text stringlengths 8 5.77M |
|---|
Prospective Isolation and Characterization of Genetically and Functionally Distinct AML Subclones.
Intra-tumor heterogeneity caused by clonal evolution is a major problem in cancer treatment. To address this problem, we performed label-free quantitative proteomics on primary acute myeloid leukemia (AML) samples. We identified 50 leukemia-enriched plasma membrane proteins enabling the prospective isolation of genetically distinct subclones from individual AML patients. Subclones differed in their regulatory phenotype, drug sensitivity, growth, and engraftment behavior, as determined by RNA sequencing, DNase I hypersensitive site mapping, transcription factor occupancy analysis, in vitro culture, and xenograft transplantation. Finally, we show that these markers can be used to identify and longitudinally track distinct leukemic clones in patients in routine diagnostics. Our study describes a strategy for a major improvement in stratifying cancer diagnosis and treatment. |
Parents Fund
A Perfect Investment: Your Child
Established by a group of parents in 1968, the Providence College Parents Fund is an extension of the College’s overall annual giving program. PC relies on the additional generosity of the parent community to maintain initiatives that directly and immediately enhance student life.
The Parents Fund provides funding for all aspects of the PC experience, such as academic programs, faculty support, the quality of campus facilities and student life. Here are some examples of what your gift can do:
$40 pays for one hour of career counseling
$100 allows a student organization to plan special programming
$250 supports the installation of smart-technology in classrooms
$500 pays for a guest speaker at a special event
$1,500 covers the cost of one library science journal subscription
Parents are encouraged to support the College at all levels of giving. Leadership gifts of $1,000 and above annually qualify parents for membership in the St. Dominic Society.
The Parents for Providence Association is committed to increasing
support to the College through its Parents Fund and extends a special
thank you to all the parents who support the programs and opportunities,
which are so important to students and the College. |
This invention relates to flexible electro-optic displays, in particular to displays based on a structure built of flexible fibers.
An electro-optic display is a device designed to change its optical state when some kind of electric or electromagnetic field is applied to it. A visible image on such displays is formed from a plurality of display elements including an electro-optically active (EOA) substances. The term xe2x80x9cEOA substancexe2x80x9d denotes any substance that changes its color, transparency, reflection or other optic properties, or capable of emitting light, when subjected to changes of electric or electromagnetic field, and thereby suitable for displaying images. Flexible electro-optic displays may be made of flexible polymer films, where the EOA substance and patterns of electrodes are laid in thin layers over a polymer substrate, or may be based on flexible fibers or strips woven or knitted into fabric or textile material where the electrodes are in the constituent fibers. Woven displays have certain advantages since they may be produced using known weaving techniques which do not limit their length. Woven displays are more flexible and robust than integral film displays.
U.S. Pat. No. 5,962,967 and JP 2001-034195 disclose woven displays made of two sets of transverse fibers including a longitudinal conductor and a coating of light-emitting or other EOA substance. An individually controllable display element (pixel) is formed at each junction where a fiber of one set overlaps a fiber of the other set. The visible images on such displays are formed from a plurality of pixels. Understandably, the optically active (luminous) zones in such pixels are of the size of the fiber diameter.
U.S. Pat. No. 3,803,437 discloses a display comprising a set of conductive wires interwoven with a transverse set of insulating fibers, and covered with a layer of phosphor. Electric voltage is applied between each two adjacent conductors and a continuous luminous surface is obtained, without display elements. In this structure, the space between the conductive wires must be of predetermined width depending on the nature of the phosphor.
U.S. Pat. No. 3,571,647 discloses a woven display comprising a carrying non-conductive fabric impregnated with a phosphor, a first (common) electrode in the form of a flexible conductive layer laid at the back of the fabric, and second electrodes in the form of insulated wires sewn into the fabric. The second electrodes may be sewn in various designs to form display elements of a static image or picture. The luminous zone of each element is in a narrow vicinity of the insulated wire stitches.
In accordance with the present invention, there is provided an electro-optical display comprising: a plurality of fibers, preferably woven or knitted, some of them including conductive wires. The fibers form a flexible carrying network with cells defined therebetween. A layer of EOA substance fills the cells, and a first conductive layer covers one side of the carrying network. This conductive layer is transparent or translucent and is in electric contact with the conductive wires. A second conductive layer covers the other side of the network but is insulated from the conductive wires. An electrooptically active zone (EOA zone) is formed between the first and the second conductive layer, where the conductive wires serve to power the first transparent conductive layer. The second conductive layer may be also transparent.
According to one embodiment of the present invention, the EOA substance is filling the carrying network cells in separated spots or in spots of different electro-optic properties. These spots constitute display elements that may be controlled en ensemble and thus form a so-called static visible image.
According to another embodiment of the present invention, the second conductive layer is laid on the network in separated spots, thereby dividing the EOA zone into individually controllable display elements. Thus a dynamic or animated visible image may be formed.
According to a further embodiment of the present invention, the fibers of the display are organized in two or more sets. The first set includes fibers with conductive wires which run generally parallel to each other. The first transparent conductive layer is laid in separated longitudinal strips parallel to the fibers of the first set. Each strip is in electric contact with one or more conductive wires of the first set, but each conductive wire is in contact with only one strip. The second conductive layer is laid in separated parallel strips transverse to the longitudinal strips, thereby forming a dynamic matrix of individually controllable display elements or pixels, each pixel being defined in the overlapping area between a longitudinal strip and a transverse strip. The EOA substance in each pixel may have different electro-optic properties. In this way, an RGB or CMYK color display may be particularly obtained.
According to a still further embodiment of the present invention, an electro-optical display may have in parts thereof a dynamic matrix of individually controllable pixels, in other parts thereofxe2x80x94dynamic or animated images, and in still other parts of the same display-static images.
According to a last embodiment of the present invention, an electro-optical display may comprise a plurality of fibers including longitudinal conductive elements arranged in a flexible carrying network, EOA substance filling the cells, and a conductive layer covering one side of the network and insulated from the conductive elements. In this case EOA zones are formed in xe2x80x9cpocketsxe2x80x9d adjacent to the conductive elements and the conductive layer.
The electro optic displays of the present invention are based on a cellular network with conductive layers on both sides thereof which presents a robust and flexible structure reliably accommodating the EOA substance. In these displays, the entire mass of the EOA substance may be utilized for producing optical effects, and in one display, static pictures may be combined with dynamic images such as running text or animation. In woven displays using high voltage, such as electroluminescent (EL) displays, electric breakdowns arising from defects in coating layers of the conductive fibers may be avoided. Other important advantages of the present invention are that the carrying network structure may be produced by well known efficient weaving or knitting methods, the transparent conductive layer may be made of polymers of limited conductivity, and display elements of arbitrary shape and size or matrix pixels can be obtained by printing techniques. |
A LOOK AT THE NFL'S FREE AGENTS
No. 1 issue: Does Drew Bledsoe have anything left? Buffalo didn't think so, but the Cowboys did and signed Bledsoe, 33, to a three-year contract last week.
Analysis: Dallas has nearly $20 million in cap space and two first- round draft picks. The Cowboys need help in a lot of areas, starting with the defense, which struggled against solid teams in 2004. Possible targets are Baltimore CB Gary Baxter, Jets RT Kareem McKenzie, and possibly Redskins WR Laveranues Coles.
No. 1 issue: Can the Giants get Tiki and Shockey any help? RB Tiki Barber had his best season in 2004, but the Giants need a receiver to compliment Amani Toomer and TE Jeremy Shockey.
Analysis: When QB Kurt Warner voids the final two years of his deal, the Giants will have an additional $5 million to spend on free agents. They have only four draft picks, so look for them to be active in free agency.
No. 1 issue: How much will Trotter cost? Three years ago, he took the Redskins' money and left the Eagles. He returned in 2004 to play for $535,000. It will be interesting to see how the two sides get along this time.
Analysis: The Eagles made DT Corey Simon their franchise player for $5.13 million, so Philly has about $8 million to spend on free agents, which basically negates the chance for any big-time additions. Philly needs a running back who can get the tough, inside yards. Also, if the Eagles cut ties with WR Freddie Mitchell, former Baltimore WR Kevin Johnson could be a fit.
WASHINGTON REDSKINS
2004 record: 6-10
Key free agents: MLB Antonio Pierce, CB Fred Smoot, DT Joe Salave'a.
Needs: WR, DE, C, OL.
No. 1 issue: Who's going to catch the passes? Rod Gardner won't be back and Laveranues Coles is hoping to be traded or released. The Redskins are fools if they think they can count on James Thrash and Taylor Jacobs next year.
Analysis: The Redskins had the No. 3 defense in the league last year, thanks in large part to Pierce and Smoot. Both could be on their way out. On offense, the Redskins have to address the receiver position in free agency because rookie wideouts are often unproductive in their first year. The Redskins are about $5 million under the cap.
No. 1 issue: Is Rex Grossman the answer? Grossman missed almost all of last season with a knee injury and will be working in a new offense in 2005. The Bears are likely to sign Kurt Warner to be the backup.
Analysis: The Bears might not sign one of their four unrestricted free agents. Chicago has nearly $10 million to spend during free agency. The Bears added six starters last year (only one was an unrestricted free agent), so expect them to be a player in trades.
No. 1 issue: Will the Lions sign a QB to challenge Joey Harrington? Coach Steve Mariucci contends Harrington is still his guy, but Detroit may take a run at Jeff Garcia to give the Lions an option if Harrington struggles.
Analysis: The Lions are $23 million under the cap but have only 33 players under contract. Detroit wants to solidify its offensive line and strong safety. At receiver, the Lions want to add an experienced player to go with Charles Rogers and Roy Williams.
GREEN BAY PACKERS
2004 record: 10-6
Key free agents: G Marco Rivera, LB Hannibal Navies.
Needs: OL, S, LB, CB.
No. 1 issue: Will the defense finally get better? New coordinator Jim Bates has to improve the Packers' tackling and play in the secondary. Green Bay was 25th defensively last year.
Analysis: The Packers have very little to spend on free agents. G Mike Wahle has an $11 million cap number in 2005, so he will probably be released. The Packers also have to make a decision on veteran SS Darren Sharper, who has an $8.6 million cap number. Last week, Green Bay kept TE Bubba Franks with the transition player tag.
No. 1 issue: Did the Vikings get robbed in the apparent Randy Moss trade? Sort of. Trading Moss to Oakland for LB Napoleon Harris and first- and seventh-round picks shows how much the Vikings wanted to get rid of No. 84.
Analysis: The Vikings are $31 million under the cap and they absolutely want to sign a starting safety, a linebacker (although Harris fills that need) and a receiver. Even without Moss, the Vikings' offense is lethal, but the defense ranked 28th. The Vikings' plan is similar to last year: Sign and draft for defense.
No. 1 issue: Will the Falcons rest easy? Dallas did so after a surprising playoff appearance and fell back to 6-10. Atlanta reached the NFC title game last season, but don't expect GM Rich McKay to stand pat.
Analysis: The Falcons' first order is to re-sign CBs Aaron Beasley and Kevin Mathis to go with DeAngelo Hall in the secondary. Atlanta doesn't have a lot of cap space because of signing bonuses handed out several years ago, but a playmaking WR, speed at the linebacker spot and depth at safety are musts. WR Peerless Price could be released after June 1.
No. 1 issue: Why did the Panthers release Muhsin Muhammad? The receiver would have counted $12.5 million against the cap in 2005, and Carolina didn't want to give a 31-year-old receiver a long-term contract. He signed with the Bears on Sunday.
Analysis: The Panthers have never been major players in free agency, electing to fill holes with affordable players. The Panthers want to upgrade at right tackle and right guard and add depth to the running back and defensive tackle positions.
NEW ORLEANS SAINTS
2004 record: 8-8
Key free agents: S Jay Bellamy, RT Victor Riley, CB Jason Craft.
Needs: RT, CB, DL, FS.
No. 1 issue: The Saints' D can't be that bad again, right? New Orleans was last in yards allowed in 2004. Defense is where New Orleans should look to upgrade, and the Saints started by labeling DE Darren Howard as their franchise player.
Analysis: The Saints were an enigma last year -- great one week, horrible the next. It appears QB Aaron Brooks will remain in New Orleans for another season, but he will be working with a new offensive coordinator because Mike McCarthy went to San Francisco. The Saints want to sign a new right tackle and free safety, and might also try to lock up RB Deuce McAllister with a long-term contract.
No. 1 issue: Who plays quarterback? Johnson will be released, and Jon Gruden's preference is to start Brian Griese. But if a contract can't be worked out, the Bucs will turn to Chris Simms.
Analysis: Three years ago, the Bucs won the Super Bowl. But after consecutive no-playoff seasons, the heat is on Gruden, who makes most of the personnel decisions. Last year, Tampa Bay was old, rich and not very good. It's time for the Bucs get younger and cheaper.
No. 1 issue: Does anybody want to play in Arizona? Not until the Cardinals start winning. They have always had trouble attracting free agents, but they hit last year with Pro Bowl DE Bertrand Berry.
Analysis: Of the Cardinals' unrestricted free agents, the only priority players are Wilson and Hill. Their biggest task this offseason is extending the contract of WR Anquan Boldin, who has two years remaining on his first contract. At running back, Emmitt Smith retired and Troy Hambrick is not a marquee back.
No. 1 issue: What will the 49ers do with the first pick? The guess here is they go quarterback and take Cal's Aaron Rodgers.
Analysis: Under new coach Mike Nolan, the 49ers need help at nearly every position, so expect them to make a lot of moves. San Francisco is in major rebuilding mode and has nearly $20 million to spend.
SEATTLE SEAHAWKS
2004 record: 9-7
Key free agents: DE Chike Okeafor, RT Floyd Womack, CB Ken Lucas.
Needs: LB, DL.
No. 1 issue: Can Seattle make its defense better? The Seahawks were 26th in yards allowed last year, and a big chunk of their money has gone to the offensive side. They need major improvements in the front seven.
Analysis: The Seahawks have already secured their top three free agents -- OT Walter Jones, RB Shaun Alexander and QB Matt Hasselbeck. They still have 12 free agents to sign. |
import FWCore.ParameterSet.Config as cms
from DQMServices.Core.DQMEDHarvester import DQMEDHarvester
dtDAQInfo = DQMEDHarvester("DTDAQInfo",
checkUros = cms.untracked.bool(False)
)
from Configuration.Eras.Modifier_run2_DT_2018_cff import run2_DT_2018
run2_DT_2018.toModify(dtDAQInfo,checkUros = cms.untracked.bool(True))
|
Q:
Diagonalizable matrix over $\mathbb{R}$
How do I show that the matrix $$\begin{pmatrix}2&a\\a&1\end{pmatrix}$$ is diagonalizable over $\mathbb{R}$ for all $a\in \mathbb{R}$? And can we say the same if we replace $\mathbb{R}$ by $\mathbb{C}$?
A:
The characteristic polynomial of the matrix is $(2-X)(1-X)-a^2=X^2-3X+2-a^2$. The discriminant of this quadratic is $\Delta=1+4a^2\gt 0$ ($a$ is real) so we always have two distinct real eigenvalues. Therefore the matrix is diagonalisable.
If $a\in\mathbb{C}$ take the following matrix $\begin{bmatrix} 2&{i\over 2}\\{i\over 2}&1\end{bmatrix}$ this matrix is not diagonalisable. It has ${3\over 2}$ as a double eigenvalue and the only $n\times n$ matrix who has an $n^{th}$ order eigenvalue that is diagonalisable is $\lambda I_n$
|
Commercial Electricians Can Save Businesses Money
Menu
Commercial Electricians Can Save Businesses Money
There are two types of electricians that offer their services; residential electrician and the commercial electrician. The residential one handles problems in the home, and services for the home, and the commercial one deals with commercial businesses. Some business owners retain the services of a commercial company that offers various services for businesses and by using one, business owners can keep their business running and safe, but using these electrical professionals can also help save that owner a lot of money that can actually be put back into the business.
Energy-Efficient Lighting For Businesses Has Its Benefits
One big way that a commercial electrician can help to cut costs is to offer the business owner a more energy-efficient way to keep their business lit. Here are some reasons why business owners can think about hiring a professional to work on their lighting systems, and there really are a lot of benefits to businesses that switch to energy-efficient lighting:
• Lower electrical bill every month: Businesses may be open every day seven days a week for up to 12 hours at a time or more depending on the goods and service that they offered. During that time, the lights will be on, and that can add up to huge electric bills. However, a commercial electrician can install lights that can still provide lights, but will reduce the energy used, which will mean a reduced electrical bill.
• A lower temperature in the business: When a business contains a lot of light bulbs, those bulbs can put out a lot of heat. A fully lit business can have a large number of light bulbs, and each one is going to get hot.
• Businesses may qualify for energy rebates: Installing green lighting can also be beneficial because that business may be offered incentives such as rebates or even tax credits.
• Bulbs will have to be replaced less often: Commercial electricians will take out the regular light bulbs that the business used as lighting and replace them with special green bulbs. The filaments in regular light bulbs can blow often, which will mean throwing and replacing away light bulbs. The energy-efficient bulbs are guaranteed to last year's, which will mean to not have to constantly change out bulbs and throw away the broken remnants.
There are electricians that work in people's homes, and commercial electricians that handle just working on businesses. A commercial electrician can meet with a business owner and talk about what they can do for them, which can include saving that owner a lot of money on their electrical costs by changing out their bulbs for energy-efficient bulbs that will require less electricity to light and help in keep the costs down of running a business.
Some business owners electrician perth retain the services of a commercial company that offers various services for businesses and by using one, business owners can keep their business running and safe, but using these electrical professionals can also help save that owner a lot of money that can actually be put back into the business.
• A lower temperature in the business: When a business contains a lot of light bulbs, those bulbs can put out a lot of heat. • Bulbs will have to be replaced less often: Commercial electricians will take out the regular light bulbs that the business used as lighting and replace them with special green bulbs. |
Low Cost Dumpster Rentals
Rent a 10 Yard Dumpster in Jeffersonville, VT
Free Price Quote, Call Now!
Need a Dumpster Rental in Jeffersonville?
We have the commercial and residential dumpster service you need in Jeffersonville.
At Dumpster Ratings, we strive to bring you the best service at the best price available. We have a wide selection of dumpster sizes in stock in Jeffersonville, VT, with flexible & timley pickup and delivery. Give us a call today for all your dumpster rental and roll off needs.
Give us a call today for a free dumpster quote. (802) 266-2487
More About Us
Dumpster Ratings has made it super fast and easy to rent a dumpster. You only need 5 minutes!
When you are renting a 5, 10, 15, 20, 30 or 40 yard dumpster, you want a company you can trust with prices that make you smile. Give us a call today and see the difference we can make in your next construction or clean out project.
Free Consultation
Simply give us a call and we will help you figure out your dumpster rental needs.
Prompt Delivery
Our dumpsters usually go out same-day or next-day depending on when you call.
Competitive Pricing
We provide top-notch service, while going easy on your bottom line. What more could you ask for?
Hassle-Free Ordering
Our trained operators are here to give you a fast and hassle-free experience from start to finish.
Fast Pickup
Once you are done, simply give us a call and we will get your dumpster picked up right away!
Responsive Staff
Our staff is here to help whenever you need it. Simply pick up the phone and give us a call.
Get a Dumpster Quote Now!
Operators are Standing By
Our Dumpster Specialists are waiting by the phone to help you get started. However, there is some important information we need before we can give you a price quote and delivery time. Some things we need to know:
What size dumpster you will need
What you plan on putting in your dumpster
When you need us to drop your roll off container off
How long you plan on keeping your roll-off
City & zip code where you plan on placing your dumpster
Ready to get started?
Dumpsters are available* in Jeffersonville.
Simply give us a call now at (802) 266-2487 to get started! We will help you pick a dumpster for your needs, schedule your delivery and take payment… all in less than 10 minutes!
Zip Codes in Service Area
Free Price Quote, Call Now!
Dumpster Rental Info Center
City Regulations on Dumpster Rental
Most cities or municipalities do not have many regulations regarding dumpster rental as long as you keep the dumpster entirely on your own property during the rental period. If you need to place your container on the street in any way, you will likely have to obtain a permit from the appropriate building permit office in your town. You can check with your local public works department to be sure.
Most Jeffersonville dumpster rental companies will take care of securing this permit for you if you rent from them. Make sure that if you’re planning to put the dumpster on the street, the company has made the appropriate arrangements. You should also ensure that you get the permit in a timely manner and at the correct cost. If you thought the dumpster company was getting a permit and they did not, you will be the one who will have to pay the fine that is issued by the authorities.
Most well-respected along with professional structure companies maintain a tidy web page. Even property owners with their first demo career ahead of these individuals will try along with organize the yard in order to move around with no stepping upon old Two by fours with fingernails running trough these individuals, or older and sharpened pieces of material, etc. Likewise, construction garbage is a real threat to any family or member of staff. This is where any roll off dumpster comes in really handy.
You will need a Rent a 10 Yard Dumpster in Jeffersonville, VT when you are redecorating your first home. Whether it be redecorating your kitchen to up-date it as well as to enlarge a preexisting bathroom, any dumpster will definitely end up being needed.
If you arrange any dumpster for rent, you select the day along with time that you'd like to have it dropped off outside of your house. Make sure that you have got a clear area to put it in addition to a clear area surrounding it. You desire to make sure that you will get to it easily. Arrange to obtain it there before beginning to ensure that you selected the right measurement, that you have space for it, and you can get started.
The dumpster is an United states term this means a garbage trash can. This garbage trash can is cell and can thus be relocated around. The leading function of any dumpster is stocking trash momentarily of time prior to it being emptied right into a garbage truck that comes around perhaps two times a full week depending on the agreement. These kinds of dumpsters are used for dumping many kinds associated with waste material and in addition recycling reasons. Apartments, educational institutions, businesses, workplaces and manufacturing sites get dumpsters to store waste materials. Front loading-trucks, which have large prongs are widely-used to empty most of these dumpsters. They have hydraulics useful for lifting your dumpsters and then switch them to unfilled its items in the vehicles hopper.
Remaining loyal to one rental organization would be the greatest decision made. This is because when you are a regular client, you are more probable to get savings and specific treatments. When shopping for one, ensure that it is a dependable company that gives limitless providers. It therefore has to be professional enough with a logo. A product logo can be used to differentiate in between good and bad firms. It should supply timely providers without flight delays hence must have created a very good reputation. The way in which customers are treated is what can be used to judge you can actually name. Zero Rent a 10 Yard Dumpster in Jeffersonville, VT company features a right to use the buyers. The prices are quite competitive and should be affordable to anyone. If you want to find the least expensive price, it truly is better to invest in a community owned and operated rental rather than a privately operated rental. Community based ones will forever provide the great for the modern society and also present back to the same modern society. There is always delight in seeing your price being used with the benefit of your community.
Removing garbage from the home of a obsessive hoarder is no straightforward task-it not only will involve a great deal of actual physical labor, but it is also a very difficult emotional concern for the hoarder, their own family, along with anyone who has any kind interest in the constant maintenance of the property or home in question. Of those major garbage removal jobs, especially those within time constraints, could possibly be necessary in order to speed up the procedure and free homeowners more expenses for example dumping costs and the gas used to get load immediately after load associated with trash to your transfer stop.
When you possess a business you should think beyond box from the aspects of working your business, whether tiny part like coping with the trash as well as major part like coping with projects. In the event you own a huge business you are about generate huge tons of rubbish which makes that you simply cat with hot brick when you have 12 other things about the plate.
You might replace that broken door or each of the old doors in your home. This baseboards may need to replaced likewise. The carpets in your traditional home might need replacing along with some of the solid wood floors. With your a big task you know that you will have to rent a dumpster.
Eventually, the construction crew can put on the finishing touches within your new base board and creating throughout the complete house. Yourr home is going to look like a showplace once everything is done. Not only will be your new living room and home stunning, but it is neat and very comfy for you you. You have made ones dreams become a reality in the home you would like to live in.
Getting a dumpster service to enable you to clean out that big, previous garage loaded with who-knows-what is a good idea. However many people don't realize it, you should not use a regular garage pick up as a way to eliminate the debris along with old goods you've kept in this living space. You may deal with fines as well as limitations depending on what you have got included in it. Rather, it is a good idea to engage a company to drop off dumpsters for the home to be able to work through the mess as you have to along with toss apart what you need to as you go. There are a number of benefits to accomplishing this.
Reduction of spend production even though one of the best methods to get results, this can't be always feasible, solid spend generation will become inevitable using projects such as construction, residence renovation, lawn clean up along with commercial convenience. This rubbish has to be disposed effectively so as to reduce impact of pollution on the surroundings. Dumpster rental is the best along with affordable option to dispose the trash in environment friendly manner. These Rent a 10 Yard Dumpster in Jeffersonville corporations at U . s . Samoa will recycle all the qualified trash inside environmental warm and friendly manner and minimize the space active by the rubbish in the our landfills. All your rubbish will be cleaned up with lightning pace cost effectively along with Rent a 10 Yard Dumpster in Jeffersonville in U . s . Samoa, so rubbish bin rental takes on a key function in reducing the end results of pollution on the surroundings, hence will become inevitable inside Island such as American Samoa to preserve the ecological balance of the Isle.
On completing the project you will find a very clear photo about the type of waste disposed into the dumpster consequently, check with the owner if they are gonna accept any type of trash disposed by you mainly because some corporations restrict themselves to eco friendly trash.
Renting some sort of dumpster service to your trash convenience is the easiest way to get rid of unwanted items. Many companies offer a buyer the simple option of coming to your home and getting your rubbish away. Although a convenient selection, many want a variety of options to choose from. Residential Rent a 10 Yard Dumpster in Jeffersonvilles offer not only this part to their potential buyers, but also add some wonderful feature of providing you your own personal dumpster so that one can drive out their surplus trash inside their own rate.
Understanding the instant requirement, a few Rent a 10 Yard Dumpster in Jeffersonville, VT companies provide instant providers to the catastrophe zones based on the availability. This delivery is going to be done upon first come first serve basis. These types of companies attach social obligation to their objectives hence loves you more intended for providing an excellent service to people on want at an affordable cost as an alternative to adding an extra buck into their account.
A different topic to protect when making a new rental is figuring out the space in which the container will reside. Normally at a house the dumpsters is going to be set on the particular driveway or street. A vital fact to recall is that for most areas a new permit is essential if a pot is placed at work. Calling the metropolis and purchasing a new permit may resolve this particular, or often a let can be guaranteed through the rental firm. The area the particular dumpster will be delivered should be eliminated of any dangers, which include: lower lying utility lines, tree branches, fences or perhaps unleveled ground.
Find associated with the Rent a 10 Yard Dumpster in Jeffersonville, VT service provider, who notifies the customer in advance about the things that can be disposed into a dumpster, costs of the Rent a 10 Yard Dumpster in Jeffersonville, VT and terms and conditions on the disposal. Once you get associated with a firm that can provide quality providers at affordable cost, you might realize that waste removal upon completion of job was never this particular easy and this particular affordable.
If you decide to want your rental dumpster sent and picked up on time, perform bit of research to look for a quality firm. You'll also take advantage of friendlier assistance, better costs and more versatility to meet ones demands. While you are busy repairing your renovation undertaking, do you really wish to add additional stress?
Final, once you get ones dumpster, make sure that materials you are losing are authorized by the municipality you live in. You can not dispose of combustible or dangerous materials or perhaps tires and appliances in your dumpster. You can get hit with a very good if you place illegal products in your dumpster. And so, find out what the rules are with what you can and can't throw away before you start your project.
Lastly, the use of the service would furthermore allow you to prevent having a front-yard filled with trash, throughout remodeling. As well as seen the top yard involving someone's property filled with settee sets, dried up wall, mosaic glass and aged carpet, amongst other things? Maybe, you've got experienced this particular yourself. Because you wait for the garbage truck to arrive, you're hoping there is absolutely no nasty weather conditions that will come through and move the particular debris to the top yards involving some of your neighbors as well as to the street. This is often aggravating in addition to embarrassing.
Dumpster Primary is online roll away from container rental service provider based in USA renowned for doing this customer centric assistance throughout the nation. The user pleasant designed internet site makes you practical experience that the nav right from the start on the deal to finishing of the deal was never this effortless earlier. This fleets of products involving Dumpster direct range between 10 yards to Forty five yard dumpster serving any kind of qualification according to personalized needs on the customer.
Request a Call Back!
Still need a quote but don't want to talk on the phone right now? Fill out the form below and we will get back to you!
Please use the form below to contact us. We look forward to working with you and will get back to you as soon as possible. All fields are required |
Chapter 23 23:1 And the LORD spake unto Moses, saying, 23:2 Speak unto the children of Israel, and say unto them, Concerning the feasts of the LORD, which ye shall proclaim to be holy convocations, even these are my feasts. 23:3 Six days shall work be done:...
Chapter 13 13:1 And the LORD spake unto Moses and Aaron, saying, 13:2 When a man shall have in the skin of his flesh a rising, a scab, or bright spot, and it be in the skin of his flesh like the plague of leprosy; then he shall be brought unto Aaron the...
Chapter 16 16:1 And they took their journey from Elim, and all the congregation of the children of Israel came unto the wilderness of Sin, which is between Elim and Sinai, on the fifteenth day of the second month after their departing out of the land of Egypt....
Chapter 19 19:1 And the LORD spake unto Moses and unto Aaron, saying, 19:2 This is the ordinance of the law which the LORD hath commanded, saying, Speak unto the children of Israel, that they bring thee a red heifer without spot, wherein is no blemish, and...
Chapter 29 29:1 And in the seventh month, on the first day of the month, ye shall have an holy convocation; ye shall do no servile work: it is a day of blowing the trumpets unto you. 29:2 And ye shall offer a burnt offering for a sweet savour unto the LORD;...
The purest outpouring of love between the sexes, is as a miniature super-nova of ecstatic union. Reciprocating pleasure becomes the engine that feeds the fires of passion. Passion becomes dynamic fuel for love. It is an engine that runs with the force of a...
By Steve Foster Esmil Rogers was nearly untouchable for six innings, but everything fell apart for him and the Colorado Rockies in the seventh inning as the Rockies dropped the first of a three-game series with the Los Angeles Dodgers, 6-1.
Great care has been taken to prepare the information on this page. Elements of the content come from factual and lexical knowledge databases, realmagick.com library and third-party sources. We appreciate your suggestions and comments on further improvements of the site. |
SERS spectroscopic evidence for the integrity of surface-deposited self-assembled coordination cages.
A series of self-assembled coordination cages [Pd4L(n)8] based on a phenothiazine backbone has been investigated by means of Raman spectroscopy in solution and by Surface Enhanced Raman Scattering (SERS) on a nanostructured Au surface. The experiments demonstrate that the cages can be clearly distinguished from their constituting ligands by their Raman spectroscopic signatures. Furthermore, the structural integrity of the interpenetrated coordination cages upon deposition on the Au surface was demonstrated for the first time. The signal assignment of the experimental vibrational spectra was supported by Density Functional Theory (DFT) calculations on suitable molecular models. |
Perceptual properties of obsessive thoughts are associated with low insight in obsessive-compulsive disorder.
Obsessions are traditionally defined as bothersome and repetitive thoughts that the patient is unable to resist. Preliminary evidence suggests that in a subgroup of patients with obsessive-compulsive disorder (OCD), obsessions are experienced as partially perceptual. The present study explored the frequency of perceptually laden obsessions and their relationship with illness insight and depression. Twenty-six patients with OCD were administered the newly developed Sensory Properties of Obsessions Questionnaire. Participants were asked to endorse on a 5-point Likert scale whether their obsessions were associated with perceptual features. Participants showed moderate symptom severity. A total of 73% affirmed that their obsessions contained perceptual features. The predominant perceptual channels were visual, tactile, and somatic (i.e., bodily sensations). The extent of perceptual aspects associated with obsessions was strongly correlated with lack of insight (Yale-Brown Obsessive-Compulsive Scale item 11) but not depression severity. The present study suggests that obsessive thoughts are frequently accompanied by perceptual sensations, which concurs with models assuming a continuum between hallucinations and intrusions. Apparently, the more "real" or authentic the obsessive thought is experienced, the less the afflicted person is able to dismiss its content as fully irrational or absurd. |
Q:
Getting values from jquery GET response
I have been unable to figure this out.
I'm trying to retrieve the price from a input field on the page (from the response) I am requesting
$.get('http://site.com', function(data) {
var div = data;
var price = div.getElementById('price').value;
alert(price);
});
Which leaves me with undefined. What is the correct way to do this?
A:
var price = $('#price', div).val(); or var price = $(div).find('#price').val();
div is a variable not in the dom, hence dom methods can't apply. You have to first inject it in the dom, or, like in this response, jquery it.
|
Basketweave Baby Blanket
Basic Skills Necessary:
knit
purl
Pattern Description:
This classic baby blanket is great for a boy or girl. It is knit with a bulky weight yarn. This pattern is quick, easy, fun and a classic style for everyone. Looks great in anything from a bright, funky color to a soft, natural shade. Approx. measurements are 26" x 32". Very easy to enlarge or reduce. I'm happy to help you with any knitting questions!
Have you made this pattern?
About the designer
Thank you for visiting my store. There are patterns for everyone and all levels of knitting. After having my own knitting store for 6 years I decided to close the doors and have 3 children. Now, I am ...
Thank you for visiting my store. There are patterns for everyone and all levels of knitting. After having my own knitting store for 6 years I decided to close the doors and have 3 children. Now, I am thrilled to be able to share all of my most popular designs and many new are constantly arriving. I am happy to answer any questions you may have along the way. I hope you enjoy knitting these as much as I did. |
The dopaminergic stabiliser ACR16 counteracts the behavioural primitivization induced by the NMDA receptor antagonist MK-801 in mice: implications for cognition.
The Carlsson research group has developed a series of compounds capable of stabilising the dopamine system without inducing the deleterious hypodopaminergia that encumbers the currently used antipsychotic drugs. In the present study one of these dopaminergic stabilisers, ACR16, was tested in a mouse model for cognitive deficits of schizophrenia and autism. Since we believe that hypoglutamatergia is a key element in both schizophrenia and autism we used mice rendered hypoglutamatergic by treatment with the N-methyl-D-aspartate (NMDA) antagonist MK-801. MK-801 causes both hyperactivity and a behavioural primitivization. ACR16 attenuated the MK-801-induced hyperactivity and, in addition, caused a marked improvement of behavioural quality with a movement pattern approaching that of control animals. Since we believe that the impoverishment of the behavioural repertoire caused by MK-801 may correspond to the cognitive deficits seen in schizophrenia and autism, these results suggest that ACR16 may improve cognitive status in these disorders. |
Q:
What is the difference between these extern declarations in C++?
Lets have the files with the following contents:
file1.cpp: double array[100];
file2.cpp (client of file1.cpp):
/// What the difference between this:
extern double* array;
/// and this?
extern double array[];
If I use array declared in the first way I receive segfault. If second, it works ok. It confuses me, since in a regular C++ programm I can easily do the following and these objects would be equal:
double array[100];
double* same_array = array;
/// array[0] is equal to same_array[0] here
/// But why they are not equal in the example with extern?
A:
The difference is that first is an pointer to the type double
and second is an array of double.
Important thing to note here is:
Arrays are not Pointers!
An expression with array type (which could be an array name) will convert to a pointer anytime an array type is not legal, but a pointer type is.
double array[100];
double* same_array = array;
As per the rule mentioned,In above the array name decays in to a pointer to its first element.
Why does your program crash?
An array declaration creates an array which occupies some memory depending on the storage class(where is declared).
While a pointer just creates an pointer which points to some address. You would explicitly need to made it point to some valid object to be able to use it.
This should be a good read:
How do I use arrays in C++?
|
[Effects of tetrandrine on the synthesis of collagen and scar-derived fibroblast DNA].
To investigate the effects of tetrandrine on the synthesis of collagen and scar derived fibroblast DNA. Scar-derived human fibroblasts were cultured in vitro. The changes in the levels of the synthesis of collagen and DNA of the fibroblasts were represented by the incorporation values of (3)H-TdR and (3)H-proline into the cells. Tetrandrine was added to the culture media of the cells, and its effects were studied. When the concentration of added tetrandrine increased from 5 mg/L to 80 mg/L, The (3)H-TdR values in scar-derived fibroblasts were 1162 plus minus 226 and 412 plus minus 82, respectively while that in control group was 1740 plus minus 165, showing an inhibition rate of 76.32%, and the difference (P < 0.01). In addition, the (3)H-proline incorporation values in the cells were 535 plus minus 141 and 341 plus minus 89, respectively, while that in control group was 1126 plus minus 193, with the inhibition rate of 69.71%, showing significant difference (P < 0.01). The synthesis of DNA and collagen in cultured scar-derived fibroblasts could be inhibited by tetrandrine in dose-dependent pattern. Tetrandrine might be a potential agent for the prevention and treatment of proliferative scars. |
S-phase block and cell death in human lymphoblasts exposed to benzo[a]pyrene diol epoxide or N-acetoxy-2-acetylaminofluorene.
The relationship between perturbation of the cell cycle and induction of cell death by benzo[a]pyrene diol epoxide (BPDE) or N-acetoxy-2-acetylaminofluorene (AcAAF) in exponentially proliferating T5-1 human lymphoblastoid cells was studied. Both BPDE and AcAAF caused cells to accumulate in the S phase of the cell cycle. Perturbation of the cell cycle preceded reduction of cell viability and was associated with inhibition of population growth. Effects on each of the three parameters were noted during the first population doubling, suggesting that they occurred during the first cell cycle after exposure. BPDE-exposed cells accumulated initially in early to mid-S phase and then moved parasynchronously through the remainder of this phase. In contrast, AcAAF-exposed cells accumulated uniformly at all points of the S phase. High doses of either compound froze cell cycle progression, completely inhibited population growth, and killed nearly all cells in the population. Our results suggest that perturbation of DNA replication mediates cell death after exposure to doses of either chemical that cause less than complete inhibition of cell proliferation. However, additional processes, such as perturbation of transcription, may be involved in lethality after exposure to doses that immediately and completely inhibit population growth. |
Q:
How to turn PHP variables into XML
I'm trying to do some feed submission for MWS.
I have a db that I need to make a call from.
dbCall functiion and $sql is the sql that calls the variable from customer database.
