pred_label
stringclasses 2
values | pred_label_prob
float64 0.5
1
| wiki_prob
float64 0.25
1
| text
stringlengths 128
964k
| source
stringlengths 39
45
|
|---|---|---|---|---|
__label__cc
| 0.634954
| 0.365046
|
Car Insurance Movies Wasilla Ak Theater
JUNEAU, Alaska — Carol Hafner is on the Democratic primary ballot. The victim’s God sister then texted the victim and told her they were at the Summer Drive-in.
Cheapest Auto Insurance Mn Homes are cheap, with an average sale price of around $135,000. The downside: Few retail options and no historical downtown area. –S.M. The Colony, TX Town stats Median family income (per year) $89,30. Renewables are now cheap and reliable. Meanwhile. and is the group leader of the Duluth Citizens’ Climate Lobby (citizensclimatelobby.org/chapters/ MN_Duluth). He also
462 jobs available in Palmer, AK on Indeed.com. Apply to. City of Wasilla, AK. My kids are fun and enjoy t ok play outside read watch movies and do arts and.
Cheapest Car Insurance For Young Drivers Most of our customers add their teen drivers to their policies, and for good reason. The expense of insuring a young driver can be offset by a multi car discount. For one, drivers are professionally trained. and injury data compiled in police reports to Quebec’s automobile insurance board, the SAAQ, between 2001 and 2010. During
Alaska’s List is a huge, online service, featuring classified ads placed by people and businesses throughout the Greatland and beyond. Clean, well-organized, and professionally moderated, Alaska’s List is classifieds done right!
How Much Money Does Drivers Ed Save On Car Insurance Safety and Driver. this MSN Money Transferring Your Balance To a 0% APR Card Is Ingenious NextAdvisor Forget Amazon! Here’. Need to add another driver to your policy?. What about third-party insurance? Many drivers think you’re. Compare car insurance. See how much you could save. The new insurance. it simply does not have the money
In 2013, there were thirteen Blockbuster stores in Alaska, which fell to nine by 2016. The Wasilla, North Pole and Soldotna. LIke a trip to the theater, a trip to the.
2016. Ryan William Dement 2016 HS, Ryan was born in Staten Island, N.Y. in 1998 and moved with his family to Alto in 2002.He is a graduate of NMMI (New Mexico Military Institute) where he played baseball for the Colt team.
Palmer, AK Movies. Palmer. Insurance; Mortgages; Volunteering. Wasilla, AK 99654 | 13 Movies | Map | Top. Monty Python and the Holy Grail
Movies Now Playing; Ant. Juneau, AK 99801 Office: (907) 586-3634. Map and directions. Fri, Sat Evenings & Special Engagements General Admission -.
No longer available. The 3 beds house at 894 W Moose Park Drive was last available for sale on 3/20/18. View 39 photos, map the location, or search for similar homes nearby!
Theater near Turnagain Elementary School. ABLocal. Search. Theater near Turnagain Elementary School in Anchorage, AK. Five Star Entertainment. 3521 Stargate Cir.
Archives of oituary listings from Funeral Alternatives of Maine, serving Lewiston, Falmouth, and Augusta with low-cost, simplified services.
Marcus at the Movies; Operation Afghanistan;. A project at Klondike Gold Rush National Historical Park in Alaska also is. KTUU-TV 501 East 40th Avenue.
Alaska is the northernmost and westernmost state in the United States and has the most easterly longitude in the United States because the Aleutian Islands extend into the Eastern Hemisphere.
30 Things You Need To Know About Moving To Alaska. used to—are long and you can spend an entire day in the car before you get. seen the movie the.
Spring Home Show on Apr 7, 2017 in Wasilla, AK(Anchorage metro area) at Wasilla Multi-Use Sports Complex. MOVIES // Movie Theater Showtimes;
A list of every Word of the Year selection released by Dictionary.com. Dictionary.com’s first Word of the Year was chosen in 2010.
Previous Post: Cheapest Car Insurance For Young Drivers
Next Post: Provisional Learner Driver Car Insurance
|
cc/2019-30/en_middle_0053.json.gz/line4352
|
__label__cc
| 0.607479
| 0.392521
|
walkabout car insurance
Average Car Insurance Cost Nc State
Amid growing pressure on lawmakers and providers to help consumers make sense of healthcare prices, North Carolina Gov. Pat McCrory signed legislation that will now require the state’s hospitals. t.
Car Insurance Named Driver Build No Claims 2014 (Credit: chicagodispatcher.com) CHICAGO (CBS) — A trade newspaper for the city’s taxi industry has threatened to out five aldermen who it claims are “secretly. The riding public has no idea if ride. Car Insurance in Spain – We COMPARE to Get You the CHEAPEST Quote and Price… Find cheap car hire in just a few
The average motorcycle insurance cost depends on several factors. When you speak to an insurance agent to inquire about insurance rates, they will ask you several questions to determine your potential risk.
On average, reckless drivers are subject to a day in jail for their first offense and three days for their second, with the m.
Feb 27, 2018. The national average cost of car insurance this year is $1427, a 20%. State by state, the smallest increase took place in North Carolina, the.
There’s a lot happening in the sleepy world of insurance that’s making it possible to drive costs down and provide better results. Today, the company is officially launching its services in the sta.
What Qualifies For Classic Car Insurance Car Insurance Brokers Ajax Soap Best Insurance Companies For New Young Drivers With 43 per cent of Accident Alerts recorded by Insure The Box, occurring after 5 o’clock in the evening, the company believes the Government has missed an important opportunity to include night time. NEW YORK (CNN/Money) – There’s no question that teenagers, as
Updated: November 2016. Average Home Insurance Rates – What are They? ‘What is the average home insurance rate in my state?’ That’s often one of the first questions asked when consumers consider buying a policy.
they often get treatment anyway — shifting costs onto hospitals, state governments, and those of us who purchase health insurance. Not buying insurance is no protection against heart attacks, drug ove.
Car Drivers in Raleigh NC tend to pay just $30 less for auto insurance premium than the rest of the state ( NORTH CAROLINA ). Average car insurance in.
Sure, it pays to have car insurance. But it doesn’t have to cost you an arm and a leg. Gabi can scan similar policies at o.
Car Insurance Brokers Ajax Soap Best Insurance Companies For New Young Drivers With 43 per cent of Accident Alerts recorded by Insure The Box, occurring after 5 o’clock in the evening, the company believes the Government has missed an important opportunity to include night time. NEW YORK (CNN/Money) – There’s no question that teenagers, as a group, are frighteningly bad
Dealer documentation fees (also known as doc fees), cover a dealer’s administrative costs related to title, registration, and other paperwork involved with the car purchase.
On average, renters paid 6% more than homeowners for basic liability coverage, but that’s including the results from Oakland, where California state law prohibits insurers from considering homeownersh.
Q: The average new car costs more than $33,000. If we were able to sell our data. By saying no, we explicitly state that o.
Sep 12, 2014 · By comparison, the study determined residents in the bucolic Charlotte, NC / Concord SC areas enjoy the lowest auto insurance rates in the country, with premiums at 43 percent below the national average.
A DUI conviction is costly in more ways than one. If you are arrested and charged with a DUI, you will have immediate costs such as bail, court fees, and fines imposed by the state.
In continuous tight industries with high utilization rates, we further improved our earnings with. the prior year quarter benefited from 2 positive one-time items, an insurance payment and also a b.
get a north carolina car insurance quote from esurance. carolina car insurance. North Carolina's state motto is "To be, rather than to seem." And we can't think of. That was lower than the national average of 12.6 percent. Uninsured motorist.
Jul 24, 2017. 1, 2017, request for a 13.8 percent increase in auto insurance rates. in the state , has agreed not to submit an auto rate filing in 2018 so this rate. data shows North Carolina has the seventh lowest average auto premiums in.
Affordable car insurance and quality coverage from MetLife Auto & Home. Group discounts available: Call 1-844-722-0272
Mar 18, 2018. The average cost of car insurance across the United States is approximately $1,625 per year, or about $135 per month. Average car insurance rates vary by state due to many factors, such as state laws and. North Carolina.
Mar 20, 2018. Get average North Carolina home insurance rates for your ZIP code for 75 coverage. Want to bundle home and auto insurance for potential discounts?. That doesn't mean you will find a policy at or below the state average.
Car Drivers in Charlotte NC tend to pay $80 more for auto insurance premium than the rest of the state ( NORTH CAROLINA ). Average car insurance in.
Feb 28, 2018. Zebra's Alyssa Connelly says the average annual auto premium in. According to the report, North Carolina motorists pay the lowest annual premiums ($865). The 2018 State of Auto Insurance Report finds motorists in Detroit.
Some of the nation’s largest health insurance companies are warning. ve been estimating,” and represented the average impact in a typical state. An official with Blue Cross & Blue Shield of North C.
"This analysis is severely flawed and is not reflective of reality," the electric-vehicle maker said in a statement emailed to Automotive News. confidence to change rates," he said. Other large ins.
Blue Cross and Blue Shield plans, which are the dominant healthcare insurers in most states, are known to have submitted 2016 premium rate increase requests of 23 percent in Illinois, 25 percent in No.
How much towing a car should cost. Prices paid and comments from CostHelper’s team of professional journalists and community of users. Having a tow truck move a disabled vehicle to a repair shop, residence or other destination typically means paying a base rate (sometimes called a hook-up fee) of $35-$100, and $2.50-$5 per mile; the first five to.
Based on this study, drivers of the Mercedes-Benz SL-Class convertible are four times more likely to be cited for a moving violation than the average. to your car It doesn’t work that way. Liabilit.
Apr 27, 2015. Michigan drivers pay more than double the national average for car insurance, while North Carolina drivers pay 41 percent less. Hover over a.
State, Liability, Collision, Compre-. North Carolina, 359.42, 293.59. Note: Average expenditure=Total written premium/liability car years. A car.
The gap continues to widen between what online car insurance companies and traditional carriers. the Internet or telephone solicitations — had an average "acquisition cost" of $487 per policy in 20.
We warned the policies of the law would create increased spending, higher costs, fewer choices, and a less stable insurance market. Republican Richard Burr represents North Carolina in the United S.
Jun 15, 2015. Adding a teen to the family car insurance policy can nearly double what. While increases vary widely by state, across the country the average premium will. “ Teen crash rates are higher than any other age group, and this data. York, Michigan and North Carolina, at 53, 57 and 60 percent respectively.
Each insurer has thousands of auto insurance rates in every state it does business—rates for each type. The median state average expenditure was $857.44 according to a 2017 report from the. North Carolina, $655, 46, $644, 45, $625, 44.
The average family’s health insurance now costs about $16,000, and workers pay more than a quarter of that, according to a new survey. But health insurance premiums for job-based family coverage rose a relatively modest 4 percent, reflecting slowed health spending, according to a survey of about.
Learn what factors influence auto insurance rates, and how you may be able to save. If you live in an area with above average traffic, your auto insurance rate.
Mar 22, 2018. ValuePenguin found out the latest average car insurance rates in each state for both monthly and annual payments. Below, we've broken down the list and ranked the states from lowest to. (TIE) North Carolina: $88 a month.
What you need to know about driving in the Tar Heel State and how to find a great rate. Average monthly car insurance premium in North Carolina. $88.
May 14, 2018. According to Zillow, the median sale price in North Carolina is $175,600. A one -bedroom apartment in the Tar Heel State carries an average. The Kaiser Family Foundation found that the average health insurance premium for marketplace. Auto · Career · Checking Account · Credit Cards · Credit Score.
A 2016 report from the group showed Little Rock has 2.4 times as many car-bicycle collisions and 17.9 times as many bike fata.
No state. of car owners, the change in the law would have no effect on rates whatsoever because they choose higher liability coverage voluntarily. But for low-income drivers, particularly those who.
Plus see more on why homeowners insurance cost what it does in your state. How much does homeowners insurance cost?. New Mexico, North Carolina, Ohio, Oregon, Pennsylvania, Utah, Washington, Average car insurance price.
The graph below shows the increase in Washington’s average auto insurance rates from 2011 to 2015. According to the Insurance Information Institute, Washington’s car insurance rates increased 9.7% in that five-year period.
One wouldn’t accept her insurance. with additional ongoing costs. They note that campus health centers currently refer students to off-campus abortion providers, and that UC and CSU campuses are lo.
