensor. The control circuit responds to control signals from controller 132 to regulate the amount and rate at which toner is dispensed from the container. Printing engines have various forms of controls architectures, as described above, to track and maintain their image quality performance and stability. Toner concentration (TC) control maintains image quality by means of dispensing toner into the developer housing through actuation of the dispense motor. For cost savings, there is an increasing trend towards using DC motors, (see DC toner dispenser motor 156 of FIG. 1), instead of servo or stepper motors for dispensing toner, which requires the use of the concept of dispense time accumulator/buffer for decoupling controls and actuation. Though powerful and efficient, using the accumulator/buffer methodology moves the TC dispense model away from simple classic continuous or discrete time-invariant systems to a more complicated non-continuous/asynchronous, time independent systems. In view of this, embodiments herein provides a way of achieving an optimized limit gain component useful with less expensive DC motors that is equivalent to an anti-windup component in continuous or discrete time-invariant systems that use the concept of a dispense time accumulator/buffer. This optimized limit gain component achieves a reduction in Toner Concentration Variations caused due to extreme area coverage changes resulting in better TC stability and thus better image quality stability. Thus, the embodiments herein allow the utilization of less expensive DC actuators in decoupled, asynchronous systems, but still provide the accuracy enjoyed by architectures that utilize anti-wind up feedback loops of close-coupled, synchronous systems. More specifically, with systems that use inexpensive DC motors (and buffers/accumulators to control the DC motor based toner dispensing) the embodiments herein provide an anti-windup mechanism by determining when a buffer is requesting a toner dispenser to output more than it has the ability to produce (more than 100% of its time based production capability). The embodiments herein detect such a situation and reduce the amount that is being requested from the toner dispenser (to avoid windup) by finding how much excess is being requested from the toner dispenser above its abilities. This excess amount is then multiplied by a gain value (using a feedback loop) and the result of this multiplication is subtracted from the buffer (subtracted from the amount being demanded of the toner dispenser). This reduces the demands being made upon the toner dispenser to ones that are within its capabilities, and thereby avoids windup. Further, by altering the amount within the buffer in the anti-windup mechanism, the embodiments herein can be applied to decoupled, asynchronous systems that use inexpensive DC motors (and buffer/accumulators to control such DC motors). This is shown more specifically in FIG. 2, which is a block diagram illustrating a control method and apparatus that includes the Toner Concentration (TC) Controller 132, developer housing 131 and pixel counter 157 of FIG. 1. Control loops 300 may include a pixel counter dispense loop 320 that receives a feedback signal from pixel counter 157 of FIG. 1, a toner Concentration (TC) sensor dispense control loop 330 that receives a feedback signal from TC sensor 100 in the developer housing 131 of FIG. 1, or any other additional control loops 340. These control loops transmit either an incrementing (+) or a decrementing (-) dispense value to a dispense time accumulator buffer 304 located in a toner dispense actuation loop 302 in the TC controller 132 of FIG. 1. Additionally, an optimized limit gain is independently calculated for each machine or each developer housing in a machine, and is transmitted to the toner dispense actuation loop to limit the value of the dispense time accumulator buffer 304 when an upper or lower saturation dispense limit is reached. A determination is made when the dispense time accumulation buffer is greater than or equal to an "ON TIME" value, and a signal that turns on or activates a dispense motor 156a is generated in block 306 for controlling the DC toner dispenser motor 156a to dispense toner 360 in the developer housing 131. Once the dispense motor is activated 306, the "ON TIME" value is subtracted from the current dispense time accumulator buffer, thus updating the dispense time accumulator buffer at a first frequency. Each of the dispense control loops of the control loops 300 operates at a frequency different than that of the dispense time accumulator buffer 304. For example, the pixel counter dispense loop 320 increments the accumulator buffer 304 with a pixel time# equivalent to the product of a pixel counter and a pixel gain for a time period equal to every image panel that is processed by the machine. In another example, the toner Concentration (TC) sensor dispense control loop takes a feedback signal from the TC sensor 100 in the developer housing 131 to generate a TC sensor time value (TCSNRTIME#) that either increments or decrements the accumulator buffer 304 with the sum of a proportional (P) gain component of an error signal and an integral (I) gain component of the error signal. The proportional (P) term (sometimes called gain) makes a change to the output that is proportional to the current error value. The proportional response can be adjusted by multiplying the error by a constant Kp (not shown), called the proportional gain. The contribution from the integral (I) term (sometimes called reset) is proportional to both the magnitude of the error and the duration of the error. Summing the instantaneous error over time (integrating the error) gives the accumulated offset that should have been corrected previously. The accumulated error is then multiplied by the integral gain and added to the controller output. The magnitude of the contribution of the integral term to the overall control action is determined by the integral gain, Ki (not shown). The frequency of the transmitted dispense values from the TC control loop can be specified as independent periods of "X" time (seconds). The additional control loop(s) 340 may also operate independently of the frequency of operation of the toner dispense actuation loop 302. This independent operation of the control loops 300 is therefore decoupled from the toner dispense actuation loop 302 in the TC controller 132 and thus necessitates an alternative approach to calculating a component that may operate as an "anti-windup" component in a synchronous, coupled system between a control loop(s) and a toner dispense actuation loop. FIG. 3 is an exemplary flowchart setting forth steps according to a computer-implemented method that receives dispense values from at least one control loop element regarding an amount of marking material needed to be dispensed for a printing engine 400, and accumulates the dispense values within a computer readable storage medium as an accumulated dispense value 402. The accumulated dispense value is compared with a predetermined upper limit dispense value and a predetermined lower limit dispense value 404. A temporary value is set equal to the predetermined upper limit, when the accumulated dispense value is greater than or equal to the predetermined upper limit dispense value 406. Alternatively, the temporary value set equal to the predetermined lower limit, when the accumulated dispense value is less than or equal to the predetermined lower limit dispense value 408. The accumulated dispense value is then subtracted from the temporary value to obtain an intermediate value. The intermediate value is multiplied by an optimized limit gain to produce an updated dispense value 410. The updated dispense value is added to the accumulated dispense value to produce an updated accumulated dispense value 412, which is compared with a time limit 414. A toner dispense motor is activated for the time limit and the time limit is subtracted from the accumulated dispense value, when the updated accumulated dispense value exceeds the time limit 416. The control loop element may include a pixel counter dispense loop 320 from FIG. 2 or a toner concentration (TC) sensor dispense control loop 330. The optimized limit gain 350 includes a user defined and optimized value for a specific developer housing. The toner dispense motor may be a DC motor 156a operating under control of the updated accumulated dispense value (ACC#, 304). The computer readable storage medium, or buffer 304, is decoupled from and operating asynchronously from the control loop element(s) at 300. FIG. 4 is an exemplary flowchart setting forth steps according to another computer-implement method that updates an accumulated dispense value from within a toner dispense actuation loop 504 and adjusts the accumulated dispense value by receiving dispense values from control loop elements 500, 502 that operate asynchronously from the toner dispense actuation loop 302. Based on a comparison of the accumulated dispense value to an upper and a lower dispense saturation limit 506. A temporary accumulated dispense value is stored 512 when the accumulated dispense value is greater than or equal to a predetermined dispense saturation upper limit 508, or when the accumulated dispense value is less than or equal to a predetermined dispense saturation lower limit 510. An adjusted accumulated dispense value, (see 514), is calculated by subtracting the accumulated dispense value from the temporary accumulated dispense value and multiplying the difference by a predetermined optimized limit gain 350 of FIG. 2, which is input 516 into the toner dispense actuation loop 302 of FIG. 2. A new accumulated dispense value is calculated by adding the adjusted accumulated dispense value to the accumulated dispense value 514. A toner dispense motor is activated for a time period equal to the "ON TIME" value 520 after determining the new accumulated dispense value is greater than or equal to an "ON TIME" value 518. The "ON TIME" value is then subtracted from the new accumulator value based on determining when the new accumulation variable is greater than or equal to the "ON TIME" value 522. Otherwise, the dispenser motor is kept from operating 524 and the accumulated dispense value is continuously updated at a first frequency per the controls of the developer housing 131 of FIG. 2. The toner dispense motor includes a DC motor (156a of FIG. 3) located within a developer housing 131 of a printing engine. The control loop may include a pixel counter dispense control loop 320 that transmits dispense values to update the accumulated dispense value 304 at a second frequency equivalent to processing each received image panel. The pixel counter dispense control loop 320 of FIG. 2 transmits the dispense values equivalent to a pixel time value equal to a product of a pixel counter value and a pixel gain value. The control loop may include a toner control sensor dispense control loop 330 of FIG. 2 that transmits dispense values to update the accumulated dispense value at a third frequency equivalent to a predetermined period of time. The toner control sensor dispense control loop 330 of FIG. 2 transmits the dispense values equivalent to a toner control sensor time value equal to the sum of a proportional gain component of an error signal and an integral gain component of the error signal. In accordance with an additional embodiment, a printing engine that includes a toner concentration (TC) controller 132 of FIG. 2 that has a dispense time accumulator buffer 304 and at least one control loop 300 that transmits a dispense value to increment or decrement the dispense time accumulator buffer 304. A toner dispense actuation loop 302 of FIG. 2 controls the DC toner dispense motor 156a based on updating the value of the dispense time accumulator buffer 304, and a developer housing 131 includes the toner dispense motor 156a, toner 360, a developer (i.e., C, E, G and I of FIG. 6) and a toner concentration (TC) sensor 100 for the printing engine. The control loop 300 may include a toner concentration (TC) sensor dispense control loop 330 that generates the dispense value based on the toner concentration (TC) sensor 100 in the developer housing 131 by summing a proportional gain component of an error signal with an integral gain component of the error signal. Additionally, or in the alternative, the control loop may include a pixel counter dispense loop 320 that generates the dispense value based on a pixel counter element equal to a product of a pixel counter value with a pixel gain value. The toner dispense actuation loop 302 updates the value of the dispense time accumulator buffer at a first frequency (different from at least one second frequency) of the control loop 300 transmitting the dispense value to increment or decrement the dispense time accumulator buffer 304. The toner concentration (TC) controller 132 calculates an adjusted dispense time accumulator buffer value by determining the difference between the dispense time accumulator buffer value and the upper or lower saturation limit. Next, the difference between the buffer value and the limits is multiplied by a predetermined optimized limit gain value. The product of such multiplication is added to the dispense time accumulator buffer value to produce a "sum value" that is added to the buffer. Thereafter, the toner dispense actuation loop actuates the toner dispense motor when the adjusted dispense time accumulator buffer value is greater than or equal to a predetermined toner dispense motor "on time" value. The embodiments herein detect when a saturation condition is occurring by measuring the excess operation that is requested from actuator relative to the maximum that can be produced by the actuator. Therefore, if actuator can only produce 100 units in a given time period, but is being requested to output 120 units in that same time period, the saturation amount would be the 20 units or 20%. The embodiments herein generate a temporary value (which corresponds to the upper limit of the actuators capability). Therefore, in the foregoing example, the upper limit could be defined as 100 units per given time period, and this would be the temporary value. The actual accumulator value demanded (which in the foregoing example would be 120 units) is subtracted from the temporary value and multiplied by an optimized limit gain value determined independently for each actuation. For example, a 2.times. gain could be multiplied by the difference between the temporary number (100) and the accumulator number (120), resulting in a -40. This -40 is added to the accumulator number (120) resulting in an updated accumulator number of 80. Then, the updated accumulated number is compared to the time limit to determine whether to turn the actuator on for the predetermined time. With these novel features, the embodiments herein may provide an equivalent anti-windup component as an optimized limit gain in systems that use a decoupled, asynchronous dispense time accumulator/buffer. FIG. 5A illustrates a graph of a Toner Concentration (TC) output versus time without an optimized limit gain component. At 500 seconds, the TC spikes to over 11.5 pph. Note the % Area Coverage (AC) is the bold line and indexed on the right vertical axes of both graphs. FIG. 5B illustrates a graph of a Toner Concentration (TC) output versus time with an optimized limit gain component of one embodiment included herein. At 500 seconds the TC only rises to around 10.25. Note the dotted spike curve of FIG. 5A superimposed on FIG. 5B for comparison purposes to illustrate the difference in magnitude between a system with the optimized limit gain and a system without the optimized limit gain. FIG. 6 shows an exemplary multipass color electrostatographic reproduction or imaging machine that may utilize various embodiments herein. The imaging machine, which is more particularly described in incorporated U.S. Pat. No. 6,134,398 and U.S. Pat. No. 6,404,997 assigned to the same assignee hereof, includes a photoreceptor belt 10 having a photoconductive surface 11 that carries an electrostatic latent image formed thereon to various image processing stations along the path of belt 10 in the direction 12. Controlled amounts of toner are applied to each latent image as it passes development stations C, E, G, and I in a multipass operation. The amount of toner applied is dictated, among other things, by toner concentration and electrostatic potentials at the development unit. To control the amount of toner applied to the latent image, electrostatic potentials and other electrical set points may be controlled almost instantaneously whereas toner concentration at the development roll is subject to mixing and transport delays. As known in the art, color reproductions may be derived from a computer generated image that is electronically conveyed to an image processor 14 or from an original document 16 placed on the surface of a transparent platen 18. In the latter case, a scanning assembly including a light source 20 illuminates the document 16 whereupon light reflected from document 16 is reflected by mirrors 22, 24, and 26 through a series of lenses (not shown) and a dichroic prism 28 to three color separating, charged-coupled linear photosensing devices (CCDs) 30 where the information is read. Each CCD 30 outputs a digital image signal that is proportional to the intensity of the incident light of a respective color separated region of original document 16. The digital signals represent each pixel and are indicative of blue, green, and red densities. They are conveyed to the IPU 14 where they are converted into color separations and bit maps, typically representing yellow, cyan, magenta, and black. As previously indicated, the image coverage area of original document 16 may vary from print-to-print, and this may have a deleterious impact on image density of the reproduced image should toner concentration fluctuate outside of a pre-established range. Color separation and bit map information may be used to control the delivery of toner at development stations C, E, G, and I in order to achieve a desired toner density in the developed latent image, but very often, this is marginally effective to compensate for variations of toner density in the latent image during print-to-print fluctuations in toner concentration. Although illustrated separately, the housing of development stations C, E, G, and I are often combined for compactness in a single unit having respective compartments for the individual toners. As previously indicated, this makes the system more susceptible to toner concentration fluctuations. The imaging machine of FIG. 6 includes an electronic subsystem (ESS) 32 that comprises a central processor unit (CPU), memory, and a display or user interface (UI). ESS 32 with the help of toner concentration sensors at connections 34a, 34b, 34c, and 34d, as well as an optional pixel counter 36, reads, captures, prepares and/or manages toner concentration, electrostatic set points, and other machine functions. In addition, ESS 32 performs multi-tasking operations such as imaging, development, sheet delivery and transfer, and the operating or "on" time control mode and/or algorithm for each of the development units. Initially, in a first imaging pass, photoreceptor 10 passes charging station A where corona generating devices 38 and 40 charge photoreceptor 10 to a relatively high, substantially uniform potential. Next, in this first imaging pass, the charged portion of photoreceptor 10 advances through an imaging station B. At imaging station B, the uniformly charged belt 10 is exposed to the scanning device 42, which forms a latent image on surface 11 of belt 10 by discharging certain regions thereof, e.g., text or graphic patterns, in accordance with one of the obtained color separations and bit map outputs, e.g., black, of the scanning device 42. Scanning device 42 is a laser Raster Output Scanner (ROS) that creates color separation images as a series of parallel scan lines having a certain resolution, generally referred to as lines per inch. At a first development station C, a non-interactive two-component development unit 44, advances developer material 46 containing, for example, charged toner particles and carrier particles in the form of ferromagnetic beads of a desired and controlled ratio into contact with a donor roll 48, and donor roll 48 then advances charged toner particles admixed with developer material 46 into contact with the latent image and any latent target marks on surface 11. The sump or reservoir of developer housing 44 includes mixing augers that mix toner and carrier particles. Transport of developer material 46 from the sump of the developer housing 44 to the latent image on the surface 11 generally takes a few seconds. Development stations E, G, and I, which include donor rolls 60 and dispense remains unchanged in block 208. If so, then the long term drift is computed based on the results of the comparison between projected and actual toner concentration in block 210, and the dispense rate is modified according. In either case, setpoints stored in electrostatic controller 144 are appropriately adjusted and the development process is initiated in block 212. The process described in FIG. 2 is repeated for each print. Development unit 44 may also include a plurality of magnetic brush and donor roller members, plus rotating augers or other means for mixing toner and carrier particles, all of which contribute to the delay of applying toner of a desired concentration to the latent image. A special feature of non-interactive development is that adding and admixing of toners can continue even when development is disabled. Therefore the timing algorithm for the adding and admixing function can be independent of that for the development function, as long as admixing is enabled whenever development is required. These donor roller members transport charged toner particles to the latent image for development thereof which tones the particular color separation image areas and leaves other areas untoned. Power supply 50 electrically biases development unit 44. Other development stations 54, 56, and 58 have similar biasing. In accordance with embodiment herein, timing algorithms for admixing and transport may be altered in advance of toner needs based on anticipated delays in transport and mixing. Development or application of the charged toner particles to the latent image depletes the level and hence the concentration of toner particles in developer material 46. Different jobs of several documents being reproduced will cause toner depletion at different rates depending on the sustained, copy sheet area toner coverage, or toner area coverage level of the images thereof being reproduced. In a machine using a two-component developer material, as here, such depletion undesirably changes the concentration of such particles in the developer material. Momentary depletion is exacerbated when the developer mass is relatively small. In order to maintain the desired concentration of toner particles in the developer material 46 (in an attempt to insure the continued quality of subsequent images), adding and admixing functions of the development unit 44 must be operating or turned "on" for some controlled period of time in order for the hopper 50 to replenish the development unit 44 with fresh toner particles from source 52. Such fresh toner particles must then be admixed with the carrier particles in order to properly charge them triboeletrically. On a second and subsequent passes of an image region on belt 10 of the multipass imaging machine, corona devices 38 and 40 recharge and adjust the voltage level of both the toned (from the previous imaging pass), and untoned areas on photoreceptor 10 to a substantially uniform level. This prepares the surface 11 to receive additional latent images on which toner particles of other colors are deposited by development stations E, G, and I. Recharging devices 38 and 40 substantially eliminate any voltage difference between toned areas and bare untoned areas, as well as to reduce the level of residual charge remaining on the previously toned areas so that subsequent development of a latent image of a different color separation is formed across a uniform development field. Imaging device 42 is then used on the second and subsequent passes of the multipass imaging machine to superimpose a subsequent latent image of a particular color separation image by selectively discharging the recharged photoreceptor 10. Many computerized devices are discussed above. Computerized devices that include chip-based central processing units (CPU's), input/output devices (including graphic user interfaces (GUI), memories, comparators, processors, etc. are well-known and readily available devices produced by manufacturers such as Dell Computers, Round Rock Tex., USA and Apple Computer Co., Cupertino Calif., USA. Such computerized devices commonly include input/output devices, power supplies, processors, electronic storage memories, wiring, etc., the details of which are omitted here from to allow the reader to focus on the salient aspects of the embodiments described herein. Similarly, scanners and other similar peripheral equipment are available from Xerox Corporation, Norwalk, Conn., USA and the details of such devices are not discussed herein for purposes of brevity and reader focus. The terms printer or printing device as used herein encompasses any apparatus, such as a digital copier, bookmaking machine, facsimile machine, multi-function machine, etc., which performs a print outputting function for any purpose. The details of printers, printing engines, etc., are well-known by those ordinarily skilled in the art and are discussed in, for example, U.S. Pat. No. 6,032,004, the complete disclosure of which is fully incorporated herein by reference. The embodiments herein can encompass embodiments that print in color, monochrome, or handle color or monochrome image data. All foregoing embodiments are specifically applicable to electrostatic and/or xerographic machines and/or processes. It will be appreciated that the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims. The claims can encompass embodiments in hardware, software, and/or a combination thereof. Unless specifically defined in a specific claim itself, steps or components of the embodiments herein cannot be implied or imported from any above example as limitations to any particular order, number, position, size, shape, angle, color, or material. At a first development station C, a non-interactive two-component development unit 44, advances developer material 46 containing, for example, charged toner particles and carrier particles in the form of ferromagnetic beads of a desired and controlled ratio into contact with a donor roll 48, and donor roll 48 then advances charged toner particles admixed with developer material 46 into contact with the latent image and any latent target marks on surface 11. The sump or reservoir of developer housing 44 includes mixing augers that mix toner and carrier particles. Transport of developer material 46 from the sump of the developer housing 44 to the latent image on the surface 11 generally takes a few seconds. Development stations E, G, and I, which include donor rolls 60 and dispense remains unchanged. If so, then the long term drift is computed based on the results of the comparison between projected and actual toner concentration, and the dispense rate is modified according. In either case, setpoints stored in electrostatic controller 144 are appropriately adjusted and the development process is initiated. The process described in FIG. 2 is repeated for each print.
