proba
float64 0.5
1
| text
stringlengths 16
182k
| timestamp
timestamp[s] | url
stringlengths 15
1.72k
|
---|---|---|---|
0.999999 |
Arsene Wenger to leave Arsenal: Who will replace him?
After over 21 years and 10 trophies, Arsene Wenger's reign at Arsenal will finish at the end of the season. The search now begins for his successor and here are the best of the potential candidates to take on one of the biggest jobs in football.
One of Arsenal's favourite sons, the old marauding defensive midfielder was one of the key protagonists under Wenger, a cog in their 'Invincibles' team. Now at New York City FC, Vieira said back in March he would be interested in coaching Arsenal "one day", but at the time would not elaborate further out of respect for his former boss.
As chance had it, Wenger was talking about Vieira's potential as a future Arsenal manager on Thursday, and said: "He's a guy who has the potential one day, yes. "I think he does very well. But overall, after that, this Premier League is special, you know. You have to come in. There are plenty of former players who played here who have potential and the intelligence and the knowledge to do it. So there's plenty of choice, don't worry for that."
Vieira would be popular choice among the club's fans but his lack of managerial experience could count against him -- his only other role was at Manchester City's reserves -- despite being the bookies' favourite to take over at Arsenal.
The former Borussia Dortmund manager has been strongly linked with taking over from Unai Emery at Paris Saint Germain, but he has also been frequently mentioned as a potential successor to Wenger.
His playing style is resolute, favouring an approach where his side builds from the back in a manner not different to his predecessor at Dortmund, Jurgen Klopp. If he did get the job at Arsenal, then he would link up again with Pierre-Emerick Aubameyang and Henrikh Mkhitaryan, who both played under him at Dortmund. Both flourished under him but Arsenal will have to act quickly if they are to keep PSG's reported interest at bay.
At Monaco, Jardim has succeeded in implementing the same blueprint Wenger tried to perfect for many years: building a title-winning team by developing young talent while playing an attractive brand of football. Granted, Jardim hasn't quite managed to replicate last season's title-winning triumphs, but given the players he lost last summer (including star man Kylian Mbappe) it's still impressive to sit second in Ligue 1.
At 43, Jardim is still young enough to bring a new level of energy to the club, while experienced enough to back that up with authority. And perhaps he could also bring Arsenal target Thomas Lemar with him.
Allegri was widely tipped as the No. 1 candidate for Arsenal last summer had Wenger not been given a new contract. And given Antonio Conte's immediate success at Chelsea, it would be interesting to see if Allegri could have a similar impact if he moved from Juventus to the Premier League.
His emphasis on a solid defence would be a big departure from Wenger's traditional approach, but it is also sorely needed at the club.
Low led Germany to win the World Cup in 2014 and will try to repeat that feat this summer, but he would still be a surprising choice given that he has never managed a top club.
After leading Stuttgart to the Cup Winners' Cup final in 1998, he had stints in Turkey and Austria before joining the national team set-up in 2004. He might be a popular choice among Arsenal's German-speaking contingent -- and especially Mesut Ozil -- but he is totally untested when it comes to delivering a top league title.
Arsenal's Europa League semifinal opponents have the much-coveted Diego Simeone at the helm, who back in September signed a new contract with the La Liga side until 2020. Simeone guided the club -- which has far less financial muscle than Barcelona and Real Madrid -- to the 2013-14 league title and to two Champions League finals, alongside winning the Europa League in 2012.
His side's defence has conceded the fewest goals in four of the last five La Liga seasons. His passion for the Atletico job seems unwavering, but Arsenal could prove to be an attractive project for the Argentinean.
With Roma, Celta Vigo and Barcelona on his coaching resume, Luis Enrique boasts the big club experience which could be essential if the Arsenal board want Wenger's successor to hit the ground running.
His Roma spell was underwhelming but his work at Celta Vigo, where he guided them to ninth in the league, caught the eye of Barcelona who he joined in May 2014, replacing Gerardo Martino. He steered the Catalan giants to two La Liga titles, a trio of Copa del Rey triumphs and the 2015 Champions League, beating Juventus 3-1 in the final, before leaving at the end of his three-year deal in June 2017. Since then he has stayed under the radar but is forever linked with managerial vacancies.
- Wenger: "I feel it is the right time"
Rodgers would be an even more surprising choice than Low, especially since Arsenal should be able to choose from the top managers around Europe. True, Rodgers nearly led Liverpool to the Premier League title in 2014, and he mimicked Arsenal's "Invincibles" by leading Celtic to an unbeaten season last year. But there's still a feeling that Rodgers' career has stalled, while there are plenty of others whose star is on the rise.
The Italian veteran is widely seen as the safe choice for Arsenal, especially if they want someone to come in and run the ship with a steady hand during the inevitable transition period after Wenger's departure.
Ancelotti has won titles everywhere he's gone and owns one of the most impressive managerial records in football. He's not young, but at 58 he still has a good decade left in him at the top level. Of the people on this list, he's the closest thing to a guarantee that Arsenal will at least be a regular contender for a top-four spot. And perhaps best of all: he's available and wouldn't require prising away from any club.
The former Everton and Arsenal midfielder is learning his trade as assistant coach under Pep Guardiola at Manchester City while also offering feedback to the title-winning manager. Reports last month suggested Wenger was keen on Arteta to be in the mix to replace him after the Spaniard spent five seasons at Arsenal, captaining them for the final two campaigns.
| 2019-04-19T12:16:39 |
http://www.espn.co.uk/espn/story/_/id/23256342/
|
0.998635 |
Excessive fertilizer results in "fertilizer burn" on lawn grass. In the worst-case scenario, this can kill the grass, and you'll have to plant new grass to repair the lawn. If you catch it soon enough, though, or if the extra amount applied was small, it's often possible to save the grass.
If you applied too much fertilizer, damage to the grass will show up within the next few days unless you catch it at application. Burned grass either turns yellow because it is stressed or brown because the grass is dead.
Fertilizer burn results when mineral salts contained in chemical fertilizers build up in the soil and dry the plants out. Fertilizers that contain nitrogen in a fast-release form are the most likely to burn lawns. If you want to minimize the risk of fertilizer burn, use fertilizers with nitrogen in a slow-release form and apply according to label directions. Applying to dry grass and then watering after application also minimizes risk of burn.
If you know immediately that too much fertilizer was applied to the lawn or if you spilled extra fertilizer in one spot, use a broom or wet/dry vacuum to remove as much as possible from the lawn. This is easier if you applied fertilizer to a dry lawn, so the fertilizer doesn't dissolve as quickly.
Whether you are able to remove fertilizer or not, water the lawn as soon as you notice a problem. You can start immediately after fertilizing, or at the first sign of burn on the lawn. On the first day, water until the ground is saturated, but stop when you start to notice runoff. You want to dilute the excess mineral salts and move them deeper into the soil, not wash salt off into the local waterways. Continue to water in the mornings every day for a week to help minimize burn damage.
Where excess fertilizer killed the grass, you'll have to replant in order to repair the lawn. First, remove the dead portions of the lawn by digging out the grass and 1 inch of the soil below. Loosen the soil with a rototiller if it's a large area or with a hand cultivator if it's a small area.
If you're repairing the lawn with seed, add enough good topsoil to make the surface of the bare spots in the lawn even with surrounding soil. For cool-season grasses, the best time to plant seeds is in the spring or fall when soil temperatures are at 50 to 65 degrees Fahrenheit. Warm-season grasses need soil temperatures over 70 degrees, and they grow best when planted in the late spring or early summer.
You can plant sod in a lawn any time during the growing season, as long as the grass is not dormant and you can supply enough water to keep the soil from drying out. If you're using sod to repair a lawn, remove or add as much soil as needed to make sure that when you lay sod, it is growing at the same level as the surrounding grass. Water thoroughly after laying sod.
| 2019-04-24T21:47:53 |
https://www.gardenguides.com/how_6102102_repair-lawn-much-fertilizer.html
|
0.999694 |
New iMacs for the New Year?
I'm going to stick my neck out and suggest that the long-rumored flat-screen iMac will debut at January's Macworld Expo/San Francisco.
Even for self-styled Mac pros, the introduction of the consumer-friendly iMac remains a watershed event in the history of Apple.
Between its striking industrial design and appealing specs, the entry-level desktop system proved that master marketer Steve Jobs was truly back in Apples saddle: The all-in-one systems distinctive aura of one-button consumer cool recalled the earliest Mac models, but its sub-$1,500 price point appealed to a far wider audience than those $3,000, mid-80s trailblazers.
The rest is history: Apples dramatic consumer bid cut through the morass of poorly differentiated products that had dogged the company through much of the 90s, broke sales records around the world, beckoned first-time PC purchasers and Windows stalwarts, and re-established the ailing PC maker as a technology force to be reckoned with.
On a smaller scale, the debut of the iMac also marked a milestone for the Mac media: To the best of my knowledge, its the first (and last) time a major Mac upgrade completely slipped by our collective radar.
During my tenure with the late, great MacWEEK from the late 80s through the end of the 90s, I can aver that nary a new Mac arrived without some degree of unauthorized advance buzz from the Apple grapevine. By contrast, Jobs rollout of the iMac at Apples Worldwide Developers Conference in May 1998 skunked us completely; I first spied an image of the curvy new system mere hours before its official debut, and I must confess that I immediately dismissed it as a Photoshop fake.
While Apple has never again been able to achieve quite that level of secrecy about forthcoming hardware, the iMac surprise did denote the rise of a new security-conscious culture in Cupertino--and raised the stakes in the ongoing tug-of-war between Apples marketing and legal teams on the one hand and Mac journalists and enthusiasts on the other.
Not surprisingly, both Mac community expectations and Apples firewall have been extraordinarily high when it comes to rumors of a radical redesign of the three-and-half-year-old system.
Over the years, the iMac has enjoyed evolutionary enhancements, including speed bumps, new storage options and significant price cuts. However, the consumer desktop hasnt gotten the kind of makeover that has reinvigorated sales of Apples professional Power Mac towers or its pro PowerBook and consumer iBook laptops.
Caught up in the collective yen for an iMac breakthrough, Ive been guilty more than once of speculating that a new version of the flagship system would surface at the very next Mac trade show. Hugely successful as the iMac has been, sales have flattened out over the past 18 months. Those of us rooting for Apple were excited by the warm reception afforded Apples rejuvenated laptops in 2001, and were understandably anxious to see a commensurate breakthrough for the rest of the Mac matrix.
As I noted in a recent column, I share the opinion of many Mac muckrakers that Apples high-end Power Mac line will finally blow past the 1-GHz mark at Januarys Macworld Expo/San Francisco with models that top out somewhere between 1.2 and 1.6 GHz. Now Im going to stick my neck out yet again and suggest that the long-rumored flat-screen iMac will comprise the second half of Apples one-two punch at the show.
Theres a report from Morgan Stanley that puts an even finer point on the matter, specifying that Apple has contracted for 100,000 15-inch LCD iMacs per month, starting in January.
Meanwhile, my own retail sources tell me that iMacs are fast disappearing from the channel, traditionally a good sign that Apple is clearing the decks for a new product. And while those close to the company are understandably edgy about spilling too many beans about Apples secret weapon, Ive been on the receiving end of many intriguing anecdotes about flat-screen prototypes and new consumer marketing efforts.
If these arent merely shadows of things that could be but things that will be, the year 2002 could be an extraordinary one indeed for Apple.
Alongside high-end systems that eliminate the "megahertz gap" with the Wintel competition, a next-generation iMac that refreshes its predecessors broad appeal could provide Apple with a mighty jumpstart in a market thats still seeking its bearings after months of malaise.
In tight times, success favors the bold. Whatever missteps it may have made in its quarter-century of existence, Apple has never lacked chutzpah; if it can convert that renewable resource into major new products, the Mac maker could emerge from this recession with a fresh new coat of Teflon and some new users to boot.
Mac veteran Matthew Rothenberg is best practices editor for Ziff Davis Medias Baseline magazine.
Previous Will Mac Dark Horse Take the Lead?
| 2019-04-19T06:53:32 |
https://www.eweek.com/apple/new-imacs-for-the-new-year
|
0.999999 |
Why was the Black Hat talk on Tor de-anonymization mysteriously canceled?
People around the world -- from activists and journalists to cybercriminals -- use the private browsing service Tor to hide their digital footsteps across the Web. Tor, which originally stood for "The Onion Router", reroutes encrypted traffic through different volunteer nodes around the world called "relays" making it harder to track the real-world location and identity of Internet users.
Researchers from the CERT division of Software Engineer Institute (SEI) at Carnegie Mellon University, which "works closely with the Department of Homeland Security," were set to give a talk purporting to demonstrate a way to deanonymize Tor users at Black Hat USA, a major cybersecurity conference, in early August. Alexander Volynkin and Michael McCord, both researchers at CMU, were slated to disclose a method for identifying Tor users and services with "newly discovered shortcomings in design and implementation of the Tor network," an abstract for the talk said, that only cost $3,000 or so to exploit.
But on Monday, the presentation was abruptly canceled. Black Hat organizers were told by legal counsel for the SEI and Carnegie Mellon University that Volynkin would "not be able to speak at the conference because the materials that he would be speaking about have not yet been approved by CMU/SEI for public release" according to an announcement posted on the conference Web site.
Originally sponsored by the U.S. Naval Research Laboratory and still partially funded by the federal government, Tor is considered a basic part of most advocates' Internet freedom toolkits. It helps journalists connect with sources and those living under the thumb of repressive regimes evade censorship.
But, like any technology, it can also be used for nefarious purposes. The "dark web" accessed through Tor is also where places such as the digital black market Silk Road once flourished and still crop up. That activity has attracted the attention of law enforcement and intelligence agencies. Among the National Security Agency revelations from the past year was that the agency found a way to deanonymize some users due to a coding bug in the version of the Firefox browser once bundled with the service -- although an internal presentation said it would "never be able to de-anonymize all Tor users all the time" or target specific users.
The researchers behind Black Hat presentation originally referenced the NSA's tactics in their talk title: "You don't have to be the NSA to break Tor." However, so far the researchers have stayed mum about the circumstances of the cancellation. But some privacy advocates were upset about the way the talk was handled before it was pulled.
"One of the biggest issues here was that the talk was accepted to Blackhat and no one in the Tor Project knew about it before the talk was announced," says Runa Sandvik, a former Tor Project developer who is currently a technologist at the Freedom of the Press Foundation. "The researchers never contacted the Tor project to talk about things."
"CERT seem to be all about responsible disclosure and working with vendors -- and this clearly did not happen in this case," she said. "I just expected more from a group of academic researchers, basically."
Roger Dingledine, an original developer of Tor, addressed the cancellation in a blog post -- saying he was working with CERT to coordinate disclosure of the issue, possibly as soon as this week.
"In response to our questions, we were informally shown some materials," he wrote. "We never received slides or any description of what would be presented in the talk itself beyond what was available on the Black Hat Webpage." However, he said the Tor Project never asked CERT or Blackhat to remove the event. And in general, he wrote, the Tor Project is supportive of research that helps them improve the security of their services.
"I think I have a handle on what they did, and how to fix it," he wrote in a later e-mail to the Tor listserve. "Trying to find delicate ways to explain that we think we know what they did, but also it sure would have been smoother if they'd opted to tell us everything."
It remains unclear exactly what the bug was, although Dingledine suggests it was a "nice," or significant, "bug" but not "the end for the world" for the Tor Project or its users. Sandvik thinks it may have been an issue with software commonly package with Tor. "I have not heard of an exploit that affects the Tor protocol directly in these cases, it's usually just an exploit for Firefox." If that's the case, it might directly echo some of the vulnerabilities reportedly used by the NSA to identify some Tor users.
But another source of consternation among some privacy advocates was that the description of the talk said the researchers had tested their technique "in the wild." Some privacy advocates took that to means they were experimenting with de-anonymizing data from Tor users without their consent -- something which experts say raises some legal and ethical concerns.
Christopher Soghoian, a technologist focusing on privacy and cybersecurity with the American Civil Liberties Union, says this isn't the first time research on actual Tor users has raised controversy. The motivation in these prior cases are often pure, but the methodology problematic, he says.
One issue is whether the studies methods received appropriate institutional review. Research involving human subjects done by educational institutions that receive government funding generally must go through an Institutional Review Board, or IRB, that approves the set up of the study before research commences to comply with federal regulations.
In this case, Soghoian says the research likely should have gone through the IRB process, but it is unclear if it actually did -- or were aware that they should have. A spokesperson for SEI declined to comment on if the study received prior IRB approval, saying that the institution didn't "have anything to add to the statement that was already released by Black Hat."
Legal experts have also warned that some network monitoring might put researchers on the wrong side of the law. At least one former CMU graduate student, Serge Egleman, says he hoped to do research on Tor users a while at the school, but the school ultimately decided there were too many potential legal pitfalls.
Egleman, now a research scientist at University of California at Berkeley, ran a Tor relay while in graduate school. But when he considered doing research on Tor traffic, legal counsel decided the issue was too unsettled to proceed at the time, he says.
"I was interested in looking at what people were actually using it and from where, but there were some open research questions about how to do that without wiretapping," he explained, so the process stopped before getting to the point where he would have proposed a formal methodology to an IRB.
While Egleman has no direct knowledge of if the cancelled Black Hat talk received IRB approval, he agrees with Soghoian that computer security researchers can often not realize how the approval process might apply to their work.
"I've noticed that a lot of people in the security community don't seem to be familiar with the IRB process -- which is surprising given the possible consequences for noncompliance," he says. "I think there's sort of an attitude in computer science that if you're not directly interacting with people you don't need to go through the process -- and that's incorrect if you actually read the regulation."
The silence from the researchers and CMU means it's hard to know the specific reasons the talk was pulled. But privacy advocates remain concerned about how users may have been affected by the research.
"The Tor experience is far less pleasant than the average internet connection -- these are people who are willing to give up speed and convenience to privacy," Soghoian says, arguing it would be inappropriate to use them as test subjects without their knowledge or consent.
Have more to say about this topic? We take your questions every week in our weekly livechat, Switchback, Fridays at 11 a.m. ET. The comment box is open, so submit your questions now.
| 2019-04-20T02:50:03 |
https://www.washingtonpost.com/news/the-switch/wp/2014/07/24/why-was-the-black-hat-talk-on-tor-de-anonymization-mysteriously-canceled/
|
0.999973 |
Why was the new Work and Pensions boss' first Parliamentary statement to reject the United Nation's findings on poverty?
Amber Rudd, the new Work and Pensions Secretary, in her return to the House of Commons despatch box following her resignation over the Windrush scandal six months ago, chose to refute the findings of a UN inquiry into UK poverty.
Rudd condemned the report by Philip Alston, who headed the UN investigation, which claimed that the UK is in breach of four UN human rights agreements relating to women, children, disabled people and economic and social rights.
The UN report concluded that benefits caps and restrictions – and cuts of 50% to local council services as part of the government’s austerity programme since 2010 – are damaging the fabric of British society resulting in destitution, precarious living and driving high credit debt and food-bank usage.
What Rudd ignored was that Alston’s report relies on home grown research into poverty by universally respected and non-partisan organisations like the Joseph Rowntree Foundation and the Institute of Fiscal Studies.
The JRF’s research has revealed that 1.5 million people in the UK have been pushed into destitution, going without even the bare essentials to live a basic existence, while being locked out of opportunities to build a decent and secure life.
Recent publications by the IFS have calculated that the costs of austerity, in terms of changes to taxes and benefits between 2010 and 2020, have been unfairly shouldered by the poorest in British society.
The poorest tenth of households are losing 10% of their already low incomes even as top earners have been little affected and have accumulated much more wealth since the international financial crash hit in 2007/08. The wealthiest tenth now control 44% of all wealth whereas the bottom half of the population hold sway over just 9%.
What’s more, the Great British Class Survey has calculated that the UK has a growing ‘precariat class’, which the researchers estimate is now 15% of the total population, equating to around nine million people.
This is economically the poorest group, with household incomes of less than £12,000, with negligible savings, and most likely to rent (especially in social housing and the lower end of the private rented sector). They are located mainly in older industrial areas now in decline.
The ‘precariat’ are disproportionately reliant upon low paid, and often zero hours employment. They have little in the way of assets upon which to call in a time of crisis, and are overly subject to high-cost credit debt.
The fallout from pursuing an austerity programme that targets the poor has been a political act, and is driving increases in poverty; especially child poverty as the Child Poverty Action Group reports.
The burden of austerity is falling on already marginalised groups – some BME communities, disabled people, and lone parent families.
That Rudd cannot acknowledge these facts doesn’t bode well for her tenure at the DWP nor for reducing Theresa May’s ‘burning injustices’; even if May gets to keep her job post-Brexit.
Kevin Gulliver is Director of Birmingham-based research charity the Human City Institute, former Chair of the Centre for Community Research, and part of the SHOUT save social housing campaign. He writes in a personal capacity.
| 2019-04-22T07:59:31 |
https://leftfootforward.org/2018/11/how-new-dwp-chief-amber-rudd-is-in-denial-over-britains-poverty-crisis/
|
0.997722 |
Why do some parts of the globe have more species than others? The tropics and lowlands teem with life, but the polar and mountainous regions have few species, and comparatively less biological activity. Through my research, I am trying to further our understanding of the processes that drive these kinds of patterns, and in turn, what consequences they may have in the face of global change.
I often study ants (Hymenoptera: Formicidae) on mountains to answer my research questions. Ants are diverse, with over 15,000 species described worldwide and are highly abundant across the planet. They also play important roles in a variety of ecosystem processes in nearly all terrestrial habitats. Mountain environments make up around 20% of the Earth’s terrestrial surface (depending on how you define mountain!) and are hotspots of biological diversity. Furthermore, they act as natural ecological laboratories by providing large changes in environmental conditions over relatively small distances.
I have previously worked on how temporal variation may help us better understand spatial diversity patterns in mountains and also how ecological communities may change in response to elevation.
Temperature is important for life at all scales – it drives metabolic rates and cellular processes, and often strongly corresponds with species diversity at the regional and global level. Much of my recent research has focused on how different morphological or physiological adaptations to temperature influences when, where, and how many species can exist.
I am very interested by functional trait ecology – the idea that biodiversity is not just a collection of species names, but also a distribution of different functional traits. A functional trait is a measurable morphological, physiological or behavioural trait that affects an organisms’ performance. These traits may be able to tell us more about the underlying processes that drive patterns in biodiversity than a set of species names alone.
I am involved in collaborative project which has assembled a global database of ant functional traits and am fascinated by the ways in which functional traits may vary at the largest of scales. I am also interested in how we may properly use functional trait data. I have an active project investigating the extent of intraspecific trait variation in ants.
| 2019-04-21T16:03:07 |
https://www.tomrhysbishop.com/research.html
|
0.999451 |
I have a Carloop + GPS (with LIS3DH) and an AssetTracker V2 (also contains an LIS3DH). I am able to successfully use the 1_WakeOnMove example with the AssetTracker, but I'm not able to with the Carloop + GPS. The problem is that the Carloop + GPS never gets quiet enough (x,y,x is always changing - even when the unit is sitting on my desktop with no movement).
My test enviornment consists of a single Electron, several Carloop + GPS modules, a single AssetTrackerV2 shield, firmware V0.6.4. I flash the 1_WakeOnMove application onto the Electron and install the Electron into the AssetTrackerV2 and it works perfectly. The unit goes to sleep as expected and wakes as expected, 100% of the time. I then remove the Electron from the AssetTrackerV2 sheild and assemble it with my Carloop + GPS shields and perform the same test. The accelerometer is never quite enough for the device to enter sleep mode. I've tried it with several Carloop + GPS modules.
Is the a trick that I'm missing?
I just received my CarloopGPS last week, so now I can look into how the LIS3DH behaves.
Also, I do not have an AssetTracker, so I will have to ask you some questions.
Accelerometers in general have adjustable sensitivity as well as thresholds for wake functionality.
I was reading about one that had adjustable sensitivity of 2G, 4G or 8G. If the accelerometer is difficult to get quiet, then probably the setting is too sensitive. Note that the lower setting (ie. 2G) is the most sensitive. The threshold setting should be set higher than the background x,y,z variation so it does not trigger unless the movement is big enough that you want to detect it. Both of these should be adjustable in the firmware code.
The other aspect is hardware. Older GPS units to go along with Carloop communicated via Serial1 communications. I have to verify if this is still the case for the new CarloopGPS. The Carloop would always have to monitor the serial line to get the x.y.z in order to detect movement. Does the AssetTracker communicate with the LIS3DH the same way? It could be possible that there is additional connection between the sensor and the interrupt line, but you would have to look that up.
| 2019-04-20T20:13:32 |
https://community.carloop.io/t/lis3dh-wake-on-move/718
|
0.99978 |
The credibility of any computer-assisted pedagogical approach is grounded in the rationale behind its creation, research support for the content, and duplication of sequence and scope of instruction in programming. This, according to Soe Koki and Chang (2000), whose meta-analysis of 17 studies found a positive effect on reading achievement of the above three characteristics.
One of the most important early studies in support of a CAI approach occurred in Los Angeles in 1983 (Ragosta). The three-year study, utilizing the program, "Success Maker," provided consistent programming to four elementary schools and two control schools. Students were pre-tested and post-tested each spring using the California Test of Basic Skills. An average effect size of +.025(p<0.1) on Vocabulary and +0.23(p<01) for Comprehension were found. The three-year cohort had a mean effect size of +0.17. This study was a firm early report of positive gains with CAI.
The sub-headings described in the above paragraph will focus on the following: The debate on whether CAI can help to improve student's reading ability has led to numerous studies in order to find the underlying cause of this. This literature review will establish research supports of best practices of reading the credibility of individualized approaches to learning, and the valid underpinnings of response-to-intervention for reading success. The review will conclude with a discussion of computer-assisted instruction. It provides substantiation of the utilization of the program that will be described in the methods and procedures section of this study.
Research consistently correlates reading proficiency and academic success (Pretorius, 2000). Reading is the most important skill in academic learning contexts (Fasheh, 1995). Reading can be dissected to segments for effective instruction and assessment. Individualized or differentiated instruction has its basis that learning is individual and each learner brings a unique perspective of abilities and experiences to any learning task (Gardner, 2000). There are best practices, researched, that can allow differentiated instruction to be successful (Mazzoni & Gambrell, 2003). Response-to-Intervention (RTI) provides high quality instruction matched to student needs to reach all populations (Brown-Chidsey, 2005). Computer-Assisted Instruction leads to a more individualized strategy to meet the needs of many learning styles (Singhal, 1998). A balanced approach to reading improvement will result in the most significant gains (Coles, 2000).
One of the most significant studies linking reading to academic success was done by Pretorious (2002). In his book, he focused on low socioeconomic groups and those groups's penchant for high school graduation and further education. He found that "applied linguistics and reading research consistently show a strong correlation between reading proficiency and academic success at all ages, from the primary school right through to university level: students who read a lot and who understand what they read usually attain good grades. " (pp. 189). The Handbook of Reading Research (2006), the most respected, complete and contemporary compilation of reading ramifications, divulges many tested connections of academic success related to reading. In this study, most significantly, the development of cognitive-information processing (thinking) is promoted by the construction of meaning during the reading process (Carpenter, 1986).
The majority of cognitive processing skills of inferring, integrating, evaluating, and synthesizing are honed within the scope of reading. Reading is "meaning-making" and the abilities and skills required to achieve this meaning making are necessary for success in an information age (Spingies, 1993). Reading differences can cause the "Matthew Effect," whereby students with reading difficulties read less than good readers, thus their processing skills develop more slowly and less effectively. Those students lose motivation and frustration rises so even less reading practice occurs. Teachers and parents have lower expectations of them. This only exacerbates the problem and the cycle continues, leaving these students further and further behind normal academic progress (Stanovich, 1986).
Readers with advanced skill levels have the advantage of increased cognitive processing. The result is improved academic performance (Spear-Sterling, 1996). These differences in achievement related to reading become even larger and more pronounced as students mature (Carpenter, 1986). At the end of first grade, the difference between readers may be a year or less, but at grade 12, it is uncommon for the reading gap to be five years (Chall, 1990). There is little doubt that effective readers are significantly better information processors and thus have the capacity of becoming independent learners with potential for high levels of academic success.
Several empirical studies (National Reading Panel, 2000; Swanson, 1999; Vaughn, Gersten, & Chard, 2000) have identified research-based practices that when sequenced correctly are effective in the improvement of reading skill.
Phonology is the building block for reading acumen. Children who enter school with little phonological awareness have trouble acquiring alphabetic coding skill and thus have difficulty recognizing words (Stanovich, 2000). Several peer-reviewed experimental studies reveal significant positive benefits from explicit instruction in phonemic awareness (National Reading Panel, 2000). Phonemic awareness can be developed through instruction with clear benefits to subsequent acquisition of reading skills (Pressley, 1998). Training is most beneficial when combined with connecting sounds to letters (Share, 1995). Oral blending and segmenting then must be connected to letters to establish the correspondence of the phoneme with the written symbol (Goswami, 2000).
Second in the sequence of reading, development is letter-sound relationship that will then allow word recognition. All students must know the letters of the alphabet have phonemic awareness and learn the logic and conventions governing their use (Adams, 2001). Phonics and the subsequent study of words, teaching the systematic relationships between letters and sounds, knowing written words are composed of letter patterns representing the sounds of spoken words, recognizing words quickly and accurately as a way of obtaining meaning from them, should be the goal of fundamental reading instruction (Chard & Osborn, 1999). Gough and Tumner (1986) offer that there are two processes integral for learning to read, learning to convert letters into recognizable words, and comprehending the meaning of print. Students may use the knowledge of patterns and structural analysis to determine word meaning (Henry, 1997).
Fluency, the rapid naming and accurate identification of meaning is a giant step to adult literacy. Students who do not acquire fluency will be cut off from the rich knowledge sources available in print, leading to weaknesses in general verbal knowledge and ability (Torgesen, 2000). A high number of words read correctly in finite time indicate efficient word-level processing, robust vocabulary and knowledge base and a meaningful comprehension of text (Kame'enui & Simmons, 2001). Fluency bridges the gap between word recognition and comprehension but must be implemented with direct instructional intention through independent-level, instructional-level, and frustration-level materials to maximize fluency improvement (Allington & Cunningham, 2002). To become fluent, students shall learn to decode words rapidly and accurately, in isolation as well as in connected text and to increase reading speed with increased accuracy (Blevins, 2001).
Vocabulary instruction is the next integral element in progressing to maximal reading success as the understanding of word meanings and how words are used in text are significant to reading comprehension. This skill unlocks the meaning of text (Hayes & Ahrens, 1988). Good vocabulary instruction helps children gain ownership of words instead of just learning them well enough to pass a test. Good vocabulary instruction provides multiple exposures through rich and varied activities to meaningful information about the word (Stahl & Kapinus, 2001). There is evidence that language is substantially affected by experiences in which students are exposed to a wider range of meaningful vocabulary (Biemiller, 1999). Effective vocabulary instruction helps students understand what they must do and know in order to learn new words on their own (Stahl & Kapinus, 2001). Teachers, using indirect or explicit means, who actively engage their students in vocabulary activities, realize measurable gains in student understanding of words and texts (Blachowicz & Ogle, 2001).
Finally, understanding and appreciating the written word, comprehension, is the ultimate goal of all reading instruction. Explicit comprehension instruction must be provided for readers to take this last and most important step (Schumm, Moody, & Vaughn, 2000). Good readers read words rapidly and accurately, set goals for reading, note the structure and organization of text, monitor their own understanding while reading, create mental notes and summaries, anticipate what will happen next in the text, and revise and evaluate their thinking as they read (Swanson, 1999). Whenever students are taught to use the above strategies, it results in greater reading comprehension (Gersten, Fuchs, Williams, & Baker, 2001). Teaching strategies must be direct and explicit to create understanding and comprehending in readers (Graves, Juel, & Graves, 2001).
In summary, for students to reach reading potential, they must apply the methods of letter-sound correspondence, must turn this activity into word recognition with speed and accuracy, and utilize vocabulary and comprehension strategies for final meaning. The computer-assisted program used in this study is in concert with the scope and sequence described above.
According to Csikszentmihalyi (1990), a learner reaches his or her fullest capacity when a task is at an optimal level - neither too difficult nor too simple. Differentiated instruction (DI) is a method of continually raising the bar to just the right height. Critical support is connected to brain research. The right amount of challenge is a critical element in learning - too much leads to frustration, too little leads to boredom (Jensen, 2000). To accomplish this feat, a teacher must use an interactive approach of assessment-to-instruction.
Assessment must be comprehensive and focus on skills, concepts, and processes to be developed. A teacher must have a myriad of sources to "cross-check" the assessment, which could include an observation, evaluation of written or constructed tangible work, authentic assessments, portfolios, and standardized tools.
Once a starting point has been surmised, distance from a learning goal should be easily perceived. Acknowledging the individual's proximity to the learning goal provides insight to the teacher about the most effective selection of tasks and procedures. Learners engage in types of thinking that range from a simple, literal level to a more complex abstract level (Bloom, 1984). Although these levels are not distinct, and tend to overlap, they are an excellent key in providing challenging curriculum that moves students along a learning pathway with the greatest speed.
Following assessment, a teacher selects a method of instruction. DI takes into account multiple intelligences, learning modalities, students' background experience, and personal interests to create lessons that expand on students' strengths and scaffold to previous knowledge (Skowron, 2001). Inherent in matching instruction to students' interests are relevant experiences. Activities that enable students' real-life situations and application to new situational learning create optimal opportunities for transfer of authentic learning (Fogarty, 1997).
DI uses a matrix to open opportunities for every type of learner at every grade level. The matrix is grounded in Bloom's Taxonomy (1984) and Gardner's multiple intelligences (2000) to match tasks to diversity of the learners potential. Once a thorough investigation of the matrix for a learning goal has been constructed, managing the ongoing assessment and pace of learning is paramount to effective instruction. A teacher must think as a facilitator and collaborator (Heaton, 2003), providing a range of activities (Pettig, 2000), varying the ways students are engaged by the teacher and peers (Tomlinson, 2000), encourage self-initiative and intrinsic esteem (Danielson, 1996) and allow students choice and ownership of tasks related to products and processes (Cummings, 1996).
There are eight implications for DI as a prime pedagogical element in reading instructions (Mazoni and Gambrell, 2003). First, that learning is the connection of meaning to sensory input. DI allows the best opportunity for students to show learning growth (Tomlinson, 2000). Second, that prior knowledge guides instruction. DI must flow from a level of actual assessment, (Winebrenner, 1996). Third, the gradual release of responsibility in DI facilitates more lasting and accelerated learning. Differentiated instruction requires students to work harder and become more responsible for their own learning (Pettig, 2000). Lipson and Wixon (2003) propose that DI scaffolding involves structuring of tasks through modeling, explaining, questioning and feedback until the learner can operate independently. This is essential to the social view of reading. Fourth, that social collaboration enhances learning. DI utilizes flexible grouping taking into account student strengths (Renzulli & Reis, 1991). All learners should be challenged and the context in which that challenge takes place should be negotiable and is with adjustable construction of groups (Reis, Kaplan, Tomlinson, Westberg, Callahan & Cooper, 1998). Flexible grouping is a hallmark of DI (Tomlinson, 1999).
Fifth, that learner is engaged most when interested and involved. DI accommodates learner characteristics with tasks tiered in complexity and meaningfully providing lifetime skills (Archambault, Westberg, Brown, Hallmark, Zhang & Emmons, 1993). DI perpetuates learning environments that capitalize on student interests for complete engagement (Diamond and Hopson, 1998). Sixth, that DI is a best practice in developing to high-level, strategic readers. DI utilizes an eclectic approach that uses contextualized situations, experimentalism, problem solving, and mastery, transforming students into the highest possible level of reader (Marlow, 2000).
Seventh, that the best reading instruction is a result of intentionally balanced selection of strategy. The planning matrix necessitates a mixture of strategic implementation with a focus of Bloom (1984) and Gardner (2000). Finally, the very best instructional direction is a constant of informed decision-making. DI, as Tomlinson (2000) points out, is extremely attentive to students' varied needs, and leads educators to reflect constantly on the quality of what is being differentiated, and to buy into a way of thinking about teaching and learning that values the individual and can be translated into classroom practice.
The use of DI's organizational structures creates classroom environments propelling students to independent reading status. The program utilized in this study is completely individualized. Each assessment process associated with the program refers a student to a unique and differentiated practice segment.
Very simply, if a learning method can identify the needs or gaps of a learner and produce closely associated practice events that lead to reading skill growth, accelerated retention will result. The RtI model is exactly that ideation.
According to the National Center of Response to Intervention (2009), "The purpose of RTI is to provide students with the best opportunities to succeed in school and ensure they receive appropriate instruction and related supports...where all students receive high-quality instruction." The model contains screening, progress-monitoring, and evidence-based interventions with adjusted intensity dependent on students' responsiveness.
RtI has been specific to reading difficulties as the majority of academic failure is directly related to reading difficulty (Vaughn & Fuchs, 2003). Although RtI is heavily connected to identification for early intervention, the influence has been significant in addressing dynamic assessment at all levels (Speece, Case, & Molloy, 2003). Progress-monitoring measures such as word-identification, oral fluency, nonsense-word fluency, and phoneme-segmentation with the accompanying attachment to instructional guidance will motivate, accelerate, and solidify reading success (Gersten, Keating & Irvin, 1995).
RtI uses a regressive-discontinuity design, whereby, students reaching a proficiency cut-off move to a higher level of expectation (Shadish, Cook, & Campbell, 2002).
Although RtI is obviously a sound method of assisting reading instruction, classroom teachers have neither the facility nor the training to match assessment exactly with instruction in reading. Teachers will use the strategy for only those with learning problems when confronted with the necessity of prioritizing (Gersten & Domino, 2002). The teacher may attempt to provide the best interventions for all, but without support and relief of time constraint, will be unable to utilize the strategy successfully (Denton, Vaughn, & Fletcher, 2002). Thus, the likelihood of all students benefitting is very low. Students will require differing degrees of phonemic awareness, sound-symbol correspondence, and fluency and comprehension cues. A teacher may have skills and experience necessary to address these needs but it is unlikely to have the capacity to effect change simultaneously (Scarborough, 2005).
Hence, as RtI has credible evidentiary support, a classroom teachers' possible implementation class wide is improbably. A computer-assisted program may be the best possible method of executing RtI to all students. The program employed in this study has RtI as its basis, employing an efficient mechanism of data-gathering and immediate assignment of leveled instruction.
As indicated above, RtI is very time-intensive, but must be implemented for students to maximize developmental potential. Technology offers relief of the burden of time with accuracy and efficiency.
Computer-assisted resources are generally very interactive with conceptual exposure through motivation animation, sound, and demonstration (Block, et.al. 2002). Students can progress at individual and developmentally appropriate pace (Hall, Hughes & Filbert, 2000). The immediacy of feedback and displays of processes to correct faulty responses or lead to further practice is particularly poignant (Fletcher-Flinn & Gravatt). The simple difference in approach from traditional instructional methodology can be captivating (National Center for Education Statistics, 1999). Computers encapsulate students' attention with interactive engagement sometimes connected to their competitive nature (Christmann, 1997). CAI instigates differentiation for all level of participants (Astleitner & Keller, 1995).
CAI has had varying degrees of positive impact on student achievement. Christmann and Badgett (1999) found significant improvement in achievement with greatest gains of students in urban areas, followed by suburban and rural. Christmann, Badgett and Lucking (1997) discovered increased academic achievement across several disciplines if CAI was supplemental to traditional instruction.
Students using software for word recognition improved reading achievement (Englert, 2007). Student scores of those using CAI of phonological awareness and word recognition had greater improvement in a comparative study by Barker and Torgesen (1995). Students stayed on-task for longer periods of engaged reading according to Van Daal and Reitsma (2002). Clarifield and Stoner improved fluency in a 2005 study. Tillman (1995) showed comprehension gains of elementary students. According to Davidson, Elcock & Toyes (1996), CAI can promote effective reading practice. Great promise for reading instrucion and improvement was found in a meta-analysis of 17 studies by (Soe, Koki & Chang, 2000).
It was difficult to find any studies showing no improvement of reading skill when students participated in computer-assisted reading instruction. Limitations cited motivational factors and teacher training for best utilization. However, even those studies showed positive results. In a world where most children have much interest in watching movies and television, reading has become a vital thing in the modern society unlike in the old times. Children who have reading problems end up transferring this into significant areas such as in mathematics, sciences, and social studies. Whenever a child learns how to read, the skills assist the child in future economic and social advancement. According to Christmann and Badgett (1999), there is strong evidence that most children from rural areas drop out of school because they have problems of reading. This is quite unfortunate because their lifetime success is put at stake. In the United States, a research carried out by National Center for Educational Statistics revealed that 40% of children below the age of nine years are way below the expected average reading ability (Tomlinson, 2000). In order to improve the situation on the ground, American schools have maximized computer technologies in their classrooms. However, the introduction of computer-assisted instruction (CAI) has sparked many debates, with the opponents questioning whether it is an effective method of improving children reading ability (Englert, 2007).
In the last two decades, studies indicate that there is a relationship between improvements in some subjects like mathematics and CAI (Soe, Koki & Chang, 2000), and sciences. In most rural schools, technology is very expensive because they are no sponsors of the same. For this reason, many stakeholders end up doubting whether the improvement results are worth the cost. According to Kamil (2002), most rural schools prefer to spend money conducting research on education techniques and very little amount is channeled towards computer assisted instruction. Hallworth & Brebner (1980) reveals that CAI is among the best approaches that help to deal with illiteracy in most rural schools. However, for the simple fact that there are diverse conflicts on the impacts of CAI on the reading improvement, the problem on educators is to try to deal with the effects on students. Although there exists a lot of work concerning CAI, very little research focuses on the effects of CAI on reading of instructions (Geoffrion & Geoffrion, 1983).
Many researchers have echoed similar sentiments that the idea of introducing computer technology in rural schools would enhance learning and teaching. According to Fisher (2008), there are claims that use of CAI improves learning owing to the positive motivation factors related to the integration of computer in learning. The proponents of CAI are for the idea that it enhances achievement via maximized motivation. In their extensive research, Block et.al. (2002), in an extensive study reveal that, CAI enhances student's attitude towards academics. In the same vein, following a meta-analysis of close to 400 studies, Englert (2007) observed that CAI maximized the attitude of children in rural schools, which led to increased learning. Other researchers have also associated CAI with school attendance in rural areas (Kamil, 2002). Apart from a few studies by Doyle (1982), and Hallworth & Brebner (1980), that tend to conflict with the idea that CAI increases motivation in rural schools, the rest associate CAI with motivation. It is evident that more studies will tend to support CAI maximizes student motivation. However, the question that most opponents of CAI in rural schools ask is, Does this improvement in motivation towards teaching and learning actually noted in reading habits among children in rural schools? However, according to Bloom (1984) and Gardner (2000), they echo similar sentiments that motivation plays a major role in the academic life of a student.
There are numerous trends evident in research concerning CAI. Most common findings that are related to CAI include age of the student, population, region, and time. It is important to remember that some of these factors have effects on CAI usage in rural schools thus need for investigation. Firstly, Kamil (2002) asserts that the benefit accrued to a student is closely related to age. A study by National Center for Education Statistics (1999) revealed significant impacts in nearly all levels of age, although the most affected are the college students. Numerous studies (Soe, Koki & Chang, 2000; Hall, Hughes & Filbert, 2000) revealed that CAI positive impacts are many on learners in rural elementary schools. However, it should be noted that a portion of these researches failed to report some negative impacts.
Another recent trend witnessed in research is whether application of CAI technology in rural schools would help to reduce the period taken by students to understand time and material for curriculum objectives (Van Daal & Reitsma, 2002). According to a literature review by Denton, Vaughn & Fletcher (2002), CAI helps to save time in many rural schools to a tune of 36%. However, Chang's (2000) review of 60 study reports exhibits mixed results about saving of time. Basing on the review, Chang observes that most learners in rural schools take an equivalent amount of time to understand the material even with the usage of CAI. In one of the studies reviewed by Chang, he revealed that learners are faster by 40% when CIA is applied, considering that CAI increases amount of time spent on a given task. Hallworth & Brebner (1980) supported the research on time saving claiming that CAI is capable of saving time to a tune of 30% allocated instruction time.
Concerning population, most studies tend to concentrate more on the student's gender, socio-economic status, and disabled students. However, CAI effectiveness according to Astleitner & Keller (1995) is not closely connected to student's gender. When it comes to socio-economic status, Pettig (2000) asserts that students in rural areas are the most affected, owing to their environment. According to Scarborough (2005), CAI can assist most students in rural areas to learn English because it is not their first language because they have to use it while printing. However, a different view by Tillman (1995) is that CAI does not seem to benefit all students especially Hispanic. A consensus by all scholars is that most disabled students in rural areas seem to reap benefits from CAI. Basing on the report from National Reading Panel (2000), over 300 review studies and original researches were analyzed. The national reading panel echoes positive improvement impacts of CAI in connection to people with special needs. Additionally, Scarborough (2005) observes that when most students in rural areas gain access to computer, there is a high chance of learning more information. Correspondingly, a study of over one decade on CAI by Christmann, Badgett & Lucking (1997) supported the idea that CAI assists in improving phonological awareness and skills of decoding. Furthermore, wide ranges of researches tend to support that CAI assist students with moderate disability in the reading of instructions.
Numerous scholars have also researched the relationship between phonological awareness and computerized instruction on students in rural areas for quite sometime now. This term is especially used while exploring the building blocks as found in reading development stages (Kamil, 2002). Both education and scientific researchers agree that this form of awareness is needed while a student is learning how to read. Training on phonological awareness enhances the relationship between written language and oral language (Denton, Vaughn, & Fletcher, 2002). Researchers also tend to echo similar sentiments that well planned instructions bring success in future reading skills. Usually defined by scholars as the ability of manipulating and identifying language sounds, phonological awareness comprises understanding that sounds can be manipulated easily after breaking them down into smaller parts (Hall, Hughes & Filbert, 2000).
Although there are mixed opinions when it comes to motivational advantages and other factors associated with CAI, there is a looming debate on the impacts of CAI on rural student's ability of reading. Over the past years, researches that have attempted to reveal the positive association between reading improvement and CAI are given an upper hand more than the neutral or negative relationships. According to Geoffrion & Geoffrion (1983), some studies attempt to make a comparison between computer-assisted instructions with the traditional way of reading instructions. A report by Kamil (2002) has both negative and positive studies on the impacts technology has on rural institutions of learning in terms of achievement.