$var = dbCall($sql);
for ($x = 0; $x < 1; $x++ )
{
feed[] = "<Message>
<MessageID>".$messageID."</MessageID>
<OperationType>Update</OperationType>
<Product>
<SKU>book_".$var[$x]."</SKU>
<StandardProductID>
<Type>ASIN</Type>
<Value>".$var[$x]."</Value>
</StandardProductID>
<Condition>
<ConditionType>New</ConditionType>
<ConditionNote>Brand New! Never used!</ConditionNote>
</Condition>
</Product>
</Message>";
$messageID = $messageID + 1;
}
$total_feed = implode(" ", $feed);
$final_feed = '<?xml version="1.0" encoding="utf-8"?>
<AmazonEnvelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="amznenvelope.xsd">
<Header>
<DocumentVersion>1.01</DocumentVersion>
<MerchantIdentifier>'.$merch_id.'</MerchantIdentifier>
</Header>
<MessageType>Product</MessageType>
<PurgeAndReplace>false</PurgeAndReplace>' .$total_feed.'</AmazonEnvelope>');
`
When I run this; I get the string back but some of the tags don't align properly (see SKU and value).
How do I get an XML output from database variables?
Edit:
When I print the output for implode(" ",$feed) - all my tags seem lower case, but if I use htmlspecialchars or htmlentities, I get them in correct format.
<message> instead of <Message>
A:
using trim adjusted the xml correctly.
|
Q:
Compiling error: Function Parameters using Object References are Confused by Constructed Objects
In the unit test of a class, I try to declare a class variable by calling explicitly the empty constructor and pass it to a function that excepts a reference to the interface of the type I'm declaring, but the compiler produces error. When I just declare it without any explicit constructor call the function accepts it.
See the code below:
//classundertest.h
class IController;
class CClassUnderTest
{
public:
CClassUnderTest() {}
virtual ~CClassUnderTest() {}
unsigned int Run(IController & controller);
};
//testclassundertest.h
#include "UnitTest++.h"
#include "classundertest.h"
#include "icontroller.h"
class CTestController : public IController
{
public:
CTestController() : IController() {}
virtual ~CTestController() {}
virtual void Play(unsigned int i) {}
};
struct CClassUnderTestFixture
{
CClassUnderTest classUnderTest;
};
TEST_FIXTURE(CClassUnderTestFixture, RunTest)
{
CTestController controllerA;
CHECK_EQUAL(classUnderTest.Run(controllerA), 105U);
CTestController controllerB();
CHECK_EQUAL(classUnderTest.Run(controllerB), 105U);
}
The compiler believes controllerB is the reference of the constructor:
error: no matching function for call to `CClassUnderTest::Run(CTestController (&)())'
error: candidates are: unsigned int CClassUnderTest::Run(IController&)
I'm confused by why the compiler won't allow me to call the constructor when instantiating controllerB, especially when the production code seems okay with this?
A:
This line:
CTestController controllerB();
is the declaration of a function that takes nothing and returns a CTestController. For default construction, you must simply leave off the parenthesis.
This is related to something called the "most vexing parse". Consider:
struct S {};
int main()
{
S s(S()); // copy construct a default-constructed S ...?
}
This doesn't work. This declares s as a function that takes a pointer to a function that takes nothing and returns an S, that returns an S. To fix this, you can use an extra set of parenthesis:
struct S {};
int main()
{
S s((S())); // copy construct a default-constructed S :)
}
|
Q:
Can't start a virtualbox VM
I tried to start virtual box but I can't start my VM. I can create it but when I tried to start it, I got this error. This is the photo that I captured of the error message:
And yes, I have EFI secure boot enabled.
A:
As the VirtualBox manual says,
In order to run other operating systems in virtual machines alongside your main operating system, Oracle VM VirtualBox needs to integrate very tightly into the system. To do this it installs a driver module called vboxdrv which does a lot of that work into the system kernel, which is the part of the operating system which controls your processor and physical hardware. Without this kernel module, you can still use the VirtualBox Manager to configure virtual machines, but they will not start.
So you need to install the vboxdrv driver, like the error message spells out, too. To do this, execute
modprobe vboxdrv
with root privileges. If you get errors, you might need to install some software that's necessary to build the kernel module, like the C compiler or some header files. You can find further information in the VirtualBox manual linked above.
In general, it's very often helpful to actually read the error messages ;) As in this example, they often spell out what's wrong ("The VirtualBox Linux kernel driver is either not loaded or not set up correctly."), sometimes even what you need to do ("Please reinstall virtualbox-dkms package and load the kernel module by...").
Also, please don't post error messages as images like screenshots. Those cannot be searched. So the next person who has this problem can't find this question by searching for, for example, "VERR_VM_DRIVER_NOT_INSTALLED". Please copy and paste the text into your question as actual text.
And finally, after I told you what you did wrong: Welcome to Ask Ubuntu ;)
|
파리의 연인 (pa-ri-ui yeon-in)
Kang Tae-young (Kim Jeong-eun) (SBS) Han Ki-ju (Park Shin-yang) (SBS) Yoon Su-hyuk (Lee Dong-geon) (KBS) Can you imagine what it would be like to become Cinderella? Sophisticated romance and passion taking place in the beautiful city of Paris… Tae-young (Kim Jeong-eun), who used to help her father manage a small, run-down theater in the outskirts of Seoul, decides to leave for Paris to study after her father passes away. Although Tae-young makes it to Paris, she finds that she cannot afford to even pay her rent unless she works part-time. One day, she gets a job as a cleaning lady at a beautiful mansion-style apartment. Ki-ju (Park Shin-yang) was born with a silver spoon in his mouth. As the son of a multi-millionaire, Ki-ju is a bright and sophisticated gentleman with a good sense of humor. Ki-ju has only one fear in life: love. In the past, he went through a loveless marriage arranged by his parents that ultimately led to a divorce. Despite these factors, Ki-ju soon finds himself helplessly falling for the unsophisticated, yet genuine charm of Tae-young.
Lovers in Paris | News
'Super Daddy Yeol' draws on heartbreaking storyline2015/03/12, Source, Lee Yoo-ri, who rose to stardom through the MBC drama "Jang Bo-ri Is Here!" last year, playing an evil woman who abandons her daughter in order to achieve success, is returning to the screen in a heartbreaking role for tvN's new drama "Super Daddy Yeol". "Mi-rae, the title role of 'Super Daddy Yeol' [played by Lee], and Min-jung from my previous drama have common points", said Lee at a press conference on Monday at the Imperial Palace Seoul in Nonhyeon-dong, southern Seoul. "Min-jung has a tenacious side, as shown by the way she pursues her life goal, while Mi-rae strives to be an outstanding doctor",...More
[HanCinema's Actor Spotlight] Kim Seo-hyeong2014/09/13,
When looking at the style of women that are popular in Korean drama and considering the types of roles women usually get, it is obvious that being pretty and sweet are qualities favored. However, it takes all kinds of characters to create a work and there are many types of women in stories aside from the often cookie-cutter stars that lead them. Kim Seo-hyeong might lack the innocent and juvenile quality appreciated in actresses, but her charisma and choices give her options those often lack,...More
'Cinderella' programs enchant TV audiences2014/01/24, Source,
A scene from the drama "The Heirs". Provided by SBS
"Get out of my house! No? Want to continue going to Jeguk High School? Then love me as much as possible". This is a line from the Korean drama "The Heirs", which successfully ended its run last December. "The Heirs" follows a love story between the son of a business tycoon and an ordinary girl. In the drama, high school senior Cha Eun-sang (actress Park Shin-hye) lives with her mother, who works as a housemaid in the Jeguk Group chairman's house. The mother and daughter eventually start living in the maid's room, but Cha keeps working various part-time jobs, including washing dishes and delivering fried chicken. Then a love story between the chairman's second son (actor Lee Min-ho) and Eun-sang blossoms,...More
Lovers in Paris | Community
ark Shin Yang is a very good actor and every time he plays his role you can always tell the sincerity and the devotion he has on his work..his life!
He's a very talented actor and he can always put colors on every drama he's part of.
I watched LIP 4 times and he always amaze me and makes me wonder how every time i watch this drama it makes me feel that it's my first time seeing it, i still laugh though i already knew what will happen, i cry on every heart-warming scenes PSY, KJE and LDG will have as if I'm in pain the same way they are.
Park shin yang for me is irreplaceable..
He's Park Shin Yang and will always be Park Shin Yang...
No mater he's still banned from doing any drama and being restricted to do things he's really great at, I know he'll be back someday cause Korean Entertainment industry will not be completed if one of it's foundation is missing..that for me is Park Shin Yang
his was the first Korean drama I've seen and since I bought the DVD set, I've seen it over & over again and still never get tired of it! The casts, screenplay, soundtrack, direction are just super! This is the best Korean drama for me & no other dramas could surpass this one! The only downside of this drama is you get addicted to it. From the time I fell in love with this drama and Park Shin Yang of course, I never wanted to watch any other American series on TV or movies!
I love Korean dramas/movies because you don't see the kind of violence or sex that you often see in American films for that matter. know what it is but for me Korean dramas/movies are the best!
I loved Lovers & to me this is #1 and thereafter I've been wanting to watch more Kdramas! I just wish SBS would consider having a sequel to this wonderful romance/comedy story! It's remarkable & I can't stop talking about this! More power to you all!
the story tells that it doesnt have to be in Paris to meet yr fate..it can b anywhere in the world..thats why they said if fate would hv it it doesnt hv to b in paris..and thats the reason the replay the scene again..as u can see the setting is in korea instead of Paris..do u understand now?? :)
Lovers in Paris (파리의 연인)
Subscribe to HanCinema Pure to remove ads from the website (not for episode and movie videos) for US$2.99 per month (you can cancel anytime).
The first step is to be a member, please click here : Sign up, then a subscribe button will show up. |
David Talbot talks about different world visions for young educated workers from The Farm.
JANUARY 26, 2015 — Editor’s note: Early Sunday morning, I made my way down to the second block of Townsend Street to join in a 24-hour event put on by Pando Daily called “don’t be awful.” The webcast was set up in the Braintree office, a classic wood-and-stone Soma tech nest with open spaces, a big kitchen, lots of takeout food, and a keg of beer.
I talked about community, about what it means for a bunch of better-paid people to move into a place where low-income people already live – and why it’s not okay for the newcomers to force out the longtime residents.
And then I laid out some of my rules for Not Being Awful, starting with: Don’t ever move into an apartment, TIC, condo, or house that has been cleared by an eviction. Don’t assume that because you have more money that you have to right to take someone else’s home away. Don’t treat an existing community like your personal playground.
Afterward, one of the event organizers thanked me for coming, even though, she said, “I disagree with almost everything you said.” Seriously? So it’s okay to evict poor people to make room for new rich people? Is that what the SF Chron talked about today with a story called “psychology studies suggest rising wealth means more jerks in SF?”
Then I got an email from David Talbot, the founder of Salon, the author of Season of the Witch, a longtime SF writer and activist, with a copy of a speech he just delivered at Stanford. It sums thing up pretty nicely. I’ve posted the entire thing below (Tim Redmond)
By David Talbot
I would like to come here today with wondrous tales of San Francisco’s future. I would like to tell you that the liberation battles of the 1960s and ‘70s that made San Francisco the soaring capital of the human spirit were not only won – as I wrote about in “Season of the Witch” – but continue to triumph. But, instead, I come not to praise this heroic past, but to bury it. And to bring you grim tidings of the future from the City of Love.
This is not simply a San Francisco story, of course, because the Bay Area is one urban/suburban organism. For good or ill, Stanford and San Francisco have always been closely entwined. There’s “The City” – for that’s what we still call San Francisco around these parts, because it’s the only metropolis in northern California deserving of such a grand title. And there’s “The Farm” – that bucolic sanctuary of higher learning started by Leland Stanford, one of the Golden State’s legendary robber barons. A big pipeline of intellectual and financial capital flows up and down the Peninsula between City and Farm.
For many years, Stanford was the country-club university where millionaires of the West sent their children – the bright and the not-so-bright offspring of privilege. But in the 1930s and ‘40s. things began to change around here. Stanford grads William Hewlett and David Packard began tinkering in their legendary garage. And, after World War II, William Shockley moved west to work on his transistors. Pumped full of Pentagon money, this sun-dappled campus and the green fields and orchards surrounding it suddenly blossomed into Silicon Valley. Engineers and entrepreneurs were the new gods – not farm owners and railroad barons.
Much of the wealth in this new boom was blood money. The shiny new instruments of technology that bloomed here sprang from the Defense Department’s need to identify the enemy, track the enemy and destroy as many of them as possible. Even vaporize entire civilian populations if necessary. It was the Cold War. We were told that we were locked in a fight to the finish with a ruthless foe. There was little moral reflection in the research labs of Silicon Valley or Stanford in those days. As Dylan sang, “We learned to accept it, accept it with pride – for you don’t count the dead, when God’s on your side.”
Back then, you didn’t want to examine too closely the political views of these new gods — these masters of innovation and progress. Highlighting the symbiotic connection between Silicon Valley and the war machine, David Packard would become Secretary of Defense for President Nixon, helping to manage the genocidal war in Vietnam. And Shockley would feel free to vent his master-race views on eugenics and call for the voluntary sterilization of inferior peoples.
From Shockley’s fascist eccentricity to the selfish libertarianism of today’s baby tech moguls, the lords of Silicon Valley have long felt it was their right and duty to impose their views on the rest of us, no matter how noxious they are. And although their greed-based politics don’t usually play well with the voting public – since their ideas are born in the tech bubbles that only they inhabit – these supremely self-confident men and women keep running for high office. Considering the untold wealth at its disposal, sooner of later Silicon Valley will elect one of its own to the executive mansions in Sacramento and to Washington. And resistance will be futile.
When this day comes, it will mark the complete triumph of techno-capitalism – the machine mentality that all social problems can be engineered away. And if your problems don’t fit into this equation, tough luck. You don’t compute. You have no option but to disappear. It’s the law of Darwin. It’s the law of Schumpeter. There is no progress without creative destruction – and, poof! you’re about to be extinct.
For those of us who live in San Francisco, and have called it home for many years and have raised our families there, this is not simply a dystopian nightmare of the future. It’s our daily reality. To paraphrase David Byrne, every day we look around our city, we think, “This is not our beautiful home, this is not our beautiful life.” Every day brings new evictions – the carpenters, shoe repairmen, truck drivers, bookstore owners, grocers, nurses, teachers, firefighters, social workers, chefs and waiters, writers, artists. All the people who make up a living, breathing, multidimensional city – all gone or going. Replaced by the new class — those lucky code-crunchers and marketers who just exercised their stock options and can afford to pay cash and pay above the asking price for a home once lived in by a school librarian and her taxi-driving, poetry-writing husband who was just Ubered out of his job. The irony, of course, is that the young techies now flooding into San Francisco were attracted by the very urban qualities – the colorful social mix, the creative vibe, the city’s progressive and compassionate soul – that are now being rapidly driven out by the rule of money.
Money buys everything in San Francisco these days. It buys entire downtown city blocks, where armies of Oracle workers and other corporate empires are allowed to occupy the streets and throw parties to themselves. These 1% Occupiers are not beaten and teargassed by the police. They are coddled and protected by the city. While the rest of us can only wail to heaven about the massive traffic jams and the blocked routes to work, these corporate occupiers of San Francisco gate off public streets for their own private festivals — listening to world-famous bands and gorging on the cuisine of four-star chefs imported for their exclusive pleasure.
Meanwhile, blocks away in the Mission – the district that is being rapidly depopulated of its Latino and working-class families – kids who show up for soccer practice at their neighborhood park, like they have done their whole lives, suddenly find that the playground has been rented by smugly entitled employees of Dropbox and Airbnb – one of the companies driving the wave of evictions in the city. Sorry kids — in San Francisco these days, it’s pay or don’t play.
Tech money has even bought City Hall. Mayor Ed Lee could have been the leader San Francisco needed. Lee’s father was an overworked short-order cook in a Chinese restaurant. Lee himself was once a crusading housing activist, fighting greedy landlords in Chinatown. He makes all the right noises and gestures about saving San Francisco’s gloriously unique identity. But that’s all they really are – gestures.
In truth, Lee is owned by avatars of the tech future like start-up investor Ron Conway. And most depressing of all, nobody with a more inspiring vision of San Francisco has emerged to challenge Lee for mayor this year. With each passing day, his disastrous, tech-sponsored reign seems like it will go unchallenged for another four years. All the one-dimensional banality of the current digital era is written all over Lee’s bland, bureaucratic administration. He’s a mustache in search of a man.
Here’s the cold reality today. There is a raging war in San Francisco between long-time residents of the city and the new elites. A younger Ed Lee, when he was a Chinatown activist, would have called this a “Class War” – because that’s what it is. A war between the 1% and the 99% over the future of San Francisco’s precious turf.
My own neighborhood – Bernal Heights — has become a frontline in this class war. Not long ago, Bernal Heights was a funky mix of blue-collar workers, lesbian starter-families, counterculture artists, community organizers and Latina grandmothers. But Bernal Heights had the misfortune of being blessed with affordable housing, verdant backyards and parks – and being conveniently located next to the hipster-infused Mission, and even worse, to Highway 101 – the Google bus route to Silicon Valley. Suddenly, this unusually mixed San Francisco neighborhood was transformed into what one real estate web site recently crowned the hottest zip code in the country. Now, if you stand at the corner of Precita and Alabama – the main checkpoint for the neighborhood — instead of seeing battered Subaru Outbacks and Hondas, you see a steady stream of new-model Teslas, BMWs and Uber limousines. A rapid, seamless flow of gleaming, luxurious metal that never slows down – not even for the children and dogs who come spilling into the street from the nearby park. These Silicon Valley movers and shakers can’t afford to slow down – time is money.
In the old days, the neighborhood’s celebrities were people like Terry Zwigoff — the independent filmmaker who made “Ghost World” and ”Bad Santa” — and underground cartoonists like Robert Crumb and Spain Rodriguez, creators of the most cutting-edge comics in America. These luminaries often retouched the neighborhood in their own inimitable style, building new turrets on their odd castles or painting murals of busty action heroes on their walls. But they didn’t tear down the whole place and start over. The new hot-shots are different, however. They’re knocking down the neighborhood’s ramshackle houses right and left — and replacing them with cold, futuristic mega-mansions. With every new slate-gray exterior that pops up, there goes the warm and oddball neighborhood.
Last year, a young, Latino man named Alex Nieto was shot 14 times and killed by police near my house, on top of Bernal Hill, a scenic area where people like to stroll and walk their dogs. Someone had reported that Nieto, a 28-year-old security guard who grew up in the neighborhood, didn’t look right. These days, fewer and fewer of us long- time residents look right, look like we still belong in our own homes. Sooner or later, if we’re not removed by force, we’ll be moved by the invisible hand of the market.
The strange thing about the new digital rich is that they don’t want to live among their own tax bracket – in traditional enclaves of wealth like Pacific Heights or Hillsborough. No, they want to live among the people — the ones they’re displacing — in Noe Valley, the Castro and the Mission. Take Mark Zuckerberg, please. For the past two years, the Facebook zillionaire and his wife have upended a once-quiet, middle-class neighborhood overlooking Dolores Park, as Pharaoh-like construction teams erect a massive $10-million, six-bedroom palace to house the royal couple. Zuckerberg is dying to live in the heart of the city, even though he apparently despises its San Francisco values. His corporate lobby, fwd.us, has championed a laundry list of conservative issues – from anti-labor legislation to the Keystone pipeline – that would make Harvey Milk and George Moscone spin in their graves.
So…where does Stanford fit into this tale of bitter urban struggle? As a breeding ground for the new elite, the Farm is seen by many in San Francisco as the enemy camp, as part of the problem.
My sons — who are 19, 20 and 24 and who grew up in San Francisco – have a name for the new wave of people moving in. The ones who proudly wear their Ivy League hoodies as they jog and hydrate around Precita Park or line up for artisanal chocolate tastings on Valencia Street, forking over enough cash to feed an entire family in the Mission for two or three days. “Stanford dicks.” That’s what my sons call them. Or Stanford douchebags, or Stanford tools. The term “Stanford assholes” has even made it into “Looking,” the HBO show set in gay San Francisco – and it’s not meant to be flattering.
Of course, it wasn’t always this way. Stanford has not always been synonymous with douchiness. After all, Stanford gave San Francisco Ken Kesey and the Merry Pranksters – and all the creative visionaries who hung out with them in the hills above Palo Alto, like the great novelist Robert Stone (who recently died) and Whole Earth Catalog publisher Stewart Brand, who was one of the main links between the countercultural ‘60s and the digital revolution.
“It was just incredible to come here from New York to the Peninsula, the Stanford area, the way it was in 1962,” Stone once recalled in an interview with The Chronicle. “It was like a Garden of Eden with no snakes. It was the most beautiful, most mellow — all those kind of dopey California words come true. You could get some little bungalow up a canyon for 60 bucks a month next to a creek and live oaks. It was easy living. Getting the fellowship, meeting the people I met, it was just such an extremely lucky thing for me.”
It was in Palo Alto where Phil Lesh hooked up with Jerry Garcia and started the band that would become the Grateful Dead – the house band for San Francisco’s cultural revolution. In 1965, Lesh saw Garcia playing banjo at Kepler’s bookstore – that essential oasis of the open mind in Palo Alto – and the rest is history. There is no way to imagine the long, strange trip that San Francisco took in the 1960s and ‘70s – soon followed by the rest of the country and the world – without the musical accompaniment of the Dead. They were more than just a band, they were an ongoing cultural and social experiment, one that involved the latest drugs and the latest technologies. The Grateful Dead were living proof that human ingenuity and human liberation could walk hand in hand through Golden Gate Park, after dropping acid together.
Steve Jobs was a creation of this psychedelic world, long before he became a capitalist cover boy. “Taking LSD was a profound experience, one of the most important things in my life,” Jobs once said. “It reinforced my sense of what was important – creating great things instead of making money, putting things back into the stream of history and human consciousness as much as I could.”
In 1984, Jobs declared war on the oppressive mentality behind the top-down information system with his iconic TV ad for the first MacIntosh computer. If ever a TV commercial could stir dreams of personal liberation, that one did – with its sexy, athletic rebel leader hurling her heavy hammer at Big Brother’s looming video image and shattering it forever.
Many people did in fact use Apple tools to launch their assaults on the old order – including alternative journalists, filmmakers, artists, educators and activists. I’ll always remember the sea of candy-colored Macs in the newsroom at Salon, the pioneering web publication I started back in the 1990s. In fact, I felt a strong bond between the San Francisco-style progressive journalism that we were practicing at Salon – defying the East Coast media’s corporate group-think – and the risk-taking spirit of Silicon Valley. The creative young engineers at Salon were always coming up with new ways for us to build our audience and to engage more deeply with them. Forging these digital, two-way bonds with our readers was the only way Salon managed to survive, when we antagonized powerful political enemies and became the target of advertising boycotts, media industry scorn and even bomb threats. So believe me when I say that I’m no neo-Luddite. As a journalist and media entrepreneur, I’ve benefited enormously from the wonders of the digital revolution.
But revolutions can grow old and corrupt. Before he died, Steve Jobs became his own kind of big brother, running sweatshops in China and hiding his loot in overseas shelters to avoid paying his fair share of taxes. It seems that most of the young inventors and entrepreneurs who are so eager to follow in Jobs’s footsteps care less about transforming human consciousness than about making mountains of tax-sheltered wealth.
Every new social wave to roll through San Francisco during its brief history has brought major disruption. Chinese immigrants were the targets of savage riots and official persecution. The hippies and gays of the 1960s and ‘70s sparked police crackdowns, street murders and assassinations. As I write in “Season of the Witch,” what we now call San Francisco values were not born with flowers in their hair, but howling, in blood and strife. But these new waves of human energy that poured into the city in the past not only triumphed, they made the city a more enchanted place. They breathed new life into a city whose foggy mystery and shimmering light demands such everyday magic. They made the food better, the nightlife more fabulous, the music more ecstatic, and the politics more epic. In the end, what will we be able to say about the tech invaders after they’ve had their way with San Francisco?
San Francisco’s new tech masters feel no need to justify themselves. They are absolutely certain that everything they touch turns to gold. They are, by definition, the future. But machines are not destiny, they’re just machines. Some bring social benefits, along with sky-high IPOs – and some don’t. As Leon Wieseltier recently wrote in the New York Times Book Review, “The processing of information is not the highest aim to which the human spirit can aspire…The character of our society cannot be determined by engineers.”
And yet the spirit of engineering is ascendant, and no place more so than Stanford and its urban outpost, San Francisco. On campuses like this one, the humanities departments are increasingly diminished by the reign of engineering and computer science. In a world such as this, rife with technologies and ideas “that flatten and shrink and chill the human subject,” Wieseltier observed, “the humanist is the dissenter.”
The humanities – the study and critical appreciation of the human enterprise – do not require a dose of the hard sciences to become more relevant, as the prophets of techno supremacy like to preach. It’s the other way around. Technology needs to be humanized. It’s not enough to create a cool app – you have to ask what it’s for, and whose needs it serves.
Are you going to create a software tool that lays off an entire industry, and replaces human interaction with bots? Or are you going to find ways to save the planet? And help liberate the human spirit?
Are you going to join America’s perpetual war machine and go to work for the CIA or NSA and spy on your fellow citizens? Or sign up with a Silicon Valley company that feeds private information to the government? Or — in the brave spirit of Edward Snowden — are you going to challenge that Orwellian system of thought control? You know, Snowden is the real-life version of Steve Job’s brave, young rebel – the one who threw that hammer through the Big Brother video screen.
This is what it comes down to…Are you interested in going public, or in serving the public – that’s the fundamental question a Stanford student has to ask these days. When I was in college, we had a saying – “You’re either part of the problem or you’re part of the solution.” Which one are you? A Stanford dick? Or are you different?
True change, the most fundamental change, is always made by freaks and outcasts. These are the people who put San Francisco on the map in the 1960s and ‘70s. For a brief and shining moment, they turned the most beautiful city in the world into a wonderland of human imagination — or as Paul Kantner of the Jefferson Airplane put it: “49 square miles surrounded by reality.” These seekers of glory, as Allen Ginsberg called them, blew the city’s mind – and then they did the same for the world. Sexual freedom, gay marriage, green cities, livable wage, universal health care, local organic food, medical marijuana, free music in the parks – all of these ideas blossomed first in San Francisco before their seeds spread on the wind.
But that was then. Now we face challenges even more daunting: planetary survival, the growing gap between rich and poor, the steady destruction of democracy by war and oligarchy. You can be part of the next wave of change. You can make history, if you make brave choices.
Back in the days of the Merry Pranksters, they rode a bus to the future. The bus in which Kesey and his merry band rode — setting off from La Honda in 1964 on their magical journey — was christened “Further.” It was a dilapidated, old school bus, spray-painted in electric kool-aid colors, and it was driven — in a NOT particularly professional manner — by a speed-rapping, hot-wired Neal Cassady. It was NOT a sleek, air-conditioned, WiFi-equipped Google bus. But it did indeed go FURTHER than any Google bus ever will.
You’re either on the bus, or off the bus – that’s what the freaks used to say back then.
Make sure that YOU get on the right one…Thank you. |
1988 800 km of Jerez
The 1988 800 km of Jerez was the opening round of the 1988 World Sportscar Championship season. It took place at Circuito Permanente de Jerez, Spain on March 6, 1988.
Official results
Class winners are in bold. Cars failing to complete 75% of the winner's distance are marked as Not Classified (NC).
Statistics
Pole Position - #61 Team Sauber Mercedes - 1:28.670
Average Speed - 151.186 km/h
References
J
Jerez 800 |
{
"jsonSchemaSemanticVersion": "1.0.0",
"imports": [
{
"corpusPath": "cdm:/foundations.1.1.cdm.json"
},
{
"corpusPath": "/core/operationsCommon/Common.1.0.cdm.json",
"moniker": "base_Common"
},
{
"corpusPath": "/core/operationsCommon/DataEntityView.1.0.cdm.json",
"moniker": "base_DataEntityView"
},
{
"corpusPath": "BusinessEventsEndpoint.1.0.cdm.json",
"moniker": "base_BusinessEventsEndpoint"
}
],
"definitions": [
{
"entityName": "BusinessEventsFlowEndpoint",
"extendsEntity": "base_BusinessEventsEndpoint/BusinessEventsEndpoint",
"exhibitsTraits": [
{
"traitReference": "is.CDM.entityVersion",
"arguments": [
{
"name": "versionNumber",
"value": "1.0"
}
]
}
],
"hasAttributes": [
{
"name": "FlowEndpointURL",
"dataType": "BusinessEventsFlowEndpointURL",
"isNullable": true,
"description": ""
}
],
"displayName": "Power Automate endpoint"
},
{
"dataTypeName": "BusinessEventsFlowEndpointURL",
"extendsDataType": "string"
}
]
} |
{
"cells": [
{
"cell_type": "markdown",
"metadata": {},
"source": [
"\n",
"# Analyze Data Quality with SageMaker Processing Jobs and Spark\n",
"\n",
"Typically a machine learning (ML) process consists of few steps. First, gathering data with various ETL jobs, then pre-processing the data, featurizing the dataset by incorporating standard techniques or prior knowledge, and finally training an ML model using an algorithm.\n",
"\n",
"Often, distributed data processing frameworks such as Spark are used to process and analyze data sets in order to detect data quality issues and prepare them for model training. \n",
"\n",
"In this notebook we'll use Amazon SageMaker Processing with a library called [**Deequ**](https://github.com/awslabs/deequ), and leverage the power of Spark with a managed SageMaker Processing Job to run our data processing workloads.\n",
"\n",
"Here are some great resources on Deequ: \n",
"* Blog Post: https://aws.amazon.com/blogs/big-data/test-data-quality-at-scale-with-deequ/\n",
"* Research Paper: https://assets.amazon.science/4a/75/57047bd343fabc46ec14b34cdb3b/towards-automated-data-quality-management-for-machine-learning.pdf\n",
"\n",
""
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
""
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# Amazon Customer Reviews Dataset\n",
"\n",
"https://s3.amazonaws.com/amazon-reviews-pds/readme.html\n",
"\n",
"### Dataset Columns:\n",
"\n",
"- `marketplace`: 2-letter country code (in this case all \"US\").\n",
"- `customer_id`: Random identifier that can be used to aggregate reviews written by a single author.\n",
"- `review_id`: A unique ID for the review.\n",
"- `product_id`: The Amazon Standard Identification Number (ASIN). `http://www.amazon.com/dp/<ASIN>` links to the product's detail page.\n",
"- `product_parent`: The parent of that ASIN. Multiple ASINs (color or format variations of the same product) can roll up into a single parent.\n",
"- `product_title`: Title description of the product.\n",
"- `product_category`: Broad product category that can be used to group reviews (in this case digital videos).\n",
"- `star_rating`: The review's rating (1 to 5 stars).\n",
"- `helpful_votes`: Number of helpful votes for the review.\n",
"- `total_votes`: Number of total votes the review received.\n",
"- `vine`: Was the review written as part of the [Vine](https://www.amazon.com/gp/vine/help) program?\n",
"- `verified_purchase`: Was the review from a verified purchase?\n",
"- `review_headline`: The title of the review itself.\n",
"- `review_body`: The text of the review.\n",
"- `review_date`: The date the review was written."
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"%store -r ingest_create_athena_table_tsv_passed"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"try:\n",
" ingest_create_athena_table_tsv_passed\n",
"except NameError:\n",
" print('++++++++++++++++++++++++++++++++++++++++++++++')\n",
" print('[ERROR] YOU HAVE TO RUN THE NOTEBOOKS IN THE INGEST FOLDER FIRST. You did not register the TSV Data.')\n",
" print('++++++++++++++++++++++++++++++++++++++++++++++')"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"print(ingest_create_athena_table_tsv_passed)"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"if not ingest_create_athena_table_tsv_passed:\n",
" print('++++++++++++++++++++++++++++++++++++++++++++++')\n",
" print('[ERROR] YOU HAVE TO RUN THE NOTEBOOKS IN THE INGEST FOLDER FIRST. You did not register the TSV Data.')\n",
" print('++++++++++++++++++++++++++++++++++++++++++++++')\n",
"else:\n",
" print('[OK]')"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# Run the Analysis Job using a SageMaker Processing Job with Spark\n",
"Next, use the Amazon SageMaker Python SDK to submit a processing job. Use the Spark container that was just built with our Spark script."
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"import sagemaker\n",
"import boto3\n",
"\n",
"sagemaker_session = sagemaker.Session()\n",
"role = sagemaker.get_execution_role()\n",
"bucket = sagemaker_session.default_bucket()\n",
"region = boto3.Session().region_name"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# Review the Spark preprocessing script."
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"!pygmentize preprocess-deequ.py"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {
"scrolled": true
},
"outputs": [],
"source": [
"!pygmentize preprocess-deequ.scala"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"from sagemaker.spark.processing import PySparkProcessor\n",
"\n",
"processor = PySparkProcessor(base_job_name='spark-amazon-reviews-analyzer',\n",
" role=role,\n",
" instance_count=1,\n",
" instance_type='ml.r5.2xlarge',\n",
" max_runtime_in_seconds=1200)"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"s3_input_data = 's3://{}/amazon-reviews-pds/tsv/'.format(bucket)\n",
"print(s3_input_data)"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"!aws s3 ls $s3_input_data"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Setup Output Data"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"from time import gmtime, strftime\n",
"timestamp_prefix = strftime(\"%Y-%m-%d-%H-%M-%S\", gmtime())\n",
"\n",
"output_prefix = 'amazon-reviews-spark-analyzer-{}'.format(timestamp_prefix)\n",
"processing_job_name = 'amazon-reviews-spark-analyzer-{}'.format(timestamp_prefix)\n",
"\n",
"print('Processing job name: {}'.format(processing_job_name))"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"s3_output_analyze_data = 's3://{}/{}/output'.format(bucket, output_prefix)\n",
"\n",
"print(s3_output_analyze_data)"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Start the Spark Processing Job\n",
"\n",
"_Notes on Invoking from Lambda:_\n",
"* However, if we use the boto3 SDK (ie. with a Lambda), we need to copy the `preprocess.py` file to S3 and specify the everything include --py-files, etc.\n",
"* We would need to do the following before invoking the Lambda:\n",
" !aws s3 cp preprocess.py s3://<location>/sagemaker/spark-preprocess-reviews-demo/code/preprocess.py\n",
" !aws s3 cp preprocess.py s3://<location>/sagemaker/spark-preprocess-reviews-demo/py_files/preprocess.py\n",
"* Then reference the s3://<location> above in the --py-files, etc.\n",
"* See Lambda example code in this same project for more details.\n",
"\n",
"_Notes on not using ProcessingInput and Output:_\n",
"* Since Spark natively reads/writes from/to S3 using s3a://, we can avoid the copy required by ProcessingInput and ProcessingOutput (FullyReplicated or ShardedByS3Key) and just specify the S3 input and output buckets/prefixes._\"\n",
"* See https://github.com/awslabs/amazon-sagemaker-examples/issues/994 for issues related to using /opt/ml/processing/input/ and output/\n",
"* If we use ProcessingInput, the data will be copied to each node (which we don't want in this case since Spark already handles this)"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"from sagemaker.processing import ProcessingOutput\n",
"\n",
"processor.run(submit_app='preprocess-deequ.py',\n",
" submit_jars=['deequ-1.0.1.jar', 'preprocess-deequ.jar'],\n",
" arguments=['s3_input_data', s3_input_data,\n",
" 's3_output_analyze_data', s3_output_analyze_data,\n",
" ],\n",
" logs=True,\n",
" wait=False\n",
")"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"from IPython.core.display import display, HTML\n",
"\n",
"processing_job_name = processor.jobs[-1].describe()['ProcessingJobName']\n",
"\n",
"display(HTML('<b>Review <a target=\"blank\" href=\"https://console.aws.amazon.com/sagemaker/home?region={}#/processing-jobs/{}\">Processing Job</a></b>'.format(region, processing_job_name)))\n"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"from IPython.core.display import display, HTML\n",
"\n",
"processing_job_name = processor.jobs[-1].describe()['ProcessingJobName']\n",
"\n",
"display(HTML('<b>Review <a target=\"blank\" href=\"https://console.aws.amazon.com/cloudwatch/home?region={}#logStream:group=/aws/sagemaker/ProcessingJobs;prefix={};streamFilter=typeLogStreamPrefix\">CloudWatch Logs</a> After a Few Minutes</b>'.format(region, processing_job_name)))\n"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"from IPython.core.display import display, HTML\n",
"\n",
"s3_job_output_prefix = output_prefix\n",
"\n",
"display(HTML('<b>Review <a target=\"blank\" href=\"https://s3.console.aws.amazon.com/s3/buckets/{}/{}/?region={}&tab=overview\">S3 Output Data</a> After The Spark Job Has Completed</b>'.format(bucket, s3_job_output_prefix, region)))\n"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# Monitor the Processing Job"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {
"scrolled": true
},
"outputs": [],
"source": [
"running_processor = sagemaker.processing.ProcessingJob.from_processing_name(processing_job_name=processing_job_name,\n",
" sagemaker_session=sagemaker_session)\n",
"\n",
"processing_job_description = running_processor.describe()\n",
"\n",
"print(processing_job_description)"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {
"scrolled": true
},
"outputs": [],
"source": [
"running_processor.wait()"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# _Please Wait Until the ^^ Processing Job ^^ Completes Above._"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# Inspect the Processed Output \n",
"\n",
"## These are the quality checks on our dataset.\n",
"\n",
"## _The next cells will not work properly until the job completes above._"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"!aws s3 ls --recursive $s3_output_analyze_data/"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Copy the Output from S3 to Local\n",
"* dataset-metrics/\n",
"* constraint-checks/\n",
"* success-metrics/\n",
"* constraint-suggestions/\n"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {
"scrolled": true
},
"outputs": [],
"source": [
"!aws s3 cp --recursive $s3_output_analyze_data ./amazon-reviews-spark-analyzer/ --exclude=\"*\" --include=\"*.csv\""
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Analyze Constraint Checks"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"import glob\n",
"import pandas as pd\n",
"import os\n",
"\n",
"def load_dataset(path, sep, header):\n",
" data = pd.concat([pd.read_csv(f, sep=sep, header=header) for f in glob.glob('{}/*.csv'.format(path))], ignore_index = True)\n",
"\n",
" return data"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {
"scrolled": true
},
"outputs": [],
"source": [
"df_constraint_checks = load_dataset(path='./amazon-reviews-spark-analyzer/constraint-checks/', sep='\\t', header=0)\n",
"df_constraint_checks[['check', 'constraint', 'constraint_status', 'constraint_message']]"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Analyze Dataset Metrics"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"df_dataset_metrics = load_dataset(path='./amazon-reviews-spark-analyzer/dataset-metrics/', sep='\\t', header=0)\n",
"df_dataset_metrics"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Analyze Success Metrics"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {
"scrolled": true
},
"outputs": [],
"source": [
"df_success_metrics = load_dataset(path='./amazon-reviews-spark-analyzer/success-metrics/', sep='\\t', header=0)\n",
"df_success_metrics"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"## Analyze Constraint Suggestions"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"df_constraint_suggestions = load_dataset(path='./amazon-reviews-spark-analyzer/constraint-suggestions/', sep='\\t', header=0)\n",
"df_constraint_suggestions.columns=['column_name', 'description', 'code']\n",
"df_constraint_suggestions"
]
},
{
"cell_type": "markdown",
"metadata": {},
"source": [
"# Save for the Next Notebook(s)"
]
},
{
"cell_type": "code",
"execution_count": null,
"metadata": {},
"outputs": [],
"source": [
"%%javascript\n",
"Jupyter.notebook.save_checkpoint();\n",
"Jupyter.notebook.session.delete();"
]
}
],
"metadata": {
"kernelspec": {
"display_name": "conda_python3",
"language": "python",
"name": "conda_python3"
},
"language_info": {
"codemirror_mode": {
"name": "ipython",
"version": 3
},
"file_extension": ".py",
"mimetype": "text/x-python",
"name": "python",
"nbconvert_exporter": "python",
"pygments_lexer": "ipython3",
"version": "3.6.10"
}
},
"nbformat": 4,
"nbformat_minor": 4
}
|
Valentina Barron
Valentina Marina Barron (born 9 February 1992) is an Australian actress, best known for her role as Flees in Stormworld.