If you live in Glendale, your car insurance premiums are the highest in the state. Single drivers in Glendale paid $1,823 in 2013, 62 percent over the average cost of annual premiums for basic liabili.
Originally started in 2012 in Pittsburgh, The Zebra’s co-founder and CEO Adam Lyons had previously worked in the car insurance. over 200 insurance companies across all 50 states. The technology on.
To do so, we required that each city have below-average living costs. state capital, is just a 30-minute drive from Norman. Why you’ll like living here: Southern charm on a shoestring. Along with R.
Typical costs: Premiums for liability insurance vary widely depending on the size of the business (in square footage and/or payroll), the risks.
En Español: Las tarifas de seguro automotor por estado For the fourth consecutive year, Michigan “wins” for the most expensive state for car insurance. Insure.com’s annual state-by-state comparison of average annual premiums found Michigan’s average premium to be $1,076 higher than the national average annual premium.
Shop North Carolina auto insurance quotes and start saving. We wanted to find average rates for North Carolina drivers so we looked at nine auto insurance companies, American Independent has one of the state's worst averages. Take a.
Previous Post: G/geico Car Insurance-related-12.txt 12
Next Post: Aami Car Insurance Third Party Fire And Theft Excess
|
cc/2019-30/en_middle_0053.json.gz/line4353
|
__label__cc
| 0.544748
| 0.455252
|
Book Reviews, Middle Grades
Mystery Under the Stars
written by Janie
. . . In which we crack the spines of two middle-grade novels that have been getting a lot of favorable press: both are mysteries, both take place in atmospheric locations during high summer, and both are narrated by misplaced eleven-year-olds girls who speak well above their grade level.
Kepler’s Dream, by Juliet Bell. Putnam, 2012, 242 pages. Age/interest level: 10-14.
Ella’s messy family just got messier, now that her mom is scheduled for a long-term hospital stay to try a radical new treatment for her leukemia. It seems logical to turn to Ella’s divorced Dad for temporary parenting, but Dad, as usual, is guiding a fishing expedition in Washington. Ella doesn’t know him that well: “The break happened when I was a tiny baby. I guess one day they looked at each other and Boom! realized they hated each other’s guts—they must have forgotten to notice when they got married.” Her father has little practice at fatherhood and isn’t keen to practice up now; instead he arranges for Ella to stay with his mother, whom she doesn’t even remember. So off she goes to a hacienda near Albuquerque, ruled by a domineering Grandmother (or GM) with a book fetish and a herd of peacocks. If you’re thinking Flannery O’Connor, forget it; this is classic misplaced-middle-grader-with-mystery. Actually several mysteries, like why Ella’s dad can’t get along with his own mother, what unfortunate accident claimed Ella’s grandfather, and most of all, who stole the prize of GM’s book collection, an early edition of Johannes Kepler’s Dream?
Apparently Kepler, the brilliant Renaissance astronomer who verified the theory of a heliocentric planetary system, began the book as a student dissertation but abandoned it, and didn’t come back to it for twenty years. It could best be described as speculative fiction, a forerunner of sci-fi: a university student is transported to the moon by demons, from which he observes lunar geography and writes rhapsodic descriptions of earth and surrounding space. I actually learned none of this from Kepler’s Dream, but looked it up online. Kepler was a fascinating figure in his own right; it seems an author could have wrung some high-octane narrative juice from a commoner whose mother was almost burned as a witch and whose siblings were all mentally or physically challenged. But the reader of Kepler’s Dream will learn very little about him. Even his book, when Ella finally gets her hands on it, receives little description, especially given its importance in the story.
Ella learns that her fascination with the stars is shared by other blood relatives, and that family itself is a complicated business: “One thing I’ve thinking about here at Broken Family Camp (another name I came up with) is when blood ties are important and when they’re not.” The chief mystery isn’t all that mysterious, but includes some surprises. Meanwhile, Ella is dealing with the helplessness of her mother’s condition: “All over the place there were people praying for my mom. I just had to hope the praying would work.” Her hope isn’t based on anything in particular, and prayer doesn’t play a big part in it. Those nearest to her can only offer hazy guidance: “[Mom] told me that I should think of her as going back to the stars. She said that’s all we’re made of anyway—that it’s the same stuff . . . and so, if she died, I wasn’t supposed to feel too terrible. I was just supposed to look up at the stars and know that she was somehow back there with them, floating around in the galaxy.” Even Ella admits this isn’t much comfort.
Kepler’s Dream comes festooned with a galaxy of high-profile-author blurbs, but as my readers might guess by now, the book didn’t take off for me. Ella’s voice, though engaging, seems too old for her eleven years, and all the mushy talk about space and the stars create a spectrum of “meaning” that doesn’t really hold up.
Worldview/moral value: 3 (out of 5)
Literary value: 4
Three Times Lucky, by Sheila Turnage. Dial, 2012, 312 pages. Age/interest level: 10-14
Mo LoBeau, of Tupelo Landing, NC, dates her original luck from her birth during a hurricane, eleven years before. “That night, as people slept, they say, the rivers rose like a mutiny and pushed ashore, shouldering houses off of foundations, lifting the dead from the graves, gulping down lives like fresh-shucked oysters.” While the storm raged, her unknown “upstream mother” strapped the newborn infant to a window shutter and set her adrift, where she came to rest almost literally in the arms of another lost soul. This is “the Colonel,” who lost his memory and drove his car into a tree (not necessarily in that order) just outside Tupelo Landing.
He names the mystery baby Moses before noticing she’s a girl, but in spite of this little oversight the Colonel becomes a foster father, and Miss Lana, who owns the town’s only café, takes on the mama role. Mo grows up surrounded by loving, quirky characters, including her best friend Dale (middle name Ernhardt)—a fact that could quickly turn gimmicky were it not for the exceptional way she has of putting words together. Such as, “Dale can choose not to worry like he chooses not to wear socks. Miss Lana says I have more of a Jack Russell brain. I think things apart for sport.” Sometimes that kind of brain comes in handy, like when a police detective from Winston-Salem walks into the café looking for clues in a murder case.
The voice is genuinely original and almost makes the book worth a read just for itself, but there are a few problems. The murders are real murders and occasionally the narrative breaks out in a level of violence that seems incompatible with its folksy tone—at least for readers of this grade level. (Mo turns out to be one tough cookie, obviously headed for a career as the kind of cute, butt-kicking law-enforcement officer featured in almost every TV cop show.) The plot seems a bit lumpy: slow to take off, then crunching action like a monster truck through the last fifty pages or so. Family is complicated here, as it is in Kepler’s Dream–it’s basically what you make it.
An interesting summertime challenge might be to ask your 10-13 year-old what worldview she discerns in these books. One good way to pick up on this is to notice what the characters–especially the ones you’re supposed to like–say about God, prayer, faith, church, or family. For instance, from the Colonel: “We’re born over and over, day by day. When you feel lost, let the stars sing you to sleep. You’ll always wake up new.” What does this mean, especially in light of his memory loss? And what might it mean that the character who stands up for absolutes in Three Times Lucky turns out to be one of the bad guys?
For more on worldview, see our Parents’ Guide to Environmentalism, Parts I and II. For other reads for middle-grade girls, see Small-Town Summers and Among the Fairies.
Filed under: Book Reviews, Middle Grades
Tagged with: book reviews, Kepler's Dream, middle grades, mysteries for children, mystery, Three Times Lucky
Previous PostA Death Observed, Part Three
Next PostBible Reading Challenge, Week 24
|
cc/2019-30/en_middle_0053.json.gz/line4357
|
__label__cc
| 0.67549
| 0.32451
|
Lunacy as the New Orthodoxy
I recall listening to the late Professor Bob Carter a number of years ago saying that he thought the tide was turning. Effectively, that the climate scam was in process of being undone. Far from it in Australia; very far from it in the UK.
One of the things I notice in England, at least among the media and political class, is that all debate about the reality of man-made climate change is kaput. It’s yesterday’s debate. Whereas in Australia believers still think they have a job to do to convince those remaining pesky sceptics, here the job is done.
Sure alarmists like David Attenborough keep on trying to scare people into doing more about it but the “it” itself — upcoming, man-driven, climate catastrophe — is part of the furniture. This is why commentator after commentator is at pains to ensure, when criticising the disruptive activities of the latest eco hysterics, Extinction Rebellion (XR), that the audience knows they are terribly sympathetic to the cause.
XR is a well organised predominantly white middle-class movement; causing havoc in London by blocking roads and bridges. Its repertoire included parking a pink boat in the middle of Oxford Circus. Nick Ferrari of the Sunday Express calls it a “middle-class temper tantrum.” Lots of people are annoyed by its tactics; however, significantly, no one seems to doubt the justice of its cause.
London’s Mayor Sadiq Kahn is sympathetic. For this he came under fire from the police who have to deal with people playing dead on the streets. But Kahn is in crowded company.
Boris Johnson, while lambasting the activities of XR, said this: “They are right to sound the alarm about all manner of man-made pollution, including CO2.” Here is Bryony Gordon in The Daily Telegraph writing about XR: “…if they want more people to be sympathetic to their entirely noble cause…” David Rose, in the Sunday version of the same paper, sensibly buckets Attenborough’s tendentious and fiction-strewn documentary Climate Change: The Facts – featuring sixteen-year-old climate pin-up girl Greta Thunberg. Yet he notes, “Let me be clear: I am not a ‘denier’. Global warming and climate change are real, in large measure caused by humans.”
I saw one of the lady activists and a government minster, Lord Something-or-other, being interviewed on the BBC. His Lordship had obviously not failed to have his oestrogen injection that morning. Here was genuflection personified; a man whose demeanour towards the obdurate activist was positively fawning. He could not possibly have agreed more with her alarm about the peril that we are facing; while abjectly pleading his case that the government was taking action.
Get the picture? Well, the real picture is worse. Critical reasoning faculties have disappeared. Akin to Australia’s position, the UK’s emissions are a tiny fraction of global emissions: about one percent. So, as per Australia, nothing the UK can do will matter.
Apparently we (the world) have only twelve years to take the necessary action. Correction, Attenborough says that we have only ten years or we face “irreversible changes to the natural world and the collapse of societies.” But, unaccountably, he says there’s hope. How so, with China and India spewing out increasing amounts of CO2? Only dolts believe in man-made runaway warming and yet can’t see how utterly hopeless is the situation. We have dolts blocking London streets and others applauding their cause.
Attenborough accompanied by XR protestors need to get themselves on a wind-powered sailboat to China. Once there Attenborough needs to preach climate Armageddon while the protestors create mayhem in the streets of Beijing. It might work? Personally, I would be prepared to make a small donation to help cover the expenses of their trip.
Critical reasoning hasn’t entirely disappeared. There are letter writers to brighten the gloom. Here’s one from Peter Sharp of Essex that I liked:
An Extinction Rebellion protester said on television that she would not have children until climate change is fully dealt with. This is a commitment that all of these activists could usefully embrace, as an alternative to disrupting the lives and livelihoods of ordinary people. Benefits would be gained on a number of levels.
A final reflection on climate madness: I saw a report that cow breeding was being investigated to try to produce cows which belched less methane. Belch, by the way, is what cows do; very little in comparison comes out the other end. So the rude word is thankfully rendered redundant. I have an agricultural scientist friend to thank for this insight into the bodily function of bovines. However that is not to my point.
Trying to breed a stock of low-belching cows to replace the current dyspeptic lot will take forever, I would think. And, if XR and Attenborough et al are right, we simply don’t have the time. Mass worldwide slaughter and veganism is the answer and we better get on with it.
IainC – 26th April 2019
A few scattered thoughts about this matter.
As Miss Austen may well have said, “It is a truth universally acknowledged, that a single man in possession of an ideological obsession, must be in want of a crisis to apply it to.”
There is no such thing as a problem to be solved in good time, after marshalling all the relevant facts and preparing the best possible plan for the future. All problems must be converted to crises that need acting upon NOW!!!
It’s a fact that you should never let a good crisis go to waste – there is power and profit aplenty for the ones who grasp the reins early.
If you want to attract large amounts of funding, donations and followers, the crisis must be continuously escalated in severity. No-one cares about a simmering or static crisis.
Once a crisis has generated enough momentum, there are no opposing facts, counterarguments, contraindications or new pieces of evidence that have the slightest effect. The crisis becomes an hermetic bubble, preventing ingress and egress of thought and logic, until, suddenly, it bursts for no apparent reason, although not until the damage has been done.