The previous literature reviews in the field of CAI and instruction reading have numerous landmark researches that associate reading ability with the CAI usage in rural schools. According to Soe, Koki & Chang (2002), there was reading improvements of K-12 learners in rural schools between 1982 and 1997. The three authors arrived at a conclusion that CAI portrayed positive effects on reading improvements. Scarborough (2005) agrees with the fact that CAI capable of providing consistent feedback on the learner's improvement maximizes the learner's academic performance, but the performance of the student deteriorates when there is no feedback. Kamil (2002) explores an independent research of learners in an elementary school in rural schools where CAI method of reading instructions is compared with traditional method of reading instructions for one academic year. CAI records high scores on basic skills while compared with those scores of learners in control groups. According to Denton, Vaughn & Fletcher (2002), there is improvement recorded in reading of instructions through CAI system in such areas like spelling, reading comprehension, reading vocabulary, and phonological awareness among rural students. Some personal researches concerning the effectiveness concerning a certain software system about reading instruction exhibits favorable results.
Many scholars who have conducted research on impacts of CAI among rural students report negative or mixed effects. According to one well-known scholar, Kamil (2002), fond of using the meta-analysis method in his research to summarize and examine data form study, with diverse results on the impacts of CAI on improvements of reading. In line with a literature meta-analysis by National Reading Panel (2000), CAI tends to have much impact on mathematics as opposed to reading. However, other researchers tend to conform that a neutral or negative relationship is evident between reading improvements and CAI (Hall, Hughes & Filbert, 2000; Astleitner & Keller, 1995; Geoffrion & Geoffrion, 1983; Hall, Hughes & Filbert, 2000).
According to Castellani & Jeffs (2001), the potential advantages that come alongside computer-assisted instruction (CAI) are not easy to undermine in most rural schools. While looking at the findings on the value of computer technology in giving instructions, the trend is impressive especially in developed countries (Graham et al. 2003). In most rural schools, CAI has numerous packages on each subject. It is with no reasonable doubt that all researchers across the globe are focusing on the computer technology in enhancing reading instructions (MacArthur, 2000). According to MacArthur, et al. (2001); MacArthur & Graham (1987); Vaughn, Schumm & Gordon, 1993), it is possible to access from the internet, the traditional methods of reading instructions. Additionally, these authors revealed that learning could be enhanced through interactive approaches. In rural schools, students' master instructional materials faster when CAI is used compared to when instructions are administered in a conventional manner. According to Wong (2001), learning through CAI is cost effective while compared with other methods of offering instructions such as tutoring. Furthermore, the counselor education is well taught using CAI in rural schools than when taught using conventional methods (Goldberg & Sherwood, 2003). However, Glass (2006) findings supported that CAI in rural schools was best used in classroom to teach concepts based on facts, but was ineffective for subjects that needs calculations or critical thinking.
Additionally, Cooper & Hedges (2004) revealed that students in rural areas required more time while CAI is used when compared with the conventional method of instructions. While students are taught using CAI combined with the traditional methods, they tend to portray improve performance than while only one method is used (Fisher, 2008). Similarly, rural students obtain high grades in the final and mid-term exams when CAI is used than when the traditional method is used (Rosenthal, 2001). Basing on the literature review of several researches and limitations on researches comparing traditional methods with CAI, CAI is identified as more beneficial. However, the methods used in CAI can have an impact on its effectiveness thus need studies to clarify its impact on the learner's environment (Singhal, 1998). For this reason, the empirical findings concerning CAI usage are mixed. The issues of genders, according to Goldberg & Sherwood (2003) have been associated with the performance of learners in rural schools in numerous studies although no definite conclusions have been made. Snow, Burns & Griffin (1998) reveal that evidence is there on the general imbalance on attitude, computer use, career, and access. This could be the reason why Williams (2003) review asserted that gender imbalance in the use of computer in rural schools should be the concern of practitioners in future.
According to MacArthur, et al. (2001), some studies have indicated that male students, in rural schools exhibit better performance in sciences when CAI is used than female students. However, there are still several studies, which do not exhibit any better performance of sciences by either of the gender (Fisher, 2008). MacArthur & Graham (1987) did not find any significant influence on student's performance about gender on subjects such as mathematics in rural schools. However, most female students did not prefer the use of CAI while compared with the male students who supported CAI. In a study review of use, access, and attitude with CAI, Castellani & Jeffs (2001) arrived at a conclusion that all students had equivalent experiences on technology. The setting of learning whether individualized or cooperative is likely to be a considerable factor in the learning process. Cooperative learning is employed to enhance and develop the social skills of students such as communication, decision-making, and managing conflicts (Wong, 2001). Cooperative learning equips learners with methods of sharing ideas and this assists them to work as a team, and exhibit responsibility for one another's education besides their own education (MacArthur, et al. 2001). While compared to other types of learning such as small groups, cooperative learning appears more carefully delineated and structured (Williams, 2003). Cooperative learning has numerous key elements namely individual accountability, group training, positive interdependence, and group rewards (Cooper & Hedges, 2004; MacArthur & Graham, 1987). There is close links and affinity between technology and cooperative learning. This is mainly because technology use requires individual's dimensions of commitment, community, and caring. Additionally, when technology is used to improve sequential learning among groups, it can lead to good retention of learnt information, and deeper processing of the content (Castellani & Jeffs, 2001).
In rural schools, delivering of mathematical skills and concepts shapes the understanding of students, their confidence, and their ability to handle various problems (MacArthur , 2000). In the world, mathematics contributes a lot to the live of a student because it serves as a bridge to technology, science, and other kind of subjects found in any system of education (Snow, Burns & Griffin, 1998). However, there are challenges facing the learning and teaching of mathematics. These are caused mainly by the increase in enrolment and the large number of students implies a wide range in preference and ability among students. Another challenge is on creating a mathematic classroom where all students enjoy, and the emphasis that requires a teacher to act as the facilitator and manager of the environment of learning as opposed to being a disseminator of mathematical skills, and knowledge (MacArthur et al, 2001).
Several reports and studies by Wong (2001); Goldberg & Sherwood (2003); and Rosenthal (2001) indicate that owing to poor performance in mathematics, most schools in rural areas have decided to use CAI to improve their performance. The major concern is to introduce approaches, which would improve the deplorable condition of performance in mathematics. According to Cooper & Hedges (2004), the two topics that are poorly done are transformations, and matrices. There is need for educators in rural schools to ensure all students are given an opportunity of participating in CAI mathematics group. The researchers are very categorical that not all topics in mathematics can be studied using CAI approach; however, educators in the field of mathematics are encouraged to identify the benefits and effectiveness of CAI and to establish more lessons on CAI in their classes (Glass, 2006; Fisher, 2008). It has been revealed that when students learn with CAI in cooperative teams, they tend to perform better while compared with individuals, and those placed in control groups (Williams, 2003; Vaughn, Schumm & Gordon, 1993; Castellani & Jeffs, 2001). However, there are reports revealed by other researches that non-computer based approaches are as effective as CAI or they exhibit negative effects especially on basic skills of teaching (MacArthur, 2000; MacArthur & Graham, 1987; Cooper & Hedges, 2004).
According to Singhal (1998), the most possible way of explaining CAI effectiveness in learning of students in rural areas is through their active participation in the process of learning through student-machine involvement. However, given that there exists differences due to gender; further research is required to ascertain if the differences are genuine or coincidental (Vaughn, Schumm & Gordon, 1993). With few studies having been done in most rural schools on CAI, a major assertion of this review is that use of CAI is better than the traditional approach for ensuring attitude and achievement gains in rural schools (Goldberg & Sherwood, 2003). In an attempt to ensure all the needs of rural students are met owing to their diversity, CAI proves to most educators as an effective instructional method for brokering the success of learners (Goldberg & Sherwood, 2003).
Glass (2006) asserts that CAI is closely connected to numerous issues in rural school learning. Some of these learning issues involve strategies, styles of learning, factors affecting the learning process efficiency, and student autonomy (Glass, 2006). In a rather appropriate manner, Glass (2006) is categorical that reference is evident while a comparison is conducted between the knowledge of CAI and EL environment. As earlier mentioned, CAI has a benefit of self-paced learning, thus the student can learn quickly or slowly as they wish through the computer. If they wish to repeat a certain concept or review a certain task, they have the freedom of doing it repeatedly (MacArthur, 2000). According to Rosenthal (2001), with self-directed instructions, students can devise the best method of learning. This is because students have different strategies and styles of learning. Numerous studies (Fisher, 2008; MacArthur & Graham, 1987; Snow, Burns & Griffin, 1998) indicate that whenever students learn in a method that suit their needs, improvements are exhibited in the entire learning process. Considering that human beings are multi-sensory in nature, if there are more senses of receiving information, it becomes easier for one to remember. According to Williams (2003), individuals are capable of remembering 40% of what they see and hear, 20% of what they hear, and 75% of what they do, hear, and see respectively. For the simple fact that computers are capable of exhibiting various senses and present details in diverse media, they can enhance learning in rural places.
Castellani and Jeffs (2001) assert that use of computers in rural schools encourage students to learn due to provision of enthusiasm, and stimulating environment. Computers can assist thee reticent students that are afraid of making mistakes in the learning process (Graham, Harris, Fink-Chorzempa & MacArthur, 2003; MacArthur & Graham, 1987). Computer technology offers a wide range of references, which are applicable in a situation of learning language (Wong, 2001), and can accommodate students with different disabilities. Additionally, CAI has an added advantage of providing a quick feedback to students in rural schools (Wong, 2001). On the other hand, it is important to remember that CAI is not problem-free. For instance, through self-access approach, students may be left for long on their own and the resources and information available may overwhelm them. Additionally, the computer can offer numerous directions in a situation where the classroom approach is transferred to CAI (MacArthur et al, 2001).
Cooper and Hedges (2004) assert that forming a tendency of using multimedia 'gimmicks' is a bad idea and attention should be paid to language acquisition and current theories. However, this should not be interpreted to mean that multimedia is inappropriate (Cooper & Hedges, 2004). Some scholars in the field of research (Snow, Burns & Griffin, 1998; Williams, 2003; Fisher, 2008) hold that meaningful practices of multimedia are possible and they can improve learning. However, according to Singhal (1998), malfunctioning device can lead to loss of time and development of negative attitudes towards the use of CAI in rural schools (Graham et al, 2003). While following links in a computer-based system of learning can be an advantage, students can consume much time when navigating (Graham et al, 2003). According to Goldberg & Sherwood (2003), CAI is a field that is yet to mature. Although various models of CAI exist, not all programs of CAI come with benefits (Goldberg & Sherwood, 2003). In some cases, it is impossible to implement theories into practicals probably because of technological unfeasibility or limited knowledge (Goldberg & Sherwood, 2003). Furthermore, the good or effective practices are difficult to identify. Fisher (2008) observes that continuing research would bring advancement to CAI in rural schools. He identifies Web-Based Adaptive Educational Systems (WAES) as an interesting area of conducting research because the system accommodates a student, offering different information levels, feedback and help (Fisher, 2008).
According to Mevarch (2003), CAI systems are classified into two types namely tool or tutor, although CAI terminology is used to refer to computer instructors. Apart from rural schools, CAI enhances the process of teaching in all institutions of learning, especially by focusing on a specific learning task and striving to improve it (Mevarch, 2003). According to Novak and Mosunda (2001), the tutor category has four modes namely simulation and games, drill and practice, and tutorials. Drill and practice suits behaviorist model the best, especially with repeated practices on skills of lower level cognitive. However, it can be applied in other contexts. The tutorial type is commonly used with CAI (Phillips & Moss, 2003). In this type, the computer system offers the details, offers guidance to the student through the process, allow the student to practice, and then the student is assessed. On the other hand, the simulation mode exposes the student to real world things (Phillips & Moss, 2003). Simulation is usually applied in cases where it is impossible to offer learning realistically. In games type, there is usually a competitive characteristic. According to Fisher (2008), the idea behind this is enhancing the knowledge that the student has. Although it is difficult to establish CAI programs in games mode, and simulation, it is evident that most students find them challenging and entertaining (Mevarch, 2003).
According to Cooper and Hedges (2004), it is not clear the exact type of instruction suitable in a given case. However, most scholars accept numerous findings concerning CAI (Castellani & Jeffs, 2001; Goldberg & Sherwood, 2003; Novak & Mosunda, 2001). CAI students in rural areas have exhibited improved learning attitude. Those students who have used CAI in rural schools have performed relatively better while compared with the control groups (Udousoro, 2000). They generally reduce the amount of performing a certain task by 30%. Cooper & Hedges (2004) report that non-computer based programs are as effective as CAI. However, Xin (1999) summarizes the evident benefits of CAI in rural schools. In his own observation, CAI is an effective education technology for basic skills for practice and drill (Xin, 1999). Students in rural schools learn many concepts rapidly through CAI. Through the availability of the technologies of multimedia, students tend to have control over the process of learning (Xin, 1999). Furthermore, students feel more successful and motivated to learn new ideas, and they have self-esteem and self-confidence (Xin, 1999). Lastly, the administrators and teachers can use information technologies and computers to improve their responsibilities in the process of education (Xin, 1999).
MacArthur & Graham (1987) deduce that psychometric tradition is usually used to test whether CAI is effective. In most rural schools, standard tests are used to measure the impacts of instructional methods on the student outcomes in learning, and comparison of results (Goldberg & Sherwood, 2003). While a psychometric tradition method is used, the researcher sets two groups of learners. One of the groups is placed in a traditional classroom, and the other one is placed in CAI program (Mevarch, 2003). A pretest is then performed and each group is tested on knowledge prior to taking part in the process of learning (Mevarch, 2003). Towards the end of the learning session, the two groups are supposed to par-take a test that determines the concepts learnt. This form of CAI evaluation process is probably commonplace because it applies the traditional methods, it is easy, and it does not require much labor (MacArthur, 2000). However, in the case of rural schools, Rosenthal (2001) assert that psychometric tradition on its own cannot analyze the effectiveness of CAI owing to its simplicity. While using interaction analysis (Novak & Mosunda, 2001), an interaction is seen between the CAI program and the student. Phillips & Moss (2003) assert that interaction analysis is likely to be either psycho-linguistically motivated or pedagogically motivated. The former aims at finding out the strategies of learning used by the learner.
Fisher (2008), however, observes that not all improvements in learning should be ambiguously related with computer use. He argues that it is impossible to separate other variables such as reinforcement and practice that impacts the process of learning, from the computer. However, due to general comments that traditional methods are effective as CAI systems, an assumption will be made that they are indeed beneficial, especially in a situation where traditional methods are unavailable (Snow, Burns & Griffin, 1998).
In a rural setting, the most important thing to consider is the factors that affect the student such as background knowledge, attitude, stress management, and motivation. It is assumed that when a student has positive attitudes, the motivation is high and there is a likelihood of achieving positive outcomes (Goldberg & Sherwood, 2003). In rural schools, there is a relative amount of stress when it comes to introduction of CAI but if the students are able to control it, the learning outcome is not affected in any way (Novak & Mosunda, 2001). If a rural is EL, the motivation is likely to differ with that from a non-EL setting and this may need fostering. Considering that EL society members may lack background exposure on linguistics and language, they are likely to acquire hidden EL knowledge through plants and animal words (Phillips & Moss, 2003). It is assumed that individuals have different strategies of processing information and different styles of learning. In most cases, different situations are unlikely to employ different strategies. In rural schools, if learning is conducted in their language, there is a high possibility of understanding. According to Cooper & Hedges (2004), mismatching between styles of learning and teaching can exhibit significant impacts on the learning outcomes. For this reason, it is important to employ different styles of learning to accommodate all students. Since CAI cannot employ the different teaching styles effectively, it should therefore adapt dissimilar styles. There is need for more research to determine why learners exhibit different styles of learning and the measures that would help support diverse styles of adaptation (Novak & Mosunda, 2001).
The literature shows a clear connection between reading and academic success. There is a consistency of study in those factors that lead to reading success, which include individualization of the process. However, time and resources limit the reality of utilizing a differentiation model for reading. Computer-assisted instruction can alleviate this limiting factor as students can engage with minimal assistance by the teacher. CAI has a positive effect on instruction. CAI that employs proper reading sequence in a response-to-intervention method has the best chance of success for improved reading. The following chapter, outlining the methods and procedures of this study will describe a CAI program that matches the literature's description of best practice for reading improvement. The results section will indicate if this program was indeed as effective as the literature would predict.
Apart from students in rural schools, teachers also tend to benefit from CAI, especially when it comes to updating materials of offering instructions. Additionally, this review has revealed that teachers find it easy to put in records the progress of each student. Because the use of computer technology is used in most rural schools, the majority have accepted CAI as a reliable method of issuing instructions to a large group of students. Learning through computers entails CAI approaches where computers are used as transmission means in reading and other areas. Information usually flows to the student from the computer. In this setting, the computer is the learning material, thus offering response to the student. In most rural schools where the students' progresses are unkempt, CAI makes it possible to retain reports on their progress.
Following the introduction of CAI, researchers in the education field embarked on developing studies of evaluation to know its effectiveness in rural schools. Although most of these studies of evaluation have produced important information on CAI impacts, some of the information is surrounded by ambiguity. In the above literature review, this is evident due to diverse information on some areas as researched by different education scholars in various rural schools. Another serious problem facing the different researches is lack of replications. Most of these researches differed in execution, settings, experimental design, and the investigated computer application. To complicate it even more, the results, and findings appeared different from one research to the next. Findings as exhibited form different studies were different from each other, while some researches provided controversial results. Additionally, a wide range of reviews appear discursive and typical in presentation, while this is added to their multiple findings, it becomes difficult for a reader to understand them. When a review lacks a quantitative method, the reader questions the authenticity of the work in addition to its reliability.
Owing to the problems associated with the traditional method of reviewing studies and researches, there several attempts to establish reliable methods of conducting research evaluation and investigation, have surfaced. The first comprehensive method is meta-analysis. It allows a researcher to make average estimations of treatment impacts on outcome of variables in several studies. Different forms of secondary and primary analysis, the meta-analysis focuses mainly on summarized statistics of various studies without revisiting the original information. Meta-analysis aims at integrating a wide range of results, with the target on the impacts. Hartley (1977) became the first person to employ meta-analysis to CAI findings.
However, meta-analysis is equally faced with challenges especially because of the different computer programs used in rural schools. However, this literature review is mainly focused on CAI. The major challenge is mainly because of the rapid growth in computer technology. From the reliance of computers to establish programs able to individualize instruction reading for kindergarten students, computer technology has continued to experience growth thus becoming complicated. In fact, the witnessed growth in computer technology is so swift thus making it difficult for one to predict what will be new about CAI. While looking at the above review, the reader is likely to lose touch on what is being reviewed.
On the other hand, the use of technology in offering instructions has some negative outcomes although the variations occur in different studies. Currently, there exists very little information on whether technology supports academic instructions. Although there are studies that have exhibited positive impacts of computer usage in academic activities, a section of the studies have reported detrimental or neutral results. For instance, in most rural schools, students find it easy to read a text from the paper than on a computer screen. Additionally, because most students in rural schools have limited knowledge of using a computer, they tend to experience limited control. Accordingly, while most students in rural schools are allowed to choose, they prefer a conventional text to electronic text.
Whenever CAI is introduced in most rural schools, numerous vital considerations need to be observed for it to succeed. Most students in rural schools may be lacking the basic computer knowledge such as searching for data, and opening files and programs in a computer among others. There are more challenges associated with CAI apart from mastering the basic skills of a computer. The most important skill that most students should know is to integrate verbal and visual information in a complex way. It is expected that when text or speech is presented alongside video, pictures, and diagrams, a reader who is efficient should be able understand the details. Researches previously done reveal that children in kindergarten schools may lack skills of assisting them to acquire important details a complex presentation of visual and text information.
In most rural schools, CAI enhances teacher and student instruction in numerous ways. Due to their interactive nature, computer programs can assist a learner to understand concepts through demonstration, sound, and attractive animation. When instructions are administered through CAI, students are given a chance of working as a team, and make progress at a gradual pace. Through CAI, students are provided with an immediate feedback, thus they are able to know whether they are on the right track. If they are not arriving at the desired answer, CAI can direct them how to arrive at the right answer. Computer technology offer students with different activities and a different pace from group instruction. For learners with disabilities, CAI assists them to get the correct feedback thus; they do not continue doing the wrong thing. CAI usually captures the attention of the student because apart from being interactive, computer programs enhance the competitive spirit thus students maximize their scores. Furthermore, CAI goes hand in hand with the learner's pace and they cannot proceed until they have acquired the required skills. The program is capable of offering different lessons that pose challenges to average, risk, or gifted learners.
In order to ensure the right CAI program is installed in rural schools, instructors are expected to review the programs available and determine the one that caters for the needs of their students. It is advisable for instructors to cross check all the links and websites often before allowing students to access them. Students may get frustrated because some links and websites become inactive if they remain unattended for a while. Programs of reading are useful in reading of instructions because students can interact, get immediate feedback, besides learning at their own controlled pace. Some computer programs contain stories that most like. It is possible to use a computer schedule remedial or instructional lessons. Unlike the traditional method, CAI may contain a positive behavior reward.
It is evident that students in rural schools are in dire need of the CAI technology in order to improve the reading of instructions. Technology, especially CAI, has been in the forefront in the provision of improvements in different subjects in rural schools. More individuals who have conducted research on CAI tend to agree in unison that there is a positive motivation concerning learning as opposed to negative or neutral result. According to researchers, CAI maximizes motivation although motivation is not still connected to increased improvement. The recent researches on CAI in rural schools mostly focuses on timesaving, gender, age, disabled students, and socio-economic level among others. Although there lacks concrete conclusions from the literature reviews that were conducted previously, this literature review however provides persuasive evidence concerning CAI in enhancing reading instruction in rural schools. In other words, there are recorded improvements in rural schools, mostly associated with CAI.
Concerning the above literature review, there are numerous implications. Chang (2000), cautions readers to pay heed to researches that are mainly biased, because the stakeholders of the technology conduct most of these studies that exhibit improvement of students in specific areas. For instance, the information provided by the software and information industry association (2000) is likely to be biased considering the fact that the authors area stakeholders of the CAI program. In their report, there are no negative findings on the application of the education software. The author tends to agree that CAI has a remarkable improvement in nearly all areas of application.
Although there are numerous authors cited in the above review such as (Kamil, 2002; Scarborough, 2005; Hall, Hughes & Filbert, 2000; Soe, Koki & Chang, 2000), they tend to echo similar sentiments that more research is required. This should be done especially in specific areas such as rural areas, specific subjects, and styles of teaching. It is clear that different things motivate students in rural areas although the available literature review does not show the variables of motivation. According to a report by Soe, et al. (2000), it is evident that a wide range of reviews fails to employ studies that conform to each other. Studies that are not a replica of others tend to exhibit questionable conclusions and results. Numerous authors who have conducted meta-analysis researches selected concerning this review tend to agree with the complex procedures, findings, and materials that were employed in their studies. There is need for more research concerning the effectiveness of technology in the field of education in order to arrive at accurate findings. Given that phonological awareness is identified in the study as the building block in students, more research on CAI effectiveness in enhancing skills of phonological awareness would be helpful to parents and educators.
While compared with urban schools, most rural schools are spending a fortune to improve CAI although there is much that needs to be done. Many systems in rural schools are spending finances on software programs to improve reading of instructions among students. Irrespective of the limitations exhibited in the research, it is evident that CAI is a very powerful system of offering reading instructions although CAI on its own is insufficient especially on reading acquisition. Although there are many researches on CAI, there are many unanswered questions. Which program focuses mainly on students' reading improvement in elementary schools? Does a teacher have a role on the effectiveness of CAI concerning reading instruction? Which method is effective in knowing whether students in rural schools have attained reading skills? Unless the conducted researches arrive at a conclusion, CAI remains an effective technological system to boost the traditional system of reading instruction among students in rural schools.
| 2019-04-23T22:51:02 |
https://supremeessays.co.uk/samples/education/impacts-of-cai-on-rural-students.html
|
0.998368 |
Do you know how to maintain call quality when deploying VoIP? Get the answers to your VoIP quality concerns, from predeployment assessments to troubleshooting tools.
Voice over IP is an integral piece of any enterprise communications strategy, and it offers several benefits over traditional public switched telephone network and PBX infrastructure. VoIP can be more cost-effective than traditional premises-based telephony, and it offers more scalability and flexibility of deployments.
But organizations must consider several factors when moving from PSTN to VoIP, particularly around call quality. While VoIP has its benefits, voice quality can suffer if the network doesn't have enough bandwidth or lacks quality of service (QoS). Learn how to prevent VoIP call quality issues with the right deployment method and troubleshooting tools.
What do I need for a successful VoIP deployment?
The most important step in a VoIP deployment is ensuring your enterprise has enough bandwidth to support calls. On its own, VoIP doesn't use an excessive amount of bandwidth -- around 100 Kbps per line -- but call quality will suffer if your network is handling other high-bandwidth traffic, like video. Organizations should test bandwidth and ensure enough is available to handle the addition of VoIP traffic.
Deploying VoIP doesn't necessarily mean an enterprise needs to do away with all of the trappings of its previous system. A hybrid approach to VoIP offers the benefits of analog reliability using existing PBX infrastructure with the versatility of VoIP capabilities, including customization, scalability and advanced call features.
What causes call quality issues?
A number of factors can create VoIP call quality issues. The most common culprit behind poor voice quality is a lack of bandwidth, which causes calls to suffer from packet loss. Intentionally dropped packets are the most common type of packet loss, because intentionally dropping packets is the fastest way for a congested network to handle excess traffic. Other sources of packet loss include equipment failure and transmission errors caused by degradation and interference.
Latency and excessive jitter can also degrade VoIP call quality. If packets arrive at the receiving endpoint late or out of order, calls can experience missing or scrambled audio. Packets that are delayed due to network congestion or transcoding create latency, which will cause calls to experience echo.
How can I resolve VoIP call quality issues?
Preventing issues with call quality starts before you deploy VoIP. Performing predeployment tests is essential to spotting potential issues before rolling out VoIP, such as network congestion points or Wi-Fi coverage gaps.
Once you've deployed VoIP, enable QoS capabilities to control and manage network resources. QoS gives VoIP priority on the network, allowing it to function without competing with other traffic for bandwidth. Tools such as jitter buffers and traffic shaping mitigate packet loss, latency and jitter.
The last piece to prevent VoIP call quality issues is to pick quality hardware. Whether you purchase headsets or desktop VoIP phones, choosing a reliable hardware option goes a long way toward providing excellent call quality for your enterprise.
How does your organization support VoIP call quality?
| 2019-04-22T06:19:57 |
https://searchunifiedcommunications.techtarget.com/feature/How-to-prepare-for-and-manage-VoIP-call-quality-issues
|
0.999075 |
Find a Historical trip that explores Spain. There are 64 tours to choose from, that range in length from 3 days up to 22 days. The most popular month for these tours is September, which has the most tour departures.
"Our tour guide, Carlos Sanchez, took our trip to the next level. He knew every popular..."
"The tour was really interesting, an easy way to discover Andalusia. Granada is awesome..."
"it was a good tour. The vegetarian options were very average. Need to atrer to vegetarians..."
"The team was really good with all the questions. Guide and Hotels good ¡¡ Value..."
"It was a quick paced tour, but it touched most of the city highlights of each stop...."
| 2019-04-22T09:31:33 |
https://www.tourradar.com/i/spain-historical
|
0.999999 |
Is there a way to download for offline use a Collector Map that contains a read-only view layer?
I currently have a feature class with a related table available on an offline Collector Map. I would like to create another offline Collector Map to view symbology from the related table. I would like to use a view layer of the original data so that the symbology is automatically updated. I used "Join Features" in ArcGIS Online to merge my feature class with my related table in a read-only view layer. I would like to use this view layer on another Collector Map that already has an editable feature on it. I am able to view the map with the editable feature and read-only view layer on the Collector application. However, I am unable to download the map for offline use.
| 2019-04-26T00:40:53 |
https://community.esri.com/thread/230894-is-there-a-way-to-download-for-offline-use-a-collector-map-that-contains-a-read-only-view-layer
|
0.999669 |
Is it time for the old argument "the German government is illegal"?
That won't get them far.
It's true though. I don't see why it is wrong to underscore that this is a political trial and that the facts of the case were established by the WWII Victors 60 years ago. Soon the defense will be prosecuted for defending the accused.
Zündel needs a psychiatric hospital, not jail.
German government is recognized both by the international community and the German nation. This makes it as legal as possible. End of story.
Obviously, this isn't Sylvia Stolz speaking but ex-RAF member and convicted terrorist Horst Mahler.
Scott is kinda right in saying that it is a political trial, but all trials are political. Suppose as a 'true communist' I claim in court that 'ownership is theft'and therefore 'I can take what I want' I make a political statement, I can make it part of my defense but like Zündels lawyer I fail.
And of course, 'the facts' aren't made by the victors and it is very unlikely that the defense will be prosecuted for defending someone.
Roberto gave some nice references in the VT Opening statment concerning German Penal law, I suggest you read them.
Germany as a nation was founded in 1871, present day Germany is its direct descendent. If the Germans don't agree the way their country is run they can vote about it, big deal.
Isn't that kind of analogous to a French defendant claiming as a defense that the act of which he's accused wasn't illegal under the laws of the Second Empire?
The sheer disregard for reality is breathtaking. It reminds me of the cockamamie reasoning and magick formulae you see from "tax protestors" in the USA.
No, they'll just keep dismissing his defense attorneys until they get a stooge that can play the charade the way they want it played.
Following Unconditional Surrender, Germany's sovereignty is so within strict limits, just like an American state is allowed certain spheres but cannot opt out of the Union--which is to say that it is a territorial-administrative unit that votes but is not sovereign.
In fact, modern Germany is an economic colony to the postwar world order. If the Germans get out of line they will become part of the Axis of Evil quicker than you can say Ahmadinejad. That is one of the reasons why the Germans so dutifully market themselves as non-Nazis, and that is why they are charging ethnic-German Zündel with Thoughtcrimes that he did not even even commit in Germany.
When treason prospers, as the saying goes, none dare call it treason.
This is just so hoolabaloola one doesn't know where to begin debunking it. By whom is Germany controlled? By the USA? And that's why Germans totally opposed US war with Iraq? By Russia? That's why Germany so strongly supported EU expansion to the East, which undermines Russian influence there?
Show any proof that Germany is not a sovereign state.
Dear Roman, you do know that accoring to revisionistic logic you have to prove the opposite of what Scott is saying?
The Germans would be crushed if they displayed any sort of serious economic nationalism. The financial New World Order would not permit it, nothing more than tokenism or empty rhetoric at best.
Deutschland would be reduced just like Apartheid South Africa.
Even now the Bundestablishment is begging forgiveness for not joining Blair and the other poodles with Intervention in Iraq, the goal of which is to keep oil markets and therefore global financial markets stable by installing American military bases in the oil zone.
To be a world power without getting on the sh*tlist, Germany has to play ball according to the rules set by the big boys in places like New York and Washington. Hence they give Israel a gift of submarines, and plutonium for nuclear weapons (oh wait, that last was perfide Albion).
The Germans would be crushed if they displayed any sort of serious economic nationalism.
1. Who says "economic nationalism" is a good policy? Many countries prefer free market economy.
2. Germany does have economic nationalism. It's job market is closed for workers from the "new EU" states. They subsidize their industry quite a lot by Western standards. They sometimes intervene in international mergers on their home turf (Vodafone deal). Spending a lot money on welfare for their citizens also counts as economic nationalism, IMHO.
3. Germany cannot discriminate against foreign investors, for example, because it joined, by free will. international treaties which prohibit that. This is called "international law". The same treaties guarantee that German investors won't be discriminated against by other countries. That's why such treaties were created.
You may also note that Germany is in the Euro zone and its economy is a part of the EU economy. The EU as a whole is a very strong player which does not hesitate to defend its interests (steel wars with the USA, outrageous protectionism on the food market). That's why in many cases Germany does not have to resort to "economic nationalism" to defends its companies: the defence is being collectively done on the EU level. Why would they resort to XIXth-century tactics when new tactics work better?
Ah, so you're complaining about the fact that Germany would have some international troubles if it decided to reduce, say, Turks to the level of second-class citizens. Not bloody surprising, given the number of human rights treaties Germany ratified. Are you against the principle of non-discrimination, Scott?
Many SA economical troubles were direct consequence of their treatment of blacks, not the foreign influence. Nevertheless, as for Africa, they are doing splendidly.
The problem is, Germany does not aspire to be a "world power".
Germany has to play ball according to the rules set by the big boys in places like New York and Washington.
... and Zion, I suppose.
Germany could ignore its neighbours and political allies but this comes at a price (like being equally ignored by them). This is nothing surprising and nothing to complain about.
Or do you think that Germany is destined to rule the world and anything less is a major insult to them? Luckily, most Germans do not share your view.
Sure, they do, if they are rich countries with access to lots of resources and cheap labor and can set global trade preferences, like the former British Empire or the United States international banking establishment. All countries have to import pied noirs as cheap labor that has no bargaining power and must be marginalized from society while the plutocracy lives in their gated communities.
Still, supra-national or regional economic unions often make sense, such as the BeNeLux countries forming the basis of the EEC by operating the coal mines and iron works as a single efficient economic unit, just as the Nazis had done with their European war-economy during the war. If armaments industries are integrated among many states, then it means that war between them is no more likely than that the South will ever rise again.
Germany and France's economic futures and policies should be theirs to decide, however, not foreign investors. The reason that North Korea has not crumbled is because, unlike modern Germany or even the former South Africa, their people can survive on a very low standard-of-living.
Their plutocracy has to import cheap labor just like ours does, in contravention of immigration laws. These people have no bargaining power, are socially and culturally marginalized, and undermine the value of citizen-labor, fostering deep resentments all around. And all the "Island Niggers" blowing up subways in London didn't get there because they prefer the climate.
Sovereign states who can make treaties can break them at will. And they should if they serve no national interest or have no ultimately favorable national outcomes or overriding diplomatic ramifications--bearing in mind that sometimes goodwill and a long history of trust-relationships is often diplomatically valuable for its own sake.
But if foreign investors start calling the shots, then a country becomes an economic colony; it becomes owned. Even a colossus like the United States is threatened with debt servitude if its national government does not wake up and realign the stars to start limiting the power and political corruption of global corporations operating in and out of the country with carte blanche.
Because the German worker is being dispossessed from his own country. Still, the Germans are not alone. I am not necessarily against collective European endeavors anymore than I would favor balkanizing the fifty American states.
<< Deutschland would be reduced just like Apartheid South Africa.
If a nation's freedom and independence requires "international troubles," then bring it on. The Germans, however, have the attitude of a defeated people, and this is not surprising.
That depends. Brotherhood is one thing, but not the Brother pulling the hood over the other. Apartheid South Africa was never workable because the Whites were in the minority and they needed the Blacks for labor even if they wanted them otherwise invisible. They did not import the labor because it was cheaper than the White workers already building the country.
In the United States I would solve immigration problems as follows: By using the military gallavanting in foreign lands to secure the borders. Any state which cannot control its ports and borders is not sovereign. By putting employers who hired illegal aliens as workers into prison for long terms and confiscate their property. By making felons out of illegals and deporting them.
And very importantly, by taking steps to improve the bargaining power of American workers such as eliminating the "Right to Work" laws in the 22 poorest American states which undermine collective bargaining by allowing workers who vote for union representation to not pay union dues, and by putting tough "laborfront" commissioners into power who have the power to fairly arbitrate between the interests of Capital and Labor. Presently even Big Labor gets nothing more than lip service from even non-hostile politicians and is completely cowed by global corporations because all they have to do is close their doors and relocate their sweat shops overseas. The result is that Labor is left trying to organize the service industries, babysitters and maids instead of the real jobs. Even highly-educated engineers have no real economic bargaining power in the United states compared to an accountant or a marketing weasel.
I'm not a defender of Apartheid South Africa, nor any other country but my own, really. I'm an Isolationist.
<< "Even now the Bundestablishment is begging forgiveness for not joining Blair and the other poodles with Intervention in Iraq"
Chancellor Merkel was quick to see the light upon taking over. There are amusing caricatures of her dressed in stars and stripes like Uncle Sam. And British Foreign Secretary Jack Straw schmoozing Condoleeza is rather amusing too.
<< "To be a world power without getting on the sh*tlist"
It can't helpp it unless it intends to be a Third World country or an economic colony. It is the keystone state in Europe. That why Britain had to wreck her empire to destroy her from 1871-1945. Britian's place in the firmament, on the other hand, has been determined by the United States since 1939.
<< "Germany has to play ball according to the rules set by the big boys in places like New York and Washington."
Zion is a tool, nothing more. The Fundamentalist Christian and Jewish electorate in America like the idea of Zionism and the "rapture" that leads to Jesus' coming, but this "aircraft carier" is ultimately very expendable.
I'm not saying that they should ignore or not get along with their neighbors.
And American Isolationism, as I see it, does not mean ignoring the world but only not exploiting it and not (usually hypocritically) trying to save it from itself.
Germany does not need to rule the world. Never has. But her place in the world was secured simply by nearly-unified nationhood in 1871, and powerful global forces had to combine to thwart that. Still do.
I really don't have the time to debunk the rest of your post, but answer just one question: why Germany? Why didn't the "powerful global forces" combine against, say, France or Britain? Why not against the USA? Why is everybody feeling the urge to go after poor innocent Germany?
Because German finance was more national than imperial, and domestically rather than globally-minded as a young (unified) nation. America was certainly nationally-minded too but it had been furiously developing a vast frontier on its own continent and not colonizing the globe.
French foreign policy from the time of Richelieu to Napoleon was largely directed against Germany, or Prussia and Austria, whereas Albion's was directed against France as the preeminent continental power and rival until the Congress of Vienna in 1815.
Keeping the continent balkanized was the strategy of the global British Empire and their "Athenian democracy" against any "totalitarian Sparta" on the continent. This was also the march of international-finance Capitalism, as frontiers pushed onward and upward, the Anglo-Saxons being in the lead (though in service of an Internationalist idea).
The balance-of-power changed radically with German unification in 1871 and the Kaiser building a capital ship navy. By mid World War I, international-finance-capital had fully enlisted American support in reducing Germany and begun to transfer its stakes from London to the New York counting houses--with the world as its oyster once the American Isolationists could be fully neutralized (which was complete by 1945).
Again, Germany had to be reduced from 1871-1945 to an economic colony simply because her financial system had been more nationally-minded than in England or America (which had its own dynamically expansive national frontier until the 20th century).
For viability, Democracy-Capitalism requires exploitation of and access to global financial markets. The Americans dismantled the trade preferences of the British Empire when they emerged from the war as the preeminent global superpower; now any Capital can play the free-markets, not just Anglo-Saxon but even Japanese and German Capital.
Make no mistake, however, that access to markets for global capital, and the predatory exploitation and enforcement of debts and obligations, was still the rule--regardless of whether it was with Reagan's 600 ship Navy or with modern smart bombs and U.S. Marines instead of with Royal Navy gunboats.
Because German finance was more national than imperial, and domestically rather than globally-minded as a young (unified) nation.
Eh? The Germans tried hard to build an empire, but they failed.
Bismarck's Kulturkampf, which was also directed against Poles, is a nice counterexample to what you claim. The Germans weren't above dominating other nations when they had the chance.
Again, why? Was making business with Germans less profitable than doing business with the British?
They failed with overseas colonies because the Kaiser could not build a capital ship navy on par with the Royal Navy before the outbreak of war.
This does not change my point, though, that German finance was more national than the Entente, which was global, and which determined where the Anglophile Americans would cast their lot in the war.
Because the Poles were Roman Catholic fundamentalists. Ever since the Thirty Years War, German unity required secularization because it was divided between Lutherans and Catholics.
Because the Royal Navy was able to prevent any trade with Germany, even by neutrals, and the German U-Boats were not able to likewise prevent the Merchants of Death (as they were called by postwar U.S. Senate investigations) from trading with England.
Plus, the East Coast plutocratic establishment in the United States tended to be staunchly Anglophile, although they would have loaned money and sold munitions to the Germans too if the could.
When Russia began to falter and it looked like Germans would win the war, the Merchants of Death called for American intervention to guarantee their Allied war-loans. They were outraged by U-Boat sinkings but not by the British Blockade.
After the war they loaned to the Weimar government and kept it compliant with Versailles and addicted to debt until the Depression caused the whole corrupt postwar system to fail completely. Hitler never could have come to power if he had equivocated on the Versailles treaty like the bourgeois Weimar politicians.
| 2019-04-26T10:03:53 |
http://holocaustcontroversies.blogspot.com/2006/03/zndel-is-doomed.html
|
0.881865 |
Does Marketo have the ability to host a micro-site?
It's definitely not designed to develop a microsite, but that doesn't mean it's not possible. For example, you could build a landing page template with the header/footer you want to be common across the 'microsite,' as well as the navigation that would have a link to each of the individual pages on the microsite. Then you'd build the individual pages, and update those links in the placeholder nav to point to each of those landing pages. Basically, you're just making a network of landing pages that interlink to one another.
Is there something prohibiting you from using a proper CMS rollout? I feel like anything more than just a few pages would be a nightmare to maintain if you built it using Marketo.
Thank you Chris. What do you mean by a proper CMS rollout? What would this entail? Would you recommend this over your suggestion above it?
Marketo was designed to build standalone landing pages to support specific marketing campaigns as opposed to multi-page web experiences. What's the purpose of the microsite, lead generation?
We are also trying to have micro-site in Makreto but I would like to understand what are the pros and cons of the same and why it's not recommended to have micro-site in marketo? We are planing to do SEO on this page as well as we are going to use Adobe target to personalize the user experience.
Marketo is not a CMS. If the plan for your microsite is to have multiple pages with different content and purposes, and then link them all together using navigation, that's what content management systems are built for. If you build that using Marketo, it's not actually a microsite, it's a series of individual landing pages all tied together with URLs linking to one another, whereas a CMS would actually have a sitemap and content hierarchy that cascades through the site and content.
If you're concerned about SEO, using Marketo is a bad choice. Because there isn't a single host domain (www.example.com) at the root of the microsite and instead would just be a landing page, it would be hard for a bot / spider to read and understand how the 'microsite' content is related to one another besides just inter-linking. If you build the microsite within a CMS, you could have a dedicated domain, sub-pages, a proper sitemap, etc., which is critical from an SEO perspective.
Bottom line - Marketo can build 1-off landing pages for specific content or events. A CMS should be used to build anything more complex than that, then embed Marketo forms and the munchkin code to enable lead capture, scoring, lead management, etc.
Thank you so very much Chris. This is really helpful.
| 2019-04-24T16:16:09 |
https://nation.marketo.com/thread/47301-microsite
|
0.999003 |
Some movie fans love to come up with theories even though a lot of times they go against what a film is obviously telling us. But — and I know this is probably what they all say — a theory about Snow White and the Seven Dwarfs that's been circulating makes a lot of sense. It's based on real history, which is a lot more than can be said for some Disney-related theories.
Cosmopolitan points out that the theory was shared in the comments section of a BuzzFeed story titled "12 Disney Movies That Have Horrifying Origin Stories". The top comment is from someone named Matt, who wrote a long explanation of why the prince in Snow White is actually the Grim Reaper and why Snow White is actually dead by the end of the movie. Matt believes that the film was made in such a way that children watching it would see Snow White getting a happy ending, while adults who knew the real story would see clear signs that she died.
So, what's the real story? It's been suggested that Snow White was inspired by the real-life Margaretha von Waldeck, a young aristocrat who lived in the 16th century Germany. (That said, it's been suggested Snow White was inspired by other people, too.) When she was a teenager she moved out of the home of her father and stepmother, and encountered Philip II of Spain while at court in Brussels. It is thought that someone didn't like the idea of Margaretha and Philip marrying (for either political or religious reasons) because Margaretha was poisoned and died at the age of 21.
Matt shared some more details in their comment that make the connection between Margaretha and Snow White seem even stronger: "The Real Snow White, Margaretha von Waldeck, was a wealthy noble whose father owned copper mines run by slaves who were mostly children because they fit through small mines easier. Thus dwarfs who spend all day mining gems but live 7 to a house." Seems like a clue, for sure! Matt also says that people liked Margaretha and how kind she was and that this could be how she got to be immortalized with the story.
As for why it's theorized the story shows her dying, the commenter explained that "the prince is supposed to be kind of like an angel of death, basically a happier version of a grim reaper." They note that Snow White first sees the prince when she almost dies by falling into the well, and doesn't seem him again until she is literally on her deathbed. "When you die, the air is expelled from your lungs. Folklore said this was death kissing you to take the 'breath of life' from you," Matt writes.
Then, the nail in the coffin (I know, I'm sorry) comes at the very end when the castle is shown as being up in the clouds and looking all heavenly.
Matt's comment is from months ago, and it appears this is all circulating now after it got picked up by some UK publications. Unsurprisingly, this is not the first time this theory has gone around over the years, either.
It doesn't appear that Disney or anyone involved with the 1937 film has ever confirmed that the movie was meant to show two possible outcomes of the story, but if it (and potentially also the original fairytale) were meant that way, then that would be pretty creative. Either way, it's definitely hard to see the movie the same way now.
| 2019-04-25T15:48:23 |
https://www.bustle.com/p/this-snow-white-theory-about-the-prince-being-the-grim-reaper-makes-upsetting-amount-of-sense-10229110
|
0.998688 |
Software updates offer plenty of benefits. It’s all about revisions. These might include repairing security holes that have been discovered and fixing or removing computer bugs. Updates can add new features to your devices and remove outdated ones.
While you’re at it, it’s a good idea to make sure your operating system is running the latest version.
Hackers love security flaws, also known as software vulnerabilities. A software vulnerability is a security hole or weakness found in a software program or operating system. Hackers can take advantage of the weakness by writing code to target the vulnerability. The code is packaged into malware — short for malicious software.
An exploit sometimes can infect your computer with no action on your part other than viewing a rogue website, opening a compromised message, or playing infected media.
What happens next? The malware can steal data saved on your device or allow the attacker to gain control over your computer and encrypt your files.
Software updates often include software patches. They cover the security holes to keep hackers out.
You probably keep a lot of documents and personal information on your devices. Your personally identifiable information — from emails to bank account information — is valuable to cybercriminals.
They can use it to commit crimes in your name or sell it on the dark web to enable others to commit crimes. If it’s a ransomware attack, they might encrypt your data. You might have to pay a ransom for an encryption key to get it back. Or, worse, you might pay a ransom and not get it back.
Updating your software and operating systems helps keep hackers out.
OK, cyber security is mostly about you, but you’ve got other people to think about, too. If your device gets a virus, you could pass it on to your friends, family, and business associates. That’s why you want to keep your software and systems updated.
Updates not only patch security holes, they can also add new features and improve existing ones. You don’t want to fall behind the times, right?
In that way, software updates really are all about you. Your software program may get a new shot of stability — no more crashing. Or an update might boost program performance — more speed. You deserve no less.
You could ignore those reminders to update your software, but you might be missing out on a lot, starting with your cyber security.
Another option? If you’re still not keen on clicking “Update now,” you may be able to configure your devices to update automatically. If so, your problem is solved.
| 2019-04-18T23:13:04 |
https://us.norton.com/internetsecurity-how-to-the-importance-of-general-software-updates-and-patches.html
|
0.998409 |
How much? Which effect is stronger? What if?