Filmography
Awards/Nominations
References
External links
Category:1992 births
Category:Australian film actresses
Category:Australian television actresses
Category:Living people |
Introduction
This article is part of a presentation for The Associated Press, 2014 Technology Summit.
Trending topics are a popular feature of many social web sites, especially those with large volumes of data. Twitter, Facebook, Google Plus, and many other social networks all use trending topics. They’re typically created by aggregating a large volume of posts and categorizing them into a summary list of hashtags and topics. But, how exactly is this done?
The above word cloud was generated by a computer program using international news headlines on October 6, 2014. This topic was labeled #7: “fox,megan,mutant”.
One powerful and completely automated method for calculating topics from a large volume of data is to use machine learning. Specifically, unsupervised learning in the form of clustering, can clump documents together into cohesive topics. Once clustered, it’s just a matter of finding the most popular terms and we can derive a general sense of topic from each group.
In this article, we’ll explore using clustering for automatically discovering trending topics in a large list of news headlines. We’ll utilize machine learning and unsupervised learning with K-means to automatically relate news headlines by topic, and ultimately derive trending topic keywords from each group.
Machine Learning and News
Machine learning is often better known for its processing of images and sound. However, it’s also highly used in processing text as well. Most types of data can be represented in digital format, and thus, processed using computer algorithms. News stories are already processed on a daily basis by robots. High-frequency traders utilize a variety of computer algorithms to gauge the stock market and take advantage of trends in news. Some of their trigger points include sentiment analysis, breaking stories, and trending topics.
Consumers aren’t the only ones using computer algorithms to process the news, however. Publishers do it too. As long as the published news stories are accurate, most readers probably don’t even notice the difference.
Taking a step back from the publishing of news stories itself, let’s see what a computer program can discover in a large volume of headlines.
The Source of Data
For this article, a large collection of news headlines from the Associated Press Video Hub web site will be used. The web site contains thousands of breaking news stories from around the world. Stories range in topic, depending on popular issues at the time, and remain on the site for a limited duration of time.
Since the time-limit of stories is limited, this gives us a reference window in time to analyze the data set for trending topic information. Otherwise, we might be calculating trending topics over an entire history of news stories (which would hardly be “trending”, and rather, “categorical” instead).
This project takes advantage of direct access to the VideoHub database of stories, extracting over 12,000 news headlines for processing. Let’s see what we can do.
Including Packages
This project uses the R libraries listed below. You’ll want to include these in your project, if you’re following along with the code:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 # Set java_ Sys.setenv(JAVA_HOME='C:\\Program Files\\Java\\jre1. 8.0 _20') # Install packages if needed. packages <- c( "rJava" , "RWeka" , "RMongo" , "gtools" , "openNLP" , "tm" , "plyr" , "RColorBrewer" , "wordcloud" ) if (length(setdiff(packages, rownames(installed.packages()))) > 0 ) { install . packages (setdiff(packages, rownames(installed.packages()))) } library (rJava) library (RWeka) require (tm) require (openNLP) require (RMongo) require (plyr) require (gtools) require (RColorBrewer) require (wordcloud)
Reading News Headlines
We’ll start by extracting the news headlines from a Mongo database. We can do this in R using the following code:
1 2 3 4 5 6 7 8 9 10 11 mongo <- mongoDbConnect( "news" , "news.local.server" , 27017 ) auth <- dbAuthenticate(mongo, "user" , "pass" ) docs <- dbGetQueryForKeys(mongo, "news" , "{isPublished: true, isBreakingNews: true}" , "{ storyNumber: 1, title: 1 }" , 0 , 9999999 ) dbDisconnect(mongo)
Cleaning Documents
With our data loaded, we’ll want to do a little bit of cleaning up. First, we’ll remove news headlines with empty titles (every database has stuff like this, right?). Next, we’ll extract a list of noun-phrases from each headline. This fosters clustering and helps to avoid grouping of verbs and other potentially less key phrases. In R, we can use the openNLP library to find these terms and append the result as an additional “summary” column in our document table.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 PTA <- Maxent_POS_Tag_Annotator() tagPOS <- function (x, ...) { s <- as .String(x) word_token_annotator <- Maxent_Word_Token_Annotator() a2 <- Annotation( 1 L, "sentence" , 1 L, nchar(s)) a2 <- annotate(s, word_token_annotator, a2) a3 <- annotate(s, PTA, a2) a3w <- a3[a3$type == "word" ] POStags <- unlist(lapply(a3w$features, `[[`, "POS" )) POStagged <- paste(sprintf( "%s/%s" , s[a3w], POStags), collapse = " " ) list (POStagged = POStagged, POStags = POStags) } cleanLines <- function (lines) { lapply(lines, function (d) { result <- '' d <- gsub( "\\(.*\\)" , "" , d) posTags <- tagPOS(d) parts <- strsplit(posTags$POStagged, " " ) result <- "" lapply(unlist(parts), function (p) { if (grepl( ".+/NNP" , p)) { result <<- paste(result, gsub( "/NNP" , "" , p), sep = " " ) } }) d <- result }) } docs <- docs[docs$title != '' ,] cleaned <- cleanLines(docs$title) docs$summary <- unlist(cleaned)
Introducing the Term Document Matrix
Each news headline will need to be converted into a digital format, capable of being processed by a machine learning algorithm. One method for doing this is to use a term document matrix.
A term document matrix converts a collection of documents (in this case, news headlines) into a multidimensional array of 1’s and 0’s. First, the unique terms in all of the news headlines (also called a corpus) are collected into a dictionary. Next, each news headline is converted into an array of 1’s and 0’s, where the integer represents whether the current dictionary term exists within the news headline (1) or not (0). The value may also represent the number of times the term appears in the document (this is the method used in the code below). Since we’re looping through the dictionary for every news headline, the length of the array for every headline will be the same length as the number of unique terms. This gives us a consistent matrix of digitized documents to work with.
This type of digitization is common in natural language processing. There are also different ways of building the matrix and setting the values for each term, such as by using term frequency inverse document frequency or TF*IDF to indicate not just whether a term exists in the corpus, but its importance as well.
Building a Corpus
Now that we know we’ll be building a term document matrix, we can start building a corpus and tokenizing the result.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 corpus <- Corpus(VectorSource(docs$summary)) bigramTokenizer <- function ( x ) NGramTokenizer ( x , Weka_control ( min = 2 , max = 2 )) tdm <- TermDocumentMatrix(corpus, list(removePunctuation = TRUE , stopwords = TRUE , stemming = TRUE , removeNumbers = TRUE , tokenize = bigramTokenizer)) sparse <- removeSparseTerms(tdm, 0.9997 ) data <- as .matrix(sparse) data <- t(data) data <- data / 3
Notice, in the above code we remove punctuation, stopwords, numbers, and stem each term using the porter-stemmer algorithm. We then tokenize the corpus by term-pair.
Unigrams, Bigrams, and N-grams, Oh My!
There are several key steps in the digitization process from the code above. The first important step is choosing the type of tokenization to use. The two most common ways to break up a corpus is by making each term a separate feature to cluster upon (unigram) or by using pairs of terms to cluster upon (bigram).
Unigrams are the most simple and work quite well. However, when dealing with text, unigrams will result in matching up “George Bush” with “George Clooney”, since they both contain the same term “George”. In the case of news headlines, there is a fairly big difference between stories about President George Bush and the actor George Clooney.
Bigrams, on the other hand, resolve the confusion by taking into account pairs of words. In the “George” problem, the bigram phrase “george bush” will be unique from “george clooney”, and each may, in fact, form their own topic. One down-side to bigrams is that they tend to create a larger number of unique clusters with less documents in each one. This is because finding documents that contain the same pairs of words is less likely than finding documents with the same single words. It’s important to take this into account, especially when moving further up the chain in word sets (trigrams and n-grams).
The Problem with N-Grams
The higher the match of N-grams, the more likely it is to result in higher variance and potentially over-fitting the data. In the extreme case, a separate cluster will match each sentence in the set, rendering the clustering effectively useless. In order to group sentences into clusters, matches are required between the N-grams. However, if every sentence is its own N-gram, none will match (unless there is a duplicate news headline).
Considering this, we’ll stick with no larger than bigrams for tokenizing the set of terms.
Stripping Sparse Terms
Simply tokenizing the corpus and running it through an unsupervised clustering algorithm will likely provide some impressive results right at the start. However, for larger data sets (even just 10,000 documents), there may be considerable memory constraints and speed issues when processing with R.
Luckily, we probably don’t need all of the terms in our corpus. Many of the terms are completely unique, only found in the single document themselves. Other terms are only found in just 1 or 2 other documents. These terms can be dropped from clustering to reduce memory usage and processing time. We make a call to removeSparseTerms() to perform this action.
Removing sparse terms can be thought of as a form of compression, in that we’re eliminating less meaningful data points, while still retaining the overall picture of the data. By removing sparse terms from the news headline data set, memory usage was reduced from 2GB down to just 91MB.
K-Means Clustering
Finally, the fun part begins. It’s time to cluster the data and see what we get. Clustering is part of exploratory data analysis, in that it provides a different picture of the data. You can get a view of common elements within the data and begin to see key features that are related amongst the different data points in the set. We can run K-means in R with the following code:
1 2 3 4 5 6 7 cl <- kmeans( data , sqrt( nrow ( data ) / 2)) data <- cbind( data , cluster = cl $ cluster ) data <- cbind( data , title = docs $ title ) data <- cbind( data , summary = docs $ summary )
In the above code, we’re automatically choosing the value for K (number of groups) by using a rule-of-thumb calculation of K = sqrt(numberOfDocs / 2).
The kmeans method returns cluster indices in the same order as the data it processed. So, it’s easy to locate the cluster index for each document. We simply step through each document and append the same row from the cluster result. We can also join back in the title and noun-phrase summary on to each row in the data (we had to limit the input to kmeans to just the data we want to cluster on, removing any extraneous data; now we can join that data back in).
Mind the Junk Cluster
When clustering, there is bound to be a cluster that contains more elements than any other cluster. The elements tend to be seemingly unrelated, and in the case of news headlines, they tend to contain few terms or consist mostly of unique noun-phrases. This cluster can be thought of as the “junk cluster”.
The junk cluster consists of documents that were unable to be matched with many others. This can occur if too few features, in the form of matching unique terms, were available. Thus, matches with other documents were either non-existent or limited. The unsupervised learning algorithm tried to do its best by making sense of the data. However, for these documents, the best fit it could find was with other documents that found little or no match.
If the junk cluster is too large, try increasing your feature count by using unigrams, instead of bigrams. Also try increasing the number of clusters (K). Note, if K is increased too far, the result may become less meaningful. The extreme case of this can assign each document to its own cluster, resulting in the same number of clusters as there are documents.
Displaying Word Clouds of Trending Topics
Finally, we can display a visual of each cluster result to get an idea of what the computer program has discovered for trending topics. First, we’ll sort the results by cluster so that everything is together. We’ll then find the most popular terms in each cluster by using a simple word count. Finally, we’ll use the R wordcloud library to display the result.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 plotGroup <- function ( data , groupIndex = 1 ) { groups <- split (data, data$cluster) selectedGroup <- lapply(groups, function ( g ) { if ( g [ 1 , 'cluster' ] == groupIndex ) g }) selectedGroup <- selectedGroup[!sapply(selectedGroup, is. null )] words <- "" lapply(selectedGroup[[ 1 ]]$summary, function ( line ) { words <<- paste( words , line , " " ) }) pal <- brewer.pal( 10 , "Spectral" ) wordcloud( words , min .freq= 1 , max . words = 30 , random .order= FALSE , colors=pal) } topTerms <- function ( data , column = 'summary' ) { groupTerms <- data.frame() groupCount <- length (unique(data$cluster)) lapply(seq_along( 1 :groupCount), function ( i ) { s <- data[data$cluster == i, column] c <- Corpus(VectorSource(s)) t <- TermDocumentMatrix(c) m <- as .matrix(t) v <- sort (rowSums(m), decreasing= TRUE ) top <- v[ 1 : 3 ] n <- names(top) tag <- paste(n, collapse= ',' ) r <- as .data.frame(rep(tag, times= length (s), each = 1 )) groupTerms <<- rbind(groupTerms, r) }) colnames(groupTerms) <- c( 'tags' ) groupTerms } sorted <- data[mixedorder(data[,(ncol(data) -2 )]),] sorted <- sorted[,(ncol(sorted) -2 ):ncol(sorted)] groupTerms <- topTerms( as .data.frame(sorted)) sorted <- cbind(sorted, groupTerms) write .csv(sorted, "kmeans.csv" ) plotGroup(sorted)
October 6, 2014
78 trending topics from a database of 12,193 international news stories. Examples:
Notice in the above word clouds, George Clooney is a separate cluster from George Bush due to the usage of bigrams. The related topics within those two clusters relate to the actual person, as well. If unigrams were used, it is likely the two clusters would be merged into one.
We can retrieve the entire list of topics to get an overhead view of the result. If we sort by the number of matching stories within each cluster, we can also see which topics were the most popular. The following code will extract the list of topics and their associated story counts (note, the first and largest topic is the junk cluster):
1 2 3 4 5 # Get a unique list of trending topics with their frequency count ( number of stories classified under each topic). tags <- count (data$ tags ) # Sort the list with the most popular topic first . tags <- tags [order( tags $freq, decreasing=TRUE),]
Trending Topics
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 voiced,sound,ukraine,9853 english,voiced,open,654 cup,ryder,europe,112 state,islamic,iraq,109 world,cup,usa,86 new,york,fashion,82 minute,showbiz,asia,80 president,obama,barack,52 champions,league,voiced,51 gaal,van,voiced,49 open,cilic,nishikori,49 bouchard,errani,petkovic,48 world,championships,bwf,48 cup,rogers,voiced,43 bayern,munich,english,39 grand,prix,czech,37 brown,michael,ferguson,35 madrid,atletico,cup,34 louis,cardinals,missouri,32 house,white,secret,30 festival,film,venice,29 clooney,george,alamuddin,28 minister,prime,nouri,28 rice,ray,nfl,28 missouri,ferguson,brown,25 general,assembly,ban,23 new,city,york,23 maria,voiced,english,20 city,manchester,munich,19 president,barack,islamic,19 challenge,pro,usa,18 championship,pga,mcilroy,18 virginia,university,galveston,18 state,john,kerry,17 championship,lpga,park,16 korea,north,afc,16 formula,beijing,english,15 latvala,rally,jari-matti,14 ancelotti,voiced,english,13 city,kansas,royals,13 evergrande,guangzhou,voiced,13 world,championships,english,13 carolina,south,alabama,12 boston,red,sox,11 world,center,trade,11 australia,rally,ogier,10 bush,george,president,10 helen,mirren,hundred-foot,10 china,voiced,english,9 dyche,sean,garry,9 england,voiced,english,9 sotloff,steven,islamic,9 bay,rays,tampa,8 hamas,israel,gaza,8 bank,classic,west,7 control,disease,prevention,7 fox,megan,mutant,7 open,tenerife,boulden,7 plate,river,copa,7 voiced,english,team,7 chloe,grace,moretz,6 michael,sam,cowboyss,6 murray,sound,djokovic,6 abe,assembly,govt,5 beijing,guoan,guizhou,5 central,command,u.s.,5 championships,rowing,world,5 english,germany,voiced,5 holder,attorney,eric,5 korea,north,south,5 missouri,sunday,crowdss,5 stadium,yankee,derek,5 angeles,california,highway,4 angelou,clinton,manhattan,4 chelsea,mourinho,jose,4 continental,cup,europe,4 simeone,voiced,english,4 brown,chief,ferguson,3
Conclusion
The trending topics compiled in this article seem to paint a fairly descriptive picture of the breaking stories of the day. It’s possible to take the clustering method further, by combining multiple days of trending topics together over a longer stretch of time. The resulting topics could, themselves, be clustered to help locate longer-term trends throughout the month. It’s also possible to track increasing and decreasing popularity of the stories over lengths of time.
It’s important to keep in mind that clustering is a form of exploratory analysis. As with any type of exploration of data, results may fluctuate. Clustering uses random initialization points (centroid start locations), which often leads to different results at the end of each process. It can also be difficult to judge the level of success from a clustering result, since the end result is usually not known.
Even with the above subtleties in mind, machine learning can be a powerful method for analyzing data and gaining distinct insight into trends, often hidden to the human eye.
About the Author
This article was written by Kory Becker, software developer and architect, skilled in a range of technologies, including web application development, machine learning, artificial intelligence, and data science.science. |
Molecular orientation in the stacked dimer form of 5"AMP in aqueous solution. A study by the NMR-desert method.
Molecular orientation of 5"-AMP in its stacked dimeric form in neutral aqueous solutions has been investigated at room temperature through the NMR-DESERT method proposed earlier by Akasaka et al. (J. Magn. Resonance, (1975) 18, 328-343). The effect of deuterium substitution of H8 of the adenine ring on the relaxation rate of H2 has become appreciable with increasing concentration of 5"-AMP, which should be attributed to the intermolecular H2-H8 interaction between adjacent adenine rings in the stacked dimer of 5"-AMP. The reciprocal sixth-power-averaged distance between H8 and H2 of the adjacent adenine rings in the stacked dimeric form obtained from the differential relaxation rate for H2 has been found to be almost constant (3.6 +/- 0.2 A S.D.) in the whole concentration range studied (0.1--1.0 M). The result has presented a direct proof of the existence of trans-stacking with a relatively large proportion (more than 60%) in the stacked dimeric form of 5"-AMP. |
Mars Hill, North Carolina
Mars Hill is a town in Madison County, North Carolina, United States. The population was 1,869 at the 2010 U.S. Census, and was estimated at 2,032 in 2018 by the U.S. Census. It is the home of Mars Hill University, the name of which was inspired by Acts 17:22. The town is located due north of Asheville. Interstate 26 passes a mile east of the town. It is part of the Asheville Metropolitan Statistical Area.
History
Long occupied by indigenous peoples, this area was not settled by European Americans much before the American Revolutionary War. They were mostly yeomen and subsistence farmers, many of whom had Scots-Irish ethnicity. The California Creek Missionary Baptist Church, Mars Hill College Historic District, Mars Hill High School, and Thomas J. Murray House are listed on the National Register of Historic Places.
Geography
Mars Hill is located at (35.828496, -82.547843).
According to the United States Census Bureau, the town has a total area of , all of it land. The town has an elevation of , so the climate of the area is considerably cooler than might be expected of a town in a southern state.
Higher education
Mars Hill University, a private, coed, liberal-arts college, is located in Mars Hill. Founded in 1856 by local Baptists, it is the oldest college or university in western North Carolina. Although it is no longer directly associated with a Baptist church or organization, the university does state that "it is an academic community rooted in the Christian faith." Due to the presence of the university, residents of the town of Mars Hill enjoy a much greater variety of cultural, intellectual, and entertainment offerings than would usually be found in a town of its size. The university's enrollment typically runs from 1300 to 1600 students; they are not included in the census calculations of the town's population.
Demographics
As of the census of 2000, there were 1,764 people, 541 households, and 312 families residing in the town. The population density was 911.7 people per square mile (352.9/km²). There were 586 housing units at an average density of 302.9 per square mile (117.2/km²). The racial makeup of the town was 91.21% White, 5.95% African American, 0.28% Native American, 0.85% Asian, 0.85% from other races, and 0.85% from two or more races. Hispanic or Latino of any race were 1.36% of the population.
There were 541 households out of which 20.5% had children under the age of 18 living with them, 45.1% were married couples living together, 11.1% had a female householder with no husband present, and 42.3% were non-families. 33.1% of all households were made up of individuals and 17.4% had someone living alone who was 65 years of age or older. The average household size was 2.10 and the average family size was 2.68.
In the town, the population was spread out with 11.7% under the age of 18, 43.1% from 18 to 24, 16.2% from 25 to 44, 15.7% from 45 to 64, and 13.3% who were 65 years of age or older. The median age was 23 years. For every 100 females, there were 89.1 males. For every 100 females age 18 and over, there were 86.7 males.
The median income for a household in the town was $32,917, and the median income for a family was $45,000. Males had a median income of $29,615 versus $23,625 for females. The per capita income for the town was $13,366. About 11.1% of families and 16.9% of the population were below the poverty line, including 21.1% of those under age 18 and 14.9% of those age 64 or over.
Notable people
John Chandler, educator
Bascom Lamar Lunsford, folklorist and performer of traditional folk and country music from western North Carolina
Graham Martin, former United States Ambassador to South Vietnam
Ray Rapp, former member of the North Carolina General Assembly
References
External links
Official website
Category:Towns in Madison County, North Carolina
Category:Towns in North Carolina
Category:Asheville metropolitan area |
Evaluation of a Web-Based Training in Smoking Cessation Counseling Targeting U.S. Eye-Care Professionals.
Smoking causes blindness-related diseases. Eye-care providers are uniquely positioned to help their patients quit smoking. Using a pre-/postevaluation design, this study evaluated a web-based training in smoking cessation counseling targeting eye-care providers. The training was developed based on the 3A1R protocol: "Ask about smoking, Advise to quit, Assess willingness to quit, and Refer to tobacco quitlines," and made available in the form of a web-based video presentation. Providers ( n = 654) at four academic centers were invited to participate. Participants completed pretraining, posttraining, and 3-month follow-up surveys. Main outcomes were self-reported improvement in their motivation, confidence, and counseling practices at 3-month follow-up. Generalized linear mixed models for two time-points (pretraining and 3-month) were conducted for these outcomes. A total of 113 providers (54.0% males) participated in the study (17.7% response rate). At the 3-month evaluation, 9.8% of participants reported improvement in their motivation. With respect to the 3A1R, 8% reported improvement in their confidence for Ask, 15.5% for Advise, 28.6% for Assess, and 37.8% for Refer. Similarly, 25.5% reported improvement in their practices for Ask, 25.5% for Advise, 37.2% for Assess, and 39.4% for Refer to tobacco quitlines ( p < .001 for all except for Refer confidence p = .05). Although participation rate was low, the program effectively improved providers' smoking cessation counseling practices. Including training in smoking cessation counseling in ophthalmology curriculums, and integrating the 3A1R protocol into the electronic medical records systems in eye-care settings, might promote smoking cessation practices in these settings. |
Accept-Ranges: none
Alt-Svc: quic=":443"; ma=2592000; v="39,38,37,35"
Cache-Control: private, max-age=0
Content-Type: text/html
Date: Fri, 06 Oct 2017 01:14:55 GMT
Expires: Fri, 06 Oct 2017 01:14:55 GMT
Last-Modified: Thu, 08 Dec 2016 01:00:57 GMT
Server: sffe
Status: 200
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Xss-Protection: 1; mode=block
|
[The Health Department of Sicily "Regional recommendations for hospital discharge and communication with patients after admission due to a cardiologic event" decree].
Mortality and rehospitalizations still remain high after discharge for an acute cardiologic event. In this context, hospital discharge represents a potential pitfall for heart disease patients. In the setting of care transitions, the discharge letter is the main instrument of communication between hospital and primary care. Communication, besides, is an integral part of high-quality, patient-centered interventions aimed at improving the discharge process. Inadequate information at discharge significantly affects the quality of treatment compliance and the adoption of lifestyle modifications for an effective secondary prevention. The Health Department of Sicily, in 2013, established a task force with the aim to elaborate "Regional recommendations for hospital discharge and communication with patients after admission due to a cardiologic event", inviting to participate GICR-IACPR and many other scientific societies of cardiology and primary care, as discharge letter and communication are fundamental junctions of care transitions in cardiology. These recommendations have been published as a specific decree and contain: a structured model of discharge letter, which includes all of the parameters characterizing patients at high clinical risk, high thrombotic risk and low risk according to the Consensus document ANMCO/GICR-IACPR/GISE; is thus possible to identify these patients, choosing consequently the most appropriate follow-up pathways. A particular attention has been given to the "Medication Reconciliation" and to the identification of therapeutic targets; an educational Kit, with different forms on cardiac diseases, risk factors, drugs and lifestyle; a check-list about information given to the patient and caregivers. The "Recommendations" represent, in conclusion, the practical realization of the fruitful cooperation between scientific societies and political-administrative institutions that has been realized in Sicily in the last years. |
Family Coalition Party of British Columbia
The Family Coalition Party of British Columbia was a social conservative, pro-life provincial political party in British Columbia, Canada.
In the 1991 election, it nominated 8 candidates in the province's 75 ridings. They won a total of 1,310 votes, or 0.09% of the provincial total. In the 1996 election, it nominated 14 candidates in the province's 75 ridings. They won a total of 4,150 votes, or 0.26% of the provincial total. None of its candidates was ever elected to the Legislative Assembly of British Columbia.
On November 25, 2000, it merged with four other conservative parties to form the British Columbia Unity Party. The other parties subsequently left the coalition, leaving the Family Coalition Party to continue with the "Unity" name by itself.
References
Further reading
See also
List of political parties in Canada
Category:Conservative parties in Canada
Category:Defunct political parties in Canada
Category:Provincial political parties in British Columbia
Category:Political parties with year of establishment missing
Category:Political parties with year of disestablishment missing
Category:1990s establishments in British Columbia
Category:Political parties established in the 1990s
Category:2000 disestablishments in British Columbia
Category:Political parties disestablished in 2000 |
In the wake of GDC 2018, I can finally announce my involvement with what’s undoubtedly the most remarkable project I’ve ever worked on: the somewhat legendary visual novel 428: Shibuya Scramble.
Kajiya Productions tapped me to be the translator on this title, and I have to say I was completely blown away–not just that I was being brought on to the project, but that the game was actually going to be released in the West at all, roughly a decade after the fact! It’s one of those games where, if you knew about it, you’d probably already figured any chance of it being released outside of Japan had come and gone years ago.
Suffice it to say, this was an enormous undertaking to translate! The total amount of text is equal to roughly three average-length novels, and with five different storylines all intertwining (with all the different branching paths therein based on player choice), there was a lot to keep track of and a lot of constant checking that the pieces were all fitting together properly. Thankfully (and I say this honestly, on my own behalf, not for any corporate plugging), the story and the characters were both so fun and engaging that it almost never felt like a chore to work my way through–though as you can probably imagine, a project of this size took a very long time to get through, and it’s not like every day was just sunshine and puppies.
It was an honor to get to work on this, which isn’t something I say lightly. As a translator, I’ve had to translate plenty of games and other pieces of media that I didn’t personally enjoy (and some of which I actively disliked), but this game hit the sweet spot of what I personally enjoy in a story, insofar as tone, humor, drama, and characterization go. By the time I was finished, I’d spent so much time with these characters and this world that I could hardly help but feel some sort of connection with them, and I’m thrilled that, in a few months’ time, a whole new English-speaking audience is going to be able to experience this story for the first time.
I’ve had novels of my own published, but I still think that, of all the projects I’ve been able to put my name on, 428 is the one I’m the most proud of. |
Self-reported diarrhea in a control group: a strong association with reporting of low-pressure events in tap water.
In a recently conducted case-control study of sporadic cryptosporidiosis, 6.6% of subjects in the control group reported having had diarrhea in the 2 weeks before completion of the questionnaire. In an analysis of this control group, there was a very strong association between self-reported diarrhea and reported low water pressure at the faucet. |
Sparse spectrum model for a turbulent phase.
Monte Carlo (MC) simulation of phase front perturbations by atmospheric turbulence finds numerous applications for design and modeling of the adaptive optics systems, laser beam propagation simulations, and evaluating the performance of the various optical systems operating in the open air environment. Accurate generation of two-dimensional random fields of turbulent phase is complicated by the enormous diversity of scales that can reach five orders of magnitude in each coordinate. In addition there is a need for generation of the long "ribbons" of turbulent phase that are used to represent the time evolution of the wave front. This makes it unfeasible to use the standard discrete Fourier transform-based technique as a basis for the MC simulation algorithm. We propose a new model for turbulent phase: the sparse spectrum (SS) random field. The principal assumption of the SS model is that each realization of the random field has a discrete random spectral support. Statistics of the random amplitudes and wave vectors of the SS model are arranged to provide the required spectral and correlation properties of the random field. The SS-based MC model offers substantial reduction of computer costs for simulation of the wide-band random fields and processes, and is capable of generating long aperiodic phase "ribbons." We report the results of model trials that determine the number of sparse components, and the range of wavenumbers that is necessary to accurately reproduce the random field with a power-law spectrum. |
[Hallucinations caused by paroxetine taken together with a levodopa-carbidopa preparation].
A 79-year-old woman suffering from Parkinson's disease, for which she was taking a levodopa-carbidopa preparation, was prescribed the selective serotonin reuptake inhibitor paroxetine 20 mg once daily. After taking the first tablet she started to suffer from visual hallucinations. Once she stopped taking the paroxetine, the hallucinations ceased immediately. A link between the paroxetine and the hallucinations seemed likely, with a possible interaction between the paroxetine and the levodopa-carbidopa combination. |
Outcomes of native superficial femoral artery chronic total occlusion recanalization after failed femoropopliteal bypass.
When a bypass fails, the options are lysis, redo bypass, or endovascular intervention. If lysis of the original bypass is not considered an option, which is better-redo bypass or attempts at endovascular recanalization of the native system? This retrospective study examined the outcomes of native superficial femoral artery (SFA) chronic total occlusion (CTO) recanalization compared with redo bypass after failed femoropopliteal bypass. Patients presenting with a symptomatic failed femoropopliteal bypass that underwent attempted CTO endovascular (EV) recanalization of the native SFA or a redo femoropopliteal bypass (BP) from 2000 to 2015 were analyzed. Patients undergoing catheter-directed thrombolysis were excluded. Time-dependent outcomes were assessed with life-table analyses. Factor analyses were performed using a Cox proportional hazard model for time-dependent variables. A total of 104 patients (69% male; average age, 65 years) underwent EV (n = 40) or BP (n = 64) after presentation with symptomatic occlusion of a previous femoropopliteal bypass graft (rest pain in 84% and life-style limiting claudication in 16%, 79% to the above-knee popliteal, 81% prosthetic). According to the TransAtlantic Inter-Society Consensus for the Management of Peripheral Arterial Disease classification, 91% of the lesions were category D and 19% were category C. Tibial runoff was one tibial vessel in 79% of the patients and two or more runoff vessels in the remainder. Lesions treated endovascularly underwent primary stenting with a median of 3 stents used. Of the bypasses performed, 69% were to the below knee popliteal and remainder were to the proximal tibials (68% of the patients had a venous conduit). At 30 days in EV vs BP, major adverse cardiovascular events were 3% and 8% (P = .24), major adverse limb events were 25% and 11% (P = .01), and the amputation rate was 8% and 8% (P = .96), respectively. Amputation-free survival was 33% ± 9% and 56% ± 8% (P = .02) and freedom from major adverse limb event was 19% ± 8% and 46% ± 7% (P = .04) at 3 years for EV vs BP, respectively. In a high-risk cohort when thrombolysis is excluded, BP is superior to EV after failure of a femoropopliteal bypass. |
Council officials wrote to David claiming the skull and crossbones breached rules curbing adverts - and warned if he did not remove it in a week it would be "very likely to attract removal and/or prosecution.
BLADE & ROSE SKULL & CROSSBONES TIGHTS KEEP toddlers snuggly and spooky in these combed cotton, nylon and spandex-mix tights, which feature a smiley skull and crossbones on the knees and feet and have anti-slip grips for tiny terrors learning to walk.
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. |
On the go and no time to finish that story right now? Your News is the place for you to save content to read later from any device. Register with us and content you save will appear here so you can access them to read later.
Almost $150,000 pledged in a week to fund a review of killer’s management
When Antonio Gotingco decided to ask the New Zealand public to help fund a private review of the management of his wife Blessie's killer, he never imagined that a week later, almost $150,000 would be donated.
Last Friday night, Mr Gotingco launched a Givealittle page to fund an independent review of the "mismanagement and non-monitoring of evil" that his family say enabled the rape and murder of Mrs Gotingco in May 2014.
If the review shows they have legal grounds, the family will file a civil case against Corrections for Mrs Gotingco's wrongful death.
On May 24, 2014, Mrs Gotingco was on her way home from work and walking from a bus stop on Birkdale Rd to her home 700m away when Tony Douglas Robertson ran her down in his car.
He threw the injured woman into his vehicle, drove her to his nearby home, raped her and stabbed her to death. He dumped her body at the Birkenhead Cemetery.
Robertson had been released from jail five months earlier, after serving time for abducting and indecently assaulting a young girl. He was subject to an extended supervision order, which included 24-hour GPS tracking.
The case sparked an independent government inquiry of the Department of Corrections' management of Robertson both before and after his release from prison.
The inquiry report, released last week, made 27 recommendations for improving the management of high-risk offenders such as Robertson.
But it concluded that only Robertson could be held responsible for Mrs Gotingco's death.
Mr Gotingco said the report was insulting and Corrections had "blood on their hands".
Ms Money said the Gotingco family had been reduced to tears at times as they read messages posted on the Givealittle page.
One woman donated $250 and wrote: "This is for Blessie. Thank you for fighting injustice and incompetence."
Another donor said: "We offer you all our support in changing the way these perpetrators are dealt with, making each and every one of us safer in our communities. What happened to Blessie was totally avoidable without a doubt." |
So the final model of the Carbon Pollution Reduction Scheme — Australia cap-and-trade system — has been released. It’s byline is ‘Australia’s ever-so-slightly-maybe Lower Pollution Future‘. Sorry, now I’m just being cynical.
There’s been plenty written about it over the subsequent 24 hours, including some comments from me here, here, here and here. I also hammered some points out in a few radio slots yesterday, but I’m not sure if the message is really getting through. A bunch of short but incisive comments from other scientists and economists is also available at the Australian Science Media Centre. They’re worth reading for (i) the diversity of issues raised and (ii) for the near unanimity of criticism of the targets and general model set forth.
The final scheme clearly rewards big polluters by handing them a swag of free permits, right up to 2020. The poor hard-done-by coal-fired power generators get the majority of these; $4 billion in the first 5 years alone — naturally (I’ll let you go figure that one out). It rightly provides significant compensation to low and middle income households, but sadly directs ~3% of the income generated into research and development on low-carbon energy technologies and energy efficiency. It sets a reduction target of 5% of 2000 levels by 2020, unless ‘all the major emitters come on board’, in which case the government says they’ll increase the cuts to 15%. In other words, Australia is only willing to move with the pack (actually, somewhere in the middle of the pack – you know, for extra safety). Global leaders? Forget it.
But in my opinion, the biggest problem is the sheer dishonesty about the science. If targets greater than 5% are impossible to implement on political grounds, then that’s the current reality. The government should be honest about this, and say:
‘This is as large a cut as we feel the community will accept, even though the science of climate change clearly show that we require much more. Accepting this current reality, our job, as government, is to now better inform you, the general public, of the seriousness of this issue, the short time frames for action, and the need for deeper cuts“.
But no. Instead we get artful political spin and greenwash, with the claim that Australia is doing something meaningful to avoid dangerous climate change and that the targets will miraculously allow us to go no higher than 450 ppm CO2. As the calculations in the Garnaut Review pointed out, this is simply false. It’s a shame the government has chosen to ignore a large swathe of the recommendations of that review, modest as they were.
I’ve opined on this further in a little piece I wrote for the Adelaide Advertiser. I’m not sure it if will end up appearing in the paper or not, but at least BNC readers can get to look at it.
With the Poznan climate conference now over, the Australian Government has announced its aim to cut greenhouse gas emission by up to 14% compared to 1990 levels by the year 2020 and 60% by 2050.
This is the centrepiece of the Carbon Pollution Reduction Scheme, which is another name for a cap-and-trade system for limiting Australia’s future carbon emissions, from 2010 onwards.
In many respects 14% seems sensible. After all, it represents a 41% reduction on a per person basis. It’s in line with goals set by other developed nations such as the UK, US and European Union.
Such a target seems to walk the political middle ground.
Not too steep a cut as to anger industry who are concerned about the economic risks of action. But enough to show Australia’s doing our part in reducing the impact of climate change. Enough to avoid 2 degrees Celsius of global warming, by limiting carbon dioxide to 450 parts per million (ppm).
That, at least, is the simple political message that is being sold. Trouble is, it’s simply not true.
First, it misrepresents what the Intergovernmental Panel on Climate Change (IPCC) said in its Fourth Assessment Report in 2007. This work shows that to have a decent chance of avoiding warming 2 to 2.4C, the world must cut emissions by up to 80% by 2050. That’s a 98% cut for Australia, per person.
Second, it pretends that more recent relevant science doesn’t exist.
Work published in 2007 and 2008–after the IPCC closed its review books–shows that global carbon emissions growth is greater than had been previously anticipated. To add despair to this despondency, recent observations also indicate that the climate system is more sensitive to additional greenhouse gases than we’d suspected.
This means 450 ppm is could commit us to 4C or more of warming. A dangerous prospect indeed, which risks appallingly severe impacts which were described in the Garnaut review earlier this year, on the economic and environmental costs of action (or inaction) on climate change.