2019-04-22T16:58:19
http://patents.com/us-20110299863.html
0.998728
Children love this dish! The broccoli can be cooked up to several days ahead. Serve it at any temperature, with room temperature or warm sauce. 1. Bring large pot of water to boil. Cook broccoli in water 2 to 3 minutes, or until bright green and tender. Drain, and rinse under cold water to cool. Shake, and pat dry. 2. Whisk peanut butter with 1 cup hot water in bowl. Stir in remaining ingredients. Season with salt. Place bowl in center of serving platter, and arrange broccoli around it.
2019-04-21T04:24:45
https://www.yogajournal.com/recipes/broccoli-dipped-in-wonderful-peanut-sauce
0.995202
I am trying to create an array that includes information about the property ".linecolor" from 80 values that are on a ProcessBook display and using that array of information in another ProcessBook display. What is the best way to do this? I've tried referencing one display in the other, but haven't gotten it to work. Basically what I want to do is have one display control the colors of values on another display. Any ideas? I've tried referencing one display in the other, but haven't gotten it to work. Did you open the other display or what do you mean by referencing? Can you share the code you have so far? How about adding some VBA code to Display1 writing the configuration to a file and reading the file content with some VBA code in Display2? I got it to work now. In the VBA editor I go to Tools and References and add the other ProcessBook display as an available reference. In this referenced display I have a function that returns an array. The main display calls that function and uses the resulting array to color the values appropriately. I do have another issue that is unresolved though. You will be able to find that issue as soon as I post my next discussion topic that will be called "Display Shrinkage." I had no idea this would work. Thank you for sharing.
2019-04-24T09:05:28
https://pisquare.osisoft.com/thread/6045-share-processbook-display-information-with-another-display
0.998855
What problem will analytics tackle next? Sustainability firm Ecova recently acquired Retroficiency, a company with data on the energy profiles of hundreds of thousands of buildings, Phys.org reported. Through the analysis of that data, the company expects to show building owners where their energy is being wasted and how they can stop. According to the Environmental Protection Agency, about 6 million commercial and industrial buildings in the U.S. account for about 45 percent of greenhouse gas emissions, and about 30 percent of those emissions are from wasted energy.
2019-04-20T01:06:06
https://www.govtech.com/question-of-the-day/Question-of-the-Day-for-11182015.html
0.999554
Does Joker wear makeup in the comics? In Burton's Batman Jack Nicholson's Joker falls into a vat of chemicals which turns his skin pure white. In a couple of scenes he wears skin-colored makeup to appear more normal. In Nolan's The Dark Knight Heath Ledger's Joker has "normal" skin and wears makeup to create Joker's trademark white skin look. He can just wash off the makeup if he wants. Which is the case in the comics? Is his skin deformed, does he wear makeup, or is he just naturally pale? The answer is a qualified "no"; in most of his many origin stories, the Joker looks the way he does because he was permanently disfigured, and his skin and hair were permanently discolored. The Joker began as a very dark character. Originally, it was unclear if the Joker’s pale skin and green hair was done with make-up or was simply how his skin looked. Over time, it seemed clear that it was his natural state. Eleven years after he was first introduced, the Joker was given an official origin story. How he got the natural clown look was revealed to be the byproduct of his swimming through a vat of chemicals when he began his criminal career as the Red Hood. The story where this was revealed was actually a great one as it featured Batman looking into just who the Red Hood was and why he disappeared. Actual clues were littered throughout the story and the Joker’s reveal was a real surprise. Nowhere in this, or any other, story is the Joker given a real name. He is always simply “The Joker” who once went by the name "Red Hood". "No recounting of the Joker's origin has been definitive, however, as he has been portrayed as lying so often about his former life that he himself is confused as to what actually happened. "Sometimes I remember it one way, sometimes another... if I'm going to have a past, I prefer it to be multiple choice!"" What I think is that when the Joker was first written in the comics, I believe he was portrayed to be naturally pale looking as though he was a clown. Back then they didn't portray their characters as though they were make-believe, they were as real as you and me. Through time they became people of fiction. In DC comics he actually wore makeup. Did Batman ever let the Joker out of Arkham? Why does the Joker always laugh? Why does the real identity of the Joker matter?
2019-04-19T02:17:56
https://scifi.stackexchange.com/questions/95716/does-joker-wear-makeup-in-the-comics
0.501535
Warren Mayor Jim Fouts accuses DNC chair Debbie Wasserman Schultz of "totalitarian control" over debate audience in Flint. FLINT, Michigan — After expressing vocal support for Bernie Sanders during Sunday night's debate, the independent mayor of Michigan's third largest city says security warned him that he would be booted from Sunday's Democratic debate here if he did not quiet down. Jim Fouts, the three-term independent mayor of Warren, told BuzzFeed News Monday that he attended both the Republican and Democratic debates in Michigan over the past week. The audience at the GOP debate at the Fox Theatre in Detroit Thursday was loud. But the mood in the Whiting Auditorium on the campus of the Flint Cultural Center, where Sanders and Hillary Clinton met in one of their sharpest-elbowed debates to date, was very different, he said. "The Democratic debate is totally controlled by Hillarys [sic] good friend DNC Chair Debbie Wasserman Schultz," Fouts wrote on Facebook Monday. "No commentary is allowed by the audience. Particularly if you are cheering Bernie Sanders. Persons who do not adhere to Hillarys [sic] rules are threatened with expulsion." Fouts has not officially endorsed Sanders, but he is a big fan. He told BuzzFeed News that if he does vote in Tuesday's Democratic primary, "it's going to be for Bernie Sanders." At the debate, Fouts sat in the center section of the hall, directly behind Wasserman Schultz, the DNC chair. Next to him was his longtime executive assistant. Fouts told BuzzFeed News that at multiple times during the beginning of the debate, he turned to his executive assistant, praised Sanders' performance, and said the Flint debate — added to the calendar after the initial set were announced — proved that more debates were a good idea. "I was just saying 'great job, Bernie!' and 'we need more debates,'" Fouts said. He said that at one point he vocally criticized Clinton for "wrapping herself around Obama." He insisted he was speaking at a "normal conversation" level. Staff for the Democratic National Convention in Philadelphia who were sitting near Wasserman Schultz and Fouts said he was being "very disruptive" and made it hard to hear the candidates. Wasserman Schultz did not respond to a request for comment. During an early commercial break, security confronted Fouts, roused him from his seat, and pulled him and his assistant off to the side of the hall. He was told there had been "complaints" about his behavior and that security had been ordered to throw him out. "The sergeant at arms said, 'The people that run this want you ejected, they don't want you here,'" Fouts recalled. He said his assistant asked if the complainer was Wasserman Schultz. "The security guy said, 'don't say I said it," Fouts said. Fouts was outraged by the evening. He called for Wasserman Schultz to step down in the Monday interview. After the conversation with security, Fouts said he returned to his seat and took extra care to be quiet. "I was even careful when I clapped," he said. "I'm sorry that I offended her with my enthusiasm." Clashes between the Sanders campaign and its supporters and the DNC have been routine throughout the primary. When the debate calendar was first announced, Sanders supporters were among those who shouted down Wasserman Schultz during a speech at the New Hampshire Democratic state convention. When the DNC suspended Sanders' campaign access to the party's online voter file following a break of Clinton data by Sanders campaign aides, the Sanders campaign filed a lawsuit and accused Wasserman Schultz of doing Clinton's bidding. Top DNC officials, including the chair, have pledged neutrality throughout the primary process, saying that the party takes no sides. Fouts said he didn't think the quiet rule at the Democratic debate was very democratic. He prefers things a little looser, if not as loose as the Republicans do it. "Frankly I was appalled by what I saw and what happened," he said.
2019-04-19T05:11:35
https://www.buzzfeednews.com/article/evanmcsan/michigan-mayor-security-threatened-to-kick-me-out-of-debate
0.999969
Chlorine bleach is used for all kinds of things in your home, from laundry stain removal, cleaning, deodorizing and even disinfecting. It is a staple for many homes in the laundry room and cleaning closet since it is so versatile, and also so inexpensive. However, I'm sure you know of someone (perhaps yourself) who has had a laundry mishap with this type of bleach, because it is very strong when undiluted, and can cause damage to fabric and other surfaces. Further, as a powerful chemical you've got to treat it with respect and follow safety rules to make sure you stay safe when using and storing it. What follows in this article all about chlorine bleach is everything you've ever wanted to know (and most likely more) about this powerful cleaner and stain remover, so you can use it in your home properly and effectively. There are many types of bleach available, such as oxygen or color safe, each of which is made with various types of chemicals. However, when most people refer to "bleach", or "household bleach" they are referring to the most common and powerful version, which is sodium hypochlorite, with the chemical form of NaClO, which is the proper scientific name of chlorine bleach. Sodium hypochlorite works by liberating chlorine gas to oxidize or bleach stains. When you buy it from the store it typically comes in a 4-6% concentration, which is still actually quite strong, and therefore it must be diluted before use. One of the most common ways to use this product is for laundry stain removal. Keep the following instructions and information in mind whenever you use it for this purpose. You should not use both chlorine and oxygen or color safe bleaches at the same time because the chlorine bleach will deactivate the oxygen versions in the detergent, and the oxygen bleach with not allow the household version to work as well either. Further, make sure any fabric you use this product on can take the rough treatment. If a fabric care label doesn't mention bleach it implies that using any kind of bleach on the item can be done safely. However, if the label says to only use color safe bleach, or no bleach, this is a definite no no for using household bleach, because you're basically guaranteed to ruin the item if you do. Many people think you can only use this product on whites. However, did you know chlorine bleach can also be used on certain colorfast colored fabric? I don't recommend doing this on a constant basis, because it will cause some fading over time, but if you've got a severely stained item using chlorine bleach may be the best way to remove the stain, even if the cloth is colored. Make sure to test the item for colorfastness before attempting to either presoak or wash the item with this type of bleach though, so you don't ruin it. (Here are instructions for how to test for colorfastness before using this type of bleach). Never add this product full strength into your washing machine, but instead dilute it first with water and then add it to the wash. This keeps it from touching any fabric in too high of a concentration and causing bleach spots. You should wait about five minutes into the washing cycle to add it to your machine if you must do so manually. The reason is that many detergents contain enzymes and brighteners to help clean your clothes. These go to work in about the first five minutes, and this type of bleach deactivates them. Therefore, let the enzymes do their job and then add the bleach thereafter. If your machine has a bleach dispenser you can add it that way, and the dispenser typically dilutes the bleach as it dispenses it a few minutes into the wash cycle. However, each brand of machine is different so check your owner's manual to make sure your machine does it this way. Once the bleach is in contact with the stains on your clothes it does not work instantaneously. Instead, it takes about five minutes after adding it to the wash for it to do its job. The process is faster in hot water and slower in cold water. Presoaking is an effective stain removal technique, and you can use chlorine bleach for certain jobs, not just non-chlorine versions. However, unlike with non-chlorine bleaches, where you may want to soak something for a long time, even overnight for example, you have to soak with this version of bleach only for a few minutes maximum. You can soak the whole garment for about five minutes in a solution of 1/4 cup of bleach and 1 gallon of cool water. Then, go ahead and wash the item right away since you really shouldn't soak for longer than that in chlorine bleach since prolonged exposure can weaken fibers too much, or cause too much color fading. An additional hint is that if you're soaking one half of a two piece item, soak both items so you don't have uneven fading. While this stuff is very powerful and effective, it can also cause problems, over time, with fabrics. Especially when used in too high of concentrations it can weaken fabrics and fibers over time. Further, even a tiny drop can spot or discolor colored fabric, so be careful when pouring it, especially in its undiluted form. In fact, if a spot of bleach is left on clothing for too long it can even make a hole in the fabric. If you ever accidentally splash or spill this product on fabric, especially in its undiluted form, your best bet is to act as quickly as possible and rinse the area, thereby diluting it and removing it from the fabric. The quicker you can do this, the less damage will most likely be done. Finally, if you use bleach in too high of concentrations over time it will actually begin to yellow your whites, which is actually the opposite of the result you want, so make sure to dilute it properly. You should avoid using this type of bleach if your water is high in iron (such as some types of well water), since the iron and bleach will cause a chemical reaction which can cause yellowing. Similarly, you should also never treat rust stains with chlorine bleach, since it will only set them, not remove them. In fact, another stain that it sets, not removes, is liquid laundry bluing, so if you've got blue spots on fabric from this product don't try to bleach them away. The other common use for household bleach is to clean, disinfect and deodorize. That means it is a common ingredient in many homemade cleaning products recipes, or household remedies. Really, more important than cleaning, bleach is important for disinfection, since it can kill bacteria, viruses, and even mold and mildew spores. Here is an article about sanitizing with bleach, which provides not only a recipe for homemade disinfectant, but also explains exactly how to use bleach to sanitize and disinfect. Unlike what many people think, killing these organisms is not instantaneous and there is a method for doing it properly and effectively. Further, as I mentioned above, bleach also kills mold and mildew, making it an important component in the fight against these stinky smelly organisms in your home. Therefore, I've also got a homemade mildew cleaner recipe here on the site you should check out if you're battling mold and mildew in your home, especially in your bathroom. As you can see by now, this product is quite powerful. That means it must also be treated with respect to make sure you're using it safely. The bleach you can buy in stores for home use is typically concentrated at about 4-6% sodium hypochlorite, with the most common percentage being 5.25%. This may not sound very strong, but it is actually still quite concentrated in that bottle. Therefore, you should never use the chlorine bleach in its undiluted form, but must always dilute it to a lower concentration. I've provided various dilution instructions that you can use for different purposes on this page, or within linked instructions to other recipes. Don't think that if a little works well, a lot will work better. Instead, it can be dangerous or harm the surface you're working on. Another very important safety rule to always keep in mind is to never mix chlorine bleach with either ammonia or vinegar, since such a mixture of either can result in a highly poisonous gas. I've written an entire article about how bleach and ammonia don't mix, to help you understand the science behind this rule, so if you like to know the scientific explanations behind certain things go ahead and read that article now. In addition to the rules mentioned above, make sure to always wear old clothes, or an apron when using this cleaner and stain remover, to prevent harm to nice fabrics in case of a splash or drip, especially in its undiluted form. Household bleach, especially in undiluted concentrations, is also caustic to your skin, so always wear gloves when mixing and using it. Similarly, protect your eyes when pouring it, to prevent splashes. Also, mix and use it only in well ventilated areas in your home, since it can have a strong scent. Make sure to open a window, turn on a fan, or otherwise vent the area you're working in. Finally, as with all cleaning and laundry supplies, it should be stored out of the reach of children and pets. Most often household bleach is found in liquid form, but it can also come in granular or powdered form, in tablets, or even in gels. Gel bleaches, also known as splashless varieties, are formulated to avoid splattering and splashes so you can avoid some of the problems commonly associated with the product coming into contact accidentally with colored clothing or in too high a concentration. Recently, household bleach has even started being available in the form of a bleach pen. This allows you to spot treat a stain, and not have to treat the entire article of clothing. These pens have also been used to clean small areas, such as grout lines in tile. Further, the smell of plain chlorine bleach can be rather strong and overpowering, so many varities will add a scent to mask that strong odor, or to provide you with a nice scent for your cleaning or laundry needs. The most famous maker of chlorine bleach is Clorox, and they've got lots of versions of the product available for purchase. However, a money saving secret is that because of household bleach's chemical nature, since it is just a solution of sodium