Introduction OTC Drugs OTC Drugs means drugs legally allowed to be sold Over The Counter, i.e. without the prescription of a Registered Medical Practitioner. In India, though the phrase has no legal recognition, all the drugs that are not included in the list of prescription drugs are considered as non-prescription drugs (or OTC drugs). Prescription Drugs are those that fall under two schedules of the Drug and Cosmetics Rules, 1945: Schedule H and Schedule X. Drugs falling under Schedule G require the following mandatory text on the label: Caution: It is dangerous to take this preparation except under medical supervision and hence are not advertised to the public voluntarily by the industry. In India, the import, manufacture, distribution and sale of drugs and cosmetics are regulated by the Drugs and Cosmetics Act (DCA) and its subordinate legislation, the Drugs and Cosmetics Rules (DCR).
The following OTC medicines advertising can be seen on TV in India: Digestives Antacids Antiflatulents Cold rubs and analgesic balms/creams Vitamins/tonics/health supplements (especially herbals and Ayurvedicregistered) Medicated skin treatment Analgesic/cold tablets Antiseptic creams/liquids Glucose powders Cough liquids Throat lozenges Medicated dressing (band-aids) Baby gripe water.
The consumers are changing ,they are more informed, use more gadgets, lead a fast life. Stressful workplace environment and fast changing technology put continuous pressure to adapt and adjust Changing lifestyle with smaller living space, less exercise(sedentary jobs), taking junk food . Consuming addictive products to stay awake on the job for longer hours and eating on the run put more stress on the body which get expressed in the form of psychosomatic disorders like frequent headache, allergy, common cold, constipation, backache, acidity, chronic fatigue etc.
... which they are trying to manage with Over The Counter (OTC) drugs.
enfranchised customer of today feels more independent and self reliant and is hesitant to adopt the orthodox model of expert prescription, monitored medication and supervision throughout the treatment period to manage common ailments. With increasing medico legal cases, Doctors are also not ready to take any risk and insist on detailed investigation to diagnose even a common ailment. This adds to the already existing high cost of following an orthodox model. Most of the OTC drugs are safe, effective, economical and since it is available with out a prescription, the perceived value of OTC medication is higher compared to orthodox model for common ailments. Self-administration of treatment with over-the-counter drugs relies on the patient's judgment, supplemented by the information on the label, for correct diagnosis of the disorder or symptom. An incorrect diagnosis may lead to the use of an over-the-counter drug that has no efficacy in treating the actual condition present. In general, the dangers of misdiagnosis involve both the potential adverse effects of the drug when inappropriately used and the risks associated with lack of treatment for the actual cause of the symptoms.
The social benefit at a national level will be lesser work load on general practitioners, lesser crowding in primary health centers (PHCs), pharmacists who are more empowered to guide and counsel patients and more confident public who are in a better position to take more informed choice of the best available solution to treat their common ailments and prevent the frequent occurrence of the same. This will increase productivity at work and every one in society can make superior contribution towards nation building as it strives to be a developed one.
More than one-third of the time people treat their routine health problems with OTC medications to receive symptomatic relief from their ailments. If done correctly, self-care with OTC medications can provide significant relief from minor, self-limiting health problems at minimal cost.
| 2019-04-23T08:27:32 |
https://www.scribd.com/presentation/82920748/OTC-Consumer-Behaviour
|
0.998063 |
Absolute value inequalities and equations are a bit tricky to work with. There are basically three cases or situations that can arise when working with them. By guessing and checking we can answer the following three questions.
Case 1: | X | = n can be solved using X = -n or X = n.
Case 2: | X | < n can be solved using -n < X < n.
Case 3: | X | > n can be solved using X < -n or X > n.
Use the following steps to solve an absolute value equation or inequality.
Step 1: Isolate the absolute value.
Step 2: Identify the case and apply the appropriate theorem.
Step 3: Solve the resulting equation or inequality.
Step 4: Graph the solution set and express it in interval notation.
In the three cases listed above notice that we took care to say that n > 0. The next three problems illustrate some of the situations encountered when n = 0. Plug in some numbers and see what happens.
| 2019-04-20T01:12:09 |
https://www.openalgebra.com/2012/11/absolute-value-inequalities.html
|
0.999999 |
How best to translate this sentence please? : "Were you there before?" - Etais-tu là avant? (or) As-tu été là avant?
and the same sentence in the negative: "Weren't you there before?" - N'étais-tu pas là avant? (or) N'as-tu pas été là avant?
Just as a tip, was/were is usually translated by the imparfait to do with the nature of the verb. You will hear 'j'ai été' but in the sense 'je suis allé' ( I have been).
or simply: <Tu étais là avant?> (with a rising intonation in the voice)? - rather than the inversion?
Kind Regards to you from Australia!
I think the inversion always sounds a bit pompous in spoken French. You won't hear it used as often as you do in English.
I didn't know that the inversion would sound pompous in French.
The word "didn't" that I just used in the sentence above, would that be translated into French using the imparfait, please? Probably the verb savoir (?) in the negative of course, in this sentence?
I find all these little things far trickier to "round up". Doing exercises at C1 is easier than A2 for that reason!
Yes indeed 'I didn't know' would be 'Je ne savais pas' as 'savoir' is another of those verbs which implies duration (you know something over a period of time) so you will find it mainly in the imparfait.
To go back to the inversion, I watched a French series yesterday and listened out for questions, not one of them used it!
Thank you so much Cécile for answering those questions for me!
| 2019-04-20T22:59:33 |
https://progress.lawlessfrench.com/questions/view/passe-compose-or-imparfait
|
0.999803 |
1. Where should I go to social work grad school?
Answer: The answer to this question is different from person to person. A lot depends on what your goals are (personally and professionally), what your learning style is, and other factors. If your goal is to be a professional social worker, one criteria that you SHOULD look for is accreditation by the Council on Social Work Education (CSWE) in the U.S., or by comparable accrediting bodies in other countries. A list of such schools can be found in CSWE's program directory at http://www.cswe.org.
2. Do I need to get my BSW (Bachelor of Social Work) first, before I go for my MSW?
Answer: No, you do not need a BSW to get an MSW. Your bachelor's degree can be in any major. If you do have a BSW from a CSWE-accredited school, however, you may qualify for advanced standing in some MSW programs.
3. The school I am looking at doesn't offer the MSW. Their social work degree is an MSS. Is that okay?
Answer: The most common accredited degree in social work is the Master of Social Work (MSW). However, some schools call their degrees by different names (Master of Arts, Master of Social Service Administration, Master of Social Sciences, for example). If the school is accredited by CSWE, the master's degree you are getting is equivalent to the master's degree at other CSWE-accredited schools, regardless of the actual name of the degree offered.
4. How long will it take me to get my MSW?
Answer: Most MSW programs are 2 years if you are a full-time student, but this varies. If you are in advanced standing, you may be able to obtain your MSW in as little as 1 year.
5. How important is the personal essay (also called the biographical statement) portion of my MSW application?
Answer: Very important. Each school will require that you write an essay, statement, or similar document as part of your application for admission. The statement/essay tells the admissions committee about your motivation for and commitment to a social work education and career, how well you write, and other important information about you that is not conveyed in other parts of the application. Follow the directions provided by each school, which will mean writing a different statement for each application.
6. What courses do I need to take to become a social worker?
Answer: If you are enrolled in a CSWE-accredited degree program, there are certain core courses that you will be required to take. They include: human behavior and the social environment, social welfare policy and services, social research, social work practice, and field practicum. Most schools of social work offer a variety of concentrations or specializations for MSW students, such as health, mental health, aging, children and youth, and so forth. Additional courses are taken in your area of concentration.
7. Will I have to write a thesis?
Answer: This varies from school to school. Some require a formal thesis; others do not. Ask each school what the requirements are in this regard.
8. How do I know if the MSW is the right degree for me?
Answer: Only you can decide this for yourself. You might try doing some volunteer work in your community, under the supervision of a social worker, to find out what the social worker in that setting does and how the work suits you. Talk to social workers to get a feel for the profession. Look at the classified ads in your local newspaper and see if the jobs that interest you typically require a social work degree. Be aware that the social work profession is quite broad. Read some books like DAYS IN THE LIVES OF SOCIAL WORKERS (Linda M. Grobman) and CAREERS IN SOCIAL WORK (Leon Ginsburg) to find out the variety of career paths that are available to social workers. Look at your own career goals, possibly with the help of a career counselor, to determine if a formal social work education will help you reach those goals.
9. Will I need to be licensed to practice social work, once I get my degree?
Answer: Social work licensing is governed by the state in which you live or practice. Each state sets its own licensing requirements. You can go to the Web site of ASWB (Association of Social Work Boards) at http://www.aswb.org to find a directory of licensing boards in the U.S. and other jurisdictions. This directory will give you contact information for each board, as well as general information about each state's requirements.
10. What are all the initials I see after social workers' names? BSW, MSW, LSW, ACSW, BCD? What does it all mean?
Answer: BSW (Bachelor of Social Work) and MSW (Master of Social Work) are social work degrees. LSW typically means Licensed Social Worker, but licenses vary from state to state, so depending on the state, you might see LSW, LCSW, LMSW, LBSW, and other such titles. ACSW stands for Academy of Certified Social Workers and is a national certification that is issued by the National Association of Social Workers. BCD is Board Certified Diplomate, which is also a nationally recognized credential.
11. What are the ethical obligations of social workers?
Answer: The social work profession takes ethics very seriously. The primary document relating to social work ethics is the National Association of Social Workers' Code of Ethics. It can be found online at http://www.socialworkers.org/pubs/code/default.htm. State licensing boards may also have their own codes of ethics. If you are a licensed social worker, please check with your state licensing board for its code of ethics (also called code of conduct or something similar).
This was a great post. As someone who has a very demanding and fulfilling full-time job, I'm starting to think about taking classes one by one towards my MSW (until I can kind find time to take a months long break to complete my practicum). Would it be possible for the Social Work Graduate School Site to post more information about the core courses you'll be required to take? I'd like to be sure that the classes I enroll in are transferable. Any insight would be helpful. Thanks so much! Really enjoying the site.
Hi, AB. You will need to take classes in an MSW program that is accredited by the Council on Social Work Education (www.cswe.org) if you are in the U.S. The core courses in these programs are similar...Intro to Social Work, Social Work Practice, Social Welfare Policy, Human Behavior in the Social Environment, Field Seminar, etc. You will need to determine which school(s) you would like to apply to and ask them if you can take classes one at a time. Some programs have a part-time option for students who are employed or otherwise need to go part-time.
| 2019-04-24T14:44:55 |
http://www.socialworkgradschool.com/2012/07/faqs-about-social-work-graduate-school.html
|
0.999996 |
Many words have other meanings beyond those listed here.
All the long misery of his baffled past, of his youth of failure, hardship Kenneth John Odle www. There's no cussing, no violence, no adult situations. As he considers every option open to him, he realizes that there is apparently no way out.
But his elation deflates when Mattie whispers to him that Zeena has returned and went upstairs to bed without saying a word to her. It was the sense of his helplessness that sharpened his antipathy. Hales assertion in this passage? Given his interest in Ethan Frome, how unbiased is his reporting?
How does their little girl parallel Mattie? He took a wild step forward and then stopped. His dream of becoming an engineer has disappeared. Along with her tireless work, she also kept up her work as a writer. Ethan looked at them curiously.
With all the incidents that happened it seemed inevitable that his life would always be a string of failure. Does Ethan give up too easily after discovering that the cost of moving out west is beyond his present means?
Epilogueaustere suggesting physical hardship. Color plays an important role in this book. Is success in life based on how hard one works, is it based on whom one knows, or is it a matter of chance?
Mattie wanted so desperately to be with Ethan, That she suggested in order to stay together forever, they should die together.
But, his method of questioning makes her worry that his wife, Zeena is planning to fire her. In what ways is she present before Ethan and Mattie begin talking about her? Frome introduces the women. Was her illness physical, psychological, or something else? Is this even possible? A common criticism of Ethan Frome is that it is too contrived.
Although her father supported her continuing her education, the poem was published under his name because during her time a woman of the upper class only had her name in print at her birth, death, marriage and the births of her children.
The narration switches from the first-person narrator of the prologue to a limited third-person narrator. The prologue, which is neither named as such nor numbered, opens with an unnamed male narrator spending a winter in Starkfield while in the area on business.
Edith Wharton was also nominated for the Nobel Prize in Literature inand She is also a terrible housekeeper and flighty.Mar 26, · retreating to the corners of one’s mind comes easily, particularly when living an isolated life on the outskirts of town, as Ethan does in Edith Wharton’s novel Ethan Frome.
Wharton uses characters and symbols to illustrate how one uses illusion to cope with isolation. Way back when I started the Women's Classic Literature Event last December, I said that Edith Wharton was the author I was most excited to read for the event.
Well, I've finally managed to read a book by her, my very last for the event. Ethan Frome is one of Edith Wharton's most famous novels and rightly so. It is exquisitely written by an author with remarkable observation and imagination. Ethan Frome is a novel which extinguishes hope and blows away happiness but it is so powerful as an analysis of waste that it.
A heartbreaking and extremely well written short novel, Ethan Frome tells the story of the title character who has fallen in love with his bitter wife's young cousin. Ethan is plagued by indecision, and Wharton expertly portrays his feelings and the tension between Frome and the object of his affection.
ETHAN FROME I had the story, bit by bit, from various people, and, as generally happens in such cases, each time it was a different story. Read Author's Note of Ethan Frome by Edith Wharton for free at Read Print.
to mark Ethan Frome as the subject for a novel. But I never thought this for a moment, for I had felt, at the same time, that the theme of my tale was not one on which many variations could be played.
I have written this brief analysis- the first I have ever.
| 2019-04-24T02:44:46 |
https://ludumeb.palmolive2day.com/an-analysis-of-my-thought-of-the-novel-ethan-frome-by-edith-wharton-66517dw.html
|
0.998535 |
The sun is out, and it is raining. You know what that means? A rainbow. Who doesn't love a nice rainbow after a rain shower? You are sure to have a bright and sunny day with this rainbow decoration. The Rainbow Cutout measures thirty-one inches wide.
The Rainbow Cutout is printed in color on two sides, so you can place it in a window. Or attach a string to it, and hang it from the ceiling as a hanging rainbow decoration. It is perfect if you need rainbow party decorations or are decorating a classroom. You could also decorate your room with a sun cutout and cloud cutout.
the two products, the customer service rep was very courteous and helpful.
I'm very satisfied with your services.
| 2019-04-24T14:55:49 |
http://www.partycheap.com/Rainbow-Cutout-p/55294.htm
|
0.999964 |
How can pets influence our emotional and physical health? Let's use dogs as an example, regarding mental health and focusing on the condition of depression.
I guarantee, except in rare cases, that raising a dog the right way will decrease feelings of loneliness, being unwanted, useless and the self-absorbed daze that often takes over. I'm not advocating a puppy over Prozac. However, when you have a dog cuddling up against you and trying to lick your face, it's a lot harder to be down.
I know people who are over-the-top about pets - I'm not one of them. However, as a practicing psychotherapist, I realize the therapeutic value of having an animal.
The statistics are convincing. People suffering from heart problems, hypertension, strokes, different types of dementia and certainly psychological illness, can measurably benefit from being able to touch a dog, cat and other two- and four-legged boarders. What is it that makes this work for so many folks?
First, let's talk about touch. While it may be preferable and more practical to exchange touching with a spouse or other family member, the effects of touching a loving animal can be a major positive.
If you've ever seen the chemistry between a nursing home patient and a dog or cat that nuzzles up and cuddles with him or her, the response is often immediate and positive.
Having a pet may also cause you to feel needed. In fact, it makes many of us feel really good - being unconditionally loved and appreciated.
Dogs need exercise and so do people, in order to feel good and be physically healthier. Dogs need socialization. So do most of us, if we're going to feel whole and non-neurotic.
Like all relationships, owning a pet comes with responsibilities. It can be time-consuming and occasionally hard work. As a dog owner, I'm aware that in tough financial times, caring for even a healthy pet can be expensive, with just vet and food bills alone.
Keeping pets can also be restrictive - what to do when you want to travel for extended periods of time. Both cost and care can become issues.
Although some dogs seem to display affection even when they're mistreated, a mutually affectionate, caring relationship is the way to go. With proper training, (they are not humans) which takes practice and knowledge, the pet and owner do better together.
Let me also mention the value of humor that comes with having "Fido." If you've ever been to a dog park and watched their social play in small canine groups, you understand the smile it creates as it makes your day brighter.
From my point of view, the major problem with emotional and physical disorders is the resulting inability to function normally. I'm not saying that dogs can tell when you're lazy or crazy, but rather that they help normalize many of us.
They often provide a connection with caring and positive thinking, which, in turn, makes us feel better. Incidentally, trained dogs have been used in therapy with young children with great success.
Bob Howat is a licensed marriage and family therapist who lives and practices in Fernandina Beach.
| 2019-04-26T10:15:04 |
https://www.jacksonville.com/community/jacksonville_community_news/2010-01-30/story/coping_dogs_effect_on_humans_mental_health
|
0.999999 |
The objective of this lab is to perform routine calculations on a peak rectifier.
1) PC with CircuitMaker® installed.
2) Using a value of 20W for the load resistor, show the waveform at the output.
3) Repeat step 3 using 200W and 2KW as the load resistor values.
4) What load resistor values produce a reliable output?
5) Add an additional 10W in series with the load resistor and repeat steps 2 - 4.
2) Diagram 2: Voltage - Time view using the 20W resistor.
3) Diagram 3: Voltage - Time view using the 200W resistor.
4) Diagram 4: Voltage - Time view using the 2KW resistor.
5) Diagram 5: Voltage - Time view using the 20W + 10W resistor.
6) Diagram 6: Voltage - Time view using the 200W + 10W resistor.
7) Diagram 7: Voltage - Time view using the 2KW + 10W resistor.
1) Q: What is the stability point of the circuit?
2) Q: According to the formula in the text, what minimum resistance should yield a viable result?
This lab has demonstrated the basic operations of a simple full wave bridge, or peak rectifier. The results were good and were predictable. One note is that the data from the simulations predicts a stable operating point (<2V ripple) at around 1KW, which is expected form the calculations in question 2. I have performed this lab many times in a practical sense when I designed and built power supplies. With a 16W load using a LM317 driven by a power transformer rated at 3A @ 15VACRMS, I was able to achieve less than .1V ripple using 2 2200mF capacitors and a 1000mF on the output.
| 2019-04-26T10:15:59 |
http://cletis.net/~leeloo/ee309-1/EE-309Lab1.html
|
0.996351 |
The Dancing baby Groot costume I created is made entirely from paper,duct tape and glue. I had wanted to try making a paper costume and a tree-like character is perfect for this.
For the head I started with a large tube of paper . I used paper from Home depot . It is available in the paint dept and comes in rolls about 3 feet wide and 50 ft long for about $10.
I cut a large piece of paper that was 3 ft by 8 ft and made the base tube for the head about 5 ft around. Inside the base tube are 3 rings( also about 5 ft around )that are cut from sturdy cardboard that were used as ribs to keep the size and shape of the tube . The rings were duct taped to the paper base tube. The rings are placed about a third of the way from the top and the bottom and at the center . The tube is formed with 2 layers of paper wrapped around the rib rings . I glued these paper layers together.
Then I added one more layer of paper . The final layer of paper has vertical wrinkles in the of paper for a bark-like appearance . For the wrinkles I took a piece of paper the size of the headpiece and made a roll (about the size of a roll of gift wrap ). Then I squeezed the roll as tightly as I could until the paper was thoroughly creased. After opening the creased roll I tried to flatten it back out making sure that the creases were fairly even .
The bottom edge of the head piece is rolled inward . I rolled up about 8 inches from the bottom edges. It is rolled tightly.
At the top opening of the head I glued in a circle that I cut to fit the opening . Before gluing in the circle I wrinkled it slightly for a little texture.
Lastly I drew on the placement for the eyes and the mouth. I cut out the eye holes in the same size as the balls that I found for that purpose. The eyes are dollar store foam balls cut in half and painted black. The eyes are glued in place on the inside.
The mouth area was slit open using a razor. I made the mouth slit large enough to see out of.
To keep the head piece from flopping around while I was dancing in the costume , I added another ring on the inside that fits nicely around my head to give the headpiece more stability.
For Groot's body I used a body form to help with the size and shape.
First I placed a paper dress shape over the body form. Basically it is a paper tube with arm holes. The tube goes about down to me shins . I used the paper from the Home depot in the 3 ft. length it came in and just fit it loosely around my body to get the width.
Then starting at one shoulder, I wrapped twisted 12 ft lengths of the 18 inch wide paper around the body in diagonal twists . . I placed another twist of the paper immediately adjacent to the first , following the same diagonal path. Continuing with this pattern, i completely covered the entire tube dress. To keep the diagonal wraps of paper in place I used a lot of pins.Once I was satisfied with the vine-like appearance of the diagonal paper wraps then I painted a 50/50 mix of white glue and water into all the joining areas of the paper.
The arms were added after the body was done. They are limbs of 3 foot wide paper that were pleated and twisted .I formed these over tubes .I shaped the arms making them wide at the armpit area and tapering down to a pointed tip that extends beyond the wearer's fingertips There are a couple of small holes that I added for the fingertips to go out through. This allows some use of the hands.
The arms were then pinned to the body and glued in place.
The pot was made similarly to the head except that it tapers in as it goes down for a conical shape. It is made by covering cardboard hoops with a tube of paper. try to keep the paper as smooth as possble with no bumps or creses showing. It could be formed over an actual large pot or laundry basket to help with the shaping. This part was duct taped together on the inside and glued on the outside seam.
The pot has a decorative rim at the top that I made from poster board.It is about 4inches by 5 ft. Just long enough to go once around the top of the pot.
Finally I topped the pot with a single piece of paper that I cut an asterisk shape hole into tat was a little larger than the size of the body of the costume.
The wearer dons the costume by cutting a slit in the back of the body and opening the back just enough to step in .Then step in to the pot and put on the headpiece. The costume is super light weight and is easy to grab the rim of the pot to walk around. Better yet , put on an awesome mix of music and dance to the groove!
This costume won me a trip to vegas ^~^ thank you for sharing!
WOW!!! I am jealous. SOOOO happy for you. Congrats!!
Sooooo cool! But how do you see exactly??
where do you get a body form?
I think i might wear this to Fandom Fest this year! If i can figure out how to get it in the car.
So cute. My granddaughter decided that she wanted to do this when we saw the movie, so I have been saving paper bags. This helps to give me some guidance. I love it!
yep, youtube is the quickest and easiest option. Pretty easy to embed on instructables too.
Oh my stars this is adorable! Well done!
I think going to pee isnt a problem.... wait..... you can pee on a tree!!! jejejeje just kidding, i just think it can be an improvemnt.
Where did you get the Cardboard hoops?
The foam eyes are sprayed with black spray paint.
That is so cool!!! I wanna see a video of you dancing in there too!!!
What did you use to paint the styrofoam eyes?
You have got to upload a video of you dancing in it!
Ha! I love this. So nice!
| 2019-04-21T05:18:40 |
https://www.instructables.com/id/GROOT-Dancing-Baby-Groot-costume-cheap-all-paper-c/
|
0.999995 |
Does 'Pain paradox' discovery directs to new pain control drugs?
A natural substance known to initiate pain in the central nervous system has been found to have the opposite effect in other parts of the body, potentially leading to new methods of pain control. The finding could explain the repeated and costly fiasco over the last 20 years of clinical trials of potential pain-killing drugs that targeted the substance called as 'Substance P'.
Substance P is generated in both the central nervous system (CNS) and in our peripheral nervous system (PNS), all the other nerves and nerve cells that convey signals to the brain.
A research by Hebei Medical University in China and University of Leeds in UK revealed that sensations of pain are reduced when Substance P makes nerve cells less responsive and excitable in peripheral nervous system. This is in disparity to its role in the central nervous system, where it triggers very different signals, exciting neurons and so encouraging pain.
According to Professor Nikita Gamper, a lead researcher from the University of Leeds, "We were really surprised by the results- Substance P is described in the literature as a molecule that gets nerve cells excited and promotes pain. But we have discovered a paradox that in peripheral nervous system it acts as one of the body's natural painkillers and actually suppresses pain."
"This means that when drugs were used in trials to suppress Substance P's action in the central nervous system, they may have also prevented it from acting as a painkiller in the peripheral system. So, although the drugs looked like they worked in the lab, when they moved to clinical trials, they failed." Substance P operate in peripheral system by modulating the action of certain proteins that control the ability of pain-sensing neurons to respond to 'painful' stimuli. Substance P makes one type of these proteins extremely sensitive to zinc, so that natural levels of zinc in circulation are enough to dampen their activity and repress neuronal responses.
Professor Gamper also mentioned "Drugs like morphine hijack body's natural painkilling mechanisms, such as those used by endorphins, but because they act within the central nervous system, they can affect other brain cells that use similar pathways, leading to side effects such as addiction or sleepiness. If we could develop a drug to mimic the mechanism that Substance P uses, and ensured it couldn't pass the blood brain barrier into the CNS, so was only active within the peripheral nervous system, it's likely it could suppress pain with limited side effects."
The study which inspected the activity of Substance P within nerve cells in the lab and animal models- focused on acute pain, but Professor Gamper aims to look at its role within chronic pain as well.
| 2019-04-21T18:26:22 |
https://www.medznat.ru/en/content/does-pain-paradox-discovery-directs-new-pain-control-drugs
|
0.999195 |
for assassination and gave 'acid' to human guinea pigs.
James Bond had Q, the scientific wizard who supplied 007 with dazzling gadgets to deploy against enemy agents. The Central Intelligence Agency had Sidney Gottlieb, a Bronx-born biochemist with a PhD from Caltech whose job as head of the agency's technical services division was to concoct the tools of espionage: disappearing inks, poison darts, toxic handkerchiefs.
Gottlieb once mailed a lethal handkerchief to an Iraqi colonel and personally ferried deadly bacteria to the Congo to kill Prime Minister Patrice Lamumba. It wasn't his potions that eventually did in the two targets, but Gottlieb, once described by a colleague as the ultimate "good soldier," soldiered on.
Poisons and darts were not his sole preoccupation during 22 years with the CIA. He labored for years on a project to unlock and control the mysterious powers of lysergic acid diethylamide, or LSD. Could it be a potent spy weapon to weaken the minds of unwilling targets? In the 1950s and 1960s, answering that question was one of Gottlieb's missions in MKULTRA, the code name for the agency's secret experiments to probe the effects of mind-altering drugs. Chief among them was LSD, discovered by Dr. Albert Hofmann, a Swiss chemist, in 1943.
By the early 1950s, the CIA, fearful of LSD falling into Soviet hands, had cornered the market on the drug, which in minute doses could produce overwhelming sensations ranging from kaleidoscopic acuity to temporary insanity. The agency also started to fund research, covertly funneling hundreds of thousands of dollars to academics in prestigious institutions around the country who tried the drug themselves and reported the results to Gottlieb.
Gottlieb and his associates in MKULTRA also took LSD "trips," although the concept of tripping would not enter the American lexicon for another decade. They laced coffee with LSD and served it to each other without warning, then observed each other's reactions. Later Gottlieb expanded the field tests to subjects outside the agency -- drug addicts, prostitutes, prisoners, mental patients -- people who were unlikely to complain and even less likely to be believed if they did. Among the dosed were hookers and their clients in a CIA-sponsored brothel in San Francisco, later the epicenter of the LSD explosion.
One human guinea pig was subjected to an astounding 77-day trip. Some subjects suffered chronic mental problems after being dosed. One person -- an Army germ warfare researcher -- sank into dark depression and paranoia, leaping to his death from the 10th floor of a New York hotel several days after being slipped an LSD Mickey Finn at a CIA retreat. The CIA covered up its role in his demise for two decades, and barely reprimanded Gottlieb. In the early 1960s, Gottlieb was promoted to the highest deputy post in the technical services operation. By 1967, he had risen to the top of the division, guided by his longtime CIA mentor, Director Richard Helms. At that time, LSD was not a secret anymore. While the CIA was still examining the drug's possibilities as a means of mind control, many young Americans were dropping the hallucinogen as a vehicle of mind expansion and recreation. America was tuning in, turning on and dropping out, thanks, in part, to the CIA's activism in the '50s in the name of national security.
It was not until 1972 that Gottlieb called a halt to the experiments with psychedelics, concluding in a memo that they were "too unpredictable in their effects on individual human beings . . . to be operationally useful."
He retired the same year, spending the next few decades in eclectic pursuits that defied the stereotype of the spy. He went to India with his wife to volunteer at a hospital for lepers. A stutterer since childhood, he got a master's degree in speech therapy. He raised goats on a Virginia farm. And he practiced folk dancing, a lifelong passion despite the handicap of a clubfoot.
A malignant, real-life Q, or an eccentric genius whose intentions were honorable and just? Gottlieb led the agency in 149 mind control experiments, of which about 25 were conducted on unwitting subjects. According to the survivor of one victim, the way Gottlieb duped American citizens was nothing but despicable.
Less black and white in his assessment is John Marks, author of the definitive book on the CIA's mind control programs, "The Search for the 'Manchurian Candidate.' " Marks sees Gottlieb as an unabashed patriot who nonetheless "crossed the same ethical lines we hanged German doctors in World War II for."
There is also the view of former CIA psychologist John Gittinger, who says his close friend was a gentle man whose actions were widely misunderstood. The agency's LSD experiments bloomed in the era of Josef Stalin and Sen. Joseph McCarthy, and "during that time of Cold War," Gittinger said recently from his home in Norman, Okla., "the attitude we had and the agency had was we were still fighting a war. And when you are fighting a war, you do things you might not ordinarily do." Gottlieb died on March 7 in Washington, Va. He was 80. His family did not divulge the cause of his death.
| 2019-04-22T22:11:08 |
https://www.mdma.net/mk-ultra/sidney-gottlieb.html
|
0.999972 |
Each question lists three shows, which are linked by one actor or actress. Name them.
1. The Good Life, Brothers In Law, Ever Decreasing Circles?
2. Just William, The Hot Shoe Show, Cats?
3. William And Mary, Men Behaving Badly, Doc Martin?
4. Sunburn, Eastenders, Two Thousand Acres Of Sky?
5. Coronation Street, Dinnerladies, Mrs Henderson Presents?
6. Butterflies, As Time Goes By, The Fall And Rise Of Reginald Perrin?
7. Father Ted, My Hero, Blessed?
8. One Foot In The Grave, Rentaghost, Only When I Laugh?
9. The Avengers, The Upper Hand, Goldfinger?
10. In which TV programme have all 9 of the above made appearances? (As an extra clue, so have Nicholas Parsons, Frank Windsor, Beryl Reid, Lynda Baron, Zoe Wannamaker, June Brown, Gareth Hunt, Jean Marsh and Barbara Windsor).
| 2019-04-19T03:19:29 |
https://www.quiz-zone.co.uk/quizrounds/sub_081209TV%20Connections36/questions.html
|
0.999993 |
New Delhi: In a bid to cool down heated tempers in the Kashmir Valley, home minister P Chidambaram on Friday said the Centre was ready to resume dialogue with all sections, including the one led by Hurriyat hardliner Syed Ali Shah Geelani, to address Jammu and Kashmir's problems. He said he had earlier referred to J&K as a 'unique problem needing a unique solution'. Acknowledging the need to 'win hearts and minds' of the people of Kashmir, he said 'we have to find the courage to hold dialogue', pointing out that resolution of the conflict lay only through the political process. Speaking in Rajya Sabha where he was responding to some sharp criticism from the Opposition over the Centre's failure in anticipating and responding to the violence in Kashmir, Chidambaram said Prime Minister Manmohan Singh would be receiving an all-party delegation from J&K, perhaps as soon as next Monday. Acknowledging the argument that separatists and their backers from across the border had switched tactics with global tolerance for terrorism plummeting, Chidambaram said Pakistan was relying on 'civil unrest' to pay dividends. The new strategy was aimed to using or working through mobs to attack government property. Referring to Hurriyat hardliner Geelani's statement against stone-pelting, he said 'if it marks a shift of his stand' it should be welcomed and added that the leader should also join the dialogue. 'I will resume the political process... I have impressed upon all interlocutors that I am willing to resume the quiet dialogue. We have to find courage that allows to hold dialogue. We have to get on,' Chidambaram said and 'sincerely hoped' that separatist leaders would come forward for talks. He said it was his intention to 'do everything possible to resume the quiet dialogue' which he undertook with moderate Hurriyat leaders before the process was interrupted on December 4, 2009 with an assassination bid on a moderate and pro-talks leader Fazl-ul Haq Qureshi. The minister was careful when referring to the demand for withdrawal of the Armed Forces Special Powers Act and troop reduction. He said the government would see how it could address the AFSPA issue and reduce security personnel in the state. As Opposition slammed the Centre as well as the state government for letting the situation slip completely out of control, Chidambaram's view that Pakistan was seeking to further its cause by fomenting civilian trouble put him on the same page as BJP. A BJP memorandum submitted to the PM had made precisely this point. Leader of Opposition Arun Jaitley said there was a 'significant change in the strategy' by Pakistan's ISI and other agencies across the border. Chidambaram's preparedness to engage in a political process did not see him spell out or even touch on anything like a 'political package' as he was perhaps mindful of BJP's position that any concession made at this stage will further dilute sovereignty and the minister did not want to expose himself to attacks from the saffron quarter. Opposing demands for autonomy and repeal of AFSPA as 'knee-jerk and panic reactions', BJP has warned against any 'pandering' to separatists. BJP attacked the Omar Abdullah government for being 'increasingly alienated from people within the Valley' and the CM 'getting alienated from his own party and allies'. Several MPs like Sitaram Yechury of CPM, D Raja of CPI and Saifuddin Soz of Congress also expressed concern over the situation in Kashmir. 'We will pick up threads, reactivate the political process so that a solution can be found with equity, justice and honour,' Chidambaram said. He said the immediate priority was to restore peace in Kashmir as no government could allow law and order to collapse. At the same time, the Centre would like to reduce the presence of security forces in the state if the situation improves as was done last year. 'If the situation warrants, we may have to send more forces. But if the situation warrants, we may withdraw forces,' Chidambaram said. Talking about the situation in Kashmir since 2004, he said there were times when youth there were demanding IITs and IIMs. 'Unfortunately, those voices have been muted by voices of 'azadi' (freedom). I hope it is a passing phase and we will again hear those voices (for IITs and IIMs).' Chidambaram said he hoped Kashmiris would again say that their destiny lay with India and they wanted to be part of India.
| 2019-04-23T15:55:23 |
http://jammu-kashmir.com/archives/archives2010/kashmir20100806b.html
|
0.999828 |
Choosing between a laptop and desktop can be a difficult decision. The bottom line comes down to portability. If you will need or use the portability of a laptop, then it can be a powerful tool for you and worth the extra money. However, if the laptop will simply act as a desktop with very occasional need for portability, a desktop is also an excellent choice and far less expensive.
Which should I buy? Laptop or Desktop?
Desktops offer other advantages. Although laptop prices have come down and performance has increased, most desktops offer a better price-to-performance ratio. Desktops also still hold some ergonomic advantages over laptops. Bear in mind that, aside from small footprint desktops like the iMac or Inspiron One (available for personal purchase through our online catalog or the Dell Educational Purchase Program), they take up more space in an apartment or residence hall.
A typical laptop weighs between 4.5 and 8 pounds, while "ultralight" models like the MacBook Air weigh in at under 3 pounds. Alternatively, the economy and cost-oriented option - the netbook, belonging to the ultralight class - focuses primarily on mobility and are often Windows or Linux-based. Netbooks are most commonly equipped with an Intel Atom - a series of microprocessor that focuses less on performance and more on basic functionality in tandem with low power consumption. Netbooks are often designed with screen sizes between 8'' and 10''. Because of these features, netbooks are therefore best suited for web browsing, e-mail and office tasks and are priced beneath the cost of a typical laptop. The MacBook Air is noted for its thinness and sparse weight and is available in both an 11" and 13" screen sizes depending upon a user's portability needs. The MacBook Air currently utilizes a Core i-Series processor which allow them to better approximate the level of performance of the typical laptop; it is a device geared toward performance and portability rather than budget. Furthermore, these two types of "ultralight" laptops do not have internal CD/DVD drives and are dependent on the internet and removable media to retrieve information.
One downside of portability is ergonomics. The laptop's miniature size can make its use less comfortable and physically taxing. The keyboard and trackpad orientation of netbooks can vary significantly; the result of this being the built-in keyboards of the netbook tend to be anywhere between 92% and 95% of the typically laptop keyboard. As manufacturers approach their netbook keyboard and trackpad designs with more variance than with normal laptops and standard keyboards, it is particularly important to type on the netbooks for ergonomic reasons. The desktop computer's design has evolved to ease the comfort of users. Its display is at eye level, and the keyboard allows for proper positioning of your back, arms, and wrists. These are important concerns, especially when you use your computer for long periods of time. You can improve laptop ergonomics by building a more comfortable "home base" into which you can dock your laptop when you return to your desk. A "home base" can include such things as a standard keyboard, a mouse, an external display, etc.
PC desktops cost less than a comparable laptop. Although overall prices have declined, price gaps still exist largely because of the higher cost of laptop displays and the added cost of miniaturized technology. Since laptops are portable, they are more prone to accidents and abuse than desktops. And due to their size, laptops require smaller, more intricate components and more tedious labor resulting in more costly upgrades and repairs. We recommend that you consider purchasing extended warranties for both laptops and desktops to cover the effective life of the machine.
Both laptops and desktops have equal connectivity to the Internet through the standard technologies including dial-up modems, DSL or Cable modems, Ethernet and Wireless networking. Users can connect using an Ethernet cable in residence hall rooms or by purchasing and setting up a wireless router. Owning a laptop gives users the ability to take advantage of wireless networks like UWNet, which is available in nearly all campus buildings and the common areas (dens, dining halls, etc.) of residence halls. For more information on wireless on campus see: Wireless.
A laptop's small size and portability make it vulnerable to theft. Unless you can lock or secure your laptop, you should take it with you wherever you go. Security devices like cable locks and LoJack are available for laptops to deter thieves.
Desktops provide less expensive, more comfortable, powerful performance to meet your computing needs from a fixed location. Laptops provide performance to meet your computing needs from virtually anywhere. Laptops cost more, and for additional comfort you will pay more yet for extra "home base" components. But if you want to take advantage of the portability and increased productivity offered by laptops, then the extra expense may be worth it. If portability and the extended access it provides is not important, then a desktop may make more sense.
| 2019-04-19T07:26:09 |
https://kb.wisc.edu/showroom/page.php?id=3044
|
0.995831 |
Rather more than 50 years ago, I attended an interview in Leeds in the hope of winning a place in the English department of that city's university. I had been warned that it would be conducted by Professor Bonamy Dobrée supported by Dr Arnold Kettle, of whom - thanks to his involvement in Yorkshire politics - I had heard. Dr Kettle was an authority on Bleak House, which I had withdrawn from the public library and studied in preparation for our confrontation. Unfortunately, he did not ask me about it. He did, however, canvass my opinion of The Pickwick Papers, Silas Marner and Villette, none of which I had read.
Professor Dobrée - I suspect out of pure compassion - asked what I was currently reading and I told him (perfectly truthfully) Modern Prose Style by Bonamy Dobrée. I like to think that was not the only reason I was offered a place in his department, which I subsequently turned down in the foolish belief that putative politicians should study economics. When I arrived back in Sheffield, my teachers did not greet me in triumph but with outrage at the way I had been treated. How dare such people ask me about books that were not on the syllabus. The A-level examination was set by the northern universities themselves with the purpose of helping in the selection of students. For what other purpose had I made notes in the margin of the prologue to the Canterbury Tales?
In the bad old days, what was taught in schools like mine was decided by the universities and was meant to lead to a sort of entrance examination for the small percentage of pupils who went on to higher education. The rest, more or less, learned what their teachers thought interesting and convenient.
Now, there is a general agreement that the school syllabus must meet the needs of more than the academic minority - but no agreement about how that objective should be achieved. If last week's reports are true, and Alan Johnson is about to express some views on its contents, he needs to prepare for the explosion of strange passions that discussions of the teaching of English always provokes.
Changes in the English syllabus are always resisted on the grounds that they are rejections of both our language and our heritage. A year ago there was a great fuss about Byron being classified as a poet who ought, but did not have, to be studied. Much of it came from newspapers that might have been expected to headline a story about him "Disabled peer and prime minister in amazing love triangle". But they all lined up behind the proposition that classic (that is to say venerable) authors ought to be read by every school student. Otherwise England as well as English would be diminished.
I know what they mean. Shakespeare is the best thing that ever happened to this country, and there are many other writers - not to be compared with him, because he is incomparable - that are the fabric of our nation. Nobody forbids their mention - though it would be interesting to know how many school students, in any one of the past 50 years, have read a word of Spenser or Pope. But while I do not want the established classics out, I realise the necessity of allowing new classics in. And that is what worries most critics of change. A year ago, Andrew Cunningham (who teaches English at Charterhouse) described for the Daily Telegraph his objections to what he described as "step aside Dickens and Hardy". No one suggests that they should. His objection to the inclusion of a short story by Karl Sealy, The Pieces of Silver, in the syllabus, rang more true. It is "set in Barbados".
The syllabus Luddites' views on the English curriculum are far more political than mine. They want to use it to make English men and women in their own image. I want it to give an educated nation the pleasure that ought to stimulate more reading. Books were meant to make us glad. And the way in which they are used in schools can make or break our enthusiasm for them in the years which follow.
Of course, Alan Johnson is right to say that everyone should read Shakespeare's sonnets. But everyone should also read books and poems with which he or she can directly identify. That way people might just be encouraged to read The Pickwick Papers, Silas Marner and Villette after they leave school.
| 2019-04-22T10:11:19 |
https://www.theguardian.com/commentisfree/2007/feb/12/comment.bookscomment
|
0.999998 |
Mike: I am a 26 year old from Christchurch, New Zealand. Throughout the years I have played a lot of sports but in recent years have been focusing on half and full iron distance triathlon.
Nick: I grew up in Christchurch, going to the same school as Mike. I am currently living in Auckland completing my studies. I come from a running background and have been racing in the ITU short course triathlons.
How did you prepare for race day? Did you practise together or was this your first outing as a team?
This was the first outing for the team. We did a few trials in the pool by ourselves and compared notes. We tested different combinations of paddles/pull buoy/ shoes/ flippers and pieced together a rough plan for the race based on the course.
Did you have a strategy going into the race and did you stick to it?
We are both new to Swimrun racing so we didn't know what to expect or how fast our fellow competitors were. Our plan was to get out in front early and try and hold on, which we stuck to. Nick had some flippers we were keeping for the longer swims, but after the first swim we decided we would use them for every swim.
The first part of the race was great, we were both feeling good and we were relaxed. We took a bit of a detour allowing the team behind to nearly catch us, this was when panic stations hit and we really pushed the long swim and long run to get back out of sight. The long swim seemed take a long time every time we looked up it didn't look like the other side had got any closer! The whole course was spectacular, but our favourite part of the course for us was the final 10-15km following the western side of the lake. The views and geography are amazing.
Did you do anything special with your equipment, did it work?
We took our shoes off for the majority of the swims which I think helped us reduce drag in the water. Nick ran across Ruby Island with his flippers on to save some transition time which was a bit of a laugh!
This is a new format for you. What did you learn about swimrun from your first race?
We learnt that navigation is a big part of the race. We would probably study the course a bit more for the next one. Equipment was also crucial, we used Orca Core Swimrun suits, which had pockets and was made to run in. It would be a long way to run in a triathlon wetsuit.
How would you summarise the swimrun experience?
It was a spectacular race. A lot of the course isn't publicly accessible so we feel privileged to have been able to experience the tracks and trails in the race. It is also a very long way and we are still recovering one week after!
We are racing in a few international half ironman events, however we are now considering doing a few more swimrun races over in Europe!
| 2019-04-19T00:43:51 |
https://www.brecaswimrun.com/news-1/2017/3/31/interview-mike-phillips-and-nick-berry-team-philliberry
|
0.995377 |
Cape Town - Kylie Jenner has an "exciting new project" she is working on and fans immediately thought she may be pregnant. "There will definitely be another baby sooner rather than later", the source told People.
The Kylie Cosmetics businesswoman took to Instagram yesterday to tease her upcoming collection for the special day - and she went for a monochrome red look for the occasion.
That must explain why Kylie Jenner posed in red lipstick for a very sultry image after her sister Kim Kardashian did the exact same thing.
Meanwhile, check out her photos below and tell us about it in the comments section.
At this point, fans are out of ideas as far as guessing what Kylie's secret project may be.
Two of the posts were captionless, and with the last one, she once again stirred up speculation that she and her boyfriend Travis Scott already got secretly married.
When she's not triggering Bieber with her vacation content, it looks like Jenner has been cozying up to "hubby" Travis Scott, hanging out with BFF Jordyn Woods, and giving plenty of love to daughter Stormi Webster on this trip.
'When I was 14 I couldn't reach as many people as I can now, ' she spoke in that heartfelt way that made you think she was going to talk about more than just pimples.
Kylie Jenner on Monday announced that she is about to come up with a secret project that is still in the pipeline and concurrently also dismissed rumours about her pregnancy. "They want to have another child soon, so it's close in age to Stormi, but they do not want to do this while he's busy on the road".
'We ain't run out of a thing to say, ' he added.
The ball was played to Georges-Kevin N'koudou and his ball in was met by Winks to seal an 11th win in 13 away games for Tottenham. Tim Ream failed to clear and when Christian Eriksen took possession of the ball his delivery was flawless for Alli to head home.
The first tweet mentions F*ckJerry, which was one of the promoters of Fyre Festival and a creator of the Netflix documentary . But with little in the way of specifics being shared, things quickly got ugly from there.
With three rather unexpected nominations, the Coen brothers' anthology western The Ballad of Buster Scruggs had a great morning. In 2014, "12 Years A Slave" director Steve McQueen took home the award for best picture, but not best director.
Many Conservative MPs and the DUP say they can never support this, but the European Union insists it will not consider removing or altering it.
| 2019-04-18T14:33:50 |
http://mmaringreport.com/2019/01/25/kylie-jenner-denies-shes-pregnant-as-she-teases-exciting.html
|
0.999879 |
UK Prime Minister Theresa May stood up to update the House of Commons following her visit to Brussels, where she successfully made her case against Russia.
"No other country has the capability, intent, or motive for the attack."
Which failed still to provide actual evidence.. but one could argue - if one were so inclined - that Washington (or its NATO generals) have the capability, intent, and motive to undertake such a messy attack.
However, as May makes her case - ever more Colin-Powell-like - a Russian official claims that the United States was developing a similar if not identical nerve agent in the 1990s as the one which was used on Russian double-agent Sergey Skripal and his daughter Yulia Skripal.