Now even getting to a 41% per capita emissions reduction by 2020 will be tough. Really tough.
It will require strong policy intervention to increase the adoption of energy efficiency and conservation and build-out renewable energy such as wind, solar, wave and geothermal on a massive scale. No new coal fired power stations that do not capture the carbon dioxide. And so on.
Given this requirement for transformational change to even match middle-of-the road targets, why not commit to going ‘all the way’? Actually fully solve the crisis before it happens, rather than merely half-fixing it, with adjustment pain anyway, and yet only delay the inevitable crunch.
But such full commitment would mean decision makers have to stop pretending that their emissions reduction targets match the latest scientific evidence. Right now, they don’t. So if nothing else, let’s at least be honest with the Australian public about that.
Like this:
Related
51 Comments
I suppose most sensible people will be happy with the upper-end emissions reduction targets outlined today by the Australian Government in the Carbon Pollution Reduction Scheme (CPRS) white paper – a 14% reduction by 2020 compared to 1990 levels, which equates to a per capita drop of 41%. These are ambitious and deeply challenging goals, and equal to or better than the per capita targets proposed by other developed nations such as the EU, UK and US. Australia’s 2050 target of 60% is unmoved from past policy, but it is the short-term targets that matter right now.
To achieve these sort of cuts, there will need to be nothing short of a revolution in the way we generate and conserve energy – sharply turning around, in a mere 12 years, decades of rampant growth in carbon emissions and energy supply from fossil fuel industries. Whether the CPRS plan is sufficiently revolutionary and robust to realise this goal, even in combination with the Mandatory Renewable Energy Target (MRET), is a matter that will be debated thoroughly over the next year.
But of course there is a rather large elephant in the room that every political decision makers is still pretending isn’t there. It’s an African bull elephant that’s already breaking chairs in the sitting room and is about to burst into the dining area and start smashing all the crockery with increasing rage.
That’s the scientific reality of the physics, chemistry and biology of climate change and climate feedbacks, a process which cares nothing for these bold ambitions or how hard we might be trying.
The laws of nature cannot be bargained away and they do not compromise. So we either muster a rouseabout team, lasso the elephant, and drag it from the house, or we attempt to placate it, in the vain expectation that we may be able to rescue a few pieces of our finest porcelain. Our only hope is to do the former, but it seems we’re resigned to accept that only the latter is possible.
Put more directly, the 14% cut in our total emissions by 2020 announced today is such a pitifully inadequate attempt to stop dangerous climate change that we may as well wave the white flag now.
That’s because such a goal – even if fully achieved (and it will take some mighty effort) – will still commit to global temperature rises of 3 or more degrees Celsius, setting in motion a slew of climate feedbacks that take the planet to a state unfit for humanity for all future generations, and for most species.
The science tells us we need at least 40% by 2020, 90% by 2030 and zero emissions as soon as possible thereafter; with the real aim of restoring CO2 levels to what they were in the early 1950s.
The CPRS targets will not achieve 450 ppm CO2, as the government hopes, and even 450 ppm has a little chance of avoiding 2C warming, will not restore the polar ice, and will not stop sea level rise.
It’s going to take a truly revolutionary set of policies and strong political will to rapidly wean ourselves off carbon-based energy. Yet from both a fossil-fuel supply (peak oil, gas and coal) and a climate perspective, this is exactly what must be done. Even to achieve the cuts announced by the government today, we must implement radical improvements in our energy efficiency and develop a whole new infrastructure of energy supply.
So one has to ask the obvious question – why not commit to going ‘all the way’ and actually solve the crisis before it has time to happen, rather than merely half-solve it, such that the best we can do is delay the inevitable crunch?
The 4th and 5th paras (how the govt should have phrased it to be honest about the science) are absolutely spot on.
In the blog piece (#1) Personally I think it took you too long to say “the 14% cut in our total emissions by 2020 announced today is such a pitifully inadequate attempt to stop dangerous climate change that we may as well wave the white flag now.”
as many people will just read “I suppose most sensible people will be happy with the upper-end emissions reduction targets outlined today by the Australian Government in the Carbon Pollution Reduction Scheme (CPRS) white paper – a 14% reduction by 2020 compared to 1990 levels, which equates to a per capita drop of 41%. These are ambitious and deeply challenging goals, and equal to or better than the per capita targets proposed by other developed nations such as the EU, UK and US. ” and think the CPRS will save the day.
(plus the media is 5% and 15%, the 14% will just confuse people).
Personally I feel like I’ve just found my gal in bed with my worst enemy, having defended her for about a year despite all my mates telling me she could not be trusted.
I feel let down by this Government that promised so much while in opposition. Fool me once ….
This was a huge opportunity to drive the restructuring of our economy. I feel so bloody angry that we (taxpayers and customers) will be paying compensation to power generators who have known since 1992 that a price would be being set on carbon.
Anyway, should I believe that Obama will be driving the brave new world in appointing Steven Chu as Energy Secretary and tasking him with finding alternatives to fossil fuel?!
Barry, I agree with all of the criticisms you heap on the targets proposed by the Rudd government.
Amongst the most misleading statements in the White Paper are the references to 450 ppm, when the emissions reductions of 5-15% are consistent with stabilising at 510-550 ppm according to the six senarios set out in the White Paper itself (see the CPRS-5 and CPRS-15 scenarios stated on page 4-11). That’s consistent with accepting a 2.5 to 3C rise in mean global temperatures and the hoast of severe impacts that will be associated with those temperature rises.
There are some useful ways to reduce forcings and buy time in the
face of global inaction over CO2. Black carbon from cooking fires
is currently a major killer … about 400,000 people per year, so action on
solar cookers and the like is a major win-win advance.
The authors point to other short term forcings still to be
investigated and I’d be sure that agricultural emissions will
also prove fertile ground. Hansen called for 40% reduction in
methane to buy time back in 2004 — using an estimate from Shindell.
I was just poring over the global emissions figures today. It’s hard to believe, but at the projected 3% growth rate Garnaut comes up with in his reference scenario, global emissions will be ~75% higher in 2020 compared to 2000. So even a 5% cut, compared to a 75% rise, would be a mammoth effort for the world as a whole. If we started in 2010 that would require cuts of about 2.5% per year, every year, for the decade 2010-2020. Just to claw back that 5% cut.
Pretty grim.
And the biggest problem is, the climate science tells us that’s not enough by a long shot.
Of course Australia’s problem is that its per capita emissions are about 5 times greater than the global average. So even though our projected reference case growth rate is lower than the world as a whole, a 5% cut for us still puts us so far above the world average on per capita terms it just isn’t funny.
CPRS Vol 1, says that agriculture’s inclusion in the scheme is only “desirable” and that deforestation is definitely out.
In relation to deforestation, I note the curious statement (p.6-61) “Clearing is also undertaken to provide fodder in times of drought.”
A little digging into Dept of Climate Change documentation tells me that “fodder harvesting” allows broadscale clearing with a chain. This doesn’t sound like fodder harvesting to me, it sounds like land clearing. Being allowed to do it during a drought means you only
ever have to wait a couple of years to be able to clear whatever you want and call it “fodder harvesting”. Or am I missing something?
The bottom line seems to be that Queenland beef effectively owns the Rudd Government.
MattB @14, do you know if RECs granted vary by insolation? For example, will someone putting 1.5kW on their roof in Alice Springs receive the same RECs as someone doing the same thing on their house in Hobart? I know with solar hot water the differential is substantial, does the same apply to photovoltaics?
Mark all I have is form the greens website press release… so it may not be 100% accurate… it did see somewhere some reference to a “Melbourne” situation so yes I think it is dependent on location. I should have paid more attention when I (regretfully) sold my RECS but my read is it is the same method of valuing a REC as at present… but I don’t know the full details sorry. but my feeling is that it will be $7500 approx based on the market value of a REC, which may go up or down (they do at present).
another quirk is that you used to get the $8k on a 1kv system, but now the $7500 is for a 1.5kv system… so your out of pocket expenses are about 2-3k more on a 1kv system… unless of course the $8k used to artificially inflate the price of solar cells but I guess only time will tell on that.
I’ll try and find an accurate answer to the question though it would be useful to know.
Here is an interesting article by Fred Pearce on the wash out from the Poznan meeting, which gels well with what I’ve said above – except the same applies internationally as it does to Oz. To quote on relevant snippet:
The small band of scientists at the event said politicians still didn’t get the seriousness of the problem.
Minister after minister claimed that the UN’s Intergovernmental Panel on Climate Change had said dangerous climate change can be stopped by preventing average global temperatures from rising by 2 °C, and that this can be done by reducing CO2 emissions by 50% by 2050. Neither statement is true, said Ciais.
“We need an 80% cut by 2050, and that would only give a 70% chance of avoiding [a 2 °C rise],” said Martin Parry, co-chair of the last IPCC report on the impacts of climate change.
I am new to this great blog, so maybe I repeat somebody, but there is relatively new PNAS study by Ramanathan and Feng (2008) on “committed” global warming, that says we are committed to even more warming, than is usually anticipated e.g. by IPCC. The abstract of the study is here: http://www.pnas.org/content/105/38/14245.short (Subs. req.)
The system just announced in Australia has all the hallmarks of an elaborate and complicated farce that will reward the biggest polluters and encourage them to continue based on the belief that governments will never act strongly against them.
(Barry asked me to post this here after emailing it to some colleagues):
Reneweable energy now to be counted 6 times
Today, and this week, our worst nightmares are coming true. We have a 5% target by 2020 that locks in Australia’s contribution to un-adaptable climate change and the emissions trading system by its mechanism, destroy’s the effectiveness of any voluntary action as well. The only offset that could work under the CPRS WhitePaper is to buy permits and throw them in the bin, but because they are over allocated this won’t work either (just like cap, trade and voluntary action work for the River Murray when the system is grossly over allocated).
The Government has now released its Renewable Energy Target Bill and continues a design that consumes all household system efforts as part of the National mandatory target and amazingly, The Australian Government intends to expand a system that double counts renewable energy increase to one that counts 1 MWh of renewable energy six times over. Thats right! – renewable energy from household systems will be counted 6 times over.
The first and only legal count under the NGERS legislation is that the renewable energy goes to the grid (at small scale this is claimed by the householder that is hard wired to the system). The Renewable Energy Certificates created from such systems do not legally include aspects of use, renewableness or reduced emissions, yet when sold or unwittingly signed accross to system providers, these can be turned into GreenPower products and sold to voluntary customers that believe they are reducing emissions, or be purchased by liable wholesalers and retailers to meet their legal obligations. So when 1 REC was created per deemed MWh of energy generation it typically led to created a double count. This was bad enough (and the Federal Government Officials fully understand this accounting flaw), but to now make things worse by multiplying the REC by 5 times, there is with another massive fraud looming with 1 + 5 counts of renewable energy use and reduced emissions from a single deemed (not measured) MWh.
The Federal Government should be cleaning up their greenhouse accounting systems, not making things worse. If 1 REC is defined under legislation as being equal to 1 MWh of renewable energy from a renewable energy source, how can this REC be multiplied by 5 with no additional generation? This is nothing less than fraud in a Bill put before Parliament.
A rebate system like the $8000 Household Solar Rebate could ensure that the renewable energy use and reduced emissions stay with the householder. A RECs trade and payment system however, without propper disclosure, steals or double counts the very properties that the householder has been seeking. The RECs trade approach uses the RECs towards the National RET target displacing other renewables already required. The approach to providing household and small scale incentives with RECs creates zero additional renewable energy above that which s already required by law. Furthermore, this approach undermines any hope of GreenPower being reformed to become meaningful. It creates a sham.
Because the 5% National Greenhouse Reduction Target will take us no where, we need voluntary mechanisms to continue and to have integrity as well as finding a way to inform society as a whole that 25-40+% reductions by 2020 must be re-instated in advance of negotations in Copenhagen or the sciece suggests that we face a pathway to 3 degrees Celcius plus.
We now have 6 fold counting of 1 MWh as the Government were never held accountable on double counting associated with their frameworks and programs. Voluntary mechanisms that include renewable energy can be made to work along side the CPRS but only with significant reform and and honest accounting practices that are incorporated into the NGERS framework.
What to do now though, that’s the biggie. Vote Greens or some climate-oriented minor party, and your preferences still end up flowing to either Labor or the Libs. You just can’t win. Although someone said something kind of clever to me the other day. “Create havoc at the ballot box” they said, “Make sure each and every election from hereon in you vote for the opposite major party you voted for last time, until we get real action”.
The multiplier of 5 will eventually be reduced to 1 by 2020 (presumably so as not to break an election commitment). There is another problem with the government’s approach:
As foreshadowed in the Design Options Paper released by the COAG Working Group on Climate Change and Water for consultation in July 2008, the treatment of electricity-intensive, trade-exposed industries under the RET scheme is to be considered separately in the context of decisions around the treatment of emissions-intensive, trade-exposed industries under the Carbon Pollution Reduction scheme. The exposure draft Bill includes a note to the effect that contingent on Government decisions on the treatment of electricity-intensive, trade-exposed industries under the RET scheme, provisions to implement these decisions would be included at a later date. The issue will be considered in detail by the COAG Working Group early in 2009 following stakeholder consultations.
How hubris, corruption and greed result in colossal collapse of global economy.
In a world in which too many politicians are posers; too many economists are deluded; too many business powerbrokers with great wealth are con artists, gamblers and cheats; and too many of their absurdly enriched minions/’talking heads’ in the mainstream media parrot whatsoever serves political convenience and economic expediency, Jim Hansen’s truth about climate change is buried amid cascading disinformation and anti-information developed from a `tool box’ of pernicious rhetorical devices.
Having abandoned any meaningful attempt at the arrest of accelerating climate change, it is a good question whether the Australian government would follow the news regarding the accelerating melt rates of Arctic Sea ice, which acts as the Earth’s thermostat, and which has already decreased from 8 to 4 million km2 and is projected to vanish within the next 5 years or so.
Mean temperatures over the Arctic Sea, increased by about 3C and locally by 5C over the last 4 years, compared to the earlier long-term mean, heralds a new climate pattern in the northern hemisphere, including advanced melt of Greenland ice sheet over the next few decades, raising sea levels by several metres.
According to Julienne Stroeve (US National Snow and Ice Data Center) report to the American Geophysical Union, the process affects the temperature gradient between the Arctic and the equator and precipitation patterns. Oceanic currents and atmospheric circulation extend the effects to the Southern Hemisphere, where the western Antarctica Wilkins ice shelf has undergone mid-winter breakdown.
Not that this will cut too much ice with the Australian Government, where not everyone accepts the reality of human-triggered global temperature and sea level rise, currently at 0.35 cm/year, near-double late 20th century rates
A diabolical combination of factors is retarding efforts at controlling escalation of CO2 rise, currently at 2.2 ppm/year, from raising atmospheric energy levels above the 1.6 Watt/m2 already triggered by emission of 305 billion tons of Carbon and by land clearing.
First, despite overwhelming scientific evidence, the counterintuitive nature of global warming and consequent denial relegate dangerous climate change, in the eyes of most, to the realm of science fiction.
It is counterintutive, yet proven, that a rise of atmospheric CO2 by about 100 ppm raises mean global temeprature by at least 1 degrees Celsius, plus another 1 to 2 degrees C due to carbon cycle and ice melt feedbacks, pushing the atmosphere to conditions of 3 million years ago (mid-Pliocene) when sea levels rose by 25 metres. It is equally counterintutive, yet demonstrated, that a rise of atmospheric CO2 by several hundred ppm has resulted in a mass extinction about 55 million years ago.
Second, the powerful effect of vested interests, the fossil fuel companies, exert decisive influence on governments of all political shades, whether Howard’s conservatives or the one described by Paul Kelly as the “green Howard”, stating “Rudd’s emission policy is a work of political genius that would make John Howard proud” (The Australian, 17.12.08).
In succeeding to achieve an almost perfect balance between political, social and economic forces, Rudd ovelooks the most decisive factor, namely, the increasingly dangerous atmospheric processes can hardly be expected to play ball with the government’s policies (wouldn’t it be nice if they did?).
By most accounts the government is no longer listening to climate science, as communicated by leading international scientists and science organizations.
But if the first duty of governments is to protect the people, including the young and future generations, that they don’t get it, or have sold out to vested interests, will not be an excuse when it is too late to attempt to control the worst consequences of their inaction.
Andrew @ 29
In your last two paragraphs you eloquently expressed my despair, and I am sure, that of all the other members of climate change action groups around the World.
We must not let this defeat us – even if it means civil disobedience.Planning is in hand for a protest at Parliament House in Feb 2009. Climate change groups from around Australia are co-ordinating free buses and billeting for participants from Melbourne and Sydney. I urge you all to attend if you possibly can.
Hmmm, Perps, I’m not at all sure that Gandhi would agree with you. Remember he was operating in a milieu that was far from democratic.
Can you ever be sure that you are justified in breaking laws enacted on the basis of the will of the majority of the people? At what point can you decide that that is preferable to trying to change that will? The trouble with the former is the high probability that it will get you further away from achieving the latter.
I respect and admire Gandhi as much as anyone in what he achieved (and how he did it) for the people of India … and for that matter, Pakistan. However, I agree with Mark above.
In advocating civil disobedience, what laws do you see being broken? Indeed, some of the ‘laws’ you would be campaigning against have not even been passed or enacted yet.
Both you and I know global warming is real and humanity has been complicit in its severity (notwithstanding you have previously pigeon-holed me in the ‘denialist’ camp). Nevertheless, adapting to climate change, and mitigating against GHG emissions, rests in the hands of politicians and economists.
Don’t get me wrong, a ground swell of action and support from us mere mortals is important, but it has to be predicated on a rational and coordinated plan. I am sure Barry would have much more to say on this and he may do so, if not now then certainly during the summit.
Notwithstanding, Rudd is a very astute politician – it makes no sense to antagonise the very people/groups (AGW agnostics, deniers, people who just don’t know or who are just afraid of the consequences, etc) you are trying to get to walk the walk with you. Of course he has to take a “measured” response, particularly in the lead-up to Copenhagen.
We (the world) can look forward to the day when the Obama Administration comes into office with its proactive policies on climate change, science and technology (Chu, Holdren and Lubchenco appointments are a great start). Indeed, it would not surprise me if China and India comes on board soon after – time will tell.
In the mean time (and I do empathise with Garnaut) a political strategy is required that would put pressure on the coalition to lay their cards on the table.
I have much respect for the Greens (the light ones anyway) and hopefully they can have more say in the Senate. However, at the end of the day, it will be either a Labor or Liberal/National government … I know which would have better climate change policies.
One can only hope that after 2012, the world’s governments will be more willing to make meaningful emission reductions, to the levels expected by you, Rudd and Garnaut alike. Cheers.
Mark and David – I think you perhaps misunderstand what I am talking about with regard to PASSIVE civil disobedience. I am in agreement with you in many ways. I have no wish to see violent confrontation, however when the ballot box fails what recourse do we have. The swing towards the Labor Party (I am a lifelong supporter) last election was mainly due to the hope most people had that Rudd and his party would act seriously on climate change. This was particularly pronounced among young people I spoke to on the matter. Today’s “Age” has an article which claims 8 out of 10 people believe climate change is real and they want urgent action to address it. The despair I hear around me is because they have let down the people on this issue.There is a sense of impotence on the issue.
Do you recall, a few years back, when Howard’s government (and the dreadful Peter Reith) tried to break the wharfies by allowing masked men with dogs onto the dock to get the scab labour in? Thousands of ordinary Melburnians of all ages, including retirees and young mothers with children flocked to the docks and sat down in peaceful protest in support of the wharfies. It worked!
History, if you care to look, is full of similar actions.
In England, at least, how do you think women finally got the vote? They had to protest against their elected government in a non-violent way. Unfortunately, they weren’t dealt with in the same manner by the police and suffered dreadfully, when imprisoned, by force feeding, being released, re-admitted and tortured many times over, causing some deaths.
My own grandfather, a coal miner,was told by his employer, because the price of coal went down meaning smaller profits for the owner, that the men would have their meagre wages cut. He joined in a peaceful protest with his fellow unionists and was severely beaten, as were many of his workfellows. When they were supported by the womenfolk, the children and many other local people in day after day of peaceful protest, the owners were shamed before the nation and the wages restored.
Even gaining the right to join a union was hard won by courageous people putting their physical well-being on the line so future generations would have access to better working conditions and education.
My generation did not have to suffer the World Wars, but we did have the guts to march in thousands, through the cities of Australia, to demand an end to the Vietnam War. This was against an elected government of the time and we not dealt kindly with by the police.
Many of the pleasant conditions we work and live with today have only been achieved by a show of disobedience by the people and we should thank our forebears for it.
Now we, because of global warming, are facing the greatest threat imaginable to peace, health and life itself yet you are not willing to do as much for this and future generations did for us. Shame on you!
Specifically to DavidK @ 37
Rudd may be astute but that won’t get the job done – I agree with what Barry has said in other blogs, that it would be better to do nothing than to pretend to be doing something, which is worse than useless.
What sort of signal does it give to the world to hang back and “wait for Obama” – we are frightened followers not confident leaders. What wasted opportunities for technological advances in alternative power – but that is Australia for you – that is why our good ideas get taken on by other more farsighted individuals overseas, when finance for projects can’t be raised at home.
Of course I know the Lib/Nats would be worse – the dilemma for change at the ballot box is that we did change the government but still didn’t get the result we wanted. So what do we do then – wait for what? A change back to the last lot? I hope, like you, that the world’s goverments will make the necessary changes in 2012 in Copenhagen but unless we protest vigorously in Australia, and try to get our Government to do what they were elected to do, how can we expect others to take the lead?
I must be reading you wrong. In your @30 post, you only mentioned civil disobedience and @34 gave a wiki link wherein law breaking is implicit. You made no reference to passive civil disobedience until @38.
Yep, I marched the streets of Sydney in protest against the Vietnam war (my mate was killed – he was ‘called up’). Would I have been a ‘conscientious objector’ and broke the law? Probably, but I will never know – I wasn’t called up.
I will be in Canberra, again protesting and walking the walk – but I can tell you now, I will not be partaking in civil disobedience – passive or aggressive – particularly since the laws I am concerned about have not been enacted. If and when they are, I may change my mind to “passive” civil disobedience.
But and until such time, I don’t want to inflame the ‘climate change onlookers’ (we need them) and turn them away from what I see as a very ‘soft’ approach to what Australia could do now, but must do much more post Copenhagen 2009.
DavidK
Sorry if I gave you the wrong impression by my use of the words “civil disobedience”- that is how it was put to me by the police at the time.
I think we are basically singing from the same songbook:)
As it is not against the law to protest peacefully that is what I will be doing. However, I think it becomes classed as breaking the law, and thus “civil disobedience”, if you refuse to move on when asked by the police and, as I will have to be physically moved, then I suppose I will be engaged in “passive civil disobedience” again.
Anyway, to everyone on the blog- have a very Merry Christmas and let us hope for a happy, carbon reduced, New Year :)
Hank, I really hoped that a new administration would be able to get this sort of thing under control but as your comment puts it so perfectly: Sigh.
Our government over in the UK hasn’t done very well. Setting lofty target to be the best in the EU then planning to build yet another terminal at Heathrow. I did read once that carbon emitted so high in the atmosphere isn’t as bad but this can’t be true can it? I would have thought that dumping it that high up immediately increases the greenhouse effect. Would love to know…
CO2 in the upper troposphere has roughly 3 times the climate forcing effect of CO2 at ground level — so, tonne for tonne, aircraft CO2 emissions are much worse for climate change than (say) automobile emissions. |
After authentication in order
to protect message security,
Alice and Bob will need to establish
a shared secret key for each session.
This can be accomplished
in several ways.
Supposed Alice and
Bob share a master secret key.
Then Alice can use this master
secret to encrypt a new key and
send the encrypted new key to Bob.
Or Alice and Bob can also use
public keys to encrypt a new key.
We say that Alice and
Bob should establish a shared key for
each new session.
This is true even if Alice and
Bob already has a shared secret key.
Typically, Alice and
Bob share a long term secret key.
And we call it the master key.
For example, the master key can
be derived from a password.
For each session, Alice and
Bob would use the master secret key
to authenticate and
establish a new key for the session.
Then all messages in the session
are protected using the session key.
The main benefit of using session
key is that if the key is leaked or
broken, the impact is limited
only to the current session.
Intuitively, the more a secret is used,
the higher a chance that
the secret can be leaked.
Therefore, we should limit the use
of the long term master secret.
And only use it at the beginning of
a session for authentication and
establishing the session key.
Here's an example.
Suppose Alice and
Bob already share a master key, Kab.
The first three steps are just for
Alice to authenticate Bob,
say Bob is a server.
Then, both Bob and
Alice computer save session key
that is based on the sheer master key
and something about the current session.
So that the session key is both
a secret and unique to the session.
So for example,
they can add 100 to the master key and
use the result as the key to encrypt
all which is a challenge used
in this session to authenticate Alice
to Bob, and the result of encrypting R
using a modified master key
is the shared session key.
Alice and Bob can also use their public
keys to exchange a shared session key.
For example, Alice can send to
Bob a key, encrypt it using Bob's
public key so that only Bob
can decrypt and get the key.
And then signs the result
using Alice's private key.
So Bob knows that the key
is sent by Alice.
Or Alice and Bob can use their
private keys to sign the public
messages that they exchange in the
Diffie-Hellman key exchange protocol.
And this can prevent the man
in the middle attack,
that is when Alice sends Bob
the public message, she signs it.
Likewise when Bob sends
Alice the public message,
he signs it with his private key.
|
Q:
SQL Query Date search using Between
I just run this query
Select *
from ProjectData
where logtime between '2012-09-25 12:00:00.000' and '2012-09-25 12:59:59.999'
order by LogTime
in an attempt to find the all record for 12 hour, We have record every second, so I was expecting 3600 record but to my surprise I got 3601 record and the last record time was
2012-09-25 13:00:00.000
Any idea why this record is picked? Even if Between includes the given values this value is above the condition. I am using SQL Server 2012 Express edition.
A:
Try to use DATETIME2 datatype for logtime column -
Query:
DECLARE @temp TABLE (logtime DATETIME2)
INSERT INTO @temp (logtime)
VALUES
('20120925 12:00:00.000'),
('20120925 12:59:59.999'),
('20120925 13:00:00.000')
SELECT *
FROM @temp
WHERE logtime BETWEEN '2012-09-25 12:00:00.000' AND '2012-09-25 12:59:59.999'
ORDER BY logtime
Output:
logtime
---------------------------
2012-09-25 12:00:00.0000000
2012-09-25 12:59:59.9990000
DATETIME vs DATETIME2:
SELECT name, [precision]
FROM sys.types
WHERE name IN ('datetime', 'datetime2')
Output:
name precision
----------- ---------
datetime2 27
datetime 23
A:
You have taken Datetime as datatype and it has property of getting rounded.
Datetime values are rounded to increments of .000, .003, or .007 seconds. Details here
Eg:
SQL Fiddle
MS SQL Server 2012 Schema Setup:
Query 1:
Declare @testtime datetime = '2012-09-25 12:59:59.999'
select @testtime
Results:
| COLUMN_0 |
------------------------------------
| September, 25 2012 13:00:00+0000 |
|
INDIANAPOLIS (AP) - The Indianapolis Colts got an inspirational visit from ailing coach Chuck Pagano on Friday, two days before a game at New England.
Pagano ``broke his team down'' during practice, interim coach Bruce Arians said. ``It was a beautiful moment ... He came and enjoyed a good bunch of sunshine and talked to the guys and it was another beautiful day.''
Dozens of Indianapolis players have shaved their heads in a show of support for Pagano, who is undergoing treatment for a form of leukemia. Orange, a color used to raise awareness of the disease, is everywhere at the Colts' complex and Chuckstrong has become a common catchphrase.
Earlier this month, Pagano's physician said the coach was in ``complete remission,'' but still faced two more rounds of chemotherapy. The Colts hope to have Pagano back on the sideline Dec. 30, Indy's regular season finale against Houston.
``It caught everybody by surprise,'' he said. ``That was a great finishing to a great day of practice. Like I said, whenever he is able to address the team, give us a little words of wisdom, it's always a great feeling.''
The Colts (6-3) have been one of the big surprises this season, with rookie quarterback Andrew Luck making the transition with relative ease so far. The team has rallied around Pagano, and Arians was asked if the Colts can get through the season running on emotion.
``No, I don't think emotion but I think they can with purpose, purpose being that they're not going to let each other down for one common goal,'' he said. `` I've seen it so many times where a group of guys band together, and different slogans, `Won't be denied', this or that or whatever, they all come up with something, this is just `1-2-3-Chuck.'''
Arians noted that Pagano passed out links of a chain to every player in the first week of the season and the message has taken hold: ``Don't be the weak link. It's kind of a common thread throughout everything.''
Also Friday, the Colts elevated cornerback Teddy Williams from the practice squad to the active roster, waiving cornerback Marshay Green in favor of a guy who didn't play college football.
Williams was a track and field standout at Texas-San Antonio and an undrafted free agent in 2010. He spent last season on the Cowboys' practice squad before he was waived in August. Williams, who ran the 100 meters in 9.9 seconds in college, was signed to the Colts practice squad on Oct. 30.
Tight end Coby Fleener and cornerback Vontae Davis will not play against the Patriots (6-3) on Sunday. |
Sequence Search
Batch Search
This transcriptional activator recognizes and binds to the sequence 5'-RTTAYGTAAY-3' found in the promoter of genes such as albumin, CYP2A4 and CYP2A5. It is not essential for circadian rhythm generation, but modulates important clock output genes. May be a direct target for regulation by the circadian pacemaker component clock. May affect circadian period and sleep regulation.
The protein encoded by this gene is a member of the PAR bZIP transcription factor family and binds to specific sequences in the promoters of several genes, such as albumin, CYP2A4, and CYP2A5. The encoded protein can bind DNA as a homo- or heterodimer and is involved in the regulation of some circadian rhythm genes. [provided by RefSeq, Jul 2014] |
Establishment of new and replacement World Health Organization International Biological Standards for human interferon alpha and omega.
The complexity of the human interferon-alpha (IFN-alpha) family, with its multiple molecular forms and various biological activities, raises a number of scientific issues with regard to the biological standardisation of natural and recombinant IFN-alpha products. To address such issues and to achieve an appropriate biological standardisation of human interferon-alpha (IFN-alpha) preparations, the National Institute for Biological Standards and Control (NIBSC) of the United Kingdom (UK), in association with the Centre for Biologics Evaluation and Research (CBER) of the United States of America (USA), organised an international collaborative study, which was subsequently divided into two parts. Ninety-three participating laboratories from 29 countries worldwide participated in the first part of the study. They performed titrations on up to 15 different IFN-alpha preparations and one IFN-omega (omega) preparation in a variety of assays, including those based upon antiviral, antiproliferative, and other biological activities of IFN, and contributed raw data from these assays to NIBSC for analysis and calculation of relative activities. Analysis of data from this part of the study showed a greater than expected assay-dependent disparity between the relative activities of different IFN-alpha preparations. This disparity was found when only antiviral assays were considered and even when there were only small molecular dissimilarities between two otherwise closely related IFN-alpha preparations. The lack of assay independence and relative activity equivalence has indicated that a single biological potency standard for all IFN-alpha subtypes and mixtures would be inappropriate. Hence, individual, homologous standards, each with a separate unitage, were required for biological standardisation and potency determinations of individual IFN-alpha subtypes. At this stage, potency assignments to the IFN-alpha and -omega preparations included in the study were made as far as possible on the basis of comparison of antiviral activity with that of the 1st International Reference Preparation (IRP) for IFN, human leukocyte, 69/19. However, it was recognised that other standards had been used in assays to estimate potencies of widely available, current, therapeutic IFN-alpha products. Thus, to ensure the continuity of unitages already in use for IFN-alpha products, the second part of the study, which involved 12 members of the International Federation of Pharmaceutical Manufacturers Association (IFPMA), was carried out using for calibration of antiviral assays those IFN-alpha preparations that most closely matched manufacturers' products or that had been previously used for assay calibration by a manufacturer for a particular product. On the basis of data analysis from the second part of the study, potency assignments to the IFN-alpha preparations, as made in the first part of the study, were either left unchanged or changed to potency assignments that ensured as far as possible continuity with existing unitages. From among the IFN preparations evaluated, the following were recommended as the most suitable to continue or replace existing WHO international standards (IS) and have subsequently been formally established as WHO IS at the 51st meeting (October 1999) of the WHO ECBS: 83/514, 1st WHO IS for human IFN-alpha1 8000 international units (IU); 95/650, 2nd WHO IS for human IFN-alpha2a, 63,000 IU; 95/566, 2nd WHO IS for human IFN-alpha2b, 70,000 IU; 95/580, 1st WHO IS for human IFN-alpha2c, 40,000 IU; 95/572, 1st WHO IS for human IFN-alpha1/8, 27,000 IU; 94/786, 1st WHO IS for human IFN-alphaCon1, 100,000 IU; 94/784, 2nd WHO IS for human IFN-alpha (leukocyte), 11,000 IU; 95/574, 1st WHO IS for human IFN-alpha (leukocyte n3), 60,000 IU; 95/568, 2nd WHO IS for human IFN-alpha (lymphoblastoid n1), 38,000 IU; 94/754, 1st WHO IS for human IFN-omega, 20,000 IU. These WHO IS are available upon request to NIBSC. |
Cordillera Oriental (Bolivia)
The Cordillera Oriental or Eastern Cordillera is a set of parallel mountain ranges of the Bolivian Andes, emplaced on the eastern and north eastern margin of the Andes. Large parts of Cordillera Oriental are forested and humid areas rich in agricultural and livestock products. Geologically, the Cordillera Oriental is formed by the Central Andean fold and thrust belt.
The Bolivian tin belt lies in the cordillera.
Division
The cordillera can be divided into three sections in Bolivia and one in northwestern Argentina:
The northern section is a continuous mountain range like Eslabón, San Buenaventura, Muchane, Pilón, etc. and between its important summits you can find Astalaya and Cerro Colorado.
The central section was formed entirely by the Cochabamba mountain range, this section crossing the department of Cochabamba forms the Yungas and the Chapare. Its major summits include Tunari at approximately 5,200 meters and San Benito with 4,298 meters. It extends from the department of Santa Cruz, forming the isolated mountain ranges like Mataracu, San Rafael, Las Juntas, Los Volcanes, these all ending in Amboró National Park.
The southern section starts north of Chuquisaca with the Presto mountain range and ending in the Caiza and Capirenda mountain ranges in Gran Chaco province in the department of Tarija. The easternmost range of the southern section and the Bolivian Andes is Serranía del Aguaragüe. The southern section does not contain representative summits.
The Cordillera Oriental extends into Argentina, where it is found from north to south in the provinces of Jujuy, Salta and the northern part of Tucumán Province.
See also
Cordillera Central (Bolivia)
Cordillera Occidental (Central Andes)
References
Bibliography
Category:Andes
Category:Mountain ranges of Bolivia
Category:Mountain ranges of Argentina
Category:Geography of Chuquisaca Department
Category:Geography of Cochabamba Department
Category:Geography of Santa Cruz Department (Bolivia)
Category:Geography of Jujuy Province
Category:Geography of Salta Province
Category:Geography of Tucumán Province |
IT Spending and Staffing Benchmarks 2014/2015: IT Budget/Cost Metrics and Other Key Performance Indicators by Industry and Organization Size
Developing and benchmarking, information technology spending or IT employee staffing levels can be a difficult exercise. Our IT Spending and Staffing Benchmarks study makes the job easier by providing hundreds of useful ratios, statistics, and other IT cost metrics for IT budgeting and IT employee headcount analysis. IT spending as a percent of revenue and dozens of other IT budget ratios are documented.
In this annual report, we provide IT budget and staffing metrics by industry sector and organization size for businesses and government organizations in North America, based on our annual in-depth survey of over 200 IT executives, now in its 24th year.
WHO NEEDS THIS STUDY?
For CIOs and consulting firms, this 26-chapter study provides current metrics and unbiased data for you to benchmark your total IT spending and staffing levels. This study will allow you to:
Benchmark your IT operational spending levels by comparing them with those of organizations of similar size and industry sector. Over 20 specific IT cost management ratios and other IT support metrics are provided, such as IT budget as a percent of revenue and IT spending per employee, allowing IT executives to highlight opportunities to reduce IT costs and optimize IT expenses.
For providers of IT products and services, this study provides valuable insights into the current budgeting priorities of IT buyers and changes in levels of IT operational and capital spending. This study provides objective data based on our in-depth survey of IT decision makers. As such, it can be a valuable source of information to validate assumptions underlying your annual business development and sales plans.
PURCHASING OPTIONS
Scroll down to read a detailed description of each chapter. Click on any link to purchase now.