hypochlorite, there is not much difference between the Clorox name brand, which is more expensive, and some of the generic and store brand versions also available. You can easily save yourself money (like I do) and buy the store brand, and I've never noticed any difference. One word of caution though, is that you'll want to look at the packaging at the store and compare with Clorox bleach to make sure it is sold in the same concentration so you properly dilute it, and don't dilute it too much because a generic version could contain more water, for example, than a name brand. If it does contain more water it will tell you on the instructions the proper dilution amounts to work effectively. The chemical sodium hypochlorite actually degrades and breaks down relatively quickly. The result of this fact is that any time you make your own cleaning solution using household bleach you should use it all when freshly mixed and then throw the rest away. It is not the type of recipe you can mix and then save the rest for another use later. Further, if you're relying on this type of bleach for disinfection you should replace your supplies of it every six months, and for regular cleaning and laundry uses it should be replaced every 9-12 months. That means this is not the type of item to stock up on during a sale. However, that's not really a huge deal since it is relatively inexpensive all the time. Further, it is worth a glance at the expiration date on the jug or other container before you put it into your shopping cart. You never know how long its already been sitting on the shelf, so make sure you buy the freshest bottle possible. As effective as this type of bleach is, many people have decided, for ecological reasons, to avoid it. In fact, many eco-friendly cleaning products specifically avoid adding this ingredient to their cleaners and laundry supplies because of its harm to the environment. On the other hand, Clorox and other manufacturers of household bleach maintain that it is safe for use, and breaks down into salt which is not harmful to the environment. (Here's a link to bleach facts that I found by following links from the Clorox website). I will admit to being a little bit conflicted between these two positions, since someone is obviously wrong, and it is most likely a nuanced discussion that I'm not personally prepared to give my two cents on. Therefore, I will share with you that as a Mom, I try to keep my house both clean and safe for my kids and for future generations. As such, when I can use something else to clean or remove stains beside chlorine bleach I try to do that. But, on the other hand, I have not completely given up its use in my home. That is because chlorine bleach is still one of the most effective and cheapest ways to remove stains there is, and it sometimes is one of the only things that will work for your stains and disinfecting needs. You can disagree with me about this all you want, either way. I am still researching the issue, and maintain the right to change my mind in the future one way or the other about this product, but for now this is the compromise I have made based on the facts and information I currently possess. I encourage you to do your own research on the issue if you're concerned with bleach's impact on the environment. As you can see, there are lots of ways to use chlorine bleach for cleaning, laundry and stain removal in your home. I like to collect recipes and uses from readers, so I've created a page where you can share your bleach uses, or read ones that have already been submitted. There are quite a few cleaning recipes already provided. In addition, there are lots of brands of this product available, and also many scents and varieties, as mentioned above. You can share your reviews of household bleach varieties here.
2019-04-19T18:44:33
https://www.stain-removal-101.com/chlorine-bleach.html
0.998576
For other uses, see Protostar (disambiguation). A protostar is a very young star that is still gathering mass from its parent molecular cloud. The protostellar phase is the earliest one in the process of stellar evolution. For a low mass star (i.e. that of the Sun or lower), it lasts about 500,000 years The phase begins when a molecular cloud fragment first collapses under the force of self-gravity and an opaque, pressure supported core forms inside the collapsing fragment. It ends when the infalling gas is depleted, leaving a pre-main-sequence star, which contracts to later become a main sequence star at the onset of Hydrogen fusion. The modern picture of protostars, summarized above, was first suggested by Chushiro Hayashi in 1966. In the first models, the size of protostars was greatly overestimated. Subsequent numerical calculations clarified the issue, and showed that protostars are only modestly larger than main-sequence stars of the same mass. This basic theoretical result has been confirmed by observations, which find that the largest pre-main-sequence stars are also of modest size. Star formation begins in relatively small molecular clouds called dense cores. Each dense core is initially in balance between self-gravity, which tends to compress the object, and both gas pressure and magnetic pressure, which tend to inflate it. As the dense core accrues mass from its larger, surrounding cloud, self-gravity begins to overwhelm pressure, and collapse begins. Theoretical modeling of an idealized spherical cloud initially supported only by gas pressure indicates that the collapse process spreads from the inside toward the outside. Spectroscopic observations of dense cores that do not yet contain stars indicate that contraction indeed occurs. So far, however, the predicted outward spread of the collapse region has not been observed. The gas that collapses toward the center of the dense core first builds up a low-mass protostar, and then a protoplanetary disk orbiting the object. As the collapse continues, an increasing amount of gas impacts the disk rather than the star, a consequence of angular momentum conservation. Exactly how material in the disk spirals inward onto the protostar is not yet understood, despite a great deal of theoretical effort. This problem is illustrative of the larger issue of accretion disk theory, which plays a role in much of astrophysics. Regardless of the details, the outer surface of a protostar consists at least partially of shocked gas that has fallen from the inner edge of the disk. The surface is thus very different from the relatively quiescent photosphere of a pre-main sequence or main-sequence star. Within its deep interior, the protostar has lower temperature than an ordinary star. At its center, hydrogen-1 is not yet fusing with itself. Theory predicts, however, that the hydrogen isotope deuterium fuses with hydrogen-1, creating helium-3. The heat from this fusion reaction tends to inflate the protostar, and thereby helps determine the size of the youngest observed pre-main-sequence stars. The energy generated from ordinary stars comes from the nuclear fusion occurring at their centers. Protostars also generate energy, but it comes from the radiation liberated at the shocks on its surface and on the surface of its surrounding disk. The radiation thus created must traverse the interstellar dust in the surrounding dense core. The dust absorbs all impinging photons and reradiates them at longer wavelengths. Consequently, a protostar is not detectable at optical wavelengths, and cannot be placed in the Hertzsprung-Russell diagram, unlike the more evolved pre-main-sequence stars. The actual radiation emanating from a protostar is predicted to be in the infrared and millimeter regimes. Point-like sources of such long-wavelength radiation are commonly seen in regions that are obscured by molecular clouds. It is commonly believed that those conventionally labeled as Class 0 or Class I sources are protostars. However, there is still no definitive evidence for this identification. For details of observational classification, see Young stellar object. Video about the protostar V1647 Orionis and its X-ray emission (2004). Protostar outburst - HOPS 383 (2015). A protostar inside a Bok globule (Artist's image). Stellar cluster RCW 38, around the young star IRS2, a system of two massive stars and protostars. Wikimedia Commons has media related to Protostars. ^ Dunham, M. M.; et al. (2014). The Evolution of Protostars in Protostars and Planets VI. https://arxiv.org/pdf/1401.1809.pdf: University of Arizona Press. ISBN 9780816598762. ^ Hayashi, C. (1966). "The Evolution of Protostars". Annual Review of Astronomy and Astrophysics. 4: 171. Bibcode:1966ARA&A...4..171H. doi:10.1146/annurev.aa.04.090166.001131. ^ Larson, R. B. (1969). "Numerical Calculations of the Dynamics of a Collapsing Protostar". Monthly Notices of the Royal Astronomical Society. 145: 271. Bibcode:1969MNRAS.145..271L. doi:10.1093/mnras/145.3.271. ^ Winkler, K.-H. A. & Newman, M. J. (1980). "Formation of Solar-Type Stars in Spherical Symmetry: I. The Key Role of the Accretion Shock". Astrophysical Journal. 236: 201. Bibcode:1980ApJ...236..201W. doi:10.1086/157734. ^ "Infant Star's First Steps". Retrieved 10 November 2015. ^ Myers, P. C. & Benson, P. J. (1983). "Dense Cores in Dark Clouds: II. NH3 Observations and Star Formation". Astrophysical Journal. 266: 309. Bibcode:1983ApJ...266..309M. doi:10.1086/160780. ^ Shu, F. H. (1977). "Self-Similar Collapse of Isothermal Spheres and Star Formation". Astrophysical Journal. 214: 488. Bibcode:1977ApJ...214..488S. doi:10.1086/155274. ^ "A diamond in the dust". Retrieved 16 February 2016. ^ Stahler, S. W. (1988). "Deuterium and the Stellar Birthline". Astrophysical Journal. 332: 804. Bibcode:1988ApJ...332..804S. doi:10.1086/166694.
2019-04-19T07:29:23
http://conceptmap.cfapps.io/wikipage?lang=en&name=Protostar
0.999999
In this article I am going to discuss how you can employ some useful tools in a clever way to increase the efficiency of submitting articles and publishing content for syndication. But first we need to understand some of the popular strategies that are being used today, why article marketing works in the first place, and an important term called a "duplicate content filter." One of the popular methods that bloggers or webmasters will use in order to get more traffic to their website is to create a detailed post about their topic or niche and then submit that same post for syndication in article directories. While syndicating content can be a good way to increase exposure and gain more incoming links, by doing this it is also possible to get slapped with a duplicate content penalty. The duplicate content filter is something that major search engines recently introduced after the widespread use of link spamming to artificially boost search engine rankings. Link spam is where a webmaster will create numerous copies of a single web page and post them on different domain names in order to increase the number of incoming links to his website. But since this is an artificial way to get more links (as opposed to having various websites link to you on their on accord), it is considered to be a manipulation of the search engine algorithms and is frowned upon. As soon as the major search engines like this realized that web pages that were irrelevant and filled with advertisements were gaining top rankings due to link spam, they went to work devising a filter that would block all identical pages from being listed, along with any of the pages that they link to (thereby eliminating the artificial rankings that these web pages would get). In order for a large search engine like Google to return relevant results, they must employ a web robot to "crawl" around the internet and save a copy of every single web page that it finds. This collection of saved pages is called the 'cache,' and every time you go to a search engine and type in a keyword, it will search through the cache of stored web pages and deliver the one that is the most relevant to your search and has the most incoming links (an incoming link is considered to be a "vote" that a certain web page is good, and therefore worth linking to). Well if the Google bot happens to come across a web page that is an identical copy of some other page, the duplicate content filter comes into play and it will make sure that only one copy of this web page is displayed on the search engine results page. But which one to choose? The search engine is going to brand one of the web pages as the original, and then all other copies of it are going to be subsequently blocked. A few of the factors that determine which page is branded as the original are when it was created, the link strength or Pagerank of the website, and the relevancy of the domain name. So how does this apply to your article marketing and content syndication? Well if you were to submit the same piece of content to multiple different directories and syndicated feeds, many of those pages are going to end up getting slapped by the duplicate content filter since they are basically carbon copies of each other. The ideal way to avoid this would be to create a unique piece of content to submit to every source, but that would be extremely time consuming. The way that you can save time and also avoid the duplicate content filter is to use a tool called a "duplicate content checker." By using this kind of tool, instead of creating a new article from scratch, you can re-write small parts of your existing article and check it to make sure that it is unique enough that it will not be branded as duplicate content. This way, instead of spending 30-50 minutes coming up with a brand new article, you can spend only around 3-5 minutes by creating a slightly altered version that will not appear to be an identical copy. By doing this you can increase the effectiveness of your article marketing and content syndication, because you can rework each article you submit in just a few minutes so that it will overcome the duplicate content filter, and more pages displaying links back to your website will rank high in the search engines. You can find a free and great duplicate content tool at http://Coach-Tyler.com/dupchecker which will allow you to compare two articles side by side and make sure that you can overcome the search engine filter.
2019-04-23T16:59:58
http://www.cosmoparty.biz/how_to_make_your_article_marketing_campaign_more_efficient_382237a.html
0.99974
Find a Horse Riding trip that explores Nepal. There are 1 tours to choose from, that range in length from days up to days. The most popular month for these tours is , which has the most tour departures.
2019-04-20T21:20:00
https://www.tourradar.com/i/nepal-horse-riding
0.997872
The Bucks have a new slogan: "Built to Stay." With the beginning of training camp Tuesday, the Bucks have kicked off a season in which they'll have to prove it. The Milwaukee Bucks are moving away from the rhetoric of being a work in progress. With the completion of Fiserv Forum, stability in the front office, the addition of a proven coaching staff and the development of a talented roster, the Bucks have ditched their former mantras of "Own the Future" and "Build the Future." For the Bucks, who opened training camp at their downtown Sports Science Center on Tuesday with a pair of practice sessions, the time of reckoning has arrived. Especially with LeBron James moving out of the Eastern Conference, the path toward winning a playoff series for the first time since 2001 seems open. Of course, none of these projections are new. For nearly two decades, the Bucks have been looking to exorcise their playoff demons and as recently as last year believed they had finally put together the team that would make the leap. A year ago, Milwaukee's players and coaches were open about their goal of reaching 50 wins. They also espoused a belief that they could be a top-five defensive team. Forty-four wins later with their second coach at the helm, the Bucks sat dejected at Boston's TD Garden, having been eliminated in Game 7 of the first round. For the second successive season, they went into the summer feeling like they had been the better team, trying to figure out what went wrong and wondering what could have been. Between Monday's media day and Tuesday's practice, the bold proclamations have been tamped down. This year's Bucks marketing drive is built around a new slogan: "Built to Stay." That, of course, references the gleaming, new Fiserv Forum, which will be the Bucks' home in Milwaukee for the foreseeable future. The question that will need to be answered on the Forum's court this season, though, is are the Bucks built to stay? General manager Jon Horst, entering his second full season in that position, has consistently spoken about his plan to construct the team the right way so that the Bucks can have sustained success, including ultimately competing for a championship. That all hinges on putting the right pieces around 23-year-old all-star Giannis Antetokounmpo, who is beginning the second year of a four-year contract. He's not leaving Milwaukee any time before the end of that contract and neither is head coach Mike Budenholzer, who was hired this spring to help the Bucks reach new heights. With those two pieces in place, Horst's challenge will be to determine who fits along with them on a perennial contending team. After years of growing a core nucleus, Horst is going to have some pivotal decisions to make after this season. Middleton can opt out of his contract and become a free agent. Eric Bledsoe and former rookie of the year Malcolm Brogdon are in the last year of their deals. The 2019 free-agent market is expected to include a bumper crop of big-name players, and Horst will need to decide who to pay and how much to spend as the Bucks face a tight situation relative to the luxury tax. Milwaukee may not yet be considered a legitimate title contender, but the Bucks' level of success in 2018-'19, as well as which players step up, will determine the direction of the franchise for years to come. The gravity of this season isn't lost on the men in Milwaukee's locker room. That's part of the reason why most of the players cut heir summer short to get together for nearly a month of voluntary workouts. “It’s no secret it’s time, especially for the guys that have been here for a while that have grown together, it’s time to take that next step," said center John Henson, who like Antetokounmpo and Middleton has been through a 15-win season, missing the playoffs and getting knocked out in the first round too often for his liking. Starting with Tuesday's training camp tip-off, the Bucks are going to have a lot to prove this season if they're going to live up to internal and external expectations. Under Budenholzer, everything will start at the defensive end, where the Bucks have recently been a confounding team featuring length and athleticism that haven't always translated into competence and efficiency. They'll also need to find their roles in Budenholzer's offensive system, which at first glance players have hailed as being more in line with the modern NBA. It's designed around ball and player movement as well as spacing the floor for creators like Antetokounmpo, Middleton and Bledsoe. How the Bucks, collectively and individually, respond to the challenge could have lasting ramifications on the franchise in the short- and long-term. If the Bucks are indeed "Built to Stay," they're officially on the clock to prove it.