The claim was made by Igor Rybalchenko - head of the laboratory for chemical and analytical control of the scientific center of the Russian Defense Ministry, who says - without evidence (as are the UK's claims against Russia), that the A-234 compound in the "Novichok" family of nerve agents was published into a database maintained by the National Bureau of Standards (NBS).
The substance was said to be heavy and volatile based on its molecular formula and molecular weight, and that it was also available at the UK's Porton Down laboratory.
That said, due to the fact that the Novichok's chemical structure was never formally classified, according to Professor Alastair Hay at Leeds University, it's possible that the UK has some of the agent.
It is quite likely that some government laboratories made minute quantities and storied their characteristics in databases, so that their identity could be confirmed at a later stage if found as an unknown poison in someone's blood, he adds.
The UK has brushed off Moscow's allegations that it could have produced the toxin as "absolute nonsense," as the Kremlin has also made similar claims that Novichok has been produced in Sweden, Slovakia and the Czech Republic - all of which have denied doing so.
Russia's ambassador to the U.N. has insisted that the development of Soviet-era nerve agents ceased in 1992, and that existing stockpiles were destroyed in 2017.
Moreover, Rybalchenko says that the substance was added to the U.S. database by a member of the Army Armament Research and Development Center.
In other words - you'll have to take his word for it unless evidence of the entry in the 1998 database surfaces.
On Friday, French President Emmanuel Macron and German leader Angela Merkel said that following a meeting of the European Council, that UK PM Theresa May had shared "proof" of Russia's involvement in the assassination attempt against former Russian spy Sergei Skripal and his daughter, "convincing" the two leaders that Russia was behind the attack.
What's a bit disturbing is that May's "proof" - which is being used to justify punitive action against Russia, has yet to be shown to the public. Moreover, the world leaders have all decided that Russia is "the only reasonable culprit." In other words, the Kremlin used a poison that would very clearly identify them as the culprits - instead of perhaps a more common and less attributable method of assassination. Makes sense if the plan was to get caught.
Meanwhle, Russia's embassy in the UK has been demanding that London produce the complete UK info on "Skripal's Case" and disclose details on a program to produce weapons-grade toxic substances in Porton Down. The UK has so far refused to comply.
As a result, Bloomberg reports that President Donald Trump is "preparing to expel dozens of Russian diplomats from the U.S." in response to the nerve-agent poisoning of a former Russian spy in the U.K."
Quoting two people "familiar with the matter", Bloomberg reports that Trump agreed with the recommendation of advisers and the expulsions are likely to be announced on Monday. And while the aides said that Trump is prepared to act, he wants to be sure European allies will take similar steps against Russia before he does so, which could be problematic since Russia controls roughly a third of Europe's natural gas supplies and thus the volume of any potential response (and also why despite "proof", Europe responded with nothing more than a harshly-worded statement).
Among the advisors that Trump approached on Friday to discuss the matter were U.S. Ambassador to Russia Jon Huntsman, Treasury Secretary Steven Mnuchin, Commerce Secretary Wilbur Ross, Attorney General Jeff Sessions, Defense Secretary James Mattis, Director of National Intelligence Dan Coats, outgoing National Security Adviser H.R. McMaster and others.
In other words, the West is now punishing Russia in an "open-and-shut" case with zero evidence released to the public for examination.
What's weird is that Skripal, according to The Telegraph, was friends with an employee of Christopher Steele, the former U.K. spy who assembled the Trump-Russia dossier.
If, as The Telegraph reported, Skripal assisted Steele in compiling the dossier - which notably relies on senior Russian officials, despite Steele never having traveled to Moscow - according to testimony by Glenn Simpson of Fusion GPS, it could explain the motive behind the assassination attempt in Salisbury town centre.
Valery Morozov, a former construction magnate who fled Russia after revealing corruption, claimed last night that Col Skripal, 66, was still working, and remained in regular contact with military intelligence officers at the Russian embassy. That would raise the possibility that he was still feeding intelligence to people in this country.
Go into your mind palace and consider something which may warrant at least a cursory investigation by UK authorities... If Skripal was friends with Christopher Steele's employee, it stands to reason that it's within the realm of possiblity that Skripal was Steele's source for the "senior Russian officials" cited in the Trump-Russia dossier. If Skripal was the source, anyone connected to the creation, funding or distribution of the Trump-Russia dossier would probably be OK if he disappeared and was unable to testify to his actions.
Or, Moscow decided to get revenge on Skripal eight years after voluntarily giving him to the UK in a 2010 spy exchange - and when choosing how to assassinate the former (?) double-agent, the Kremlin used a nerve agent which would have led directly back to them.
| 2019-04-21T01:06:57 |
https://www.zerohedge.com/news/2018-03-26/russia-claims-skripal-nerve-agent-also-developed-us
|
0.999357 |
Sixteen-year-old Leah Grant has given up on being normal. She'd settle for stopping the voices in her head, intrusive visions of the future, and better odds of making it to her seventeenth birthday.
That's the thing about pretending to be human in a world where magic used to exist - at any moment, her cover could be blown and she'll be burned to death like the rest of the witches.
Everything changes when she loses control of her powers and flees the orphanage she grew up in. She desperately wants to be invisible but finds her face plastered on every news channel as humans panic over the possible resurgence of her kind. And now the hunters won't give up until they find her.
Making friends for the first time in her life and falling in love with one of them drives her to discover why she is unlike any being she's ever met - human or otherwise. The dangerous powers inside of her that would repel Nathan, her new, handsome reason for living, are priceless to some. The locked up forever kind of priceless. And to others, they are too dangerous to allow her to live.
Let's hope she can stay hidden.
Hidden (Hidden Series Book One) 4.3 out of 5 based on 0 ratings. 148 reviews.
Hidden is an interesting addition to the paranormal genre. The characters are complex, the plot line interesting, and the twists unexpected. Once I got into the book it hooked me until the end. I loved Sophia. I wasn’t expecting for her to be my favorite character but she grew on me. She was unfailing in her quest to save magical creatures and help Leah learn how to be a normal teenage girl. As for the relationship, I like Nathan as a character, I just don’t know how I feel about Nathan and Leah. The relationship seemed kind of rushed, especially once I realized that the entire book was supposed to take place in about a week, maybe a week and a half’s, time. There is a lot going on in the book and it seems like time just flew by. However, even with how rushed their story was, it made sense for the book and for Leah’s history. I’m not going to go into details but suffice it to say, it makes complete sense for her to be madly in love with Nathan once you find out more about her family, particularly her mother. On that note, I was not expecting the twist at the end. As Leah’s story unfolds and we learn more about her family, I thought I had her parents pegged. Boy was I wrong. What is first revealed is so much more elaborate. Lathan does a good job of keeping the twists hidden until she’s ready to reveal them. Thankfully, she wraps up the subplots by the end of the book while keeping just a few to entice the reader to want to read the sequel.
I don't write reviews, but his book was amazingly good. I was not expecting what happened. I look forward to the rest of the series.
I am looking forward to the next book in.the series. Worth the read for young and old alike.
SPOILER ALERT!!!!!! I was surprised. Leah started out really annoying. But there was something about how the book was written that made me keep reading. The author did what any skilled author does; take a character that needs some work and develop them into something extraordinary. I was impressed with it. Normally when reading about romances that start so quickly and move so fast, I am annoyed and quickly turned off the book. In this case, the author recognized that it moved fast and found a way for me not to find it nauseating. To say the least, I am impressed with M. Lathan's work and I am excited to read the next book in the series.
That is a great read. I could not put it down and read it in one sitting. I recommend it highly.
I just loved everything about this book. I can not wait for the next book to come out.
This book was amazing. I did not expect ghe ending to happen. I am just happy nathan and christen got back together.
I think this book was amazing. In the beginning I hated Leah, but once she realized she could be happy, she really grew on me. Honestly, I can totally relate wanting to be invisible, so I was instantly hooked. If you like the paranormal, romance, action, and adventure, this book is for you!
Hidden is a very interesting young adult paranormal book. Leah, the main character, is hidden away in an orphanage and is tormented by the other girls there. She has no friends, has never been loved, and has only had small moments of kindness shown to her. She believes that she is evil and must hide her true nature in order to remain alive. She has such a warped and damaged sense of self worth that it was a little hard to get through the first chapter but I am really glad I kept reading because the story and Leah undergo a change. She discovers who she really is and that the things she has believed about herself and others of her kind are false. She becomes more confident and in control. It was fun getting to see her grow into accepting herself and her powers and at the same time acknowledge the goodness that she has always had. Of course, Leah’s growth is only part of the story. There are also hunters, shifters, copies, witches, and a long-lost mom that reappears. At times you are unsure of whom to trust and feel betrayed right along with Leah. There are a lot of twists and turns that keep you guessing and the dual nature of Leah is interesting to observe. This book is one that I found myself thinking about a couple of days after I finished and wondering what else is going to happen to this group of characters. I am interested in reading the second book, Lost, to see how Leah fairs with her new confidence and powers.
I really loved reading this book. I hope everyone else does too!
I actually liked this book. I was hooked instantly. The plot is good and unpredictable. It will leave you in shock. Just when you thought the story couldnt get any better theres a twist and itll leave wanting more. Love the characters ive grown to love them cant wait to read the second book!!!!!! I definetely reccommemd it you wont be dissapointed!!!!!!!!!
Really creative and good writing!
I love this book and its story is so great. The author explained things very well. It was never slow or bored for more than two paragraphs at a time. I just think the chapters are a little too long. One of the best books i ever read. And apsolutly the best FREE book i ever incounterd. I cant wait for the second book!!!
| 2019-04-26T06:02:22 |
https://www.barnesandnoble.com/w/hidden-m-lathan/1115292258?ean=2940044519978&itm=1&usri=hidden+%28hidden+series+book+one%29
|
0.999983 |
'I and the guardian of an orphan will both be like this in Heaven, if he is wary of his duty to Allah' raising and joining his index and middle fimgers.?
Anyone who seeks to enjoin the good and forbid the evil must himself be aware of what is lawful and unlawful, and should not act contrary to what he preaches.
His aim should be to guide the people. He should talk nicely and be aware of the difference in the level of understanding of the people. If he is opposed, he should exhibit patience and if supported and favoured, he should thank God.
Once, Imam Kadhim (a.s.) was passing by the house of Bishr Haafi, when he heard the sound of dance and music coming from inside.
At that very moment a slave-girl came out of the house to throw some garbage.
"Is the owner of this house a free person or a slave?" the Imam (a.s.) asked her.
The slave-girl replied, "He is a free man."
Hearing this, the Imam (a.s.) remarked, "You speak the truth, for had he been a slave, he would have feared his Master."
When the slave-girl came back inside the house, Bishr, who had been consuming wine, asked her what took her so long. As soon as the slave-girl related what had happened, Bishr immediately got up and ran bare-footed after the Imam (a.s.). Once he had caught up with the Imam, he expressed shame and repentance over his acts, sought forgiveness and amended his wrongful ways.
During the reign of Fath A'li Shah Qajaar, there lived in Yazd a scholar, by the name of Mulla Hasan Yazdi, who was held in high esteem by the people. The governor of the city of Yazd used to oppress the people and treat them with great cruelty. Mulla Hasan advised him to stop his evil deeds. When he refused to mend his ways, Mulla complained to Fath A'li Shah, but this too proved unproductive.
Since Mulla was particularly assiduous with respect to the issue of enjoining the good and forbidding the evil, he assembled the people of Yazd who, upon his orders, collectively threw the governor out of the city.
When Fath A'li Shah was informed of this incident, he was immensely upset and ordered Mulla Hasan Yazdi to be brought before him in Tehran.
As soon as Mulla came, Fath A'li Shah asked him about the incident in Yazd.
Mulla replied, "Your governor in Yazd was a tyrant and I wanted to relieve the people of his evils by throwing him out of Yazd."
The answer so enraged the Shah that he ordered Mulla’s legs to be tied.
Ameen-uddaulah said to the Shah, "He is not at fault. It was without his permission that the people threw out the governor."
"Why do we need to lie? I had the governor thrown out of Yazd because of his oppression."
Eventually, due to the intervention of Ameen-uddaulah, Mulla Hasan’s legs were untied.
That night, Shah witnessed the Holy Prophet (s.a.w.) in his dream and observed that two of his toes were tied.
"Why are your toes tied?" he asked the Holy Prophet.
The Holy Prophet (s.a.w.) replied, "It is you who has tied them."
Shah pointed out that he had never shown such disrespect.
The Holy Prophet (s.a.w.) explained, "But was it not you who had ordered Mulla Hasan Yazdi’s feet to be tied?"
Shah woke up from his sleep greatly alarmed. He ordered Mulla Hasan to be given resplendent clothes and to be returned to his city with great honour and respect. Mulla Hasan refused to accept the clothes and returned to Yazd. Later, he travelled to Kerbala and remained there for the rest of his life.
"Don’t you see this person supplicating?"
"Yes I do, but God’s order has to be executed," replied the other one.
"Wait. Let me ask God as to what should be done."
Praying to God, the first angel inquired: "In this city there is a person, who entreats and beseeches you. Do we still impose thechastisement upon the city?"
"Execute the commandment which has been given to you, for that person has never been perturbed and distressed for My sake, nor did he show anger over the evil deeds committed by the other people."
When Imam Kadhim (a.s.) departed from the world, his representatives had huge sums of wealth in their possession. As a result of their greed some of them began to deny the Imam’s death and thereby laid the foundation of a sect known as Waaqifiyyah. Ziyaad Qandi possessed seventy thousand gold coins while A'li Ibn Abi Hamzah had thirty thousand.
"Why do you invite the people towards Imam Ridha (a.s.)? If your objective is to acquire riches, we will make you rich."
They pledged to give him ten thousand gold coins if he kept quiet and refrained from inviting the people towards the Imam (a.s.).
‘When innovations manifest themselves amongst the people, it is imperative for the elders and leaders to manifest what they know (so that people refrain from evil) and if they fail to do so, God shall take away from them, the light of faith.’ Under no circumstances shall I abandon jihad in the path of religion and the affairs of God."
After receiving this forthright and explicit reply from Yunus, Ziyaad Qandi and A'li Ibn Abi Hamzah became his enemies.
5 – The Caliph on the Rooftop!
One night, the second Caliph was surveying the streets to ascertain the general state of affairs in the city. In the course of his inspection, he happened to pass by a house from which he heard suspicious noises. He climbed over the wall of the house and looked inside. A man and a woman were sitting together, with a jar of wine placed before them.
Addressing them harshly he said, "You commit sins in solitude in the belief that God shall not make manifest your secret?"
The person turned to the Caliph and said, "Do not be so hasty, for if I have committed one sin, you have committed three. Firstly, God has said in the Qur'an: and do not spy. You have been doing just that. Secondly, He has said in the Qur'an: and go into the houses by their doors. You have entered from over the wall. Thirdly, He has said: So when you enter houses, greet your people with a salutation. You have not done so."
The Caliph asked, "If I were to pardon you, do you resolve to amend your ways?"
"By God! I shall never repeat this act again," the man replied.
The Caliph said, "Now you can be at ease, for I have pardoned you."
Holy Qur'an, ch. Aale I’mraan (3), vs. 110.
Jaame’ al-Sa’adaat, vol. 2, pg. 235.
Darsi Az Akhlaaq, pg. 128; Minhaaj al-Karaamah (of A'llamah Hilli).
Hikaayat-ha-e-Shanidani, vol. 3, pg. 146; Qisas al-U’lema, pg. 101.
Jaame’ al-Sa’adaat, vol. 2, pg. 231.
Imam Ridha (peace be upon him) had said: Yunus Ibn A'bd al-Rahmaan, in his time, is as Salman Farsi was, in his own.
Muntahal Aa’maal, vol. 2, pg. 253.
Pand-e-Taareekh, vol. 5, pg. 29; Al-Ghadeer, vol. 6, pg. 121.
| 2019-04-23T04:35:53 |
http://www.qul.org.au/library/anecdotes-for-reflection/1618-enjoining-the-good-and-forbidding-the-evil
|
0.999997 |
What is another word for unfastened?
Her thick brown hair was unfastened, and fell over her shoulders.
The tin box, which had little or nothing of interest, was unfastened.
| 2019-04-19T18:14:23 |
https://www.thesaurus.net/unfastened
|
0.998807 |
I just want to get an opinion on the Solal products (including the Vitamins etc) They claim to be " Prescribed by Dr' s and recommended by Pharmacists" There are so may products on the market these days I was just wondering if they are worth it.
I agree that there are a great many vitamin and mineral supplements on the market and most of them make claims that they are the leading products or prescribed by drs and pharmacists. I would use the following criteria when assessing such products: 1) Is the product made by a leading pharmaceutical company? 2) Is the price reasonable? (excessively high prices are no guarantee of quality) 3) Does the product contain less than or 100% of the RDA for the various nutrients (recent research indicates that it can be dangerous to take excessive doses of vitamins and minerals) 4) Do you really need to take such supplements? Most people do not require supplements unless they have a defined deficiency (e.g.iron deficiency anaemia) or a deficient diet or are exposed to periods of rapid growth and/or stresses.
| 2019-04-22T22:55:17 |
https://www.health24.com/Experts/Question/solal-technologies-20090121
|
0.999999 |
The family of a woman, who was fatally shot by Los Angeles officers while they were firing at a man who held a knife to her throat, filed a claim against the police department and the city, their lawyers announced Wednesday.
Police said they opened fire on Guillermo Perez on June 16 after he began cutting Tollison's throat outside the Central Lutheran Church that helps homeless people.
Both Perez and Tollison, who were homeless, died at the scene.
'Drop the knife!' an officer repeatedly shouted at Perez.
An officer fired several rounds from a bean bag shotgun - which fires a small sack with metal pellets - but Perez appears to use the folding chair to deflect them.
Witnesses told police that Perez moved the knife in a 'sawing motion against her throat and cut her throat,' Cmdr Alan Hamilton, who leads the unit that investigates police shootings, said in the video.
Tollison's son, Jesse Pelaez, said at Wednesday's news conference that he thinks that 'if the hostage was somebody important, the situation would have been handled differently'.
'It hurts me so much knowing I'll never be able to see, talk or listen to my mother again because the police didn't know how to handle the situation properly,' he said.
Police Chief Michel Moore said Tuesday that 'officers were forced to make split-second decisions based on the actions of a violent individual'.
'It is illogical and inconceivable for an officer on the scene to not realize that she will certainly be shot if 18 rounds are fired,' Dunn said.
Tollison's death marked the second time in five weeks in which Los Angeles police killed hostages or bystanders as they tried to stop attackers.
On July 21, police tried to stop armed man, Gene Evin Atkins, from entering a Trader Joe's store and fatally shot the supermarket's assistant manager who was standing nearby.
Authorities said last week that an officer's bullet killed Melyda Corado before Atkins took hostages inside the store.
'This is another case where officers were forced to make split-second decisions based on the actions of a violent individual,' Police Chief Michel Moore said of the first shooting.
Moore has defended the officers' use of deadly force as an attempt to stop what they feared could become a mass shooting.
The police chief said Tuesday that he was concerned at the average number of rounds fired by officers during shootings had increased last year.
He also said the number of officers involved in those shootings also increased.
He said an investigation will look at whether the officers' actions align with hostage training.
If the city rejects the claim for damages, the Tollison's family can proceed to court with a lawsuit.
| 2019-04-23T17:02:08 |
https://www.dailymail.co.uk/news/article-6020439/Family-woman-fatally-shot-LAPD-officers-files-wrongful-death-claim-against-city.html
|
0.999999 |
What is the difference between Scotch and bourbon? Bourbon tastes like: Its main characteristic is its sweetness, but it's also a bit smoky due. When I drink good quality bourbon whiskeys, I almost always experience the flavor of the caramel popcorn you get at the fair. How can I learn to detect flavors and differences in whiskey, scotch, bourbon, single malt vs. blended, etc.? What does the Imperial Blue whiskey taste like. I recently attended a special tasting dinner at Le Bernardin to try a newly released single-malt year-old Glenlivet Scotch ($25, a bottle, a stocking stuffer.
As he's pulling up drinks, serving tastes of Scotch whisky neat, and In other words, contrary to what you may have thought, adding water to It will also, however, mask some of the flavors that make Scotch taste like Scotch. Chemists confirm that whiskey really does taste better with a splash of water. The logic behind What does this have to do with adding water to your drink? It's Like eBay, but Everything Sells in 90 SecondsTophatter. Undo. The Federal Standards of Identity for Bourbon stipulate what is and what isn't The difference between Tennessee Whiskey, like Jack Daniel's, for example, and .
No other spirit has been associated with manhood like Scotch whisky. What separates Scotch from its alcoholic counterparts is not just its unique In developing a taste for Scotch, a man is embarking on a lifelong journey. Read on to learn how to sip Scotch like a seasoned pro. . Or you could attend a whiskey tasting to get a sense of what you do and do not like. If someone doesn't like something, it makes no sense to me to keep tasting it. And I have no idea what you mean by "look at me, I drink scotch" factor. What is. I put **The Taste** in capitals, because at least for me there was a We discuss nose, mouth-feel, and finish like we know what we're talking.
| 2019-04-21T07:07:01 |
http://hola-troncones.com/tech/whats-scotch-taste-like.php
|
0.999999 |
Why does adding PKCS#1 v1.5 padding make RSA encryption non-deterministic?
I'm quite a beginner to cryptography, but have been implementing some encryption according to a specification over the last few weeks using the PyCrypto library.
I've discovered that when encrypting using RSA public keys alone, encryption appears to be deterministic (meaning encrypting the same message multiple times results in the same cipher text). However, once I add PKCS#1 v1.5 padding, it becomes non-deterministic (the cipher text differs on subsequent encryptions).
My question is: why are there differences in determinism in these two cases? I understand why non-determinism in encryption is useful (to prevent an interceptor noticing two messages are the same), but why does RSA encryption alone not offer this, and how does padding add this? Is this one of the purposes of padding?
When you use textbook RSA, the public key is $(e,N)$ and the ciphertext of a message $m$ is $c = m^e\bmod N$. The encryption process of textbook RSA involves no randomness; this causes the problem.
It is easy to see that when having $m_1=m_2$ the ciphertexts of them $m_1^e =m_2^e \bmod N$. Hence you can see where determinism comes from.
When using a Padding scheme like PKCS#1 v1.5, one important aspect is that the padding is random, thus differs each time when you encrypt.
In PKCS#1 v1.5 for RSA, $m$ is padded to $x=0x00||0x02||r||0x00||m$ and the ciphertext is $c=x^e\bmod N$ instead of $m^e\bmod N$. Here $r$ is a long enough random string. Therefore, even having $m_1=m_2$, the ciphertexts of them will be produced over $x_1\ne x_2$, thus will looks totally different.
Let $N$ be $k$ bytes long, then $m$ must be $\leq$ $k-11$ bytes long.
The padded string ($x$) must be $k$ bytes long.
Thus $r$ is of $k-3-|m|$ bytes long ($|m|$ is how many bytes the plaintext $m$ is), which is at least 8 bytes long. However, this may still not be enough. I remember in Kats & Lindell's book, it mentions that $r$ needs to be roughly half the length of $N$, in order to for us to consider RSA CPA secure.
It is nice that you have tested if from the first hands.
So, an attacker can modify the plaintext and create valid plaintexts.
In order to prevent these, a padding scheme is necessary. Insert randomness to prevent 1 and format the data in order to see the modification in the ciphertext.
Not the answer you're looking for? Browse other questions tagged rsa padding deterministic-encryption pkcs1 or ask your own question.
Does RSA padding have to be unpredictable if the payload is?
Is semantic security important in a hybrid cryptosystem?
Is PKCS #1 v1.5 RSA encryption padding secure under these conditions?
Are there any misuse-resistant asymmetric encryption schemes?
Why PS does differ between PKCS1 v1.5 padding for signature and for encryption?
| 2019-04-26T04:25:06 |
https://crypto.stackexchange.com/questions/66521/why-does-adding-pkcs1-v1-5-padding-make-rsa-encryption-non-deterministic
|
0.548339 |
The CIA's internal investigative branch will be subjected to a series of new checks and controls designed to give targets of in-house probes greater ability to defend themselves, CIA Director Michael V. Hayden said in a statement to the agency's employees.
Among the changes is the creation of two positions to oversee the work of the CIA's inspector general, including a "quality control officer" charged with monitoring the inspector's handling of evidence and testimony.
The changes mark the culmination of a controversial inquiry Hayden launched last year into how the inspector general carried out investigations. The probe was driven by complaints from employees who said they had been treated unfairly by the inspector general's office.
The move was seen by some as an attempt to rein in an office that had produced a series of reports harshly critical of top CIA officers and that was in the midst of reviewing some of the agency's most sensitive programs, including its interrogations of terrorism suspects.
But Hayden insisted in a statement issued Thursday to the CIA workforce that the review was designed to "enhance the performance" of the inspector general, a position that is supposed to function as an internal watchdog. A copy of Hayden's statement was obtained Friday by The Times.
Hayden indicated that the changes were being made voluntarily by CIA Inspector General John L. Helgerson, even though Helgerson previously had expressed concern about the inquiry in private conversations with congressional officials and former colleagues.
"John has chosen to take a number of steps to heighten the efficiency, assure the quality and increase the transparency of the investigative process," Hayden said.
Congressional officials said it was too early to determine whether the changes described by Hayden would pose any threat to the independence of the inspector general's office.
"Most of it on its surface looks innocuous," said a senior Democratic staffer on the Senate Intelligence Committee who would discuss committee views only on the condition of anonymity. "But we'd like to hear Helgerson's view on how these procedures are going to work."
The most significant change appears to be the creation of the quality control position. That officer would be required to "attest, among other things, that reports include all exculpatory and relevant mitigating information," according to Hayden's statement.
CIA officials who were targets of investigations in recent years have complained that their accounts and explanations were not given adequate weight in reports issued by Helgerson's office.
In one widely reported case, Helgerson aimed scathing criticism at former CIA Director George J. Tenet and other top officials for their roles in intelligence failures leading up to the Sept. 11 attacks. Helgerson concluded that they "did not discharge their duties in a satisfactory manner" and recommended that they go before special in-house panels to determine whether they should be formally reprimanded.
The conclusions were denounced by targets of the 2005 probe, including Tenet, who issued a statement saying: "The IG is flat wrong."
Hayden said the CIA would also create an ombudsman position on the inspector general's staff to give agency employees "a new, less formal way of communicating any concerns they have" about the conduct of investigations.
Other changes include the installation of new equipment for recording inspector general interviews with employees and the creation of a website that would advise employees on how to obtain legal representation and allow them to examine draft reports of investigations.
Hayden said that Helgerson had also committed to "reducing the time it takes to complete an investigation." Employees have complained that certain Helgerson probes dragged on for years, leaving targeted workers in a state of investigative limbo.
Hayden's review of Helgerson's office was conducted by Robert L. Deitz, an attorney who serves as a senior aide to the director and had worked with Hayden when he was director of the National Security Agency.
| 2019-04-22T14:36:48 |
https://www.latimes.com/archives/la-xpm-2008-feb-02-na-cia2-story.html
|
0.999275 |
Fill spray bottle 1/3 of the way full with vinegar (most bottles will have lines to tell you the proportions) and the rest of the way with water. Add 20-25 drops of tea tree oil and gently shake. Use as you would any commercial general cleaning spray.
Sprinkle on area just as you would a conventional cleaning powder.
Slice soap into strips and run through food processor to make "soap beads".
Combine soap beads, borax, and washing soda. Done!
Use 1-2 tablespoon for small loads, 3-4 tablespoons for large loads.
See how the ingredient lists are almost identical? There are, however, a few more steps to this detergent.
Fill a 5 gallon bucket (I store my wheat in these, but they can also sometimes be picked up at the grocery store) half full of hot top water. Add melted soap, washing soda, and Borax. Stir until all powder is dissolved. Fill bucket to top with more hot water. Stir, cover, and let sit overnight to thicken.
Stir and fill a used, clean laundry soap dispenser half full with soap and then fill rest of the way with water. Shake (gently) before each use.
Mix all ingredients and use approximately 1/4 cup per load (more of less depending on needs).
| 2019-04-19T17:19:10 |
http://greenthrifty.blogspot.com/p/cleaning-recipes.html
|
0.999891 |
How does Google intend to compete with Microsoft in the cloud?
Ian Hardenburgh looks more closely at how Microsoft and Google will compete with each other in the cloud space.
Google's cloud portfolio has come a long way from simply provisioning Google Docs, essentially a cheaper online alternative to competing productivity suites like Microsoft Office and OpenOffice, to offering a fairly robust platform for integrated software development, as done with Google App Engine and the Google Apps Marketplace. However, Google has not yet proposed any infrastructure-based service, such as what Microsoft has done with its Azure VM Role and Hyper-V private cloud solution, or even something less proprietary, such as Amazon's Elastic Compute Cloud. So far, Google's strategy seems to be focused elsewhere, as they look toward a different segment of the enterprise cloud market — the SaaS one.
With Microsoft's concurrent advances with both private and public cloud technologies, it seems as if they intend to slowly move their existing clientele over to the public end of the equation. In other words, one day, everything will run entirely on Windows Azure. A typical scenario for an enterprise would be to build their infrastructure in a private cloud, or with Hyper-V, and once it has reached an acceptable level of sustainability, move it to Windows Azure. There, the enterprise can begin to take advantage of a compute-based cost model, as well as an application platform, such as with services like the Azure Web Role and SQL Azure. Google, initially being a search engine and display advertising company, has come into the game late and doesn't have the familiarity and know-how with software that Microsoft has built up with users over the years. There is no Google server, no Google database, and no business intelligence product, and to a certain extent, no full-fledged productivity/office/collaboration suite that matches the capabilities of Microsoft Office and SharePoint. Yes, there's Google Apps, which now includes the likes of Gmail, with a number of contact management features. And yes, there's the Apps Marketplace, which includes a whole slew of tools that can sync up and extend the capabilities of Google Docs. But these are all rather new revelations. And I suppose this is why Google has pushed Chrome as a hardware independent alternative to your typical operating system, with the ability to install and use applications with little-to-no infrastructure needed outside of an Internet connection.
Chrome, and even the Chromebook, might prove to be a viable strategy for Google, in the face of the cloud enterprise. It can allow for relatively seamless adoption across a company of users, most of which only need a relatively limited set of capabilities when it comes to word processing, spreadsheets, email and contact management. The per person cost of such an implementation could produce astronomical cost savings as a replacement for licensed on-premise software, as well as immediately reduce the cost of hardware, with the Chromebook. Furthermore, with Google Docs open XML formats, and with third-party companies like Salesforce offering integration with their own platforms, Chrome lays the groundwork for staging organizations in the cloud.
Microsoft had a fairly sizable head start on Google in terms of migration. However, Google has now provided the means for a different looking cloud. Largely, it seems as if Google's strategy going forward is to become a purveyor of SaaS applications, to fill in the gap between productivity software like Google Docs, and ERP software, like Microsoft Dynamics. The Google Apps Marketplace might cut it for now, but this is something Google needs to consider, perhaps through a major acquisition down the road. Also, Google Apps itself has yet to prove itself a worthwhile option to office staples like MS Word, and Excel — something I'll be exploring in my posts on Google and how it fits into the enterprise cloud to come.
| 2019-04-22T10:36:21 |
https://www.techrepublic.com/blog/the-enterprise-cloud/how-does-google-intend-to-compete-with-microsoft-in-the-cloud/
|
0.998102 |
One of the ways factoring companies improve your cash flow is by providing a professional credit control and sales ledger management service. They typically tailor this around your needs and act like an extension of your business, freeing up your time to focus on other important business matters.
Factoring companies employ knowledgeable credit controllers who are experienced at building rapport with your customers and ensuring prompt and accurate payment of invoices.
It is in the interest of the factoring company to provide a courteous service and the last thing they wish to do is upset any of your customers. Remember they are experts at what they do and want to support you and your business as much as possible.
Generally factoring companies are not interested in lending to businesses that are failing, rather they look to lend to rapidly growing businesses, which is where factoring really comes into its own.
Unlike other forms of business finance, invoice factoring grows with the business, so as the turnover increases, so does the borrowing amount. That means more sales = more invoices = more funding available. A successful and growing business using invoice finance will accelerate cash flow and be in a strong position to fund their growth.
As mentioned above most businesses use invoice factoring to fund their growth, expand and take on new projects, certainly not to rescue the business from failure.
With invoice financing breaking the £20bn barrier for the first time this year, the volume of businesses using this flexible solution is increasing. It has therefore become commonplace for your customers to submit their invoice payments to factoring companies, most of which will already be used to doing this for their other suppliers.
When you start to use factoring, the factoring company will send a courteous letter to your customers advising that due to growth you have been approved for a factoring facility. This notification letter acts to reassure your customers that nothing will change apart from the bank account where they send invoice payments. The letter provides details of your Client Manager and Credit Controller should your customers wish to get in contact with your team and remind them that your business relationship with them has not changed.
Your customers view this small change in a very positive way, knowing that they are dealing with a supplier that is well-funded and successful.
Factoring companies also offer a confidential service, if for any reason you feel this would work better and in this scenario your customers are not made aware of the factoring company.
The cost of factoring is competitive when compared against other forms of business finance.
If factoring gives you the working capital you need to grow, then the additional revenue and profits that this brings will outweigh any costs.
For example, would you invest 2% to generate a 35% increase in sales? As long as your current net profit is greater than the proposed factoring cost; the additional business you can transact by factoring will definitely provide you with more profit.
If you are new to invoice factoring and considering the options please contact us today on 01908 268888 for some friendly advice.
Alternatively, if you are already using invoice factoring and would like to explore other options, please do get in touch and speak to our experts today.
| 2019-04-23T06:46:02 |
https://www.calvertonfinance.co.uk/blog/4-common-mistakes-people-make-about-factoring.html
|
0.999947 |
This is a summary of 1985 in music in the United Kingdom, including the official charts from that year.
The biggest British musical event of 1985 was the Live Aid concert in London's Wembley Stadium on 13 July. Held to follow up the previous year's charity record "Do They Know It's Christmas?", the biggest-selling single ever at the time, popular acts such as The Who, U2 and Queen performed in front of an estimated audience of 1.9 billion viewers. It raised £150 million to help famine in Ethiopia, and a similar event would happen 20 years later in 2005, with Live 8.
After the huge success of Band Aid's "Do They Know It's Christmas?", several more charity songs reached number 1 this year. USA for Africa, inspired by Band Aid, released "We Are the World", a song written by Michael Jackson and Lionel Richie, while David Bowie and Mick Jagger released a cover of "Dancing In The Street", the music video being premiered at Live Aid and all proceeds going to the charity. In May, a fire at a football stadium in Bradford killed 56 people, and supergroup The Crowd released a charity cover of popular football anthem "You'll Never Walk Alone" in tribute.
British rock band Dire Straits released their album Brothers in Arms in May, one of the first ever albums to be released on compact disc and the format's first million-seller. It went on to become the UK's best-selling album of the entire decade and remains one of the top ten best-selling albums of all time in the UK. Four singles were released from the album, including the UK number 4 hit and US number 1 "Money for Nothing", which referenced American music channel MTV and had a groundbreaking video featuring early computer-generated imagery. When a European version of MTV launched in 1987, it was the first video ever played on the channel.
Jennifer Rush entered the top 75 in June with the power ballad "The Power of Love", which remained in the chart for months without entering the top 40. When it finally did in September, it quickly hit number 1, where it remained for five weeks and was the biggest selling single of the year. It sold over a million copies, however it would be the last single of the decade to do so, and there would not be another million-seller until 1991.
Many songs this year competed for the Christmas number one single, and the entire top 3 from 1984 re-entered the chart this year; Paul McCartney's "We All Stand Together" at number 32, Wham!'s "Last Christmas" at number 6, and Band Aid's "Do They Know It's Christmas?" at number 3. There were also attempts from Bruce Springsteen with a cover of "Santa Claus Is Coming to Town", and ventriloquist Keith Harris released a cover of "White Christmas" with his green puppet Orville the Duck.
However, the Christmas number one went to Shakin' Stevens with the song "Merry Christmas Everyone". It had been intended to be released in 1984, but was kept back a year due to the Band Aid charity single. Still a widely known Christmas song in the 21st century, it re-entered the chart in Christmas 2007 on downloads alone, at number 22.
John Rutter, hitherto best known for his popular modern carols, acknowledged his classical roots with his Requiem, which was premièred in October in Sacramento, California. Less than eight months earlier, Andrew Lloyd Webber's Requiem had its première in New York. Paul Miles-Kingston, the boy soprano who won a silver disc for his recording of the "Pie Jesu" from that work, became Head Chorister of Winchester Cathedral in the same year. The prolific Peter Maxwell Davies (who had moved to Orkney in 1971) produced one of his most popular works, An Orkney Wedding, with Sunrise, notable for featuring the bagpipes as a lead instrument. Veteran Welsh composer Daniel Jones, produced his 12th symphony, at the age of 73, whilst 80-year-old Michael Tippett began work on his last opera, New Year.
Based on sales from 5 January to 28 December 1985.
Michael Nyman - A Zed and Two Noughts directed by Peter Greenaway.
Best British comedy recording: Neil (also known as Nigel Planer) - "Hole In My Shoe"
Best classical recording: Antonio Vivaldi's - "The Four Seasons"
British album: Sade - "Diamond Life"
British single: Frankie Goes to Hollywood - "Relax"
British Video: Duran Duran - "The Wild Boys"
^ Marshall, Lee (2015). The International Recording Industries. Routledge. ISBN 978-1138822856.
^ "1985 The Number One Singles". Official Charts Company.
^ "1985 The Number One Albums". Official Charts Company.
^ "Top 100 Singles". Music Week. London, England: Spotlight Publications. 18 January 1986. p. 10.
^ Scaping, Peter, ed. (1986). "Top 100 singles: 1985". BPI Year Book 1986 (8th ed.). British Phonographic Industry. pp. 48–49. ISBN 0-906154-07-3.
^ "Top 100 Albums". Music Week. London, England: Spotlight Publications. 18 January 1986. p. 11.
^ Scaping (1986). "Top 100 Albums: 1985". pp. 50–51.
^ "McCARTHY, Neil". BFI Film & TV Database. Retrieved July 2, 2012.
| 2019-04-19T03:44:20 |
https://en.wikipedia.org/wiki/1985_in_British_music
|
0.999978 |
Physical weathering describes a change that affects the structure of a rock, but not its composition. It is sometimes also called mechanical weathering since it only causes mechanical changes to the rock's structure. Forces that shatter rocks, rub away rock surfaces, or form cracks within the rock are examples of physical weathering.
The texture of a rock is a consequence of the physical and chemical conditions under which it formed and, perhaps, some of the processes that have acted on the rock since that time.
Rock candy is a crystallized sugar confection. It is easy to make, and because it uses a simple chemical process that causes crystals to form, making rock candy can be a fun and tasty way to teach kids about chemistry.
The correct options are A and E. In chemistry, there are two types of change, these are physical and chemical changes. A physical change is one in which no new substance is formed while a chemical change is one in which a new substance is formed.
(b) Crushing a can : after crushing can changes its shape, size but it still remain Aluminum so it is a physical change. Burning of wood is a chemical change because on burning wood changes to a totally different new products (ash, smoke and carbon dioxide).
CRM (chemical, or crystallization, remanent magnetization) can be induced after a crystal is formed and undergoes one of a number of physicochemical changes, such as oxidation or reduction, a phase change, dehydration, recrystallization, or precipitation of natural cements.
Physical Geology 2. STUDY. PLAY. Intrusive rock. ... removal of the crystals changes the composition of the magma. High temperatures. First minerals to crystalize. Low Temperatures. Last minerals to crystalize. High densities. ... come from physical weathering or cracking and crushing of big rocks shells and plants. Bioclasts.
Chemical weathering can also result from exposure to water. Hydrolysis occurs when silicate minerals react with water so that the mineral recombines with the water molecule to form a new mineral.For example, consider the mineral potassium feldspar. Potassium feldspar is a fairly common mineral and can be found in igneous, metamorphic and sedimentary rocks.
Physical and chemical properties of a mixture are different from its constituents (in pure form) and vary with different relative amounts of the parts. Can be separated into parts via physical processes.
physical changes screening rocks Minerals, Rocks & Rock Forming Processes - Indiana University, The investigation of these structures in ancient rocks allows us to reconstruct physical. .family nutrition and physical activity (FNPA) screening .
a physical or chemical change crushing rock salt a physical or chemical change » is crushing rock crystals a chemical or physical change » rock crushing » Learn More only via a chemical change.
· 1. A chemical change does not change the physical appearance of a substance but changes it chemically (hence the name). So just use the process of elimination: Crushing a rock: Does it change the chemical make-up of the rock itself?
· Physical properties and change essaysA physical change occurs when an object goes through a change that doesn't alter its chemical nature. … grinding, crushing, annealing, dissolving, or emulsifying produce physical changes .
An example of a simple physical change is the freezing of water into ice, as it goes from a liquid to a solid state. No real change in chemistry has taken place during the freezing process, which is completely reversible.
is crushing rock crystals a chemical or physical change. Chemical For Crushing Rocks And Stones,, crushing rocks chemical change, What is crushing a rock a chemical or a physical change.
A chemical change makes a substance that wasn't there before. There may be clues that a chemical reaction took place, such as light, heat, color change, gas production, odor, or sound. The starting and ending materials of a physical change are the same, even though they may look different.
Dissolving Sugar in Water: Chemical or Physical Change?
Dissolving sugar in water is an example of a physical change. Here's why: A chemical change produces new chemical products . In order for sugar in water to be a chemical change, something new would need to result.
| 2019-04-18T21:07:36 |
https://www.goedkopevliegticketsvanaf.nl/raw_path/is_crushing_rock_crystals_a_chemical_or_physical_change-39209-10-2018
|
0.998892 |
How do I get my biscuits to be fluffy like I see in magazine pics? I've achieved flaky but not fluffy!
Bakewell Cream has been my staple. If you aren't going to make Southern-style biscuits, but want to make high-rising New England/Maine-style biscuits then I would try it. You can find it in some grocery stores and at the King Arthur Flour website. It's never failed me.
Mix an egg into your milk or buttermilk before adding it to the flour/butter mixture. Treat the dough as you would for scones.
I learned how to make biscuits from the master of biscuits (he has 4 restaurants here in Brooklyn) and the key is definitely, as chefjune suggests, to handle dough as minimally as possible.
I remember that my biscuits were not coming out as good as his and so he spent an evening just showing me the basics. I remember there was a huge knob of butter poking out of his patted-out circle of dough, and I could not figure out how they would come out right but they were perfect!
Key points: Use hands only. No machinery. Cold butter. Cold buttermilk. Work butter into the flour with your fingers, kind of smoosh the cubed butter into the flour. Fold in the buttermilk from the sides: 1, 2, 3, 4. Once for each side, like a square, and no more. Then invert it onto the counter and pat out. There will be unincorporated flour on the top but that is okay.
Don't use a rolling pin. Just pat out a loose circle: use one hand to flatten the top from the center out and the other to tidy the sides. Keep it thick, minimum 2" high. Cut out biscuits and transfer them to baking sheet.
Here is the other very key step: brush tops VERY generously with buttermilk. Really SOP it on. The thick layer of buttermilk on top creates steam inside the biscuits that is KEY for fluffiness. The loose flour left on top helps to bind the buttermilk to the biscuits.
Bake in a super-hot 475 degree oven until golden.
Shirley O'Corriher's Touch of Grace biscuits from her book Cookwise are magnificent. But, as boulangere mentions, the protein content of the flour is very important. I'd love to get my hands on some White Lily (a Southern low protein flour, very unique in this country), but just can't get myself to add another specialty flour to my cabinet. Now that I've mastered fluffy through O'Corriher, I'm dying for a good flaky recipe!
Getting a flaky result depends on how much you cut in the butter. Try mixing using a stand mixer on the paddle. Only incorporate butter until the size of hazelnuts. When you add liquids, the density will further break down the butter. As for fluffy, try using half AP flour and half cake flour. The lower protein content of cake flour (7% vs 10% of AP) will give you a lighter, "fluffier" consistency. Also, after you've rolled and cut them, let them rest under refrigeration for 30 minutes before baking. That will let the flour proteins recover from the shock of being rolled and cut. Let us know how this works!
Do you really want fluffy? I love a flaky biscuit, myself. Especially if it's a little bit crusty on the bottom.
One thing people over look is the baking powder--that powder you've had for a year probably isn't very good-- Even tho the expiration date is still good, if it's been opened don't depend on that date. I always keep small cans, one un-opened) on hand.
Also consider your flour, most Southern Flour is lighter. For example standard All Purpose is 125 grams/cup....while Gold Medal AP is 130/cup...I think White Lilly AP is 128/cup.
Tho most just go by feel---which is trickey until you get your hands on it.
handle the dough as little as possible.
Can I make biscuit dough ahead of time?
| 2019-04-24T10:20:17 |
https://food52.com/hotline/4586-how-do-i-get-my-biscuits-to-be-fluffy-like-i-see-in-magazine-pics-i-ve-achieved-flaky-but-not-fluffy
|
0.999558 |
central Dystonia of the Hand, And What the Brain Has To Do With It The ashes is complicated, and oftentimes the origins of a condition atomic number 18 all but open. Focal dystonia of the touch is one disorder whose underlying cause has been found in the more than recent past. Although it can be genetic (1), the form of focal dystonia of the hand I look at here is caused by environmental factors (2). Focal dystonia of the hand is a condition characterized by a loss in motor control of one or more fingers. A wizard muscle or group of muscles is involved muscles in the hand and fortify tense and tighten, with the result of making the hand (or part of it) curl (2). Musicians who let intensively practiced their instruments over a number of years are a group most affected by this condition. The reason is that focal dystonia can be caused by the repetitive movement of the fingers over a significant period of time. The condition was long known as occupational hand cramp. (3). It can easily be misdiagnosed as simple overexploitation or stress of the hand (1). Although it may not be obvious at first sight of the symptoms, the level at which the problem is caused is not the hand, but the hit. Researchers at the University of Konstanz report overlap or flecking of the homuncular organization of the mold of the digits in the primary somatosensory cortex (3). Given that functions such as motor control cross over from the right side of the body to be delineated in the left hemisphere, they found that the distance amidst the representations of individual fingers was smaller in the somatosensory cortex side check to the hand that had undergone continued repetitious training (the left hand in case of violin players for example). What does all this mean in terms of the brain? Looking at the central nervous system as an input-output system, in very simple terms we can observe that a specialized input is presented over and over again - in this case the foreplay of the fingers that play the violin - and as a result the organization at bottom the box changes. More specifically, there is a one-to-one correspondence betwixt input and internal representations of this input all fingers are individually represented on the somatosensory cortex. But somehow, as these regions of representation begin to smear or overlap, the one-to-one correspondence is blurred.
| 2019-04-23T04:43:23 |
http://cunycollegeapplication.blogspot.com/2019/03/focal-dystonia-of-hand-and-what-brain.html
|
0.998451 |
Given the raving reviews about Garcinia Auubergenville, I got excited and decided to take a closer look at this supplement and the science behind it.