Guido Negraszus – 26th April 2019
Nothing breaks your heart more than when you have to watch conservative (so called) commentators to also surrender to the climate change cult. Paul Murray (Sky News) this week also declared that he believed in man-made climate change and that we need to do something about it. His explanation? He believes the scientists…! God help us!
Alice Thermopolis – 26th April 2019
Reading XR’s ‘first open letter’ of 26 October last year, the group claims, inter alia, that because “the government is complicit in ignoring the precautionary principle”, it has not only the right, but “moral duty to bypass the government’s inaction.”
Any group that uses this so-called “principle” – a frequent tactic of CC alarmists – to justify its ideology or preferred course of action should take a cold shower, along with all its supporters, talk-show hosts, etc. In genuine science, there is no such principle.
Yet XR uses it to claim it has a “moral duty to bypass government inaction” and “tell the hard truth to its citizens.Wow. Where have we heard that before? Germany in the 1930s?
Attention-seeking virtue-signalling in the age of social media in action, aka noble-cause corruption.
Governments have only themselves to blame for encouraging their “rapid total decarbonisation of the economy” fantasy and version of heaven on earth, an RE utopia.
Biggles – 26th April 2019
The opinions that are held with passion are always those for which no good ground exists; indeed the passion is the measure of the holder’s lack of rational conviction. Opinions in politics and religion are almost always held passionately. – Bertrand Russell
padraic – 26th April 2019
12 years to go. Wow! I wish they would set up a large clock in Times Square in New York counting down the days to oblivion. That way we can see what fools they are, just like a climate seer here who predicted the dams would never fill again. It might also get them to divert their “activist” enthusiasm into something constructive, like eating meat or producing electricity from nuclear energy. In the good old days if a citizen had a problem with some aspect of society they would write a letter to their MP and it would be dealt with (hopefully) out of fear of losing a potential voter at the next election. My father was an exponent of this form of participatory democracy – he claimed he wrote the letters in “oil of vitriol” and sent them in asbestos envelopes, mainly to the local Council. Who are these activist ratbags who think they can act outside our democratic model? They strike me as spoilt brats who never grew up and think if they whinge loud enough mummy (aka the Government) will relent and give them what they want. The situation is made worse by a juvenile media that gives them oxygen. I used to like watching David Rabbitborough’s shows, thinking he was fairly sensible, but I’ll ignore his shows and focus on feeding the parrots in the backyard.
en passant – 27th April 2019
Alice asks ‘where have we heard this before …?’
Here is an extract from an article I wrote in 2012 that may answer her question:
“At University in 1973, I was using this knowledge [about climate change] to write an essay as part of an elective. Unfortunately, I found that free thought, independent research of texts not on the curriculum, private science projects and challenging the orthodoxy was not welcomed. To obtain a “C” pass I reluctantly followed the party line. Shamefully, my scepticism was dormant as I had also become persuaded that such knowledgeable people, who spent their lives studying such things and with so many degrees, titles and accolades to their names must know better, otherwise they would have been proven wrong by other equally brilliant minds. Right?
Yes, we were taught that the consensus mandated with absolute certainty that the next Ice Age was due in twenty years and the world was doomed. After all it was a proven fact in tables, graphs, mathematical formulae and new-fangled computer models that the world would be uninhabitable by the Year 2000 (not ‘2012’ as the Mayans calculated in their apocalyptic calendar) as the North Atlantic would be frozen over for 3 – 4 months a year, Britain would resemble northern Russia and the English Channel would be issuing iceberg warnings. With so little time left it was hardly worth going on and finishing my degree, really … Better, just to live a hedonistic life and just party.”
I am still partying while awaiting the inevitable end from – whatever, but most likely old age.
En passant – Wouldn’t it be nice if that data and “climactic”conclusion you quoted in the above post was now placed in full page advertisements in the newspapers and on TV, followed by the question – What happened?? Please explain?? plus some media extracts quoting Greenies of that era in support of the frozen apocalypse.
Peter Smith – 27th April 2019
Climate change was relegated down the list on this morning’s BBC news show. The new scare, and I am not making this up, is that those seeking Botox injections may be suffering from mental illness, which the aforementioned therapy might worsen. So this obvious idiot posing as an expert suggested that beauty therapists needed to be trained up to spot mental problems and refer their customers to the nearest psychologist or psychiatrist. When this opens the news you just know that the media class in this country have lost the plot. It is no wonder that they buy climate change. After all, it’s even scarier than Botox..
T B LYNCH – 27th April 2019
There are several epidemics raging right now. There is AIDS which kills one million each year and is spread by sodomy. There is obesity which is spread by some ill understood mental mechanism. There is global warming which lacks any basis in theory or observation, and also spreads by some crazy brain process.
Peter, I wouldn’t worry about the BBC and Botox. Like the ABC TV news tonight (and most nights) the BBC concentrates on giving mainly the views of the feral activist groups or items to embarrass conservative politicians and very little news that appeals to normal people. The Botox thing probably reflects the views of a new activist group of those who are beauty challenged and are envious of their better endowed colleagues, erroneously thinking that it is Botox rather than natural selection that is the cause of the difference.
PT – 28th April 2019
Weren’t we told by the UN in 1989 that the earths “life support systems” had hat 10 years without “major changes”? These guys are 20 years too late, and 30 years behind the times in the case of Attenborough!
SB – 29th April 2019
We know that lithium batteries are prone to catching fire (read up on the problems Boeing initially had with the 787), not to mention all the reports of electric cars, hover boards, scooters, bikes, phones and laptops catching fire. Here’s a sample of that:
https://www.foxnews.com/auto/firefighters-dunk-smoking-150000-electrified-bmw-in-tank-of-liquid-to-extinguish-it
We are bombarded daily with leftists breathlessly talking up battery technology, but what they will never tell you is that fast charging reduces the life of the battery and increases the fire risk. Furthermore, we are not told that the battery degrades from the very first time it is used, meaning that with each recharge it will hold a smaller and smaller amount of charge.
But all is not lost. Here’s a truly remarkable solution for electric cars:
https://www.youtube.com/watch?v=4m4OHi7NXuI&feature=youtu.be
The Good Word from Warsaw
Michael Kile
Clarity on the Murray
Des Moore
The Cream of Our Climate Croppers
Tony Thomas
|
cc/2019-30/en_middle_0053.json.gz/line4371
|
__label__wiki
| 0.919646
| 0.919646
|
Sharing World Cup 'something that should be considered' – New Zealand coach
by B. Sarah | Jul 15, 2019 | CRICKET
Gary Stead, New Zealand’s head coach, has suggested that the possibility of sharing the World Cup was something that “should be considered” after his side were denied in a heartbreaking finish at Lord’s on Sunday. The teams could not be...
World Cup Final | I Will be Apologising For Rest of my Life – Stokes on Overthrows Drama
Ben Stokes has been saying sorry a lot lately. His latest apology was to the people of New Zealand for one of the most outrageous sporting flukes that contributed to England winning the Cricket World Cup at the expense of the country of his birth.Stokes had already...
England vs New Zealand | Dejected Neesham Urges Kids ‘Not to Take Up Sports’
London: “Don’t take up sport,” New Zealand’s dejected all-rounder Jimmy Neesham advised kids as he hoped to find at least a day or two in the next decade when the nerve-wracking World Cup final loss to England won’t rankle him.It was the...
World Cup Final | Why Umpires Awarded Six Runs & Not Five for Stokes’ Incident in Final Over
Even as England sealed their historic first World Cup title on the basis of boundaries scored after a memorable final, one of the defining moments in the game came in the final over when the ball deflected off Ben Stokes’ bat and went away for a boundary,...
World Cup Final | Dear Cricket Gods, Why so Cruel on New Zealand?
Dear cricket god, if you exist.Can you get any more cruel? What’s with the obsession for sadism? You first did it to Pakistan – giving them hope even when they seemed down and out, with a million patterns similar to 1992. You did it to Afghanistan, giving...
World Cup Final | We Had Both Allah and Irish Luck With Us: Eoin Morgan
England captain Eoin Morgan hopes his side’s “incredible journey” to World Cup glory will inspire a new generation of fans in the sport’s birthplace.There have long been concerns about declining player numbers in English cricket, with the sport...
Epic final tied, Super Over tied, England win World Cup on boundary count
New Zealand 241 for 8 (Nicholls 55, Woakes 3-37) tied with England 241 (Stokes 84*, Buttler 59, Neesham 3-43)nSuper over England 15 beat New Zealand 15 on boundaries scoredAs it happenedIt was never going to be easy, was it? Two teams without a World Cup title between...
ICC World Cup Final | England’s Roller-Coaster Journey to the Final
Hosts England started the World Cup certainly as one of the favourite going into the tournament. They certainly started that way, registering a couple of convincing wins over big teams.However, weakened by injuries, England lost their way a bit in the middle and at...
ICC World Cup Final | New Zealand Tread Familiar Path on Way to Title Clash
Kane Williamson and New Zealand came into the 2019 ICC World Cup with an agenda similar to England – to win their first title. The Kiwis were losing finalists in 2015, and if initial form was anything to go by they seemed to give themselves a good chance of...
ICC World Cup 2019 | Loss to Australia in Group Stage Galvanised England: Jason Roy
London: Jason Roy says England’s stinging defeat by Australia in the World Cup group phase gave the hosts a “good kick” and helped them rediscover their mojo.England will step out at the “Home of Cricket” on Sunday as favourites to...
|
cc/2019-30/en_middle_0053.json.gz/line4372
|
__label__cc
| 0.700957
| 0.299043
|
Title: Inhibition of methylation and changes in gene expression in relation to neural tube defects.
Author(s): Linden, I.J. van der; Heil, S.G. ; Petersen, M.; Straaten, H.W.M. van; Heijer, M. den ; Blom, H.J.
Source: Birth Defects Research Part A-Clinical and Molecular Teratology, vol. 82, iss. 10, (2008), pp. 676-683
Number of Pages: 8 p.
DOI: https://doi.org/10.1002/bdra.20509
Subject: Biophysical Chemistry
EBP 1: Determinants in Health and Disease
IGMD 5: Health aging / healthy living
IGMD 6: Hormonal regulation
NCEBP 14: Cardiovascular diseases
NCEBP 1: Molecular epidemiology
NCMLS 4: Energy and redox metabolism
ONCOL 3: Translational research
UMCN 5.2: Endocrinology and reproduction
Organization: Paediatrics
Biophysical Chemistry
Health Evidence
Former Organization: Epidemiology, Biostatistics & HTA
Physical Chemistry/Biophysical Chemistry
Birth Defects Research Part A-Clinical and Molecular Teratology
BACKGROUND: An impaired DNA methylation has been suggested to underlie the complex etiology of neural tube defects (NTDs). Previously, we have demonstrated that inhibition of methylation by periodate oxidized adenosine (Adox) results in a widening of the anterior neuropore (ANP) in our in vitro chick embryo model. Since DNA methylation is the chief regulator of gene expression, we hypothesize that inhibition of methylation by Adox in our in vitro chick embryo model will affect the expression of genes that may be involved in neurulation. In the present study, we therefore examined differential gene expression between Adox-treated and control chick embryos, using the Affymetrix Genechip Chicken Genome Array. METHODS: Chick embryos of 4/5 somites were cultured in vitro with saline (control) or Adox and cranial parts were excised. Gene expression profiling was determined using the Affymetrix Genechip Chicken Genome Array on RNA isolated from two pools of Adox-treated cranial parts (n = 12) and two pools of saline-treated cranial parts (n = 12). Microarray data were validated by QPCR analysis. RESULTS: In the Adox-treated chick embryos, 45 probesets were up-regulated (fold > or = 2.0, p < 0.05) and 32 probesets were down-regulated (fold < or = 0.5, p < 0.05). Of the 15 genes selected for QPCR analysis, the up-regulation of phosphoserine phosphatase (PSPH), unc-51-like kinase 1 (ULK1), and chemokine (C-X-C motif) ligand 12/stromal cell-derived factor 1 (CXCL12/SDF-1) was confirmed. CONCLUSIONS: Inhibition of methylation by Adox affects gene expression in our in vitro chick embryo model. Further research will focus on the gene-specific methylation patterns of PSPH, ULK1, and CXCL12/SDF-1 and the role of the products of these genes in neurulation.