2019-04-26T04:14:19
https://www.jsonline.com/story/sports/nba/bucks/2018/09/25/bucks-face-pivotal-season-training-camp-begins/1414092002/
0.999757
1. Mix brown sugar, whole-wheat flour and cinnamon in a small bowl. 2. Cut in butter with a pastry blender or your fingers until the mixture resembles coarse crumbs. 3. Stir in walnuts, if using. 1. Whisk whole-wheat flour, all-purpose flour, baking powder, baking soda, salt, cinnamon and nutmeg in a large bowl. 2. Whisk egg and brown sugar in a medium bowl until smooth. 3. Whisk in apple butter, syrup, cider, yogurt and oil. 4. Make a well in the dry ingredients; add the wet ingredients and stir with a rubber spatula until just combined. Scoop the batter into the prepared muffin cups (they'll be quite full). 5. Sprinkle with the streusel. 6. Bake the muffins until the tops are golden brown and spring back when touched lightly, 15 to 25 minutes. Let cool in the pan for 5 minutes.
2019-04-21T21:06:09
http://pinkitaly.forumotion.com/t698-spiced-apple-cider-muffins
0.997316
Find a Drug and Alcohol Rehab Program near me in Arlington Heights, IL. Drug rehab in Arlington Heights, IL. is an invaluable opportunity for a person with any degree of addiction, even people who feel there's no hope for them. Loved ones may also begin to feel this way, but hope is not lost as long as action is taken straight away to improve the situation through getting the individual in a top quality drug rehab facility. There is absolutely no wrong time to do so, and rock bottom doesn't have to be reached before someone can get help. The sooner someone gets to rehabilitation in Arlington Heights, the sooner they can determine what causes their addiction and self destructive behavior and begin to correct it little by little. Doing so needs time, and it's best to go through the treatment process in an environment where one feels secure to open up concerning the things in one's life that likely prompted the situation. So an inpatient and residential alcohol and drug rehab center in Arlington Heights, IL. is ideal, because individuals won't have accessibility to alcohol or drugs when weak, nor will they feel threatened by detrimental people or distractions from their normal lives back at home. Everyone should have this opportunity, even if they don't feel deserving of it at this time. Drug and alcohol rehabilitation in Arlington Heights, Illinois is in fact no vacation, and individuals will need to work to find out what changes they need to make to stay abstinent and build a life for themselves which will keep them that way and help them be successful and happy. This may take some time for some, that have likely burned every bridge and lost everything of worth to them throughout their addiction. However this is time well spent, and the best drug rehabilitation centers in Arlington Heights, IL. allow clients this space and time for as long as needed to generate a true and full recovery. Land Demographics, Arlington Heights, IL. Household and Income Statistics in: Arlington Heights, IL. Located at 3265 North Arlington Heights Road Arlington Heights, IL. 60004. The phone number is 412-532-4769. Counseling Center of Illinois Inc is located at 115 South Wilke Road Arlington Heights, IL. 60005. This is a Drug and Alcohol Rehab, Outpatient Drug Rehab Program specializing in Spanish Speaking. They accept Self Payment, Private Insurance, Sliding Scale Payment. The phone number is 773-777-6767. Arlington Center for Recovery LLC is a Drug and Alcohol Rehab, Outpatient Drug Rehab Program with a focus on Dui/Dwi Offenders, Spanish Speaking. The address is 1655 South Arlington Heights Road Arlington Heights, IL. 60005 and phone number is 847-427-9680. Renaissance Center for Counseling is a Drug and Alcohol Rehab, Outpatient Drug Rehab Program specializing in Dui/Dwi Offenders. This facility accepts Self Payment, Private Insurance - located at 1508 North Arlington Heights Road Arlington Heights, IL. 60004. The phone number is 847-800-3105. Located at 415 East Golf Road Arlington Heights, IL. 60005. The phone number is 847-593-6201. DUI Counseling Center Wilke Commons is a Drug and Alcohol Rehab, Outpatient Drug Rehab Program with a focus on Dui/Dwi Offenders, Spanish Speaking. The address is 17 North Wilke Road Arlington Heights, IL. 60005 and phone number is 847-632-1740. LSSI BHS in the Northwest Suburbs is a Drug and Alcohol Rehab, Outpatient Drug Rehab Program specializing in Adolescent Treatment, Treatment for Women, Spanish Speaking. This facility accepts Self Payment, Medicaid, State Financed Insurance, Private Insurance, Sliding Scale Payment - located at 415 West Golf Road Arlington Heights, IL. 60005. The phone number is 847-640-7954. Adult Counseling Center is a Drug and Alcohol Rehab, Outpatient Drug Rehab Program that can be reached at 847-593-6201. They specialize in Treatment for Women, Treatment for Men, Dui/Dwi Offenders, Criminal Justice Clients, Spanish Speaking and accept the following forms of payment: Self Payment. They are located at 415 East Golf Road Arlington Heights, IL. 60005. Specialized in Adolescent Treatment, Spanish Speaking. Payment forms accepted: Self Payment, Medicaid, State Financed Insurance, Private Insurance, Sliding Scale Payment. Located at 1616 North Arlington Heights Road Arlington Heights, IL. 60004. The phone number is 847-353-1500. Alexian Bros Center for Mental Health is located at 3436 North Kennicott Avenue Arlington Heights, IL. 60004. This is an Outpatient Drug Rehab Program specializing in Treatment for Seniors, Spanish Speaking. They accept Self Payment, Medicaid, Medicare, State Financed Insurance, Private Insurance, Military Insurance, Sliding Scale Payment, Payment Assistance. The phone number is 847-952-7460 x7471.
2019-04-22T10:37:58
https://www.drugrehabillinois.com/drug_treatment_city/Arlington_Heights.htm
0.996029
Statement 1. Children and young people who are referred to a specialist mental health service with a first episode of psychosis start assessment within 2 weeks. Statement 2. Children and young people with a first episode of psychosis and their family members are offered family intervention. Statement 3. Children and young people newly diagnosed with bipolar depression or a first episode of psychosis are offered a psychological intervention. Statement 4. Parents and carers of children and young people newly diagnosed with bipolar disorder, psychosis or schizophrenia are given information about carer‑focused education and support. Statement 5. Children and young people with bipolar disorder, psychosis or schizophrenia are given healthy lifestyle advice at diagnosis and at annual review. Statement 6. Children and young people with bipolar disorder, psychosis or schizophrenia prescribed antipsychotic medication have their treatment monitored for side effects. Statement 7 (developmental). Children and young people with bipolar disorder, psychosis or schizophrenia who are in crisis are offered home treatment if it is suitable. Statement 8. Children and young people with bipolar disorder, psychosis and schizophrenia have arrangements for accessing education or employment‑related training included in their care plan.
2019-04-26T03:37:50
https://www.nice.org.uk/guidance/qs102/chapter/List-of-quality-statements
0.999649
With a title like that I realize I'm opening myself to be ridiculed by some instigator who will tell me how boring MY blog post is. I also realize that for the general public, the topic of SEO is enough to make folding laundry sound fun, so if you are one of those people, this post is not for you. However, if you like exposing new people to your brand and driving traffic to your website, this blog post IS for you. It seems like 'Content is King'? has been the main SEO 'buzz'? phrase for an eternity already, even if in actuality it's only been a couple years. Unfortunately, the meaning of that statement can be interpreted in a variety of different ways. I'd like to amend the phrase to say 'Interesting, Useful, and Shareable Content is King.'? Now that Google Panda updates will be part of a real time algorithm, creating content that people find useful will continue to be a major attribute for achieving visibility for key terms. On the flip side, search engines are becoming increasingly savvier in regards to devaluing content that was only created to benefit keyword rankings. Developments such as Google Authorship can help brands maximize the effectiveness of their content more than ever before. If I didn't work for this company, would I find this interesting? Would anyone I know be interested in sharing this? I know it's probably tough to swallow, but most brands aren't nearly as exciting as they think they are. While some content can have a direct correlation to a brand's offerings, a large amount of content should expose a whole new audience to the brand. For example, a blog for a women's fashion shoe company would be incredibly boring and self serving if it only talked about their newest styles. Instead the blog would be far more effective if it talked about things that are more relatable to the general public, such as fashion tips and celebrity style. The company could take it a step further and talk about broader topics that appeal to women including healthy eating, dating tips, and other topics women might find interesting (what do I know? I'm clearly a dude). By casting a wider net and connecting to the people who might potentially buy the shoes, a whole new audience will land on the site and be exposed to the products. Someone who lands on the site might not have even been looking for shoes previously, but they enjoyed the content so much that they clicked through to see what the brand was all about. As long as blog posts strategically link back to the core site in a strategic and non-pitchy way, the blog post is doing its job. While it should be common knowledge by now, brands should always share their content with their social media followers (in moderation of course'?¦more than once a day might be overkill). These are the people that like the brand enough to have already followed them, so they are most likely to share this content with other people as well. These social signals will only help content rank higher in search engines. Since we're talking about social media, it's really important that brands START USING GOOGLE PLUS. Trust me, just because it doesn't have as many users as Facebook and Twitter, doesn't mean it should be ignored. Google Plus is already having a major impact on Google search results. In closing, no matter what your company sells, the blog is an opportunity to have a little fun and write content that might expose the brand to a whole new audience. Think outside the box a bit, and think about the stuff you like to read when you aren't working. Your strategy should start to make more sense from there.
2019-04-26T10:05:33
https://www.ampagency.com/blog/your-blog-is-boring
0.998669
Proving fraud - intentionally deceiving a buyer of a work of art - is often quite difficult, says Lawrence Katz, counsel for the inspection division of the United States Postal Service, because "in the very subjective world of the arts, people can simply make an honest mistake." With convictions rare, counterfeits can easily go back into circulation. "The best way to ensure that a counterfeit artwork doesn't resurface in the art world is to destroy or deface it," says Catherine Begley, a special agent in the New York office of the Federal Bureau of Investigation. "Shred it, incinerate it, stamp it so that no one will be fooled again." Both the US Postal Service and the FBI try to do exactly that, permanently marking the work (branding a sculpture or applying an ink stamp to a painting or work on paper) as a fake, and requiring that the work be accompanied by a certificate describing it as counterfeit. The FBI and the Postal Service generally don't want to give the fakes back to the person convicted of selling or trying to sell them out of concern that the works will be used in a future scam. "You see the same artworks showing up again and again, sometimes three or four times," says Lynne Chaffinch, program manager for major art thefts at the FBI. Jack Ellis, a Postal Service inspector who led an investigation into a nationwide art forgery ring in the 1980s and '90s, oversaw the incineration of tens of thousands of fake Chagall, Dali, Miro, and Picasso prints in 1997. But still he was startled to find that thousands of fakes confiscated by the government were allowed to return to the market. In 1995, "we asked the trial judge to let us destroy all the pieces we knew were fakes," he says. Instead, the judge ordered 11,000 of the counterfeit prints auctioned off to repay the Postal Service for its costs investigating the case. The prints, which had been marked as counterfeits in small letters on the back and were accompanied by certificates stipulating that they were fakes, raised $347,550. "Our fear, of course, is that some of these auctioned works may get into the wrong hands," Mr. Ellis says. "Cover the back of the print with a mat, lose the certificate that says it's a fake, and someone is back in business selling counterfeit art. It's very discouraging." Art dealers lobbied Ellis to not destroy the fakes. "I had a lot of offers from dealers," he says. "Some offered up to a million dollars to buy these prints so that they could sell them as "the famous fakes."
2019-04-25T07:47:54
https://www.csmonitor.com/2001/0309/p16s1.html
0.999568
SPOILER ALERT: This article contains information about the ending of Thor, please be advised. When Marvel Studios first announced their plans to bring the Marvel Universe to the big screen, many fans were skeptical. After all, this would involve launching four different successful franchises and then bridging them into one cohesive film. But with Iron Man, and The Incredible Hulk previously released, Thor opening in theaters on Friday, Captain America: The First Avenger scheduled for release on July 22nd, and The Avengers currently in production, say what you will but it looks like the people at the "house of ideas' have actually managed to pull it off. With The Avengers line-up pretty much already locked, one question still remains ... who will be the villain? While there have been rumors of the filming having more than one villain, it's previously been announced that Tom Hiddleston's Loki will be one of them. But as you will see at the end of Thor, Loki may not look exactly like Tom Hiddleston in The Avengers. In classic Marvel tradition there is a final scene after the credits that features Sam Jackson's Nick Fury speaking with Stellan Skarsgard's Dr. Erik Selvig about the Cosmic Cube, a recently discovered item with untold power. It is then revealed that, after the conclusion of the film, Loki was transported to Earth and is now possessing Dr. Selvig. This makes you wonder just how much of Loki's role in The Avengers will be played by Tom Hiddleston and how much will be played by Stellan Skarsgard? To begin with, the end credit scene in Thor acts as a teaser to The Avengers, and we can see from that scene that you are now possessing Dr. Selvig. So are you physically going to be playing Loki in The Avengers or will you be sharing the role in a sense with Stellan Skargard? Hiddleston: See this is where there could be some kind of assassin sitting and waiting to shoot me. Well you are on to something. You have seen that tag and you are on to something. So Loki can mind control people but there are certain things that Loki has to do himself. So I wouldn’t say that it is all going to be Stellan. So we will see Tom Hiddleston as Loki in The Avengers? Hiddleston: Tom as Loki is in The Avengers, I can guarantee that. Are you the main villain or are there others that you are working with? Hiddleston: Well this is the first time I’ve had to talk about it because for so long I was asked to not say anything. You are the first to ask me, you won’t be the only one, but you are the first. Loki has big, big plans and it’s going to take more that just Thor to stop him this time. Are those plans coming out of the ending of Thor, was that an origin movie for Loki in a way? Hiddleston: The action of Thor is as much an origin story for Loki as it is for Thor. I think the Loki we see in The Avengers is further advanced. You have to ask yourself the question: how pleasant an experience is it disappearing into a wormhole that has been created by some kind of super nuclear explosion of his own making? So I think by the time Loki shows up in The Avengers he’s seen a few things. Will The Avengers explain what happened to Loki in the time between the actual end of Thor and the beginning of the end credit scene? Hiddleston: There absolutely are references to what happened to him. There are references to where he’s been, and what he’s been doing. Have you read the entire script to The Avengers yet, and if so, what did you think? Hiddleston: Dude it’s absolutely amazing let me just tell you. I read the script again the other day and Joss Whedon has written the most extraordinary template of a film for this to happen. I feel like he has balanced it so well. All the different elements you want from all the different colors and flavors of each character are in there. Arguably seven not just four characters are in this and I think Joss has made a virtue of that potential unbalance. These are seven big egos, and I’m referring to the characters not the actors. They all want to be the alpha male, or in Black Widow’s case the alpha female. So he has made a virtue of that by having them all compete for the top dog slot. And while they are all fighting each other Loki can get to his business. Look it’s Hulk, Cap, Thor, Iron Man, Black Widow, Hawkeye, and Nick Fury. What more can you ask for? When do you begin shooting your scenes for the film? Hiddleston: I start in about ten days. It’s already started filming. It started last Monday, April the 25th. Chris (Hemsworth) and I, as soon as Thor is up and running and out in the world, we’ll be out to New Mexico with the rest of them. I’m so excited man. I feel like I’ve built the character now, I’ve built the house and in a way doing a second film is like getting to take credit for it. Finally, did you have any idea when you signed on to do Thor that you would also be in The Avengers as well? Hiddleston: I knew it would be more than just Thor but I didn’t know for sure. If I had sucked in Thor then Kevin Feige would have said, “Tom thank you very much and we never want to see you again.” So in a way it’s a huge compliment and I’m very pleased to at least be asked back to the playground. Thor opens in US theaters on Friday. The Avengers in scheduled for release on May 4th, 2012.