Net Percentage of Organizations Expecting to Spend More Than Budgeted for IT Operations: 2010-2014
Adequacy of the Current IT Operational Budget to Support the Business: All Sectors
IT Budget as Percentage of Revenue at the Median: 2010-2014
IT Operational Budget per User at the Median: 2010-2014
Change from Prior Year in Median IT Operational Budget, by Sector
Percentage of Organizations Changing IT Capital Spending: All Sectors
Median Annual Growth of IT Capital Budgets: 2010-2014
How Actual IT Capital Spending Will Compare to Budget: All Sectors
IT Budget Priorities Ranked by Importance: All Sectors
Percentage of Organizations Changing IT Staff Headcount
Chapter 2, Composite Benchmarks[Buy Now]
This chapter provides composite metrics for all of the organizations surveyed, across all industry sectors and organization sizes. The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 3A, 3B, 3C: Benchmarks by Organization Size
In these three chapters, we analyze each of our I.T. spending and staffing metrics by organization size. This chapter classifies organization size differently than most classification schemes. We use the size of the IT operational budget, as revenue is not always a good indicator of the size of the IT operation. This enables IT organizations to compare themselves against similar-size IT organizations. We define the size categories as follows:
To avoid the problem of having very small organizations in our sample, we have excluded respondents with less than $50 million in annual revenue.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 4: Process Manufacturing Sector Benchmarks[Buy Now]
Chapter 4 provides benchmarks for process manufacturers based on our current-year survey. Process manufacturers are defined as those where the production process adds value by mixing, separating, forming, or chemical reaction. The 25 respondents in this sector include manufacturers of chemicals, semiconductors, pharmaceuticals, food, building materials, packaging materials, and steel, glass and paper products, among other process-manufactured goods. We also provide subsector metrics for food and beverage companies in Chapter 12
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 5: Discrete Manufacturing Sector Benchmarks[Buy Now]
Chapter 5 provides benchmarks for discrete manufacturing organizations across all organization sizes based on our current survey. Discrete manufacturers are defined as those where the production process adds value by fabricating or assembling individual (discrete) unit production. The 23 respondents in this sector include manufacturers of consumer products, industrial equipment, aerospace products, auto parts, building products, electrical parts, biomedical devices, and electronic devices. We also have subsector benchmarks for industrial and automotive manufacturers in Chapter 13. Our subsector chapters provide key metrics based on data gathered over a three-year period.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 6: High-Tech Sector Benchmarks[Buy Now]
Chapter 6 provides benchmarks for high-tech organizations across all organization sizes based on our current survey. The 24 respondents in this section include software developers, biotech firms, medical device companies, computer products manufacturers, aerospace and defense manufacturers, technical service companies, semiconductor manufacturers, and makers of other technology products. We also provide subsector metrics for IT services and solutions in Chapter 22.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 8: Retail and Wholesale Distribution Sector Benchmarks[Buy Now]
Chapter 8 provides benchmarks for retail and wholesale distribution organizations across all organization sizes based on our current survey. The 27 respondents in this sector include broadline and specialty wholesale distributors of industrial and consumer products and brick-and-mortar retail operations, multichannel retailers, and direct-sales manufacturers. We also have subsector metrics for retail in Chapter 18 and wholesale distributors in Chapter 19.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 10: Professional and Technical Sector Benchmarks[Buy Now]
Chapter 10 provides benchmarks for professional and technical services across all organization sizes based on our current survey. The 21 respondents in this sector include firms that provide professional and technical services, including engineering, legal, accounting, consulting, marketing, and research, among other services. We also publish key metrics for the IT services and solutions subsector in Chapter 22.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 11: Public and Non-Profit Sector Benchmarks[Buy Now]
Chapter 11 provides benchmarks for public and nonprofit organizations based on our current survey. The 43 respondents in this sector include city and county governments, regional agencies, state and federal government agencies, state governments, universities and school systems, and nonprofit organizations. We also provide subsector metrics for city and county governments in Chapter 24, for federal, state, and regional government agencies in Chapter 25, and for education in Chapter 26.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 12: Food and Beverage Subsector Metrics[Buy Now]
Chapter 12 provides benchmarks for food and beverage manufacturers across all organization sizes, based on the most recent three years of survey data. The 23 respondents produce beverages, snack foods, meat products, dairy products, dietary supplements, spices, and other consumable food products. Some also distribute products to retail outlets.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 13: Industrial and Automotive Subsector Metrics[Buy Now]
Chapter 13 provides benchmarks for industrial and automotive manufacturers across all organization sizes, based on the most recent three years of survey data. The 36 respondents in this subsector make auto parts, material handling equipment, engines, machinery, and similar capital goods.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 14: Oil and Gas Subsector Metrics[Buy Now]
Chapter 14 provides benchmarks for oil and gas producers, service companies, and midstream distributors across all organization sizes, based on the most recent three years of survey data. The 17 respondents in this subsector include integrated energy companies, upstream exploration and production companies, onshore and offshore field services companies, and pipeline operators.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 15: UtilitiesSubsector Metrics[Buy Now]
Chapter 15 provides benchmarks for utilities across all organization sizes, based on the most recent three years of survey data. The 19 respondents in this subsector include gas and electric utilities, power transmission distributors, pipeline operators, water and power utilities, and telecommunications service providers.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 16: Transportation and Logistics Subsector Metrics[Buy Now]
Chapter 16 provides benchmarks for transportation and logistics services across all organization sizes, based on the most recent three years of survey data. The 23 respondents in this subsector operate buses, trucks, railways, airlines, barges, and ships. The sector includes logistics companies that transport goods and public and private transportation companies that move people.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 17: Construction and Environmental Services Subsector Metrics[Buy Now]
Chapter 17 provides benchmarks for construction and environmental service companies across all organization sizes, based on the most recent three years of survey data. The 22 respondents include engineering companies, commercial, residential, and industrial construction contractors, oil service firms, and firms that specialize in the cleanup, treatment, and disposal of wastewater and hazardous materials.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 18: Retail Subsector Metrics[Buy Now]
Chapter 18 provides benchmarks for retailers based on the most recent three years of survey data. The 32 respondents in this sector include retailers of clothing, pharmaceuticals, electronics, groceries, office supplies, and general merchandise. They include department stores, specialty retailers, big-box retailers, and direct manufacturers. We also include hospitality and consumer services in this sector.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 19: Wholesale Distribution Subsector Metrics[Buy Now]
Chapter 19 provides benchmarks for wholesale distributors based on the most recent three years of survey data. The 34 respondents in this subsector include wholesale distributors of building products, home furnishings, home improvement products, industrial components, electronics, clothing, pharmaceuticals, agricultural products, and food and beverage, among other products.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 20: Commercial Banking Subsector Metrics[Buy Now]
Chapter 20 provides benchmarks for commercial banks based on the most recent three years of survey data. The 17 respondents in this subsector include commercial banks and credit unions. The banks include community, regional, and national banks.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 21: Insurance Subsector Metrics[Buy Now]
Chapter 21 provides benchmarks for insurance companies based on the most recent three years of survey data. The 32 respondents in this sector include providers of life, medical, and property and casualty insurance. The sector includes multiline insurance firms, integrated financial service companies, reinsurers, and specialty insurers.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 22: IT Services and Solutions Subsector Metrics[Buy Now]
Chapter 22 provides IT spending and staffing statistics for the IT services and solutions subsector based on the most recent three years of survey data. There are 26 organizations in this subsector, including software companies, systems integrators, solution providers, BPO firms, and other providers of technology services and solutions.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 25: Government Agency Subsector Metrics[Buy Now]
Chapter 25 provides benchmarks for federal, state, and regional government agencies based on the most recent three years of survey data. There are 19 respondents in this sector, including transportation planning agencies, public health agencies, social service agencies, environmental regulatory agencies, civil service commissions, and other federal, state, and regional government units.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
Chapter 26: Education Subsector Metrics[Buy Now]
Chapter 26 provides benchmarks for the education subsector based on the most recent three years of survey data. The 21 respondents in this subsector include public and private colleges and universities and large public school districts.
The metrics provided in this chapter are listed in the Metrics Descriptions section below.
METRICS DESCRIPTIONS
Metrics for Composite (Chapter 2) and Organization Size (Chapter 3A, 3B, 3C) Benchmarks
Our composite benchmarks (Chapter 2) includes those shown in the table of contents below. These same benchmarks are also provided by organization size in Chapter 3A, 3B, and 3C.
Demographics
The metrics in this section show key measures of size, characteristics, and IT intensity of the respondents in the sample:
Organization size demographics, including revenue, employees, and revenue per employee
IT spending demographics, including IT spending, IT operational spending, IT capital spending, and IT outsourcing budget
IT infrastructure demographics, including number of data centers, network sites, and business applications
Key metrics for IT intensity, including users per employee, PCs per user, percentage of users with tablets, percentage of users with smartphones, users per network site, and percentage of application functionality from custom systems
Spending by Type
These metrics provide additional demographic information and can be used to identify IT management trends.
Percentage of IT spending devoted to ongoing support
Outsourcing as percentage of IT budget
Percentage of IT spending outside IT budget
Trend in spending outside the IT budget
IT Planning and Budgeting Priorities
This section we rank key priorities influencing IT planning and budgeting.
Spending Priorities with Highest Priority
Spending Priorities with Lowest Priority
Total IT Spending Metrics
These metrics assess the total IT spending trends and levels
Total IT Spending as Percentage of Revenue
Total IT Spending per User
Total IT Spending per PC
Budget Categories as Average Percentage of Total IT Spending
IT Operational Spending Metrics
These metrics assess IT operational budget trends and levels:
Percentage of organizations decreasing, maintaining, or increasing IT operational spending year over year
IT operational budget percentage change from previous year
How executives expect actual IT operational spending will compare to budget
Adequacy of current IT operational budget to support the business
IT operational spending as percentage of revenue
IT operational spending per user
IT operational spending per PC
Percentage of IT operational budget charged back to users
Budget categories as average percentage of IT operational spending (see Figure 1 for Example)
Percentage of organizations decreasing, maintaining, or increasing IT capital spending
IT capital budget change from prior year
Percentage of organizations expecting to spend more, the same, or less than amount budgeted for IT capital expenses this year
IT capital budget as percentage of total IT budget
Budget categories as average percentage of capital budget
IT Staffing Metrics
These metrics assess IT staffing trends and levels:
Users per IT staff member
Percentage of organizations increasing, maintaining, or decreasing IT staff levels from previous year
IT staff headcount change from previous year
IT staff turnover
Annual training allocation per IT employee
Contractors and temporary workers as percentage of IT staff
IT staff job functions as percentage of IT staff (see Figure 2 for Example)
Job function benchmarks
These metrics show key benchmarks for six job functions:
IT managers as percentage of IT staff
OS instances per server support staff member
Network devices per network support staff member
Applications per application developer
PCs per desktop support staff member
Users per help desk staff member
First call resolution rate
Service Area Spending Metrics
These metrics show IT spending by service area as percentage of total IT spending. The service areas are IT management, business applications, data center, network, and end-user computing.
Business Application Metrics
These metrics show business application metrics, including:
End-user Computing Metrics
These metrics show the following end-user computing metrics:
End-user devices as percentage of IT spending
End-user device spending per user
PC refresh rate in years
Printing as percentage of IT spending
Printing spending per user
Users per printer
As noted above, in each chapter, the section on total IT spending and the secton on IT operational budgets include a detailed analysis of IT budget line items as a percentage of the total. Line items include IT personnel, application software, servers and storage systems, data center management software, business continuity, energy/utilities, IT facilities/floorspace, network infrastructure, carrier service, security, PCs and smartphones, printers, and “other.” An example of the presentation of this data is shown in Figure 1. Please note that the percentages shown here do not represent the actual data in the report, but are only provided to illustrate the format of the data presented.
As noted earlier, the staffing section of each chapter concludes with a breakdown of IT staffing ratios for 17 individual job positions, with each position provided as an average percentage of the total IT headcount. Job positions include IT managers; IT finance/vendor managers; project managers; clerical/administration; application development and maintenance; business analysts; web and e-commerce staff; data management; quality assurance and testing;database administration; system programmers and system administrators; computer operations and production control; network and communications; security; help desk; dfesktop support; and documentation, training and IT process/standards personnel.
An example of the presentation of this data is shown in Figure 2. Please note once again that the percentages shown here do not represent the actual data in the report, but are only provided to illustrate the format of the data presented.
Metrics for the Industry Sector Chapters (Chapters 4 – 11)
The benchmarks we provide for each industry sector are shown in the table of contents below.
Demographics
The metrics in this section describe the key characteristics of the sector to establish a basis for comparison with other IT operations. These metrics are as follows:
Organization size demographics, including revenue, employees, and revenue per employee
IT spending demographics, including total IT spending, IT operational spending, IT capital spending, and IT outsourcing budget
IT infrastructure demographics, including number of data centers, network sites, and business applications
Key metrics for IT intensity, including users per employee, PCs per user, percentage of users with tablets, percentage of users with smartphones, users per network site, and percentage of application functionality from custom systems
Spending by Type
These metrics provide additional demographic information and can be used to identify IT management trends.
Percentage of IT spending devoted to ongoing support
Outsourcing as percentage of IT budget
Percentage of IT spending outside IT budget
IT Planning and Budgeting Priorities
This section shows which objectives currently have the highest and lowest importance for IT executives:
Spending Priorities with Highest Priority
Spending Priorities with Lowest Priority
Total IT Spending Metrics
These metrics assess the total IT spending trends and levels:
Total IT spending as percentage of revenue
Total IT spending per user
Total IT spending per PC
Budget categories as average percentage of total IT spending
IT Operational Spending Metrics
These metrics assess IT operational budget trends and levels:
Percentage of organizations decreasing, maintaining, or increasing IT operational spending year over year
IT operational budget percentage change from previous year
How executives expect actual IT operational spending will compare to budget
Percentage of organizations decreasing, maintaining, or increasing IT capital spending
IT capital budget change from prior year
Percentage of organizations expecting to spend more, the same, or less than amount budgeted for IT capital expenses this year
IT capital budget as percentage of total IT budget
Budget categories as average percentage of capital budget
IT Staffing Metrics
These metrics assess IT staffing trends and levels:
Users per IT staff member
Percentage of organizations increasing, maintaining, or decreasing IT staff levels from previous year
IT staff headcount change from previous year
IT staff turnover
Annual training allocation per IT employee
Contractors and temporary workers as percentage of IT staff
IT staff job functions as percentage of IT staff (see Figure 2 for Example)
Service area spending metrics
These metrics show IT spending by service area as percentage of total IT spending. The service areas are IT management, business applications, data center, network, and end-user computing.
Metrics for Subsector Metrics Chapters (Chapters 12-26)
The benchmarks we provide for each industry sector are shown in the table of contents below.
Demographics
The metrics in this section describe the key characteristics of the sector to establish a basis for comparison with other IT operations. These metrics are as follows:
Organization size demographics, including revenue, employees, and revenue per employee
IT spending demographics, including total IT spending, IT operational spending, IT capital spending, and IT outsourcing budget
IT infrastructure demographics, including number of data centers, network sites, and business applications
Key metrics for IT intensity, including users per employee, PCs per user, percentage of users with tablets, percentage of users with smartphones, users per network site, and percentage of application functionality from custom systems
IT Spending by Type
These metrics provide additional demographic information and can be used to identify IT management trends.
Percentage of IT spending devoted to ongoing support
Outsourcing as percentage of IT budget
Percentage of IT spending outside IT budget
Total IT Spending Metrics
These metrics assess the total IT spending trends and levels:
Total IT spending as percentage of revenue
Total IT spending per user
Total IT spending per PC
Budget categories as average percentage of total IT spending
IT Operational Spending Metrics
These metrics assess IT operational budget trends and levels:
IT operational budget as percentage of revenue
IT operational budget per user
IT operational budget per PC
Percentage of IT operational budget charged back to users
Budget categories as average percentage of IT operational spending
Personnel costs as percentage of IT operational spending
Depreciation as percentage of IT operational budget
IT Capital Spending Metrics
These metrics assess IT capital spending:
IT Capital Budget as Percentage of Total IT Budget
IT Capital Spending by Budget Category
IT Staffing Metrics
These metrics assess trend data on IT staffing:
Users per IT Staff Member
IT Staff Turnover
Annual Training Allocation per IT Employee
Contingency Workers as Percentage of IT Staff
IT Staffing Mix
Spending by service area
These metrics provide spending by service area as percentage of total IT spending: |
Q:
Game project development
I want to develop a game which will consist of a 3D world in which simple 3D shapes interact with each other where "real" like physics is involved.
I have no experience in the programming of video games, and I am willing to learn so I want to ask which programming language and/or libraries would you use for a game which consists of 3D shapes interacting with each other and "real" like physics?
I know this question has multiple answers but I want to get the idea of what are the most common technologies currently used.
A:
Take a look at Bullet :
Bullet 3D Game Multiphysics Library provides state of the art collision detection, soft body and rigid body dynamics.
Used by many game companies in AAA titles on Playstation 3, XBox 360, Nintendo Wii and PC
Modular extendible C++ design with hot-swap of most components
Optimized back-ends with multi-threaded support for Playstation 3 Cell SPU and other platforms
Discrete and continuous collision detection (CCD)
Swept collision queries
Ray casting with custom collision filtering
Generic convex support (using GJK), capsule, cylinder, cone, sphere, box and non-convex triangle meshes.
Rigid body dynamics including constraint solvers, generic constraints, ragdolls, hinge, ball-socket
Support for constraint limits and motors
Soft body support including cloth, rope and deformable
Bullet is integrated into Blender 3D and provides a Maya Plugin
Supports import and export into COLLADA 1.4 Physics format
Support for dynamic deformation of non-convex triangle meshes, by refitting the acceleration structures
The Library is free for commercial use and open source under the ZLib License.
A:
You should look into the SDL library (http://www.libsdl.org) as it supports multiple platforms and has bindings for a variety of programming languages. It also supports OpenGL.
Good luck!
A:
XNA Game Studio written with C#. It's easier (subjective) to learn than C++ and DirectX/OpenGL.
http://creators.xna.com/
There is another thread about it here. Will link when I find it.
|
[Opportunistic infections in patients under highly concentrated antiretroviral therapy].
VARIABLE RESULTS: The restoration of immunological competence following Highly Active AntiRetroviral Therapy (HAART) has led to promising results concerning cytomegalovirus viremia, atypical mycobacterium infections, and survival in patients treated for non-Hodgkin's lymphomas. The beneficial effect of introducing antiproteases is less clear for other opportunistic infections such as tuberculosis and pyogenic infections. In patients with a CD4 count above 240/mm3, it would appear possible to stop primary prophylaxis against Pneumocystis carinii and toxoplasmosis. |
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
/* $Id$ */
package org.apache.fop.render.pcl.fonts;
import java.io.IOException;
import org.apache.fop.fonts.CIDFontType;
import org.apache.fop.fonts.CustomFont;
import org.apache.fop.fonts.FontType;
import org.apache.fop.fonts.MultiByteFont;
import org.apache.fop.fonts.Typeface;
import org.apache.fop.render.java2d.CustomFontMetricsMapper;
import org.apache.fop.render.pcl.fonts.truetype.PCLTTFFontReader;
public final class PCLFontReaderFactory {
private PCLFontReaderFactory() {
}
public static PCLFontReader createInstance(Typeface font) throws IOException {
if (font.getFontType() == FontType.TRUETYPE || isCIDType2(font)) {
return new PCLTTFFontReader(font);
}
// else if (font instanceof MultiByteFont && ((MultiByteFont) font).isOTFFile()) {
// Placeholder for future Type 1 / OTF Soft font implementations e.g.
// return new PCLOTFFontReader(font, pclByteWriter);
// }
return null;
}
private static boolean isCIDType2(Typeface font) {
CustomFontMetricsMapper fontMetrics = (CustomFontMetricsMapper) font;
CustomFont customFont = (CustomFont) fontMetrics.getRealFont();
if (customFont instanceof MultiByteFont) {
return ((MultiByteFont) customFont).getCIDType() == CIDFontType.CIDTYPE2;
}
return false;
}
}
|
Hillary Clinton Hillary Diane Rodham ClintonButtigieg stands in as Pence for Harris's debate practice Senate GOP sees early Supreme Court vote as political booster shot Poll: 51 percent of voters want to abolish the electoral college MORE on Wednesday hammered Donald Trump Donald John TrumpOmar fires back at Trump over rally remarks: 'This is my country' Pelosi: Trump hurrying to fill SCOTUS seat so he can repeal ObamaCare Trump mocks Biden appearance, mask use ahead of first debate MORE for using undocumented workers and foreign-made products to build his new luxury hotel, arguing that it’s the latest example of how the Republican presidential nominee has “stiffed” U.S. workers and businesses.
ADVERTISEMENT
The Democratic nominee’s criticisms at a Florida rally come as Trump briefly left the campaign trail to promote his Trump International Hotel in Washington, D.C., at a ribbon-cutting ceremony.
“Today he’s in Washington, D.C., to open his new luxury hotel,” Clinton said in Lake Worth. “While the hotel may be new, it’s the same old story.
“If you have friends who are thinking of voting for Trump, I want you to tell them he relied on undocumented workers to make his project cheaper, and most of the products in the rooms were made overseas, and he even sued to get his taxes lowered."
Clinton continued to needle Trump for contradicting his campaign platform, which has been to deport immigrants living in the United States illegally.
“But we know he’s used undocumented workers, and that’s one of the things he’s run his campaign on: about deporting undocumented workers.”
“He’s used undocumented workers; he’s made his products in foreign countries; he’s used Chinese steel instead of American steel, so you can talk a good game, but let’s look at the facts, and the facts show he has stiffed American workers. He has stiffed American businesses.”
The former secretary of State also touted that celebrity chef José Andrés will be joining her on the campaign trail at a later Florida rally. The chef is stuck in a legal battle with Trump after pulling out of a restaurant project that was planned to be open in the new hotel.
Andrés cited Trump’s rhetoric about Mexican immigrants as the reason for withdrawing from the deal. |
//
// Licensed to the Apache Software Foundation (ASF) under one
// or more contributor license agreements. See the NOTICE file
// distributed with this work for additional information
// regarding copyright ownership. The ASF licenses this file
// to you under the Apache License, Version 2.0 (the
// "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing,
// software distributed under the License is distributed on an
// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
// KIND, either express or implied. See the License for the
// specific language governing permissions and limitations
// under the License.
//
.JavaME Tutorials
************************************************
- link:imp-ng.html[Creating, Debugging, and Profiling a Mobile Embedded Application]
- link:java-card.html[Java Card Development Quick Start Guide]
- link:javacard.html[Java Card Development Quick Start Guide]
- link:index.html[JavaME Tutorials]
- link:section.html[]
- link:nb_me_plugins_screencast.html[Video of Installing and Using Java ME SDK 8.0 Plugins in NetBeans IDE]
- link:nb_me8_screencast.html[Video of NetBeans IDE Support for Java ME 8]
************************************************
|
Liverpool appoint Comolli to new Anfield role
03 November 2010 03:13
Liverpool have appointed former Spurs sporting director Damien Comolli as their new director of football strategy.
The Frenchman has been drafted in to oversee the club's recruitment strategy overseas, with manager Roy Hodgson keen to continue to strengthen his Anfield squad.
Hodgson told the club's official website: "I am looking forward to working with Damien, whom I have known for many years.
"We are engaged in an exciting project here and he will bring a lot to the table.
"We all want to see moves to strengthen the squad and support player development over the next few years. John Henry and I are totally united in delivering on that ambition."
Comolli himself added: "I am delighted to be joining Liverpool and look forward to working with John and Roy.
"I think we all realise there is a big job ahead, but we all share the vision that John has for rebuilding the club and bringing back the success that the supporters deserve." |
package com.hazz.kotlinmvp.mvp.model
import com.hazz.kotlinmvp.mvp.model.bean.HomeBean
import com.hazz.kotlinmvp.mvp.model.bean.TabInfoBean
import com.hazz.kotlinmvp.net.RetrofitManager
import com.hazz.kotlinmvp.rx.scheduler.SchedulerUtils
import io.reactivex.Observable
/**
* Created by xuhao on 2017/11/30.
* desc: 热门 Model
*/
class HotTabModel {
/**
* 获取 TabInfo
*/
fun getTabInfo(): Observable<TabInfoBean> {
return RetrofitManager.service.getRankList()
.compose(SchedulerUtils.ioToMain())
}
}
|
Q:
Adding Panels to a Form in C# during execution
I've been diving into C# for the first time by trying to recreate a screensaver that I made in Java comprised of a grid of panels which change color randomly. So far, I've gotten the code for the panels to work, and now I'm trying to add them to a Form to prototype the layout. I plan to determine the number of panels to be displayed at runtime (so that 16:9, 4:3, 16:10, etc. can all make the screensaver look good), but the only ways that I've found from searching the internet to add elements to a Form involve using Visual Studio's design tools. Therefore, I have a few questions:
How can I set up the layout of the Form in something akin to Java's GridLayout?
What's the code needed to add elements to a Form?
Is there a better thing for me to be using instead of a Form?
A:
You can add panels to a form at runtime the same way the designer does - construct the Panel, and add it to the form (via this.Controls.Add(thePanel);).
The easiest way to see the appropriate code is to add a panel to the form using the designer, then open up the "YourForm.designer.cs" file. The designer just generates the required code for you - but you can see the exact code required to duplicate what the designer would create.
As for the layout, I'd recommend watching the Layout Techniques for Windows Forms Developers video. It may give you some good clues as to the various options available for layout. There is nothing exactly like Java's GridLayout, though there are some open source projects that attempt to duplicate this functionality.
A:
You definitely are gong to need to create a form application to get this to work. In addition, every control you see in the designer, can be added programmatically.
You could have a method that cranks out new panels as needed....
Here is the code that will create a new panel:
Panel panel1 = new Panel();
Once it is declared, you can access all the properties.
To add the panel to the form you would do something like this....
myform.controls.add(panel1);
So knowing that, you can create a method that will format your panel and return or add it tor the form....
|
INTRODUCTION
============
Exposed orthopedic hardware is a limb-threatening situation that traditionally requires early, aggressive management.^[@R1],[@R2]^ If chronically exposed, however, the hardware is typically removed, and the soft-tissue defect is subsequently reconstructed with well-vascularized tissue, including the use of flap coverage.^[@R3]--[@R6]^ This problem is significantly complicated by peripheral arterial disease (PAD).^[@R7]^ If reconstruction attempts fail, for instance, amputation is offered to avoid the potentially life-threatening infectious complications associated with exposed hardware.^[@R8]^ Herein, we present a case of a PAD-related nonhealing wound with exposed hardware for which the patient elected to forego these surgical limb preservation efforts in favor of a conservative, long-term strategy of palliative wound care.
CASE PRESENTATION
=================
A 41-year-old man was working as a gravedigger when he initially sustained a left pilon fracture, requiring open reduction and internal fixation at an outside institution in 1988. Fifteen years later, he suffered a work-related injury while using a weed trimmer, resulting in wounds over his left medial ankle. On presentation to our hospital in 2003, the wounds had been present for 2 months. The patient also indicated that he had a 30 pack-year smoking history and one-block calf claudication.
In total, his wounds measured 6 × 2 cm with obviously exposed hardware (Fig. [1](#F1){ref-type="fig"}). There were no clinical signs of infection. Pedal pulses were absent, and ankle-brachial indices were 0.56 (right) and 0.55 (left). Left ankle radiograph showed intact medial and lateral hardware (Fig. [2](#F2){ref-type="fig"}), and angiography revealed diffuse disease throughout the left superficial femoral artery, an occluded left popliteal artery, and single-vessel runoff to the foot through the posterior tibial artery.
{#F1}
{#F2}
Though the patient was eligible for hardware removal, he was deemed a poor candidate for free-flap reconstruction of the resultant defect, given the compromised arterial circulation throughout his limb. Therefore, to first reestablish in-line blood flow and salvage the extremity, he underwent revascularization via common femoral-posterior tibial artery bypass using autologous vein.
He tolerated the procedure well, but 6 months postoperatively, his wounds had coalesced into a single soft-tissue defect with exposed pins. Doppler imaging and angiography demonstrated graft occlusion. Considering the significant risk this open wound posed, other revascularization options were discussed. At this point, however, the patient preferred not to have any additional intervention for his extremity unless absolutely necessary. Multiple clinicians documented discussing either aggressive limb salvage efforts (including femorodistal bypass and flap coverage) or leg amputation, often on the rationale of preventing ascending infection and sepsis. Despite this, he remained resolute in his desire to pursue expectant management with local wound care only, simply consisting of daily dressing changes.
Over a 14-year follow-up, the wound remained relatively stable in size (Fig. [1](#F1){ref-type="fig"}), the patient never developed a deep wound infection, and imaging continued to show stable hardware. Extraordinarily, the patient remained ambulatory and actively employed to age 70. He died of an unrelated myocardial infarction 14 years after his wounds first appeared.
DISCUSSION
==========
Nonhealing, PAD-associated soft-tissue defects represent a challenging problem with a natural history marked by high amputation-related morbidity and a 1-year mortality rate of 25%.^[@R9],[@R10]^ Strikingly, among those with severe PAD who receive a major (ie, above-ankle) amputation, up to 75% are no longer able to ambulate and 50% can no longer live independently.^[@R11]^ Therefore, limb preservation efforts in the setting of soft-tissue defects must aim to control and prevent infection, improve arterial flow, and restore an intact skin barrier.^[@R12]^
Though local wound care alone has a poor limb salvage rate of 10% at 10 years, this type of expectant management is actually more beneficial to the patient and more cost-effective than primary major amputation for PAD-related soft-tissue defects.^[@R13]^ Additionally, studies have identified wound palliation, defined as wound care without the expectation of complete healing, as a potentially safe alternative to major amputation in this setting.^[@R11],[@R14]^
However, this is all complicated by concomitant orthopedic hardware exposure. Particularly problematic is the distal third of the lower extremity, given the fragile vasculature and paucity of local soft tissue available for the necessary reconstruction.^[@R5],[@R7],[@R15]^ Considering that attempts at hardware preservation are most successful when initiated within 2--3 weeks of exposure,^[@R1]^ our patient was not a candidate for preservation as he already had a 2-month history of exposure on initial evaluation. Though the ideal treatment plan was to revascularize the limb followed by hardware removal and reliable free-flap coverage,^[@R1]^ the patient adamantly preferred local wound care only.
The concept of wound palliation is often discussed for uninfected wounds in the end-of-life setting, traditionally indicated when: (1) the primary treatment goal is symptom management rather than complete healing; or (2) aggressive intervention or treatment of an underlying pathology is not consistent with the patient's goals of care.^[@R14],[@R16]--[@R19]^ Remarkably, however, this patient lived independently for 14 years with a significant soft-tissue defect in the setting of clearly compromised arterial perfusion and never experienced a deep wound infection or any other complication necessitating emergent intervention. Although other studies note that approximately 31% of such patients ultimately require major amputation, they also happen to report a low rate of ascending sepsis.^[@R11]^ Though the patient remained a candidate for revascularization after the occlusion of his initial graft, he decided against further surgical intervention since he relied on his ambulatory status for his job and had no reliable support system to aid in rehabilitation efforts. Given the patient's wishes and his personal goals of care, wound palliation afforded him the opportunity to successfully defer major amputation for the remainder of his life.
CONCLUSIONS
===========
Though wound palliation is certainly not first-line management for exposed hardware in ambulatory individuals with PAD, it may serve as an approach to avoid immediate amputation-related functional impairment in patients that are either deemed poor candidates for revascularization or who wish to forego surgical attempts at limb preservation. In the context of current literature, this case illustrates that palliative management for these select patients, in the setting of clear expectations and a multidisciplinary team of providers, may be considered a potential management strategy.
ETHICAL STANDARDS
=================
The patient provided written informed consent prior to this case description and agreed to the use of potentially identifiable photography in research publications.
Published online 13 February 2019.
**Disclosure:** The authors have no financial interest to declare in relation to the content of this article. The Article Processing Charge was paid for by the authors.
|
#OccupyNigeria Shows the Movement’s Global Face
Even as the Occupy movement recedes in size, if not in activism, in the global North, it has, to its own surprise, opened up a new front in Africa's most populous country, Nigeria – where tens of thousands have occupied and paralysed the economy in a protest against the lifting of oil subsidies.
This is a movement that is actually spreading, according to Lambert Strether, as quoted on NakedCapitalism.com:
"And although some see Occupy as an aerial canopy of leaping bright fire, I prefer to see Occupy as a species of rhizome: A mass of roots growing slowly and irresistibly, indeed invasively, and scaling horizontally by sending out runners everywhere. Underground and in the dark. Right now cold, but soon to be warm. And just like hops, asparagus, ginger, turmeric, galangal, irises or Lily of the Valley, if you chop an Occupation into pieces, you get as many Occupations as the pieces you chopped."
Suddenly in rapid succession, protests are popping up in disparate places across the globe.
Occupiers in the US have moved "troops" from lower Manhattan to Congress in Washington.
Chinese activists are occupying villages and South Africans continue protests in townships against what they call a "new apartheid".
And, in Nigeria, a mass movement is gathering, in a country known more for its capitalist proclivities than activist leanings.
Even though the first name of Nigeria's president is "Goodluck", he isn't having much in battling a citizens' movement, led by unions and activists.
#Occupy Nigeria explains:
"It all started on January 1, 2011, when the announcement of fuel subsidy removal by the federal government sent everyone into a crazy frenzy, people rushed to petrol stations to see if they could get PMS at the former price of NGN 65 [40 US cents], but the petrol stations had already implemented the new price regime.
"Nigerians suffered under the burden of the new price hike for two weeks, before their cries led organised labour to embark on a nationwide strike to protest government actions. Different organisations and personalities began to emerge as leaders championing the cause of the people; bodies like Nigerian Medical Association and Nigerian Bar Association immediately joining the strike in major Nigerian cities across the country."
The Africa-oriented news service GIN reports on what happened next. First, the president caved on lifting subsidies, but:
"Soldiers were ordered into the country's major cities and to remain while "tension" persists – something unseen since the nation abandoned military rule in 1999. The move raises new questions about freedom of speech in a nation where government power still appears absolute.
"Removal of the oil subsidy which had kept gas prices affordable, spurred tens of thousands of Nigerians to take to the streets last week, demanding not just a rollback but the removal of the entire Goodluck Jonathan administration."
The reason: The protest has never been just about an oil subsidy but pervasive corruption involving the transfer of millions into the hands Nigeria's politically connected one per cent.
Nigeria's most prominent intellectual, Nobel Prize literature laureate Wole Soyinka is calling the mobilisation of the army "a gross betrayal". He asked:
"Was it part of the deal reached by the government of Goodluck Jonathan, Labour Movement and Civil Society, that soldiers would be sent to occupy Lagos and intimidate the populace?"
"This is a gross violation of the rights of citizens to congregate and give expression to whatever grievances bedevil their existence," he continued. "Until they are removed, Nigerians as a whole should understand that the present civic action is not over and prepare to mobilise and defend their liberty."
In the past, in the days of military dictatorships, the violent and often out of control soldiers were denounced as "Zombies" in a popular song by the late Nigerian superstar Fela – who died of an AIDS-related illness in 1997, and whose own story is being told in a touring musical that debuted on Broadway. The soldiers he was ridiculing later raided his compound and beat him and his supporters.
Nigeria's Day newspaper blasted the government, writing:
"What began as an audacious error of political judgment and economic desperation quickly graduated into a landmark national upheaval. It threatened to swallow the little democratic gains that have been made in this imperfect republic.
It afflicted the ruling political elite with avoidable insomnia. The fuel subsidy crisis that ended yesterday was a disruption foretold but clearly avoidable. It was foretold because, either way, a removal of subsidy on petroleum prices was bound to dislodge honest private budgets and unsettle public peace."
Corruption is nothing new in Nigeria, where many believe it was a legacy of British rule. When I visited Lagos back in 1986, I was told to be careful in the airport where "the once around rule" was observed: if you didn't get your bag on the carousel, the first time it turned, it was fair game for anyone.
I was there reporting for ABC News on a visit by the Reverend Jesse Jackson. When we left, staffers of the protocol office of the Ministry of Foreign Affairs tried to shake down the whole entourage for money.
When we boarded our plane to leave, soldiers followed to remove passengers flying on phony tickets. These were minor instances compared with the machinations of ministers who wired their entire budgets to foreign banks over the weekend to capture the interest before the funds were sent back.
Nigeria is known internationally for its email scammers, but the costs of the more entrenched corruption is massive on the Nigerian people themselves.
Now, those people are mobilising with popular demands that could overthrow their government.
The Wall Street Journal quotes a financial manager: "Both the unions and the government have lost control of this process," said Bismark Rewane, managing director of Financial Derivatives Co in Lagos. The protests, he added, are "becoming a referendum on Goodluck".
The Journal offers this analysis: "The demonstrations present Mr Jonathan with one of his biggest challenges in his two years as president. He has staked his presidency on the removal of the fuel subsidy to free up funds for infrastructure investment.
"The move is intended as the first in a series of tough overhauls – including the privatisation of Nigeria's threadbare electric grid. Aides say Nigeria lacks the funds to restore the subsidy, the principal demand of labour unions.
"Some analysts warn that even if Mr Jonathan were to restore part of the subsidy, the concession wouldn't be enough to satisfy the thousands of protesters, who have turned city centres into cauldrons of antigovernment sentiment."
When you see phrases such as "cauldrons of anti-government sentiment", you know this is serious.
Local unions are defying orders from their national leaders, report local outlets on AllAfrica.com:
"Addressing a press conference in Kano yesterday over the strike suspension under the auspices of NLC/TUC/JAF Committee for the Kano Struggle, chairman of the state NLC chapter Comrade Isa Yunusa Danguguwa said the mandate given the NLC's national leadership by the National Executive Committee of the congress was 'grossly violated'."
Meanwhile, the government is trying to placate protesters by sending anti-corruption police to seize documents from the Petroleum Ministry – with no arrests to date.
The next wave of protests is being supported by the popular Nigerian artists of "Nollywood", with new anti-subsidy songs that have turned into anthems.
The Osun Defender gives a taste of what's being said and done:
"Actor Desmond Elliot on his Tweeter [sic] page said: "Why does our president need six private jets? Why should our public officials keep their salaries when Obama slashed his? Why should we believe the government when it says the subsidy gain will be properly invested? Bad leadership and corruption must stop. A lot of other stars went beyond just talking, to actually appearing on the streets and speaking at the various rallies, we had notable faces such as; Banky W El Dee, Kate Henshaw, Omoni Oboli, Bimbo Akintola, Desmond Elliot, Ufoma Ejenobor and Ronke Oshodi-Oke appearing at some of the venues of the #Occupy Nigeria rallies."
Social media outlets, including what they call "Tweeter", are on the case. Whatever you call it, this movement is no longer just galvanising existing social activists. It is gaining traction with a larger public in a way that Occupy movements in the West only dream about.
It is likely to lead to deeper change or massive repression.
The Arab Spring is moving south, thanks to #OccupyNigeria. If nothing else, this movement dramatises the global nature of the new wave of Occupy protests.
News Dissector Danny Schechter blogs at NewsDissector.com. His new book is Occupy: Dissecting Occupy Wall Street. He reported on Africa for many years for the Africa Research Group and in other outlets. Comments to dissector@mediachannel.org |
In industrial service constructions, e.g. vehicle service constructions such as parking garage buildings, lighting, detection and control systems are typically applied such as to facilitate building services. These services, for a parking garage, for example include lighting, signaling, free parking space detection, and the like. For an industrial building, such as a large storage facility or distribution center, the construction is to be equipped mainly with lighting, and additionally often with different kinds of building services. Requirements for such systems include robustness and efficient space and power usage, sometimes combined with versatility. The required services may be implemented as system modules, which are preferably part of a single lighting, detection and control system.
Advantageously, the system modules of such a lighting, detection and control system are operated at low voltage levels (e.g. below 75V DC or 50V AC) at which levels the safety regulations are more lenient. Lighting under these conditions (e.g. <75V DC) may be provided for example with light emitting diode (LED) based armatures. LED's provide a robust low maintenance lighting solution.