Time between meals with aubergenville Rencontres are few that?
What is Garcinia Cambogia. Garcinia Cambogia Fruit Garcinia cambogia is a plant, also Rencontres aubergenville as Garcinia gummi-gutta.
In the skin of the fruit, there is a large amount aybergenville a natural substance called Hydroxycitric Acid (HCA).
Remember, this natural supplement aubergenville Rencontres 100 pure with adulterants fillers and also ships?
The skin of the fruit contains Rencontges substance called Hydroxycitric Acid (HCA), which is the active ingredient.
Know they Rencontres aubergenville Cambogia Appears Very Safe Bottle With Blue Pills?
Woman Smiling and Holding a Supplement I managed to find several research studies on Garcinia Aubsrgenville, in both animals and humans. According to some studies in rats, it can inhibit a fat producing enzyme called Citrate Lyase, making it more difficult for the body to produce fat out of carbohydrates (1).
This could theoretically lead to reduced appetite and cravings (2). There are actually a whole bunch of studies in rats showing that Garcinia Cambogia consistently leads to significant weight loss (3, 4, 5, aubergenviille.
What works rats doesnt always work humans 16, Rencontre musulman cergy you don't mind the jitters and all?
However, what works in rats doesnt always work in humans. Bottom Line: Studies in rats show aubergenviole the active ingredient in Garcinia Cambogia can inhibit a fat producing enzyme called Citrate Lyase and increase serotonin levels, aubergenviloe to significant weight loss.
A Look at Some Human Studies Fortunately, I also Recontres several human studies on Garcinia Cambogia.
All of aubergenvilel studies are so-called randomized controlled Rencotres, which are the gold standard of scientific experiments in Rencontrex.
The biggest of aubegrenville studies included 135 overweight individuals, which were split into two groups (7): Treatment group: 1 gram of Garcinia Cambogia Extract, 3 times per day, taken 30 minutes before meals.
May cause mild effect Rencontres aubergenville Randy Shore iTunes download your?
Few people succeed the long run The best Chat rencontre gratuit et sans inscription includes Caffeine, Green Tea and Glucomannan fiber that?
The Rencontres aubergenville group lost 2.
More Studies In another study with Rencontrws overweight females, Garcinia Cambogia did lead to 1.
Are serious side effects, only some reports mild digestive Site rencontre canadien are plenty fly-by-night products around(pretty much all?
Voodoosho Faukree on In my opinion you are not right. Write to me in PM, we will talk.
Shakalar JoJolar on I think, that you are not right. I am assured. Let's discuss it. Write to me in PM, we will communicate.
Taur Ker on In it something is. Clearly, many thanks for the help in this question.
Akinonris Shakar on In my opinion the theme is rather interesting. I suggest you it to discuss here or in PM.
| 2019-04-20T02:31:47 |
http://europe1.tk/daweq/rencontres-aubergenville-123.php
|
0.99887 |
Uganda is a country where, besides the long civil-war, also AIDS made a contribution to many deaths. In some parts of the country, one third of the children lost one or both parents to AIDS. This has as a result that Uganda counts many orphans. Traditionally they would be cared for by the relatives but, due to the severity of the problem, most families are already overloaded with orphans and are not eager to add another burden to the already meager resources. In many cases you can find the older children caring for their siblings. The older ones however can be as young as 10 years!
Driven by our Christian conviction, the Heart4Children organization would like to help these children. The purpose of the organization is to help as many of these children as possible, but not at the cost of the quality of that help. We would like to offer them Care, Housing and Education and by doing this get them in touch with a very practical gospel. By this action we would like to show them that our God is a God of love! Summarized we run an Educational Children’s Village where these children will live and go to school.
The ‘Stichting Heart for Children’ was founded by Cor & Grace Koelewijn. This organization will have the task to promote and raise funds for this objective in Uganda. Meanwhile, in Uganda the implementing organization is registered under the name ‘Heart for the Children’ NGO. This organization has purchased a 30 acre plot of land to build the Children’s Village in Osia in the Tororo area.
The project is run by local personnel. In practice this is supplemented by foreign volunteers. It is our intention that the program will eventually become financially self-sustaining. This will be realized by having the school operate commercially like any other private school in Uganda. Students are charged a reasonable amount of fees in accordance to the standard of the institution. The profit in the case of this school is rather high as we don not have to service a bank-loan as other commercially run schools have to do. Therefore the profits will be used to pay for school fees for orphans. Besides the places given away to orphans by the school, we will also try to recruit sponsors to pay for even more orphans in the school.
Cor & Grace Koelewijn are a couple who live in Uganda. They have three children of their own. Cor went to Uganda in 1988 to do charity work. After a few years he met Grace. Together they have built the Namugongo Children’s Village with the funding of a Dutch NGO. Cor is the practical implementor while Grace is the educationalist. Together they have clearly received the talents from God to do this work. They now plan to provide the leadership for this Children’s Village. All the past experience will be used to make this a successful program.
If all plans work out the way we expected, we will be in the position to have the school pay 10% of the operational funds back to the mother organization who in turn will use this as a starting fund to continue on a next Educational Children’s Village in another district.
At the founding of this project, our hoop and expectation is in our God in whom we put our unconditional trust. We expect all from Him and want to give it all back to Him. We pray that He will bless our plans as we use our talents to give glory to Him.
| 2019-04-18T19:31:47 |
http://en.heart4children.org/about-us/vision/
|
0.999956 |
The Gang-gang is one of only two cockatoos (the other being Major Mitchell's) with red anywhere on its head.
Male-in general dark grey, the feathers scalloped pale grey/white; bright orange/red crest and head; secondary coverts suffused dull green; dark grey tail. Bill horn in colour. Eye dark brown. Female-dark grey head and crest; upperparts strongly barred with pale yellow, underparts heavily barred orange to green/yellow; undertail barred grey/white.
As in female but with more red in crest (male) and dark grey crest (female); crest shorter with less filaments; more evident barring on tail.
Described as croaking screech. Soft growling while feeding.
Walk-in aviary, minimum length 4.5m (14.7 ft).
Mix of small seeds: limited sunflower; walnuts, peanuts, pine nuts; fresh corn, fruit especially apple, hawthorn, cotoneaster and Pyracantha berries; complete kibble.
Avid chewers so provide bird safe wood (fir), wood toys, vegetable tanned leather, pine cones; bathing.
1m (3.3 ft) long nesting log.
28-30 days, as low as 25 days recorded.
Habitat loss, increased susceptibility to psittacine cirovirus disease (PCD) virus.
Found in Australia from SE in E New South Wales through S Victoria to SE South Australia; introduced to Kangaroo Island.
Occurs in tall open forest in highlands and foothills; in winter to open woodland, riverine woodland, scrub, farmland and suburban areas. Up to 2000m (6560 ft).
Eucalypt seed pods, green acacia, Pyracantha seeds, berries, nuts, fruits and insect larvae.
Nomadic; mostly found up in trees, only coming to ground level to drink; found in pairs or small family groups during breeding season; in winter larger groups up to 60.
Article: Where's the Gang-gang Cockatoo?
| 2019-04-23T08:43:25 |
https://www.parrots.org/encyclopedia/gang-gang-cockatoo
|
0.873304 |
I wonder if those of us on the OMY and planned exit glidepath would be still qualify for studies like this, or is our mere presence at a wo*rk place qualify?
"Workplace stress—such as long hours, job insecurity, and lack of work-life balance—contributes to at least 120,000 deaths each year and accounts for up to $190 billion in health care costs, according to new research by two Stanford professors and a former Stanford doctoral student now at Harvard Business School."
Man looking at that am I ever glad that I got out. I find it interesting that 'low job control' is the most highly correlated with mortality while people just don't appreciate it. I think this was demonstrated by studies in the UK in which decision-makers had better survival than those who weren't in decision-making positions.
It is yet another indication of how short-sighted people (in general) are. I have read plenty of stories here of people leaving jobs they otherwise liked because of workplace stressors that had little to do with the actual work involved.
This paragraph in the article kind of jumped out at me. There was a thread a while back about employers requiring participation in wellness programs, and that requirement was itself a source of much workplace stress!
For me, whlie currently w*rking, the main stress so to speak is the anticipation of my impending ER. That will all change at the end of this coming May. At least I can share that in the office (clandestinely of course) with another cohort who is on the exact same exit ramp.
I'm allowing all of the other office and commute stresses just pass me by.
This paper is a re-analysis of data from many previously published studies. The methodology used, meta analysis, assumes that the data from the included studies are very similar and can thus be logically pooled to yield further conclusions. Individual studies on the effects of stress on health are hard enough to control for confounding factors (like diet, family history, etc.). IMHO these 200+ studies (done in multiple nations!) not not nearly similar enough to be pooled for any logically valid analysis. The 10 somewhat arbitrary "work stressors" the authors present are not precisely defined. They are not used in the same way in each individual study included. How do the stressors "long hours" and "high job demands" differ precisely? Is there not significant overlap between the areas of "job insecurity" and "unemployment"? Or "low job control" and "low organizational justice"? Imprecise data yield invalid conclusions, and these issues are only magnified in poorly done meta analysis.
So bottom line-----PURE RUBBISH, I say.
| 2019-04-23T20:21:06 |
http://www.early-retirement.org/forums/f38/10-work-stressors-for-those-still-working-76315.html
|
0.999987 |
The friends who got such answer don't seem very happy, because they didn't get the ones they expected. In fact, they have already determined that the blockchain industry has a huge bubble.
Why do they think that there is a huge bubble in this industry? Because everyone can easily cite a lot of severely broken “air coins” and tell stories of ordinary investors being “harvested” by project parties or institutions; even the model of the public chain like Bitcoin and Ethereum have been reduced from 60% or even over 90%. So, is there a bubble in the blockchain, how can we better understand whether there is a bubble in the blockchain?
First, the blockchain bubble is different from other industries.
When we are talking about a bubble in an industry, what we mean is that the money entering the industry is higher than the value that the industry can produce or carry, so there may be a bubble in this industry.
But what is the difference of the blockchain industry? We thought that the funds that entered the industry did not actually enter the industry. In other words, the money that most of the “blockchain projects” have accumulated does not have any value to the blockchain industry.
Most of the ordinary blockchain investors and most of the blockchain project teams are just "pretending to play blockchain." Just as we don't say that there is a bubble in MLM, there is a bubble in funds, and there is a bubble in health products, we also don't say that there is a bubble in something that has no value.
Therefore, "air coins", "MLM coins" and so on are not part of the blockchain industry. They are scams draped in blockchain outerwear. The relevant project parties and investment institutions only swindle according to their routines, but this time the gimmick is the blockchain. The money they cheated will hardly be injected into the blockchain industry, and the so-called "market value" will be meaningless.
Maybe you think that you are investing in a blockchain project. In fact, it is only helping those scammers who have mixed into the blockchain industry to buy fancy cars, houses or yachts.
So is there any bubble in the blockchain industry? Presumably, many people who are concerned about the development of the blockchain industry have discovered that blockchain and bitcoin have begun to have a different direction. Bitcoin is regarded as a better stored value tool than gold; and the blockchain public chain project represented by Ethereum wants to take the blockchain technology and services to a higher level.
Is there a bubble in Bitcoin? I don’t think so. In fact, for an asset (currency) with very strong liquidity, it is meaningless to discuss whether there is a bubble. Just as we will not discuss whether there is a bubble in the hard currency such as the US dollar, gold, oil, etc., and few people will care about their cost, most people only care about their current price.
Back to the public chain project, let’s take Ethereum for example. The basis for many people to judge whether there is a bubble is that Ethereum has dropped from the highest price of 10,000RMB at the beginning of the year to about 1300RMB now, so it is determined that the Ethereum at that time must have a bubble.
First, the market is driven. There is always a bull market in the market for financial attributes. When the bull market is coming, all blockchain assets will rise. It is hard to say that there is a bubble.
Second, short-term short supply. A large number of project parties needed to raise ETH. A large number of people who invested in the project needed to use ETH, which led to the ETH in the market being speculated.
Now, in the blockchain project, the tokens are not hot like before, and fewer people are staying. ETH has turned from shot supply to oversupply, and the project parties that have raised a large number of ETHs have gradually realized the change of supply and demand, which is bound to trigger throwing pressure. Such a selling of panic sentiment has intensified the plunging of ETH prices, so the price of ETH has returned to the starting point. Therefore, I believe that the collapse of Ethereum is caused by the change of supply and demand and panic, and cannot be attributed to the bubble.
If the price is high, there is a bubble, is there a bubble in the 40 US dollar ETH at the beginning of 2017? It has risen 50 times compared to the issue price. In many cases, this is only human nature. We cannot simply judge whether there is a bubble based on the skyrocketing price and the plunge.
3. Is there a bubble in project financing?
So is there a bubble in each segment of the blockchain? Let's compare these parts: head media, mining machine manufacturers, wallet teams.
Blockchain head media: 8BTCnews, so far financing 100 million RMB. As a comparison, the technology-based head media is 36Kr, and so far it has raised 300 million RMB.
Mining machine manufacturer: BITMAIN, $1 billion, F-round.
Wallet team: imToken, this should be no doubt the head wallet app. So far, the financing of 10 million US dollars, A round.
Note: The above data are all from ITJUZI.
The financing data of these head projects is obviously not a "bubble" in terms of their industry status.
As the hottest thing of Internet in 2017-2018, the financing scale of blockchain is very small compared with other industries, such as artificial intelligence, Internet of Things, virtual reality, sharing economy, intelligent hardware, etc. In other words, if we force the blockchain to be classified in the Internet bubble, the scale of blockchain industry is very small.
See the green arrow pointing to the blockchain asset size.
Obviously, putting the market value of blockchain assets into the financial market, its scale is not worth mentioning..
"There will be an interesting phenomenon in the early days of the technological revolution, that is, backward technology will ridicule new technologies. Abacus ridiculed calculator, keyboard ridiculed mouse, mouse ridiculed touch function, touch function ridiculed voice function, naturally breathing ridiculed turbocharger, film ridiculed digital cameras, carriages ridiculed cars, Nokia and Dell ridiculed Apple, paper media ridiculed websites... but new technology will not do this. The mission of new technology is to win the market and eliminate backwards by the way." When new technology comes, there are always people who are afraid of missing opportunities, blindly chasing the wind, and eventually leading to a bubble. However, there is currently no bubble for blockchain -- the most recent innovation in the history of “currency” and “finance”. Even some quality projects are significantly underestimated because of people's panic.
All of the above opinions are not used as investment references and are analyzed by China data. Although there is no bubble in the blockchain industry, it does not mean that there is no risk.
Finally, I share a law for everyone.
| 2019-04-19T03:15:18 |
https://blog.mathquant.com/2019/01/15/the-root-cause-of-the-plunge-is-that-90-of-people-cant-get-out-of-this-strange-law.html
|
0.999861 |
Why do only some people get 'skin orgasms' from listening to music?
Mitchell Colver does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Listening to emotionally moving music is the most common trigger of frisson, but some feel it while looking at beautiful artwork, watching a particularly moving scene in a movie or having physical contact with another person. Studies have shown that roughly two-thirds of the population feels frisson, and frisson-loving Reddit users have even created a page to share their favorite frisson-causing media.
But why do some people experience frisson and not others?
Working in the lab of Dr. Amani El-Alayli, a professor of Social Psychology at Eastern Washington University, I decided to find out.
What causes a thrill, followed by a chill?
While scientists are still unlocking the secrets of this phenomenon, a large body of research over the past five decades has traced the origins of frisson to how we emotionally react to unexpected stimuli in our environment, particularly music.
If a violin soloist is playing a particularly moving passage that builds up to a beautiful high note, the listener might find this climactic moment emotionally charged, and feel a thrill from witnessing the successful execution of such a difficult piece.
But science is still trying to catch up with why this thrill results in goosebumps in the first place.
Some scientists have suggested that goosebumps are an evolutionary holdover from our early (hairier) ancestors, who kept themselves warm through an endothermic layer of heat that they retained immediately beneath the hairs of their skin. Experiencing goosebumps after a rapid change in temperature (like being exposed to an unexpectedly cool breeze on a sunny day) temporarily raises and then lowers those hairs, resetting this layer of warmth.
Since we invented clothing, humans have had less of a need for this endothermic layer of heat. But the physiological structure is still in place, and it may have been rewired to produce aesthetic chills as a reaction to emotionally moving stimuli, like great beauty in art or nature.
Research regarding the prevalence of frisson has varied widely, with studies showing anywhere between 55 percent and 86 percent of the population being able to experience the effect.
We predicted that if a person were more cognitively immersed in a piece of music, then he or she might be more likely to experience frisson as a result of paying closer attention to the stimuli. And we suspected that whether or not someone would become cognitively immersed in a piece of music in the first place would be a result of his or her personality type.
To test this hypothesis, participants were brought into the lab and wired up to an instrument that measures galvanic skin response, a measure of how the electrical resistance of people’s skin changes when they become physiologically aroused.
Participants were then invited to listen to several pieces of music as lab assistants monitored their responses to the music in real time.
Each of these pieces contains at least one thrilling moment that is known to cause frisson in listeners (several have been used in previous studies). For example, in the Bach piece, the tension built up by the orchestra during the first 80 seconds is finally released by the entrance of the choir – a particularly charged moment that’s likely to elicit frisson.
As participants listened to these pieces of music, lab assistants asked them to report their experiences of frisson by pressing a small button, which created a temporal log of each listening session.
By comparing these data to the physiological measures and to a personality test that the participants had completed, we were, for the first time, able to draw some unique conclusions about why frisson might be happening more often for some listeners than for others.
Results from the personality test showed that the listeners who experienced frisson also scored high for a personality trait called Openness to Experience.
Studies have shown that people who possess this trait have unusually active imaginations, appreciate beauty and nature, seek out new experiences, often reflect deeply on their feelings, and love variety in life.
Some aspects of this trait are inherently emotional (loving variety, appreciating beauty), and others are cognitive (imagination, intellectual curiosity).
While previous research had connected Openness to Experience with frisson, most researchers had concluded that listeners were experiencing frisson as a result of a deeply emotional reaction they were having to the music.
In contrast, the results of our study show that it’s the cognitive components of “Openness to Experience” – such as making mental predictions about how the music is going to unfold or engaging in musical imagery (a way of processing music that combines listening with daydreaming) – that are associated with frisson to a greater degree than the emotional components.
These findings, recently published in the journal Psychology of Music, indicate that those who intellectually immerse themselves in music (rather than just letting it flow over them) might experience frisson more often and more intensely than others.
And if you’re one of the lucky people who can feel frisson, the frisson Reddit group has identified Lady Gaga’s rendition of the Star-Spangled Banner at the 2016 Super Bowl and a fan-made trailer for the original Star Wars trilogy as especially chill-inducing.
| 2019-04-20T02:55:30 |
https://theconversation.com/why-do-only-some-people-get-skin-orgasms-from-listening-to-music-59719
|
0.999991 |
I wanted to find out once and for all what separates the winners from the losers at the race track?
If you go to the track on any given day, you will see hordes of people enjoying a day at the races; making bets and yelling their hearts out in hopes that their 'pick' will be the first to the finish line.
If one looks closer you will see another kind of better; a handicapper. A handicapper stands out in the track crowd. The handicapper has come to the track prepared to win. Between races, you won't see them getting up for food or drink. Their faces are buried deep into the horse better's bible; "The Daily Racing Form". A true horse handicapper derives much of their skill for picking winners from studying "The Daily Racing Form".
The Daily Racing Form is the only daily publication that is strictly geared to the horse racer. The Daily Racing Form has been around since 1894. Its headquarters are in Chicago, Illinois. The first publication printed on November 17,1894 was only four pages long. It was and remains today the number one "America's Turf Authority' publication. Over 112 years later, the Daily Racing Form has evolved into a complex newspaper which publishes all the needed statistics for handicap races across the United States, along with insightful editorials on the world of racing. The paper publishes daily with the exception of Christmas day.
When polling several handicappers on what kind of race they prefer to bet on, all agreed: "a stakes race."
Stakes races occur annually, like the Kentucky Derby or Belmont Stakes. These races carry large purses, so they ultimately attract the cream of the crop in horses, jockeys, and trainers. As one handicapper told me, "There are fewer surprises'the talent is there'ripe for the picking."
Other forms of races include claiming races. Claiming races are the most common types of races at the local track. In a claiming race, every horse on the field is up for sale. A price is pre-established by the owner(s) before the race begins. A horse may be claimed for its entered price by any other licensed horse owner. This transaction is done through a racing secretary. Once the race is over and a horse has been 'claimed', the ownership of the horse is then transferred to its new owners. A claiming race evens the running field, as an owner would not enter a horse that is worth a greater value where the horse could be claimed at low value.
When handicapping a claiming race, I was told it is important to review past performance, jockey, and track condition. Does the horse prefer a dry track verses wet? Has the jockey been doing well with the horse?
Another type of race is the maiden race. This is the handicappers least favorite. A maiden race is made up of horses that have never before won a race.
Last but not least is the allowance race. The allowance race is where the Track Handicapped (Track Secretary) sets the conditions and the type of horses that can be entered into the race.
The handicappers I had the pleasure of spending the day with strongly advise: "Collect information, rely heavily on the performance of a horse, get to know the better jocks and trainers, and always refer to the Daily Racing Form. Oh yeah, and have the guts to put your money on the nose."
Sharon Stajda loves the thrill of a day at the races. For more information on horse racing, visit Horse Racing or Fundamentals Of Handicapping.
| 2019-04-25T21:40:16 |
https://articlesurfing.org/sports/a_day_at_the_races.html
|
0.999996 |
Media / News As pecking orders go among cities, what's the place of Chicago?
Reading the comments that follow my first Bleader post on Rachel Shteir's notorious book review, I spotted this intriguing observation.
It's not unusual for people to look for rivals (real or imagined) to measure themselves against or to strive to outdo. Many Chicagoans look at the bigger, more prominent NYC this way; when it comes off as needy and defensive, it's not attractive. But Chicago is hardly alone in this dynamic. St. Louis feels this way about Chicago, Kansas City feels this way about St. Louis, Wichita feels this way about Kansas City.
Where would the world be without the hierarchies that define the place of corporals in combat and salarymen in Tokyo? Yet I think the thoughtful author of the above would agree that the dynamic is not simple. For instance, what is this defensiveness that Shteir's review unleashed? Is it Chicago's defensiveness about New York, or its defensiveness when accused of being defensive? It's one thing for us to be obsessed by the bigger city, but another to feel just competitive enough with it that when we're accused of being obsessed it drives us a little nuts.
I know how I feel about New York. My brother Pete likes living there as much as I like living in Chicago, and that's good enough for me. It's a great place to visit, as are London and Paris, and when I come home from any of these places I'm not so much grateful to be home as grateful that home is a place that's not diminished by the more universally acknowledged great cities of the world.
But if Chicago dispenses Kool-Aid, I haven't drunk it. As a boy, I spent several years as an American in Canada, feeling like an outsider there, and after our family returned I felt like an outsider in the States. It was a healthy development—it's good to learn at an early age that who you are and where you live are two separate things. But let's talk about the relationship between Chicago and Saint Louis, which after Canada became my hometown. Starting out in journalism, I was the night man at the UPI bureau in Saint Louis. We answered to Chicago, and when matters had to be discussed, I got on the phone with Benjamin, the night man in Chicago. He was just a voice to me, but a voice that rang with imperial authority. I deferred to his every judgment. For so the world was ordered.
Kansas City was another matter. Oddly enough, within the constellation of UPI bureaus, Saint Louis was also outranked by Kansas City. My boss despised Kansas City, and in the two-plus years I worked for him, I never heard him say a single good word for the man who ran that bureau. Kansas City was a cow town. Saint Louis was a city with a rich and luminous culture that had already given the world T.S. Eliot and Tennessee Williams and Marianne Moore and Eugene Field and now was showering it with the likes of Stanley Elkin and William Gass. To be honest, I'm pretty sure my boss had never heard of some of these writers, or read any of them. But I had. I adopted his prejudices and put a tony gloss on them.
Saint Louis has not forgotten the 1904 World's Fair, and does not take kindly to the notion it's been all downhill since. The World's Fair established once and for all the notion—ratified by the 1944 movie Meet Me in the St. Louis—that there was nothing of consequence to be found in New York (much less Chicago) that Saint Louis didn't have as well. Saint Louis was not only the Gateway to the West but also the gateway to the south, which meant, of course, that on the far side of those gateways it was the gateway to the east and north. The only other city on earth that could make such a claim was Oz.
Kansas City was a place you went through if perchance you had business in Omaha.
So it's not, I think, that Kansas City feels defensive about Saint Louis. Saint Louis feels wary about Kansas City. And it's not that Saint Louis feels defensive about Chicago. Saint Louis simply defers to it, grandly thinking of itself as the midwest's Pippin to Chicago's Jordan. Here is a telling example of the true dynamic. The federal government is spending $1.2 billion to connect Chicago and Saint Louis by (sort of) high-speed rail. Saint Louis's role in this gargantuan capital investment is to provide the gleaming new tracks from Chicago with a destination. Otherwise, they would simply go out of town a few miles, make a circle, and come back. Chicago could not be Chicago if Saint Louis were not down the road being Saint Louis. It’s a crucial role, and my hometown is cool with it.
And it's not that Chicago feels defensive about New York. Most Chicagoans are just fine with New York. Shteir's review and the more vituperative reactions to it share the same deficiencies: lack of a sense of perspective, a sense of proportion, and a sense of humor. It's unfortunate, for the point of living is to outgrow these wacky imbalances.
As a postscript, I want to mention that when I moved to Chicago I got to know Benjamin as something besides the Voice of Rome. He's a good guy, and we're in a book group together. And the year after I moved here, my cousin Pam married the son of the hated bureau chief in Kansas City. The whole family's lovely.
| 2019-04-25T15:56:51 |
https://www.chicagoreader.com/Bleader/archives/2013/04/26/as-pecking-orders-go-among-cities-whats-the-place-of-chicago
|
0.996995 |
For a lot of young bands, the classified ad that assembled the troops is easy to conjecture. ("Influences: Dinosaur Jr, Sonic Youth, Pavement," that sort of thing.) But what pitch could possibly have brought the five members of Southern California's Blind Melon together? "We have: a raspy singer who can't carry a tune and an obnoxiously condescending name. We need: two bland guitarists (one rock, one folk) and a rhythm section that can mess up Jane's Addiction thrash and white-boy funk and is willing to sit out the acoustic numbers."
Its inexplicable success (much of which can be attributed to the popular bee-girl "No Rain" video) aside, Blind Melon is a complete mess. The band switches derivative idioms at will, bringing an equal absence of originality, intelligence and skill to riffy Led Zeppelin thump ("Soak the Sin"), jam-band partydown syncopation ("Tones of Home," "Time"), hippie-dude fake folk ("Change"), Allmanesque boogie ("Holyman"), Dead-like aimlessness ("No Rain") and vintage folk-rock ("Deserted," "Sleepyhouse"). Where other groups might inject their own sound into such an assortment of genres, Blind Melon roots around in search of an identity and comes up empty. The band's songwriting is lazy, amelodic and shapeless; the trippy lyrics do their signifying without the inconvenience of substance. Rick Parashar's co-production is hopeless. Worst of all, Shannon Hoon is an atrocious singer, and he's the only distinctive element in a band that seems to have been concocted from a hand-me-down sense of the '60s.
During the three years it took Blind Melon to record a followup, the Change EP appeared as a placeholder: two versions of the titular album track, a couple of dozy acoustic remakes and an idiotic rural version of the Velvet Underground's "Candy Says."
Co-producer Andy Wallace whipped Blind Melon into some sonic shape on Soup, lashing the band's diversity to a cohesive center so the riff flareups and acoustic porch-swings if not the jug-band arrangement of "Skinned" can be understood as oases in the generic melodic rock zone. But while the quintet is able to escape its reliance on obvious influences, it still couldn't come up with much worthwhile material. (This really seems like a case of attempting to milk a bull.) Regardless of the album's carefully fashioned window dressing, the tunes run strictly on energy, as Hoon repeatedly squanders fragments of melody. At best, the lyrics are calculated to disturb. "Car Seat" fantasizes about being buried by one's father; the narrator of "Walk" wakes up "in a pile of puke" and literalizes the expression "bang my head against this wall." "Skinned" threatens to "make a lampshade of durable skin." Suicide fantasies and self-loathing permeate the album, but only one idea carries the weight of real reflective intelligence: in "New Life," Hoon wonders if looking into the eyes of his new baby will "bring new life into me." Evidently not. On October 21, 1995, several months after the record's release, Hoon was found dead from a cocaine overdose on the band's tour bus in New Orleans. His bandmates assembled a third album from their storehouse of unreleased recordings and then called it quits.
| 2019-04-25T04:31:15 |
http://trouserpress.com/entry.php?a=blind_melon
|
0.999997 |
Wayne Williams and Probability Case Study Read the Wayne Williams case study, “The Use of Fiber Evidence” and answer the following questions. 1. 1. What made the fibers found on the victims unusual? They were coarsed and tri- lobed in cross sections. They were also yellow-green nylon fiber which is not common to have. 2. 2. What did the perpetrator do that indicated he was following news coverage of the killings? The killer was dumbed naked bodies into the Chattahoochee River. 3. 3. Why did Wayne Williams become the primary suspect? Yellow-green fibers were found in his house that were found on the victims bodies. 4. 4. What was the probability of finding a house in Atlanta with the same shade of carpet as the fiber found on the victims? The probability of finding a house in Atlanta with the same shade of carpet was 1 in 7,792. 5. 5. What was the probability of finding fibers that matched Wayne Williams’s car in Atlanta? The probability of finding fibers that matched Wayne’s car was 1 in 3,828.
| 2019-04-19T08:24:08 |
https://www.coursehero.com/file/39228005/Copy-of-WayneWilliamsProbabilityCaseStudyQuestions/
|
0.999838 |
Forest Hills Elementary School, where a 5th grader was fatally injured in a fight, scored a 29 out of 100 in its most recent report card.
Forest Hills Elementary School, the South Carolina school where a fifth-grade student was fatally injured in a fight this week, was given an "unsatisfactory" rating with a 29 out of 100 in its most recent report card from the state Department of Education.
What happened to Raniya Wright at Forest Hills?
The school drew national attention this week after a student injured in a classroom fight collapsed and later died, according to the Colleton County School District and a Colleton County Sheriff's Office incident report.
The Colleton County Coroner's Office identified the girl as 10-year-old Raniya Wright. She had been receiving treatment at the Medical University of South Carolina after the fight on Monday. She died Wednesday.
The incident is still being investigated and an autopsy is scheduled for 9 a.m. Friday. An incident report describes what happened as a simple assault, and a student involved has been suspended from the school, according to the school district.
What are the key stats about Forest Hills Elementary?
Forest Hills Elementary School is one of five elementary schools within the school district.
There were 665 students at Forest Hills Elementary School during the 2017-18 school year, according to the school's report card. There were 143 students in the fifth-grade class.
The school had a student-to-teacher ratio of 21 to 1. That's higher than the 15-to-1 student-teacher ratio average for elementary schools in South Carolina, .
An unsatisfactory rating means that the school's performance fails to meet the criteria to ensure all students meet the profile of a high school graduate in South Carolina, according to the report card.
Eighty-five percent of the student body was identified as being in poverty, up from 84 percent in the 2016-17 school year.
Forest Hills scored a "below average" in the areas of academic achievement, preparing for success and student progress in the report card. The English learners' progress scored "average" while school quality scored "unsatisfactory."
Before Raniya Wright died, how safe was Forest Hills Elementary?
Classroom environment, school safety and financial data had no ratings.
There were four incidents of threats of physical attack without weapons recorded at the school last year, according to data reported to the incident management system.
The school rated 56 percent for student behavior, which tracks students' positive conduct, effort and participation.
The school had nine inexperienced teachers teaching in core classes, according to the report card.
Who is the principal at Forest Hills Elementary?
A new principal assumed the role at Forest Hills for the current school year, according to the school's website. In his principal's message on the school's website, Matt Brantley wrote that he comes into the position after being an administrator for 13 years and a principal for eight of those years.
"We will make this year one that allows our students to grow in mind, body, and spirit while being supported by the FHE village of staff and families at home," Brantley wrote in his principal's message. "Thank you for putting your trust in us to deliver the type of customer service that our students deserve.
Last year's school report card includes a summary from the prior school principal, Amy Liebenrood, and Sharon Witkin, chair of the school improvement council. The narrative mentions the use of programs outside of just academics to develop children, including the positive behavior interventions and support program that offers rewards to students for displaying positive behaviors.
"At Forest Hills Elementary, we have a dedicated staff, hardworking students, and parents who support us in our endeavor to nurture, inspire, and guide our students so they are successful in tomorrow’s world," the statement reads.
Forest Hills is in Walterboro, which had a population of 5,121 at the 2017 U.S. Census. There were 37,611 residents in Colleton County as of 2017.
Walterboro is about an hour west of Charleston.
| 2019-04-22T08:14:40 |
https://www.greenvilleonline.com/story/news/local/south-carolina/2019/03/28/colleton-county-elementary-school-where-5th-grader-fatally-injured-unsatisfactory-rating/3297334002/
|
0.998394 |
Is Poinsettia Poisonous to Cats?
If the rumors about the beautiful poinsettia plant being poisonous for your cat have deprived you from getting it home, then you need to think again.
Poinsettia (Euphorbia pulcherrima) is a flowering plant native to Mexico, which is typically characterized by its green leaves, red bracts, and yellow flowers. On one hand, it is a popular Christmas plant―thanks to its vibrant red and green colors―on the other, it is allegedly poisonous and thus, fatal for pet animals and humans.
Is Poinsettia Really Toxic to Cats?
The rumor that poinsettia plants are harmful for children and pets can be traced back to an incident in 1919, wherein a military officer's child died due to poisoning and the death was wrongly believed to be caused due to poinsettia leaf poisoning. Since then, poinsettia plants have a earned a bad reputation and are considered as extremely poisonous. According to some researchers, a child will have to eat more than 500 to 600 poinsettia leaves and exceed experimental doses to show any signs of toxicity. As for cats, it can be a little harmful, but not fatal.
The parts of poinsettia that can harm your cat are leaves and stem. The plant contains milky sap that can cause irritation in mouth and stomach. Diarrhea, vomiting, and drooling are some health ailments caused due to the ingestion of this sap. If experts at the Animal Poison Control Center are to be believed, poinsettia plants can cause mild reactions, like gastrointestinal tract irritation in animals, and therefore, pets should be kept away from them. There is no need to banish the plant from indoors though.
How to Prevent Your Cat from Eating Poinsettia?
If your cat is old or if it suffers from some illness, then it may show severe symptoms after ingesting poinsettia sap. So, it's wise to ensure that the cat doesn't go anywhere near the plant. One of the simplest methods to do so, is to keep the plant out of your cat's reach. Since, it's an indoor plant, you can place it in a room that is inaccessible to the cat. Another method is to add plants like cat grass, which are liked by cats. In this way, your cat won't be attracted towards the poinsettia. And if the cat continues to roam around the poinsettia plant, then you will have to keep an eye on it.
What to do if Your Cat Eats Poinsettia?
You don't need to panic if your cat ingests poinsettia sap, as it is not a medical emergency. Remember, poinsettias won't kill your cat! If the cat has eaten just one or two leaves, you don't even have to worry about its health. Usually no treatment is necessary, but it is recommended that you limit the cat's water and food intake for at least two days. However, if the cat has ingested the sap in a large quantity, it is wise to consult a veterinarian. The symptoms of poinsettia poisoning, like vomiting, nausea, and depression, are observed only when large quantity of leaves or sap is ingested.
So, feel free to have your favorite poinsettia in your house. But do ensure that your cat does not munch on it, because even if it is not toxic, it can cause stomach and mouth irritation and affect your kitty's health. Poinsettias show similar symptoms in dogs as well, and therefore, it is better to keep your pet dog away from it.
| 2019-04-19T10:48:31 |
https://catappy.com/is-poinsettia-poisonous-to-cats
|
0.999634 |
Is there a name for this type of system?
Yes, PCV - Positive Crankcase Ventilation.
Why do I want to install one of these?
This will intercept the "oily mist" generated by the engine and prevent the majority from entering into the air intake.
It'll stop the intake from being soaked in oil. If the intake gets coated in oil then so will your intercooler, thereby reducing its efficiency. This will also help to reduce emissions, help to prevent the car from burning oil and may also help to prevent detonation.
Glue, for when cap comes off the can!
The one on the side of the elbow goes away under the intercooler to the other side of the cam cover and into it, and by virtue of the oil inside the pipe, this must be the one!
Glue the lid onto the can, and fit the pipe between the can and elbow.
| 2019-04-25T02:21:30 |
http://gtfours.co.uk/how_to/catch_can/catch_can.htm
|
0.998791 |
Governor John Kasich, shown here in this 2013 photo with Cleveland Mayor Frank Jackson in the background, recently signed a state law banning local governments from requiring contractors on public projects to hire local residents.
CLEVELAND, Ohio - Ohio Gov. John Kasich last week signed a law effectively shutting down Cleveland's longstanding requirement that contractors on public construction projects include local residents in their workforce.
House Bill 180, which was one of a dozen bills that Kasich signed last Friday, bans governments from enacting local hiring laws, such as Cleveland's.
Mayor Frank Jackson, who launched an impassioned campaign to torpedo the bill before it became law, has argued in letters to Kasich that the measure hamstrings the city's economic recovery and undermines efforts to reduce poverty and unemployment. The bill also further erodes the city's home-rule authority - a constant point of contention between city leaders and state legislators.
Jackson said in a statement Friday that the city's attorneys are reviewing the options on what to do next.
What is the city's "Fannie M. Lewis Cleveland Resident Employment Law?"
Named for the longtime Cleveland councilwoman, who died at age 82 in 2008, the city ordinance was enacted 12 years ago to help combat poverty and to ensure that residents participate in the city's economic development - and share in its prosperity.
The Fannie Lewis law requires that on projects of $100,000 or more, at least 20 percent of construction hours be performed by Cleveland residents, with at least four percent of that work done by residents considered to be low-income. Failure to meet the requirements results in a fine equal to 1/8 of one percent of the total contract cost for each percentage by which the contractor misses the goal.
The city could take other legal action, as well, including canceling the contract or blackballing the contractor from working for the city in the future.
Does the Fannie Lewis law affect the competitive bidding process?
No. The local law does not impose conditions on contract awards or requirements on competing bidders. It comes into play only after a contract is awarded and does not give a competitive advantage to any bidder.
How did HB 180 arise?
Ohio Rep. Ron Maag, a Lebanon Republican, introduced HB 180 last year, and Sen. Joe Uecker, a Miami Township Republican, sponsored Senate Bill 152, a companion piece that will expire now that the House bill has been signed.
Maag and Uecker argued that local hiring rules shut out workers in their regions from getting construction work in big cities.
The Ohio Contractors Association and others who felt hiring laws should be banned also contended that such quotas often make it harder for contractors to hire the most qualified workers.
How did Cleveland respond to those claims?
In a May letter to Kasich, calling upon the governor to veto the bill, Jackson pointed out that up to 80 percent of workers on any given construction project can come from outside the city.
Jackson also said that assertions that geographic-based hiring increases project costs or forces contractors to take on untrained workers are baseless. To the contrary, Jackson said, hiring locally eliminates transportation costs. And there are plenty of jobs on any construction project for entry-level workers, who will then gain the skills they need to play bigger roles on future projects.
Put plainly, hiring locally benefits contractors and opens up career paths for the people who need them most, Jackson argued.
Why did Gov. Kasich sign the bill?
Cleveland.com is still trying to answer this question.
In 2014, Kasich came to Cleveland to announce an historic pact with the city. The governor pledged that 20 percent of the $267 million in construction contracts on the Opportunity Corridor would go to minority and disadvantaged businesses -- and at least 20 percent of the workforce on the state-funded roadway would be residents of Cleveland wards adjacent to the project.
He made the announcement during a standing-room-only event in the heart of one of the low-income neighborhoods that hopes to benefit from the construction of the road, which will connect Interstate 490 to University Circle.
City Council President Kevin Kelley said in a written statement last month that signing HB 180 would fly in the face of Kasich's pledge to support local hiring on Opportunity Corridor.
Cleveland.com reached out to the governor's office this week to ask how Kasich reconciles his signing of the bill with his position on using a local workforce to build the Cleveland roadway.
"ODOT is proud of the tremendous progress we've made on the Opportunity Corridor, exceeding expectations. Our commitment remains unchanged and focused on creating opportunity through the completion of this vital project. The intent is to use the Opportunity Corridor to train and develop skilled workers from the area who can continue their careers on projects all over the state. Since federally-funded projects are prohibited from having any type of residency requirement and the vast majority of ODOT projects have some federal dollars involved, HB 180 focuses mainly on projects done at the local level."
| 2019-04-22T19:55:48 |
https://www.cleveland.com/metro/2016/06/ohio_governor_john_kasich_soun.html
|
0.998958 |
An Arkansas judge slammed Johnson & Johnson (J&J), the parent company of subsidiary Janssen Pharmaceuticals, with a $1.2 billion dollar fine after Janssen was found to have engaged in deceptive marketing practices for its drug Risperdal, reports The New York Times.
Not only is the fine one of the largest monetary penalties ever levied upon a drug company, reports The Times, but it also opens the door for many subsequent lawsuits.
"Most attorneys general can do the math, and there's no reason for any state to settle if they can win really big numbers in court," said Patrick Burns of the group Taxpayers Against Fraud, to The Times.
While J&J said it planned to appeal the decision, the company is still facing similar lawsuits in a number of states. The Arkansas case only reflected the company's violations of Arkansas state Medicaid law-240,000 violations in all, reports The Times.
The lawsuits stem from what prosecutors describe as deceptive marketing of J&J's drug Risperdal, then marketed by Janssen.
"Prosecutors have accused J&J and Janssen of hiding the risks associated with Risperdal, which is approved to treat schizophrenia, bipolar disorder and behavior problems in teenagers and children with autism," explained The Times.
"These two companies put profits before people, and they are rightfully being held responsible for their actions," Arkansas Attorney General Dustin McDaniel said in a statement.
| 2019-04-19T05:19:41 |
https://www.raps.org/regulatory-focus%E2%84%A2/news-articles/2012/4/arkansas-slams-j-j-with-$1-2-billion-fine-for-risperdal-marketing-tactics
|
0.999977 |
Why do I need to obtain Animal Ethics Committee (AEC) approval for my research?
All staff and students who will be conducting research or demonstrating teaching projects that involve the use of live vertebrate animals and cephalopods must apply to Macquarie University's Animal Ethics Committee (AEC) for ethics approval.
This includes the use of animals in research, teaching, field trials, product testing, diagnosis, the production of biological products and environmental studies. Observational studies of wildlife also require AEC approval.
Macquarie University encourages collaborative research within and beyond the University, nationally and internationally.
responsibility for ethics and research safety.
In some instances it may be necessary to have a formal agreement between the collaborating organisations. All researchers are encouraged to discuss their potential collaborations with their Faculty Research Manager at an early stage to determine if a formal agreement is required.
Researchers involved in a collaborative research project must familiarise themselves and comply with the written agreement governing the collaboration and all policies and agreements affecting the project.
Researchers must disclose to their collaborators, as soon as possible, any actual or apparent conflicts of interest relating to any aspect of a collaborative project.
Access the AEC application form for collaborative research.
When will my project commence?
Projects involving animals may only commence with approval in writing from the Committee and once an animal research authority (ARA) has been issued for the project.
Approval may also be required from other relevant authorities outside of the University - for example; licences or permits from government departments.
What is an Animal Research Authority (ARA)?
Animal Research Authorities are written official documents of approval issued for specific projects at the time of project approval by an Animal Ethics Committee.
The authorities can only be issued for a 12-month period and will need to be renewed annually during the life of any approved project that runs for more than 12 months.
The Animal Research Act 1985 required that every person undertaking animal research must be the holder of an Animal Research Authority. It is an offence under the Act to carry out research without such an authority.
What is the Autonomous Sanctions Act and how does it affect me?
In 2011 the Commonwealth Government enacted the Autonomous Sanctions Act 2011.
Autonomous sanctions are punitive measures not involving the use of armed force that the Australian Government chooses to take as a foreign policy response to situations of international concern.
The Autonomous Sanctions Act places restrictions on the University's interaction with persons and organisations who are associated with countries on the sanctions list. Find out more about the University's Autonomous Sanctions Act processes as they relate to research.
Who is the Chief Investigator?
The chief investigator is the lead researcher who has primary responsibility for the design, execution, and management of a research project and who will be involved in the project in a significant manner.
For student research projects, the chief investigator must be a Macquarie University staff member. A student researcher may design their research project but the AEC recommends that students work on their ethics application in conjunction with their supervisor. As the student's supervisor is named the chief investigator, students must be guided by their supervisors.
The AEC advises that as the chief investigator has responsibility for their student's research, the chief investigator must read the ethics application thoroughly before signing and submitting the application. All correspondence regarding the ethics application will be sent to the chief investigator and their nominated person primary contact.
letters of approval from organisations assisting the research in any way.
How long does the ethics process take?
From submission to approval may take 3-8 weeks depending on any requests for further information or modifications and the responses received. Please ensure you give yourself adequate time for this process prior to your expected commencement date for your research project.
When are the AEC meeting dates and close of submission dates?
See the meeting dates and cut-off dates for applications.
How and when will I be notified about the Committees decision?
You can expect notification about the Committee's decision within 2-7 working days following the meeting. All communication and notifications from the AEC will be sent via email or the Ethics, Biosafety and other Applications System (Animal Ethics Management System). The Committee may request further information following the meeting, so please remember that the process may take longer depending on the requested modifications and the responses received. Researchers' replies will then be considered by the Committee Executive or deferred to the next Committee meeting for review. Please be aware that this response process takes some time.
What is a conflict of interest and will it stop me from doing my research if I have one?
The Australian Code for the Responsible Conduct of Research (2007) defines a conflict of interest as "a divergence between the individual interests of a person and their professional responsibilities such that an independent observer might reasonably conclude that the professional actions of that person are unduly influenced by their own interests" .
The Code and AEC Terms of Reference advises that measures are adopted by researchers and AEC members to manage conflicts of interest. These measures include disclosing the conflict of interest.. Contact Animal Ethics by email [email protected] for further information.
How do I amend my application once it has received final approval?
Changes to approved applications need to be submitted on the AEC's Request for Amendment form available in application resources.
Changes to applications that need to be submitted for review include the addition or removal of personnel, changed or new technique/s, changes to research locations, the addition of species and animal number etc. Any changes to the AEC approved project will need to be submitted as an Amendment Request. Please note that any changes should NOT commence prior to receiving formal correspondence from the AEC approving your amendment request.
What personnel must be listed on my project?
All personnel involved in your research project who may need to be in contact with your research animals must be listed in your project and your active ARA. This may include associate investigators, research assistants, students, volunteers, and even interns working temporarily on your project.