2019-04-22T16:31:24
http://www.iamrogue.com/news/movie-news/item/3534-exclusive-tom-hiddleston-discusses-lokis-role-in-the-avengers.html%E3%81%AE%E6%9B%B8%E5%BC%8F%E8%A8%AD%E5%AE%9A/%E4%BD%BF%E7%94%A8%E6%96%B9%E6%B3%95%E3%82%92%E4%BF%AE%E6%AD%A3
0.999999
If you are asked to prove that a sequence or a set exists with certain properties, then the best way of doing so may well be just to go ahead and do it: that is, you build the set/sequence up one element at a time, and however you do it you find that it is never difficult to continue building. Basic undergraduate mathematics. Transfinite induction for one of the examples. A subset of the plane is called dense if for every point in the plane and for every positive real number there exists a point such that the distance from to is at most . Does there exist a dense subset of the plane that contains no three points in a line? This is an example of a question that is quite hard (though not impossible) if you go about it the wrong way, and almost trivial if you are used to just-do-it proofs. The hard way of solving it is to try to think of a clever definition of a set that works. One might, for instance, start with a very obvious dense set, such as the set of all points with rational coordinates, and use a continuous map to distort it in such a way that no three points lie in a line. But such an approach will need some ingenuity: the continuous map would need to be nice enough for it to be possible to prove that no three rational points had images in a line, which would be a question in number theory; but it couldn't be too nice or there would be three images in a line. If you are interested in keeping life simple, then the mistake in such an approach is to try to define the whole set at once. What if instead you build it up element by element? The set of points within a distance of a point with rational coordinates is an open disc, so we can redescribe our problem as follows: we have a certain countable set of open discs , and we would like to find a set such that every contains at least one point of and no three points of lie in a line. Once reformulated in this very minor way, the problem is perfectly set up for a just-do-it approach. We need to contain a point in , so let be a point in . We need to contain a point in , so let be a point in . We need to contain a point in , so let be a point in , but this time we have to be a tiny bit careful because if (which we may as well assume), then must not be on the line that contains and . But you can't cover all of by a line, so it's easy to pick that avoids this line. In general, suppose that we have chosen distinct points such that belongs to for every and no three of the lie in a line. Can we continue the process? Well, we need to belong to , to be different from all of , and not to lie on any of the lines , where by this we mean the line that contains and . But one cannot cover an open disc with just finitely many points and lines, so there is no difficulty in choosing . It is not hard to modify the above proof to add the condition that every point in has rational coordinates. A just-do-it proof is one that builds a sequence that satisfies a sequence of constraints , where the th constraint, , is a property of , and where for any sequence that satisfies it is not hard to prove that there exists such that the sequence satisfies . In the example above, were points in the plane and was the property that for every , the with are distinct, and no three of those lie in a line. The notion of a just-do-it proof was crystallized by Béla Bollobás (though it is a sufficiently natural idea that many others will undoubtedly have thought of it for themselves) and reached this author via one of Bollobás's supervisees. Example 1 is what one might think of as a completely standard just-do-it proof, and there are many results that can be proved easily if one adopts this mentality. In the remainder of this article, we shall give two further examples of the basic just-do-it approach, followed by two examples of problems that are not immediately obviously of the just-do-it type, but which can be converted into ones that are, and finally an example where the building-up process continues transfinitely. Is it possible to colour the positive integers with two colours, red and blue, in such a way that no infinite arithmetic progression is coloured entirely red or entirely blue? Once again, a very small amount of reformulation is needed to bring out the just-do-it nature of this problem. First, one notes that there are only countably many infinite arithmetic progressions. If we enumerate these as , then it is enough to construct sequences and of positive integers such that for each both and belong to and such that no is equal to any . If we can do that, then we can colour the red, the blue, and all other integers however we like, and each will contain at least one red point and at least one blue point. But this is a very easy task. If we have chosen and such that and belong to for each and such that no is equal to any , then there is no difficulty in continuing the sequence with and , since is infinite and there are only finitely many numbers that have already been used. In this case it is quite easy to define a colouring that works, but the just-do-it approach brings out the true nature of the problem: that it is trivial. Is it possible to find exponentially many subsets of such that any two of them have symmetric difference of size at least ? There are clever methods in coding theory for defining such a collection of sets, but these methods were serious mathematical results. Actually, so was the observation that a just-do-it approach would work, but from today's perspective is more or less obvious. All you do is choose a sequence of sets however you like, making sure only that when you choose the symmetric difference of and has size at most for every . When is this easy to do? Well, for a set to have symmetric difference with of size at most you have to choose a set of size at most to be the symmetric difference. The number of these is at most , and it is a straightforward exercise (consider ratios of successive binomial coefficients) to show that this is bounded above by for some constant that is strictly less than 2. Therefore, provided , we can continue the sequence. From this it follows that we can choose exponentially many such sets. Are all real numbers algebraic? That is, is every real number a root of some polynomial with integer coefficients? The answer is of course no, and as is very well known there are two contrasting approaches. One is that of Liouville, which was to prove that no algebraic number can be too well approximated by rationals and then to construct a real (and irrational) number that could be very well approximated by rationals. In a similar spirit, Hermite and Lindemann showed that and are transcendental. The other approach is that of Cantor, who noted that the algebraic numbers form a countable set, while the real numbers are uncountable. It is often stated (even by me on occasion) that Cantor's proof is an abstract existence proof. But a better way of regarding it is as a just-do-it proof, as I shall explain. One way of specifying a real number is as the unique point that belongs to a nested intersection of closed intervals with widths that tend to zero. That is, one uses the lemma (which is equivalent to the completeness property of the reals) that if and are sequences of real numbers such that is a non-negative sequence that tends to zero, then there is exactly one real number that belongs to every closed interval . This is useful to us because it allows us to construct a sequence of some kind rather than defining all at once; it therefore opens up the possibility of a just-do-it proof. What properties should the sequence of intervals have if we want the intersection not to equal any of the ? Well, if we ensure that for each the number does not belong to the interval then we will certainly have ensured that does not belong to the intersection of all those intervals. Therefore, we will be done if we can construct the intervals in such a way that , that for every and (less importantly) that the lengths tend to zero. But this is easy: given any closed interval and any real number one can find a closed subinterval that does not contain and has at most half the length of . The above proof is inexplicit in the sense that it does not directly specify a transcendental number. However, with a little trouble it can be converted into an algorithm for generating the sequence of intervals, so in that sense it is a constructive proof. (One would have to modify it slightly so that for each polynomial one found good approximations to its roots and then avoided any numbers that were within the margin of error.) But what the proof does not give is a formula for the intersection of the intervals that result. Is there an infinite matrix such that for every and for every ? We have already seen that problems may need to be reformulated in order to become amenable to the basic just-do-it technique. Up to now the reformulation has been very mild. This example is here to show that sometimes it can be slightly deeper. I will say later more precisely what I mean by this comment. Let us begin with the observation that we have a countable set of conditions that our matrix must satisfy: its rows must tend to 0 and its columns must tend to 1. The main constraint we face is that if a row and a column intersect then they must take the same value at the point of intersection. There is thus the potential for a just-do-it proof, but in order to make it fit the general description of such proofs we need to choose what order to do the tasks in. This is where the very slight depth arises: effectively we need to prove that the union of the set of all rows and the set of all columns is countable. The simplest way of listing them is to take the first row, then the first column, then the second row, then the second column, and so on. If we do this then the problem becomes as easy as the other examples above. How can we make the first row tend to 0? The simplest way is to set for every . How can we make the first column tend to 1, given that it must agree with the first row at ? The simplest way is to set and for every . If we continue in this way then we rapidly see that it produces the example if and if . One sometimes sees examples such as given as solutions to this problem. While they too work, they obscure the fact that once again the problem is trivial (in the sense that no serious constraints arise when one tries to build an example). Here is an exercise. Let be any function from to . Prove that there is a function from such that for any two rational numbers and the limit of , as tends to infinity in , is . This problem would be pretty hard to solve with an explicit formula but it is just as easy as all the others if one uses a just-do-it approach. Is there a subset such that for every positive real number there is exactly one pair of points in such that the distance between and is ? The answer to this is yes, but this time the building-up process is transfinite. The set is required to satisfy one constraint for each positive real number . So we build it up an element at a time, with each new element designed to make sure that some new distance occurs. Of course, as we do so, we must be careful that no distance occurs twice. If the positive reals are well-ordered, then we can associate with each one an ordinal , which we call its index. Now let us define the elements of by induction on these ordinals. Suppose that we have defined a sequence of sets , one for each ordinal less than , in such a way that (i) if then , (ii) for each the real number with index occurs as a distance in , and (iii) no distance occurs more than once in any . We now construct as follows. If the distance with index occurs in some with then we let be the union of all with . Otherwise, we take this union and add an extra point to it in order to create a distance of . To do this, we choose an arbitrary point in the union and look at the circle of radius about . We would like to pick a point in this circle to add to our set, since this would give us a distance of . However, we must not add a point that causes any of the existing distances to be duplicated. Geometrically speaking, our new point must not lie on any circle about any existing point if the radius of that circle is equal to a distance we already have in the set. But each such circle intersects the circle of radius about in at most two points, and the number of such circles is easily checked to be less than the cardinality of , which is the cardinality of any circle, so we can find a new point to continue our sequence. Continuing in this way we create the desired set. I'm unsure of whether this belongs in the article proper, or in a separate article, or just restricted to the comments, but of course one can also use a just-do-it method to construct a set with undesirable properties, as in a proof by contradiction. (The example I'm thinking of right now is in the usual proof of Hilbert's basis theorem, but the general trick is a common one – it's essentially used in Euclid's proof of infinitely many primes.) So the question is, where does this variation on the trick go in the Tricki? In Example 2,'.....such that no r_i is equal to any b_j.' Do you mean to say '.... such that no r_i is equal to any b_i.'? No, I need all the to differ from all the , so that we are free to colour the red and the blue. I called them to emphasize this. "It's pretty obvious that you can't cover an open disc with finitely many points and lines, but it is not quite trivial, so here's an easy proof: ..." A simpler proof: it is impossible to cover even a circle with finitely many lines, since a line can intersect a circle at at most 2 points!
2019-04-20T20:41:30
http://www.tricki.org/article/Just-do-it_proofs
0.999049
The CCP wants long-term generational change and younger Uighurs to forget their religious and cultural roots, Zenz says in the latest MERICS Experts podcast. A network of lawyers in China has led a bold effort to enforce the rule of law, but Communist opposition is formidable. He stressed the campaign would be focused on training the next generation to uphold “socialism with Chinese characteristics”, the Chinese Communist party’s adaptation of Marxism-Leninism. This case raises several important questions for international groups seeking to work in China. Does this case represent a period of stricter enforcement of the Foreign NGO Law? If so, some groups may have to rethink what types of activities they are comfortable attempting in the mainland. But since the publication of her 2017 paper Magic Weapons, which details the extent of Chinese influence in New Zealand, Brady’s life has been turned upside down, becoming the target of a campaign of intimidation and “psy-ops” she believes is directed by Beijing towards her and her family. The signatories of the letter, who said they were “deeply concerned” about the detention of the two Canadians, include former ambassadors to China from Canada, the United States, Britain, Australia, Germany, Sweden, and Mexico, two former US deputy assistant secretaries of state, and former foreign ministers from Britain and Australia. Beijing warned Washington on Tuesday against proceeding with its formal extradition request for Meng, chief financial officer of Chinese telecoms giant Huawei Technologies, which US officials are expected to file before the January 30 deadline. If Canada extradites Meng to the US to face charges, Americans could face repercussions, albeit to a lesser degree, according to observers. Friends of Yang say he was taken into custody immediately after flying from New York to China on Saturday, and since then, the democracy advocate's normally active Twitter feed has fallen silent. While previous CCP supreme leaders have made similar threats in the past, this time is different because the PRC state’s quest for greatness now includes the capacity to deliver on an agenda of territorial expansion. The atmosphere of disappointment and distrust that pervades amid a trade war between the world’s two most powerful countries shows few signs of dissipating, and portends an extended period of instability that will require a fundamental rethinking of how to maintain stability in Asia and beyond. How did the PRC come to this? I see two broad reasons: an official CCP misunderstanding of what Islam means to most Uighurs and other Muslim groups, and a recent CCP embrace of Han-centric ethnic assimilationism, an idea that runs counter to traditional Chinese modes of pluralism. China’s birth rate last year fell to its lowest since the founding of the People’s Republic of China 70 years ago, official data showed on Monday, with looser population controls failing to encourage couples to have more babies. The China Center for Disease Control recently determined that 25.9 percent of Beijingers are 肥胖 (féipàng), or obese (read more about that in Chinese here). That's the highest ranking of 31 provinces covered in the survey and far above the national average. Known as ‘the city of a hundred lakes’ until most got paved over, Wuhan has a flooding problem. Can permeable pavements and artificial wetlands soak it up? China reports its economy for 2018 grew at its slowest pace since 1990. The slowdown has economists worried about the impact on the global economy. "I can tell you, after the Huawei events, all the Chinese money into Silicon Valley stops. And no U.S. money will want to invest into China either." Amid rising concerns of curtailed academic freedoms, U.S. universities are increasingly closing down Confucius Institutes, which are Chinese government-funded centers offering Mandarin-language and cultural courses that at one point numbered over 100 in North America alone. The private screening was part of efforts by Chinese authorities to stem a groundswell of activism on China’s university campuses, with students taking up causes from #MeToo to the rights of migrant and factory workers. A Chinese scientist who claimed to have created the world’s first genetically edited babies “seriously violated” state regulations, according to the results of an initial government investigation reported on Monday by Chinese state media. China’s cyber watchdog said on Wednesday it had deleted more than 7 million pieces of online information as well as 9,382 mobile apps, and it criticized tech giant Tencent’s (0700.HK) news app for spreading “vulgar information”. I’ve written a series of posts on ritual activity around the Shaanbei countryside (starting with this, recently-updated), but here I enter the regional capital Yulin to outline a recreational form of vocal music with ensemble, now moribund. Last November I had the opportunity to make a trip back to China with some friends. We spent a couple days in Shanghai, which was long enough to remind me of what a fabulous city it is, something that isn’t always easy for this Beijinger to admit. So, how to do the ’Du? The best advice was penned 1,100 years ago by a man raised near Chengdu, the renowned bard Li Bai: “Life in the world is but a big dream. I will not spoil it by any labour or care.” This is a city where tea is not served by the cup but by the flask, so take it slow. Fewer than 300 people will be allowed to climb the world’s highest mountain from the north side as part of a major clean-up operation. With a history of Jewish immigration spanning to the days of the Silk Road, there has been a presence of Judaism in China since the imperial times of the Tang Dynasty (618-907). People are mainly fed up with what the Chinese call “bear children” — a not-so-polite term for spoiled children who misbehave in public. Edinburgh is now the second most-visited city in the UK by Chinese tourists, after London, and last summer direct flights began between the Scottish capital and Beijing. I asked children and parents who'd lived both abroad and here in the States what struck them as the biggest difference. They all said it was the lack of childhood independence in America.