Faculty of Science [25928]
|
cc/2019-30/en_middle_0053.json.gz/line4380
|
__label__wiki
| 0.7099
| 0.7099
|
Measuring Parental Language to Target Families for Early-Int...
Measuring Parental Language to Target Families for Early-Intervention Services
2016 Measuring Parental Language
Nicole Gridley
Helen Baker-Henningham
Judy Hutchings
Lack of expressive and receptive language skills can have a negative effect on a developing child if not identified and remedied early in the child’s life. Current community and individual strategies to identify families with children who may need additional support are limited, and may not be sufficient to detect child language problems before they become entrenched. The present study explores the feasibility of using observed indices of parental language as a means of identifying families whose children are at risk of poor outcomes. Fifteen-minute speech samples taken from videotaped observations of 68 English speaking Welsh parent-toddler dyads interacting in the home during free-play were coded for 11 categories of parent language. Three complex measures were developed through factor analysis; parent prompts, encouraging and critical language. Two simple language indices (parent total words and total different words) were calculated for comparison. Two complex measures evidenced acceptable levels of inter-rater reliability, reasonable stability over time (p < 0.05) and some construct validity in terms of their association with socioeconomic disadvantage. ‘Parent prompts’ predicted toddler receptive and expressive language six months later (p < 0.05). In comparison the two simple measures were more reliable and stable over time and were just as strongly predictive of toddler language. The findings suggest that observed indices of parental language could prove useful in identifying high-risk families in need of specific support, such as parent training or other speech and language support, and the use of simple measures could be integrated into the assessment frameworks used by existing Early Years services. Further research is required to establish the feasibility of integrating such methods into current service delivery and to establish the overall cost for Early Years services of incorporating this measure.
Child Care in Practice
Published - 8 Dec 2016
|
cc/2019-30/en_middle_0053.json.gz/line4382
|
__label__cc
| 0.514358
| 0.485642
|
20 Day Peru with 6 Day Eastern Galapagos Cruise
3 Lima, 2 Urubamba, 2 Cuzco, 2 Puno, 2 Guayaquil, 5 Cruise & 2 Quito
Round trip airfare from MIA, 19 nights accommodation, all transfers, most meals and sightseeing
Flights Miami-Lima, Quito-Miami
Some departure dates may be offered from an alternate nearby airport. Check flight itinerary options when booking.
All intra-flights: Lima-Cuzco & Juliaca-Lima, Lima-Guayaquil & Guayaquil-Baltra-Quito
3 nights Lima
2 nights Urubamba Sacred Valley
2 nights Cuzco
2 nights Puno
2 nights Guayaquil
6 nights M/V Santa Cruz II
2 nights Quito
36 meals: 19 breakfasts, 8 lunches, 9 dinners
Sightseeing per itinerary in modern motor coach
Services of English-speaking tour manager (Days 1-9)
Services of English-speaking local guides
Services of English-speaking naturalist guides in the Galapagos (Days 12-18)
Galapagos National Park Fee of $100
Galapagos Transit Control Card fee of $20
City Tour of Lima with its 2000 years of history
Visit the impressive Inca fortress of Ollantaytambo
Discover the astonishing ancient citadel of Machu Picchu via the PeruRail Vistadome Train
Excursion by boat to the fascinating Uros Floating Islands
Explore Guayaquil, the largest city in Ecuador and the nation’s largest port
Visit Parque Historico and learn about the history & culture of the region
Embark on a journey to the beginning of time in the Galapagos Archipelago of volcanic islands
Travel along the coast on a panga while naturalist guides explain the area's dramatic geology
The unique environment encourages sea lions, Sally lightfoot crabs, penguins and flightless cormorants
Walk in an impressive cactus forest surrounded by land and marine iguanas and blue-footed boobies
Snorkel on magnificent white sand beaches with plentiful marine life
Visit the Charles Darwin Research Station's giant tortoise Breeding Centre
Discover Quito's colonial quarter, designated a UNESCO World Heritage Site
Stand at the Middle of the World monument, situated at latitude 0º
This 20 day “on-the-go” program features the highlights of Peru & the Galapagos in an active itinerary which includes several walking tours as well as some early starts and long days.
DAY 1, Monday - Depart for Peru
Depart for Lima, Peru; arrival and transfer to your hotel. The rest of the day is at leisure with time to rest, relax and acquaint yourself with Peru’s vibrant capital, founded in 1535 by the conquistador Francisco Pizarro
Overnight: Lima
DAY 2, Tuesday - Lima City Tour
This morning’s tour of Lima, with its 2000 years of history, begins at the colonial center of the city, declared a UNESCO World Heritage Site, with its historic buildings surrounding the splendid Plaza Mayor. View the impressive Palace of the Archbishop with its fine carved balcony, the opulent Government Palace, the official residence of the President, and the 16th-century Cathedral of Lima whose first stone was laid by Pizarro. Continue to the 17th century Monasterio de San Francisco complex with its magnificent tiles, ornately carved ceilings, exceptional paintings and world-renowned library. Spend the remainder of the day at leisure or join the optional Pachacamac Pre-Inca Ruins tour. Visit the archaeological site of Pachacamac, one of the largest religious centers in pre-Inca times on the Peruvian coast. This afternoon, join your Tour Manager for an orientation meeting about the wonderful journey that awaits you. Tonight, perhaps attend the optional Evening Larco Herrera Museum with dinner. Experience one of Lima’s most magnificent museums by night on this tour, that also includes a light supper. Admire the world's largest collection of pre-Columbian masterpieces and a stunning exhibition of gold and priceless jewels
Optional: Pachacamac Pre-Inca Ruins (PM)
Optional: Evening Larco Herrera Museum with dinner
DAY 3, Wednesday - Fly to Cuzco, Chinchero Weaving Demonstration
Depart Lima this morning by flight to Cuzco, an ancient capital of the Inca Empire and the oldest continuously inhabited city in South America. Upon arrival, drive through the rugged mountainous region with its magnificent panoramas, along roads with farms and small villages to the Sacred Valley of the Incas. En route, stop in Chinchero. Here, enjoy an authentic Peruvian lunch followed by a demonstration of the ancient Andean tradition of making textiles from naturally dyed handwoven alpaca wool. Remarkably, the source for the vibrant colors are dyes that come from plants, minerals, and insects. Wander around the complex and shop for souvenirs among the fine textiles and other local treasures. Time permitting, meet children at a local school before continuing to your hotel in the Urubamba Sacred Valley. This evening, dinner together with music at a lovely restaurant
Overnight: Urubamba Sacred Valley ▲
DAY 4, Thursday - Sacred Valley & Ollantaytambo Ruins
Enjoy this morning at leisure in the Sacred Valley to explore some of the ancient ruins independently or, join the optional tour to Maras and Moray. The excursion begins in Moray, a remarkable agricultural center that demonstrates the ancient Incan's mastery of high-altitude crop growing. You’ll be astounded by the large complex of perfectly circular depressions in the earth that historians believe were used to study climatic conditions. Next, travel to the colonial town of Maras, known for its nearby salt evaporation ponds in use since the time of the Incas. This afternoon, visit the impressive Inca fortress of Ollantaytambo, an ancient complex of temples and terraces towering high over the valley, the last stand of the Incas in their defense against the Spanish conquistadors. Marvel at the architecture of the Incas in this well-preserved settlement, considered a living museum of 15th-century life. Tonight, join the optional traditional dinner with a Peruvian Family in their countryside home. Sample delectable home-cooked Peruvian specialties along with a warm and friendly cultural exchange
Optional: Maras and Moray Tour
Optional: Dinner with a Local Peruvian Family
Overnight: Urubamba Sacred Valley
DAY 5, Friday - Discover Machu Picchu
Early morning transfer to the Sacred Valley's Ollanta Station to board the Vistadome Train that travels through misty peaks to the astonishing ancient citadel of Machu Picchu, the "Lost City of the Incas", designated by UNESCO as one of the New Seven Wonders of the World. Machu Picchu was virtually unknown to the western world until Hiram Bingham's re-discovery in 1911. Spend the morning viewing the unforgettable wonders of this 15th-century retreat, abandoned nearly 100 years later with the arrival of the conquistadors. See the highlights of the site including the imposing Temple of the Sun, the House of the Priest, the Sacred Plaza and the intricately carved rock likely used as a sundial by the ancient Incas. The images of this significant archaeological site will be a long-lasting memory. Return to the Sacred Valley in the early evening and transfer to your hotel in Cuzco for overnight
*Approximate time spent at the ruins of Machu Picchu is 2 hours
Overnight: Cuzco
DAY 6, Saturday - Full Day in Cuzco
Spend today independently discovering the "Imperial City" of Cuzco, once the capital of the Inca Empire and a UNESCO World Heritage Site. This lively city, rich in history, reveals remains of both the Incan and the Spanish presence. Take time to explore some of the city’s stunning sights, or, shop for some of the finest handicrafts and textiles in all of Peru. Participate in the optional Cuzco "Behind the Scenes" tour, offering a glimpse into the other side of life in Cuzco. On this tour, visit a local market and taste fresh-baked Chuta bread. Stop at the Cuzco cemetery to learn more about Andean life and death and meet with a local "shaman" (holy man). After the cooking demonstration, enjoy a delicious meal. In the afternoon, join the optional Highlights of Cuzco excursion that takes you to the impressive Colonial Cathedral with its collection of over 400 paintings, the Temple of the Sun and the fortress of Sacsayhuaman, which took over seven decades to complete. Tonight, join your fellow travelers for a buffet dinner featuring delectable Andean specialties
Optional: Half Day Cuzco Behind the Scenes (AM)
Optional: Half Day Highlights of Cuzco (PM)
Optional: Highlights of Cuzco & Cuzco Behind the Scenes Combo Package
DAY 7, Sunday - Raqchi & Puno
Depart Cuzco early in the morning on a long drive today. Enjoy spectacular scenery as you drive through the Andes mountain range and the Andean plains to Puno on the Peruvian side of Lake Titicaca. In this area, South American camelids (llamas and alpacas) graze on the immense plateaus and plains. En route visit the 15th century Temple of Wiracocha, with its elaborate stonework, the largest Inca temple ever discovered. Today, Raqchi remains home to many farmers, ranchers, and artisans. Then, you arrive at pristine Lake Titicaca sitting majestically at 12,500 feet above sea level, backed by the snowcapped peaks of Bolivia's Cordillera Real range. This is the highest navigable lake in the world and South America's largest freshwater lake. A box lunch will be provided en route before arriving in Puno for your overnight
Overnight: Puno
DAY 8, Monday - Excursion to Uros Islands on Lake Titicaca
This morning, an excursion by boat transports you from Puno to the fascinating Uros Floating Islands where the indigenous people of the area, the Uros, live on islands that dot the lake. The Uros live very much the same as their ancestors did and still follow the ancient customs and traditions. These islands are completely man-made structures, using the totora reeds from the lake to build the islands and houses. Return to Puno for the remainder of the day at leisure. Or, take the optional tour to the Sillustani Tombs, the pre-Incan burial ground on the shores of Lake Umayo. The tombs here are built above the ground in tower-like structures called chullpas, vestiges of the Colla people before they were conquered by the Incas in the 15th century. Evening is at leisure in Puno
Optional Half Day Sillustani Tombs (PM)
DAY 9, Tuesday - Fly to Lima, Farewell Dinner
Transfer to Juliaca airport, for your flight to Lima; rest of the day is at leisure. Tonight, you bid farewell to your Tour Manager and fellow travelers at a special Farewell Dinner with Peruvian specialties
DAY 10, Wednesday - Depart Lima, Arrive in Guayaquil
Depart Lima for your flight to Guayaquil, Ecuador; arrival and transfer to your hotel. Balance of the day is at leisure
Overnight: Guayaquil
DAY 11, Thursday - Guayaquil City Tour & Parque Historico
Your discovery of Guayaquil begins at the main square, with its stirring memorial to the Heroes of the Independence, symbolizing the triumph of the Republic against the Spanish. Continue to Seminario Park (Parque de las Iguanas), a favorite place for bird watchers and home to arboreal Iguanas. Next, experience the many ethnological influences present in Ecuadorian culture by viewing the contrasting architecture of a Neo-Gothic Cathedral, a Moorish clock tower, and La Rotonda Monument. Continue to the lovely riverside Garden of Malecon and Santa Ana Hill where the city was founded in the 16th century. Continue to Parque Historico and learn about the history & culture of the region. Return to your hotel for an evening at leisure