Each person must be approved by the AEC before they can start working on the project. This approval is based on the qualifications and experience of each person, and the proposed supervision. Attendance at additional training in animal research ethics or animal research techniques may be a condition of approval.
It is important to report any changes to personnel. Changes to personnel are documented by submitting the sub form found here.
How long should it take to review my amendment request?
Amendment requests to add personnel to a project must be submitted using the sub form found in your application in the Ethics, Biosafety and other Applications System (Animal Ethics Management System). The complete forms will be forwarded to the executive for approval and you should receive correspondence from the Animal Ethics Secretariat within 7-10 working days. When approval is granted from the Executive, a renewed ARA with the added personnel name will be issued. This decision will be ratified at the next AEC meeting.
Amendment requests involving removing personnel from a project will be processed using the sub form found in your application in the Ethics, Biosafety and other Applications System (Animal Ethics Management System).
Any other amendment requests must be submitted within your application in the Ethics, Biosafety and other Applications System (Animal Ethics Management System). These other amendment requests will go to the next AEC meeting to be reviewed. If no further information is required, the approval letter along with the renewed ARA will be sent out within 2-7 working days after the AEC meeting.
Urgent minor amendments to existing approved application will be forwarded to the Executive for approval. This amendment will be ratified at the next AEC meeting. For definition of minor amendment, please check the Terms of Reference.
I received a reminder to submit an Annual (Progress) report. What should I do?
The Code sets out that Macquarie University is responsible for monitoring approved research and ensuring that research is conducted according to the approved project. As a condition of AEC approval, researchers are required to submit an annual report informing the Committee on the progress of the research. This is a progress report.
It is the responsibility of the Chief Investigator and a condition of ethics approval that an Annual (Progress) report is submitted. Annual (Progress) reports should be completed and submitted to the Animal Ethics Secretariat annually. If an Annual (Progress) report is not submitted to be approved by the AEC prior to expiration of the current ARA, this ARA may be suspended by the AEC and no further work can be conducted on the research project.
Can the AEC suspend my research project?
Yes, under the Australian code for the care and use of animals for scientific purposes, 8th Edition (2013) (the Code) and the AEC Terms of Reference, the AEC may suspend a research project following the review of an annual report or a possible breach of the Code.
| 2019-04-25T11:50:21 |
https://www.mq.edu.au/research/ethics-integrity-and-policies/ethics/animal-ethics/animal-research-ethics-faqs-research-office
|
0.999596 |
1. Many Wigan fans may have travelled over the Pennines with hope rather than expectations.
And when they arrived and discovered Zak Hardaker had withdrawn for family reasons - taking the number of absent frontline players to nine - they probably got what they expected: another narrow loss, Wigan's seventh in 10 games, which leaves them just two points above bottom-club Leeds heading into the packed Easter schedule.
2. Wigan did well to survive an early onslaught and lead 4-0 at the 36th minute mark.
But, incredibly, Wakefield scored three tries before half-time - and added another just from the restart - to rack up four tries in six minutes of play and take a 22-4 lead.
Let's repeat that - four. Tries. In. Six. Minutes.
It was an astonishing lapse of concentration from the Warriors, littered with some soft defending; it looked as if they were playing touch rugby as David Fifita stormed down their right edge to set-up a try.
That small window proved hugely significant because either side of that six minute spell - both before and after - Wigan scored the more points, but the damage had been done.
Joe Shorrocks became the third academy-graduate to earn a debut this year, coming off the bench for an industrious spell. And another teenager, Morgan Smithies, was one of Wigan's best players - all energy and aggression.
4. Trinity coach Chris Chester accused Wigan of "naughty" tactics during the game.
He said there were were a few "challenges where players attacked the knees".
"As soon as that is eradicated the better because it was ridiculous," he said. "I thought it could have been dealt with better."
Lam, his former Wigan team-mate, said he didn't notice any illegal play and thought the challenge which led to Sam Powell being placed on report was fine.
The match review panel will scrutinise the game on Monday... Lam could do without any suspension worries ahead of the Good Friday derby.
5. Chester was disappointed because he had lost four players to injury during the match - the last just after the hour-mark.
And Wakefield deserve plenty of praise for doing it tough without any substitutions by the end, forcing Fifita to motor through 80 minutes - a huge effort from the big man.
"It was an unbelievable effort," said Chester. "I tried bringing him off after 60 minutes and he gave me the death stare, so I thought I'd bring someone else off!"
Fifita is out-of-contract later this year but Chester says he is confident he will sign a new contract within days.
| 2019-04-25T23:50:49 |
https://www.wigantoday.net/sport/rugby-league/wigan-warriors/wakefield-trinity-30-wigan-warriors-20-five-things-we-learned-1-9710123
|
0.999786 |
Seo é an Ráiteas Príobháideachta ar BNR Watersport vof (kvk nr .: 37128682), atá cláraithe i Egmond aan Zee (NL). Is é BNR Watersport ná príobháideachas a chuid úsáideoirí ar a láithreán gréasáin agus cinntíonn sé go gcaithear go pearsanta agus rúnda sonraí pearsanta a thugann tú dúinn. Nuair a chuireann tú sonraí pearsanta faoi bhrnwatersport.com, seasann tú go mbainfidh BNR Watersport úsáid do shonraí pearsanta i gcomhréir leis an PrivacyStatement seo.
Cén fhaisnéis a theastaíonn uainn uait?
Cad é an cuspóir atá leis an fhaisnéis seo a phróiseáil?
Trí fhoirm a chomhlánú ar an láithreán gréasáin, aontaíonn tú maidir le do shonraí pearsanta a phróiseáil ar mhaithe le d'ordú a dhéanamh. Ní mór dúinn an fhaisnéis seo chun dearbhú a sheoladh chugat, chun costais iompair a ríomh, sonrasc a sheoladh chugat agus chun tú a thabhairt cothrom le dáta faoi stádas seachadta do phacáiste. Ní úsáidfear do shonraí pearsanta chun críocha eile, ach amháin má thugann tú cead athnuachana é sin a dhéanamh.
Ní chuirfidh BNR Watersport do chuid faisnéise ar fáil do thríú páirtithe gan do chead, ach amháin más gá do thríú páirtí - mar chuideachta iompair - do shonraí pearsanta an t-ordú a fhorghníomhú.
Suíomh Gréasáin BNR Watersport (www.bnrwatersport.com) faoi dheimhniú SSL chun a chinntiú nach mbeidh do shonraí pearsanta le feiceáil do dhaoine eile.
Riaracháin - ina bhfuil sonraisc agus comhaontuithe le hainmneacha agus seoltaí le feiceáil - atá stóráilte go sábháilte i gcartlann daingnithe ar feadh tréimhse ama (cáin) a bhfuil dualgas orthu dlí.
Tá gach teachtaireacht ríomhphoist á shábháil i dtimpeallacht daingean (ar líne).
| 2019-04-22T12:27:14 |
http://ga.bnrwatersport.com/privacy-policy.html
|
0.999988 |
Title (deu): Kinder und Radio - ein Anachronismus?
fortschrittlicher: In Deutschland und Großbritannien etwa gibt es eine Menge bestens funktionierender Angebote und sogar eigene Radiosender nur für Kinder. Auch in Österreich waren Kindersendungen von Anbeginn des Radios über Jahrzehnte hinweg ein fixer Bestandteil des Radioprogramms, bis sie in den 80ern und 90ern kontinuierlich abgebaut wurden. Die österreichische Zurückhaltung ist kaum verständlich, beweisen doch Studien, dass Kinder auch heute noch gerne Radio hören und sich sogar kindgerechte Programme wünschen. Radiohören wirkt sich zudem positiv auf die kindliche Entwicklung aus und das Recht der Kinder auf ein eigens für sie gestaltetes Radioprogramm lässt sich sowohl aus der UN Kinderrechtskonvention als auch aus dem ORF-Programmauftrag ableiten. Bei der Gestaltung eines Kinderradioprogramms sind einige wichtige Rahmenbedingungen zu beachten: Diese sind einerseits pädagogischer Art, wenn es darum geht die Beiträge und Sendungen auf die Bedürfnisse und Fähigkeiten der Kinder abzustimmen. Andererseits gibt es wirtschaftliche Rahmenbedingungen wie die mangels finanzieller Mittel erschwerte Öffentlichkeitsarbeit oder die Frage nach Notwendigkeit und Vertretbarkeit von Werbung in Kinderprogrammen. Alternative Finanzierungsmöglichkeiten können helfen, Werbeeinschaltungen zu vermeiden. All diese Aspekte werden in dieser Arbeit aufgegriffen und erläutert. Ein zentraler Punkt der Arbeit ist außerdem ein selbst erstelltes Konzept für ein Kinderradioprogramm, bestehend aus täglichen Sendeschienen in einem Erwachsenenprogramm, das durch einen Ausblick auf ein mögliches 24-Stunden-Vollprogramm für Kinder abgerundet wird.
Description (eng): Although children can choose from a great variety of different media nowadays, radio programmes for kids are a rarity in Austria. Particularly the commercial radio stations show a lack of children’s programmes, but also the ORF radios are far away from fulfilling the Programme Mandate which prescribes a “due regard for all age groups”. Other European countries are more progressive: Thus, in Germany and Great Britain there are many successful radio programmes and even special radio stations for children. From the emergence of radio in Austria in 1924 radio programmes for kids were a matter of course and maintained this status for decades. However, in the eighties and nineties the ORF started to concentrate on developing children’s television programmes. As a consequence, kids’ radio gradually disappeared. The reserve of the Austrian radios towards kids’ programmes is hardly comprehensible, as surveys proved that children still like listening to the radio and that they wish for suitable radio programmes. Listening to the radio even has positive effects on their development. But most importantly, children have a right to radio programmes tailored to their needs. This right derives from the Convention on the Rights of the Child as well as from the ORF Programme Mandate. When it comes to creating a children’s programme, some important surrounding conditions have to be taken into consideration. On the one hand, there are pedagogical conditions which are vital for aligning the contents with the children’s needs and abilities. On the other hand, there are economic conditions, for instance public relations with little financial means or the question whether commercials in children’s programmes are necessary and ethically justifiable. Concerning this matter, alternative financing sources could be a sensible solution. All these aspects are covered in the diploma thesis. Moreover, another central part is a concept for a children’s radio programme, consisting of daily entities for children in a regular programme. Finally, the diploma thesis is rounded off by an outlook on a round-the-clock radio programme for children.
| 2019-04-18T14:38:53 |
https://phaidra.fhstp.ac.at/detail_object/o:2421
|
0.999501 |
Mixed reviews haven't stopped Bats Vs Sups from gaining significant box office, but most of us would probably agree, that something was missing from this heroic adventure. I go in search of what went wrong, with one of the most anticipated films of the year?
There hasn't been a film like Batman Vs Superman: Dawn of Justice, that has split both public and professional opinion since...since I don't know - The Blair Witch Project. Some are adamant that the film is absolute rubbish, others seem to find it thoroughly enjoyable. But straight of the bat (no pun intended) I can't think of a worthy DC or Marvel film to even compare it to. I mean, it's more watchable than the likes of Iron Man 2, but in terms of never delivering total satisfaction, it's more in line with Ghostrider, just with a bigger budget and with very different art direction.
So what are the good and bad points about the film?
Firstly, I still haven't read a single review, these are my personal opinions influenced by none other than the film.
"Lex Luthor just made me wanna give him a backhand followed by a 'shut up - byatch!"
Eisenberg...hmmmm, what can I say? Whilst I appreciate an actor putting their own spin on a character, Lex is supposed to be a cold villain, charismatic, but glacial with it. Where as here, Eisenberg's Lex Luthor could have given Deadpool a run for his money when it came to his motor mouth forever flaberjabbing, a new word I just invented to mean talking a lot. Lex Luthor just made me wanna give him a backhand followed by a yelling of 'shut up - byatch!' His teenage demeanour just doesn't place him to be anyone's nemesis except to a fellow spelling bee competitor. Regarding Wonder Woman, I was openly against Gal Gadot's casting as the Themysciran wonder, but admittedly, as the civilian Diana she was good, as Wonder Woman, she doesn't have the physique (something she could have changed alongside Ben and Henry) and she doesn't exude the pinpoint focus, straight talking, mama don't take no mess, that Wonder Woman has. Wonder Woman doesn't give smug grins when she's fighting - I have never seen Wonder Woman enjoy a battle. Amy Adams as Lois Lane was fine, she was just an emotional cue, but still had more dimensions than Kal-El.
World Without A Superman and The Return of Superman. You don't just chuck one of the most significant deaths in comic book history at the end of a completely different story! Come On! The origin story of Doomsday is a revelation in itself. Made by Kryptonian scientists, he is an experiment, a created being that is made, then taken out and left in an intensively harsh environment with killer creatures around. If the climate doesn't kill him, then the creatures would. This being is subjected to this and killed 100s and 100s of times. Each time he is killed, his leftover body/DNA would be scooped up by the scientists and the 'material' would be used over and over again to eventually create a being that could withstand the 2 main threats of the planet. But more importantly, it leads to Doomsday only being effected by a killing assault one time, then after that he adapts like the Borg. That story can be seen in Hunter/Prey. If the production team wanted to do a story of Superman's demise, that epic tale should have spanned the next 3 Superman movies.
When I watch a Bruce Lee or Fred Astaire film, I can see what actions they are performing because the editing never obscures the action and that type of limited editing is not there by accident. Whereas the final fight in this film did my head (and my eyes) in, because the cutting was too Jason Bourne, but at twice the speed. The standout fights were between Batman and some thugs he had to get through in order to save the 'other' Martha. And one of the Caped Crusader's dream sequence, which shows they could produce visually appealing fights. Script wise nobody said any lines that made me wince, so I'll give the lyrics a pass. In the first half of the film, the mostly talking, non-action half, we have a good dramatic watch. It is when Zack Snyder gets to the second half that we have a horrid and weird mixture of corniness and brutality. Zack is the man that made the unfilmable comic Watchmen filmable and made it well. The man that gave us the visual stunning Suckerpunch and 300. And of course gave us Man of Steel. So why has super-powered action suddenly become a mystery to him. You know, sometimes less is more, less can still be a filling meal and more is on the edge of pushing for a vomit session...sorry.
Batman Vs Superman is not rubbish, Iron Man 2 is rubbish, this film is flawed, a little bit of re-editing, re-casting and another villain to unite the 3 main heroes and this film would have been cool. Overall I came out of the cinema thinking that this was a wasted opportunity, I wasn't insulted, I didn't feel that I had just watched John Carpenter's Vampires, it just didn't hit all the marks like Man of Steel. In fact it made me want to go back and watch that film instead.
| 2019-04-24T20:18:16 |
https://www.thatdudedlambert.com/homefilm--tv/category/batman
|
0.990708 |
I have been asked to respond to your letter of June 3, 1988 inquiring about the deposit insurance that would be afforded by the FDIC to certain certificates of deposit purchased by *** in the secondary market and then sold, in smaller units, to customers of the bank. I sincerely apologize for our delay in responding to your inquiry.
In your letter, you describe a plan under which a securities broker obtains a $1 million certificate of deposit ("CD") from a bank (the "issuing bank") and registers the CD in the broker's street name on the issuing bank's records. The broker then sells the CD to your bank which, in turn, sells smaller portions of the CD to its customers. You indicate that, although the CD will be registered in the broker's street name, there will be no reference to the nominee status on the CD. You further indicate that the broker will not inform the issuing bank either by letter or in any other fashion that the CD is held for resale to other parties.
The four questions posed in your letter might be summarized as follows: What is necessary to satisfy the FDIC's recordkeeping requirements so as to obtain separate insurance coverage, of up to $100,000, for the interest of each of *** customers in the CD on a so called "pass-through" basis? The answer depends on whether the CD in question is negotiable and whether it has been properly negotiated to *** prior to the time the issuing bank is closed. If the CD is negotiable and has been properly negotiated to your bank prior to the time the issuing bank is closed, then 12 C.F.R. § 330.11 dictates that ". . . the owner of such deposit obligation will be recognized for all purposes of claim for insured deposits to the same extent as if his name and interest were disclosed on the records of the bank. . . ." Under this provision, once a CD has been negotiated to *** there is no need to alter the issuing bank's records to disclose the fact that the CD has been negotiated to *** or that *** may be holding the CD in some representative or fiduciary capacity on behalf of its customers (the beneficial owners). The interests of *** customers in the CD will be recognized, for deposit insurance purposes, so long as the records of *** disclose the names and interests of such customers. The FDIC will provide pass-through insurance coverage for the interests of *** customers notwithstanding the fact that *** name, and the names and interests of its customers, are not ascertainable from the records of the issuing bank. If, however, the CD is acquired directly from the issuing bank, and not by negotiation from a third party, then certain additional recordkeeping requirements must be satisfied in order to obtain pass-through insurance coverage for the beneficial owners of the CD. In such cases, the representative capacity in which the nominal owner holds the CD (e.g., as agent or trustee) must be disclosed on the deposit account records of the depository bank. 12 C.F.R. § 330.1(b)(1). Moreover, the details of those relationships and the interests of other parties in the account (the beneficial owners of the funds) must be ascertainable either from the records of the bank or the records of the depositor, maintained in good faith and in the regular course of business. 12 C.F.R. § 330.1(b)(2).
In summary, if the CDs in question are negotiable and are, in fact, negotiated to *** prior to the time the issuing bank is closed, the FDIC will provide pass-through insurance coverage (recognizing the beneficial ownership interests of each of *** customers) notwithstanding the fact that the CDs are registered, on the issuing bank's records, in a broker's street name, provided that *** records disclose the names and interests of those customers. If, however, the CDs are acquired directly from the issuing bank, and not by negotiation from a third party, then just the broker (not *** or the beneficial owners of the funds) will be insured up to $100,000, unless the aforementioned additional recordkeeping requirements for providing pass-through insurance coverage are satisfied.
| 2019-04-19T04:22:24 |
https://www.fdic.gov/regulations/laws/rules/4000-3450.html
|
0.999999 |
The all-to-popular office practice of scanning and saving a document to a hard drive without a system of tracking and retrieval is little more than the electronic version of boxing paper and stacking it in a closet. Even though once the scan and save is complete, one may feel satisfied that an effective backup is done, that feeling is a false sense of security with potentially disastrous results.
This brings to mind the consequences of scanning and saving without a tracking and retrieval system experienced by a Little Rock customer. They were scanning and storing their records on several hard drives in their network. A staff member attempted to load some new software into their systems and in so doing accidentally deleted more than 400,000 documents. The IT manager wasn’t told what the content was on the drives and by the time they caught the error, it was no longer feasible to recover the lost information from their backups.
That’s a shame, and is preventable, because most businesses and professional practices today have the hardware technology in place to implement effective records management, but they are not taking full advantage of what they have.
Declare the record. Not all documents are records. An email deciding where to go to lunch does not need to be retained. An email confirming a purchase order for equipment does.
Classify the record. Once a document is declared a record, you must attach a retention period with it. Work orders, for instance might be stored for 3 years after the job is complete. Health records might have to be stored for 10 years.
Store the record. The electronic record must be stored, and at the same time, made available for staff to utilize it and accomplish “work”.
Protect the record. The record HAS to have integrity. It can’t be altered or destroyed during it’s useful life.
Enforce the retention and disposition. When it is time for the record to be moved from “active” status to “inactive” status or destroyed, the system must facilitate this process.
With a proper records management systems you can eventually destroy unneeded records or even archive them, if that is your choice.
The good news is, you do not have to figure out how to do all this on-your-own. We provide software, training, and support to effectively streamline records management for virtually any operation. With effective records management, the ultimate benefit is you free up staff time and company resources to do more of what you do best.
| 2019-04-24T08:05:37 |
https://arkansasrecords.com/scanning-saving-is-not-enough/
|
0.999108 |
Whether you fervently believe that concept of race, racism and the notion racial superiority as a social, political, and economic instrument began with the importation of Africans as slaves to the New World by means of the Trans Atlantic Slave Trade; or that racism made its first appearance within the ancient Roman Empire with Emperor Tacitus, or that the notion of racial superiority began when Emperor Constantine commenced the rewriting of Christian doctrine at the Council of Nicea 325AD (modern day Turkey) and changed the deities that were formerly represented as Black to reflect a European image of Christendom which similarly propelled people of Caucasian descent to the position of alleged racial superiority, or have absolutely no concept of it’s nefarious origins; it remains undeniable, that the immoral influence of race categorizations and racism has been utterly devastating on the cultural relationships of the human family.
From a historical perspective the practice of race and so-called racial superiority was non-existent when juxtaposed with what we bear witness to today. In fact, author and historian Basil Davidson cites in his book titled; “Africa in History”; that the Greeks held the Africans of the ancient Nile Valley civilization in extremely high esteem and would never contemplate judging them according to their skin color or ethnicity.
Moreover, the ancient Greeks were completely dependent on the ancient Egyptians for their education and intellectual advancement in the areas of; religion, philosophy, metaphysics, mathematics, medicine, architecture, agriculture, engineering, the culinary arts, and much more.
"Greek civilization derived its religion, its philosophy, its mathematics, and much else from the Ancient civilization of Africa above all else from the Nile Valley in Egypt. To the founding forefathers in classical Greece, the notion that the Africans were inferior, morally or intellectually would have been seen as absurd."
So where did the concept of race and the notion of racial superiority begin?
An array of historians and intellectuals have deduced that one of the first forms of race based categorizations dates back to the rewriting of Christian doctrine by Emperor Constantine at the Council of Nicea in 325AD; and was subsequently followed by the Roman Catholic church in 1411AD with the institutionalized concept of racial inferiority; when Bishop Bartholomew de Las Casas on the island of Hispaniola (modern day Haiti and Santo Domingo) reduced black people to infidels in order to justify the enslavement of Africans.
Most scholars likewise concur, that the concept of race, racism and the fallacy of racial superiority was born entirely out of a European consciousness, coupled with a pretext for self-preservation.
A) Where did the pseudo-scientific philosophy of race begin?
B) Who implemented this despicable practice?
C) Why was the system of race classification put into practice?
D) Why haven’t effective solutions been formulated to educate the origins of alleged racial superiority, and to eradicate this tainted notion.
What's more, while many Caucasians continue to proclaim that the decadent system of racism is a manifestation of their forefathers, who are now all deceased; and that the current generation did not create this despicable dilemma and therefore should not be held responsible for it; I propose these questions.
A) Who are the benefactors of a system based on race classification and so-called racial superiority?
B) Are the problems of racial strife and the notion of assumed racial superiority genuine in American society? Then to knowingly benefit from a decadent system predicated on hypothetical racial superiority and do nothing about it, makes that person part of the problem, not the solution.
Moreover, rather than decrying foul or reverse racism over diversity in action programs which are still essential in America’s racially polarized economic and social society, or at the slightest advancement of people of color; more specifically African Americans over their Caucasian counterparts; it is incumbent upon the progenitors of this disease to actively participate in extinguishing this highly combustible predicament that was born solely out of European ideals and cultural practices, coupled with the proclivity for self-preservation at the expense of the human family.
“He who passively accepts evil is as much involved in it as he who helps to perpetrate it. He who accepts evil without protesting against it is really cooperating with it”.
The manipulation of race and racism as a socioeconomic and political instrument has been strategically applied to particular segments of American society for far too long. It is time that “We the people” of the United States of America judiciously deal with the matter of racism straightforwardly.
America and the rest of the European world can no longer present themselves as the moral beacons of the world without putting forth concrete measures to education, and eradicate the contaminated “pseudo-scientific philosophy”, and practices of racism in the 21st century.
By Professor Frank M. Snowden, Jr.
| 2019-04-20T20:57:18 |
http://timbooktu.com/m_quinn/fallacy.htm
|
0.999999 |
There are many random visitors -- They just click upvote for the first answer (even sometimes without reading it fully) and move on to something else.
To avoid this, can the answers be shuffled in a semi-random fashion.
This would avoid the extra upvotes by random strangers even though answer is not okay. Am I correct?
Ironically, I agree with your solution but not some of the reasoning.
Are votes biased toward the first answer?: I suspect the answer to this is yes. I say this partially because it's flattering to myself, where many of my answers are decently voted, but neither the first, nor top voted/accepted answer. But I also suspect it's true - and indeed catch myself doing it from time to time, especially on CrossValidated.
I am not convinced at all that this behavior is confined to "random visitors", nor that if we had fewer random visitors this wouldn't be a problem.
Your proposed solution would not avoid extra upvotes - it would just distribute them randomly. Essentially, every answer to the question would get a share of "random visitor welfare votes" instead of concentrating them in the first answer.
Whether this would help decrease the votes to "not okay" answers would depend on whether or not first answers are more (or less) likely to be lower quality. I'm also not convinced this is true.
TL;DR: I like the idea of randomizing answer order, but I think some of your underlying premises are flawed.
Which of these posts should be deleted?
What to do with quite substantial edits in the review queue?
| 2019-04-19T22:24:01 |
https://academia.meta.stackexchange.com/questions/3826/are-upvotes-skewed-towards-the-first-answer-to-a-question
|
0.999111 |
This week, students learn about Ruby Bridges, who integrated a school in first grade. First, they read the article to themselves, Second, they partner up. Partner A: reads aloud while Partner B: follows along. Then they switch roles. The student hears the article three times before they fill out the questions in the back that asks about the headline, photo caption, quotation marks, How does Ruby feel about kids today, and What is the main idea of the article? I really like how the questions focus on what they read and of the layout/organization of an article.
students are completing a 2 week unit on Robotics. They will first Read and Learn about Robotics, then learn about Engineering and they will finish the unit with creating robotic legos. Today the students watched a video about the history of robotics. As a group, they answered the questions on the handout that was given to them in reference to the video. When they finished, they discussed the things they learned in the video. I really like how they are using intervention time to read about something new and interesting. Here the students are learning through reading. They have been so busy learning to how to read they begin to reap the benefits of what readers can do!
Completion of the Chart on Tsunamis, Earthquakes, and Tornados. Final attempt for all students to ask questions to gain enough information for their Google Slides presentation on Natural Disasters.
| 2019-04-23T16:19:27 |
http://www.readwritesparklecoffee.com/2018/02/pre-internship-monday_26.html
|
0.99759 |
By the end of this course, students should be able to describe and explain mechanisms that enable neural circuits to assemble during development.
By the end of this course, students should be able to generate hypotheses, design experiments, and evaluate data.
By the end of this course, students should be able to critically analyze primary research papers in the field of neural development.
By the end of this course, students should be able to engage creatively and actively during lecture and in section.
| 2019-04-19T08:59:18 |
https://exploredegrees.stanford.edu/courseeval/22229/
|
0.998882 |
Canon MV30 When recording a tiny white spec seems to be recorded, even when taking stills. I have been told that it is a problem with the sensor? Any advice? Is there a cheap way of fixing it?
It is possible that the dead pixel is actually on your LCD screen, not your sensor. If so, the spot is not being recorded and will not show when when viewing the content on a TV, computer etc (anything but the LCD).
Question : Can Canon Repair this defect ??
I have found several other people with the same problem Canon ZR60 won't record ,only get a black screen ,only a few years old with less than 75 hours use .Can this be fixed free from Canon .
Hi - Canon has an advisory on this and may still fix that particular problem well past the warranty expiration date. You should check their website.
Yes. Just replace the batteries. If you're still getting the same issue even after replacing the batteries, then toy might be defective.
It looks like it is Empty from the Video, Are you sure you are not understanding what you are looking at?
Sometimes the sdcard is to slow. I would buy a different faster card and see if that solves your problem.
Hi, You can check you the connectios or the mic. remember that the mic is too sensitive, you can adjust it with the nobb on the mic by putting it on o -dB and reduce the highs on your mixer or EQ to reduce hiss sound.
But fisr check the connection properly to see if when muted, is muted properly.
The DMR-EH60 has been working fine for a good five years then it started intermittedly loosing sound when using it as tuner for our display panel. Now there is not sound at all even recordings from TV onto the HDD. Any ideas?
I've got the same problem, also with a brand-new Canon Legria FS 20. As Canon told me, I took it to a Canon office to be repaired. It was repaired. I tried filming and it worked. Then I tried to view this film and I got the same error message again: cannot access internal memory. I also can't film anymore now. I'll call Canon now and ask them what to do. Repairing didn't help, I want a new cam, but I'm not sure the FS 20 is a good choice. There seems to be a problem with it.
RCA Digital Voice Manager software for RP5120 "warning decoding"
Bad News... I spoke to AudioVox/RCA (800-894-0956 < Direct DVR Number) and they told me that once you get this notification of a bad file format, there is NOTHING that can be done.
I tried DOS, too. Nothing worked.
The only thing left to try is connecting the recorder to the computer via a cable from the line out of the DVR to the line in of the audio card, and record from there. I'm going to try this, then return the recorder, if possible. Mind you, I've gone through several of these recorders and all of them have had this problem... eventually.
The customer service person there at AudioVox/RCA was direct, helpful, but clear that I couldn't do anything but reformat the recorder. Though she didn't really seem to care, by her tone, one way or another. They were still reproducing this product even with the flaws that exist (they certainly did not take ownership of the problem... they said it was out of their control and the problem was just like a virus).
1. Connect the camcorder to a TV and check if you can playsee the tape.
2. Take that tape and check it using another miniDV camcorder.
this way you will know if the issue is within the camcorder or the tape.
When I take a picture, the picture is white & cloudy. But when I use the record option, my movie appears fine & clear?
Requests the cassette to be removed, when trying to play or record the cassette Whatever I want to do (play or record) the MV30 tells me to "remove the cassette" but the door will not open. I am running with battery fully loaded and the cable plugged in as well.
Have a manual for Canon MV30i Mini DV Digital Camcorder?
| 2019-04-23T20:03:19 |
http://www.fixya.com/support/t115316-canon_mv30
|
0.997928 |
I am new to budgeting and managing my own finances and have a simple question.
Is it better to use cash when credit or debit cards offers discounts. The city I live in, some shops and services offer discounts when using a credit card or debit card of a certain bank.
The problem I have with that is that I don't like having debt. I hate seeing that a portion of my income is already set to go to someone else at the start of the month before I can even use it. Not having any debt helps me sleep better at night.
At the moment, I have some credit card debt that I need to pay in installments and a mortgage.
I discussed paying off all of the credit card debt lump sump to the bank to get rid of it, but I was advised to not do it. Note that it is 0% as long as I pay my payments on time. And will end in a few months. If I pay early, I will have to pay an early payment penalty, which is affordable for me.
I don't know if it matters, but I am saving for something and I believe that paying by cash will help me control my finances.
Edit: So this blew up! This was my first question on this Q/A!. Thanks to all of you so much, helped me a lot in getting a better understanding of cash vs credit card debate. I am choosing the most voted answer as the correct answer, even though other answers also provide valuable advise.
You must define what you mean better in order to answer this question.
To me, buying with credit cards is virtually always better because my credit cards maximize my wealth (they offer cash-back, they provide security, they delay my payment, and I never pay interest on them). For you it may or may not be better in this sense depending on the discount amount and how much interest you will pay on the additional amount on your credit card.
Better can mean other things as well. If you are a person who is trying to learn to control your spending, then better may mean it's easier to have discipline when using cash. This is certainly true.
You may also have other reasons to think cash is better, like you have a personal aversion to having debt, even if you pay no interest on it. Nothing wrong with that, but it's not a universal value--I don't feel that way.
First you need to decide for yourself what better means for you, then you can evaluate which option satisfies it.
Credit cards can be very beneficial if you have fiscal discipline, and they can punish you terribly if you do not.
Convenient to not have to worry about how much money to carry around.
The credit card company pays for stuff and you don't have to pay them until the end of the following month. You earn a little interest in the mean time. Also if you have a large unexpected expense, you have a month and a half or so to get money to pay for it. Worst case scenario you can carry a balance for a very short time until you can recover.
If you are defrauded or your card is stolen, the credit card company will eat the loss.
If you pay off your statement in full within the month after getting it, you pay no interest.
Having credit cards and paying them off regularly will build your credit and make it easier to get loans for houses and other such things.
Credit cards can be a cruel scourge if you are a person who does not manage your money very well. If you don't pay off your card at the end of the month, you will start paying a lot of interest and you lose your grace period (so that new purchases immediately start incurring interest).
Notice that I am also incredibly averse to debt that charges interest, but if I have a debt that charges no interest and I'm not afraid of my ability to pay it off, I'm all in.
Pay for everything you can with your credit card (get one with good rewards if you can). Create an account on mint.com and download the app. Check your total credit card balance every time you go to the bathroom. Don't let it get too close to the amount of money you get from your paycheck minus your fixed costs (like rent). Pay all credit cards off at the end of each month. If you have more than a few hundred dollars remaining after paying them off, move the excess into a high-yield long-term savings account that you use for emergencies. If that gets a high balance, then look moving some of it elsewhere, like paying off your mortgage early.
Never use credit cards for long-term borrowing. And of course, don't habitually spend more than you earn.
TL;DR: since you're carrying a balance on your credit card, you should pay in cash.
How much would it cost you in interest?
Would it change your decision to purchase?
This is, of course, straightforward—the discount they give you times the price. 5, 10, maybe 25%.
For those not carrying a balance, this is somewhere between zero and -5% — yes, with cash back, it can actually cost less with a card than with cash for the same purchase price.
Unfortunately, it sounds like you're carrying a balance. In that case, the exact answer is going to depend a great deal on your specific balance, payment terms, and interest rate. If you pay extra immediately or on the next statement specifically for the purchase in question, it may only cost you a couple percent, less than the discount; if you don't pay extra to offset it, it's likely to cost you a lot more than that.
That said, I would strongly advise you not to put anything else on your credit card until it's 100% paid off and stops charging interest. I don't want to get sidetracked into a full lecture here (there are plenty elsewhere on this site if you need guidance or a kick in the rear), but carrying a balance is expensive and shows a lack of control, and you should work hard and change your buying habits to get it paid down ASAP.
They say you're more likely to purchase something using a card than cash. I'd expect that to be an even stronger effect in your situation. You really need to think twice and be sure you'd definitely buy it either way.
I don't like having debt.
Then don't get into debt. Credit card debt IS debt. It may be short-term debt, you may not pay any interest on it, but it is, by definition, debt. You received a benefit with a promise to pay for it later.
Not having any debt helps me sleep better at night.
Great! then continue using cash and continue sleeping well at night.
I am saving for something and I believe that paying by cash will help me control my finances.
Then why would you stop doing that?
The city I live in, some shops and services offer discounts when using a credit card or debit card of a certain bank.
Companies pay a fee when customers use a credit card, which means that they are getting a kick-back from the banks by pushing their cards. They are still making a profit on the sale, and the bank is counting on profiting from the customers that do NOT pay back the card on time, earning interest and fees for the bank.
I discussed paying off all of the credit card debt lump sump to the bank to get rid of it, but I was advised to not do it.
I get the sense that you're being pressured by friends and clever marketing to use cards to buy everything you see. Are your friends wealthy? If so, did any of them earn their wealth purely by the use of credit cards? No, they are either broke or they work very hard to earn a living and choose to play the credit game.
I fully appreciate the benefits of using credit cards. Points, miles, discounts, etc. But if you don't have the financial discipline to use them wisely and without making any mistakes, then those benefits will be gone many times over in interest, overspending, and other fees.
Not using credit cards is not unwise. There is a very different psychological experience when using credit cards than using cash, which not only have I experienced personally, but others have as well.
If paying cash affects your purchasing decisions such that you tend to spend less, then pay cash.
If you're going to buy the item either way and the price is not higher than the amount of cash you have on hand, pay it with the card to save some money, deposit that cash at the bank or ATM and pay your bill right away.
You do have a loan for your extra item that you bought and you pay it off. That's a debt. And beside that, the credit card is just ordinary expense for things that you buy anyway. That's not a debt. Personally I send money to the credit card right after a big expense, say a car repair, any time point in the month, and do not wait for the end-of-month automatic charge. You would at end-of-month pay a part of your big expense, and all of the ordinary-monthly-expenses. You would not add the amounts and think of the aggregate. That also means that you accept card discounts when you would buy the items anyway. You should not buy them just because of the card discount.
Do you pay your credit card debt in full every month?
Do you pay interest on credit card purchases even when you pay it back in the same month?
If the answer to 1 is no OR the answer to 2 is yes, then you should use cash. [*]. The interest on the credit card will in all likelihood cost more than the discount offered by the merchant.
If 1 is yes and 2 is no, then use the credit card.
My credit card allows me to transfer money to it at any time (any amount). This I do every month when I get paid. Thus my credit card has a plus balance (unless I've gone on a spree ;-) ), and I don't pay any interest charges.
I'd also point out that it's easier to lose track of your spending when using plastic rather than cash.
I believe the reason some merchants are offering a discount for CC payment is to encourage people to make a spontaneous purchase, spending more than they can really afford.
[*] Assuming withdrawing cash from the ATM is free or less than the CC interest.
Not the answer you're looking for? Browse other questions tagged credit-card debt cash pakistan or ask your own question.
Why do grocery stores in the U.S. offer cash back so eagerly?
Can shops use card payments to track/profile customers?
What credit card surcharge rate should I accept?
| 2019-04-23T12:29:35 |
https://money.stackexchange.com/questions/88541/is-it-better-to-use-cash-when-cards-offer-discounts/88543
|
0.999999 |
How is Deep Learning experiencing such success solving complex problems? Deep Learning is useful and powerful but it is also that the problems were not as big or as hard as researchers feared when they were unsolved.
By Brian Wang, Next Big Future.
I *am* big. It's the *pictures* that got small.
How is deep learning solving problems that seem to have an incredibly huge space of possible solutions? The actual number of possible solutions is vastly smaller than earlier estimates. Deep Learning is useful and powerful but it is also that the problems were not as big or as hard as researchers feared when they were unsolved.
Last year, Deep Learning AI accomplished a task many people thought impossible: DeepMind, Google's deep learning AI system, defeated the world's best Go player after trouncing the European Go champion. The feat stunned the world because the number of potential Go moves exceeds the number of atoms in the universe, and past Go-playing robots performed only as well as a mediocre human player.
But even more astonishing than DeepMind's utter rout of its opponents was how it accomplished the task.
"The big mystery behind neural networks is why they work so well," said study co-author Henry Lin, a physicist at Harvard University. "Almost every problem we throw at them, they crack."
The answer is that the universe is governed by a tiny subset of all possible functions. In other words, when the laws of physics are written down mathematically, they can all be described by functions that have a remarkable set of simple properties.
So deep neural networks don’t have to approximate any possible mathematical function, only a tiny subset of them.
Not only do Lin and Tegmark’s ideas explain why deep learning machines work so well, they also explain why human brains can make sense of the universe. Evolution has somehow settled on a brain structure that is ideally suited to teasing apart the complexity of the universe.
To put this in perspective, consider the order of a polynomial function, which is the size of its highest exponent. So a quadratic equation like y=x2 has order 2, the equation y=x42 has order 42, and so on.
Obviously, the number of orders is infinite and yet only a tiny subset of polynomials appear in the laws of physics. “For reasons that are still not fully understood, our universe can be accurately described by polynomial Hamiltonians of low order,” say Lin and Tegmark. Typically, the polynomials that describe laws of physics have orders ranging from 2 to 4.
The laws of physics have other important properties. For example, they are usually symmetrical when it comes to rotation and translation. Rotate a cat or dog through 360 degrees and it looks the same; translate it by 10 meters or 100 meters or a kilometer and it will look the same. That also simplifies the task of approximating the process of cat or dog recognition.
There is another property of the universe that neural networks exploit. This is the hierarchy of its structure. “Elementary particles form atoms which in turn form molecules, cells, organisms, planets, solar systems, galaxies, etc.,” say Lin and Tegmark. And complex structures are often formed through a sequence of simpler steps.
This is why the structure of neural networks is important too: the layers in these networks can approximate each step in the causal sequence.
Researchers show how the success of deep learning depends not only on mathematics but also on physics: although well-known mathematical theorems guarantee that neural networks can approximate arbitrary functions well, the class of functions of practical interest can be approximated through "cheap learning" with exponentially fewer parameters than generic ones, because they have simplifying properties tracing back to the laws of physics. The exceptional simplicity of physics-based functions hinges on properties such as symmetry, locality, compositionality and polynomial log-probability, and we explore how these properties translate into exceptionally simple neural networks approximating both natural phenomena such as images and abstract representations thereof such as drawings. They further argue that when the statistical process generating the data is of a certain hierarchical form prevalent in physics and machine-learning, a deep neural network can be more efficient than a shallow one. They formalize these claims using information theory and discuss the relation to renormalization group procedures. They prove various "no-flattening theorems" showing when such efficient deep networks cannot be accurately approximated by shallow ones without efficiency loss: flattening even linear functions can be costly, and flattening polynomials is exponentially expensive; they use group theoretic techniques to show that n variables cannot be multiplied using fewer than 2^n neurons in a single hidden layer.
Arxiv - Why does deep and cheap learning work so well?
Bio: Brian Wang is a long time futurist. A lecturer at the Singularity University and Nextbigfuture.com author. He worked on the most recent ten year plan for the Institute for the Future and at a two day Institute for the Future workshop with Universities and City planners in Hong Kong (advising the city of Hong Kong on their future plans). He had a TEDx lecture on Energy. Brian is available as a speaker for corporations and organizations that value accurate and detailed insight into the development of technology global trends.
| 2019-04-26T10:35:33 |
https://www.kdnuggets.com/2016/12/deep-learning-works-great-universe-physics-go-simpler-than-previous-models.html
|
0.999999 |
How does one subscribe to the following emails in the scenarios below?
Scenario 1: You're new to Canvas.
Scenario 2: You unsubscribed and want to resubscribe?
Here in the Canvas Community, you control whether you are notified of activity via email in your preferences. Click on your account's avatar at the top of a page here after you've logged in, and choose Preferences from the drop-down list. On that page you can choose to get email notifications (or not) and how often you want to receive them for Following and various inbox items.
| 2019-04-19T17:25:46 |
https://community.canvaslms.com/thread/15896-subscribe-to-jive-inbox-stream-updates-canvas-community-updates-and-following-stream-updates
|
0.999983 |
QUESTION: When is a spy movie not a spy movie? Answer: When it's a romantic thriller that uses espionage to keep the action moving, but doesn't really take its international intrigue very seriously.
Hollywood used to crank out pictures like this all the time, and the heroine of "Shining Through" is always chattering about them. "Remember that movie when so-and-so smuggled the microfilm inside the parrot?" is the kind of thing she can't stop saying.
And this makes sense, because "Shining Through" is in the spirit of those bygone films. It's full of spies, Nazis, secret codes - and, yes, microfilm. But it's all for fun, and you know the good folks will succeed in their mission just as surely as you know the right side will win World War II.
The main character is Linda, a New Yorker with a Jewish-Irish background and a knowledge of German she picked up from her grandfather. She takes a secretarial job with a somewhat mysterious boss and soon figures out that the peculiar letters he dictates are coded messages, somehow connected to the international tensions that are growing every day.
At this point Pearl Harbor is bombed, and sure enough, the boss reveals himself as a military spymaster. By this time Linda has fallen madly in love with him and wants to help him win the war. Soon she's on her way to Nazi Germany with a dangerous job to perform: infiltrating a Nazi's home and photographing secret documents. She also hopes to find her Jewish relatives and help them out of Hitler's clutches.
"Shining Through" raises all kinds of big subjects - fascism, anti-Semitism, equality for women - but it doesn't have a single meaningful thought about any of these things. In this way it's different from many spy movies of the cold-war era, when films about Nazis were often thinly disguised squawks about the so-called communist menace, and we were supposed to think at least a little about the political issues involved.
What the makers of "Shining Through" do take seriously is slick and colorful filmmaking - provided by David Seltzer, who directed the picture from his own screenplay, based on Susan Isaacs's novel - and glamorous performances, courtesy of Melanie Griffith and Michael Douglas, both at their radiant best. Also on hand are first-rate supporting players like John Gielgud, as the spymaster's boss, and Liam Neeson, as a Nazi right out of central casting.
I wish their story had a bit more substance to it. For all its surface excitement, "Shining Through" doesn't compare to a real classic of the Nazi melodrama genre, like Douglas Sirk's sweeping "A Time To Love and a Time To Die," or a real classic of the espionage genre, like Alfred Hitchcock's unforgettable "Notorious." But the new movie looks terrific, and in its limited way it's great movie fun. You won't remember "Shining Through" for long, but you're sure to enjoy it while it's on the screen. Rated R for a scene of sensuality.
| 2019-04-21T18:05:21 |
https://www.csmonitor.com/1992/0221/21142.html
|
0.999999 |
From 'dal bati churma' and 'gatte ki sabzi' to 'laal maans' and 'khatto murg', Delhiites can treat their taste buds..
From 'dal bati churma' and 'gatte ki sabzi' to 'laal maans' and 'khatto murg', Delhiites can treat their taste buds to a fulfilling platter of authentic Rajasthani food at a new food festival here. "Royal Rajasthan" being organized at Daniell's Tavern at The Imperial here, features the best of what the state has to offer gastronomically. A perfect balance of vegetarian and non-vegetarian options, the platter is the right mix of tangy and spicy, just right for a quintessential Indian palette.
Executive chef Prem K Pogakula said the Rajasthanis had molded their culinary styles according to the topography of the region arid land, the extreme climatic conditions, scarcity of water and vegetation. "Many of their dishes can be shelved for several days and served without heating," he said. The culinary sojourn kicks off with an array of appetizers 'khad murg', 'maas ke sule', 'ker sangri ki tikki' and 'Mirchi vada' among others. The 'dhaurasi taffri', freshwater prawns marinated with hung curd, garlic, and chili, and cooked in clay cover, is a surprise.The 'Makki ki seekh' minced corn infused with chefs special spices cooked on skewers stands out for its smokey flavor. A Rajasthani meal without 'laal maans', 'gatte ki sabzi' and 'daal baati churma' is unimaginable and the festival did not disappoint.
The 'Rajasthani tawa macchi' was a welcome addition. The boneless fillet of sole marinated with yellow chili, curd, spices, offered a fresh flavor to the otherwise familiar non-vegetarian staple. Speaking of fresh tastes, 'paneer ka sweta' is another item on the menu that is one of its kinds. Chef Pogakula said the 'sweta' gravy, made out of sweet corn, can be used for meat preparations as well. The delectable meal ends with an assorted array of desserts like 'malai ghevar', 'paneer ghevar', and 'meethi kachori'. Golden yellow 'Nookti', a Rajasthani version of 'boondi' made of gram flour, served with sweet 'rabdi' makes for a fitting end to the rich supper. The festival, scheduled to continue till April 30, can be relished from 6:30 pm to 11:45 pm.
| 2019-04-24T00:43:44 |
https://www.rozanaspokesman.com/lifestyle/travel/270418/enjoy-the-rajasthani-cuisines-at-food-fest-organized-at-daniells-tave.html
|
0.998393 |
dateType(DateType!): Type of date. Can be Arrival or Booking date.
start(Date!): Start date. Format: YYYY-MM-DD.
end(Date!): End date. Format: YYYY-MM-DD.