2019-04-19T08:15:17
https://www.chinasource.org/resource-library/zgbriefs/zgbriefs-january-24-2019
0.998661
Whether the ceremonies of the Law were in existence before the Law? Objection 1. It would seem that the ceremonies of the Law were in existence before the Law. For sacrifices and holocausts were ceremonies of the Old Law, as stated above (101, 4). But sacrifices and holocausts preceded the Law: for it is written (Gn. 4:3,4) that “Cain offered, of the fruits of the earth, gifts to the Lord,” and that “Abel offered of the firstlings of his flock, and of their fat.” Noe also “offered holocausts” to the Lord (Gn. 18:20), and Abraham did in like manner (Gn. 22:13). Therefore the ceremonies of the Old Law preceded the Law. Objection 2. Further, the erecting and consecrating of the altar were part of the ceremonies relating to holy things. But these preceded the Law. For we read (Gn. 13:18) that “Abraham . . . built . . . an altar to the Lord”; and (Gn. 28:18) that “Jacob . . . took the stone . . . and set it up for a title, pouring oil upon the top of it.” Therefore the legal ceremonies preceded the Law. Objection 3. Further, the first of the legal sacraments seems to have been circumcision. But circumcision preceded the Law, as appears from Gn. 17. In like manner the priesthood preceded the Law; for it is written (Gn. 14:18) that “Melchisedech . . . was the priest of the most high God.” Therefore the sacramental ceremonies preceded the Law. Objection 4. Further, the distinction of clean from unclean animals belongs to the ceremonies of observances, as stated above (100, 2, 6, ad 1). But this distinction preceded the Law; for it is written (Gn. 7:2,3): “Of all clean beasts take seven and seven . . . but of the beasts that are unclean, two and two.” Therefore the legal ceremonies preceded the Law. On the contrary, It is written (Dt. 6:1): “These are the precepts and ceremonies . . . which the Lord your God commanded that I should teach you.” But they would not have needed to be taught about these things, if the aforesaid ceremonies had been already in existence. Therefore the legal ceremonies did not precede the Law. I answer that, As is clear from what has been said (101, 2; 102, 2), the legal ceremonies were ordained for a double purpose; the worship of God, and the foreshadowing of Christ. Now whoever worships God must needs worship Him by means of certain fixed things pertaining to external worship. But the fixing of the divine worship belongs to the ceremonies; just as the determining of our relations with our neighbor is a matter determined by the judicial precepts, as stated above (99, 4). Consequently, as among men in general there were certain judicial precepts, not indeed established by Divine authority, but ordained by human reason; so also there were some ceremonies fixed, not by the authority of any law, but according to the will and devotion of those that worship God. Since, however, even before the Law some of the leading men were gifted with the spirit of prophecy, it is to be believed that a heavenly instinct, like a private law, prompted them to worship God in a certain definite way, which would be both in keeping with the interior worship, and a suitable token of Christ’s mysteries, which were foreshadowed also by other things that they did, according to 1 Cor. 10:11: “All . . . things happened to them in figure.” Therefore there were some ceremonies before the Law, but they were not legal ceremonies, because they were not as yet established by legislation. Reply to Objection 1. The patriarchs offered up these oblations, sacrifices and holocausts previously to the Law, out of a certain devotion of their own will, according as it seemed proper to them to offer up in honor of God those things which they had received from Him, and thus to testify that they worshipped God Who is the beginning and end of all. Reply to Objection 2. They also established certain sacred things, because they thought that the honor due to God demanded that certain places should be set apart from others for the purpose of divine worship. Reply to Objection 3. The sacrament of circumcision was established by command of God before the Law. Hence it cannot be called a sacrament of the Law as though it were an institution of the Law, but only as an observance included in the Law. Hence Our Lord said (Jn. 7:20) that circumcision was “not of Moses, but of his fathers.” Again, among those who worshipped God, the priesthood was in existence before the Law by human appointment, for the Law allotted the priestly dignity to the firstborn. Reply to Objection 4. The distinction of clean from unclean animals was in vogue before the Law, not with regard to eating them, since it is written (Gn. 9:3): “Everything that moveth and liveth shall be meat for you”: but only as to the offering of sacrifices because they used only certain animals for that purpose. If, however, they did make any distinction in regard to eating; it was not that it was considered illegal to eat such animals, since this was not forbidden by any law, but from dislike or custom: thus even now we see that certain foods are looked upon with disgust in some countries, while people partake of them in others. Whether, at the time of the Law, the ceremonies of the Old Law had any power of justification? Objection 1. It would seem that the ceremonies of the Old Law had the power of justification at the time of the Law. Because expiation from sin and consecration pertains to justification. But it is written (Ex. 39:21) that the priests and their apparel were consecrated by the sprinkling of blood and the anointing of oil; and (Lev. 16:16) that, by sprinkling the blood of the calf, the priest expiated “the sanctuary from the uncleanness of the children of Israel, and from their transgressions and . . . their sins.” Therefore the ceremonies of the Old Law had the power of justification. Objection 2. Further, that by which man pleases God pertains to justification, according to Ps. 10:8: “The Lord is just and hath loved justice.” But some pleased God by means of ceremonies, according to Lev. 10:19: “How could I . . . please the Lord in the ceremonies, having a sorrowful heart?” Therefore the ceremonies of the Old Law had the power of justification. Objection 3. Further, things relating to the divine worship regard the soul rather than the body, according to Ps. 18:8: “The Law of the Lord is unspotted, converting souls.” But the leper was cleansed by means of the ceremonies of the Old Law, as stated in Lev. 14. Much more therefore could the ceremonies of the Old Law cleanse the soul by justifying it. On the contrary, The Apostle says (Gal. 2) [The first words of the quotation are from 3:21: St. Thomas probably quoting from memory, substituted them for 2:21, which runs thus: ‘If justice be by the Law, then Christ died in vain.’]: “If there had been a law given which could justify [Vulg.: ‘give life’], Christ died in vain,” i.e. without cause. But this is inadmissible. Therefore the ceremonies of the Old Law did not confer justice. On the other hand, they had no power of cleansing from uncleanness of the soul, i.e. from the uncleanness of sin. The reason of this was that at no time could there be expiation from sin, except through Christ, “Who taketh away the sins [Vulg.: ‘sin’] of the world” (Jn. 1:29). And since the mystery of Christ’s Incarnation and Passion had not yet really taken place, those ceremonies of the Old Law could not really contain in themselves a power flowing from Christ already incarnate and crucified, such as the sacraments of the New Law contain. Consequently they could not cleanse from sin: thus the Apostle says (Heb. 10:4) that “it is impossible that with the blood of oxen and goats sin should be taken away”; and for this reason he calls them (Gal. 4:9) “weak and needy elements”: weak indeed, because they cannot take away sin; but this weakness results from their being needy, i.e. from the fact that they do not contain grace within themselves. However, it was possible at the time of the Law, for the minds of the faithful, to be united by faith to Christ incarnate and crucified; so that they were justified by faith in Christ: of which faith the observance of these ceremonies was a sort of profession, inasmuch as they foreshadowed Christ. Hence in the Old Law certain sacrifices were offered up for sins, not as though the sacrifices themselves washed sins away, but because they were professions of faith which cleansed from sin. In fact, the Law itself implies this in the terms employed: for it is written (Lev. 4:26; 5:16) that in offering the sacrifice for sin “the priest shall pray for him . . . and it shall be forgiven him,” as though the sin were forgiven, not in virtue of the sacrifices, but through the faith and devotion of those who offered them. It must be observed, however, that the very fact that the ceremonies of the Old Law washed away uncleanness of the body, was a figure of that expiation from sins which was effected by Christ. It is therefore evident that under the state of the Old Law the ceremonies had no power of justification. Reply to Objection 1. That sanctification of priests and their sons, and of their apparel or of anything else belonging to them, by sprinkling them with blood, had no other effect but to appoint them to the divine worship, and to remove impediments from them, “to the cleansing of the flesh,” as the Apostle states (Heb. 9:13) in token of that sanctification whereby “Jesus” sanctified “the people by His own blood” (Heb. 13:12). Moreover, the expiation must be understood as referring to the removal of these bodily uncleannesses, not to the forgiveness of sin. Hence even the sanctuary which could not be the subject of sin is stated to be expiated. Reply to Objection 2. The priests pleased God in the ceremonies by their obedience and devotion, and by their faith in the reality foreshadowed; not by reason of the things considered in themselves. Reply to Objection 3. Those ceremonies which were prescribed in the cleansing of a leper, were not ordained for the purpose of taking away the defilement of leprosy. This is clear from the fact that these ceremonies were not applied to a man until he was already healed: hence it is written (Lev. 14:3,4) that the priest, “going out of the camp, when he shall find that the leprosy is cleansed, shall command him that is to be purified to offer,” etc.; whence it is evident that the priest was appointed the judge of leprosy, not before, but after cleansing. But these ceremonies were employed for the purpose of taking away the uncleanness of irregularity. They do say, however, that if a priest were to err in his judgment, the leper would be cleansed miraculously by the power of God, but not in virtue of the sacrifice. Thus also it was by miracle that the thigh of the adulterous woman rotted, when she had drunk the water “on which” the priest had “heaped curses,” as stated in Num. 5:19-27. Whether the ceremonies of the Old Law ceased at the coming of Christ? Objection 1. It would seem that the ceremonies of the Old Law did not cease at the coming of Christ. For it is written (Bar 4:1): “This is the book of the commandments of God, and the law that is for ever.” But the legal ceremonies were part of the Law. Therefore the legal ceremonies were to last for ever. Objection 2. Further, the offering made by a leper after being cleansed was a ceremony of the Law. But the Gospel commands the leper, who has been cleansed, to make this offering (Mt. 8:4). Therefore the ceremonies of the Old Law did not cease at Christ’s coming. Objection 3. Further, as long as the cause remains, the effect remains. But the ceremonies of the Old Law had certain reasonable causes, inasmuch as they were ordained to the worship of God, besides the fact that they were intended to be figures of Christ. Therefore the ceremonies of the Old Law should not have ceased. Objection 4. Further, circumcision was instituted as a sign of Abraham’s faith: the observance of the sabbath, to recall the blessing of creation: and other solemnities, in memory of other Divine favors, as state above (102, 4, ad 10; 5, ad 1). But Abraham’s faith is ever to be imitated even by us: and the blessing of creation and other Divine favors should never be forgotten. Therefore at least circumcision and the other legal solemnities should not have ceased. I answer that, All the ceremonial precepts of the Old Law were ordained to the worship of God as stated above (101, A1,2). Now external worship should be in proportion to the internal worship, which consists in faith, hope and charity. Consequently exterior worship had to be subject to variations according to the variations in the internal worship, in which a threefold state may be distinguished. One state was in respect of faith and hope, both in heavenly goods, and in the means of obtaining them–in both of these considered as things to come. Such was the state of faith and hope in the Old Law. Another state of interior worship is that in which we have faith and hope in heavenly goods as things to come; but in the means of obtaining heavenly goods, as in things present or past. Such is the state of the New Law. The third state is that in which both are possessed as present; wherein nothing is believed in as lacking, nothing hoped for as being yet to come. Such is the state of the Blessed. In this state of the Blessed, then, nothing in regard to worship of God will be figurative; there will be naught but “thanksgiving and voice of praise” (Is. 51:3). Hence it is written concerning the city of the Blessed (Apoc. 21:22): “I saw no temple therein: for the Lord God Almighty is the temple thereof, and the Lamb.” Proportionately, therefore, the ceremonies of the first-mentioned state which foreshadowed the second and third states, had need to cease at the advent of the second state; and other ceremonies had to be introduced which would be in keeping with the state of divine worship for that particular time, wherein heavenly goods are a thing of the future, but the Divine favors whereby we obtain the heavenly boons are a thing of the present. Reply to Objection 1. The Old Law is said to be “for ever” simply and absolutely, as regards its moral precepts; but as regards the ceremonial precepts it lasts for even in respect of the reality which those ceremonies foreshadowed. Reply to Objection 2. The mystery of the redemption of the human race was fulfilled in Christ’s Passion: hence Our Lord said then: “It is consummated” (Jn. 19:30). Consequently the prescriptions of the Law must have ceased then altogether through their reality being fulfilled. As a sign of this, we read that at the Passion of Christ “the veil of the temple was rent” (Mt. 27:51). Hence, before Christ’s Passion, while Christ was preaching and working miracles, the Law and the Gospel were concurrent, since the mystery of Christ had already begun, but was not as yet consummated. And for this reason Our Lord, before His Passion, commanded the leper to observe the legal ceremonies. Reply to Objection 3. The literal reasons already given (102) for the ceremonies refer to the divine worship, which was founded on faith in that which was to come. Hence, at the advent of Him Who was to come, both that worship ceased, and all the reasons referring thereto. As to the sabbath, which was a sign recalling the first creation, its place is taken by the “Lord’s Day,” which recalls the beginning of the new creature in the Resurrection of Christ. In like manner other solemnities of the Old Law are supplanted by new solemnities: because the blessings vouchsafed to that people, foreshadowed the favors granted us by Christ. Hence the feast of the Passover gave place to the feast of Christ’s Passion and Resurrection: the feast of Pentecost when the Old Law was given, to the feast of Pentecost on which was given the Law of the living spirit: the feast of the New Moon, to Lady Day, when appeared the first rays of the sun, i.e. Christ, by the fulness of grace: the feast of Trumpets, to the feasts of the Apostles: the feast of Expiation, to the feasts of Martyrs and Confessors: the feast of Tabernacles, to the feast of the Church Dedication: the feast of the Assembly and Collection, to feast of the Angels, or else to the feast of All Hallows. Whether since Christ’s Passion the legal ceremonies can be observed without committing mortal sin? Objection 1. It would seem that since Christ’s Passion the legal ceremonies can be observed without committing mortal sin. For we must not believe that the apostles committed mortal sin after receiving the Holy Ghost: since by His fulness they were “endued with power from on high” (Lk. 24:49). But the apostles observed the legal ceremonies after the coming of the Holy Ghost: for it is stated (Acts 16:3) that Paul circumcised Timothy: and (Acts 21:26) that Paul, at the advice of James, “took the men, and . . . being purified with them, entered into the temple, giving notice of the accomplishment of the days of purification, until an oblation should be offered for every one of them.” Therefore the legal ceremonies can be observed since the Passion of Christ without mortal sin. Objection 2. Further, one of the legal ceremonies consisted in shunning the fellowship of Gentiles. But the first Pastor of the Church complied with this observance; for it is stated (Gal. 2:12) that, “when” certain men “had come” to Antioch, Peter “withdrew and separated himself” from the Gentiles. Therefore the legal ceremonies can be observed since Christ’s Passion without committing mortal sin. Objection 3. Further, the commands of the apostles did not lead men into sin. But it was commanded by apostolic decree that the Gentiles should observe certain ceremonies of the Law: for it is written (Acts 15:28,29): “It hath seemed good to the Holy Ghost and to us, to lay no further burden upon you than these necessary things: that you abstain from things sacrificed to idols, and from blood, and from things strangled, and from fornication.” Therefore the legal ceremonies can be observed since Christ’s Passion without committing mortal sin. On the contrary, The Apostle says (Gal. 5:2): “If you be circumcised, Christ shall profit you nothing.” But nothing save mortal sin hinders us from receiving Christ’s fruit. Therefore since Christ’s Passion it is a mortal sin to be circumcised, or to observe the other legal ceremonies. Reply to Objection 1. On this point there seems to have been a difference of opinion between Jerome and Augustine. For Jerome (Super Galat. ii, 11, seqq.) distinguished two periods of time. One was the time previous to Christ’s Passion, during which the legal ceremonies were neither dead, since they were obligatory, and did expiate in their own fashion; nor deadly, because it was not sinful to observe them. But immediately after Christ’s Passion they began to be not only dead, so as no longer to be either effectual or binding; but also deadly, so that whoever observed them was guilty of mortal sin. Hence he maintained that after the Passion the apostles never observed the legal ceremonies in real earnest; but only by a kind of pious pretense, lest, to wit, they should scandalize the Jews and hinder their conversion. This pretense, however, is to be understood, not as though they did not in reality perform those actions, but in the sense that they performed them without the mind to observe the ceremonies of the Law: thus a man might cut away his foreskin for health’s sake, not with the intention of observing legal circumcision. But since it seems unbecoming that the apostles, in order to avoid scandal, should have hidden things pertaining to the truth of life and doctrine, and that they should have made use of pretense, in things pertaining to the salvation of the faithful; therefore Augustine (Epist. lxxxii) more fittingly distinguished three periods of time. One was the time that preceded the Passion of Christ, during which the legal ceremonies were neither deadly nor dead: another period was after the publication of the Gospel, during which the legal ceremonies are both dead and deadly. The third is a middle period, viz. from the Passion of Christ until the publication of the Gospel, during which the legal ceremonies were dead indeed, because they had neither effect nor binding force; but were not deadly, because it was lawful for the Jewish converts to Christianity to observe them, provided they did not put their trust in them so as to hold them to be necessary unto salvation, as though faith in Christ could not justify without the legal observances. On the other hand, there was no reason why those who were converted from heathendom to Christianity should observe them. Hence Paul circumcised Timothy, who was born of a Jewish mother; but was unwilling to circumcise Titus, who was of heathen nationality. The reason why the Holy Ghost did not wish the converted Jews to be debarred at once from observing the legal ceremonies, while converted heathens were forbidden to observe the rites of heathendom, was in order to show that there is a difference between these rites. For heathenish ceremonial was rejected as absolutely unlawful, and as prohibited by God for all time; whereas the legal ceremonial ceased as being fulfilled through Christ’s Passion, being instituted by God as a figure of Christ. Reply to Objection 2. According to Jerome, Peter withdrew himself from the Gentiles by pretense, in order to avoid giving scandal to the Jews, of whom he was the Apostle. Hence he did not sin at all in acting thus. On the other hand, Paul in like manner made a pretense of blaming him, in order to avoid scandalizing the Gentiles, whose Apostle he was. But Augustine disapproves of this solution: because in the canonical Scripture (viz. Gal. 2:11), wherein we must not hold anything to be false, Paul says that Peter “was to be blamed.” Consequently it is true that Peter was at fault: and Paul blamed him in very truth and not with pretense. Peter, however, did not sin, by observing the legal ceremonial for the time being; because this was lawful for him who was a converted Jew. But he did sin by excessive minuteness in the observance of the legal rites lest he should scandalize the Jews, the result being that he gave scandal to the Gentiles. But since certain foods are more delicate than these and more conducive to gluttony, there seems no reason why these should have been forbidden more than the others. We must therefore follow the third opinion, and hold that these foods were forbidden literally, not with the purpose of enforcing compliance with the legal ceremonies, but in order to further the union of Gentiles and Jews living side by side. Because blood and things strangled were loathsome to the Jews by ancient custom; while the Jews might have suspected the Gentiles of relapse into idolatry if the latter had partaken of things offered to idols. Hence these things were prohibited for the time being, during which the Gentiles and Jews were to become united together. But as time went on, with the lapse of the cause, the effect lapsed also, when the truth of the Gospel teaching was divulged, wherein Our Lord taught that “not that which entereth into the mouth defileth a man” (Mt. 15:11); and that “nothing is to be rejected that is received with thanksgiving” (1 Tim. 4:4). With regard to fornication a special prohibition was made, because the Gentiles did not hold it to be sinful.