To guarantee sufficient power everywhere in the system, the system may use high voltage levels requiring secure cabling. Alternatively or in addition, multiple power supplies reduce the distances between the supply and the powered modules. This causes such systems often to be bulky such as to give room to large amounts of cabling. As a result, the systems are heavy, take large amounts of space, and are difficult to install. |
Dhokla-Machine
Description :
Suitable Design For Storage and Easy handling masala with Separate Containor, Made of S.S. with 120Nos. Rectangle Container 6"x6"x5"Deep with Lid Uprights S.S.Pipe with Suitable Castor Wheel.
Size:
700 X 400 X 400 |
Advantages
Disadvantages
I wouldn't recommend this machine
I struggled with this machine for almost 2 years.
The sensor dry does not dry you clothes to a point where they can stay in the machine ready for you to collect them. The machine does such a poor job at venting the steam that your clothes are affected, and the sensor dry will come on and off all day if you let it. This is obviously an expensive way to dry your clothes and after a while I stopped using half the controls on this machine. However using the manual controls where you select a time wasn't much better and I found I was putting loads on for an hour longer than I used to in my old machine.
If you are thinking of using this machine in the garage, don't bother unless the air is bone dry. I found on humid days my machine would flash the lights on and off and would not let me use it, or it would not turn on at all. The fact the machine doesn't vent the steam away properly adds to the increasing humidity in my garage, making the problem occur even in winter. This began within a month of owning the machine, and I called the helpline to have someone to look at it, but then canceled my appointment because my machine has decided to work again and I didn't want to be charged for the call out. This was the start of a machine that had these electrical quirks quite often.
After 2 years it finally broke and I opened the unit to find out that the steam hadn't been extracted and vented properly - the electrical boards and wires within the machine were soaked, and this is (i suspect) what finally killed the machine.
I wouldn't recommend this machine to anyone. Because of this machine I will only buy condensers from now on.
Comments
Product Details
The great value Hoover VHV680C Vented Tumble Dryer has an generous capacity of 8 kg and can be relied on to dry clothes safely and efficiently / If you have been disappointed by dryers that over-heat and ruin garments, you have to know the Hoover VHV680C is something different / With its sensor, it can tell when clothes are dry / 4 levels let you choose the kind of dryness that you require, and the Hoover VHV680C will achieve it / You don't need to keep an eye on it, and can concentrate on the rest of your life! Once the clothes are out of the Hoover VHV680C they're practically ready to be folded and go into the cupboard / Short name: Hoover VHV680C |
Keratotic lesions of the oral epithelium.
Glycogen in the epithelium is interpreted as a sign of cell activity; its accumulation seems to take place gradually during cell migration. The oxido-reductase and hydrolytic enzyme-groups represent a sensitive indicator of changes in cell metabolism. The occurrence and intensity of glycogen, lactic and succinic dehydrogenases, NAD-cytochrome-c-reductase, alkaline and acid phosphatases were studied in 20 biopsy materials obtained from patients with keratotic buccal lesions. The results were compared with 20 biopsies from healthy oral mucosa. Variations were found in the localization and amount of glycogen, but no significant difference could be observed in the intensity of the oxido-reductase enzymes and alkaline phosphatase reactions. Acid phosphatase showed increased reactivity in most superficial layers of the keratinized epithelium. |
Q:
R tm package select huge amount of words to keep in text corpus
I have around 70.000 frequent_words which I want to keep in a text corpus in the same order they appeared (order matters). Which i got like this:
dtm <- DocumentTermMatrix(txt_corpus, control = list(wordLengths=c(1, Inf)))
frequent_words <- findFreqTerms(dtm, lowfreq=50)
Just doing:
dtm <- DocumentTermMatrix(txt_corpus, control = list(wordLengths=c(1, Inf)))
dtm <- removeSparseTerms(dtm, 0.8)
Would not work since I need that same filtered text_corpus twice:
dtm <- DocumentTermMatrix(txt_corpus, control = list(wordLengths=c(1, Inf)))
BigramTokenizer <- function(x) unlist(lapply(ngrams(words(x), 2), paste, collapse = " "), use.names = FALSE)
bidtm <- DocumentTermMatrix(txt_corpus, control = list(tokenize = BigramTokenizer))
I tried the code below:
keepWords <- content_transformer(function(x, words) {
regmatches(x,
gregexpr(paste0("(\\b", paste(words, collapse = "\\b|\\b"), "\\b)"), x, perl = T, ignore.case=T, useBytes = T)
, invert = T) <- " "
return(x)
})
txt_corpus <- tm_map(txt_corpus, keepWords, frequent_words)
When I run it I get the error:
Error in gregexpr(paste0("(\\b", paste(words, collapse = "\\b|\\b"), "\\b)"), :
assertion 'tree->num_tags == num_tags' failed in executing regexp: file 'tre-compile.c', line 634
Calls: preprocess ... tm_parLapply -> lapply -> FUN -> FUN -> regmatches<- -> gregexpr
Execution halted
This is caused due to the long regular expression. Removing non frequent words is out of the question since length(less_frequent_words) > 1.000.000 and takes to long with:
chunk <- 500
n <- length(less_frequent_words)
r <- rep(1:ceiling(n/chunk),each=chunk)[1:n]
d <- split(less_frequent_words, r)
for (i in 1:length(d)) {
txt_corpus <- tm_map(txt_corpus, removeWords, c(paste(d[[i]])))
}
I also tried something with joining but it gives me a unique text corpus in each iteration:
chunk <- 500
n <- length(frequent_words)
r <- rep(1:ceiling(n/chunk),each=chunk)[1:n]
d <- split(frequent_words, r)
joined_txt_corpus <- VCorpus(VectorSource(list()))
for (i in 1:length(d)) {
new_corpus <- tm_map(txt_corpus, keepWords, c(paste(d[[i]])))
joined_txt_corpus <- c(joined_txt_corpus, new_corpus)
txt_corpus <- tm_map(txt_corpus, removeWords, c(paste(d[[i]])))
}
txt_corpus <- joined_txt_corpus
Is there an efficient way to do the same selection like text_corpus <- tm_map(txt_corpus, keepWords, frequent_words) but with many words? Any help and hints are appreciated! Thanks!
Reproducable example:
library(tm)
data(crude)
txt_corpus <- crude
txt_corpus <- tm_map(txt_corpus, content_transformer(tolower))
txt_corpus <- tm_map(txt_corpus, removePunctuation)
txt_corpus <- tm_map(txt_corpus, stripWhitespace)
article_words <- c("a", "an", "the")
txt_corpus <- tm_map(txt_corpus, removeWords, article_words)
txt_corpus <- tm_map(txt_corpus, removeNumbers)
dtm <- DocumentTermMatrix(txt_corpus, control = list(wordLengths=c(1, Inf)))
frequent_words <- findFreqTerms(dtm, lowfreq=80)
dtm <- DocumentTermMatrix(txt_corpus, control = list(wordLengths=c(1, Inf), dictionary=frequent_words))
# Use many words just using frequent_words once works
# frequent_words <- c(frequent_words, frequent_words, frequent_words, frequent_words)
# keepWords function
keepWords <- content_transformer(function(x, words) {
regmatches(x,
gregexpr(paste0("(\\b", paste(words, collapse = "\\b|\\b"), "\\b)"), x, perl = T, ignore.case=T)
, invert = T) <- " "
return(x)
})
txt_corpus <- tm_map(txt_corpus, keepWords, frequent_words)
# Get bigram from text_corpus
BigramTokenizer <- function(x) unlist(lapply(ngrams(words(x), 2), paste, collapse = " "), use.names = FALSE)
bidtm <- DocumentTermMatrix(txt_corpus, control = list(tokenize = BigramTokenizer))
bidtmm <- col_sums(bidtm)
bidtmm <- as.matrix(bidtmm)
print(bidtmm)
Output:
[,1]
in in 14
in of 21
in oil 19
in to 28
of in 21
of of 20
of oil 20
of to 29
oil in 18
oil of 18
oil oil 13
oil to 33
to in 32
to of 35
to oil 21
to to 41
A:
I looked at your requirements and maybe a combination to tm and quanteda can help. See below.
Once you have a list of frequent words you can use quanteda in parallel to get the bigrams.
library(quanteda)
# set number of threads
quanteda_options(threads = 4)
my_corp <- corpus(crude) # corpus from tm can be used here (txt_corpus)
my_toks <- tokens(my_corp, remove_punct = TRUE) # add extra removal if needed
# Use list of frequent words from tm.
# speed gain should occur here
my_toks <- tokens_keep(my_toks, frequent_words)
# ngrams, concatenator is _ by default
bitoks <- tokens_ngrams(my_toks)
textstat_frequency(dfm(bitoks)) # ordered from high to low
feature frequency rank docfreq group
1 to_to 41 1 12 all
2 to_of 35 2 15 all
3 oil_to 33 3 17 all
4 to_in 32 4 12 all
5 of_to 29 5 14 all
6 in_to 28 6 11 all
7 in_of 21 7 8 all
8 to_oil 21 7 13 all
9 of_in 21 7 10 all
10 of_oil 20 10 14 all
11 of_of 20 10 8 all
12 in_oil 19 12 10 all
13 oil_in 18 13 11 all
14 oil_of 18 13 11 all
15 in_in 14 15 9 all
16 oil_oil 13 16 10 all
quanteda does have a topfeatures function, but it doesn't work like findfreqterms. Otherwise you could do it completely in quanteda.
If the dfm generation is taking too much memory, you can use as.character to transform the token object and use this either in dplyr or data.table. See code below.
library(dplyr)
out_dp <- tibble(features = as.character(bitoks)) %>%
group_by(features) %>%
tally()
library(data.table)
out_dt <- data.table(features = as.character(bitoks))
out_dt <- out_dt[, .N, by = features]
|
The effect of monensin against swine dysentery.
The use of monensin sodium against naturally transmitted swine dysentery was evaluated in 4-week-old piglets, with an average weight of 8 kg, over a period of 112 days. Three treatments were compared using between two and four pens per treatment and 12 pigs per pen. Monensin was administered via the feed, either immediately post weaning to four pens of pigs (T1), or after 12 days (T2, two pens). The T1 group received monensin at the rate of 100 ppm (days 0-56), 50 ppm (days 57-84) and 25 ppm until the end of the trial. In the other group monensin was given at 100 ppm (days 12-84) and at 50 ppm (days 85-112). Unmedicated feed was given to two pens (T3). The continuous administration of monensin from weaning was effective in the control or prevention of swine dysentery. A significant (P less than 0.05) improvement, in comparison with the other two groups, was observed in terms of mortality, diarrhoea score, average daily gain (ADG) and feed conversion ratio (FCR). There was a reduction in mortality, diarrhoea score/days and an improvement in growth performance parameters in pigs treated with monensin after the disease had been established, with ADG and FCR values significantly (P less than 0.05) different compared with the untreated controls. |
Reinventing energy at ARPA-E (photos)
Blow others out of the water
At the ARPA-E Energy Innovation Summit, startups and research organizations this week are showing off the latest inventions in the multiple paths to cleaner energy.
PolyPlus Technology is developing lithium air and lithium water batteries that promise a big jump in the storage capacity of lithium ion batteries. The company has developed a material that will allow batteries to operate using the dissolved oxygen in water or the air, which its says is key to making energy-dense lithium air batteries viable. The company's plan is to start making lithium water batteries for underwater uses, such as robots, in two years. Then it intends to make a lithium air battery one year later, and perhaps three to five years from now, a rechargeable lithium air battery.
Mini heliostats
Commercial R&D company Otherlab is showing off a completely new approach to heliostats, the sun-tracking mirrors used to concentrate sunlight to generate electricity. Rather than large and expensive steel trackers, the company has designed these water-filled plastic trackers. By changing the flow of the water in the three "legs" of the tracker, a central control unit can change the pressure inside and redirect the mirrors to face the sun. The idea is that several of these smaller units could be placed on a steel plate flat on the ground, which Otherlab expects to be cheaper.
Plastic light concentrator
The ARPA-E Energy Innovation Summit brings a number of startups but a large portion of the exhibitors are from national labs, universities, and research organization. PARC, which is a Xerox company, has an energy research arm and is displaying this solar concentrator. It reflects light with dies in a sheet of plastic and then directs it up through the Fresnel lens on the top. The idea is to manufacture this at very small scale so that you could use sheets of plastic with this design embedded in it to reflect light cheaply.
Efficient power electronics
EnPhase is one of the companies that received a grant to improve the power electronics in the grid, a seemingly obscure but important issue. The company has developed a chip (black box at right) made on a gallium arsenide substrate which is part of the electronics needed to switch from alternating current on the grid to direct power that many machines, such as motors, use. The goal is to handle much higher voltages on the grid and to reduce the losses that occur when switching from AC to DC and back.
Daylight-sensitive LED fixture
In the area of energy efficient lighting, Digital Lumens showed off this LED light fixture which is equipped with a daylight sensor (on the top). When it detects light, it gradually turns down the brightness of the LED light sources, a way to save energy while maintaining consistent light levels.
Microbial fuel cell
One technology which continues to attract research is microbial fuel cells, where the growth of microorganisms creates a flow of electricity. In this project led by the University of Massachusetts, researchers are seeking to find stable organisms which can produce desired chemicals, such as butanol, more efficiently than previously done.
Evolvulator 1.0
Shown here is the testing equipment used by Harvard University's Wyss Institute to produce a reverse microbial fuel cell, which would use electricity and carbon dioxide to produce a biofuel. The machine which shakes the flask, called a turbidostat, is used to grow certain organisms and locate organisms which are good candidates for further study. Because it's a competition to survive, the Harvard researchers have nicknamed the machine the Evolvulator 1.0.
Solar hydrogen generator
Nanoptek CEO John Guerra (left) shows the company's device to produce hydrogen with the aid of solar cells. The company intends to sell the hydrogen generators to industrial companies which now purchase tanks of hydrogen.
Glass energy storage
Startup Halotechnics is developing materials that can be used to store energy from concentrating solar power plants. It's starting with molten salt chemistries that can improve over existing molten salt storage methods. For the longer term, it's developing glass-based liquid storage, according to CEO and founder Justin Raade, who is holding samples of the glass storage medium.
Shape memory alloys
Walking through the showcase at the ARPA-E Energy Innovation Summit is a clear reminder on the close connection between energy and materials. Here General Motors is showing off research on shape memory alloys, a type of metal that will heat up when stretched and vice versa. The long-term plan of this research is take the waste heat from car engines and convert that into a motion to generate electricity. In the shorter term, it expects to use the material as a low-power replacement for actuators and motors in simple latches.
Efficiency and horsepower booster
During his keynote address, Energy Secretary Steven Chu called out the work being done by Umpqua Energy on improving fuel efficiency. In front is a catalytic converter and the device behind it is a cold plasma reformer designed to improve fuel efficiency and boost the power of vehicles. The reformer can take hydrocarbon fuel and convert some of it to hydrogen, which is then reinjected into the engine. In an actual car, it would be about the size of the catalytic converter and be bolted onto the side of engine.
Making hydrogen from the sun
SunCatalytix is a start-up spun out of MIT to build an inexpensive device called an electrolyzer for getting hydrogen fuel from water by running an electric current through it. It received funding from ARPA-E to build a prototype (seen here) of a material that will make hydrogen directly from a solar cell. The hydrogen would then be stored and used as a fuel to generate electricity. |
Q:
What's the difference between declaration of an int with int keyword or with @property (nonatomic, assign)?
I just want to know what is the difference between writing this :
@interface Monster : CCSprite
@property (nonatomic, assign) NSString *life;
@property (nonatomic, assign) int color;
- (id)initWithFile:(NSString *)file hp:(int)life:(NSString *)color;
@end
and this :
@interface Monster : CCSprite{
NSString *life;
int color;
}
- (id)initWithFile:(NSString *)file hp:(int)life:(NSString *)color;
@end
Thank you in advance for your help.
A:
Short answer: when you add a property, the class that invoked itself can have access to it. Example
LevelClass alloc and init your Monster class and it has access to his property like this
Monster *monsterIstance = [[Monster alloc] init];
NSLog(@" monster life = %@", monsterIstance.life);
and once you use @property with @synthesize you automatically generates set and get code.
self.life = @"text";
is equal to
[self setlife: @"text"];
Long answer: check this out when-to-use-properties-in-objective-c and why-would-you-use-an-ivar
and you should also read this tutorial from Ray Wenderlich site that it will explain a lot about arc / property etc
|
Q:
error with snappy while importing fastparquet in python
I have installed installed the following modules in my EC2 server which already has python (3.6) & anaconda installed :
snappy
pyarrow
s3fs
fastparquet
except fastparquet everything else works on importing. When I try to import fastparquet it throws the following error :
[username@ip8 ~]$ conda -V
conda 4.2.13
[username@ip-~]$ python
Python 3.6.0 |Anaconda custom (64-bit)| (default, Dec 23 2016, 12:22:00)
[GCC 4.4.7 20120313 (Red Hat 4.4.7-1)] on linux
Type "help", "copyright", "credits" or "license" for more information.
import fastparquet
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/home/username/anaconda3/lib/python3.6/site-packages/fastparquet/__init__.py", line 15, in <module>
from .core import read_thrift
File "/home/username/anaconda3/lib/python3.6/site-packages/fastparquet/core.py", line 11, in <module>
from .compression import decompress_data
File "/home/username/anaconda3/lib/python3.6/site-packages/fastparquet/compression.py", line 43, in <module>
compressions['SNAPPY'] = snappy.compress
AttributeError: module 'snappy' has no attribute 'compress'
How do I go about fixing this ?
A:
Unfortunately, there are multiple things in python-land called "snappy". I believe you may have the wrong one, in which case one of the following conda commands should solve this for you:
conda install python-snappy
or
conda install python-snappy -c conda-forge
where the latter is slightly more recent (releases the GIL which can be important in threaded applications).
|
Q:
How to compute $\int{\frac{5x^3+8x^2+x+2}{x^2(2x^2+1)}} dx$?
$$\int{\frac{5x^3+8x^2+x+2}{x^2(2x^2+1)}} dx$$
So ... how do I start? Numerator cant be factorized it seems, and this looks like a complicated expression ...
I tried expanding the denominator to see if integration by substitution will work, but it didn't give any ideas
$$\int{\frac{5x^3+8x^2+x+2}{2x^4+x^2}} dx$$
I don't see a clear way to integrate by parts either. Can anyone enlighten me?
A:
Hint :
Use partial fraction decomposition :
$$\frac{5x^3+8x^2+x+2}{x^2(2x^2+1)}=\frac{A}{x}+\frac{B}{x^2}+\frac{Cx+D}{2x^2+1}$$
|
/**********************************************************************
id.c -
$Author: akr $
created at: Thu Jul 12 04:37:51 2007
Copyright (C) 2004-2007 Koichi Sasada
**********************************************************************/
#include "ruby/ruby.h"
#include "id.h"
static void
Init_id(void)
{
#undef rb_intern
#define rb_intern(str) rb_intern_const(str)
rb_encoding *enc = rb_usascii_encoding();
REGISTER_SYMID(idNULL, "");
REGISTER_SYMID(idIFUNC, "<IFUNC>");
REGISTER_SYMID(idCFUNC, "<CFUNC>");
REGISTER_SYMID(idRespond_to, "respond_to?");
REGISTER_SYMID(id_core_set_method_alias, "core#set_method_alias");
REGISTER_SYMID(id_core_set_variable_alias, "core#set_variable_alias");
REGISTER_SYMID(id_core_undef_method, "core#undef_method");
REGISTER_SYMID(id_core_define_method, "core#define_method");
REGISTER_SYMID(id_core_define_singleton_method, "core#define_singleton_method");
REGISTER_SYMID(id_core_set_postexe, "core#set_postexe");
REGISTER_SYMID(idEach, "each");
REGISTER_SYMID(idLength, "length");
REGISTER_SYMID(idSize, "size");
REGISTER_SYMID(idLambda, "lambda");
REGISTER_SYMID(idIntern, "intern");
REGISTER_SYMID(idGets, "gets");
REGISTER_SYMID(idSucc, "succ");
REGISTER_SYMID(idMethodMissing, "method_missing");
#if SUPPORT_JOKE
REGISTER_SYMID(idBitblt, "bitblt");
REGISTER_SYMID(idAnswer, "the_answer_to_life_the_universe_and_everything");
#endif
REGISTER_SYMID(idSend, "send");
REGISTER_SYMID(id__send__, "__send__");
REGISTER_SYMID(idInitialize, "initialize");
}
|
Mid-August flotsam
Reached mid-semester point, with quite a few new lectures to prepare. Nothing extremely complicated but, as always, the tricky part is finding a way to make it meaningful and memorable. Sometimes, and this is one of those times, I sound like a broken record but I’m a bit obsessive about helping people to ‘get’ a topic.
I gave knitr a go while preparing model answers for an assignment. I liked the integration with RStudio and the possibility of using several markup languages. For simple documents Markdown + R is an excellent combination to generate HTML output. However, I wanted to generate PDF output with some math, so I went for latex integration. Jeromy Anglim’s site provides a very good starting point for using knitr to document reproducible analyses. |
次回の「ゲームソフト週間販売ランキング+」は,2016年5月6日に掲載を予定しています。
コンシューマソフト週間販売ランキングTop20
※順位の
赤背景
は新作タイトルです。
コンシューマハード週間販売ランキング
機種 販売台数 PS4 20,589 New3DS LL 13,917 Vita 12,678 Wii U 5,968 New3DS 3,268 PS3 1,153 3DS 939 3DS LL 137 Xbox One 101
Media Create Co., Ltd. All Rights Reserved.
The Copying or Reproduction of this Document is Strictly Forbidden. 本レポートの著作権は 株式会社メディアクリエイト に帰属します。データの無断転載を禁じます。Media Create Co., Ltd. All Rights Reserved.The Copying or Reproduction of this Document is Strictly Forbidden.
(C)2016 HAL Laboratory, Inc. / Nintendo
週間販売ランキングの掲載日以降に発売/サービスされる新作タイトルをピックアップするコーナー「新作タイトルPickUp!」。今週は「 星のカービィ ロボボプラネット 」を紹介します。公式サイト: https://www.nintendo.co.jp/3ds/at3a/index.html 発売日:2016/04/28価格:4700円(税別)敵を吸い込んでその能力をコピーする,というアクションが楽しめるシリーズの最新作です。コピーできる能力は新登場のものも含めて25種類以上となっているほか,カービィと同じように敵の能力をスキャンして,といったモードに変形可能なロボットも登場します。また,本作はすべてのamiiboに対応しており,さまざまなコピー能力がもらえるとのこと。ソフトと同時発売される「星のカービィ」シリーズのamiiboでは特別なコピー能力が入手できるので,amiiboを使うと遊び方がさらに広がりそうです。 |
58th Street Terminal
58th Street Terminal or 58th Street was a station on the demolished IRT Sixth Avenue Line. It had three tracks and two side platforms. The center track was used for storage. The station was opened by the Gilbert Elevated Railway on June 5, 1878, and served as the northern terminus of the IRT Sixth Avenue Line trains until the line was acquired by the Manhattan Railway Company and built a connecting spur from 50th Street Station (the next southbound stop) along 53rd Street to the Ninth Avenue Elevated. It was replaced as the northernmost station on the line by the Eighth Avenue station in 1881, and closed on June 16, 1924.
Though there are no longer any New York City Subway stations explicitly named 58th Street, the area is now served by the underground 57th Street subway station, one block to the south of the former 58th Street Terminal.
References
Category:IRT Sixth Avenue Line stations
Category:Railway stations opened in 1878
Category:Railway stations closed in 1924
Category:Former elevated and subway stations in Manhattan
Category:Defunct New York City Subway stations located aboveground
Category:1924 disestablishments in New York (state)
Category:1878 establishments in New York (state) |
Ever since it became clear that the pace of the economic recovery was falling short of expectations, two competing narratives have vied to dominate our politics. Movement conservatives argue that the weight of a government that “spends too much, taxes too much, and borrows too much” is suffocating the private sector and that new laws and regulations have throttled investment and job creation by creating uncertainty about the costs of doing business. Keynesian liberals, meanwhile, counter that the problem is the collapse of demand and that the government’s failure to offer a large enough stimulus is consigning us to a rate of growth not easy to distinguish from stagnation.
What if they’re both wrong? That’s the claim of Amir Sufi, a finance professor at the University of Chicago’s Booth School of Business. The data tell a compelling story, he argues: “The main factor responsible for both the severity of the recession and the subsequent weakness of the economic recovery is the deplorable weakness of the U.S. household balance sheet,” which is, Sufi shows, “in worse condition than at any other point in history since the Great Depression.”
Because Sufi’s argument makes so much intuitive sense, I started digging into the data for myself. And the information I found supports his thesis.
For instance, according to reports issues quarterly by the Federal Reserve Board of New York, household debt rose from $4.6 trillion in 1999 to $12.5 trillion in early 2008. After three years of painful deleveraging (mainly through home foreclosures and reductions in credit card balances), it still stands at $11.5 trillion—roughly where it was at the beginning of 2007.
To understand the burden this imposes on households, let’s look at a key measure: the ratio of household debt to disposable income. Between 1965 and 1984, the ratio remained steady at 64 percent. Between 1985 and 2000, it rose virtually without interruption to 97 percent. And then, it shot into the stratosphere, peaking at 133 percent in 2007. Four years later, according to the Federal Reserve Bank of San Francisco it has come down only modestly: Household debt still stands at 118 percent of disposable income. |
Induction of cell death by combination treatment with cisplatin and 5-fluorouracil in a human oral squamous cell carcinoma cell line.
The possible apoptosis-inducing activity of several sequential treatments of cisplatin (CDDP) and 5-fluorouracil (5-FU) against the human oral squamous cell carcinoma HSC-2 cell line was investigated. The following three combination treatments (CT) were used: simultaneous treatment with CDDP and 5-FU (for 72 hours) (CT-1), CDDP treatment (24 hours) followed by 5-FU treatment (48 hours) (CT-2) and 5-FU treatment (24 hours) followed by CDDP treatment (48 hours) (CT-3). CT-1 produced the highest cytotoxicity, followed by CT-3 and CT-2. No treatment induced any detectable internucleosomal DNA fragmentation, and caspase-3,-8 and -9 were activated to a much lesser extent than that attained using actinomycin D. High-performance liquid chromatography analysis demonstrated that 5-FU, as well as CT-1 and CT-2, preferentially reduced the intracellular concentration of putrescine. These results suggest that simultaneous treatment with CDDP and 5-FU induces lower level of apoptotic cell death in HSC-2 cells. |
Tennessee Governor Bill Haslam has granted death row inmate Edmund Zagorski a 10-day reprieve from execution. Zagorski's execution was originally scheduled to be carried out late Thursday night.
"I take seriously the responsibility imposed upon the Tennessee Department of Correction and me by law, and given the federal court’s decision to honor Zagorski’s last-minute decision to choose electrocution as the method of execution, this brief reprieve will give all involved the time necessary to carry out the sentence in an orderly and careful manner,” Governor Haslam said.
The reprieve is effective until October 21.
Earlier Thursday, Judge Aleta Trauger of the U.S. District Court for the Middle District of Tennessee granted Zagorski's motion asking not to be executed by lethal injection.
A stay of execution was confirmed by a federal appeals court Wednesday. Split 2-1 Thursday, a federal court of appeals panel delayed his execution with a stay for the second time, citing ineffective counsel claims. A petition for further legal review is pending at the United States Supreme Court.
The three-drug lethal injection protocol was adopted in January 2018 by the Tennessee Department of Correction as an alternative execution method to the single-drug protocol using pentobarbital. 33 death row inmates filed a constitutional challenge to the new protocol in February as TDOC eliminated the pentobarbital alternative. The three-drug protocol now stands as the only available lethal injection execution method in Tennessee.
Zagorski was convicted of shooting and slitting the throats of John Dotson and Jimmy Porter, of Robertson County, during a marijuana deal in 1983. Governor Bill Haslam denied clemency for Zagorski on October 5. |
Author:
While improving and fixing OTTO ZERO , NOVE projects I end up with a new robot .. ZEUS robot is born.
I’m building something like Anki Cozmo and Anki Vector : Zeus is a personal companion for your desk , it is opensource and with no dependencies .
Components are simple ESP32, oled screen and servos and one lipo battery. The project will be opensource like OTTO DIY
Functionalities ( updated 26/07/2019) :
ZEUS can “speak” ( “daa , dee, wee, heee l l ooo” well it need to be improved.. )
show some basic emotions
control and connect Wifi smart home devices.
open and close the mouth while speaking
Robot are our passion! 🙂 We write about robotics but also we love to contribute building new robots
Feel free to support this project ( and see more ) becoming a Patreon here 🙂 |
713 S.W.2d 478 (1986)
BLUE CROSS & BLUE SHIELD OF KENTUCKY, INC., Appellant,
v.
Helen BAXTER, Appellee.
Court of Appeals of Kentucky.
April 11, 1986.
Rehearing Denied June 6, 1986.
Discretionary Review Denied and Opinion Ordered Published by Supreme Court August 26, 1986.
*479 Lea Pauley Goff, Joseph M. Day, E. Paul Herrington III, Louisville, for appellant.
John M. Coy, Richmond, for appellee.
Before GUDGEL, MILLER and WILHOIT, JJ.
MILLER, Judge.
Appellee, Helen Baxter, was severely injured in a one-car automobile accident on March 4, 1984. As a result, she incurred medical expenses and work loss (lost wages), each exceeding $10,000.00.[1]
At the time of the accident, Helen had a no-fault insurance policy as mandated by KRS Chapter 304.39. Her policy, issued by American Fire & Casualty Company (American Fire), provided for "basic reparation benefits" (BRB) covering net economic loss which included her work loss and medical expenses up to $10,000.00. KRS 304.39-020(2), (5), and KRS 304.39-030. In addition to her no-fault coverage, Helen (a state employee) was covered under a certain group health policy issued by appellant, Blue Cross & Blue Shield of Kentucky (Blue Cross), providing for payment of medical expenses.
After the accident, American Fire recognized its obligation by paying the sum of $10,000.00 to Helen for work loss and medical expenses. Actually, Helen received $800.00 for lost wages and $51.93 for eyeglasses. Further, American Fire, pursuant to KRS 304.39-240, paid the balance of $9,148.07 directly to Jewish Hospital on her hospital account. Blue Cross refused to duplicate the medical expenses and Helen sued.
Blue Cross maintains that the "coordination of benefits" provision in its policy renders the no-fault carrier the primary obligor; thus, it does not have to duplicate medical payments. Helen argues enforcement of the coordination of benefits provision would essentially deny her the recovery for lost wages to which she is entitled under the no-fault act. Coordination of benefits clauses are designed to establish responsibility for payment between carriers where overlapping "health plans" exceed 100% of the covered services in this case, medical expenses. It appears that the underlying purpose of coordination clauses is to prevent overlapping of insurance coverage thereby reducing premiums. We are directed to one state which mandates that health plans be coordinated with no-fault benefits. See Nyquist v. Aetna Ins. Co., 84 Mich.App. 589, 269 N.W.2d 687 (1978). We are directed to no such provision in our no-fault act.
The circuit court disagreed with Blue Cross's contention. Judgment was entered in favor of Helen, and Blue Cross brings this appeal. We affirm.
Blue Cross offers several arguments largely pertaining to the propriety of summary judgment. CR 56. These arguments are without merit as summary judgment does not require that there be no issue of fact but that there be no genuine issue of fact. If the defenses have no substance, if controlling facts are not in dispute, or factual disputes are insignificant, summary judgment is appropriate. See Bennett v. Southern Bell Telephone and Telegraph Co., Ky., 407 S.W.2d 403 *480 (1966). Here, summary judgment was the appropriate method of disposition. As we view the matter, the only significant question is one of law in determining the application of the coordination clause to the facts at hand.
If economic loss (exclusive of medical expenses) exceeds the maximum BRB to which a claimant is entitled, coordination is impermissible. In this case, Helen's economic loss in wages alone exceeds the $10,000.00 maximum to which she is entitled. If we were to permit Blue Cross to coordinate its responsibility for medical bills with the payments which Helen has received from the no-fault carrier, it would effectively depreciate her recovery under the no-fault act. This we cannot sanction. It would vitiate the public policy set forth in the Motor Vehicle Reparations Act. KRS 304.39-010.
Our public policy is manifested in the acts of the legislature. In Kentucky State Fair Board v. Fowler, 310 Ky. 607, 221 S.W.2d 435, 439, it was stated as follows:
. . . . The public policy of a state is to be found: first, in the Constitution; second, in the Acts of the Legislature; and third, in its Judicial Decisions. [Citations omitted.] Where the Constitution is silent, the public policy of the State is to be determined by the Legislature on subjects which it has seen fit to speak. [Citations omitted.] It is only where the Constitution and the Statutes are silent on the subject that the Courts have an independent right to declare the public policy. [Citations omitted.]
It is clear to us that in enacting no-fault legislation, the intent was to provide a remedy to automobile accident victims that could not be impinged upon by any means whatsoever. This was the victim's reward for sacrificing traditional tort rights. See Fann v. McGuffey, Ky., 534 S.W.2d 770 (1975); KRS 304.39-060(2); KRS 304.39-030(1). No-fault is a specie of compulsory insurance. 7 Am.Jur.2d Automobile Insurance §§ 20 and 341 (1980). It is remedial in nature and thus will be broadly construed to carry out its beneficial purpose of providing compensation for persons injured by automobiles. 7 Am. Jur.2d Automobile Insurance § 28 (1980). Although our statute provides that an injured party may not collect from more than one "reparation obligor" (KRS 304.39-050[3]), there is every indication the legislature intended that his one-time recovery not be diminished. The statute defines reparation obligor as "an insurer, self-insurer, or obligated government providing basic or added reparation benefits under the statute." KRS 304.39-020(13). The statute does not include insurers, such as Blue Cross, who are not providing insurance under the no-fault statute. Further, BRB are qualifiedly exempt from execution (KRS 304.39-260[1]), and are not subject to deductions or set-off. KRS 304.39-250. Apparently the only authorized deductions in BRB are those arising from social security or workers' compensation. KRS 304.39-120.
In view of the foregoing, we believe it offensive to the public policy manifested in the act to permit Blue Cross to coordinate under the circumstances. Blue Cross has a right to contract, but the right is not unlimited. 17 Am.Jur.2d Contracts § 174 (1964).
For the foregoing reasons, the judgment of the Madison Circuit Court is affirmed.
Further, pursuant to 2(a) of the Order Designating the case as a Special Appeal, the application of CR 76.20 and CR 76.32, as well as other appropriate Rules of Civil Procedure pertaining to further appellate steps, are reinstated effective the date of this opinion.
All concur.
NOTES
[1] Through April 13, 1984, Helen incurred medical expenses amounting to $48,110.50. As she remains disabled, her work loss greatly exceeds $10,000.00. KRS 304.39-130.
|
A North Carolina school board is recommending that educators use gender-neutral terms when referring to students instead of using words such as “boys” and “girls.”
A Charlotte-Mecklenburg Schools presentation, titled “Supporting Transgender Students,” recommends that children be referred to as “scholars” and “students,” a local ABC News affiliate reported.
The presentation also states that students are permitted to participate in gender-based activities consistent with their gender identity, including single-gender classes, school photos, extracurricular activities and overnight field trips. It also stresses the importance of using a transgender student’s preferred pronouns, such as they, them and theirs.
“Inadvertent slips may occur. Intentional refusals to use a transgender student’s preferred name/pronoun violate this regulation,” a slide states.
School board officials said the presentation is meant to serve only as a guideline, ABC reported.
“CMS remains fully committed to supporting its transgender students and nurturing a safe and welcoming environment for every student and employee,” said CMS Chief Communications Officer Kathryn Block.
The North Carolina Values Coalition called the rules radical and a violation of privacy, ABC reported.
“School is no longer about reading, writing and arithmetic. It is now about gender fluidity,” activist Tami Fitzgerald said.
Another part of the CMS policy permitting students to use the bathroom of their choice was halted last week after the U.S. Supreme Court ruled that a Virginia school board could block a transgender male from using the boys’ bathroom.
“As a result of yesterday’s U.S. Supreme Court ruling, we have placed a temporary hold on the section of the CMS bullying prevention regulation which states that transgender students will be given access to the restroom and locker room facilities corresponding to their gender identity,” Superintendent Ann Clark said in a statement. “The rest of the regulation, which is intended to promote consistency in anti-bullying support for all students, will remain intact. CMS will respect the Supreme Court’s decision just as we did that of the Fourth Circuit Court of Appeals.”
The CMS stay is in effect until the court decides whether or not it will hear the Gloucester County School Board’s appeal in Virginia, ABC reported.
The NC Values Coalition plans to hold a rally outside the Government Center before the school board meeting Tuesday, the station reported.
Sign up for Daily Newsletters Manage Newsletters
Copyright © 2020 The Washington Times, LLC. Click here for reprint permission. |
Pages
Monday, March 31, 2014
If you got this error "could not find or load main class" trying to execute your freshly compiled java program you have a problem with your classpath variable that doesn't include your current folder.
Solution:
Open the Control Panel -> System -> Advanced System Settings -> Advanced [table] -> environment variables and then "edit" your CLASSPATH adding a dot "." at the end.
PS
You have to re-open your Windows console to make the change active.
From the Oracle documentation
"The default class path is the current directory. Setting the
CLASSPATH variable or using the
-classpath command-line option overrides that default,
so if you want to include the current directory in the search path,
you must include "." in the new settings."
Uninstall all Oracle components using command line uninstaller located at ORACLE_HOME\deinstall\deinstall
Run regedit.exe and delete the HKEY_LOCAL_MACHINE/SOFTWARE/ORACLE key. This contains registry entires for all Oracle products.
Delete any references to Oracle services left behind in the following part of the registry:
HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/Ora* It should
be pretty obvious which ones relate to Oracle.
Reboot your machine.
Delete the "C:\Oracle" directory, or whatever directory is your ORACLE_BASE. |
import graph;
size(0,150);
int a=-1, b=1;
real f(real x) {return x^3-x+2;}
real g(real x) {return x^2;}
draw(graph(f,a,b,operator ..),red);
draw(graph(g,a,b,operator ..),blue);
xaxis();
int n=5;
real width=(b-a)/(real) n;
for(int i=0; i <= n; ++i) {
real x=a+width*i;
draw((x,g(x))--(x,f(x)));
}
labelx("$a$",a);
labelx("$b$",b);
draw((a,0)--(a,g(a)),dotted);
draw((b,0)--(b,g(b)),dotted);
real m=a+0.73*(b-a);
arrow("$f(x)$",(m,f(m)),N,red);
arrow("$g(x)$",(m,g(m)),E,0.8cm,blue);
int j=2;
real xi=b-j*width;
real xp=xi+width;
real xm=0.5*(xi+xp);
pair dot=(xm,0.5*(f(xm)+g(xm)));
dot(dot,darkgreen+4.0);
arrow("$\left(x,\frac{f(x)+g(x)}{2}\right)$",dot,NE,2cm,darkgreen);
|
A conserved internal hydrophobic domain mediates the stable membrane integration of the dengue virus capsid protein.