HotelCriteriaBookingInput: Criteria of book contains basic information to find a book or books.
| 2019-04-20T16:56:35 |
https://docs.travelgatex.com/travelgatex/reference/inputobjects/criteriabookingdatesinput/
|
0.999995 |
How old is Paul Young, how did his wife Stacey die, how many children does he have and what are his hit songs?
PAUL Young is a well known name amongst 80s music fans, thanks to his long and successful career as a singer.
Who is Paul Young? What is his background?
Paul Antony Young, 63, was born January 17, 1956.
He is an English singer, songwriter and musician.
The 63-year-old started out in the 70s as the frontman of the short-lived bands Kat Kool & the Kool Cats, Streetband and Q-Tips.
But he hit international stardom when he went solo in the early 80s and became a teen idol.
What are Paul's hit songs?
When did Paul's wife die? Do they have children?
Paul met Stacey, a model - who, at the time, was known as Stacey Smith - on the video shoot for his second single Come Back and Stay in 1983 and they married in 1987.
On January 26, 2018, Paul announced Stacey's death from brain cancer on Twitter: "Sadly Stacey has passed away today after a 2 year fight with brain cancer. She died peacefully at our home surrounded by family, friends and her four children: Levi, Layla, Grady and Jude".
Paul and Stacey have three children together - daughters Levi and Layla, and son Grady.
A year on since his wife's death, the singer admitted that staying on the road has helped him to cope with the grief.
He revealed to Event: "Emotionally you're all over the place. But I decided, 'I have to go out on the road, I've got to earn money because I don't know what I'm going to have to pay for, I don't know what's ahead of me.'"
Paul has amassed quite a fortune during his time in the music business.
He has an estimated worth of £7.6 million.
The musician has kept his bank balance topped up by continuing to tour.
| 2019-04-21T08:58:09 |
https://www.thescottishsun.co.uk/tvandshowbiz/2943788/how-old-is-paul-young-when-did-his-wife-stacey-die-how-many-children-does-he-have-and-what-are-his-hit-songs/
|
0.999989 |
hellshaw.com - kavanagh - writings - ?
Dao, also transliterated as tao , is a word you have probably seen countless times, on the covers of books, invariably in conjunction with subjects great and worthy. You may already know what this word means, or you may not be so certain. But dao has a great deal to do with my novel. Hence, this appendix will attempt to explain what dao is. However, first there must be a modicum of context setting. The first question to ask is not "What is dao?" This question, though valid, must follow after "When, where, and why did dao become so important?"
The time and place where dao was the subject of great philosophical debate was the Classical period of philosophy in China. The start of this period can bet set at around 500 BC. It lasted through the Warring States era (403-222 BC), when the Chinese empire had been broken up into competing, conflicting states, and ended with the foundation of the authoritarian Qin dynasty in 221 BC, which unified China, and suppressed schools of philosophy in an effort to control thought and regulate society.
The chaos at the time of the Warring States had an inevitable impact upon philosophy. Understandably in the circumstances, traditional custom and morality were called into question. Many different schools of thought emerged, and many texts were written that would go on to have an influence for thousands of years. However, despite the diversity in this explosion of philosophy, all 'schools' shared the same basic conceptual framework. They shared the same language and culture. They shared the same conception of the human mind and body. Furthermore, this Chinese conceptual framework differed significantly from that of India and the West, where philosophy was also emerging.
An important example of this 'shared conceptual framework' in the Chinese philosophy of the period was the assumption that human beings are inherently social. It was not assumed that people act out of beliefs that they have reasoned in their thoughts, or desires that they have felt emotionally. Instead it was assumed that they are guided socially, by a dao, a system for guiding behaviour.
Dao is most often translated from Chinese as 'way'. It is not that English word exactly, but dao is 'way' in the sense of a way to do something, a programme for action, or a path to follow. Although there can be daos of, ways of, all sorts of things - cooking, painting, etiquette etc. - Classical Chinese philosophers were interested in the social dao. People were able to distinguish between right action and wrong action, by following the publicly transmitted dao. Philosophical schools differed over which dao was the correct dao to guide society. For example, Kongfuzi (551-479 BC, also known as Confucius) taught that the correct dao was the preservation and continuance of Chinese society's inherited traditions, while Mozi (fl.479-438 BC), took an opposing view, arguing that the correct dao was to establish a preference of what is beneficial for human beings, over what is harmful.
This general social approach to philosophy contrasts with the Western culture of the same period. Chinese thought did not exhibit features common in the West, such as the dichotomies between the mind and the body, and between reason and emotion. In the same approximate time period as when Chinese philosophers were reflecting upon dao, Western philosophy was born in Greece, where there occurred the conception of something called the psyche. The Greeks conceptualized a metaphorical 'space' where thoughts took place. This metaphor they called the psyche. It is better known today as, of course, the mind.
By comparison, in early literature from pre-philosophical Greece, the mind is very notably absent. It has often been noted that in Homer's Iliad and Odyssey (8th century BC), there are no words referring to mental activity, no 'think' or 'believe' or 'desire'. The literary characters instead refer to feelings coming from their bodies. The conceptualization of the mind was, then, revolutionary, but this theory of mind went hand-in-hand with some other concepts, namely the dichotomies mentioned above - the dichotomies between the mind and the body, and between reason and emotion. The Greeks divided the ego into reason and emotion. Reason was associated with the mind, while emotion was associated with the body. The theory was that reason alone provided human beings with judgement, for example, the ability to choose between right and wrong. Ethical behaviour involved overcoming (emotional) desires if they conflicted with (reasoned) beliefs.
This was also a period of epoch-making philosophy further to the East, on the Indian subcontinent. The Upanishads, the reflections of forest hermits, were transforming Vedism into Hinduism; and Buddhism had begun its transmission, from Siddharta Gautama (560 to 480 BC). What is of most relevance to note, though, is that Indian thought shared its conceptual framework not with China, but with the West . This makes historical sense; there was cultural contact with the West. It also makes linguistic sense; Greek and Sanskrit are from the same language family, Indo-European (a family which, incidentally, also includes the language this appendix is being written in, English). Indian philosophy shared concepts with the Greek; its theory of mind included the mind-body dichotomy, from Uddalaka in the Upanishads, who argued that the life-soul (jiva) is separate from the body .
In both traditions, reason was the faculty by which human beings could tell right from wrong, but deeper than that, reason was the faculty for distinguishing between what 'is' and what 'is not'. Emotions, senses like hunger or thirst, and all perceptions that arose from the physical body, were considered to be in conflict with the workings of reason, because reason took place in a purely mental space. The world, as it appeared in this mental space, was a distorted 'reality' because of the interference of perceptions associated with the body. Reason was to be used to get an accurate understanding of what is 'real'. The philosophical problem then arose of how to understand what is 'real' when the mind has to rely on information from the 'physical' senses and the physical world is constantly changing in appearance. There was a requirement for true 'reality' to be something beyond mere appearances.
Greek philosophy attempted to address this problem. Plato (429-347 BC) theorized about a world of 'ideal forms'. This theory was that the objects we perceive through our senses are not 'real' at all, they are imperfect copies of the true 'reality', which is made up of eternal, unchangeable types of these objects. Similarly, Aristotle (384-322 BC) had a theory of the fundamental principles of being: matter and form. Matter was the basis of all that exists, and form was what makes something what it is. Like Plato's theory, it was an attempt to explain how something can retain a constant identity, despite perpetually changing.
In both the Western and Indian philosophical traditions, scepticism arose from the dichotomy between the realm of the mind and the realm of the physical world. Do the two realms correspond? Mental perception is not always reliable; how do we know that all we perceive is not an illusion? Is the physical world an illusion? Because of these sceptical questions, objective 'reality' became something that was presumed to be beyond appearances.
Mysticism also arose from this kind of thinking. Mystics seek the true 'reality' and to reach a state of unchanging, pure existence, an experience of the self unmediated by the flux and change of the physical world. Knowledge of the 'true reality' and the 'true self' is to bring about salvation for the mystic (the unquestioned assumption being that once we understand the 'reality' of the universe we will know how to live). It can be seen here that mysticism, with its separation of mind from body and reality from appearance, is Indo-European in character; it did not feature in Classical Chinese culture.
To the Chinese philosopher who was interested in dao, it was irrelevant to what degree our perception of the world is illusory. A constant dao was a much more important issue than notions of a constant reality. Chinese thinkers were seeking to know how, rather than to know what. That is, knowledge of how to live, how to undertake activities, and how to deal with death.
| 2019-04-22T08:10:17 |
http://www.hellshaw.com/barry/appendix1.html
|
0.999701 |
In a Q&A, the CEO of a security startup sheds light on the risk that the Reaper IoT botnet poses for enterprise organizations.
Last year, an IoT botnet called Mirai that enslaved roughly 100,000 devices managed to shut down a chunk of the internet by targeting DNS provider Dyn. Amazon, Twitter and Reddit were all overwhelmed by its traffic. Now, there is a quickly growing botnet, known as IoTroop or Reaper, that is growing to be much broader in scope.
To learn more about its risk, we reached out to Ofer Amitai, CEO and co-founder of the cybersecurity firm Portnox.
What do you make of the scale of the botnet and its level of sophistication?
Ofer Amitai: According to reports, the IoTroop/Reaper botnet is still in the recruitment stage and continually infecting more devices, so it’s still hard to determine the scale, but Check Point posits that its impact could be far-reaching, maybe even more so than Mirai. Currently, Check Point and the Chinese cybersecurity firm Qihoo 360 estimate that millions of devices from the United States to Australia have been affected. Qihoo found that multiple botnets controlling computing servers are being used by the hackers to communicate with up to 10,000 compromised devices each day, recruiting new devices that have been identified to contain one of the nine vulnerabilities.
As for its level of sophistication, the IoTroop/Reaper thingbot attack seems to be more sophisticated, or at least different, than the Mirai attack. Both Qihoo and Check Point suggest that IoTroop/Reaper is based partially on Mirai code, but the former has already proven to be better at the recruitment phase as well as disguising itself from IoT security solutions. However, at the moment, both organizations postulate that IoTrooper/Reaper can live in harmony with Mirai, [whereas] Mirai itself … wiped out a prior malware strain known as Qbot. There are currently nine known vulnerabilities that are being exploited on up to 12 different IoT devices including IP cameras and DVRs.
Experts from both Check Point and Qihoo 360 suggest that this attack has the potential to bring down the internet, if it is able to recruit enough “zombie” thingbots to disseminate the malware on vulnerable IoT devices all over the world.
Is there a way to infer the intent of the authors of this attack at this point or is it still too early?
Amitai: At the moment, it’s still too early to know intentions of the authors, or who they even are. None of this information has been published. However, if you look at the goals of hackers who created and distributed IoT malware leading to DDoS attacks in the past, it seems that one of the more obvious goals is to outsmart the previous attacker – in this case, the author of Mirai. Because IoTroop/Reaper’s code is partially based on Mirai, the same group of hackers could be responsible, although Mirai’s source code is freely available online. The attack is still in the recruitment phase, which means that there is no discrimination or a clear behavior pattern that is evident. Once the hackers have recruited enough “zombie” devices to their arsenal, they may command these devices to carry out DDoS attacks, in which case the intents and targets of the attack should be revealed.
What does it mean that the attack focuses on IoT software vulnerabilities rather than exploiting default or weak login credentials?
Amitai: One of the vulnerabilities that allowed for Mirai to occur was that the compromised IoT devices either used no passwords or publicly available factory default settings for their telnet credentials. The Shodan IoT search engine is just one example of where these credentials are readily available, even for specific IP addresses. This time around, the hacker or group of hackers knew that they couldn’t use the same telnet credential scheme to infiltrate and commandeer vulnerable devices, as many of those default and factory settings have been changed (hopefully). Instead, IoTroop/Reaper looks for vulnerabilities in the IoT devices’ software, with the potential to wreak more havoc than imaginable following Mirai.
How big of a threat is Reaper for the enterprise? How can enterprise companies know if they have been hit?
Amitai: While the scope and potential risk arising from IoTroop/Reaper is still unknown, enterprises should absolutely take note. There is no need to panic at this point, but, on the other hand, all wireless IP security cameras, and particularly the brands GoAhead, D-Link, TP-Link, Avtech, Netgear, MikroTik, Linksys and Synology should be examined for vulnerabilities, or patched with firmware upgrades where available. Older versions of these devices should be discontinued in favor of more current, and patchable devices.
Enterprise companies should use a threat detection solution to determine if their IoT devices are vulnerable (according to the published list of vulnerabilities). In addition, now is the time to deploy a network visibility solution that provides essential endpoint information on IoT devices and discovers them on the network. One of the pitfalls of IoT security is that the devices often aren’t registered as managed endpoints on the network, making it more difficult to manage their security status including firmware and version upgrades. Consult with a cybersecurity expert if you think that your IoT devices have been compromised and do not disconnect infected IoT devices because this action may help the thingbot infection spread.
The two companies will work together to integrate technologies; why the maritime industry is eager to invest in IoT; and more news.
| 2019-04-24T08:35:20 |
https://www.iotworldtoday.com/2017/10/26/reaper-iot-botnet-threat-why-enterprises-must-guard-against-it/
|
0.999963 |
A question I am often asked is “should Australian wildlife be kept as pets?” and in many cases, this would make a lot of sense because we are allowed to keep a domestic cat as a pet, which in many cases are allowed to roam and destroy native wildlife or become feral if an owner releases them to the wild, if not wanted anymore. This causes catastrophic repercussions for Australia, which already has the highest mammal extinction rate on earth.
Native birds and reptiles are already kept as pets and are noted to be good pets with some examples of bearded dragons, Australian python species, parrots etc being not only popular pets in not only Australia, but worldwide.
One of the areas for prospective interest is mammals; sugar gliders, quolls, possums, kangaroos and wallabies for example. All these species would make reasonable pets in the capacity of friendliness, need of space and ease of care. However, there is concern that this would increase wildlife poaching for the pet trade and could see endangered species sought after in this regard.
If this was permitted Australians could re-establish a lost connection with some of our smaller, more obscure wildlife, which there seems to be a disconnect with our society in general.
Take the orangutan for example, they are one of the most recognisable animals in the world and support for the species is through the roof, however there are still approximately 50,000 left in the wild and their numbers are increasing.
There are many Australian species that fall well-short of this figure but are not know in the public eye of Australians. If a species like a sugar glider is able to be kept as a pet, it raises public knowledge and education advocacy of the species – this is something that could be applied across a wide range of small Australian mammals.
Most of the Australian native mammal population that have the ability to be kept as pets hold little to no threat if they escape, unlike domestic cats who would hunt by nature.
For example, the Eastern quoll has become extinct on the mainland of Australia and is now only found in Tasmania. If one were to be kept as a pet and escaped the owners’ house, it would be tragic in the same circumstance in the way that it may come to harm or get run over.
However, in regards to the devastating effect on the local environment – that is non-existent. If feral populations of Eastern quolls established themselves around Sydney, what would be the harm in that? They used to be common in the area, so it would be essentially re-wilding the population.
My position on this is that there are both pros and cons to the argument. However, I have a hard time foreseeing that species such as sugar gliders, quolls, possums, kangaroos and wallabies wouldn’t make reasonable companion species. They have the ability to provide a greater education advocacy benefit for Australian wildlife in general and have little devastating repercussions that may come with a potential escape from other domestic pets such as cats and dogs.
Tim Faulkner, General Manager, Australian Reptile Park 2015 Australian Geographic Conservationist of the Year.
By Tim Faulkner, General Manager, Australian Reptile Park 2015 Australian Geographic Conservationist of the Year.
| 2019-04-21T22:08:19 |
https://goldcoastpets.com.au/2016/10/08/should-australian-natives-be-kept-as-pets-tim-faulkner-blog/
|
0.996784 |
Syfy's latest teaser for The Last Sharknado: It's About Time reveals that the plot includes not only the franchise's trademark sharks, but also dinosaurs, costumed heroes, and futuristic worlds. The sixth installment in the Sharknado movie series will premiere later this month on Syfy.
It may go without saying, but the Sharknado franchise is no stranger to strange premises. The first Sharknado film, which debuted in 2013, focused on the story of Fin Shepard (Ian Ziering), as he sought to find and save his estranged wife and daughter from a cyclone that carried man-eating sharks from the ocean and dropped them in Los Angeles. Since then, the films have only escalated in their extreme storylines. The movies have seen Fin battle "sharknadoes" in Los Angeles, New York, Washington D.C., and even outer space. The films' titles have also reflected the unbelievability of the plots - Sharknado 3: Oh Hell No! and Sharknado: The 4th Awakens indicate the level of seriousness with which the creators approached the projects.
According to the latest teaser released by Syfy, however, the final Sharknado will hold nothing back as it sets about concluding the series. For the film promising dinosaurs, costumed heroes, futuristic worlds, and apparently a visit to Noah's ark, the teaser tells all other films featuring similar set pieces that "they can bite it." With images of knights, superheroes, and sharks exploding in fireballs mid-air, the teaser promises the outlandish excitement the series has been known for over the last five years.
The teaser also features Nova (Cassandra Scerbo) addressing Fin and April (Tara Reid), saying, "If we stop the first sharknado, we can stop them all." This, along with the teaser's promise to include different time periods, indicates that The Last Sharknado: It's About Time will not only put an end to the franchise, but it will also fulfill its own tagline by having its characters battle sharks across time. The release of the film's poster earlier this summer already indicated the involvement of time travel, but with this new footage, it is more clear just how the writers intend to allow it into the plot.
While the films have certainly made a name for themselves in escalating the adventures of their hero Fin, it seems like a fitting time to conclude the series. With five films already in existence about tornadoes that throw sharks at people, fans have to wonder how many scenarios can be dreamed up for Fin to overcome and save his family again. But that has always been a part of the fun of the series, and exploring a storyline that will play on the tropes of time travel films as well as the things that seem to make all other franchises successful - superheroes and dinosaurs - will surely be a welcome final ride for fans.
| 2019-04-21T20:33:24 |
https://screenrant.com/sharknado-6-teaser-trailer-syfy/
|
0.996601 |
One's subjective perception of one's physical appearance.
They should also be mindful about restricting media exposure that reinforces a distorted body image and interferes with choosing healthy food," she added.
The results suggested that incidences of theft and other convictions were 12 percent and seven percent, respectively, in those with anorexia nervosa - lack or loss of appetite for food; 18 percent and 13 percent in those with bulimia nervosa - an emotional disorder characterised by a distorted body image and 5 percent and 6 percent in those without eating disorders.
Eating disorders associated with a distorted body image include anorexia nervosa and bulimia nervosa (American Psychiatric Association, 2013), with many researchers having shown that the desire to be slim and the tendency to obsess over one's body image are increasing in both male and female adults (Juarez, Soto, & Pritchard, 2012; Tylka, Russell, & Neal, 2015).
It is important to remember that distorted body image can occur in older individuals as well.
Primarily affecting young female adolescents between ages 15 and 19, AN is characterized by distorted body image and self-imposed food restriction to the point of emaciation or death.
Mary Shelley's Frankenstein became part of the design process, where I created my own distorted body image by using collage, body print and anatomy drawings.
Anorexia nervosa is a very serious but hidden disorder in which the person has a relentless pursuit of thinness, is unwilling to maintain a healthy weight, has distorted body image and intense fear of gaining weight, disturbed eating behavior, and, in girls, amenorrhea.
Behavioral consult: staying fit or fearing fat?
Anorexia is a potentially life-threatening eating disorder characterized by a distorted body image, starvation and excessive weight loss.
Researches of Jennifer and Vonder showed that the distorted body image can influence the psycho-somatic health of an individual and continuous dissatisfaction with our own body image can lead to depression, anxiety and social phobia, sleeping disorder and psychosis, disorder in eating or nutritional patterns and other disorders.
Being told about the character's distorted body image and lack of bodily self-awareness may draw the reader's attention to how embodiment works in the everyday coping with the world--and to how such familiarity with embodiment is brought to bear on literary texts.
The result is a distorted body image which means we don't see ourselves as others see us.
OBSESSED: AMERICA'S FOOD ADDICTION--AND MY OWN comes from a talk show host dubbed "the food Nazi" and provides a review of her personal fight against unhealthy eating habits--a battle that resulted in a distorted body image.
| 2019-04-23T23:29:49 |
https://www.thefreedictionary.com/Distorted+body+image
|
0.999999 |
There are 41 results for investment property hard money lenders in Cranston, RI. Note amounts average around $313,889. Rates on private loans issued to Cranston investors average about 11.8%. The median loan issued in this city has a length of 15 months. The average origination fee charged on the loans is 3.2%. The median loan-to-value (LTV) for loans in Cranston is 71%.
Della wants to purchase a rental property in Cranston, RI that costs $300,000. Since she doesn't have enough cash for the deal and cannot secure a bank loan, she obtains a hard money loan from Prime Time Funding Group . Based on a 65% loan to value (LTV) agreed to by the two parties, Della will need to put down the remaining 35% in cash. By the parameters of the loan, the note is for 4 years at 14% interest. A 3% origination fee will have to be paid when the deal closes and Della will make interest-only payments with a balloon payment for the principle paid when the note expires. Given this scenario, Della will make the following payments: 1) $105,000 down at closing (due to the 65% LTV), 2) a $5,850 origination fee (3% x the $195,000 loan principle), and 3) $2,275 per month in interest payments.
Janie decides to acquire a rental house in Cranston, RI for $240,000 using a private loan from BCC Funding Company . Janie and BCC Funding Company agree to a 65% loan-to-value (LTV) so they will loan 65% of the list price and Janie will be responsible for the remaining 35%. The additional parameters of the loan are as follows: 1) a 2 year, interest-only note, 2) a 13% interest rate, and 3) a 3 point origination fee charged at closing. According to the terms of the loan, Janie 's payments will be $1,690 per month. She will also be required to contribute $84,000 in cash at closing in addition to the $4,680 origination fee. When the note expires, she will have to pay the $156,000 loan principle in a single balloon payment.
| 2019-04-24T01:48:52 |
https://www.hardmoneyhome.com/investment-property-loans/cranston-ri
|
0.999329 |
Battling the end-of-summer blues? Here's my prescription: Head downy ocean, where Labor Day ushers in the best beach time of the year. Spend a September weekend (or three) enjoying the mellower crowds, the slanting sunlight, the summer-warmed surf, and the fattest crabs of the season.
Still not cured? Perhaps you're neglecting the three essential beverage groups: wine, beer, and spirits. Increasing numbers of wineries and microbreweries make their homes in the small towns of Delmarva, and craft distillers have established a modest presence. Sipping through the highlights would make for an afternoon well-spent.
Nine miles from downtown Ocean City, the Maryland Wine Bar (mdwinebar.com) opened last summer on Berlin's quiet, brick-lined Main Street. A wall-sized bottle rack sits across from an eight-stool bar laminated with labels from state wineries. By all accounts, this is the only bar anywhere serving exclusively Maryland wines. The inventory represents roughly half the state's 60-some wineries, with 20 or so offered by the glass on a rotating basis. With an all-Maryland cheese plate, I enjoyed a flight of Eastern Shore wines ($10 for three 2-ounce samples). My favorite, St. Michael's Winery's Island Belle Sangiovese 2010 ($20, 12.26 percent alcohol), shows dusky ruby, with a nose of spiced cherry and sweet tobacco. Darker cherry and leather flavors finish with notes of orange peel and turned earth.
Before leaving Berlin, hop by Burley Oak Brewing Company (burleyoak.com). The two-year-old microbrewery and alehouse exudes the happy-slacker vibe of serious beer lovers. Quaffs on tap typically include a cask ale, seasonal specialties, Belgian-style variants, and powerhouse IPAs, available in flights, pints, growlers, and occasional batches of hand-filled bottles. Pale Ryeder Double IPA, with its rye spice and triple-hop profile, is, for my money (the only kind I get to spend), Maryland's best beer. Burley Oak kegs reach some of Baltimore's hophead haunts, but production remains limited to about 1,700 barrels annually.
A comparative giant among craft brewers, Dogfish Head (dogfish.com) distills a lesser-known line of artisan spirits that deserve their own following. The brewing operation outgrew Dogfish's popular Rehoboth Beach brewpub and moved to Milton, Del., in 2002, replaced in part by a second-floor pot still Dogfish uses to make gin, vodka, and rum. I'm partial to the Brown Honey Rum (80 proof, $25-ish), which pours medium-dark amber. Oak-aged and flavored with wildflower honey, it packs a woodsy sweetness perfect for fireside sipping-because, alas, it won't stay summer forever.
| 2019-04-22T17:57:21 |
https://www.citypaper.com/bcp-cms-1-1542487-migrated-story-cp-20130828-food2-20130828-story.html
|
0.999951 |
Supreme Court's latest church-state conundrum: Must a 'peace cross' memorial to World War I vets come down?
The Supreme Court will decide if a 93-year-old World War I memorial must be removed from public land in Maryland because it's shaped like a cross.
WASHINGTON – The Supreme Court agreed Friday to decide whether a 93-year-old memorial to World War I veterans must be removed from public land in Maryland because it is shaped like a cross.
The latest church-state skirmish to come before the justices pits veterans organizations against the American Humanist Association, which represents atheists, agnostics and other secular groups. Its motto is "Good Without a God."
For the past few decades, the Supreme Court generally has carved out protections for religious groups and individuals. In recent years, it ruled that a Missouri church could receive federal funds, private corporations could avoid federal health regulations regarding contraceptives, and a New York town could open meetings with Christian prayers.
The 40-foot cross was built in 1925 by the American Legion and "a group of bereaved mothers," according to the Maryland-National Capital Park and Planning Commission, which wants it left alone. Honoring 49 men from Prince George's County who died in the war, it is listed on the National Register of Historic Places.
The commission took over the property in 1961 and maintains it with public funds. It sits in a three-way highway median that is now the county's busiest intersection.
The U.S. Court of Appeals for the 4th Circuit, based in Richmond, ruled 8-6 last October that the Latin cross is the "pre-eminent symbol of Christianity" and ordered it removed or destroyed. It sided with opponents in ruling that the memorial appears to honor Christian veterans above others.
The commission and American Legion say that's not the case. They argue that the monument had a secular dedication and has been used as the location for patriotic events dating back nearly a century. The cross, they say, represents the symbol of World War I dead.
"This court has recognized that passive displays – particularly displays that have stood without challenge for decades – may constitutionally employ religious symbols in order to convey a predominantly nonreligious message," they argue in court papers.
Nearly 20 military, veteran, religious and conservative groups urged the Supreme Court to step in, a huge number for a case that had yet to be granted. Lawyers for the commission and American Legion say if allowed to stand, the appeals court ruling will imperil hundreds of similar monuments on public land, including those in Arlington National Cemetery.
“One group’s agenda shouldn’t diminish the sacrifice made by America’s veterans and their families," said David Cortman, senior counsel for the conservative Alliance Defending Freedom. "The offended feelings of a passer-by does not amount to a constitutional crisis."
The group challenging the memorial calls it a "Christian cross monolith" that's in poor condition and is a safety hazard. Government funding for maintenance and restoration, it says, represents "excessive entanglement with religion."
It also disagrees that the monument was secular from the start, contending that it was conceived as a "Calvary Cross" to symbolize Jesus Christ's crucifixion and that events held over the decades have featured Christian-themed prayers.
Federal appeals courts have ruled differently on similar memorials. Associate Justice Neil Gorsuch dissented as an appeals court judge in 2010 when the 10th Circuit refused to reconsider a panel's decision that memorial crosses violate the Constitution.
“Our court has now repeatedly misapplied the ‘reasonable observer’ test, and it is apparently destined to continue doing so until we are told to stop,” Gorsuch said.
Now the Supreme Court, with five conservative justices following the confirmation of Associate Justice Brett Kavanaugh last month, could issue just such an admonition.
| 2019-04-21T18:14:11 |
https://www.theadvertiser.com/story/news/politics/2018/11/02/supreme-court-decide-if-peace-cross-war-memorial-can-survive/1612766002/
|
0.999721 |
BetterDistricts - H.Res. 90 - Expressing the sense of the House of Representatives that gun violence is a public health issue and Congress should enact by the end of the 115th Congress comprehensive Federal legislation that protects the Second Amendment and keeps communities safe and healthy, including expanding enforceable background checks for all commercial gun sales, improving the mental health system in the United States, and making gun trafficking and straw purchasing a Federal crime.
H.Res. 90 - Expressing the sense of the House of Representatives that gun violence is a public health issue and Congress should enact by the end of the 115th Congress comprehensive Federal legislation that protects the Second Amendment and keeps communities safe and healthy, including expanding enforceable background checks for all commercial gun sales, improving the mental health system in the United States, and making gun trafficking and straw purchasing a Federal crime.
Bill Status: Referred to the Subcommittee on Health.
Expresses the sense of the House of Representatives that: (1) gun violence is a public health issue; and (2) Congress should expand enforceable background checks for all commercial gun sales, improve the mental health system, and make gun trafficking and straw purchasing a federal crime.
Expressing the sense of the House of Representatives that gun violence is a public health issue and Congress should enact by the end of the 115th Congress comprehensive Federal legislation that protects the Second Amendment and keeps communities safe and healthy, including expanding enforceable background checks for all commercial gun sales, improving the mental health system in the United States, and making gun trafficking and straw purchasing a Federal crime.
(2) Congress should enact by the end of the 115th Congress comprehensive Federal legislation that protects the Second Amendment and keeps communities safe and healthy, including expanding enforceable background checks for all commercial gun sales, improving the mental health system in the United States, and making gun trafficking and straw purchasing a Federal crime.
| 2019-04-23T08:26:40 |
https://www.betterdistricts.org/bill/115-hres-90
|
0.99999 |
had. Shaw married in Mississippi, and he preached while teaching.
Jefferson Davis was sent again to Kentucky, and placed at the Transylvania University, near Lexington. Afterward he was one of six United States Senators who were fellow-students at that University. At the early age of fifteen he was given a cadetship at West Point.
Here is a literal extract from his dictation: "When I entered the United Suites Military Academy, that truly great and good man, Albert Sidney Johnston, had preceded me from Transylvania. Ky., an incident which formed a link between us, and inaugurated a friendship which grew as years rolled by, strengthened by after associations in the army, and which remains to me yet, a memory of one of the greatest and best characters I have ever known. His particular friend was Leonidas Polk."
Mr. Davis then gives an account of Polk's religious convictions, and of his joining the church. It is known that he afterward was a Bishop in the Episcopal Church. Polk was a Lieutenant General, in the Western Army with Gen. Jos. E. Johnston, whom he confirmed into church membership only a few weeks before he was killed by a cannon shot from the enemy. The dictation ended too early. In referring to it, he said to his wife, "I have not told what I wish to say of Sidney Johnston and Polk. I have much more to say of "them."
The history starts on from the dictation in a manner worthy the distinguished wife.
Our people generally know quite well how meanly the publishers treated the author in regard to the royalty on her book, and that she succeeded in stopping its sale when they owed her a little more than $4,000. When legal technicalities are removed, and she can procure what is due her on sales, there will no doubt be many orders given for the work, both because of its merits and the wish to show an appreciation of her noble service in its presentation.
FROM TWO TRIBUTES TO MR. DAVIS.
"Jefferson Davis built his own monument firmly in the history of his country—a heritage for the world. It rises, firm and true, out of his struggles as a typical American youth; out of his service to his country on the fields of Mexico; out of his planter's life, adorned by domestic love and the affection and confidence of neighbors and slaves; out of his earnest, stormy political struggles; out of his able organization and support of the American military system, as Secretary of War, and as a statesman; out of his far-sighted projection of a transcontinental railway; out of his long and able career as a statesman; out of his faithful struggle to preserve the Union as it was, and out of his sad but resolute departure to enter upon inevitable civil strife; out of his able civil administration as President; out of his capable preparation for and conduct of war; out of his clear and able State papers; out of his unfaltering devotion to civil liberty, in the midst of arms, when laws are silent; out of his preservation of the forms and spirit of civil government, when the military necessity for a dictator must have tempted him strongly to sweep aside all that stood in the way of the military arm; out of his stubborn endurance in war: out of the ignominy of unjust chains and prison; out of his long and dignified endurance of obloquy; out of his life as a man and a citizen, a neighbor, husband and father; out of his quiet but able part in church and business assemblies, when he was denied all part in political affairs. Out of these conditions of his busy life rises the monument he builded—more enduring than bronze or marble. To ourselves we owe it to build a material monument symbolic of these virtues."
"Jefferson Davis was the man not only of his generation, but of his day. His unique personality would have fitted nowhere else. His destiny was as broad as his country, and there was no other gap of American history wide enough to receive it. To us, as to all the world, he still stands for the Confederacy. He was covered with it. Between the dates of his birth and death was written all of that stormy chapter. In the name of Jefferson Davis we must raise a monument to the Old South, for in his long career the glory of that Old South lies like a sword within its scabbard, inclosed from hilt to tip with years of precious service. To you Confederate veterans Jefferson Davis is a memory, but to the young men of the South he is an inspiration. For you he revives the past, but for us he animates the future. To you be is a majestic figure of battle smoke looming up in the haze and distance of a generation ago, but to us he is a living presence, an example of a man striding on before all of our ambitions, showing us by his knightly footsteps where we should tread."
A CHRISTIAN'S NEW YEAR GREETING.
Again the love-chords of my heart, dear aunt, I'll tune for thee.
And may no bitter sorrow becloud thy glad new year.
The angels sang a chorus of "peace on earth, good will;"
May the spirit of that anthem our hearts forever fill!
Again, the loving words, "I'll not leave thee, nor forsake,"
Inspires our fainting energies, and we fresh courage take.
Waiting still and watching for the coming of our Lord.
And with the many ransomed receive the promised crown.
Jacksonville, Ala., Jan. 1, 1898. Mary D. C.
The recipient of the above stands first in practical advancement of the Monument cause.
Please supply information to this journal about contributors to Confederate Homes or Monuments.
This page was last edited on 10 June 2018, at 15:36.
| 2019-04-22T20:35:28 |
https://en.wikisource.org/wiki/Page:Confederate_Veteran_volume_01.djvu/11
|
0.998877 |
There is currently somewhere between 120,000 and 140,000 tonnes of gold in the world 'above ground'. To visualise this, imagine a single solid gold bullion cube with edges of about 19 metres (about three metres short of the length of a tennis court). That's all that has ever been produced.
Divided amongst the population of the world, there are about 23 grams per person, about 1.2 cubic centimetres each. This equates to about $250 - $350 worth per person on Earth, depending on the current price.
The value of that short tennis court sized cube is about $3.6 trillion. This compares to the US government's sovereign debt of $11 trillion, which until 1971 was part-backed by gold. The US Gold Reserve is just over 8,000 tonnes - which is about 6% of the total gold ever mined. It is worth about $200 billion, or 1.8% of the US national debt.
$3.6 trillion is about one fifteenth of the paper based international bond markets, which themselves, at about $55 trillion, are about two thirds composed of western government sovereign debt almost all of which has appeared, co-incidentally, since 1971 and the declared supremacy of paper money, which was what allowed governments to borrow without caution. The total gold content of the world would pay - at current values - about 7% of the international bond market's sovereign debt. Of course, 75% of the world's gold is not available to governments - being held privately as jewellery, bullion and coin. In fact only about 30,000 tonnes, about 1% of the world's sovereign debt is what is held in central bank gold reserves.
The world has placed absolute trust in paper currency denominated assets. Investors have shunned gold bullion for about twenty years while the notional value of paper based financial assets has exploded.
Who owns the gold bullion?
Where it is known about with reasonable confidence and can be extracted economically, un-mined gold appears on the books of mining companies as 'reserves'. There remains as reserves about 40% of the total of gold above ground - i.e. about 50,000 tonnes. South Africa has 50% of the world's known stock of un-mined gold.
Gold is difficult to find in commercial quantities. It also takes time, typically 5 years, and plenty of money to bring mines into production. In this sense, the supply side of the gold equation is relatively constant.
One of the features of this is that boom-times encourage investment which takes a considerable time to work through to production and eventually, to worked out mines. After a boom, when investment decisions may be made on over-inflated expectations of ultimately achievable prices, there is a tendency to subsequent overproduction and poor prices for a considerable period.
Production then levelled out and started to dip slightly, as gold mines were exhausted and poorer mines shut. Also, the uninspiring gold market encouraged a decrease in exploration which now means there are a lower number of new mines coming into production than is expected to be required by the market.
Nonetheless, for the time being, gold is still being mined and refined at the rate of almost 2,600 tonnes per year. Thus, the world supply of above ground gold is increasing - or inflating - at just over 2% annually. At current rates, the gold supply is growing the under-sized tennis court cube at about 12 centimetres a year. It will reach a full tennis court sized cube in about 20 year's time.
Half a cubic metre - fits in a corner of a small bank vault.
A small living room - and more than twice Britain's gold reserve.
The US gold reserve fits into a town house. Fort Knox is mostly empty space!
All the gold in the world - A block with edges 3 metres short of a standard sized tennis court.
The chemical symbol for gold is Au.
Gold’s atomic number is 79 and its atomic weight is 196.967.
The specific gravity of gold is 19.3, meaning gold weighs 19.3 times more than an equal volume of water.
| 2019-04-23T12:05:55 |
https://www.bullionmark.com.au/how-much-gold-is-there
|
0.999999 |
Keelon Lawson on show does not rule out a return from Dedric and KJ Lawson to Memphis depending on what happens at Kansas with FBI.
File this away under the category: Worth Keeping an Eye On.
Keelon Lawson, the father of Kansas transfers Dedric and K.J. Lawson appeared on Memphis' 92.9 ESPN Radio recently and told sports talk host John Martin that he would not rule out a return to Memphis by the KU forwards should things go south with Kansas and the FBI.
To date, there is no reason to believe that will happen, as the Kansas program has merely been listed as having been defrauded by an Adidas executive in a federal indictment that outlines some of the details into the FBI's ongoing investigation into corruption in college basketball.
But it's definitely worth noting that these kinds of thoughts are (a) being considered and (b) being tossed out there publicly.
In the interest of full disclosure here, Keelon Lawson is on 92.9 FM ESPN Radio every Monday to talk with Martin about the ins and outs of basketball in the city of Memphis. During today's segment, Lawson was talking about the return of Penny Hardaway to Memphis as the Tigers head coach and hinted at some more exciting recruiting news coming in the near future for Hardaway's program.
When asked then, by Martin, if that meant the return of Dedric and K.J. to their hometown, Keelon Lawson laughed.
"Oh, nah. Ha ha ha ha," he said before elaborating on what his sons have been told by KU coach Bill Self about the FBI investigation.
"The only thing I could tell when talking to Dedric, he just said Coach Self said everything is fine," Keelon Lawson said on the air. "You could read the report that says Kansas is a victim, meaning somebody did something behind Kansas' back to make us be a victim. But he said, as far as everything with the coaching staff, they didn't have anything to do with it. And then they'll just let their attorneys handle the procedure.
"He told Dedric, if something were to come down, they (Dedric and K.J.) would be the first ones to know because, you know, they would be the first ones to know so they could have the opportunity to do whatever they have to do."
Asked, point blank, if he were ruling out a return to Memphis by his sons, Lawson said: "If something goes down with Kansas, if Penny would open the door to them to come back, as far as Coach Self being fired, I think the boys would entertain it. But as of right now, they're at Kansas."
The Lawson father was not shy about going on the radio and discussing his son's very public departure from Memphis and then-coach Tubby Smith last spring. On both the local airwaves and a national podcast with CBS Sports' Gary Parrish, Keelon Lawson talked openly about his sons' plans and the reason behind them.
With Hardaway, one of Memphis' favorite sons, now leading the Tigers program, a return to their hometown cannot be ruled out the way it might be if Smith were still leading the program.
But that's a lot of ifs and it seems as if there still would be a lot that would need to happen for this to become something other than idle chatter by the father of a couple of KU players. Beyond that, even if the Lawson brothers eventually did want to head back home, they would have to sit out yet another season before being eligible to play again.
Both Dedric and K.J. Lawson are in line for big roles with the 2018-19 Jayhawks, with Dedric, a potential future NBA Lottery pick, expected to start alongside KU center Udoka Azubuike, should he return for his junior season as many expect, in the KU front court next season.
LISTEN FOR YOURSELF: Jason & John Hour 3, 4/16/18 — Keelon Lawson, who appears on the show every Monday to talk about the ins and outs of basketball in the city of Memphis, jumps into the mix around the 30:00 mark and the specific stuff about KU starts around 37:00 and goes to about 41:00.
Yep. This clown sounds like Lavar Ball Jr.
I was thinking Carl Henry, but your analogy is better. As Bugs Bunny would say, "what a maroon!"
It seems neither dad can stop living through their kids but not nearly the same level as LaVar Ball.
I don’t think it’s a smart move for Keelon to make this public. But either way I’m sure Kansas will be just fine without them if they do in fact decide to leave.
ya that is pretty tacky, talking smack about KU when we helped them.
Did you read the whole article? I don't see where he talked smack about KU.
Really unlikely that anything happens with the FBI before next season so even more unlikely that anything changes for the roster - except Romeo being added. Their rental will be over by this time next year. Nothing to see here. "Interesting" side show stirring the Memphis pot. Fortunately a far cry from BBB.
Do you find it likely that Adidas hasn't already "steered" players in the upcoming draft?
He's trying to patch things up with his ex, you know, for a fall back option just in case things don't work out with the new girl.
I wonder if Bill Self addresses this kind of thing with player's parents.
Keelon, next time anyone asks you about your sons, maybe you should just stick to reality and not hypotheticals. They are Jayhawks and we expect big things from them next year.
Why would they leave Kansas for a school that probably won't win its league, probably won't make the NCAA tourney, and will play a fraction of the nationally televised games as KU?
Do you think that Kansas will get the death penalty? Or Bill Self gets fired? Postseason ban? Where do you draw the line? Are you scared that your sons will be overshadowed by all of the other talent on the KU roster? Dedric should be a star next year regardless of if Azubuike comes back or if we land Langford. Stop worrying and embrace being a Jayhawk.
These kids come from all sorts of backgrounds. Basketball is a profession so why not teach these kids to make informed choices that a professional should.
.Agents, banking, past friends, and posses are some of the things besides having more money than thay ever dreamed. I'm not talking "how many points is a three-point shot?" but real academics to prepare them for their profession.
I'm sure Self must address this but what happens when all of this goes on before the kid even gets to college?
Nothing worse than seeing former athletes broke and on the street. It makes a lot more sense to learn the value of money while they still have it.
Dedric would go to the G-league or Europe before transferring again, unless the NCAA approves some type of rule for basketball and football players that allow them to transfer without sitting out. Dedric is in position to play a major role if KU is to succeed next season and put himself in position to be a first rounder if he plays as expected.
The real prize is their younger brother who is a senior in high school this coming year and one of the top recruits for next year.
My bet is that Dedric and K. J. play for KU this year and then are gone. Their younger brother will sign with Penny Hardaway at Memphis who was the high school coach for all three of them before taking over for Tubby Smith starting this next season.
He'll be going to Memphis now.
dont know why he would even come out and say anything..it could be awhile before the FBI is fully done and even longer before the NCAA would even be able to start their own investigation...it took 5 years for a ruling when Duke was going through the Corey Maggette issue...but even then, as long as KU isnt directly involved it isnt likely they'd have to forfeit any games from last season..the real question is, does Self take a risk and play Silvio next season??
Everything you said is right but this might take years to prosecute if ever and the NCAA is not part of the investigating team.
Not really my best answer so I'll try again.
You can sit and wait for something that NOBODY knows is necessary and be forced to watch another Jayhawk sitting on the bench waiting for clearance.
Are you really willing to see that optic? What is the record for having the most consecutive years where your top incoming talent sits on the bench waiting for the NCAA to make a decision? The best thing outcome is for Silvio to declare for the draft. He showed more than enough talent and athleticism in KU's postseason.
I agree the youngest 2 Lawsons likely go to Memphis. Chandler and Jonathon are both really good, but Dedric is the best of the 4. KU is lucky to have him.
puh lease. those brothers would be stupid to take another transfer year off. right now they could be 1st round if they play here to another final four. step aside dad, your boys are men now. they make their own decisions.
I agree, it is unlikely that they would transfer again. If they did play here a year, their only option would be to go pro, rather than transfer again.....unless they graduate next year, which is possible. In that scenario they could both transfer with a year of eligibility left (possibly 2 for KJ).
HAHAHA! NOBODY is that stupid. Sit out another year? If they want to go- GO!
Udoka/Lightfoot/McCormick + a top-tier backcourt and we can repeat last year. Silvio?
You have more confidence than I do when it comes to the FBI. 3 or 4 years? They can easily drag this out much longer than that.
I don't know the Lawsons, but I've been around them at tournaments, including this past weekend. This is not the Ball family. Not even close. He was asked a question and answered it honestly, including qualifiers. Of course if Self were fired they would look elsewhere. So would every other player.
As for the sons, Dedric is the best of the 4. He will be great for KU next year.
The players and families today that these coach's have to deal with are unreal. Not only the coach's but fans as well. What a bunch of premadonna's. Pack your stuff up and don't let the door hit you where the sun doesn't shine. Why is it that it seems like KU gets all the problem children. Do you ever hear of issues like this with the Duke recruits? Frustrating.
I think Duke controls the message better once they get on campus than we do. I don't know who or what gets credit or blame for that. I'd argue that KU is okay at it, but comes across as clumsy at best dealing with this. Maybe it's just not Self's strong suit. The fact that Duke spend nearly twice as much money on its hoops program that we do probably affords you a lot of PR handlers that KU just doesn't have.
When you say "not Bill Self's strong suit" are you meaning that Bill Self struggles to control the things that player's families say to the media?
If so, I really would disagree with that assertion for two reasons.
First Bill Self really has little control over what parent's say to the media. But what he does have control over is what messaging and how much of it are given to the player's parents. Sure he can, and probably does coach them in how to respond to different types of queries as much as he can. But for the most part it's all about his message to them. I'd be shocked if he doesn't have frequent and very consistent communications that go to families of players in order to almost indoctrinate them with certain words and phrases, that they can use as repsonses to various media or other external inquiries.
Second, over the 15 years that Self has coached at KU, there really haven't been very many issues with parents. Parents have mostly been overall pretty good for the program. We've had more parent's like Angel Morris than like Keelon Lawson, and really what this guy is saying is ultimately no big deal and will end up as water under the bridge.
If you read the full context there's nothing to see here. The co-host completely led him into speculating about it, it's not something he brought up on his own.
It is funny that some fans talk contemptuously about KUs leaders if they don't react and speculate about every little bit "news" that is thrown out on the internet but when the reaction from someone doesn't appear wonderful for KU there's just more contempt.