2019-04-25T15:43:35
https://lonang.com/library/reference/aquinas-summa-theologica/sum12103/
0.999999
A North Carolina man was arrested after DNA evidence linked him to the death of his girlfriend six years ago. Roger Lee Martin, 41, was taken into custody Monday by Asheboro Police and charged with the murder of his then girlfriend Nova 'Nikki' Robinson in 2013. Martin had called police that year in January and said his girlfriend of eight years was dead, according to Asheboro police. In a disturbing 911 call, Martin told operators that he did not know 'who would want to hurt her' and that she had a hole in her throat. Officers responded to the home at 302 Cherokee St. and found Martin holding Robinson as she lay on the floor in a pool of blood. Investigators claimed that Martin could not give coherent responses to the questions they had surrounding the case but nothing led to an arrest until now. Asheboro Police Department said in a news release: 'Advanced DNA testing enabled our detectives to satisfy all open questions that they had surrounding the investigation. Robinson was a mother-of-two and was studying at Randolph Community College to become a registered nurse. Her family claim that there were no signs of violence between the pair but they always believed Martin was responsible. An autopsy report revealed that she was stabbed at least 10 times across her upper body, including her face, neck and arms. Angela Jackson, Robinson's mother, told FOX8 that she will never have closure over the murder of her daughter. She said: 'I wish I could have been there to save her that day. I wish she’d never met him. He destroyed me. 'I’m happy about it. It needs to happen. He’s walked free for the last six years. It’s time for him and his mama to feel what I’m feeling because in a way, she’s losing a child. Jackson said she does not think she could ever forgive Martin, but the arrest is one step closer to healing after the loss of her beloved daughter. Officers responded to the home at 302 Cherokee St., (pictured), and found Martin holding Robinson as she lay on the floor in a pool of blood. She added: 'I’d slap him real hard and tell him he ruined this family,' Jackson said. 'He destroyed the dynamics of this family. Why didn’t you just walk away from it? Why’d you do what you’d done?. 'I never let her leave the house without telling her that I loved her and I’m glad I did that,' Jackson said. Martin was arrested at around 6pm Monday at a home in Lexington. He is being held at Randolph County Jail without bond and his first court appearance is scheduled for April 17. Jackson said she will be at every single court appearance until there is justice for her daughter.
2019-04-26T13:46:27
https://www.dailymail.co.uk/news/article-6932281/Man-called-911-say-girlfriend-hole-throat-arrested-killing-her.html?ns_mchannel=rss&ns_campaign=1490&ito=1490
0.99871
Often times a home buyer will ask themselves "Do I need to have a professional home inspection?". You've looked at a home thoroughly and you may think you are comfortable with everything you have viewed. Kaleb Thomas Home Inspection Service has the skill to methodically inspect the homes many components and report on the present condition of those noted items. When I receive the report, and if deficiencies are reported, how do I proceed? Deficiencies can be present in any building - even new ones. The question is - How serious are they and what will it take to correct them? We have seen people panic over deficiencies which can be easily corrected. Panic results when people do not understand the deficiency. We present this information so that the buyer can make informed decisions without fear. How can I know that I am hiring the right inspector? Home inspectors are generalists. They need to know something about hundreds of items that make up a home. The more overall knowledge the inspector has about these many items, the better service will be provided. All home inspectors will have limitations respective of their experience and background. There is no substitute for experience and knowledge. Kaleb Thomas Inspection Service makes every effort to meet and exceed the customers expectations.
2019-04-25T10:44:35
http://kalebthomasinspections.com/index.php/frequently-asked-questions
0.998692
The human body is largely vulnerable and is therefore, vulnerable to many threats caused by various diseases. These abnormalities could be the cause of external forces or phenomena which generated within the body itself. While the abnormalities which occur externally can be observed with the naked eye, certain dysfunctions which occur within the body cannot be observed that easily. It is for this purpose that various methods such as X-Ray and CT scan exist. X-Ray is a type of electromagnetic radiation of which the waves have a wavelength of 0.01 to 10 nanometers, frequencies in the range 30 petahertz to 30 exahertz, and energies which correspond to the range 120 eV to 120 keV. X-Rays are capable of penetrating some thickness of matter, thereby allowing to observe the condition of bones and also certain content in the stomach. Medical x-rays are produced by letting a stream of fast electrons come to a sudden stop at a metal plate, thereby producing images. The images produced by X-rays occur due to the varying absorption rates of different tissues. For example, calcium in bones absorbs X-rays the most which makes the bones appear white on the film which records of the X-ray image which called a radiograph. Fat and other soft tissues absorb X-Rays less than bones, thereby making them appear grey in color. Air absorbs the least amount of X-Rays, thereby, making the lungs look black on a radiograph. How does the CT scan function? A CT scan, which stands for Computed Tomography scan was also referred to as the CAT scan a while back. A CT scan is used in order to generate a three-dimensional image from two-dimensional x-ray pictures, one narrow slice at a time. A CAT scan thus takes these axial image, compile them together and recreate how the tissues and organs are located inside the body, aiding doctors arrive at an accurate diagnosis. X-Rays and CT scans both aid doctors in imaging the interior of the body and thus coming to a conclusion regarding what goes on inside the body. However, there exist some major differences between the two which cannot be ignored. However, X-Ray remains to be the much older technology whereas the CT scan came later on as an extended and a much more advanced form of scanning which examines the insides of the body more closely, thereby delivering more acute results. An X-Ray will only produce a two dimensional shadow of an object. It does not provide any details. X-Ray beams pass through almost any soft tissue in the body, thereby creating a shadow like impression of the bones on a radiograph. A shadow will deliver an incomplete picture of an object’s shape, thus avoiding the details. Since X-Ray only creates a shadow, it is possible that the smaller bones will get overshadowed by the larger shadows, thereby needing to turn the patient the other way in order to get a snapshot of the other parts. However, a CT scan machine creates three dimensional images of the body, thus taking snapshots of slivers of the body which enables the doctors to obtain more minute details regarding the internal organs. Furthermore, a CT scan machine revolves around the body of the patient, scanning the entire body as a whole and therefore, the patient does not need to be turned around in order to cover different angles of that person’s body. Because of the above reasons, X-Rays are used to inspect cases of broken bones and such incidents which do not require much insight whereas CAT scans are used to examining internal organs which are not very easy to get a clear picture of otherwise. Therefore, CT scans are widely used to diagnose diseases such as head trauma, cancer, osteoporosis and etc. It should also be mentioned that obtaining a X-Ray is a common practice which is done very frequently and it is much easier to obtain as well as being cheaper in price. A CT scan on the other hand is done more rarely and it is known to be quite costly as well. This is due to the reason that the CT scan equipment is known to be more costly and because of their complexity to operate, the people who operate them need to be better trained as well. Unlike in an X-Ray, a person is exposed to excessive amounts of radiation during a CT scan, as it is meant to obtain multiple images during a single scan. This is known to be quite hazardous to health which is why doctors opt for scan only certain areas of the body to avoid full body exposure to the rays. The professionals who operate the machine themselves are seen to be operating from within a shielded room to avoid exposing themselves as well. There is no such hazard in obtaining a X-Ray as an individual is not exposed to an excessive amount of radiation during the process. Thereby, X-Rays remain to be emitting the least amount of radiation, thus making the CT scan the more hazardous of the two. X-Ray creates two dimensional images whereas a CT scan creates three dimensional images. X-Ray is cheaper and is practiced commonly whereas CT scan is much more expensive and is not seen to be done commonly. CT scan is a more sophisticated, modern form of scanning whereas X-Ray is known to be the elder of the two. CT scan exposes the individual to more radiation than a X-Ray.
2019-04-22T18:50:03
http://www.wikidifference.com/difference-between-x-ray-and-ct-scan/
0.997943
Is it clear to anybody why the following code crashes? It does crash when I am calling CalculateField_management() with a Python expression AND that my object name is "arcgis". It does NOT happen with a VB expression or when the object is named differently. To me, it is like CalculateField_management() is somehow getting out of its namespace to kill a resource named 'arcgis' in another namespace.. ? Does anybody understand or know a post related to similar issues? # Give the object any other name than 'arcgis' and it works.. (Edited) I have deleted my original suggestion after rereading your code. I realized I had misread the code and that my suggestion about the class name capitalization could not be the source of the problem (and your revised code proves that). I just don't like the idea of using arcgis as a class name or variable, since it could be a word that ESRI may reserve at some time (or may have already reserved based on the fact that you seem to think that your code is generating a conflict with an existing resource). Try changing the arcgis variable name to something else and see if the same error is generated. If it is, something other than a conflicting resource is at work. Thank you for your answer. It was not an issue to name the class 'ArcGIS', precisely because Python is case sensitive, but you are right it was not the smartest choice of mine to do so. I changed it for 'MyClass' to clarify the example, which still crashes. Richard, thank you for the second paragraph of your reply, I totally agree. After discovering this behavior I banned 'arcgis' from the list of possible resource names in my code, but I thought that it was worth mentioning the issue, because it is somehow an illegal behavior. CalculateField_management() is the only method that has this behavior up to my knowledge, and only when then expression is given in Python. An object 'arcgis' is created in a namespace that this method shouldn't access. This object has clearly properties that aren't my object's properties (among which a 'rand' method).
2019-04-21T20:14:06
https://community.esri.com/thread/96255-calculatefieldmanagement-crashing-ipython
0.999999
I read Jon Krakauer’s <a href=”https://www.goodreads.com/book/show/1898.Into_Thin_Air_A_Personal_Account_of_the_Mount_Everest_Disaster” title=”Into Thin Air A Personal Account of the Mount Everest Disaster by Jon Krakauer”>Into Thin Air: A Personal Account of the Mount Everest Disaster</a> with great avidity when it came out in 1998. In an interview, he described how he’d always found some joy and pleasure even in the hardest climbs—the view, the sense of accomplishment, the companionship—but that the Everest climb was only suffering.<br><br>Kasischke’s book is another take on the climb. He was part of Rob Hall’s group, in which Krakauer had been imbedded in order to write an article for <em>Outside</em> magazine. Kasischke doesn’t blame Krakauer for what happened to Hall and his team. He does speculate how having a journalist along could have influenced Hall and his competitor/friend Fischer, who was leading another group at the same time, to make rash decisions for the sake of publicity. It was so important that the two teams reach the summit for the sake of the publicity they’d get that they forgot the highest priority: the safety of the team.<br><br>It’s not revealing any spoilers to say Kasischke made it back—obviously, he wrote the book. I can say that when he writes of the moment of silence “after the wind,” when he hears the “still, small voice” within (a reference to the biblical Elijah in the wilderness) and decides to turn back, a decision that saved his life, it moved me to tears. <br><br>Kasischke has written a great, harrowing, adventure story. On top of that, the physical book is beautiful. E-books will never replace the feeling of the book in my hand and this paperback has a great cover, haunting illustrations and roughly deckled pages. A pleasure to hold.<br><br>I swallowed it in one gulp, and I’d reread it. Inspiring and gripping.
2019-04-23T04:21:21
http://shelleyschanfield.com/after-the-wind/
0.999999
Leonardo da Vinci once wrote, "The highest happiness becomes the cause of unhappiness..." Might this quote be applied to the building of the Hoover Dam? To many, the dam represents a kind of highest happiness, particularly regarding its artful design, it's reach into the sky at 725 feet. It was an amazing feat in the 1930s when it was finished, and remains a landmark of the North American continent. However, when understanding that this dam changed the Colorado River permanently, changed its course forever, marking the evironment in ways that can be considered destructive, the dam is nothing to be proud of. To some, it is seen an actual cause of unhappiness. Therefore, would Leonardo da Vinci support the idea of building the Hoover Dam today? As a means of controlling what once was a river prone to flooding, he may have seen the dam as productive. He may have seen it as a means to Southern California obtaining their highest happiness of irrigation and abundant water supply. Yet, he also may have supported those who believe to tame a river is a means of destroying it and the environment, albeit slowly. He may have taken a progressive look into the future and perceiving factors such as silt build up, salinity factors, use and pollution of watersheds, he may have, given enough time, discovered another way to control the river. I'd like to think da Vinci would participate in viewing the ecological factors of this dam, (knowing first what would cause unhappiness instead of the other way around) and demonstrate through his art, his power of observation, an analysis that would extend beyond immediacy or profit. In other words, I would like to believe he'd find the elements of the river sublime, of the highest happiness. And thus any project that would change its course would be in effect, reverently considered.
2019-04-22T16:17:23
http://waterbydam.blogspot.com/2010_09_09_archive.html
0.999777
Given hole diameter a, and outermost diameter b, determine the volume y of the resulting donut. I think the input are the radii, not the diameters, but I'm too lazy to check for sure. not really, the test sequence is simply wrong. It should be specified more clear what the input parameters mean exactly geometrically. What a waste! Calling a radius a diameter. I got numbers that were off by a factor of 8, which turned out to be that I had used the information that a and b were diameters, whereas Bistwas used them as radii. Please correct the problem definition. If a is the hole diameter and b is the outermost diameter, how can a>b in the test cases? test suite'answer is wrong if a and b is diameter instead of radius. I wonder whether it it adequate to test correctness of double answers by equality. To do so discounts rounding errors and the fact that IEEE 754 does not guarantee the laws of arithmetic. So, when you say "diameter" you mean "radius"? And when you say "outer" you mean "inner"?
2019-04-24T00:09:04
https://www.mathworks.com/matlabcentral/cody/problems/133-volume-of-this-donut
0.999139
A cumulative frequency graph is plotting using data which adds up the cumulative frequency or running total of a given data set. The first step is to complete a cumulative frequency table. In the example below, the table repesents the time spent for 100 people waiting for a taxi. In the above graph, the upper bound for each class interval is plotted against the cumulative frequency and a smooth curve is created through the points. As per the graph above, the median time has been estimated to be the 50th person at 47 seconds. One the data set has been added to a table and the graph has been plotted, the interquartile range can then be calculated. The interquartile range is represented as the middle 50% of the data therefore the lower quartile is the data 25% above the list and the upper quartile is the data below the 75% of the list.
2019-04-19T14:35:07
https://tutorpear.com/handling-data/d4-moving-averages-and-cumulative-frequency/d4-4-using-cumulative-frequency-graphs/
0.999999
Recent tragedy at the Navy Yard in Washington, D.C., has forced the nation to reflect on a topic that is rarely discussed and often ignored: mental health care. This important issue is not just for lawmakers and advocates to address, however. Leaders must address the mental health of our subordinates every day. I serve as a noncommissioned officer in the Army Reserve, and during a drill weekend last year, I led a discussion with Soldiers on mental health. It was not an easy talk. Service members are expected to embody strength and toughness. To start the session, I painted a picture of those we serve with; the missions our nation expects us to accomplish; and the hard training we go through. I then asked them to imagine that one of their comrades was struggling, unable to carry his weight and forcing us to slow down. I asked: How did that make them feel? They were all resentful. When everyone works hard to complete the mission, it's natural to be annoyed, even angry, at someone who is falling behind. They were even less sympathetic when I asked how they would feel if this Soldier had always struggled, maybe couldn't pass a physical fitness test, or was usually late. Then I asked them: What would they do if this Soldier asked them for help, or just to talk? They wrestled with the question, because it touched on an internal conflict: Equal to the value Soldiers put on strength and toughness is an emphasis on teamwork. This theoretical Soldier was a member of our team, and we never leave anyone behind. But in a group of high performers, it's natural to ostracize those who can't keep up. For good or for bad, this happens often. Finally, I asked them how they would feel if this person confided in them about troubles at home, with kids, with finances, with his or her marriage. What would they do with that information? Would they help their fellow Soldier, maybe offer to carry some of his load, share words of encouragement? They all nodded. Then I asked how often any of their Soldiers confided personal struggles in them. The consensus: "Very rarely." And that is the problem. The theoretical Soldier isn't just theoretical. A friend of mine confided that one of his Soldiers attempted suicide on his recent deployment to Afghanistan. Everyone thought this man was lazy, couldn't keep up, was "weird." Rather than helping, fellow Soldiers shut him out. Ultimately, he tried to take his own life. After his attempt, the Soldier's unit discovered that his toddler had been sick, and the Soldier lost sleep for weeks looking for answers from doctors as the man's parents cared for his son while he was deployed. Without enough rest, his performance suffered. Even as he fought to keep his family going, his comrades in arms believed he was slacking. If he had reached out and asked for help, things could have gone differently. Leaders in every kind of organization, in and outside the military, must do more to take care of our own. People aren't going to just come to us and ask for support. Changing mindsets requires a change in leadership style. We must be intrusive in our leadership. We need to ask hard questions of those who are struggling, without passing judgment. How are we supposed to lead those working for us if we don't know what is happening in their lives? A team is only as strong as its weakest link -- but a weak link can be strengthened with support and compassion. Ostracizing, criticizing or ignoring personal circumstances hurts the individual and the team. Turning our backs on someone in need cuts that person off from those who can help. In some cases, asking the right questions -- or simply listening -- can save a life. This is the purest form of leadership. We all have the ability to place our Soldiers' needs first. But first, it's up to us to find out what those needs are.