The mature flavivirus capsid protein (virion C) is commonly thought to be free in the cytoplasm of infected cells and to form a nucleocapsid-like complex with genomic RNA in mature virus particles. There is little sequence conservation among flavivirus virion C proteins, but they are similar in size (e.g., 99 amino acids [aa] for the dengue-4 [DEN4] C) and in bearing a net positive charge. In addition, we noted that C contained a conserved internal hydrophobic segment (spanning aa 45-65 in the DEN4 C). Results of in vivo expression and in vitro translation of wt and mutant forms of the DEN4 virion C demonstrated that the conserved internal hydrophobic segment in the DEN C functioned as a membrane anchor domain. Signal peptide function of this segment was also suggested by its requirement for the entry of C into membranes. Virion C was integrated in membranes in a "hairpin" conformation; positively charged segments amino- and carboxy-terminal to the hydrophobic signal-anchor segment were accessible to protease digestion in the "cytoplasm." The net positive charge in the amino-terminal extramembraneous portion of C (aa 1-44) was one determinant of the hairpin membrane orientation; a conserved positively charged residue within the hydrophobic segment (Arg-54 in the DEN4 C) was not. |
"Hey Dash!"
"What?"
"I bet you can't do... this!"
"... S-so what if I can't? I can fly!"
"Ha! I knew you would be jealous."
"S-shut up! *pouty face*"
"Hey, Dash."
"What now?"
"Love ya! So remove that frown from you face and smile."
"*snort*"
"I got a lot of practice with Twilight."
"And I bet with... Oh! Hey Rarity!"
"R-rare...."
"Ha!"
"That's not funny."
"Aww... Spike... *makes a heart with her wings. I love ya too."
"Wait! What? Then why you got upset?"
"Don't know. I never tried before I guess."
Rarity passed by.
"Hello Spike, hello Rainbow Dash."
"Hi Rarity."
"Oh. Uh... H-hello Rarity."
She continued her trot.
"Uh... Wait! R-rarity! L-look!"
She stopped and looked in his direction, confused. He made the same heart with his heart. She smiled, approached him and kissed him on the cheek. "I love you too Spike." Before resuming her trot.
Dash nodded. "I guess she liked it."
Spike couldn't stop smiling, red like an apple. "Y-yeah."
BEautiful work |
Lawsuit over bus camera technology isn’t likely to clear the water for schools
Dallas County Schools lost its mandate last November, when voters approved dissolving the mismanaged bus services agency, but the effects of corruption there are still playing out across the state.
The latest problem: allegations that DCS officials illegally gave away trade secrets involving technology used to capture video footage of motorists who fail to stop for school buses loading or unloading. Sources told The Texas Monitor that alawsuit on the issue is set to be settled this week. However, school districts around the state, which got involved with DCS and its scheme to make money off fines against motorists, may be dealing with the resulting confusion for months to come.
DCS provided bus service to several North Texas school districts before mismanagement led to a $130 million budget shortfall and to the ill-fated camera scheme. Aseries of stories by the NBC-TV affiliate in Dallason the camera company, Force Multiplier Solutions, and DCS Superintendent Rick Sorrells led to the federal indictment of Sorrells and a salesman for the camera system company. Both havepleaded guilty to corruption charges. Force Multiplier CEO Robert Leonard is currently under federal investigation over his connections to Sorrells.
The scheme involving the so-called “stop-arm” cameras was an important part of the investigation that helped bring down DCS. It involved multimillion-dollar payoffs by the camera company to Sorrells.
Under Texas law, motorists are supposed to stop for school buses that are picking up or letting off students. Buses are equipped with a mechanical arm that extends a stop sign to warn drivers.
In 2011, DCS made a deal with Louisiana-based Force Multiplier to install cameras on the buses to videotape motorists who failed to stop. As with red-light cameras, which have fallen out of favor in many places, the system involved sending violation notices and fine assessments to drivers based on the videos.
DCS and Force Multiplierjoined forces in 2012 to offer the bus cameras to Texas school districts in exchange for a cut of any fines generated.
Dozens of school districts around the state, including 12 in the Dallas area, signed up for the program. North East ISD in San Antonio last year generated $1.7 million in fines from the program, the most of any district in the state. However, the scheme never made a profit for DCS itself, because the agency had bought the cameras upfront, because some districts dropped out, and because many tickets were dismissed.
In July 2017, as things were falling apart for DCS, Virginia-based BusPatrol bought the U.S. technology rights to the camera system from Force Multiplier, with the intent to again license the technology to DCS.
DCS, meanwhile, had been having trouble getting Force Multiplier to fulfill its commitment to provide information to the bus agency and to law enforcement agencies charged with assessing fines.
Former DCS Police Chief Scott Peters told The Texas Monitor that Leatha Mullins (who had stepped in as acting DCS superintendent after Sorrells was forced out) instructed him to give another company, American Traffic Solutions, access to a few cameras, so that ATS could take over management of the technology.
DCS soon had bigger problems, however. The federal government had begun investigating the agency, the Texas Legislature was worried, and in November, Dallas County voters approved disbanding the agency. A dissolution committee was set up to oversee the shutdown, sell off DCS assets, and pay off its debts.
In May 2018, BusPatrol filed suit against DCS and the dissolution committee. The suit alleges that Peters, the former DCS police chief, gave BusPatrol’s trade secrets to ATS. The complaint says that the camera system “run[s] on BusPatrol’s proprietary software” and that DCS’ actions allowed ATS, a competitor, to reverse-engineer the technology.
“I did nothing without [DCS administration] signing off,” Peters told The Texas Monitor. “We were having trouble getting Force Multiplier to help us handle the technology on these cameras, and ATS told us they might be able to make this work. They came here and asked for a couple of units, and [Mullins] said, ‘Send ‘em.’ ”
None of the parties involved would discuss terms of the expected settlement. However, Jean Souliere, CEO at BusPatrol, said the agreement will put the software “in the hands of people who will invest in it.”
“All the litigation that you’ve seen is BusPatrol trying to protect our intellectual property that we spent millions to acquire,” he said. “We had to make sure our program didn’t suffer from greedy, incompetent people who had their hands on some really good technology.”
The suit alleges that, using BusPatrol’s proprietary information, ATS intended to establish its own version of the program and then sell that to districts, cutting BusPatrol out of the process. However, state District Judge Eric Moye last monthdropped ATS from the lawsuit.
BusPatrol has taken its own share of criticism over the video system. The company was still sending out ticket notices to motorists as late as February, using letterhead from Texas towns where the system was still being used in buses.
However, the dissolution committee had told school districts in January that DCS has no contract with BusPatrol and that the company is not authorized to collect the money. The letter to districts also alleged that BusPatrol had removed cameras, which DCS said did not belong to the company, from some buses.
“The only time cameras were touched was to move them from old buses to new buses,” Souliere said.
Steve is a veteran journalist, who has previously worked at the Dallas Morning News and the Washington Times, as well as Texas Watchdog. His work has appeared in the Houston Press, Miami New Times, People Magazine, and High Times. He also travels the country writing true crime books. His work has won awards in national, regional, and state contests.
7 COMMENTS
Always remember, NHTSA data shows that 69% of the under-age-19 pedestrians killed in School Transportation Related Crashes from 1999 through 2016 were killed by the BUSES, not by passing cars. Stop arm cameras are almost entirely about money, not safety.
James C. Walker, National Motorists Association |
Home
Available to meet your needs, 24 hours a day!
Trinity Contractors knows how important it is to have your whole home working efficiently. We have been a trusted full-service provider specializing in Heating, Cooling, Plumbing, Electrical and General Construction service and repairs throughout Greater Birmingham and the surrounding area since 1981.
Residential Service
For residents of Birmingham area, heating services and air conditioning services from Trinity Contractors for trusted and reliable HVAC repairs. We don’t want you to have to wait for great heating services or AC services That’s why our service is free if you are ever kept waiting. Call (205) 655-5099 to receive a free estimate on new installation heating and air conditioner services.
Commercial Service
Trinity Contractors has been proudly serving Birmingham and the surrounding area since 1981. In doing so, we take great pride in our relationships within the community, as well as the quality of workmanship we
provide to each and every client regardless of th
e task at hand. We continuously strive to provide the ultimate in quality service with a responsive attitude, competitive pricing, and trustworthy service.
We understand that having everything in your business functioning correctly is critical, that’s why we are available 24/7 to ensure your business is fully operational. Call to schedule a service call now, 205-259-7203
Our Commercial Heating, Cooling, and Refrigeration (HVAC) Service Group is one of the most recognized, well respected and trusted names among Service Providers in the Greater Birmingham area.
We offer a wide variety of Commercial and Industrial Heating, Cooling and Commercial Refrigeration (HVAC) services to meet the needs of our clients throughout Birmingham and surrounding areas. Including, but not limited too,
We Offer The Following Services:
24/7 Emergency Services are Available
We know your time is valuable, so we want to meet your needs on your schedule. In addition, our Trussville office also offers same day services and 24/7 emergency services. Our emergency HVAC contractors also know that you don’t want to have to break the bank to get the service you need when you need it. With our Birmingham emergency HVAC contractors, you never have to pay overtime charges and you’ll always receive a free estimate on all services from emergency ac repair to heating system repair. |
Q:
Load image into memory immediately
I need to open all frames from Tiff image in WPF into memory and then delete the source. And after that I eventually need to render that image (resized according to window size). My solution is quite slow and I cannot delete file source before the first require. Any best practices?
A:
Use CacheOption = BitmapCacheOption.OnLoad
This option can be used with the BitmapImage.CacheOption property or as an argument to BitmapDecoder.Create() If you want to access multiple frames once the images is loaded you'll have to use BitmapDecoder.Create. In either case the file will be loaded fully and closed.
See also my answer to this question
Update
The following code works perfectly for loading in all the frames of an image and deleting the file:
var decoder = BitmapDecoder.Create(new Uri(imageFileName), BitmapCreateOptions.None, BitmapCacheOption.OnLoad);
List<BitmapFrame> images = decoder.Frames.ToList();
File.Delete(imageFileName);
You can also access decoder.Frames after the file is deleted, of course.
This variant also works if you prefer to open the stream yourself:
List<BitmapFrame> images;
using(var stream = File.OpenRead(imageFileName))
{
var decoder = BitmapDecoder.Create(stream, BitmapCreateOptions.None, BitmapCacheOption.OnLoad);
images = decoder.Frames.ToList();
}
File.Delete(imageFileName);
In either case it is more efficient than creating a MemoryStream because a MemoryStream keeps two copies of the data in memory at once: The decoded copy and the undecoded copy.
|
Surgical management of traumatic posterior urethral strictures in children.
We review our recent experience with the treatment of traumatic strictures of the posterior urethra in children. Five males, ages six to seventeen years with dense posterior urethral strictures, have required open reconstructive procedures. Four patients had injury secondary to pelvic fractures, and 1 patient had an iatrogenic injury from surgery for imperforate anus. Two patients were repaired perineally, 2 with a combination retropubic-perineal approach, and 1 patient required a transpubic approach. Excision and direct anastomosis was achieved in 3 patients, and a foreskin interposition tube graft was used in 2 patients. Excellent results were achieved with return of urethral voiding and preservation of continence in all patients. Complications were seen in 3 patients. One secondary internal urethrotomy was required. Erectile capability was preserved in all patients who were potent before surgery. Posterior urethral strictures in children can be successfully managed with a variety of surgical approaches. This experience demonstrates that the surgical procedure must be individualized depending on the anatomy of the injury. |
Dental anxiety, the parental family and regularity of dental attendance.
A survey was carried out among 25-yr-old inhabitants of Amsterdam in order to study the relationship between regularity of dental attendance on the one hand and dental anxiety, dental upbringing of the respondents, dental behavior of the parents, education, sex, and the interactions between these independents, on the other. The data were analyzed hierarchically with regression analysis, the logistic approach. Dental anxiety, sex, dental upbringing and the interaction between education and anxiety, in that order, were found to be of importance for the prediction of regularity of dental attendance. Two other terms, though lacking substantial standardized regression coefficients, namely education and the interaction between education and dental upbringing, are also present in the model found. The prediction of one being a regular attender is satisfactory, but the classification of the irregular attenders is disappointing. The effect is discussed of the rather large non-response and attention is given to the effect of dental upbringing in regard to coping resources in the dental situation. It has to be concluded that other factors must be included to achieve an improvement of the classification of the irregular attenders. Dental anxiety, although of importance, cannot account for an adequate differentiation between regular and irregular attenders. |
1. Field of the Invention
The present invention relates to a housing for a gun sight system, and more particularly to a housing for mounting an improved thermal imaging system which is especially designed to fit within the U.S. Army's M1A2 Main Battle Tank and other combat vehicles with little or no alteration.
2. Description of the Related Art
The M1A2 Abrams Main Battle Tank uses a thermal imaging gun sight system to control a 120 mm main gun. The conventional sight system operates in two modes through a lens system, one mode to be used in day time and the other mode to be used at night or when the battlefield is obscured. It was found during the fighting in and around Iraq in 1991, popularly referred to as "Desert Storm", that there was a need for increased performance of the gun sight system to allow improved targeting at greater distances. With a range of 3500 yards for the main gun, it can be appreciated that the need for a high performance gun sight system is substantial.
A new three field-of-view thermal imaging gun sight system has been developed by the Hughes Aircraft Company and is the subject of co-pending patent application filed herewith, Entitled "Thermal Imaging System For A Military Vehicle," Ser. No. 08/430,791, (Attorney Docket No. PD-95 124) the teachings of which are incorporated herein by reference. The new system incorporates a high 16.times. magnification telescope with the existing 3.times. and 10.times. telescope used in the current system. The 16.times. magnification capability represents more than a 30% increase in system performance compared to the existing 10.times. telescope.
A problem has been encountered in that the new sight system is required to fit within the confines of an existing M1A2 tank. The M1A2 tank includes an exterior viewing port mounted to the tank's turret immediately above the gunner's position inside the turret. Below the external viewing port is an internal housing which extends downwardly into the crew compartment and is fixed in place. A new gun sight system is required to mount within the internal housing and within the dimensional restrictions imposed by the interior of the tank's turret. Prior attempts to meet these constraints had serious shortcomings.
Hence, there is a need in the art for an improved housing to mount the new sight system within the existing confined spaces provided. There is also a need to reduce the chance of damage from handling of the sight system. Problems have been encountered with the existing sight system when it is removed from the tank for maintenance, repair or replacement. The housing to which the system is attached requires a special jig for its support at a work bench or in the field.
There are also problems with the existing housing in relation to the ease by which a gunner is able to operate the controls of the sight system. Again, these problems are caused by the confined spaces within a crew compartment and also by the stress induced by combat.
Also, the sighting system is a very complicated and sophisticated instrument which must be carefully aligned with the tank's turret and thereby the main gun mounted to the turret. There is a need to provide for fine alignment adjustments. In addition, the importance of high optical performance and the cost of tanks and other military vehicles mandate a retrofit of existing vehicles. However, as mentioned, a practical problem facing the manufacturer of a thermal imaging system is that any new system must conform within the aperture and dimensionality constraints or "form factor" of the vehicles. This problem has been addressed by the use of a multiple field of view optical arrangement by which different sets of lens are substituted within the housing depending on the desired range or field of view.
Unfortunately, this requires the user to manually replace one set of lenses with the other and also possibly requires the manual focusing (compensation) thereof.
Accordingly, what is needed is an improved thermal imaging system that affords various powers of magnification and fields of view within conventional form factor constraints which has an automatic focus compensation. |
Les données personnelles de dizaines de millions d’électeurs américains ont été aspirées sur Facebook par une entreprise proche de Donald Trump chargée de cibler au maximum la campagne du candidat républicain à l’élection présidentielle. Le tout, dans la majorité des cas, sans le consentement des utilisateurs du réseau social.
Une grande partie de cette histoire était déjà connue, mais deux enquêtes du Guardian et du New York Times, publiées samedi 17 mars, apportent de nouveaux détails sur la manière dont l’entreprise Cambridge Analytica et ses sous-traitants ont procédé pour construire cette gigantesque base de données.
Tout commence à la fin de 2013, lorsque la maison mère de Cambridge Analytica, la firme britannique Strategic Communication Laboratories (SCL), cherche à se lancer dans les campagnes électorales et, plus précisément, explorer comment utiliser les caractéristiques psychologiques des électeurs pour les influencer. L’entreprise manque alors de données et s’adjoint les services d’Aleksandr Kogan, un chercheur de l’université de Cambridge (Royaume-Uni) qui a travaillé sur ces questions.
Une application virale
Celui-ci construit une application Facebook, appelée « thisisyourdigitallife », qu’il présente au réseau social comme étant destinée à une étude académique. Cette dernière comporte un questionnaire et nécessite que l’utilisateur soit connecté à la plate-forme et inscrit sur les listes électorales états-uniennes pour le remplir. M. Kogan, par le truchement de sa société Global Science Research (GSR), rémunère plusieurs centaines de milliers d’internautes pour y répondre. Ces derniers, outre leurs réponses au questionnaire, donnent à l’application l’accès à un grand nombre de leurs données personnelles présentes dans leur compte Facebook. De surcroît, l’application tire parti d’une fonctionnalité du réseau social, désactivée depuis, qui lui permet d’aspirer aussi des données personnelles appartenant aux contacts des utilisateurs répondant au questionnaire.
GSR a ensuite transmis ces données à SCL et à Cambridge Analytica, permettant de créer une base de données de plusieurs dizaines de millions d’utilisateurs, dont une bonne partie d’électeurs américains. L’ampleur précise de ce fichage reste inconnue : selon le Guardian, ce sont 50 millions d’utilisateurs dont les données ont été aspirées. Selon le New York Times, ils seraient 30 millions. Cette grande quantité de contacts, associés à d’autres données, est allée nourrir les algorithmes de Cambridge Analytica, qui se vante de pouvoir construire un profil psychologique et politique à partir de données personnelles anodines laissées en ligne.
Le rôle exact de cette entreprise dans la campagne de Donald Trump, qui a fait l’objet de déclarations contradictoires y compris de la part de ses propres dirigeants, demeure flou. Elle est arrivée en août 2016 dans les bagages de Stephen Bannon, qui en était un investisseur et le vice-président, lorsqu’il a été nommé directeur de campagne du magnat américain. Selon le New York Times, la campagne de Trump a utilisé les données de Cambridge Analytica pour cibler des populations à toucher avec de la publicité électorale, effectuer des simulations de participation à l’élection, déterminer les régions où les déplacements de Trump seraient les plus efficaces… Dans un communiqué, Cambridge Analytica s’est défendue de « détenir ou d’utiliser des données issues de Facebook » et assure qu’elle a supprimé les données fournies par GSR sitôt leur provenance connue.
Des données personnelles conservées
Cette affaire est extrêmement embarrassante pour Facebook. Vendredi 16 mars, quelques heures avant la mise en ligne des articles du Guardian et du New York Times, Facebook a annoncé qu’il suspendait Cambridge Analytica et SCL de sa plate-forme. En réalité, le réseau social sait depuis la fin de 2015 et les premiers articles dans la presse que des données de ses utilisateurs ont été siphonnées sous un prétexte académique, avant d’être revendues pour une campagne politique.
A l’époque, Facebook avait expliqué « enquêter avec soin » sur ces allégations, mais s’était contenté de suspendre l’application et de réclamer aux protagonistes de l’affaire qu’ils suppriment les données collectées. Sauf que, selon le Guardian, Facebook ne s’est jamais assuré qu’ils s’en étaient effectivement débarrassés. Le New York Times révèle que ces données étaient encore, jusqu’à une date très récente, entre les mains de Cambridge Analytica.
Le plus grave pour Facebook est que cette affaire prouve une nouvelle fois que sa plate-forme peut être utilisée à des fins politiques, à son insu et à celui de ses utilisateurs. Il y a quelques semaines, le procureur spécial Robert Mueller, chargé de l’enquête sur l’ingérence russe dans l’élection présidentielle de 2016, a montré dans un document d’inculpation comment la propagande russe avait utilisé Facebook pour diffuser ses messages.
Ces nouveaux détails donnent de solides arguments à ceux qui voudraient davantage réguler Facebook. Le sénateur démocrate Mark Warner, qui a, ces derniers mois, longuement auditionné les principaux réseaux sociaux, a estimé sur Twitter qu’« il était clair que, sans régulation, ce marché serait enclin à la tromperie et au manque de transparence ». Sa collègue Amy Klobuchar, également démocrate, a réclamé que le patron de Facebook, Mark Zuckerberg, soit auditionné, tandis que la procureure générale du Massachusetts, Maura Healey, annonçait le lancement d’une enquête. La plate-forme américaine doit répondre à « d’importantes questions » a, pour sa part, estimé Adam Schiff, le principal démocrate à la commission sur le renseignement de la Chambre des représentants.
Cambridge Analytica, dont le rôle dans la campagne du Brexit fait déjà l’objet d’une enquête, est en outre visée par une enquête de l’Information Commissioner’s Office (ICO), l’autorité britannique de protection des données personnelles. Les parlementaires britanniques aimeraient avoir de nouvelles explications de la part de Facebook, notamment Damian Collins, à la tête de la commission parlementaire sur le numérique et les médias. « Il est temps que Mark Zuckerberg cesse de s’abriter derrière sa page Facebook », a déclaré le député conservateur. |
These are pretty complicated questions. What it means to be poor is a lot different than what it was to be poor in the past (or what it means in other countires). Starvation isn’t nearly as much of an issue here as it used to be (or as it is in africa) but nutrition is still a major issue relating to poverty in the U.S.
An item like a television that was once out of reach to the poor is now much more affordable but at the same time, you can now buy a tv for the cost of one uninsured trip to the doctors office for your child. Health care is completely out of reach for the poor (other than via medicare/medicaid).
Similarly, education has gotten so expensive that it is essentially impossible for a poor person to go to college/grad school without a scholarship or some other financial assistance. Lack of educational opportunities has to be one of the greatest obstacles for poor people trying to dig themselves out of poverty.
I’ll add one more observation. I think it is very legitimate/important to explore ways in which to help those who are poor rise up out of poverty without rewarding bad behavior. What I don’t agree with are attempts to assure the haves in america that the have nots brought it upon themselves.
1. As a political scientist I say that on issues of wealth, everything is relative. Someone living like a relatively well off third world villager in the US would have a totally different experience of his or her material conditions. One reason for social welfare programs is to maintain social stability (prevent a revolt, high crime, etc.) Relative poverty drives political discontent and crime. So poverty is necessarily relative.
2. As a general rule, government should not “care for” the poor, but work to help the poor help themselves. That means access to quality education, health care, the same legal and social protections, and opportunities for children. For those with problems now, I’d argue that it should not be government giving to the poor, but a partnership. I’d prefer social welfare be based on community organizing, whereby recipients are required to give something back in terms of community building and service. In some cases that will be impossible, but building community is a way to help a group of people develop social conditions to improve their lives and better model how to succeed to children. 2a. Those who do not choose to participate in this should not get more than the basics (education, health care, police/fire protection), and if they have children, they may lose them.
3. Compel to work? I’d say the above at least makes aid contingent on work, as these community building activities will often involve real work (and can include day care providing and other services as well).
This would be a whole new model of social welfare, but one I think would actually succeed in liberating the poor from a cycle of on going poverty and create conditions whereby the children will better learn through community organizing. The community organizer should be the most important figure in combating poverty.
I may or may not agree. However, if we are determining poverty to be “relative” we must acknowledge that we will always have “the poor”. There will always be a gradient from richest to poorest.
Whatever goal our program has in mind ought keep that in mind.
As a general rule, government should not “care for” the poor, but work to help the poor help themselves. That means access to quality education, health care, the same legal and social protections, and opportunities for children.
I agree. And, to be fair, don’t think is a common theme coming from the Left and speaks well to your centrist beliefs.
Those who do not choose to participate in this should not get more than the basics (education, health care, police/fire protection), and if they have children, they may lose them.
I am fine with the idea of the individualist “native who shuns society and gets eaten by the lion.
I have also toyed with the concept that perhaps we need to license parenthood.
This would be a whole new model of social welfare, but one I think would actually succeed in liberating the poor from a cycle of on going poverty and create conditions whereby the children will better learn through community organizing.
I think that aid should be contingent upon work as well. Put those on the receiving end to labor and they would quickly find better labor.
1. I’m more concerned with things needed to live than relative wealth. As I think we’ve discussed before, I used to say, “I don’t care one iota about inequality, I care about how many people live in poverty.” But there’s a cascade of studies showing that inequality has a whole bunch of other bad effects, so I don’t say that anymore.
2. I don’t see the policy relevance of someone who chooses to live in poverty. If there’s a showing that this is a common enough choice that we have to design policy accordingly, let’s deal with it, but I haven’t seen that.
3. I don’t understand what you’re getting at here; sorry. What is the relevance of these “pure socialist” societies you’re talking about to policy in the US?
I’m more concerned with things needed to live than relative wealth. As I think we’ve discussed before, I used to say, “I don’t care one iota about inequality, I care about how many people live in poverty.” But there’s a cascade of studies showing that inequality has a whole bunch of other bad effects, so I don’t say that anymore.
Hmm…I don’t know if I understand the answer.
It sounds kinda like both. Can you explain further?
If there’s a showing that this is a common enough choice that we have to design policy accordingly, let’s deal with it, but I haven’t seen that.
I used to live in Seattle and worked downtown. Like, RIGHT downtown. We were a Cajun joint that sold Cajun food; beans and rice and bread. Cheap stuff. Pioneer Square became a neighborhood community of types for me. I would “hire” the street to “clean my windows” or “wash my tires”. Many many time I would “hire” the guy to move the stacks of beer from here to there. Then, after having someone sweep, I would hire someone new to move the beer back.
Often I would take my dinner out to the corner and bring with me much extra food. I had homeless friends, we called them “Papa” and “Grandpa”. We smoked, drank and ate on that street corner. When grandpas went to the hospital my and my buddy would go visit him. To the staff’s credit, when they asked us if we were family, we said “we’re all he’s got” and they let us in.
I offered “Papa” full access to my resources. My apartment, my address, my phone whatever. I’d help him write a resume, buy clothes, get a haircut…..
He simply looked at me and said, “Why would I wanna do that? I have everything I want here.”
He wasn’t mentally ill. He was sharp and witty and present. He just decided on a different life.
In Seattle, I got the feeling that there were more than just a few of people like him.
What is the relevance of these “pure socialist” societies you’re talking about to policy in the US?
I am convinced that there are enough people who think that we should flat out redistribute income. I wanna tickle that concept out some. |
Everybody's Crying Mercy
- text
I can't believe the things I've seen
I wonder bout some things I've heard
Everybody's crying mercy
When they don't know the meaning of the word
A bad enough situation
Is sure enough getting worse
Everybody's crying justice
Just as long as there's business first
Toe to toe
Touch and go
Give a cheer
Get your souvenier
People running round in circles
Don't know what they're headed for
Everybody's crying peace on Earth
Just as soon as we win this war
Straight ahead
Knock em dead
Pack your kid
Choose your hypocrite
Well you don't have to go to off broadway
To see something played absurd
Everybody's crying mercy
When they don't know the meaning of the word
Nobody knows the meaning of the word
When they don't know the meaning of the word
Nobody knows the meaning of the word (x2) |
Please handle this. Call me with any questions.
---------------------- Forwarded by Mary Hain/HOU/ECT on 01/08/2001 02:21 PM
---------------------------
Alan Comnes
12/29/2000 06:58 AM
To: Mary Hain/HOU/ECT@ECT
cc:
Subject: CAISO Notice: Additional Public Record Act request for informatio n
provided by the ISO to the CPUC
Mary,
Any direction you can provide on how to handle would be appreciated. I think
any response is due 1/10.
GAC
---------------------- Forwarded by Alan Comnes/PDX/ECT on 12/29/2000 06:58
AM ---------------------------
Susan J Mara@ENRON
12/28/2000 12:25 PM
To: Sarah Novosel/Corp/Enron@ENRON, Richard B Sanders/HOU/ECT@ECT, Alan
Comnes/PDX/ECT@ECT, mday@gmssr.com, gfergus@brobeck.com
cc:
Subject: CAISO Notice: Additional Public Record Act request for informatio n
provided by the ISO to the CPUC
Here is another one. Pklant to send any letters re this one -- mary hain had
done so in the past, I believe.
----- Forwarded by Susan J Mara/NA/Enron on 12/28/2000 12:22 PM -----
"Fuller, Don" <DFuller@caiso.com>
Sent by: "Happ, Susan" <SHapp@caiso.com>
12/27/2000 04:53 PM
Please respond to "Sole, Jeanne"
To: ISO Market Participants
<IMCEAEX-_O=CAISO_OU=CORPORATE_CN=DISTRIBUTION+20LISTS_CN=ISO+20MARKET+20PARTI
CIPANTS@caiso.com>
cc:
Subject: CAISO Notice: Additional Public Record Act request for informatio n
provided by the ISO to the CPUC
Market Participants and Scheduling Coordinators:
On December 19 the CPUC received a second Public Record Act request for
information provided by the ISO to the CPUC which may include information
subject to ISO tariff section 20.3. This request was forwarded to the ISO
today by the CPUC. Attached please find the Public Record Act request and
the letter from the CPUC providing that any comments from the ISO regarding
the request must be submitted to the CPUC by no later than January 10, 2001.
Market Participants wishing to provide comments to the CPUC on the request
should submit such comments directly to the CPUC in accordance with the
instructions in the attached December 27 letter from the CPUC.
Jeanne M. Sol,
Regulatory Counsel
California ISO
(916) 608-7144
____________________________________________________________________________
_______________________________________
The Foregoing e-Mail Communication (Together With Any Attachments Thereto)
Is Intended For The Designated Recipient(s) Only. Its Terms May Be
Confidential And Protected By Attorney/Client Privilege or Other Applicable
Privileges. Unauthorized Use, Dissemination, Distribution, Or Reproduction
Of This Message Is Strictly Prohibited. |
2*sqrt(3)) + sqrt(9) + sqrt(9)*-2*-4))**2.
10944/289
Simplify (-3 + (sqrt(128) - (1 + sqrt(128) - sqrt(128))) + 4)**2 + (sqrt(128) + -2*sqrt(128) + -4 - (-2 + -2*sqrt(128)))**2 + -5.
-32*sqrt(2) + 255
Simplify (sqrt(256) + sqrt(256)*-2)/(sqrt(6)/sqrt(3)*5) - (sqrt(2) - (sqrt(32) + 0)**2 - sqrt(14)/(sqrt(35)/sqrt(5))).
-8*sqrt(2)/5 + 32
Simplify (((sqrt(209) + (sqrt(209) + -2*sqrt(209))*-3 + sqrt(209))*4)/((4*2*sqrt(66))/sqrt(6)))**2.
475/4
Simplify -1 + -1 + sqrt(11) + sqrt(11) + sqrt(11)*-1*6 + (-3*(sqrt(396) + 0 + sqrt(396) + sqrt(396)) + sqrt(396) - sqrt(396))**2.
-4*sqrt(11) + 32074
Simplify 0 + ((sqrt(144)/sqrt(3))/sqrt(2))/(-2*sqrt(48)).
-sqrt(2)/4
Simplify ((sqrt(30) + sqrt(270))/sqrt(10))**2*6 + sqrt(216)/sqrt(8) + sqrt(21)/(-1*sqrt(7)).
2*sqrt(3) + 288
Simplify sqrt(171)/(6*sqrt(144)) - (1*sqrt(19)*-2 - (sqrt(304) - (sqrt(304) + 1) - sqrt(19))).
-1 + 25*sqrt(19)/24
Simplify ((sqrt(792)*-2 + sqrt(792) + sqrt(792) + sqrt(792))/sqrt(11) - (-2 + sqrt(72) + 3))**2.
1
Simplify -3 + (2 + sqrt(1100)*3 - (sqrt(1100) + sqrt(1100) + (-5 + 5*sqrt(1100))**2)).
-27526 + 510*sqrt(11)
Simplify (sqrt(20)/(sqrt(16)/sqrt(4)) + 4 - -3*-1*sqrt(5)*-6)**2*-6.
-10926 - 912*sqrt(5)
Simplify ((sqrt(52) - 6*sqrt(208)) + (2*sqrt(468) - sqrt(468)) + -1)**2 + -5.
32*sqrt(13) + 3324
Simplify 5 + 0 + sqrt(11)*1 + 4 + (1 + -1 + sqrt(1331) + -1)**2.
-21*sqrt(11) + 1341
Simplify -2 + (sqrt(76) + -1*(sqrt(76) + 3*sqrt(76)))/(4*sqrt(144) + sqrt(144)).
-2 - sqrt(19)/10
Simplify (3*(sqrt(99)*2 + sqrt(99))*-5)/(4*sqrt(18)/(sqrt(6)/sqrt(3))).
-45*sqrt(11)/4
Simplify 1*sqrt(143)/(sqrt(121)/(5*sqrt(11) + sqrt(11)))*5.
30*sqrt(13)
Simplify (sqrt(768)*-1 + -4 + 4*sqrt(768)*-2)**2.
1152*sqrt(3) + 62224
Simplify (-1*(1 + 5 + 3*sqrt(8) + 5 + 4))**2.
180*sqrt(2) + 297
Simplify 1*((sqrt(153) - 3*sqrt(153)) + -3) - (sqrt(153) + (0 + sqrt(153))*-2 + -2 + (sqrt(153) + 0 - sqrt(153)) + sqrt(153)).
-6*sqrt(17) - 1
Simplify -1 + (sqrt(539) + -1)**2 + -3 - -3*(sqrt(539) + sqrt(539) + (sqrt(539) - ((4 + 2*sqrt(539) + sqrt(539))**2 - sqrt(539)))).
-14065 - 434*sqrt(11)
Simplify ((sqrt(84)/sqrt(4)*5*5)/((sqrt(140) + sqrt(35) + sqrt(35))/sqrt(5) + sqrt(7) - 4*sqrt(7)*1))**2.
1875
Simplify (-4 + -5 + sqrt(77)/((sqrt(110) + sqrt(110) + sqrt(110)*1 + sqrt(110))/sqrt(10)))**2.
-9*sqrt(7)/2 + 1303/16
Simplify -2 + -6*(sqrt(7) + sqrt(49)/sqrt(28) + 6*(sqrt(7) + sqrt(28)/sqrt(4)))**2 + -3.
-15319/2
Simplify (-2*2*sqrt(104))/((sqrt(32)*-1)/sqrt(4)) + -1.
-1 + 4*sqrt(13)
Simplify (sqrt(20) + sqrt(320)*5 + -2)**2 + 0.
-168*sqrt(5) + 8824
Simplify (-3*(sqrt(112) + 0)*-6 + -4)**2.
-576*sqrt(7) + 36304
Simplify ((sqrt(891) + (1 + sqrt(891))*2 - sqrt(891)) + -3 - (sqrt(2200) + (sqrt(2200) - sqrt(2200)*1) + sqrt(2200) + sqrt(2200))/(sqrt(6)/sqrt(3)*-6))**2.
-46*sqrt(11) + 5820
Simplify (-5*sqrt(57)/sqrt(3))**2*-5*5 - ((sqrt(152)/(sqrt(24)/sqrt(3)) - (2 + sqrt(57)/sqrt(3))) + 5).
-11878
Simplify -5 + 3 + sqrt(147) + (sqrt(147) + -1)*2 + 5*(-1 + sqrt(147)).
-9 + 56*sqrt(3)
Simplify (-5 + -5 + 0 + sqrt(1300) + 1*sqrt(1300)*6 + 1 + (sqrt(1300) - (0 + sqrt(1300))))**2.
-1260*sqrt(13) + 63781
Simplify (((sqrt(2106) + sqrt(2106)*2 - sqrt(2106) - sqrt(2106)) + sqrt(2106))*6)/(sqrt(18) + (sqrt(1800) - 3*sqrt(1800))).
-36*sqrt(13)/19
Simplify (6*(1 + sqrt(448)) + sqrt(448) + 1*(sqrt(448) + (sqrt(448)*2 - sqrt(448))) + -3*(sqrt(448) + -1 + sqrt(448))*-4 + 2)**2.
-2112*sqrt(7) + 487888
Simplify -3*(sqrt(68) + sqrt(68)*-1*6) + ((sqrt(68) - (1 + sqrt(68) + -4)) + sqrt(68))**2 + sqrt(68) + 2.
79 + 44*sqrt(17)
Simplify -5 + 4 + -4 + sqrt(336)/(sqrt(7) + sqrt(28) - sqrt(7)).
-5 + 2*sqrt(3)
Simplify -5 + (0 + sqrt(2299))**2 + sqrt(2299) + (sqrt(2299) + 1 - sqrt(2299))*1 - ((sqrt(2299) + -2)*1 + sqrt(2299) + (sqrt(2299)*-2 + 3 - sqrt(2299))**2).
-18403 + 187*sqrt(19)
Simplify (sqrt(204)/(sqrt(600)/sqrt(2)) + sqrt(833) + 1 + 3)**2.
288*sqrt(17)/5 + 22432/25
Simplify (sqrt(495) + -2*sqrt(495) - sqrt(55))/(sqrt(5) + sqrt(245)*5)*2.
-2*sqrt(11)/9
Simplify (5*(-1 + sqrt(180) + 1 + (sqrt(180) - (sqrt(180) + 2)) + 5 + 1))**2.
1200*sqrt(5) + 4900
Simplify sqrt(4)/sqrt(2) + 5 + ((-1*sqrt(20))/sqrt(10) - sqrt(2)) + (5 + (sqrt(72) + 3 + sqrt(72) - sqrt(72)))**2.
95*sqrt(2) + 141
Simplify (sqrt(156) - (sqrt(156) - 4*sqrt(156))*4)/(sqrt(972)*-1) + -4.
-13*sqrt(13)/9 - 4
Simplify 2*sqrt(260)/sqrt(45) + 2.
2 + 4*sqrt(13)/3
Simplify (-6*-3*sqrt(10))/(sqrt(200)*5 + sqrt(200)).