DAY 12, Friday - Galapagos Islands, Embarkation, Baltra Island
Embark this morning on a journey to the "beginning of time" as you transfer to the airport for the flight to the astonishing Galapagos Archipelago of volcanic islands, five million years in the making. Arrive at Baltra Airport, meet your naturalist guides and transfer to the pier to board the M/V Santa Cruz II. Lunch on board with time to settle in before this afternoon's excursion to Mosquera Islet, a tiny island resulting from an uplift of sand, made up of coral reefs and rocks, located between the islands of Baltra & North Seymour. After a wet landing, your guides will lead you past sea lion colonies, one of the largest in the Galapagos archipelago. You will have a great opportunity to snorkel, before returning to the ship for an evening briefing and Welcome Dinner
Overnight: Galapagos Cruise
DAY 13, Saturday - Puerto Baquerizo Moreno, San Cristóbal Island
After breakfast, disembark at Puerto Baquerizo Moreno, the capital of the Galapagos province and drive to Cerro Colorado on the southern shore. Here, visit the breeding center for highly endangered giant tortoises in the midst of a deciduous forest. View a variety of wildlife, including the San Cristobal mockingbird and the San Cristobal lava lizard, both endemic species to this island. Lunch on board, followed by an afternoon excursion to Punta Pitt on the eastern tip of the island. This is the only site in the Galapagos where you can view all three species of boobies: blue-footed, red-footed and Nazca boobies. After free time for hiking, swimming or snorkeling, return to the ship
DAY 14, Sunday - Santa Fe Island, South Plaza Island
Enjoy a boat ride this morning to Santa Fe Island, one of the oldest in the archipelago with volcanic rocks over 4 million years old. Walk along the idyllic white sand beach with its countless sea lions and hike amid Opuntia cactus plants searching for the famous Barrington land iguana, a unique species endemic only to this island. Snorkeling and swimming is a delight here or, sail on a glass bottom boat with stunning underwater views. Following lunch on board, you land on South Plaza Island. Here, turquoise waters contrast brilliantly with the white sand and black lava of the shoreline, accented by a carpet of scarlet succulents that change color every season. View yellow-grey iguanas sitting under luminescent prickly pear cactus waiting patiently for pears to drop. Along the coastline, observe a countless variety of playful sea lions, frigates, swallow-tailed gulls and shearwaters gliding and playing with the thermals. An interesting lecture on board tonight previews tomorrow's adventure
DAY 15, Monday - Puerto Ayora, Charles Darwin Research Station, Santa Cruz Island
An extraordinary visit awaits you today at the iconic Charles Darwin Research Station’s Giant Tortoise Breeding Centre. Nestled in an impressive cactus forest, this center of research and conservation is renowned for its captive breeding program for giant tortoises. You’ll come face-to-face with 100-year-old giant tortoises eating, sleeping and wallowing in the mud. Get a close-up look at these amazing Galapagos giants and learn about their origin, evolution and threatened extinction. Time to linger and enjoy this unique experience before lunch in the cooler highlands of Santa Cruz Island, a completely different ecosystem. Later, your choice of hiking, mountain biking or kayaking in calm and beautiful Tortuga Bay. After an enlightening day, return back on board for dinner and to hear about your expedition plan for tomorrow
DAY 16, Tuesday - Punta Suarez, Gardner Bay, Española Island
An early start this morning as you explore the coastline on a panga while your naturalist guide explains the dramatic geology of the area. At Punta Suarez on Española, the southernmost island in the archipelago, you're warmly welcomed by noisy sea lions. Several wildlife species make this island their home, including masked and blue-footed boobies and marine iguanas who lazily bask in the sun on the rocks. On this island, the waved albatross nests in the bushes from April to December, returning to the island to find its lifelong mate. Following the winding trail to the western side of the island, stop at the Galápagos famous blowhole that sends a tall jet of spray gushing through the lava. Back on board for lunch. In the afternoon, a visit to tranquil Gardner Bay that reveals a picture postcard white coral beach surrounded by dazzling blue seas. It’s a beautiful setting for observing sea lions, mockingbirds, finches and to enjoy great swimming and snorkeling. Return to the ship for an evening briefing and dinner
DAY 17, Wednesday - Eden Islet, Santa Cruz Island, North Seymour Island
After breakfast, a panga ride takes you to Eden Islet, located off the coast of Santa Cruz Island. Here, you see a variety of Galapagos wildlife, blue-footed boobies, reef sharks, and frigates. A chance to snorkel, kayak and ride a glass-bottom boat (weather permitting). Continue to North Seymour Island, lifted from the ocean floor by a seismic event. Cliffs that are only a few feet high form the shoreline, where swallow-tailed gulls sit perched on ledges and a tiny forest of silver-grey Palo Santo trees stand just above the landing. This island is teeming with wildlife! You might have to give right-of-way to a passing sea lion or a marine iguana. Along the way, perhaps you may see the famous Galapagos blue-footed booby nesting beside the trail or spot flocks of pelicans in a feeding frenzy. Keep on the lookout for the magnificent frigate bird, with its puffed-up scarlet throat sack, perched in low bushes watching over their chicks. Tonight, bid goodbye to the crew, the naturalist guides and your new-found friends at the Farewell Dinner
DAY 18, Thursday - Disembarkation, Balta Island, Flight to Quito
Disembarkation at Baltra Island. Then, proceed to the airport for the flight to Quito through Guayaquil. Arrive late afternoon in this historic city in the high Andes at the base of the Pichincha Volcano and transfer to your hotel. Remainder of the day is at leisure to discover this charming city independently
Overnight: Quito ▲
DAY 19, Friday - Quito City Tour & Visit to the Middle of the World
The morning's tour begins with a visit to the colonial section of Quito to walk along the narrow cobblestone streets and feel the charm of 16th-century Quito. See the Independence Plaza, the Cathedral, Presidential Palace, and the Archbishop's Palace before visiting La Compañia de Jesus Church, with its beautiful gilded interior or the Church and Monastery of San Francisco, one of the great religious buildings of the New World with its impressive facade and atrium. Afterward, visit the Middle of the World Monument, located at a latitude of 0º, and stand with one foot in the Northern and one in the Southern Hemisphere. The balance of the day is at leisure
Overnight: Quito
DAY 20, Saturday - Depart Ecuador
Some flights depart shortly after midnight in the very early morning of Day 20 and will require a transfer on Day 19. Transfers depart the hotel approximately 4 hours prior to flight time
▲Due to the high elevation, travel in the Ecuadorian Andes and Peruvian highlands may cause some passengers to experience the temporary effects of altitude sickness. If you have any concerns about traveling to higher than your accustomed elevation, please consult your healthcare provider.
Land only price does not include arrival/departure transfers, but does include flights Guayaquil-Baltra-Quito, Quito-Lima, Lima-Cuzco & Juliaca-Lima.
Passport numbers for all passengers must be submitted before documents can be issued.
The route and program may vary according to weather conditions, seasonal changes, safety issues and wildlife migration patterns.
Wildlife and visits listed in the itinerary are based upon optimal conditions and therefore subject to change.
Dry landing: Passengers step from the dinghy onto rocks or a dock.
Wet landing: As the dinghy edges onto a sandy beach, passengers step into knee-deep water and wade ashore.
Sturdy shoes are recommended for this program.
Triple Rooms cannot be accommodated on this program
Entry Fees/Departure taxes are required as follows: Quito taxes of up to US $3
Day 11 Half Day Larco Herrera Museum & Pueblo Libre
Day 13 Dinner with Local Peruvian Family
Day 15 Half Day Highlights of Cuzco
Day 17 Half Day Sillustani Tombs
20 Day Peru with 6 Day Eastern Galapagos Cruise20 Day Peru with 6 Day Eastern Galapagos Cruise - Horizon Deck Explorer Tour
Oct 7 $8789 $8349
20 Day Peru with 6 Day Eastern Galapagos Cruise20 Day Peru with 6 Day Eastern Galapagos Cruise - Expedition Deck Explorer Tour
|
cc/2019-30/en_middle_0053.json.gz/line4387
|
__label__wiki
| 0.783081
| 0.783081
|
Editorial Awards
Risk & Insurance Wins Editorial Awards
For the fourth year running, the magazine's edit team wins an award for its coverage of emerging risks.
By: Dan Reynolds | April 10, 2018 • 2 min read
Topics: Climate Change | Emerging Risks | Insurance Industry | NWCDC | Workers' Comp
Risk & Insurance® editors and writers picked up three awards for editorial excellence in early April.
At an awards luncheon in Washington, D.C. for the Middle Atlantic Chapter of the American Society of Business Publication Editors, the magazine garnered tributes for column writing, coverage of emerging risks and an executive profile.
Taking home a silver for a contributed column was Risk & Insurance® Senior Editor Roberto Ceniceros. Ceniceros, who also serves as the chairman of the National Workers’ Compensation and Disability Conference® & Expo, was recognized for his October 2017 column The Quest for the Straight Dope, based on his personal observations on the use of medical marijuana in pain management.
The entire Risk & Insurance editorial team was honored with a regional silver for its April, 2017 special section, 2017 Most Dangerous Emerging Risks. The 11-page special section was produced after interviews with dozens of insurance and risk management professionals and focused on four emerging risks.
Managing Editor Anne Freedman, who tragically passed away in June 2017, wrote the Cyber Business Interruption portion of the section as one of her last pieces for the magazine. Anne’s piece forecast the economic damage should the internet infrastructure be hacked and brought down.
Associate Editor Katie Dwyer contributed a piece on U.S. Economic Nationalism, which reported on the possible long-term economic damage that could result from nationalistic policies. A companion piece by staff writer Julianne Walsh examined Foreign Economic Nationalism and the threat it poses to multinational corporations.
Associate editor Michelle Kerr distilled her conversations with insurance and risk management experts on the threats of artificial intelligence into her piece Artificial Intelligence Ties Liability in Knots. And in Coastal Mortgage Value Collapse, editor-in-chief Dan Reynolds explored the potential that rising seas could trigger a de-escalation of coastal property values, triggering a mortgage-related financial meltdown.
Risk & Insurance® Executive Editor and Publisher Matthew Kahn, who oversaw the planning and execution of the Most Dangerous Emerging Risks coverage, was an additional honoree.
“Creating compelling narratives that shine a light on the most pressing risks facing business and society is at the core of what we do,” said Kahn.
“We’re gratified that our trade journalism peers recognized us in this manner,” Kahn said of the awards.
This marks the sixth time that the Risk & Insurance editorial team won a regional or national award for its emerging risks coverage.
For his October, 2017 profile of Allied World program executive Grace Meek, entitled Grace Under Pressure, editor-in-chief Reynolds also picked up a bronze citation in the executive profile category.
Dan Reynolds is editor-in-chief of Risk & Insurance. He can be reached at [email protected]
2018 Most Dangerous Emerging Risks
Climate Change as a Business Interruption Multiplier
Crumbling roads and bridges isolate companies and trigger business interruption losses.
Service Spotlight: Multinational
8 Questions for Dawn Miller
An insurance executive shares how foreign companies can overcome the unique challenges facing an expansion into the U.S.
12 Risks That Could Impact Your Auto Fleet
On-the-road risks are becoming more challenging to manage. See our map of the top current exposures plotted by frequency and impact.
More Bots Chatting Up the Insurance Industry
As chatbots become more intelligent, they will usher in new standards in efficiency and customer satisfaction for the insurance industry.
Risk Insider: Chris Mandel
Insurtech or RiskTech?
As insurtech is reconfiguring the way the insurance world works, there is plenty of room for similar efforts on the risk management side.
2018 RIMS
Risk Executives Must Keep Up with the Pace of Disruptive Technology
This year's Excellence in Risk Management report reveals a gap between awareness of new technologies and the ability to employ them strategically.
Cyber Coverage
Plugging the Cyber Gap
Marrying property and cyber coverage seamlessly is an area of increased focus for risk managers and underwriters.
Intelligent Cyber Defense
Machine learning programs are taking cyber security to the next level, though they won't keep hackers at bay for long.
|
cc/2019-30/en_middle_0053.json.gz/line4388
|
__label__cc
| 0.554297
| 0.445703
|
“Dating: Adults Embracing Failure”,, a Huge Success!