2019-04-19T00:41:54
https://www.huffpost.com/entry/intrusive-leadership-and_b_3998451
0.99878
Only very few water molecules are ionized at a single instant in time. Scientists calculate that the fraction of water molecules dissociated (ionized) at any given time in pure water is 0.0000001. This tiny number can be written another way by using exponential notation. This is done by counting the number of places to the right of the decimal point. Because there are seven places, this number is written as 10-7. The minus sign means that the number is less than 1. To indicate the concentration of H+ ions in a solution, scientists have devised a scale based on the slight degree of spontaneous ionization of water. This scale is called the pH scale. (The letters pH stand for the power of the hydrogen ion [H+]). The pH values of this scale generally range from 0 to 14. The pH of a solution is determined by taking the negative value of the exponent of its hydrogen ion concentration. For example, pure water has a hydrogen ion concentration of 10-7 and therefore a pH of 7. When water ionizes, hydroxyl ions (OH-) are produced in a concentration equal to the concentration of hydrogen ions. In pure water, the concentrations of H+ and OH- ions are equal to 10-7. Because these ions join spontaneously, water, at pH 7, is neutral. Any substance that dissociates to form H+ ions when it is dissolved in water is called an acid. The more hydrogen ions an acid produces, the stronger an acid it is. Although an acid produces a higher concentration of H1 ions than pure water (0.00001 as opposed to 0.0000001, for example), its pH is lower. Using the above numbers to illustrate: The first number (0.00001 or 1025) represents the hydrogen ion concentration of an acid. The negative value of its exponent results in a pH of 5. The second number (0.0000001 or 10-7) represents the hydrogen ion concentration of water. The negative value of its exponent results in a pH of 7. Each one-unit decrease in pH, however, does not correspond to a onefold increase in acidity. In fact, depending on the acid and how completely it ionizes, a change of one unit may correspond to as much as a tenfold increase in acidity. Figure 6 shows many common acids and their pH values. The pH of champagne, for example, is about 4. This low pH is due to the dissolved carbonic acid that causes champagne to bubble. Some bodies of water are acidic, such as peat bogs (pH 4 to 5). The hydrochloric acid (HCl) of your stomach ionizes completely to H+ and Cl-. It forms a strong acid with a pH of 2 to 3. Stronger acids are rarely found in living systems. Figure 6 The pH scale. Any substance that combines with H+ ions, as OH- ions do, is said to be a base. Any increase in the concentration of a base lowers the H+ ion concentration. Bases therefore have pH values higher than water's neutral value of 7. For example, the environment of your small intestine is kept at a basic pH of between 7.5 and 8.5. Strong bases such as sodium hydroxide (NaOH) have pH values of 12 or more. As with acids, a change of 1 in the pH value of a base may reflect up to a tenfold change in pH, depending on the base.
2019-04-22T15:06:17
http://nutrition.jbpub.com/resources/chemistryreview7.cfm
0.99984
Plot In November 1932, Constance, Countess of Trentham (Maggie Smith), and her lady's maid, Mary MacEachran (Kelly Macdonald) travel to Gosford Park for the weekend. On the way, they encounter actor Ivor Novello (Jeremy Northam), American film producer Morris Weissman (Bob Balaban) and Weissman's valet, Henry Denton (Ryan Phillippe). At the house, they are greeted by Sir William McCordle (Michael Gambon), Lady Sylvia McCordle (Kristin Scott Thomas) and their daughter, Isobel (Camilla Rutherford). The other guests include Lady Sylvia's sisters, Louisa, Lady Stockbridge (Geraldine Somerville) and Lady Lavinia Meredith (Natasha Wightman) and their husbands, Raymond, Lord Stockbridge (Charles Dance) and Commander Anthony Meredith (Tom Hollander). Also in attendance are the Honourable Freddie Nesbitt (James Wilby) and his wife, Mabel (Claudie Blakley); Isobel's suitor, Lord Rupert Standish (Laurence Fox) and his friend Jeremy Blond (Trent Ford). In November 1932, Constance, Countess of Trentham (Maggie Smith), and her lady's maid, Mary MacEachran (Kelly Macdonald) travel to Gosford Park for the weekend. On the way, they encounter actor Ivor Novello (Jeremy Northam), American film producer Morris Weissman (Bob Balaban) and Weissman's valet, Henry Denton (Ryan Phillippe). At the house, they are greeted by Sir William McCordle (Michael Gambon), Lady Sylvia McCordle (Kristin Scott Thomas) and their daughter, Isobel (Camilla Rutherford). The other guests include Lady Sylvia's sisters, Louisa, Lady Stockbridge (Geraldine Somerville) and Lady Lavinia Meredith (Natasha Wightman) and their husbands, Raymond, Lord Stockbridge (Charles Dance) and Commander Anthony Meredith (Tom Hollander). Also in attendance are the Honourable Freddie Nesbitt (James Wilby) and his wife, Mabel (Claudie Blakley); Isobel's suitor, Lord Rupert Standish (Laurence Fox) and his friend Jeremy Blond (Trent Ford). Commander Meredith is in financial difficulty and brings up the matter with Sir William, who reveals that he is rescinding his investment in Meredith's new scheme. Sir William also intends to stop paying Lady Trentham's allowance. Mary and Lord Stockbridge's valet, Parks (Clive Owen), are attracted to one another. Denton asks a number of questions about life in service and Parks reveals that he was raised in an orphanage. Denton meets Lady Sylvia and during the night, he goes to her room. During a pheasant shoot, Sir William is slightly injured by a low shot. Commander Meredith pleads with Sir William not to back out of the investment. During dinner, Lady Sylvia attacks Sir William, implying that he was a World War I profiteer. The head housemaid, Elsie (Emily Watson), rises to his defence, breaking the class barrier, and thus revealing their affair. Sir William goes to the library, where the housekeeper, Mrs. Wilson (Helen Mirren) brings him coffee. He demands a glass of whisky instead. Lady Sylvia asks Mr. Novello to entertain the guests. George (Richard E. Grant, first footman), Parks, Mr. Nesbitt and Commander Meredith disappear and an unknown person goes to the library and stabs Sir William as he sits slumped motionless over his desk. Lady Stockbridge goes to the library and her screams bring everyone to the room. Commander Meredith and Mr. Nesbitt do not offer an explanation of their disappearances, while George says he was fetching milk for the coffee service and Parks claims to have been fetching hot water bottles. Inspector Thomson (Stephen Fry) and Constable Dexter (Ron Webster) arrive to investigate the murder. Dexter suggests that Sir William was already dead when he was stabbed. It is eventually surmised that Sir William was poisoned before being stabbed. Denton confesses to Jennings (Alan Bates), the butler, that he is not a valet but an American actor preparing for a movie role. The next morning, Lady Sylvia goes for her morning ride, which surprises Inspector Thomson. Barnes (Adrian Scarborough) overhears Commander Meredith tell Lady Lavinia that Sir William's death was lucky for them, as the investment is now secure. Barnes tells Inspector Thomson, who interrogates Meredith. Mrs. Croft (Eileen Atkins) tells the kitchen maid, Bertha (Teresa Churcher), that Sir William was known for seducing the women working in his factories. If a woman became pregnant, Sir William offered two choices: keep the baby and lose your job, or give the baby up and keep your job. Those who gave up their babies were told that the adoptions were being arranged with good families. In reality, Sir William paid orphanages to take the children. Mary goes to Parks' room and tells him that she knows he is the murderer. Parks tells her that he discovered Sir William was his father, entered service and attempted to gain employment with someone in his circle. Parks tells Mary that he did not poison Sir William and Mary is relieved, as Parks only stabbed the corpse. Mary listens to Lady Sylvia and Lady Trentham discussing why Mrs. Croft and Mrs. Wilson are enemies. Lady Sylvia believes that the tension between them stems from the fact that Mrs. Wilson now outranks Mrs. Croft. Lady Trentham asks if Mrs. Wilson was ever married and Lady Sylvia replies that her name was once Parks or Parker. Mary goes to Mrs. Wilson and the older woman reveals that she poisoned Sir William to protect her son, because she knew that Parks was there to kill Sir William. She also reveals that she and Mrs. Croft are sisters. After talking to Dorothy (Sophie Thompson), Mrs. Wilson goes to her room and is comforted by Mrs. Croft. The guests leave and Lady Sylvia enters Gosford Park, while Jennings closes the door.
2019-04-25T09:01:56
http://www.filmexicon.com/movie-001660
0.99981
"Deep-sea hydrothermal vents represent one of the most extreme areas of Earth's biosphere: extreme heat, pressure, toxicity, darkness. What kinds of organisms have adapted to such an environment and how do they manage to thrive? The efforts to find out have changed the scientific view of the necessary conditions for life. Professor Peter Girguis describes the unexpected and unique biodiversity at the hydrothermal vents. He focuses especially on the microbes in this environment that are able to metabolize using a process called extracellular electron transfer (EET). This remarkable system is not only instructive about extreme adaptations; it has potential practical applications. In addition to his discussion of the adaptations of hydrothermal organisms, Dr. Girguis talks about the challenges of exploring the deep-sea hydrothermal vents, both with manned and robotic submersibles. And he also describes a project that invites the participation of citizen scientists. What is an extremophile? Find out more here: http://www.scienceforthepublic.org/things-to-know/life/life-extreme-forms-of-life/" Peter Girguis grew up in Los Angeles and has been entranced by the oceans since youth. Girguis' research focuses on microbial physiology and the role that autotrophic microbes play in deep ocean carbon and nitrogen cycling. His research also focuses on developing new sensors for use in the deep oceans, and he is currently developing several new instruments for use at hydrothermal vents. Girguis received his BSc from the UCLA and his PhD from UC Santa Barbara. He was awarded a postdoctoral fellowship by the Monterey Bay Aquarium Research Institute, and is currently an assistant professor in Harvard University's Department of Organismal and Evolutionary Biology.
2019-04-25T00:25:55
http://forum-network.org/lectures/shocking-news-from-deep-sea-hydrothermal-vents/
0.999492
Loud Speakers : A loud Speaker is a device which is actuated by electrical energy and radiates acoustic energy. The selection and installation of a speaker as well as its design should be guided by the problem of coupling an electrical signal source as efficiently as possible to an acoustic load. This involves the determination of acoustic load or radiation impedance and selection of a diaphragm, and means of coupling the loaded loud speaker to an electrical signal source. The performance of the speaker is intimately dependent upon the nature of its acoustic load and should not be considered a part of it. The nature of the radiating system and therefore the acoustic load impedances it sees, is primarily determined by space, acoustical environment and cost factors. In other words, a loud speaker is an electro-acoustic transducer normally intended to radiate acoustic transducer normally intended to radiate acoustic power into the air so that it is effective at a distance. In order to accomplish this, the loud speaker must be designed in such a way that it will cause the varying electric currents to set in vibration a diaphragm. The vibration of the diaphragm in turn sets the surrounding air molecules into motion. The vibration of this comparatively large volume of air produces the sound, and received by the ear. The efficiency of a loud speaker is defined as the ratio of the useful acoustic power radiated, to the electrical power supplied to the load and is very low even in the most carefully designed systems (maximum of about 30 percent). 1. The driving unit or motor which changes the varying currents of the audio frequency amplifier into mechanical vibrations. 2. The other part is that which acts in conjunction with the driving unit to produce the vibration of the air molecules, and consists of a surface of various geometrical designs such as conical or flat shaped horns. The horn has been known and widely used for centuries for increasing the radiation from a second source. The most commonly used are conical and exponential types. The conical horn may be defined as one in which the cross-sectional area of the horn varies in direct proportion to its length, whereas in exponential form the area of the horn varies as an exponent of its length. In this type, the moving iron driving type is employed. The principle of operation is based on the varying of the magnetic polarity of the armature. These variations are caused by the electrical impulses flowing through the coil winding which encircles the armature. The movement to the armature is effected by the induced magnetism, causing it to oscillate between the two poles of the permanent magnet. A speaker of this type consists, principally of a field coil, a voice coil and a cone. The field coil is connected to a dc source, effecting a strong magnetic field across an air gap in which the voice is inserted. The signal current from the output terminal of the receiver, flowing through the voice or moving coil placed around the middle pole of a three pole magnet, causes the voice coil to oscillate corresponding to the oscillations of the signal current. The diaphragm being mechanically connected with the voice coil oscillates in a similar manner. A wireless more details is space saver and you can get rid of all those wires and chords lying around the floor. You can also hide it anywhere you like. If you are concerned about the neatness and appearance of your room, you need to consider a wireless sub.
2019-04-22T18:27:33
http://www.electronicsandcommunications.com/2014/04/loud-speakers-types.html
0.999414
The following example represents a project that is less trivial than the one in the second part of this series. There is a product backlog containing several tasks and a production process that consists of several steps. In case of Scrum the team is in the first sprint, which consists of the tasks A, B, C, D, E and F. A is already done, B to E are at the moment in progress and F is still to do. During the upcoming sprints the team will commit to the tasks G to N. The Kanban board consists of the backlog from which maximal 2 tasks can be selected for priorization. The development section allows max. 3 tasks at once (tasks from both columns - ongoing and done - count). After the development the features need to be tested and after that they will be in the production environment and are thereby done. You can see that the board represents the different states of the production process. The Scrum board will be reset after each sprint, whereas the Kanban board is persistent. Note: For Kanban it is not necessary that there is a maximal amount of tasks for each column. The Kanban board, which contains more columns than the Scrum board, can help to optimize the process steps, because it is necessary to think about them in order to draw the board. It can also be very helpful to optimize the amount of allowed cards per column, because this can reveal bottle necks. The Scrum board and the partition of tasks into sprints helps to organize tasks and to think about reasonable packages. But remember, it is always possible to combine aspects of different methodologies and tools to find the board, rules and tools that fit your project best. Besides the two tools Scrum and Kanban there is a huge number of other agile tools and methodologies that serve as an inspiration for you. The more you read about them, the more you will see that they are based on the same principles (which are stated in the agile manifesto) and that some use the same approaches and methods. Here is a short list of some wide spread approaches that you could take a look into. A Kanban board represents the workflow of a project whereas a Scrum board always consists of the same columns. Another big difference is that it is possible to limit the number of cards in certain columns when using Kanban while Scrum limits the WIP by restricting the number of cards in the Sprint Backlog. Besides the two methodologies that were presented here there are numerous other agile approaches. Some of them are based on Scrum or Kanban. A very widespread approach is a combination of Extream Programming and Scrum, because both supplement each other very well. It’s up to you to find the methodologies, tools and rules that you want to use to accomplish the aims of your projects. Since there is no “one fits all” for all projects you have to experiment and try variations.
2019-04-25T19:03:48
https://cloudogu.com/en/blog/scrum-vs-kanban-part-33-example
0.998397
In the event that your firm is one that requires metal fabrications then, you cannot afford to overlook the services of a welding shop. It has to come to your realization that the firm you will engage for the vital assignment is vital when it comes to figuring out whether or not your company will succeed in its works. There are chances that you will have some difficulties when trying to figure out the most appropriate metal fabricator in the midst of the multiple that exist in the market. Deliberated in this text are the things that you should know when finding the number one company in metal fabrication in Vancouver. The location of the metal fabrication company is something worth putting into account when determining if they are okay for the job. It is wise that you confirm that you will choose the company that is not located far from your business since you will not spend a lot of money of shipping. Moreover, you should know that you will not have to wait for long before the professionals come to your business premises in case you require their functions. It is apparent that a company that lacks trained and experienced employees will not have the right skills for the metal fabrication. Working with the company that has been in the metal fabrication sector for many years is something that should give you confidence they have the required knowledge. Besides, confirm that you hire the firm that has handled projects similar to yours in the past since you can know they have the capacity. Have the zeal to request that the metal fabrication company gives you some names of the clients they have worked previously. Take the initiative to contact some of their clients who will tell you how they can rate the standard of services delivered by the said firm. Attest to it that you will work with the metal fabricator whose customers have shown some satisfaction in the quality of services they obtained from them. Finally, one does not need any professional know-how to understand that you have a budget for the metal fabrication project. When choosing a welding shop, you should consider the finances they are asking for their services. It is noble that you ascertain that you will not choose a company before you are sure that they will not charge you more than you are prepared to spend on the task. Nevertheless, it can be wrong not to look at the quality of the services in favor of their price. In case you are simply looking for a reliable welding shop, then you can learn more by clicking this link. If a high quality metal fabricator is what you need, then you can learn more by clicking this link instead.
2019-04-21T14:38:58
https://metalworkingcircle.site123.me/my-blog/what-you-should-take-into-account-when-picking-the-right-metal-fabrication-firm-in-vancouver