3*sqrt(5)/10
Simplify ((3*(5 + sqrt(19)) - (2 + sqrt(475))) + 5)**2*2.
-144*sqrt(19) + 800
Simplify ((-5 + 4 + (sqrt(1331) - 2*sqrt(1331)*-2))*-4)**2*-4.
-2129664 + 7040*sqrt(11)
Simplify -6*(-2*(-2*((sqrt(425)*1 - sqrt(425)) + sqrt(425)) + (sqrt(425)*1 + -1 - sqrt(425))))**2.
-40824 - 480*sqrt(17)
Simplify ((sqrt(700) + 1 + sqrt(700))*6 + (-2*sqrt(504) + sqrt(504) - sqrt(504))/sqrt(8))**2*2.
2736*sqrt(7) + 182016
Simplify 4*(1*(sqrt(30) - sqrt(30)*-1))/(-2*-1*sqrt(6) - sqrt(6))*2.
16*sqrt(5)
Simplify (-2 + (sqrt(54)/sqrt(2)*-1 - (3 + sqrt(108)/sqrt(4))))**2.
60*sqrt(3) + 133
Simplify 2*4*(sqrt(11) + (sqrt(110) + sqrt(110)*-1)/sqrt(10))**2 - (-1 + sqrt(891)*-1)*-1.
-9*sqrt(11) + 87
Simplify ((sqrt(525) + sqrt(525)*1 - 1*sqrt(2541))/((sqrt(7) + (6*(sqrt(7) - sqrt(7)*1) - sqrt(7)) - sqrt(7)) + sqrt(7) - sqrt(1008)*1))**2.
1/48
Simplify (((sqrt(7) + sqrt(28)/(sqrt(20)/sqrt(5)))*5)**2 - ((sqrt(7) + (2*sqrt(7)*-3 - sqrt(7))**2 - sqrt(7)) + (-1*sqrt(448))**2 + sqrt(448)))*2.
-182 - 16*sqrt(7)
Simplify (-4 + -4*sqrt(320)*-1)*5.
-20 + 160*sqrt(5)
Simplify -5*(-3 + (sqrt(2736) - -4*(-2 + sqrt(2736))) + 0).
-300*sqrt(19) + 55
Simplify (5*(((sqrt(102) - (sqrt(102) + 1*sqrt(102))) + sqrt(102))*-4 - sqrt(102)))/(6*-1*sqrt(6)*-5) + 5.
-sqrt(17)/6 + 5
Simplify 1*sqrt(68) + 4 - sqrt(68) - (sqrt(68) - (4 + sqrt(68) + -4)).
4
Simplify sqrt(1872)*-3*2 + ((sqrt(1573) + 2)**2 + 1 - sqrt(1573)).
-39*sqrt(13) + 1578
Simplify (-3 + -1*sqrt(891) + -5 + 0 + 4)**2.
72*sqrt(11) + 907
Simplify -6*sqrt(68)*-2 + 4 - (-4 + -1 + sqrt(68) - sqrt(68)*2*-5)**2.
-8249 + 244*sqrt(17)
Simplify ((-1*sqrt(228)*-2 - sqrt(228))*-2)/(sqrt(48)/sqrt(4)*-1 + sqrt(768)*-2).
2*sqrt(19)/17
Simplify ((-4*sqrt(216) + (sqrt(72) + (sqrt(72) - sqrt(72)*-2) - sqrt(72))/sqrt(3))/(4*(2*sqrt(72) + sqrt(72))))**2.
3/16
Simplify 3*(-3*sqrt(19) + 4 - sqrt(19)) - (-6*sqrt(304) + 4).
8 + 12*sqrt(19)
Simplify sqrt(35)/(sqrt(7) - sqrt(28)*4) + 2 + (sqrt(1225) - sqrt(1225)*2)/((sqrt(10)/sqrt(2) + sqrt(5))*2 - sqrt(5)).
-52*sqrt(5)/21 + 2
Simplify ((sqrt(1008) + -2*sqrt(1008))*6 + sqrt(1008) + 2 + sqrt(1008)*-2)**2 - -5*((sqrt(63) + 0)**2 + 3).
-336*sqrt(7) + 49726
Simplify (3*(-1 + sqrt(68) - sqrt(68)) + 5)**2 - (3 + -3*sqrt(68) + 2).
-1 + 6*sqrt(17)
Simplify (sqrt(180)*-3 - sqrt(180)) + 3 + (sqrt(20)*-1)**2*1.
-24*sqrt(5) + 23
Simplify 5*sqrt(104)/sqrt(2) + 3*(sqrt(13) + (sqrt(13) - sqrt(52)*6)).
-20*sqrt(13)
Simplify (sqrt(96)*-2 + -2*sqrt(48)/sqrt(2))/((-1*sqrt(1152) - sqrt(1152))*3).
sqrt(3)/12
Simplify -6*(sqrt(2736)*-1 - (sqrt(304) + sqrt(304)*-1)**2 - (1 + (sqrt(190)*1)/sqrt(10))).
6 + 78*sqrt(19)
Simplify (-3*(-3 + sqrt(35)/(sqrt(7) - (sqrt(7) + -5*sqrt(28) + sqrt(7))) + 3) + -4)**2.
8*sqrt(5)/3 + 149/9
Simplify (1*sqrt(153)/(3*sqrt(9)) + 6*(3*sqrt(17) - sqrt(17) - sqrt(17))*2)**2.
23273/9
Simplify 2*sqrt(2)*2*-3 + -1 + ((sqrt(24)/sqrt(3))/sqrt(4))**2.
-12*sqrt(2) + 1
Simplify -4 + -2 + sqrt(12) - -4*sqrt(27)*-6.
-70*sqrt(3) - 6
Simplify -3*(1*sqrt(2057))**2 + (-3*sqrt(17)*-2 - -2*sqrt(1377)).
-6171 + 24*sqrt(17)
Simplify -1*(5*(5 + sqrt(99)*1))**2.
-3100 - 750*sqrt(11)
Simplify ((-1*-1*sqrt(114)*-1)/(sqrt(384) - sqrt(384)*-2*2))**2.
19/1600
Simplify (-6*(sqrt(192)*-1)**2 - (sqrt(192) + 4 + (sqrt(192) - (-1 + sqrt(192)))))*-4.
32*sqrt(3) + 4628
Simplify 1 + (sqrt(77)/(sqrt(1331) - (sqrt(1331) + (sqrt(1331) - 5*sqrt(1331)))) - (2 + sqrt(77)/(sqrt(44)/sqrt(4)))).
-43*sqrt(7)/44 - 1
Simplify (-1 + sqrt(176) + 1 - sqrt(176))**2 - (2*sqrt(539))**2*-5.
10780
Simplify 2*(sqrt(76) + (sqrt(76) + -1*sqrt(76)*3 - sqrt(76) - sqrt(76)))/(-5*sqrt(4)*-3).
-2*sqrt(19)/5
Simplify ((sqrt(660)/(sqrt(11) + sqrt(55)/sqrt(5)))/sqrt(12) - (sqrt(315)/(sqrt(42)/sqrt(6)))/sqrt(9))**2.
5/4
Simplify ((sqrt(110) + sqrt(110)*4 - sqrt(110))*2*4)/(((sqrt(40) - sqrt(40)*1) + sqrt(10))*2).
16*sqrt(11)
Simplify (5*(sqrt(39) - sqrt(156)*3))/(sqrt(24)/(-3*sqrt( |
This question came in response to The case for dividing classes by belt rank, given my flexible stance on “the basics.”
Q: Does your new approach to divided classes change your “anything can be a fundamental technique” stance? Thanks–I’m appreciating that you’re making your expertise so available to the community.
A: The divisions between classes have less to do my philosophy about basic versus advanced techniques and more to do with the right way of teaching and structuring classes for different kinds of students. Even if I think all good techniques, even “advanced” ones, have their own fundamentals, it doesn’t mean I teach just any moves to beginners. Certain techniques are more appropriate for new students, and more importantly, certain ways of running classes are better for beginners. The same is true of advanced students.
What may help you understand what I mean is if I explain how we run our classes at Gracie Barra Clearwater. This is in line with how Gracie Barra HQ is organizing all of their schools.
Fundamental class: These classes are open to all belt levels, but they are especially good for new white belts. In these classes, the focus is on core BJJ techniques with an emphasis on self defense. These moves tend to require less exact timing, finesse and strategy, traits beginners aren’t expect to have yet. For live training, students do positional sparring (from the positions learned that day) rather than free sparring, since this focuses their attention and prevents injuries (fewer reckless scrambles).
Advanced class: Open to three stripe white belts and higher. In these classes, the emphasis shifts to sport BJJ techniques, though some self defense is still covered. An example of this would be in teaching two versions of a double leg takedown, one for a grappling tournament (breaking gi grips, penetration step with knee touching the ground), and the other for a street fight (defending punches while shooting, not dropping your knee to the cement). These classes also do positional sparring, but they get to do free sparring too.
Black belt class: Open to blue belts and higher. In these classes, the instructor is free to cover any topic he wants, since he doesn’t have to worry about beginners being confused or left behind. These classes feature more takedowns, more combinations, deeper strategy, and harder conditioning. Like always, positional sparring is used (since it’s just a good training method) but much more free sparring and competition style sparring is done.
When we first switched to this class structure, I spoke to the classes about how the purpose was to give students the right type of training for where they are in their development, and not to “hide” techniques from them. BJJ doesn’t have any true “secret” moves, and that’s something I’ve always liked. To have “black belt only” moves, you have to either not spar (so no one ever sees the move, and you can’t really know if it works), or you have to kill everyone who sees it (which makes you a true kung fu master). We show everything we know in BJJ, and it’s our depth of understanding and our training methods that make our knowledge valuable.
As an instructor, I could easily teach “the same” moves at all three classes, but what would be different is the depth to which I expect each group to understand it.
Let’s take butterfly guard as an example. In the beginners class, I would expect them to be working on the good habits of sitting up, getting underhooks, keeping their hooks alive, and doing a simple hook sweep.
In the advanced class, I would cover this too, but expect people to already have a decent grasp of the positioning, allowing me to go into more detail on the sweep, and show simple combinations for when that sweep is countered.
In the highest level class, I wouldn’t need to worry as much about the positioning or the basic sweeps, allowing me to show combinations and attacks that need timing and awareness that I wouldn’t expect a beginner to have.
Hopefully that explains my stance well enough. If not, send in more questions or debate in the comments below! |
The last time the State Department issued a comparable worldwide terror alert, the majority of US embassies in the Muslim world were promptly evacuated and a few weeks later the Syrian false flag affair was unleashed upon the world. One wonders just what provocation John Kerry has in mind this time.
STATE DEPT ISSUES NEW WORLWIDE CAUTION ON TERRORIST THREATS
STATE DEPT SAYS AMERICANS MUST BE VIGILANT WHILE TRAVELING
STATE DEPT DETAILS POSSIBLE THREATS IN EUROPE, ASIA, AFRICA
At least the evil terrorizers have not infiltrated the Arctic circle yet. As for the always convenient scapegoat:
STATE DEPT SAYS AL-QAEDA PLOTTING IN MULTIPLE REGIONS
They sure are: mostly in Syria, but luckily they are now armed with US weapons.
In the meantime, be afraid. Be very afraid.
* * *
Full Statement:
Bureau of Consular Affairs
Washington, DC 20520
Worldwide Caution
September 25, 2013
The Department of State has issued this Worldwide Caution to update information on the continuing threat of terrorist actions and violence against U.S. citizens and interests throughout the world. U.S. citizens are reminded to maintain a high level of vigilance and to take appropriate steps to increase their security awareness. This replaces the Worldwide Caution dated February 19, 2013, to provide updated information on security threats and terrorist activities worldwide.
The Department of State remains concerned about the continued threat of terrorist attacks, demonstrations, and other violent actions against U.S. citizens and interests overseas. Current information suggests that al-Qa'ida, its affiliated organizations, and other terrorist groups continue to plan terrorist attacks against U.S. interests in multiple regions, including Europe, Asia, Africa, and the Middle East. These attacks may employ a wide variety of tactics including suicide operations, assassinations, kidnappings, hijackings, and bombings.
Extremists may elect to use conventional or non-conventional weapons, and target both official and private interests. Examples of such targets include high-profile sporting events, residential areas, business offices, hotels, clubs, restaurants, places of worship, schools, public areas, shopping malls, and other tourist destinations both in the United States and abroad where U.S. citizens gather in large numbers, including during holidays.
In early August 2013, the Department of State instructed certain U.S. embassies and consulates to remain closed or to suspend operations August 4 through August 10 because of security information received. The U.S. government took these precautionary steps out of an abundance of caution and care for our employees and others who may have planned to visit our installations.
U.S. citizens are reminded of the potential for terrorists to attack public transportation systems and other tourist infrastructure. Extremists have targeted and attempted attacks on subway and rail systems, aviation, and maritime services. In the past, these types of attacks have occurred in cities such as Moscow, London, Madrid, Glasgow, and New York City.
EUROPE: Current information suggests that al-Qa'ida, its affiliated organizations, and other terrorist groups continue to plan terrorist attacks against U.S. and Western interests in Europe. Additionally, there is a continuing threat in Europe from unaffiliated persons planning attacks inspired by major terrorist organizations but conducted on an individual basis. On February 1, 2013, an individual detonated a bomb at a side entrance to the U.S. Embassy in Ankara, killing one Embassy guard and injuring others. The Revolutionary People's Liberation Party/Front (Devrimci Halk Kurtulus Partisi/Cephesi or DHKP/C) claimed responsibility on its website for the attack. The DHKP/C has stated its intention to commit further attacks against the United States, NATO, and Turkey. In May 2013, in London, two Islamic extremits, unaffiliated with any group, killed a British soldier. The reported reason for the attack was to avenge the deaths of Muslims killed by British soldiers. European governments have taken action to guard against terrorist attacks, and some have made official declarations regarding heightened threat conditions. In the past several years, organized extremist attacks have been planned or carried out in various European countries. On February 5, the Bulgarian government announced its judgment that Hezbollah was responsible for a July 2012 terrorist attack in Burgas which resulted in the deaths of five tourists and a bus driver.
MIDDLE EAST and NORTH AFRICA: Credible information indicates terrorist groups also seek to continue attacks against U.S. interests in the Middle East and North Africa. The U.S. government remains highly concerned about possible attacks against U.S. citizens, facilities, businesses, and perceived U.S. and Western interests. Terrorist organizations continue to be active in Yemen, including al-Qa'ida in the Arabian Peninsula (AQAP). Security threat levels remain high in Yemen due to terrorist activities and civil unrest. In September 2012, a mob of Yemeni protestors attacked the U.S. Embassy compound.
U.S. citizens have also been the targets of numerous terrorist attacks in Lebanon in the past (though none recently) and the threat of anti-Western terrorist activity continues to exist there. There are a number of extremist groups operating in Lebanon, including Hezbollah, a group designated by the U.S. government as a terrorist organization. Iraq is experiencing levels of violence not seen since 2007, and al-Qa'ida in Iraq is increasingly resurgent. Although U.S. interests have not been targeted directly, the threat of attacks against U.S. citizens, including kidnapping and terrorist violence, continues, even in Baghdad's International Zone. Bahrain continues to see bouts of sectarian violence, with Shi'a insurgents conducting IED attacks against Bahraini government and security facilities. Al-Qa'ida in the Lands of the Islamic Maghreb (AQIM) and its affiliates are active throughout North Africa.
In Algeria, terrorists sporadically attack Westerners and Algerian government targets, particularly in the Kabylie region, and near Algeria's borders with Libya and Mali. In January 2013, terrorists attacked a natural gas facility at In Amenas resulting in the deaths of dozens, including three U.S. citizens. Terrorists have also targeted oil processing plants in Saudi Arabia and Yemen. The In Amenas attack was staged from southern Libya, which has become a haven for regional terrorist organizations that present a threat to U.S. interests in Tripoli. Libyan security is largely provided by militias that occasionally fight one another, and that have been unable to protect U.S. persons from past attacks, such as the September 2012 attack against the U.S. Temporary Mission Facility in Benghazi that led to the deaths of four U.S. citizens, including the U.S. Ambassador to Libya. Some elements in Iran remain hostile to the United States. U.S. citizens should remain cautious and be aware that there may be a more aggressive focus by the Iranian government on terrorist activity against U.S citizens. Continuing political and social unrest in Egypt has led to large demonstrations that have turned violent. Westerners and U.S. citizens have occasionally been caught in the middle of clashes and demonstrations. On June 28, a U.S. citizen was killed during a demonstration in Alexandria. On May 9, a private U.S. citizen was attacked with a knife outside the U.S. Embassy after being asked whether he was an American. Political and social unrest in Tunisia has also led to large demonstrations that occasionally turn violent. In September 2012, a large group of demonstrators breached the U.S. Embassy compound in Tunis, causing significant damage.
No part of Syria should be considered immune from violence, and throughout the country the potential exists for unpredictable and hostile acts, including kidnappings, sniper assaults, large and small-scale bombings, and chemical attacks, as well as arbitrary arrest, detention, and torture. [ZH: courtesy of the CIA?] The conflict in Syria has resulted in tens of thousands of deaths with many thousands wounded and over one million displaced persons.
AFRICA: A number of al-Qa'ida operatives and other extremists are believed to be operating in and around Africa. In February 2012, the emir of U.S-designated Foreign Terrorist Organization al-Shabaab and al-Qa'ida's leader, Ayman al-Zawahiri, announced the alliance of the two organizations. Al-Shabaab has taken credit for the attack on the shopping mall in Nairobi, Kenya on September 21, 2013, which claimed the lives of over 60 people and injured over a hundred more, including U.S. citizens. Al-Shabaab assassinations, suicide bombings, hostage taking, and indiscriminate attacks in civilian-populated areas are also frequent in Somalia. Terrorist operatives and armed groups in Somalia have demonstrated their intent to attack Somali authorities, the African Union Mission in Somalia, and non-military targets such as international donor offices and humanitarian assistance providers.
Additionally, the terrorist group al-Qa'ida in the Lands of the Islamic Maghreb (AQIM) has declared its intention to attack Western targets throughout the Sahel (an area that stretches across the African continent between the Atlantic Ocean and the Red Sea to include Senegal, Mali, Algeria, Niger, Chad, Sudan, and Eritrea). It has claimed responsibility for kidnappings, attempted kidnappings, and the murder of several Westerners throughout the region, including southern Algeria. AQIM-related threats against Westerners in Mali and elsewhere increased following the initiation of the U.S.-supported, French-led intervention in northern and central Mali, where the security environment remains fluid. In neighboring Niger, terrorists formerly associated with AQIM conducted suicide attacks targeting a French mining facility and a Nigerien military compound in Agadez in late May. The loosely organized group of factions known as Boko Haram continues to carry out significant improvised explosive device and suicide bombings in northern Nigeria, mainly targeting government forces and innocent civilians; attacks have continued at a high rate since their attack on the UN building in the capital of Abuja in 2011. Boko Haram and splinter group Ansaru have also claimed responsibility for the kidnappings of several Western workers and tourists, both in northern Nigeria and northern Cameroon; Ansaru has murdered virtually all of its hostages in the face of real or perceived rescue attempts, while Boko Haram allegedly received a large ransom payment for the release of a French family abducted near a tourist park in northern Cameroon. In 2013, extremists have also targeted both Nigerians and foreign nationals involved in polio eradication efforts in northern Nigeria. Extremists attacked a school in northeast Nigeria, killing over 40 students, and have called for further attacks on educational institutions. Several agencies that have partnered with the U.S. government in the field of public health development in northern Nigeria have curtailed their activities in response to these threats. The president of Nigeria declared a state of emergency in three northeastern states in response to activities of extremist groups.
U.S. citizens considering travel by sea near the Horn of Africa, the Gulf of Guinea, or in the southern Red Sea should exercise extreme caution, as there have been armed attacks, robberies, and kidnappings for ransom by pirates. The threat of hijacking to merchant vessels continues to exist in Somali territorial waters and as far as 1,000 nautical miles off the coast of Somalia, Yemen, and Kenya in international waters. There has also been a recent rise in piracy and armed robbery in the Gulf of Guinea, including hijackings.
U.S. government maritime authorities advise mariners to avoid the port of Mogadishu and to remain at least 200 nautical miles off the coast of Somalia. In addition, when transiting around the Horn of Africa, the Gulf of Guinea, or in the Red Sea, it is strongly recommended that vessels travel in convoys and maintain good communications at all times. U.S. citizens traveling on commercial passenger vessels should consult with the shipping or cruise ship company regarding precautions that will be taken to avoid hijacking incidents. Commercial vessels should review the Department of Transportation Maritime Administration's Horn of Africa Piracy page for information on maritime advisories, self-protection measures, and naval forces in the region. Review our International Maritime Piracy Fact Sheet<http://www.state.gov/t/pm/rls/fs/2013/207651.htm> for information on piracy in the southern Red Sea, the Gulf of Aden, and the Indian Ocean.
SOUTH ASIA: The U.S. government continues to receive information that terrorist groups in South Asia may also be planning attacks in the region, possibly against U.S. government facilities, U.S. citizens, or U.S. interests. The presence of al-Qa'ida, Taliban elements, Lashkar-e-Tayyiba, indigenous sectarian groups, and other terror organizations, many of which are on the U.S. government's list of designated Foreign Terrorist Organizations, poses a potential danger to U.S. citizens in the region. Terrorists and their sympathizers have demonstrated their willingness and ability to attack locations where U.S. citizens or Westerners are known to congregate or visit. Their actions may include, but are not limited to, vehicle-borne explosive attacks, improvised explosive device attacks, assassinations, carjackings, rocket attacks, assaults, or kidnappings.
Such attacks have occurred in a number of South Asian states, including Pakistan, where a number of extremist groups continue to target U.S. and other Western citizens and interests, and Pakistani government and military/law enforcement personnel. Suicide bombing attacks continue to occur throughout the country on a regular basis, often targeting government authorities such as police checkpoints and military installations, as well as public areas such as mosques, and shopping areas. U.S. citizens are increasingly targeted for kidnapping. No part of Afghanistan should be considered immune from violence, and throughout the country the potential exists for hostile acts, either targeted or random, against U.S. and other Western nationals at any time. Elements of the Taliban and the al-Qa'ida terrorist network, as well as other insurgent groups hostile to the Government of the Islamic Republic of Afghanistan, remain active. Insurgents continue to target various U.S. and Afghan government facilities in Kabul City, including the June 25, 2013 attack against a U.S. government facility adjacent to the Afghan Presidential Palace and U.S. Embassy. There is an ongoing threat of kidnapping and assassination of U.. citizens and non-governmental organization (NGO) workers throughout the country. India has experienced terrorist and insurgent activities that may affect U.S. citizens directly or indirectly. Anti-Western terrorist groups, some of which are on the U.S. government's list of designated Foreign Terrorist Organizations, have been active in India, including Islamist extremist groups such as Harkat-ul-Jihad-i-Islami, Harakat ul-Mujahidin, Indian Mujahideen, Jaish-e-Mohammed, and the Pakistan-based Lashkar-e Tayyiba. Terrorists have targeted public places in India frequented by Westerners, including luxury and other hotels, trains, train stations, markets, cinemas, mosques, and restaurants in large urban areas.
Pakistan, India, Afghanistan and other countries experienced civil unrest, large scale protests and demonstrations following the release of anti-Islamic videos and cartoons in September 2012.
CENTRAL ASIA: Supporters of terrorist groups such as the Islamic Movement of Uzbekistan, al-Qa'ida, the Islamic Jihad Union, and the Eastern Turkistan Islamic Movement remain active in Central Asia. These groups have expressed anti-U.S. sentiments and may attempt to target U.S. government interests. |
Kukla's Korner Hockey
...But if you’re a fan, there was nothing in their initial address that would make you any more optimistic about a championship than you were prior to the announcement. Sure, these guys would love to win a Stanley Cup and if that’s a byproduct of their ownership, all the better. But let’s not kid ourselves, their primary concern is with getting their product on as many screens as possible, regardless of how good or bad it is.
Which brings us to the next thing that is crystal clear when it comes to the hockey scene in Toronto. And that is, any opposition to a second NHL team in Canada’s largest city evaporated before the ink was dry on the blood vow Canada’s two biggest communications conglomerates took when they spent $1.32 billion on 75 percent of Maple Leaf Sports and Entertainment.
And the importance of this cannot be overstated. When MLSE was taken over by BCE and Rogers, it essentially paved the way for the Phoenix Coyotes to move to the Greater Toronto Area as early as this summer, right around the time the Leafs sale gets approved by the NHL’s board of governors.
Comments
I don’t doubt Toronto will have a 2nd team eventually but it won’t be the Coyotes.
No way the NHL misses out on an easy $400 expansion fee. And whoever wants a 2nd team in Toronto will gladly pay that (or more) to see it happen.
No, I see the Coyotes heading to either KC or Seattle.
The NHL knows towns like Toronto and Quebec will pay above $250M for expansion fees so why allow a team to walk in there without paying up first? |
Q:
How to get a list of services programmatically in Symfony?
I want to have a list of services and class names in my web application. I can use this command in console:
php bin/console debug:container
And I get something like this:
Symfony Container Public Services
=================================
-------------------------------------------------------------------- --------------------------------------------------------------------------------------------
Service ID Class name
-------------------------------------------------------------------- --------------------------------------------------------------------------------------------
annotation_reader Doctrine\Common\Annotations\CachedReader
app.annotations.softdelete.driver AppBundle\Doctrine\SoftDelete\Mapping\Driver\Annotation
app.annotations.translate.driver AppBundle\Doctrine\Mapping\Driver\TranslateDriver
app.be_auth_controller.listener AppBundle\EventListener\BeAuthControllerListener
I want to have this information on a web page using Symfony 3.
I created a service and I used:
$this->container->getServiceIds();
which returns something like:
[
0 => "service_container"
1 => "annotation_reader"
2 => "annotations.reader"
3 => "app.annotations.softdelete.driver"
4 => "app.annotations.translate.driver"
...
]
I don't know, how to get the class names.
In any cases works this:
get_class($this->container->get($this->container->getServiceIds()[1]))
But in some other cases it throws different exceptions.
Do you have any idea?
Thanks.
A:
Your attempt with get_class is what came to mind as I was reading it, but whatever errors you are getting will come from improper fetching of those services. After all when you call $container->get(...), its at that moment instantiating those classes.
To be honest the output you are looking to replicate can be reproduced based on the method used by that command.
https://github.com/symfony/framework-bundle/blob/master/Command/ContainerDebugCommand.php
You'll just need to adapt it to work for you.
A:
To get full definition of given service you can use ContainerBuilder and Symfony cache file.
first create instance of ContainerBuilder:
$container = new ContainerBuilder();
then load cache file:
$cachedFile = $this->container->getParameter('debug.container.dump');
$loader = new XmlFileLoader($container, new FileLocator());
$loader->load($cachedFile);
now you can get full definition of your service like this:
$definition = $container->getDefinition('service_name')
$definition->getClass();
|
We’ve worked up the Kelbourne Woolens Llumeneres Hat, designed specifically for their lovely Andorra yarn, a 60% Merino wool, 20% Highland wool, 20% Mohair blend. Stop in and pick up everything you need to make one! |
<?php
namespace ProtoneMedia\LaravelPaddle\Events;
/**
* Fired when a dispute/chargeback is closed or completed for a transaction.
*/
class PaymentDisputeClosed extends Event
{
}
|
of 42660*g**5 - 637*g**4 - 65573*g - 167.
853200*g**3 - 7644*g**2
What is the second derivative of 244478061*c**3 - 35998384*c - 2?
1466868366*c
What is the second derivative of -49*n**3*w**2 - 509715*n**3 - 89632040*n*w**2 + 4*n wrt n?
-294*n*w**2 - 3058290*n
Find the second derivative of 176873971*s**2 - 956215870*s wrt s.
353747942
What is the second derivative of -40004847*p**4 - 2*p**3 + 73569371*p?
-480058164*p**2 - 12*p
What is the second derivative of -1007*d**3*x - 40772*d**2 - 37*d*x - 4128*d - 5 wrt d?
-6042*d*x - 81544
Differentiate -6799550*h + 10229827.
-6799550
Find the third derivative of -116669*q**4*w + 6*q**3*w - 53*q**2*w - 2*q*w + 39073 wrt q.
-2800056*q*w + 36*w
What is the derivative of 42282896*k - 117234490?
42282896
What is the third derivative of 35201*b**3 - 4069*b**2 + 162*b - 1?
211206
Find the second derivative of -10*c**5 - 803652*c**3 - 35826536*c wrt c.
-200*c**3 - 4821912*c
Find the third derivative of 76516106*o**3 + 581175883*o**2 wrt o.
459096636
What is the third derivative of -4287043*l**5 - l**4 + 7*l**2 - 1544277*l wrt l?
-257222580*l**2 - 24*l
What is the derivative of -137*b**2*f + 256*b**2 + 7*b*f**2 + b - 3937*f**2 + 3752 wrt f?
-137*b**2 + 14*b*f - 7874*f
What is the derivative of -1789566*y**2 - y + 8587213 wrt y?
-3579132*y - 1
What is the third derivative of -47030*h**4 + 23*h**3 + 60744996*h**2?
-1128720*h + 138
What is the third derivative of 1323489511*a**3 - 241225408*a**2 - 2?
7940937066
Differentiate 18093351*a + 10316722 with respect to a.
18093351
Find the third derivative of -6305537*n**3 - 6*n**2 + 1168*n - 88 wrt n.
-37833222
Find the third derivative of 18492819*a**4*o**3 - 11980*a**2*o**2 - 56*o**3 + 3*o**2 wrt a.
443827656*a*o**3
Differentiate 66880230*m - 35484063 with respect to m.
66880230
Differentiate -133367644*c - 342120322 with respect to c.
-133367644
Find the third derivative of 816626*n**3 - 2540150*n**2.
4899756
Find the first derivative of 63674*g**2*w**2 - 91588664*g**2 - 232*w**3 wrt w.
127348*g**2*w - 696*w**2
What is the first derivative of 339292892*t - 31424779 wrt t?
339292892
What is the third derivative of -584301401*h**3 + 76005803*h**2 wrt h?
-3505808406
Find the first derivative of -270720*y**3 - 2*y**2 - 3*y + 1798609 wrt y.
-812160*y**2 - 4*y - 3
What is the third derivative of -l**2*n**3 + 2*l**2*n**2*q**3 - 71*l**2*n**2*q + 48237*l**2*n*q + 17891453*n**3*q**3 wrt n?
-6*l**2 + 107348718*q**3
Find the third derivative of 6328587*m**3 + 62*m**2 + 152686*m - 2.
37971522
What is the second derivative of 1824773*c**3*h*y**2 + 66*c**2*h*y**2 - c*h + 2928*c*y - h*y**2 - 46*h wrt c?
10948638*c*h*y**2 + 132*h*y**2
Find the second derivative of 5*c**3*y**2 + 3*c**3 - 80738*c**2*y**3 - 9581*c**2 + 23*c*y wrt y.
10*c**3 - 484428*c**2*y
Differentiate 71*u**2 + 614997*u + 73901005.
142*u + 614997
What is the second derivative of -1561936*p**2*x**3 - 210022*p*x**3 - 4*p wrt p?
-3123872*x**3
What is the second derivative of -296514727*l**3*v**5 - l**3*v + 17731950*l*v wrt v?
-5930294540*l**3*v**3
Find the first derivative of -292735*a**3 - 6*a**2 - 13228597 wrt a.
-878205*a**2 - 12*a
Find the second derivative of -2453*h**4 + 2*h**3 + 160*h**2 - 1138*h - 747.
-29436*h**2 + 12*h + 320
What is the derivative of -15166949*j - 49833686 wrt j?
-15166949
What is the derivative of -o**2 + 117745744*o - 295502633?
-2*o + 117745744
What is the second derivative of -10063122*m**2 + 398*m - 4908 wrt m?
-20126244
What is the third derivative of -218475112*f**2*k**4 + 117*f**2 - 1071*k**2 - 315 wrt k?
-5243402688*f**2*k
What is the third derivative of -5489883*q**2*s**4 + 8*q**2*s**2 + 2*q**2 - 382*q*s**2 - q*s - 2*q + s**6 + 2*s**2 wrt s?
-131757192*q**2*s + 120*s**3
Find the second derivative of -10889887*u**2 + 1572944*u - 1.
-21779774
Find the third derivative of -3*j**5 + 14*j**4 - 352012*j**3 - 32*j**2 - 1482*j + 92 wrt j.
-180*j**2 + 336*j - 2112072
Find the third derivative of -15*f**5 - 10553861*f**4 - f**3 - 366795160*f**2 wrt f.
-900*f**2 - 253292664*f - 6
Find the third derivative of 13*w**6 - 2*w**5 + 33648*w**3 - 6*w**2 - 504390.
1560*w**3 - 120*w**2 + 201888
What is the second derivative of -965568*k**5 - 60*k + 2021?
-19311360*k**3
What is the second derivative of 207*c**3*y + 6*c**3 + 10*c**2*y + 10*c**2 - 122770*c*y - 31*c wrt c?
1242*c*y + 36*c + 20*y + 20
What is the third derivative of -56392482*j**3*l - 2*j**2 + 562303*l wrt j?
-338354892*l
What is the third derivative of 248848662*l**3 + 1299188613*l**2?
1493091972
Find the first derivative of -1622774*a**4*x**2 + 68*a*x**3 + 368566*x**3 + 177*x**2 wrt a.
-6491096*a**3*x**2 + 68*x**3
Find the third derivative of -46721961*m**5 - 15014781*m**2 wrt m.
-2803317660*m**2
What is the second derivative of -94909619*d**5 - 57648076*d + 1 wrt d?
-1898192380*d**3
Differentiate -137107538*j - 209269305 with respect to j.
-137107538
Differentiate 161*a**2*z - 162773*a**2 + 10563*z**3 - 1 with respect to z.
161*a**2 + 31689*z**2
What is the second derivative of 161688451*a**4 - 157667103*a wrt a?
1940261412*a**2
Find the second derivative of 566*c**5 - 3772*c**4 - 63502*c - 32 wrt c.
11320*c**3 - 45264*c**2
What is the second derivative of 16*b*g**2 + 1764*b*g - 176194*g**4 + 838*g wrt g?
32*b - 2114328*g**2
What is the third derivative of -5*j**3*s**3*x + 318802*j**3*s**3 - j**2*s**3*x + 158*j**2*s**2 - 2189*x wrt j?
-30*s**3*x + 1912812*s**3
What is the third derivative of -1651594*a**6 + 22*a**3 + a**2 - 4988525*a?
-198191280*a**3 + 132
Find the first derivative of -53*s**2 + 39908*s - 2545851 wrt s.
-106*s + 39908
Differentiate -538652247*j**3 - 324783543.
-1615956741*j**2
Differentiate 5239451*s*y - 3*s*z + 4*y + 9*z - 1057 wrt s.
5239451*y - 3*z
Differentiate -6*j*s**3 + 91555*j*s**2 - 170*j*s - 49*s**3 - 45*s**2 + 4*s - 2450 wrt j.
-6*s**3 + 91555*s**2 - 170*s
Find the second derivative of 2118528*g**2 - 3844*g - 10 wrt g.
4237056
What is the second derivative of -19906375*i**3 + 18569788*i wrt i?
-119438250*i
Find the first derivative of 13141709*b**2*l**2*u + 7516*b**2*l**2 - 6*l**2*u + 4446*l wrt u.
13141709*b**2*l**2 - 6*l**2
Find the second derivative of 471*a**2*s**3 + 4948*a**2*s**2 + 16*a**2*s + 20014*s wrt s.
2826*a**2*s + 9896*a**2
Find the first derivative of 1614171*c*f**2*z + c + 4765664*f**2 wrt z.
1614171*c*f**2
Find the second derivative of -23*y**5 - 29*y**4 - 64025*y**2 + 5207*y + 1236.
-460*y**3 - 348*y**2 - 128050
Find the second derivative of 22560367*c**3 + 1110*c - 6376.
135362202*c
What is the third derivative of 1280402645*d**3 + 114333864*d**2?
7682415870
What is the second derivative of -166749476*m**2 + 46688588*m wrt m?
-333498952
What is the second derivative of 5875932*j**4*s - 18*j*s - 65*j + 16*s + 1 wrt j?
70511184*j**2*s
Find the first derivative of -5876*f**2*s + 133*f**2 - 2*f*s - 3301426*s + 1 wrt f.
-11752*f*s + 266*f - 2*s
Find the first derivative of 13*c**2*f**2 - c**2 + 9*c*f**2 - 38381*c - 36068*f**2 - 54 wrt f.
26*c**2*f + 18*c*f - 72136*f
What is the second derivative of -2*a**3*l - 83*a**3 + 347206*a**2*c*l + 2*a*c*l - 48*a*c - a*l + 8736*l + 3 wrt a?
-12*a*l - 498*a + 694412*c*l
What is the first derivative of 194873794*n**2 - 27383384?
389747588*n
Find the second derivative of 23469*y**2*z + 1130*y**2 - 4*y*z + 50560*y - 2*z wrt y.
46938*z + 2260
Differentiate 14285020*y + 3342371 with respect to y.
14285020
Differentiate 84348*a*f**2*p - 115*a*f*j**2*p**2 - f**2*j**2*p**2 + 44*f**2*j**2*p + 326*f**2*p**2 + 7*f**2 - 2*f*j*p**2 wrt a.
84348*f**2*p - 115*f*j**2*p**2
Differentiate 74*l**2*z**3 + 277*l**2*z - 2*l**2 - z**3 - 140*z**2 + 523 with respect to l.
148*l*z**3 + 554*l*z - 4*l
Find the first derivative of 7121991*o - 3880028 wrt o.
7121991
Differentiate -412201757*s*t - 206441715*s wrt t.
-412201757*s
Differentiate -192579*d**2 - 34*d + 108709969.
-385158*d - 34
Find the second derivative of -24*m**2*q**2*x**3 - 10307*m**2*q**2 - m*q**2*x**2 - m*q + 1480*q**2*x**2 - 2162*x**3 wrt m.
-48*q**2*x**3 - 20614*q**2
Find the third derivative of -18628673*a**6 + 697*a**2 + 7648.
-2235440760*a**3
Find the second derivative of -16*t*u**3 + 217*t*u**2 + 3431*t*u + 2*t + 1686*u**3 + 3*u**2 - 70*u + 38 wrt u.
-96*t*u + 434*t + 10116*u + 6
Differentiate 550596406*b*c**2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.