July 14, 2014 Justin Allan Kimball
Highly Recommended: Theatre In Chicago
Reviewed by: Justin Allan Kimball
I will always love a good sketch comedy show. I think it will always be dear in my heart and that is why I was very excited and a little skeptical to see “Dating: Adults Embracing Failure”. On the one hand I love sketch but “relationship” sketches can sometimes be stereotypical and way over done. Even when I entered the theater I had no idea what I was getting into because there was no set, no music and no programs. It could’ve gone either way in my opinion, and I’m SO glad it went the right way. The production may have been one of the more fun and genuine theater experiences I have encountered in Chicago. The story revolves around two actors (Josh Lanzet and Lindy Voeltner) who put on the “masks” of many different types of couples. Anywhere from an arguing older couple to a couple of Mimes who just want to find love. With some dancing and singing thrown in there, this production tells a very fun, silly and heartfelt version of modern relationships/break ups.
Lanzet and Voeltner did a fantastic job writing this piece. It started off a bit slow but by the time we met the “older couple” it really started to get a head of steam. We met so many fun and interesting people who very quickly became important to the audience. They made us laugh, but interestingly enough made us cry. There was a moment where I literally JUST met a character and then they were gone (dead) in the next scene. I had the knot in my throat sooo hard, and by the time they came back to that story line I had full on tears. Lanzet’s monologue to his fallen love was on the edge of too real for me so that just shows how fantastic it really was. You don’t often get that kind of instant development of a character. Brava. Brava. The only thing that took away from the story was some of the goofier moments in the show. I LOVE me some goofy in a show like this but some of the silly took me more out of the show then it pulled me in. For instance, the mime sequence was very fun but it felt underdeveloped compared to the rest of the show. If you are going to be a mime, REALLY be a mime. It just was a bit sloppy and the rest of the show felt so real that it made these moments stand out in a not so good light. Otherwise the performances of these two were absolutely spot on.
Now, I have really laid it on thick with how much I loved this show but there was something that very much bothered me. The technical aspects of this show were a bit lackluster. The choreography of the synchronized movements were often off and distracted from the clever lines being spouted off. I loved that during the transitions sometimes they did funny little movements that kept the audience in the show. SO, let’s change that sometimes to every time. Some of the off stage exits seemed too long and unneeded for the very little they had to do. There were no big costume changes and much of the costumes were changed on stage. It just hurt the pacing and I know they could put a more clever spin on the whole thing since they did “sometimes”. Things like this are so easy to fix and would help the production value immensely. It’s a clean show, now just polish it and make it perfect.
“Dating: Adults Embracing Failure” is a much see show for anyone who has ever been or ever plans on being in a relationship. On multiple occasions I felt myself being launched back in time to a previous relationship and having fun reminiscing on what an idiot I was. So get yourself a date and come out to the Royal George Theater.
Dating: Adults Embracing Failure runs every Friday thru Aug. 1st at the Royal George Theatre, 1641 N Halsted St, Chicago, IL 60614 at 8pm. Tickets are $20.00 adultsembracingfailure.com/tickets. (312) 988-9000
« USA Network’s Brilliant New Series ‘SATISFACTION’ Engages On Multi-Levels
Chicago Shakespeare Theater’s SEUSSICAL Is Lightning In a Bottle »
|
cc/2019-30/en_middle_0053.json.gz/line4401
|
__label__cc
| 0.646696
| 0.353304
|
Caernarvon Freshwater Diversion and Delta
Home » LPBF Programs » Coastal Sustainability » Coastal Projects » Caernarvon Freshwater Diversion and Delta
Located 15 miles downriver from New Orleans in Plaquemines Parish near the Plaquemines/St. Bernard Parish line is the Caernarvon Freshwater Diversion. Constructed in 1991, the diversion was designed to divert up to 8,000 cubic feet per second, approximately the volume of 2,353 large crawfish pots each second. It's intended purpose was to move fresh river water from the Mississippi into the local estuary, limiting the capture of sediment. Despite this, new land is building in the diversion's main catch basin, Big Mar Pond.
Why Study the Caernarvon Freshwater Diversion and Delta?
The Caernarvon Freshwater Diversion has been in operation since 1991 and therefore provides an opportunity to examine the long-term impacts of freshwater diversions on the receiving basin.
Although the diversion was not meant to transport sediment, the subsequent growth of land as a result of its opening resembles the activity of a sediment diversion. For that reason, understanding the effects of the Caernarvon Diversion on the surrounding basin may better inform the construction and operation of future diversions; an integral part of coastal restoration plans for the Southeast Louisiana.
Investigating this emerging delta also offers an opportunity to observe and analyze land building processes as the result of a diversion. It is important to remember that a thriving delta with a restored swamp enhances hurricane storm surge protection to nearby levees and communities (see Multiple Lines of Defense Strategy.)
Because the Caernarvon Freshwater Diversion deposits sediment in spite of its design, we want to know how much sediment is in the water it's moving into Big Mar. We have been conducting regular measurements (more often during high water) of the turbidity entering the basin, which can be used to approximate the sediment load flowing through the diversion.
Turbid, or murky, waters containing sediment have been depositing and developing into a delta complex within Big Mar. With the hope of better understanding the effect of future sediment diversions, we track the expansion and consolidation of this delta. We are beginning to expand these investigations outside of Big Mar and into the larger receiving basin, including any influence the diversion may have on the Breton Sound Basin.
To us, new land means more barriers between coastal communities and storm surge! And we can help ensure the longevity and stability of newly formed land by restoring the healthy swamp that once thrived there. That in itself is an intricate task, but luckily for us, the forming delta provides an outdoor laboratory, perfect for identifying best practices for swamp regeneration.
We plant species native to swamp environments, and continue to keep tabs on them in the following years, monitoring closely for survival and growth rates to inform future restoration projects. Since 2010, we have planted 25,594 trees and have restored more than 130 acres within Caernarvon receiving basin.
Land Change in Big Mar Pond
Land Change in Big Mar
In southern Louisiana, land loss rates are high and areas of delta growth have generally been limited to the Atchafalaya Delta and the Bird’s Foot Delta. The Caernarvon Diversion was built to regulate surrounding salinity levels with fresh water to improve fishery productivity in the Breton Basin. Doing so required moving river water from the Mississippi into the local estuary. Because the original intention of the diversion was to regulate salinity, it was placed at an area of the Mississippi River unlikely to be laden with sediments and constructed to avoid sediment capture by drawing water off the surface of the river.
Despite this, new land is building. Since the construction of the diversion in 1991, sediment has been deposited in Big Mar Pond and beyond. Over time, there has been enough accumulation in some areas to permanently support emergent wetland plant life. In Big Mar Pond, prior to 2004, wetland growth was negligible, but since then wetland growth (or land gain) has been significant and appears to be increasing annually. Over 700 acres of land growth has occurred since the diversion came on line in 1991!
Here's a breakdown: From 2005 to 2012, there was 153 acres of land gain. From 2010 to 2011, there was significant wetland growth most likely built during the two months that the Caernarvon Diversion was open at maximum capacity (8,000 cfs) to combat the 2010 BP Oil Spill. Coincidentally, while open at maximum capacity, there were also three sediment spikes in the river that feeds the diversion allowing for more sediment deposition than expected. In 2014 and 2015, long periods of low water in the basin during the summer led to delta growth as vegetation expanded.
Over time we have seen a delta form with classic delta morphology of crevasse splays and distributary channels. The delta has quickly become vegetated with fresh marsh species and an extensive black willow forest.
The changing landscape around the Caernarvon Freshwater Diversion from 1998 to 2015. Land gain was not visible until 2005. Prior to that Big Mar was filling in with sediment and a threshold was finally reached where land emerged above water and became vegetated. Also noticeable is the substantial land loss that occurred between 2004 and 2005 due to Hurricane Katrina. The delta continues to expand over time.
Caernarvon Freshwater Diversion Outside of Big Mar
As the sediment continues to flow from the freshwater diversion, we are interested in identifying the boundary of its influence on the surrounding area. We made an effort to uncover the extent of impact in 2015, when we conducted a transect and sediment study in the Caernarvon receiving area. Our goal was to find out how far the influence of the Caernarvon Freshwater Diversion reached into the surrounding basin.
This study included 6 transects with 128 sampling points, where elevation was measured with a high precision GPS. At 50 of the sites, soil cores were collected to test for bulk density (soil compaction) and organic matter content. In general, soils were more compact and less organic closer to the diversion, which would be expected since the sediment coming from the river is mineral rather than organic. The highest organic matter content was in hurricane shears created during Hurricane Katrina.
Many of the cores showed a grey mineral layer over a black organic layer, indicating deposition from the diversion on top of organic soils that were in place before the diversion came online.
Soil core from Caernarvon region showing 20 cm (7.8 in) of deposition from the diversion (left), coastal scientists collecting high precision elevation data and a core (middle), soil core from the Caernarvon region that is all organic material with no deposition, indicating that it was outside the area of influence of the diversion (right).
Swamp Restoration in the Caernarvon Delta
For all of us in south Louisiana, a healthy swamp plant community provides an additional defense against storm surge. Unfortunately, swamp regeneration often does not occur naturally in southeast Louisiana because of nutria herbivory, high interstitial soil salinity, altered hydrological regimes and slow germination rates. Under existing conditions, without human intervention, natural swamp regeneration is not easily possible.
However, we believe that south Louisiana would greatly benefit from a rebuilt swamp land. So, after monitoring soil salinity, marsh density, and other factors that affect swamp species, we identified several sites within the Caernarvon Diversion receiving basin that would be suitable for a swamp intervention. LPBF chose the Caernarvon area for swamp regeneration because the diversion created conditions that were conducive to swamp species growth by creating fresh habitat and possibly fertilizing the trees with river nutrients.
Since then we've conducted large scale swamp species plantings with our partners Coalition to Restore Coastal Louisiana (CRCL), Restore the Earth Foundation (REF), and with the help of many dedicated community volunteers. Our plantings have been on a roll since 2010 and to this date we have planted 25,594 trees and restored more than 130 acres! Together we transport, space and plant the swamp trees, as well as outfit them with nutria protectors. Nutria protectors are a critical component of tree survival; without them newly planted trees are readily eaten or destroyed by the prolific rodent.
In 2013, to estimate the success of our efforts, we instituted a monitoring program that tracks the growth and survival of a portion of the many trees we’ve helped to plant. Revisiting the swamp restoration sites every year, we collect data on survival as well as measure height and diameter (at breast height) of each tree in our monitoring program. Afterward, the data is analyzed to produce growth rates for trees by planting (over time), by species, and by location. The data provided from the monitoring program has proven to be invaluable for showing success of this project and providing lessons learned for future plantings to improve success. To date, that data shows an overall survival rate of 80%!
The main goal of this project is to restore the natural swamp forest of the Caernarvon area, and in doing so buffer existing levees and reduce the risk of storm surge for the surrounding coastal communities. Besides the tangible progress this project has made, the work being done around the Caernarvon Delta Complex provides a unique opportunity to test the effectiveness of many proposed State Master Plan restoration initiatives, which rely heavily on river diversions. This project shows what is possible in the footprint of future sediment diversions.
Map showing the location of the 26,000 swamp trees planted through 2016 in the Caernarvon Delta Complex. The trees are planted in front of the newly built federal levee system (HSDRRS) and local Plaquemines Parish levee. The goal is to protect our levees which protect our people.
Volunteers having fun in the mud (top left), tags used to identify individual trees in the monitoring program (top right), nutria protector being installed by volunteers (bottom left) and a site just after planting showing all the trees with their protectors (bottom right).
Real-Time Discharge Information link
Caernarvon Fact Sheet
Operation Rpts Caernarvon FW Div 2006
Caernarvon Revised Environmental Analysis FONSI 2008
Caernarvon Delta and Swamp Restoration
Caernarvon Delta Report 2011
Caernarvon Delta Planting July 2012
Caernarvon Delta Planting Dec 2012
Caernarvon Delta Planting June 2013
Caernarvon Delta & Diversion Study April 2014
Sediment Distribution
Caernarvon Diversion Pulse Opening February 2017
Sediment Deposition Pulse Opening Winter/Spring 2017
Turbidity Graphs
Caernarvon Turbidity Sampling Dec 2009-Oct 2010
Caernarvon Turbidity Sampling Feb 2011-Dec 2011
Caernarvon Turbidity Dec 2011-2012
Caernarvon Turbidity 2013
|
cc/2019-30/en_middle_0053.json.gz/line4406
|
__label__wiki
| 0.599369
| 0.599369
|
West Los Angeles College, Science and Math Building
Culver City, California
HOK
Los Angeles Community College District
This facility will serve as the college’s new flagship instructional laboratory and classroom building. Perched at one of the highest points on the west side of the city, the facility offers a spectacular view of the west Los Angeles basin. The design takes advantage of the views while responding to campus programmatic needs. This facility will house the physical- ADDITIONAL INFORMATIONCOST PER SQ FT$333.00FEATURED IN2004 Architectural PortfolioSUB CATEGORYWork in Progress life-science departments, instructional mathematics classrooms and a new dental-hygiene instructional clinic.