Guess what? That's life, plain and simple.
| 2019-04-26T16:24:35 |
http://www2.kusports.com/weblogs/tale-tait/2018/apr/16/father-of-kus-lawson-brothers-talks-memp/
|
0.999983 |
A. triphylla and A. californica are similar. One way to tell them apart is to count the number of chromosome in a cell. If the number is 12 then the plant is A. triphylla. If the number is 24 the plant is A. californica. If you are unsure the plant is most likely A. triphylla.
| 2019-04-22T04:34:00 |
http://www.wildflowersearch.org/search?PlantName=Achlys+triphylla
|
0.999371 |
Ask a question in a forum.
Ask 10 questions in a forum.
Start a discussion in a forum that receives 5 replies.
Start 25 discussions in a forum that each receives 5 replies.
Start 50 discussions in a forum that each receives 5 replies.
| 2019-04-22T10:46:46 |
https://communities.bentley.com/achievements
|
0.999979 |
A method includes programming a sound processor to apply frequency shifting on a stimulation signal to generate a frequency shifted stimulation signal. The frequency shifting depends on one or more of a decibel level of a received sound signal, a hearing loss level associated with generating the stimulation signal, attenuation of an output based on the frequency shifted stimulation signal, or operating a hearing prosthesis in a single sided mode or a bilateral mode. The method includes receiving a sound signal, generating the stimulation signal from the sound signal, applying the frequency shifting to the stimulation signal to generate the frequency shifted stimulation signal, and generating, by an actuator of the hearing prosthesis, the output based on the frequency shifted stimulation signal, wherein the output is configured to be perceived as sound.
1. A method comprising: programming a sound processor to apply frequency shifting on a stimulation signal to generate a frequency shifted stimulation signal, wherein the frequency shifting depends on one or more of a decibel level of a received sound signal, a hearing loss level associated with generating the stimulation signal, attenuation of an output based on the frequency shifted stimulation signal, or operating a hearing prosthesis in a single sided mode or a bilateral mode receiving a sound signal; generating the stimulation signal from the sound signal; applying the frequency shifting to the stimulation signal to generate the frequency shifted stimulation signal; and generating, by an actuator of the hearing prosthesis, the output based on the frequency shifted stimulation signal, wherein the output is configured to be perceived as sound.
2. The method of claim 1, wherein programming the sound processor to apply frequency shifting includes programming the sound processor to apply level dependent frequency shifting based on the decibel level of the received sound signal, wherein the level dependent frequency shifting applies a first degree of frequency shifting for a first decibel level of the sound signal or a second degree of frequency shifting for a second decibel level of the sound signal, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first decibel level is lower than the second decibel level.
3. The method of claim 1, wherein programming the sound processor to apply frequency shifting includes programming the sound processor to apply hearing loss dependent frequency shifting based on the hearing loss level, wherein the hearing loss dependent frequency shifting applies a first degree of frequency shifting for a first hearing loss level or a second degree of frequency shifting for a second hearing loss level, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first hearing loss level is greater than the second hearing loss level.
4. The method of claim 1, wherein programming the sound processor to apply frequency shifting includes programming the sound processor to apply attenuation dependent frequency shifting based on the attenuation of the output, wherein the attenuation dependent frequency shifting applies a first degree of frequency shifting for a first attenuation of the output or a second degree of frequency shifting for a second attenuation of the output, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first attenuation is greater than the second attenuation.
5. The method of claim 4, wherein the first attenuation is associated with the actuator configured for a transcutaneous coupling to a recipient of the hearing prosthesis, and the second attenuation is associated with the actuator configured for a percutaneous coupling to the recipient.
6. The method of claim 1, wherein programming the sound processor to apply frequency shifting includes programming the sound processor to apply mode dependent frequency shifting based on whether the hearing prosthesis is operating in the single sided mode or the bilateral mode, wherein the mode dependent frequency shifting applies a greater degree of frequency shifting when operating the hearing prosthesis in the single side mode compared to operating the hearing prosthesis in the bilateral mode.
7. The method of claim 1, wherein the actuator is a vibrating actuator configured to impart vibration, via a coupling apparatus, to a bone structure of a recipient of the hearing prosthesis.
8. The method of claim 1, wherein programming the sound processor to apply frequency shifting includes programming the sound processor to apply voice dependent frequency shifting that depends on one or more frequency bands associated with a voice of a recipient of the hearing prosthesis, wherein the voice dependent frequency shifting applies a first degree of frequency shifting for a first frequency band of the received sound signal and a second degree of frequency shifting for a second frequency band of the received sound signal, and wherein the first degree of frequency shifting is less than the second degree of frequency shifting, and the first frequency band includes a higher amount of the one or more frequency bands associated the voice of the recipient than the second frequency band.
9. A device comprising: a sound input element configured to receive a sound signal, and to convert the sound signal into an electrical signal; a sound processor configured to generate a stimulation signal based on the electrical signal, and to apply frequency shifting on the stimulation signal to generate a frequency shifted stimulation signal, wherein the frequency shifting depends on one or more of a decibel level of the received sound signal, a hearing loss level associated with generating the stimulation signal, attenuation of an output based on the frequency shifted stimulation signal, or operating in a single sided mode or a bilateral mode; and an actuator configured to generate the output based on the frequency shifted stimulation signal, wherein the output is configured to be perceived as sound.
10. The device of claim 9, wherein the sound processor is configured to apply level dependent frequency shifting based on the decibel level of the received sound signal, wherein the level dependent frequency shifting applies a first degree of frequency shifting for a first decibel level of the sound signal or a second degree of frequency shifting for a second decibel level of the sound signal, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first decibel level is lower than the second decibel level.
11. The device of claim 9, wherein the sound processor is configured to apply hearing loss dependent frequency shifting based on the hearing loss level, wherein the hearing loss dependent frequency shifting applies a first degree of frequency shifting for a first hearing loss level or a second degree of frequency shifting for a second hearing loss level, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first hearing loss level is greater than the second hearing loss level.
12. The device of claim 9, wherein the sound processor is configured to apply attenuation dependent frequency shifting based on the attenuation of the output, wherein the attenuation dependent frequency shifting applies a first degree of frequency shifting for a first attenuation of the output or a second degree of frequency shifting for a second attenuation of the output, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first attenuation is greater than the second attenuation.
13. The device of claim 12, wherein the first attenuation is associated with the actuator configured for a transcutaneous coupling to a recipient of the device, and the second attenuation is associated with the actuator configured for a percutaneous coupling to the recipient.
14. The device of claim 9, wherein the sound processor is configured to apply mode dependent frequency shifting based on whether the device is operating in the single sided mode or the bilateral mode, wherein the mode dependent frequency shifting applies a greater degree of frequency shifting when operating in the single side mode compared to operating in the bilateral mode.
15. The device of claim 9, wherein the sound processor is further configured to modify the frequency shifting based on machine learning of adjustments to one or more parameters of the device.
16. An article of manufacture including a non-transitory computer readable medium with instructions stored thereon, the instructions comprising: instructions for generating a stimulation signal from a sound signal; instructions for applying frequency shifting to the stimulation signal to generate a frequency shifted stimulation signal, wherein the frequency shifting depends on one or more of a decibel level of the sound signal, a hearing loss level associated with generating the stimulation signal, attenuation of an output based on the frequency shifted stimulation signal, or operating a hearing prosthesis in a single sided mode or a bilateral mode; and instructions for providing the frequency shifted stimulation signal to an actuator of the hearing prosthesis, wherein the actuator is configured to generate an output based on the frequency shifted stimulation signal, and wherein the output is configured to perceived as sound.
17. The article of manufacture of claim 16, wherein the frequency shifting is level dependent frequency shifting based on the decibel level of the received sound signal, wherein the level dependent frequency shifting applies a first degree of frequency shifting for a first decibel level of the sound signal or a second degree of frequency shifting for a second decibel level of the sound signal, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first decibel level is lower than the second decibel level.
18. The article of manufacture of claim 16, wherein the frequency shifting is hearing loss dependent frequency shifting based on the hearing loss level, wherein the hearing loss dependent frequency shifting applies a first degree of frequency shifting for a first hearing loss level or a second degree of frequency shifting for a second hearing loss level, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first hearing loss level is greater than the second hearing loss level.
19. The article of manufacture of claim 16, wherein the frequency shifting is attenuation dependent frequency shifting based on the attenuation of the output, wherein the attenuation dependent frequency shifting applies a first degree of frequency shifting for a first attenuation of the output or a second degree of frequency shifting for a second attenuation of the output, and wherein the first degree of frequency shifting is greater than the second degree of frequency shifting, and the first attenuation is greater than the second attenuation.
20. The article of manufacture of claim 16, wherein the frequency shifting is mode dependent frequency shifting based on whether the device is operating in the single sided mode or the bilateral mode, wherein the mode dependent frequency shifting applies a greater degree of frequency shifting when operating in the single side mode compared to operating in the bilateral mode.
This is a continuation of U.S. patent application Ser. No. 13/911,300 filed on Jun. 6, 2013, which will issue as U.S. Pat. No. 9,179,222 on Nov. 3, 2015, the contents of each of which are hereby incorporated by reference.
Various types of hearing prostheses may provide persons with different types of hearing loss with the ability to perceive sound. Hearing loss may be conductive, sensorineural, or some combination of both conductive and sensorineural. Conductive hearing loss typically results from a dysfunction in any of the mechanisms that ordinarily conduct sound waves through the outer ear, the eardrum, or the bones of the middle ear. Sensorineural hearing loss typically results from a dysfunction in the inner ear, including the cochlea where sound vibrations are converted into neural signals, or any other part of the ear, auditory nerve, or brain that may process the neural signals.
Persons with some forms of conductive hearing loss may benefit from hearing prostheses, such as acoustic hearing aids or vibration-based hearing devices. An acoustic hearing aid typically includes a small microphone to detect sound, an amplifier to amplify certain portions of the detected sound, and a small speaker to transmit the amplified sounds into the person's ear.
Vibration-based hearing devices typically include a small microphone to detect sound and a vibration mechanism to apply vibrations corresponding to the detected sound directly or indirectly to a person's bone or teeth, thereby causing vibrations in the person's inner ear and bypassing the person's auditory canal and middle ear. Vibration-based hearing devices include, for example, bone conduction devices, direct acoustic cochlear stimulation devices, or other vibration-based devices. A bone conduction device typically utilizes a surgically implanted mechanism or a passive connection through the skin or teeth to transmit vibrations corresponding to sound via the skull. A direct acoustic cochlear stimulation device also typically utilizes a surgically implanted mechanism to transmit vibrations corresponding to sound, but bypasses the skull and more directly stimulates the inner ear. Other non-surgical vibration-based hearing devices may use similar vibration mechanisms to transmit sound via direct or indirect vibration of teeth or other cranial or facial bones or structures.
Persons with certain forms of sensorineural hearing loss may benefit from hearing prostheses, such as cochlear implants and/or auditory brainstem implants. For example, cochlear implants can provide a person having sensorineural hearing loss with the ability to perceive sound by stimulating the person's auditory nerve via an array of electrodes implanted in the person's cochlea. A microphone of the cochlear implant detects sound waves, which are converted into a series of electrical stimulation signals that are delivered to the implant recipient's cochlea via the array of electrodes. Auditory brainstem implants can use technology similar to cochlear implants, but instead of applying electrical stimulation to a person's cochlea, auditory brainstem implants apply electrical stimulation directly to a person's brain stem, bypassing the cochlea altogether. Electrically stimulating auditory nerves in a cochlea with a cochlear implant or electrically stimulating a brainstem may enable persons with sensorineural hearing loss to perceive sound.
Further, some persons may benefit from hearing prostheses that combine one or more characteristics of the acoustic hearing aids, vibration-based hearing devices, cochlear implants, and auditory brainstem implants to enable the person to perceive sound. Such hearing prostheses can be referred to generally as bimodal hearing prostheses. Generally, the term bimodal means more than one stimulation mode, and not necessarily only two stimulation modes.
The effectiveness of a hearing prosthesis depends on the design of the prosthesis itself and on how well the prosthesis is configured for or fitted to a prosthesis recipient. The fitting of the prosthesis, sometimes also referred to as programming or mapping creates a set of configuration settings and other data that define the specific characteristics of the signals (acoustic, mechanical, or electrical) delivered to the relevant portions of the person's outer ear, middle ear, inner ear, auditory nerve, or skull. This configuration information may also include a prescription rule that defines a relationship between audio input parameters and output parameters for audio frequency channels of the hearing prosthesis.
Referring more particularly to acoustic hearing aids, an example prescription rule can include applying frequency shifting to process incoming sound before applying amplified sounds into the person's ear. Frequency shifting in the context of acoustic hearing aids is performed primarily to move sound information from impaired higher frequency regions of the cochlea to better functioning lower frequency regions of the cochlea.
While frequency shifting has been used in the context of acoustic hearing aids to move sound information from impaired higher frequency regions to better functioning lower frequency regions of the cochlea, this same reason may not be an issue with other types of hearing prostheses. For instance, in the context of vibration-based hearing devices, recipients of such devices may maintain some useable hearing capabilities for higher frequency sounds. Thus, frequency shifting is not generally needed to shift sound information from higher to lower frequency regions of the cochlea.
However, in accordance with the present disclosure, frequency shifting is applied in vibration-based hearing devices and other types of hearing prostheses, although for different reasons and using different frequency shifting techniques than in the case of acoustic hearing aids. For example, in the present disclosure, frequency shifting can be applied in a vibration-based hearing device to compensate for the attenuation of higher frequency sound signals that are transmitted through the skin and/or bone as vibration. Another reason to apply frequency shifting in a vibration-based hearing device is to help minimize the effect of feedback associated with higher frequency sounds signals.
Further, frequency shifting can be applied to compensate for limitations of a vibration-based hearing device or other type of hearing prosthesis to deliver higher frequency electrical signals that can be perceived as sound by the recipient. For example, a hearing prosthesis may not be powerful enough to deliver electrical signals that can be perceived as sound by a recipient at frequencies between about 3 kHz to 8 kHz. These output limitations depend in part on the design of the device and on the hearing loss of the recipient. In any event, once an output limit is identified, such as during a fitting session, frequency shifting can be applied to electrical signals above the limit.
For these and perhaps other reasons, frequency shifting is applied in hearing prostheses in accordance with the present disclosure. In one example, this frequency shifting includes level dependent frequency shifting, in which one or more parameters of the frequency shifting are dependent on an input sound level and/or a hearing loss level. Such parameters may include, for example, an amount of frequency content to be shifted, an extent of the frequency shifting, whether frequency shifted content replaces or mixes with other sound content, etc.
In another example, a frequency shifting system or method is disclosed that is dependent on operating parameters of the hearing prosthesis. For instance, frequency shifting can be applied differently based on whether the device is operating in a single-sided mode or a bilateral mode or based on different listening situations, such as speech, noise, music, etc. In yet another example, a frequency shifting system or method is disclosed that performs a voice-dependent frequency shifting, in which the frequency shifting is dependent on one or more frequency bands associated with a voice of a hearing prosthesis recipient. In a further example, a frequency shifting system or method can be dependent on other parameters of the hearing prosthesis, such as whether a vibration-based hearing device includes a transcutaneous or percutaneous coupling to a recipient.
These different frequency shifting are applicable to vibration-based hearing devices but also may be applied in other types of hearing prostheses in order to increase audibility of high frequency sounds, to improve the localization effect in single-sided or bilateral operating modes, and to improve sound quality by altering the frequency for softer sounds while louder sounds are allowed to produce a natural hearing response in the recipient, for example.
The above and additional aspects, examples, and embodiments are further described in the present disclosure.
FIG. 1 illustrates a hearing prosthesis, in this case, a bone conduction device that is coupled to a recipient, in accordance with one example of the present disclosure.
FIG. 2 illustrates a block diagram of a hearing prosthesis system according to an embodiment of the present disclosure.
FIG. 3 illustrates a block diagram of a fitting system for a hearing prosthesis according to an embodiment of the present disclosure.
FIG. 4 is a flowchart showing a method or algorithm for applying frequency shifting according to an embodiment.
The following detailed description sets forth various features and functions of the disclosed devices, systems, and methods with reference to the accompanying figures. In the figures, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described herein are not meant to be limiting. Certain aspects of the disclosed devices, systems, and methods can be arranged and combined in a variety of different configurations, all of which are contemplated herein. For illustration purposes, some features and functions are described with respect to vibration-based hearing devices. However, various features and functions disclosed herein may be applicable to other types of hearing prostheses and, more particularly, to hearing prostheses that have high-frequency output limitations.
FIG. 1 is a perspective view of an example vibration-based hearing prosthesis in accordance with one embodiment of the present disclosure. More particularly, FIG. 1 depicts a vibration-based hearing device 20 positioned behind an outer ear 22 of a recipient to aid in the perception of sound. The vibration-based hearing device 20 includes a sound input element 24 to receive sound signal 26. The sound input element 24 can be a microphone, telecoil, or similar device. In the depicted example, the sound input element 24 is located on the vibration-based hearing device 20. However, in other embodiments, the sound input element 24 can be located in the vibration-based hearing device 20 or, alternatively, on a cable extending from the vibration-based hearing device. The vibration-based hearing device 20 additionally includes a sound processor, a vibrating electromagnetic actuator, and/or various other operational components.
In accordance with an example operation of the vibration-based hearing device 20, the sound input device 24 converts the sound signal 26 into an electrical signal. This electrical signal is then processed by the sound processor (not shown) to generate a stimulation signal that causes the actuator to vibrate. In other words, the actuator converts the stimulation signal into mechanical force to impart vibration to skull bone 28 of the recipient.
In the example depicted, the vibration-based hearing device 20 further includes a coupling apparatus 30 to attach the vibrating actuator of the vibration-based hearing device to the recipient. In the present example, the coupling apparatus 30 is attached to an anchor system (not shown) implanted in the recipient. Some example anchor systems (which are sometimes referred to as fixation systems) include a percutaneous abutment fixed to the recipient's skull bone 28. The percutaneous abutment extends from the skull bone 28 through muscle 32, fat 34 and skin 36 so that the coupling apparatus 30 may be attached directly thereto. Such a percutaneous abutment provides an attachment location for the coupling apparatus 30 that facilitates efficient transmission of mechanical force.
Another example anchor system includes a transcutaneous component, such as a magnet, that is implanted under the skin 36 of the recipient. In this example, the coupling apparatus 30 can magnetically couple to the transcutaneous component and mechanical force (e.g., vibration) is transmitted through the skin to the skull bone 28. In another example, the transcutaneous component can be a transducer, such as a vibration mechanism, which is implanted under the skin 36 and attached to the bone 28. In this example, the device 20 can be magnetically coupled to the transducer component through the skin 36 of the recipient. In transcutaneous coupling configurations, the skin flap between the device 20 and the bone 28 causes attenuation of sound signals transmitted through the skin and/or bone as vibration. Generally, this attenuation has a greater effect for higher-frequency sound signals and greater skin flap thicknesses.
FIG. 2 depicts a functional block diagram of one example of a hearing prosthesis 60, such as a vibration-based hearing prosthesis (e.g. the vibration-based hearing device 20 of FIG. 1). However, as described above, the features and associated functionality described with reference to the hearing prosthesis 60 may be equally applicable to other types of hearing or medical prostheses.
In operation, a sound signal 62 is received by a sound input element 64. In some arrangements, the sound input element 64 is a microphone configured to receive the sound signal 62, and to convert the sound signal into an electrical signal 66. Alternatively, the sound signal 62 is received by the sound input element 64 as an electrical signal, such as via an input jack, for example.
As further depicted in FIG. 2, the electrical signal 66 is provided by the sound input element 64 to an electronics module 68. The electronics module 68 is configured to convert the electrical signal 66 into an adjusted electrical signal 70. Generally, the electronics module 68 may include a sound processor, data storage with computer-readable program instructions, control electronics, transducer drive components, and a variety of other elements, including, but not limited to one or more processors.
In one example of the present disclosure, the electronics module 68 includes hardware and/or software components that apply frequency shifting to convert the electrical signal 66 into a frequency shifted, adjusted electrical signal 70. In this example, the electronics module 68 can include a specific meta trimmer or other control mechanism to adjust the degree of frequency shifting, which can also be combined with level shifting of the electrical signal.
The electronics module 68 can also include an expert system that modifies frequency shifting based on data logging and machine learning of different configurations or parameters of the hearing prosthesis, for example. Illustratively, the expert system can track user adjustments to a volume control of the hearing prosthesis to determine whether a greater or lesser degree of frequency shifting should be applied presently and/or in the future. Thus, for example, if the expert system determines that a user repeatedly increases the volume for a range of incoming sound frequencies, then the system may apply less frequency shifting for that range of incoming sound frequencies. The expert system can also track adjustments made during a fitting session of the hearing prosthesis to modify frequency shifting.
As further depicted in FIG. 2, when the hearing prosthesis 60 is a vibration-based hearing device, a transducer module or actuator 72 receives the adjusted electrical signal 70 and generates a mechanical output force that is delivered in the form of a vibration to the skull of the recipient via an anchor system 74. Delivery of this output force causes motion or vibration of the recipient's skull, thereby activating the hair cells in the recipient's cochlea via cochlea fluid motion. In other types of devices, the anchor system 74 is omitted and the transducer module 72 generates other types of stimulation (e.g., acoustic, mechanical, or hybrid stimulation, such as acoustic and electric, for example) for application to the recipient.
FIG. 2 also illustrates a power module 76. The power module 76 provides electrical power to one or more components of the hearing prosthesis 60. For ease of illustration, the power module 76 has been shown connected only to a user interface module 78 and the electronics module 68. However, it should be appreciated that the power module 76 may be used to supply power to any electrically powered circuits/components of the hearing prosthesis 60.
The user interface module 78 allows a user to interact with the hearing prosthesis 60. For example, the user interface module 78 may allow the user to adjust the volume, alter speech processing strategies, power on/off the device, etc. In the example of FIG. 2, the user interface module 78 communicates with the electronics module 68 via signal line 80. In one aspect of the present disclosure, the user interface module 78 includes a volume control that can be used to adjust the gain of electrical signals applied to the recipient. The electronics module 68 can also use adjustments to the volume control (and/or other controls) to control frequency shifting. Further, the electronics module 68 can control frequency shifting based on computer learning algorithms or processes applied to adjustments to the interface module 78.
The hearing prosthesis 60 may further include an external interface module 82 to connect the electronics module 68 to an external device, such as a fitting system 100 depicted in FIG. 3. Using the external interface module 82, the external device may obtain information from the hearing prosthesis 60 (e.g., the current parameters, data, alarms, prescription information, etc.) and/or modify the parameters of the hearing prosthesis 60 used in processing received sounds and/or performing other functions.
In the example of FIG. 2, the sound input element 64, electronics module 68, transducer module 72, power module 76, user interface module 78, and external interface module 82 have been shown as integrated in a single housing 84. However, it should be appreciated that in certain examples, one or more of the illustrated components may be housed in separate or different housings. Similarly, it should also be appreciated that in such embodiments, direct connections between the various modules and devices are not necessary and that the components may communicate, for example, via wireless connections.
FIG. 3 shows a block diagram of an example of a fitting system 100 that is configurable to execute fitting software for a particular hearing prosthesis and to load configuration settings and prescription information to the hearing prosthesis via the external interface module 82. As shown in FIG. 3, the fitting system 100 includes a user interface module 102, a communications interface module 104, one or more processors 106, and data storage 108, all of which may be linked together via a system bus or other connection circuitry 110. In other examples, the fitting system 100 may include more, fewer, or different modules than those shown in FIG. 3.
In the fitting system 100 shown in FIG. 3, the user interface module 102 is configured to send data to and/or receive data from external user input/output devices such as a keyboard, keypad, touch screen, computer mouse, track ball, joystick, and/or other similar device, now known or later developed. The user interface module 102 is also configured to provide output to user display devices, such as one or more cathode ray tubes (CRT), liquid crystal displays (LCD), light emitting diodes (LEDs), displays using digital light processing (DLP) technology, printers, light bulbs, and/or other similar devices, now known or later developed. Furthermore, in some embodiments, the user interface module 102 is configured to generate audible output(s), such as through a speaker, speaker jack, audio output port, audio output device, earphone, and/or other similar device, now known or later developed.
As shown in FIG. 3, the communications interface module 104 includes one or more wireless interfaces 112 and/or wired interfaces 114 that are generally configurable to communicate with the hearing prosthesis 60 via a communications connection 116, to a database 118 via a communications connection 120, or to other computing devices (not shown). Generally, the connection 116 is any wired or wireless connection to the external interface module 82 of the hearing prosthesis 60.
The wireless interface 112 includes one or more wireless transceivers, such as a Bluetooth transceiver, Wi-Fi transceiver, WiMAX transceiver, and/or other similar type of wireless transceiver configurable to communicate via a wireless protocol. The wired interface 114 includes one or more wired transceivers, such as an Ethernet transceiver, Universal Serial Bus (USB) transceiver, or similar transceiver configurable to communicate via a twisted pair wire, coaxial cable, fiber-optic link, or other similar physical connection.
The one or more processors 106 include one or more general purpose processors (e.g., microprocessors manufactured by Intel or Advanced Micro Devices) and/or one or more special purpose processors (e.g., digital signal processors, application specific integrated circuits, etc.). As depicted in FIG. 3, the one or more processors 106 are configured to execute computer-readable program instructions 124 that are contained in the data storage 108 and/or other instructions based on algorithms described herein.
The data storage 108 may include one or more computer-readable storage media that can be read or accessed by at least one of the processors 106. The one or more computer-readable storage media may include volatile and/or non-volatile storage components, such as optical, magnetic, organic or other memory or disc storage, which can be integrated in whole or in part with at least one of the processors 106. In some embodiments, the data storage 108 may be implemented using a single physical device (e.g., an optical, magnetic, organic or other memory or disc storage unit), while in other embodiments, the data storage may be implemented using two or more physical devices.
The data storage 108 includes computer-readable program instructions 124 and, in other embodiments, perhaps additional data. In some embodiments, for example, the data storage 108 additionally includes program instructions that perform or cause to be performed at least part of the herein-described methods and algorithms and/or at least part of the functionality of the systems described herein.
Referring now to FIG. 4 and with further reference the description above, one example method 150 is illustrated for applying frequency shifting for a hearing prosthesis. For illustration purposes, some features and functions are described herein with respect to a vibration-based hearing device. However, various features and functions may be equally applicable to other types of hearing prostheses.
The method 150 of FIG. 4 can be implemented by one or more of the hearing prostheses 20, 60 or the fitting system 100 described above. In the method 150, at block 152, a hearing prosthesis receives a sound signal and processes the sound signal to generate a stimulation signal. The stimulation signal is a representation of the sound signal that can be provided to an actuator and applied to a recipient to allow the recipient to perceive the stimulation signal as sound. Thus, the stimulation signal is generated from the sound signal in accordance with parameters of the recipient's hearing loss, such as a threshold level and a maximum comfort level, and perhaps parameters of the hearing prosthesis, such as gain and power capabilities.
Such stimulation signal would typically be applied by the actuator to the recipient to allow the recipient to perceive the original sound signal. However, in the present disclosure, at block 154, the hearing prosthesis applies frequency shifting to the simulation signal to generate a frequency-shifted stimulation signal. In the context of the disclosed examples, the frequency shifting would generally be applied by the electronics module 68 of FIG. 2. However, the frequency shifting can be programmed or otherwise modified by one or more of the electronics module 68 or the fitting system 100.
In the present disclosure, the frequency shifting is applied at block 154 not because of cochlea dead regions of the recipient, as may be the case for acoustic hearing aids, but rather to compensate for limitations of the hearing prosthesis in applying signals to the recipient that can be perceived as sound. For example, the hearing prosthesis may not be powerful enough to deliver high frequency sound signals to the recipient above a determined limit, which depends on the design of the device and on the hearing loss of the recipient. For instance, device power limitations can be due to a limited transducer size or capability, and/or on a skin flap thickness in the case of a transcutaneously coupled device. The output limit of a hearing prosthesis for a particular recipient can be determined during a fitting session or using population models.
Consequently, in the present example, at block 154, the hearing prosthesis can determine or identify that a portion of the stimulation signal is associated with frequencies above an output limit of the hearing prosthesis for the recipient. For example, some vibration-based hearing devices may have an output limit between around 3 kHz to 8 kHz for different recipients, such that frequency shifting can be applied when the stimulation signal includes some minimum threshold of portions associated with frequencies above the output limit. This does not necessarily mean that only portions of the stimulation signal above the output limit are frequency shifted but, rather, that the determination that portions of the stimulation signal are above the output limit can be used to trigger frequency shifting. Once frequency shifting is triggered, the frequency shifting can be usefully applied to portions of the stimulation signal above and/or below the output limit.
In the present example, at block 156, the frequency-shifted stimulation signal is provided to the actuator, which can then apply the frequency-shifted stimulation signal to the recipient to allow the recipient to perceive the original sound signal. For instance, the hearing prosthesis can be a vibration-based hearing device, such that the frequency-shifted stimulation signal can be provided to a vibration mechanism to apply vibrations corresponding to the frequency-shifted stimulation signal directly or indirectly to the recipient.
Generally, in the present disclosure, the frequency shifting applied at block 154 can imply a number of different approaches to processing electrical signals. A first example of frequency shifting is frequency compression, which refers to converting an original, larger frequency range into a smaller frequency range. Illustratively, frequency compression can be accomplished by discarding every n-th frequency channel or band and compressing the remaining frequency bands together in the frequency domain. For example, if an original sound signal had a range between about 2000 Hz and 8000 Hz, frequency compression could be applied to convert the sound signal into a corresponding frequency-shifted stimulation signal with a smaller range, such as between about 4000 Hz and 6000 Hz. The frequency-compressed stimulation signal can, in whole or in part, replace or include sound data that was in the original sound signal in the 4000-6000 Hz frequency range.
A second example of frequency shifting is frequency transposition, which refers to moving a first frequency range into a different (although perhaps overlapping) second frequency range. In frequency transposition, electrical signals in the first frequency range can at least partially replace or combine with electrical signals in the second frequency range. For example, if a portion of an original sound signal includes sound data within a first range between about 6000 Hz and 8000 Hz, frequency transposition could be applied to convert that portion of the sound signal into a corresponding frequency-shifted stimulation signal with a second range between about 2000 Hz and 4000 Hz. As mentioned above, this frequency-shifted stimulation signal from the first range to the second range can at least partially replace or combine with any sound data that was originally in the second range.
Generally, at block 154, the frequency shifting can include frequency compression, frequency transposition, and/or perhaps other frequency shifting approaches. Further, at block 154, the frequency shifting can also be combined with sound level or amplitude adjustments. For instance, a high amplitude or loud sound signal that also has high frequency components can be frequency shifted to a lower frequency and also adjusted to a lower amplitude to help the recipient better perceive the sound signal.
Further, the frequency shifting at block 154 can be dependent, at least in part, on a variety of considerations. In one example, the frequency shifting includes a level dependent frequency shifting, in which one or more parameters of the frequency shifting are dependent on an input sound level and/or a degree of hearing loss. Such parameters may include, for example, an amount of frequency content to be shifted, an extent of the frequency shifting, whether frequency shifted content replaces or mixes with other sound content, etc.
In one example of level dependent frequency shifting, the sound signal level is divided into one or more ranges, such as high, middle, and low level ranges, and the frequency shifting can be characterized as a percentage frequency shift based on the ranges. For instance, a 100% frequency shift may include shifting a particular amount of the sound data in the top 30% of the audible frequency bandwidth (around 2 kHz) down into a lower frequency range. The particular amount of sound data to be shifted can be 100% or some other percentage of the sound data in the top 30% of the frequency bandwidth. Thus, for example, a 50% frequency shift can include shifting a lesser percentage of the sound data from the top 30% of the frequency bandwidth into the lower frequency range. This lesser percentage can be 50% less than the 100% frequency shift case or can be any other percentage. More particularly, because different percentage frequency shifts can implicate different parameters, such as amount of content, extent of the shift, and mixing of sound content, generally, an X % frequency shift may not necessarily correspond to an identical X % adjustment in a particular parameter.
Alternatively or in combination, a 50% frequency shift may include shifting the particular amount of the sound data in the top 30% of the frequency bandwidth to a lesser extent (perhaps, but not necessarily 50% less) than in the case of a 100% frequency shift. Further, in an example of mixing frequency shifted sound content with original sound content, a 100% frequency shift may include mixing all of the shifted sound content with original sound content and a 50% frequency shift may include mixing 50% of the shifted sound content with the original sound content. Generally, various combinations of the above parameters can be effected by different percentage frequency shifts.
As mentioned above, the sound signal level can be divided into various ranges and different percentage frequency shifts can be applied for different sound level ranges. Generally, a greater frequency shift can be applied for lower level sound signals and a lesser frequency shift can be applied for higher level sound signals. In one non-limiting example, an about 100% frequency shift can be applied for levels below about 50 dB, an about 50% frequency shift can be applied for levels between about 50-70 dB, and an about 20% frequency shift can be applied for levels above about 70 dB. Generally, the use of the word "about" (and similar terms) in the above example or elsewhere herein should be understood by one of ordinary skill in the art to mean that the corresponding number, percentage, quantity, or other term would encompass a reasonable range around the corresponding term.
In one example of level dependent frequency shifting, the recipient's hearing loss levels are divided into one or more ranges, such as high, middle, and low hearing loss ranges, and the frequency shifting can be characterized as a percentage frequency shift based on the ranges. With reference to the above disclosure, generally, a greater frequency shift can be applied for greater hearing loss and a lesser frequency shift can be applied for lesser hearing loss. In one non-limiting example, an about 20% frequency shift can be applied for hearing loss levels between about 30-45 dB HL, an about 50% frequency shift can be applied for hearing loss levels between about 45-65 dB HL, and an about 100% frequency shift can be applied for hearing loss levels above about 65 dB HL. In this example, the frequency shift can also be limited to certain portions of the sound data, such as portions of the sound data in the top 30% of the frequency bandwidth.
In another example, the frequency shifting at block 154 can be dependent, at least in part, on operating parameters of the hearing prosthesis. For instance, frequency shifting can be applied differently based on whether the device is operating in a single-sided mode or a bilateral mode. More particularly, greater frequency shifting can be applied in the single-sided mode, which will alter the sound perception by the recipient from the contralateral side and hence improve lateralization by making the sound perception different by both ears. Frequency shifting can also be applied in the bilateral mode, although perhaps to a lesser extent than in the single-sided mode, to improve lateralization.
The frequency shifting at block 154 can also be dependent, at least in part, on a gain level of the hearing prosthesis. For example, during normal use, when a recipient adjusts a volume control of the hearing prosthesis to increase the gain, a lesser degree of frequency shifting can be applied at block 154. The reason for this relationship between increasing gain and decreasing frequency shifting is that the hearing prosthesis has typically been configured for the recipient during a fitting session. Consequently, if the recipient increases the gain in a particular environment, the dynamic range of the prosthesis for the recipient will allow the recipient to perceive higher frequency sounds. However, if the recipient increases the volume or gain above a maximum output level of the prosthesis, then a greater degree of frequency shifting can be applied at block 154 because this indicates that the recipient is having trouble perceiving higher frequency sounds.
Further, the frequency shifting at block 154 can also be dependent, at least in part, on a type of hearing loss, e.g., conductive or sensorineural, For example, in the case of conductive hearing loss, a lesser degree of frequency shifting can be applied to take advantage of remaining high frequency hearing to provide a more natural perception of incoming sound. In the case of sensorineural hearing loss, a greater degree of frequency shifting can be applied, for example to help improve speech understanding in noisy environments when there are output limitations on the prosthesis.
In yet another example, the frequency shifting at block 154 can be dependent, at least in part, on different listening situations, such as speech, noise, music, etc. Illustratively, if the recipient were listening to music, then less frequency shifting can be applied as compared to if the recipient were listening to speech. In this example, the hearing prosthesis processes the sound signal to classify the sound into primarily one or more classes, e.g., speech or music.
In a further example, the frequency shifting at block 154 can be dependent, at least in part, on whether the hearing prosthesis, in this case a vibration-based hearing device, includes a transcutaneous or percutaneous coupling to the recipient. In this example, greater frequency shifting can be applied in the transcutaneous case to compensate for greater attenuation of higher frequency signals applied as vibration through the skin. As discussed above, in the percutaneous case, the hearing prosthesis is coupled directly to the recipient's bone, which reduces the effect of attenuation caused by applying vibrations through the recipient's skin. Further, the skin flap thickness, the position of the coupling between the hearing prosthesis and the recipient, and/or the type of coupling between the prosthesis and the recipient can impact the application of frequency shifting. Generally, the skin flap thickness, the position of the coupling, and the type of coupling impact the degree of signal attenuation in different ways and the greater the attenuation the more frequency shifting will be applied. Illustratively, less frequency shifting can be applied when the coupling is an abutment compared to when the coupling is softband.
In another aspect of the present disclosure, the degree of attenuation in the transcutaneous case can be detected and the frequency shifting can be dependent, at least in part, on the detected attenuation. In one example, the attenuation can be detected using the head related transfer function (HRTF) from the stimulation point of the prosthesis to the cochlea. More particularly, the attenuation can be determined by comparing a traditional bone conduction and air conduction hearing loss threshold measurement. If the hearing threshold for a higher frequency cannot be detected due to an output limitation of the prosthesis, then frequency shifting can be applied in this case.
In another example, if the measured hearing threshold is close to the maximum output of the device, then frequency shifting can be applied. Illustratively, if the measured hearing threshold is less than 15 dB from the maximum output level, then a greater degree of frequency shifting can be applied. In another example, if the measured hearing threshold is less than 3 dB from the maximum output level, then a greater degree of frequency shifting can be applied.
In addition, the frequency shifting at block 154 can include voice-dependent frequency shifting, in which the frequency shifting is dependent on one or more frequency bands associated with a voice of a hearing prosthesis recipient. More particularly, less frequency shifting can be applied in frequency bands where a high amount of the recipient's own voice exists.
Further, various combinations of all of the above examples can also be used to control frequency shifting. For example, the frequency shifting can be based on a single-sided mode and on hearing loss levels in one or both ears. Generally, each block 152-156 of FIG. 4 may represent a module, a segment, or a portion of program code that includes one or more instructions executable by a processor for implementing specific logical functions or steps in the process. The program code may be stored on any type of computer readable medium or storage device including a disk or hard drive, for example. The computer readable medium may include a non-transitory computer readable medium, such as computer-readable media that stores data for short periods of time like register memory, processor cache, and Random Access Memory (RAM). The computer readable medium may also include non-transitory media, such as secondary or persistent long term storage, like read only memory (ROM), optical or magnetic disks, compact-disc read only memory (CD-ROM), etc. The computer readable medium may also include any other volatile or non-volatile storage systems. The computer readable medium may be considered a computer readable storage medium, for example, or a tangible storage device. In addition, one or more of the blocks 152-156 may represent circuitry that is wired to perform the specific logical functions of the method 150.
| 2019-04-24T08:05:32 |
http://patents.com/us-20160127840.html
|
0.998866 |
Cute Creatures is a set of cute pseudo-verbal sounds that might be made by small furry animals, baby robots, birds or other little creatures. The sounds don't include coherant words and are made vocally or by using different whistles, squeakers or synthesis and are divided into sections by type, giving a small vocabulary to each voice.
HonkTwo, HonkWhat, HonkWhy, HonkNo, HonkYes, HonkOuch, HonkOkay, HonkHungry, HonkSmile, HonkWhatever, HonkYakYak, HonkPain, BabyGiggleYak, BabyGiggleHer, BabyGiggleHey, BabyGiggleHoo, BabyGiggleAhAh, GirlGiggleSnigger, BoyGiggleRipple, BoyGiggleStutter, BoyGiggleThree, DuckyHello, DuckyChat, DuckyHiya, DuckyPain, DuckyOuch, DuckyCluck, DuckyGiveItHere, DuckyCluk, DuckyClukCluk, DuckyOh, DuckyOops, DuckyHappy, DuckyYes, DuckyNo, DuckyOkeyDokey, DuckyQuak, DuckyHit, DuckyYesSir, DuckySad, ImpProrpor, ImpDadoper, ImpPror, ImpBadidep, ImpPuree, ImpTorty, ImpPropo, ImpUpOTea, ImpEatTaho, ImpInTypo, ImpPourACup, ImpOiTie, ImpRapoey, ImpTayToy, ImpWeBoi, ImpPron, MouseShort, MouseBleat, MouseBeg, SqueakHissy, SqueakYes, SqueakNo, SqueakOuch, SqueakPain, SqueakPanic, SqueakScream, GigWarHor, GigHoar, GigHeehee, GigPrinha, GigDaccord, GigProko, GigPree, GigAw, GigSad, GigMoan, CuteMenuOk, CuteMenuCancel, CuteMenuIn, CuteMenuOut, CuteMenuNo, CuteMenuYes, CuteMenuExit, RobHiya, RobLoco, RobWantSee, RobLeepee, RobLarpo, RobOrlo, RobHowpo, RobLopaca, RobYa, RobWiyam, RobHurto, RobOpalal, WarbHello, WarbYes, WarbNo, WarbTalk, WarbNice, WarbHungry, WarbLove, WarbFlutter, WarbThankyou, WarbAngry, WarbMore, MicroCom, MicroGiggle, MicroEer, MicroGigg, MicroRehe, MicroYuri, MicroEee, MicroEverything, MicroBoho, MicroBring, MicroAhu, SMHelo, SMHappy, SMGoodbye, SMWhat, SMNot, SMReally, SMSoSo, SMWhy, SMSad.
| 2019-04-25T10:29:33 |
http://indiesfx.co.uk/soundeffectsset.php?id=42
|
0.999985 |
How does wrestling portray mental health issues? It's not a question that many would think about when watching Raw. But how many WWE or TNA characters are described as mentally unstable? Or something similar. I'm going to have a little look at a couple of example from modern day WWE and TNA and see how the companies went about showing those issues to their audience.
The prime suspect on WWE television. Constantly referred to as "Unstable" or a "wackjob" by the commentary. Numerous elements of characterisations from Ambrose collate with this Unstable moniker, he even seems to thrive upon it. Shouting out random noises during his matches, even growling at points, Ambrose seems to have no regard for his own well being and at point, seemed completely obsessed with Seth Rollins. It should be pointed out here that if you have a friend that you believe is "Unstable" attempt to get them the help they need, don't let them get into fights with people!
Perhaps the biggest culprit in TNA in recent years was the emergence of the Samuel Shaw character. Despite some dodgy continuity in the storyline, Shaw was fixated on ring announcer Christy Hemme to the point where he kept a shrine to Christy in is house. The storyline would lead to a match between Shaw and Mr. Anderson, where the loser would be sent to a Mental Institution. I did actually find this whole concept rather offensive and certainly insensitive to those with mental health issues. Let's not even mention the questionable morals of the Mental Health Insititution that accepts people because of a wrestling stipulation.
Is that particularly a bad thing? Should characters who clearly have mental quirks be portrayed on a wrestling show? Of course, they should, it's an integral part of pro wrestling. You need those characters to offer depth, especially in WWE. I think, it is important however about how these quirks are portrayed, and what is pointed out by either the commentary team or storyline, the Samuel Shaw story went too far in what it attempted to do, and at times I think the language on commentary in WWE could be toned down, the characterisation should tell me everything I need to know.
| 2019-04-20T23:04:02 |
http://www.acrossthepondwrestling.co.uk/2015/03/unstable-wrestlings-portrayal-of-mental.html
|
0.999728 |
Whilst as simple a statistic, it has dumbfounded me for the first 39 games of 2018/19 NBA regular season. The statistic? The Portland Trailblazers have won every game after leading by the end of the third quarter, and lost every game when trailing.
So far the 2018/19 season for the Portland Trailblazers has been one of the highest highs and the lowest lows, and the above mentioned statistic, I believe, is a big contributor to this.
The Blazers started the season 10-3. During this period the Blazers were one of two teams which boasted top 5 offensive and defensive statistics, and had beaten the Wolves, the Bucks and the Celtics all in a row.
However, the Blazers season took a wild turn where they begun losing games, and whilst they have had one of the hardest schedules for the first half of the season, it seems they were games which were winnable both away and at home. After back to back blowout loses against Milwaukee (100-143) and the Warriors (97-125), both their offensive and defensive statistics plummeted.
As of today, 6 January 2019, they have clawed their way back to 14th in offensive rating and 15th in defensive rating. The more worrying statistic is the teams defensive rating, which was 8th in the league last year.
It seems almost impossible that a team (whilst not quite at contention level, but given a favourable playoff matchup could make a deep run) has not been able to win a game after trailing at the end of the third, no matter how small the margin.
Yesterdays game against the Thunder, the Blazers were playing outstandingly in the first two quarters and were seemingly blowing their opponents off the floor. But as the Thunder took the lead in the third quarter, outscoring the Blazers 36-25, from a statistical standpoint, they had seemingly won the game, despite the score only being 93-87. The Blazers lost this game after trailing at the end of the third quarter.
Backtrack a few days before the lost to OKC where they played the Kings – the Blazers outscored the Kings 64-50 at half time. In the second half the Blazers lost all of the momentum they had in the first half and were outscored 39-53, however a key point, they maintained the lead after the third quarter.
In the last quarter the Kings were leading 99-90 with 3 minutes to go and I thought to myself that they had blown the game. However, with the stellar defence by Nurkic, Harkless and Aminu, it enabled Lillard’s usual late game heroics to take over giving Portland an 11-2 run to force overtime. From then, Portland dominated overtime outscoring the Kings 10-5. A win for the Blazers after being in the lead at the end of the third.
But as I sit here writing this, I am trying to figure out why and how this seemingly impossible statistic stands, and for all of me I cannot come to a conclusion. Portland in Lillard have the second highest second half scorer at 14.2 and he is also known for his clutch late game antics – as seen in a win over Golden State at home not too long ago. Yet between Lillard, McCullom and Nurkic, they are unable to win games after trailing going into the fourth, yet being well equipped to do so.
CJ has been out of his mind clutch this year, however, with a lower volume of shots to Damian, it explains his outstanding splits. Portland also run a pick-and-roll a lot in crunch time, and with teams blitzing Dame, he usually finds an open CJ.
Could it be a decline in Lillards late game shooting? No – Lillard shoots a greater volume of shots than CJ in clutch situations and is often blitzed by defences as explained above, which also shows why his assist numbers are high). Also by comparison, Paul George shoots (42% FG and 25% 3P), James Harden shoots (35% FG and 33% 3P) and Lebron James shoots (45% FG and 23% 3P). Whilst Lillard is not quite at the elite level this year, I expect it to round off over the course of the season.
The team as a whole’s 4th quarter statistics on average are -1, however, with a winning record (meaning they on average concede -1 points in games they win also) this statistic does not justify nor explain Portlands problem.
In short, if the team wants to make a significant run in the regular season and the playoffs, they are going to need to alter this statistic – for better or for worse (preferably better). Whether it be through a trade or a change in offensive and defensive schemes, I don’t know – but all I do know is that this may be the rise or demise of Portland’s season.
| 2019-04-21T04:38:54 |
https://wilsons-scoop.blog/2019/01/06/the-one-statistic-that-will-determine-the-rise-or-demise-of-the-portland-trailblazers/
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.