Separated into three structures, the main tower is planned as a double-loaded classroom layout, with two large lecture rooms addressing the pedestrian mall at the ground floor. A ceremonial grand stair leads to the plaza level, which connects the main tower to the dental clinic and the opposing wing. A second exterior stair tower is at the plaza level and connects the upper floors of the main tower to a bridge connector leading to the departmental offices and dean’s suite.
The orientation of the two primary buildings was set by maximizing daylighting and minimizing heat gain. This project is registered with the USGBC, pursuing a LEED silver certification. The mechanical system is engineered to obtain 15 percent of its energy through photovoltaic panels adjacent to the structure. Additional sustainable elements include casework developed from wheat-board core material, recycled-content phenolic resin exterior panels and a reduction of materials that affect the ecosystem.
DCCCD, Cedar Valley College, Science/Vet. Technology/Allied Health Bldg.
California State University—San Bernardino, Student Recreation Center
California State University—San Bernardino, Chemical Sciences Building
Washington University School of Medicine, Farrell Learning and Teaching Center
California State University, Fullerton, College of Business and Economics-Fullerton, California
University of Houston--Clear Lake, Student Services Building
University of Houston--Clear Lake, Student Services/Classroom Building
University of Oklahoma, Stephenson Research and Technology Center
University of Illinois, EnterpriseWorks Technology Incubator
Kingwood College, Health & Natural Sciences Building
University of California—Irvine, Natural Sciences Building Unit 1
|
cc/2019-30/en_middle_0053.json.gz/line4410
|
__label__wiki
| 0.596496
| 0.596496
|
The DEAD-Box RNA Helicase Dbp5 Functions in Translation Termination
Thomas Gross1,
Anja Siepmann1,
Dorotheé Sturm1,
Merle Windgassen1,*,
John J. Scarcelli2,
Matthias Seedorf3,
Charles N. Cole2,
Heike Krebber1,†
1 Institut für Molekularbiologie und Tumorforschung der Philipps-Universität Marburg, Emil-Mannkopff-Strasse 2, 35037 Marburg, Germany.
2 Department of Biochemistry, Dartmouth Medical School, Hanover, NH 03755, USA.
3 Zentrum für Molekulare Biologie der Universität in Heidelberg, Im Neuenheimer Feld 282, 69129 Heidelberg, Germany.
↵† To whom correspondence should be addressed. E-mail: krebber{at}imt.uni-marburg.de
↵* Present address: Medical Biotechnology Center (MBC) of the University of Southern Denmark, Winsløwparken 25, 5000 Odense C, Denmark.
Science 02 Feb 2007:
Thomas Gross
Institut für Molekularbiologie und Tumorforschung der Philipps-Universität Marburg, Emil-Mannkopff-Strasse 2, 35037 Marburg, Germany.
Anja Siepmann
Dorotheé Sturm
Merle Windgassen
John J. Scarcelli
Department of Biochemistry, Dartmouth Medical School, Hanover, NH 03755, USA.
Zentrum für Molekulare Biologie der Universität in Heidelberg, Im Neuenheimer Feld 282, 69129 Heidelberg, Germany.
Charles N. Cole
Heike Krebber
In eukaryotes, termination of messenger RNA (mRNA) translation is mediated by the release factors eRF1 and eRF3. Using Saccharomyces cerevisiae as a model organism, we have identified a member of the DEAD-box protein (DBP) family, the DEAD-box RNA helicase and mRNA export factor Dbp5, as a player in translation termination. Dbp5 interacts genetically with both release factors and the polyadenlyate-binding protein Pab1. A physical interaction was specifically detected with eRF1. Moreover, we show that the helicase activity of Dbp5 is required for efficient stop-codon recognition, and intact Dbp5 is essential for recruitment of eRF3 into termination complexes. Therefore, Dbp5 controls the eRF3-eRF1 interaction and thus eRF3-mediated downstream events.
DEAD-box RNA helicases are found in almost all organisms and function in many fundamental steps in the life of RNA molecules, ranging from transcription to decay. They use the energy from adenosine triphosphate hydrolysis to rearrange RNA structures or to dissociate RNA/protein complexes (1). The DEAD-box helicase Dbp5 shuttles between the nucleus and the cytoplasm and is involved in translocation of the mature mRNA/protein complex into the cytoplasm (2). Consistently, Dbp5 is localized to the nuclear rim, where it interacts with components of the nuclear pore complex (NPC) (2, 3). Dbp5 is also distributed within the cytoplasm of yeast, higher eukaryotes, and human cells, but a cytoplasmic function has not yet been defined (4–6).
To get insights into its cytoplasmic function, we used Saccharomyces cerevisiae to investigate whether Dbp5 associates with mRNAs during translation. Western blot analysis of sucrose density fractionation experiments revealed that, like the polyadenylate-binding protein Pab1, significant amounts of the extracted Dbp5 (∼60%, which equals ∼40% of the total Dbp5) but not of Gfd1 (a nuclear pore–associated factor) were detectable in polysome-containing fractions (Fig. 1, A and B). The addition of puromycin, which specifically disrupts polysomes, confirmed that Dbp5 co-sediments with polyribosome-containing mRNAs (fig. S1). A potential role of Dbp5 in translation is supported by the finding that dbp5/rat8 mutants are hypersensitive to translational inhibitors (Fig. 1C). This effect is not due to defects in mRNA export, because rat7-1, which in contrast to dbp5 displays strong mRNA export defects even at 25°C (Fig. 1D), is not hypersensitive to those inhibitors.
Dbp5 associates with polysomes during translation, and mutants are hypersensitive to translational inhibitors. (A) Supernatants of cell extracts of log-phase wild-type cells, expressing functionally green fluorescent protein (GFP)–tagged versions of GFD1, DBP5, or PAB1, were fractionated through 15 to 50% sucrose gradients and subjected to Western blot analysis. Antibodies to Rps3 detected endogenous ribosomal protein. Absorbance at 254 nm (OD, optical density) shows the distribution of ribosomes. The ratio of the extracted proteins is shown as follows: amount of the unbound proteins (left) or mono- and polysome-bound proteins (right). (B) Quantification of at least three independent experiments shown in (A). (C) Growth of wild-type (WT), rat7-1, rat8-2, and rat8-3 strains on yeast extract, peptone, and dextrose (YPD) medium with and without translational inhibitors in 10-fold serial dilutions of similar cell numbers. (D) mRNA localization in log-phase wild-type, rat7-1, and rat8 mutants at 25°C.
Different genetic approaches were carried out to investigate in which phase of translation Dbp5 might be acting. Dbp5 overexpression studies revealed that mutations in genes encoding initiation or elongation factors were not suppressed by high-copy DBP5, whereas mutations in both of the eukaryotic release factors eRF1 (SUP45) and eRF3 (SUP35), as well as a mutation in Pab1, were specifically suppressed (fig. S2). Moreover, similarly to the synthetic lethal effect seen when both release-factor mutants (sup35-21 and sup45-2) are combined, dbp5/rat8 mutants are synthetically lethal with mutant eRF1, and the growth of dbp5/rat8 mutants is severely inhibited when combined with mutant eRF3 or Pab1 (pab1-53) (Fig. 2A), indicating a potential function of Dbp5 in translation termination.
Genetic and physical interaction of Dbp5/Rat8 with translation termination factors. (A) Growth of all indicated double mutants carrying a 2μ URA3 vector encoding either DBP5 or SUP35 SUP45 and all single mutants carrying an empty vector was analyzed on –URA- and 5′-fluoroorotic acid (FOA)–containing plates that select for the loss of plasmid. (B) Immunoprecipitation of functionally tagged versions [or the endogenous release factors (see fig. S3)] of eRF1 (Sup45-GFP), eRF3 (Sup35-GFP), and Pab1-GFP with Myc-tagged Dbp5. Total lysates were split and incubated with or without RNase, and Dbp5-bound proteins were detected on Western blots with an antibody to GFP. Endogenous Por1 served as a negative control.
Translation termination is mediated by recognition of a stop codon via the transfer RNA (tRNA)–mimicking protein eRF1 and subsequent hydrolysis of the ester bond connecting the polypeptide chain and the tRNA, stimulated by the guanosine triphosphatase activity of eRF3. Although eRF3 is unable to promote in vitro termination on its own, it enhances eRF1 activity (7). Direct interactions between Pab1 and eRF3 have been described in yeast, frog, and mammalian cells (7, 8), and overexpression of PAB1 in yeast suppresses effects associated with mutant eRF3 in vivo, suggesting a functionally important interaction of these proteins for termination (9), possibly as bridging factors to channel the terminating ribosomes back to the 5′ end of an mRNA (8). To get insights into how Dbp5 might contact the termination machinery, we performed co-immunoprecipitation experiments that revealed a stable interaction between Dbp5 and eRF1 (Fig. 2B and fig. S3B). In contrast, no interaction between Dbp5 and eRF3 was found, whereas an interaction between Pab1 and Dbp5 was ribonuclease (RNase)–sensitive, indicating concurrent binding of Dbp5 and Pab1 to the same mRNA but no simultaneous presence of Dbp5 and eRF3.
To demonstrate an active role of Dbp5 in translation termination, we assayed the stop codon recognition under different conditions. First, we showed that like eRF1 and eRF3 mutants, dbp5/rat8 mutant cells show increased termination readthrough activity in luciferase dual-reporter assays (Fig. 3). The assay is based on compared expression of β-galactosidase and luciferase open reading frames, separated by a stem loop or a stop codon (fig. S4A), which allows us to compare the frequency of translational readthrough in different strain backgrounds (10). In agreement with previous results, we found a basal readthrough activity of ∼15 to 17% in wild-type cells (10). Although mutant dbp5 did not influence readthrough activities in the presence of the stem loop, Dbp5 was clearly required for efficient recognition of the termination codon, in contrast to Dhh1 (Fig. 3A). Dhh1 is another DEAD-box RNA helicase family member, which has been implicated in connecting translation to mRNA degradation, because it can act as a translational repressor and an activator of mRNA decapping (11). However, in contrast to dbp5 (Fig. 2A), no genetic interaction between dhh1Δ and any of the termination-factor mutants was detected (fig. S4C). The rate of read-through in dbp5 mutant cells was very similar to that seen with a mutation in eRF3 (Fig. 3B). The termination readthrough defects in eRF1 and eRF3 mutants were fully suppressed in the presence of high-copy Dbp5 but not Dhh1 (Fig. 3, B and C). This was confirmed in a different assay, in which the decreased translational fidelity of either defective release factor, reflected by decreased growth rates in the presence of paromomycin, was efficiently suppressed by high-copy DBP5 (fig. S4B). Moreover, catalytic RNA helicase activity of Dbp5 is required for this suppression, because a mutation in its DEAD-box (Glu240→Gln240) prevented suppression (Fig. 3C).
Dbp5 is required for efficient stop codon recognition. (A) Readthrough activities in wild-type, rat8-2, and dhh1Δ are shown. All strains carrying either of the reporter constructs were grown to log phase and shifted to 37°C for 15 min before cell lysis. β-galactosidase and luciferase activities were measured and their ratios were used to calculate the relative molar luciferase expression. (B) Suppression of the termination readthrough defects of mutations in eRF1 and eRF3 by increased (PGAL1DBP5) Dbp5 level. All strains carrying the reporter construct and a DBP5 plasmid were treated as described in (A). The readthrough activity of all strains is shown. (C) Catalysis activity of Dbp5 is required for sup45-2 suppression. The experiment was done as described in (B), with active Dbp5 (PGAL1DBP5) versus an inactive DEAD-box mutant (PGAL1dbp5 E240Q) and Dhh1 (PGAL1DHH1). The results of at least 10 independent experiments are shown.
Besides functioning as an eRF1-stimulating protein, eRF3 is a key mediator that transmits the termination signal to mRNA decay (7). The RNA helicase Upf1 (human RENT1 or HUPF1) is involved in the nonsense-mediated decay (NMD) of aberrant mRNAs, and deletion of UPF1 leads to an increased termination readthrough (12). Although Upf1 and its interacting proteins Upf2 and Upf3 are capable of binding to eRF3, it is hypothesized that Pab1 competes for this interaction and thereby precludes the binding and destabilizing activities of these NMD factors at normal terminators, supporting a role for Upf1 in coupling premature termination events to NMD rather than a function in regular translation (12). To investigate a potential involvement of Dbp5 in NMD, we tested whether mutations in DBP5 stabilize NMD substrates and found that this is not the case, in contrast to upf1Δ (fig. S5A). Also, neither genetic interactions between dbp5 mutants and upf1, upf2, or upf3 deletion strains, nor genetic interactions between upf1Δ and either eRF1 or eRF3 mutants, were detectable (fig. S5, B and C), in contrast to the synthetic growth defects detected between dbp5/rat8 and either release-factor mutant (Fig. 2A). Further, the readthrough defects of dbp5/rat8 and either upf mutant are not additive (fig. S5D). Together, these findings suggest a general function for Dbp5 in translation termination and support an exclusive function for Upf1 on NMD substrates.
To gain mechanistic insights into the function of Dbp5 during translation termination, we compared polysomes of rat8-2 to those of the wild-type and found that rat8-2 is defective in the recruitment of eRF3 into termination complexes (Fig. 4A). In a wild-type strain, roughly 60% of extracted Dbp5, eRF1, and eRF3 is ribosome-associated. In contrast, eRF3 is almost absent from the ribosomal fractions (12%) in rat8-2 cells at the nonpermissive temperature, whereas approximately 55% of both Dbp5 and eRF1 remained polysome-associated, indicating that intact Dbp5 is required for eRF3 entry into the termination complexes. The corresponding rRNA profiles revealed an elevated monosome peak in rat8-2 cells (resulting in three monosome fractions in the Western blot) as compared to the wild-type (two fractions) or rat7-1, reflecting the influence of Dbp5 on translation (fig. S6). The defect of the dbp5/rat8-mutant in eRF3 recruitment was further confirmed by analysis of the interaction between eRF1 and eRF3 (13), which was completely lost in dbp5/rat8 mutant cells, in contrast to wild-type or upf1Δ strains (Fig. 4B).
Active Dbp5 is required for the incorporation of eRF3 into translation termination complexes. (A) Sucrose fractionation experiments (with 15 to 50% sucrose gradients) of log-phase wild-type and rat8-2 strains shifted to 37°C for 20 min were performed, and Western blot detection of TAP-tagged SUP35, SUP45, and GFP-DBP5 or GFP-rat8-2, respectively, and Rps3 is shown in wild-type (upper panel) and rat8-2 (lower panel) cells. The ratio of the extracted proteins is shown as follows: amount of the unbound proteins (left) or mono- and polysome-bound proteins (right). (B) Top: Sup35-TAP purification from log-phase wild-type and rat8-2 cells expressing SUP45-GFP shifted to 37°C for 20 min prior to lysis is shown as total lysates and purified proteins (bound) after incubation with protein A for 3 hours with or without RNase. Sup45-GFP and Por1 (negative control) were detected with antibodies to GFP and Por1, respectively. Bottom: Immunoprecipitations of endogenous eRF1 from wild-type, upf1Δ, rat8-2, and rat8-3 cells treated as described above are shown. The presence of endogenous eRF3 and Fech1 (negative control) is shown.
Together our data reveal a requirement for functional Dbp5 for the entry of eRF3 into termination complexes and support the following model. Once the ribosome has reached a termination codon, eRF1 is recruited to the mRNA, possibly by Dbp5. The RNA helicase activity of Dbp5 might remodel the mRNA/protein complex to allow proper eRF1 positioning on the stop codon and thus an efficient termination reaction. Subsequent dissociation of Dbp5 from eRF1 is followed by the entry of eRF3 into the complex, which promotes the release of the peptide chain and allows eRF3-mediated downstream events. Thus, Dbp5 is involved in translation termination through its interaction with eRF1, and it controls the subsequent eRF1-eRF3 interaction through its dissociation from eRF1.
Supporting Online Material
www.sciencemag.org/cgi/content/full/315/5812/646/DC1
Figs. S1 to S6
Tables S1 and S2
S. Rocak, P. Linder, Nat. Rev. Mol. Cell Biol. 5, 232 (2004).
C. N. Cole, J. J. Scarcelli, Curr. Opin. Cell Biol. 18, 299 (2006).
C. A. Hodge, H. V. Colot, P. Stafford, C. N. Cole, EMBO J. 18, 5778 (1999).
C. A. Snay-Hodge, H. V. Colot, A. L. Goldstein, C. N. Cole, EMBO J. 17, 2663 (1998).
J. Zhao, S. B. Jin, B. Bjorkroth, L. Wieslander, B. Daneholt, EMBO J. 21, 1177 (2002).
C. Schmitt et al., EMBO J. 18, 4332 (1999).
A. Jacobson, Nat. Struct. Mol. Biol. 12, 474 (2005).
N. Uchida, S. Hoshino, H. Imataka, N. Sonenberg, T. Katada, J. Biol. Chem. 277, 50286 (2002).
B. Cosson et al., Mol. Cell. Biol. 22, 3301 (2002).
L. Bidou et al., RNA 6, 952 (2000).
J. Coller, R. Parker, Cell 122, 875 (2005).
N. Amrani, M. S. Sachs, A. Jacobson, Nat. Rev. Mol. Cell Biol. 7, 415 (2006).
I. Stansfield et al., EMBO J. 14, 4365 (1995).
We are grateful to M. Ashe, D. M. Bedwell, T.-H. Chang, P. Linder, R. Lill, R. Parker, P. A. Silver, G. Stahl, F. Stutz, M. Tuite, and G. Zhouravleva for antibodies, strains, and plasmids; H. Bastians for critical reading; and R. Müller and B. Dobberstein for support. This work was funded by a grant from NIH to C.N.C. and grants from Kempkes, Manchot, and the Deutsche Forschungsgemeinschaft to H.K.
You are going to email the following The DEAD-Box RNA Helicase Dbp5 Functions in Translation Termination
By Thomas Gross, Anja Siepmann, Dorotheé Sturm, Merle Windgassen, John J. Scarcelli, Matthias Seedorf, Charles N. Cole, Heike Krebber
Science 02 Feb 2007 : 646-649
An RNA helicase is necessary for normal termination of translation, recruiting a known termination factor into the protein complex that ends the process.
|
cc/2019-30/en_middle_0053.json.gz/line4411
|
__label__wiki
| 0.901655
| 0.901655
|
Catalog start Author/Contributor "Love, Cornelia Spencer, 1892-1981." Remove constraint Author/Contributor: "Love, Cornelia Spencer, 1892-1981."
Love, Cornelia Spencer, 1892-198121
Pierson, William Whatley, Jr., 1890-19661
060s - Associations, Organizations & Museums 20
American drama1
English drama1
Literature, Modern1
Plots (Drama, novel, etc.)1
Bio-bibliography3
North Carolina1
1. Plays of today, 1950-1954 [1954]
Love, Cornelia Spencer, 1892-1981.
Chapel Hill : Univ. of North Carolina Press, c1954.
See linked record to request items bound together
061 .N865L V.19:NO.3 Available
2. Other people's lives. Thirteenth series [1953]
Chapel Hill, N.C. : University of North Carolina Press, 1953.
3. Other people's lives. Twelfth series [1951]
Chapel Hill, N.C. : University of North Carolina Library, 1951.
4. Other people's lives. Eleventh series [1949]
Chapel Hill : University of North Carolina Press, 1949.
6. Other people's lives. Tenth series [1947]
7. Other people's lives. Ninth series [1944]
8. Other people's lives. Eighth series [1942]
061 .N865L V.8:NO.4 Available
9. Other people's lives. Seventh series, 1938/40 [1940]
10. Famous women of yesterday and today [1938]
3rd ed., 1938. - Chapel Hill N.C. : University of North Carolina press, 1938.
11. Famous women of yesterday and today [electronic resource] [1938]
Love, Cornelia Spencer, 1892-1981
3d ed. - [Chapel Hill, N.C.] : University of North Carolina Press, 1938.
A catalogue offering study outlines to women's clubs on the topic of famous women to use in their programs of self-education.
gateway.proquest.com Gerritsen Collection
12. Other people's lives. Sixth series, 1936-1937 [1937]
Book — 36 pages ; 23 cm.
Rev. ed., 1935. - Chapel Hill N.C. : University of North Carolina press, 1936.
14. Other people's lives. Fifth series, 1935-1936 [1936]
15. Adventures in reading. Seventh series, Current books, 1934 [1935]
16. Other people's lives. Fourth series, 1934-1935 [1935]
17. Other people's lives : a biographical roundup: current books, 1927-1928 [1928]
Chapel Hill, N.C. : The University of North Carolina press, [c1928]
061 .N865 V.8:NO.2 Available
18. Current books [1926]
Chapel, Hill, N.C. : The University of North Carolina Press, [c1926]
061 .N865 V.5:NO.14 Available
19. Good books of 1924-1925 [1925]
Chapel Hill, N.C. : University of North Carolina Press, [1925]
20. Present day literature : good books of 1923-1924 [1924]
Chapel Hill, N.C. : The University of North Carolina Press, [1924]
|
cc/2019-30/en_middle_0053.json.gz/line4414
|
__label__wiki
| 0.84522
| 0.84522
|
College Hockey Tickets
Wisconsin Badgers Hockey Tickets
Events near
Find tickets from 45 dollars to Wisconsin Badgers at Boston College Eagles Hockey on Friday October 11 at 1:00 pm at Silvio O. Conte Forum in Chestnut Hill, MA
Wisconsin Badgers at Boston College Eagles Hockey
Silvio O. Conte Forum·Chestnut Hill, MA
Find tickets from 38 dollars to Minnesota Duluth Bulldogs at Wisconsin Badgers Hockey on Friday October 18 at 1:00 pm at Kohl Center in Madison, WI
Minnesota Duluth Bulldogs at Wisconsin Badgers Hockey
Kohl Center·Madison, WI
Find tickets from 32 dollars to Minnesota Duluth Bulldogs at Wisconsin Badgers Hockey on Saturday October 19 at 1:00 pm at Kohl Center in Madison, WI
Find tickets from 28 dollars to Clarkson Golden Knights at Wisconsin Badgers Hockey on Friday October 25 at 1:00 pm at Kohl Center in Madison, WI
Clarkson Golden Knights at Wisconsin Badgers Hockey
Find tickets from 28 dollars to Clarkson Golden Knights at Wisconsin Badgers Hockey on Saturday October 26 at 1:00 pm at Kohl Center in Madison, WI
Find tickets from 29 dollars to Wisconsin Badgers at Penn State Nittany Lions Hockey on Friday November 1 at 1:00 pm at Pegula Ice Arena in University Park, PA
Wisconsin Badgers at Penn State Nittany Lions Hockey
Pegula Ice Arena·University Park, PA
Find tickets from 38 dollars to Wisconsin Badgers at Penn State Nittany Lions Hockey on Saturday November 2 at 1:00 pm at Pegula Ice Arena in University Park, PA
Find tickets from 77 dollars to Wisconsin Badgers at Nebraska-Omaha Mavericks Hockey on Friday November 8 at 7:07 pm at Baxter Arena in Omaha, NE
Wisconsin Badgers at Nebraska-Omaha Mavericks Hockey
Baxter Arena·Omaha, NE
Find tickets from 78 dollars to Wisconsin Badgers at Nebraska-Omaha Mavericks Hockey on Saturday November 9 at 7:07 pm at Baxter Arena in Omaha, NE
Find tickets from 43 dollars to Notre Dame Fighting Irish at Wisconsin Badgers Hockey on Friday November 15 at 1:00 pm at Kohl Center in Madison, WI
Notre Dame Fighting Irish at Wisconsin Badgers Hockey
Find tickets from 42 dollars to Notre Dame Fighting Irish at Wisconsin Badgers Hockey on Saturday November 16 at 1:00 pm at Kohl Center in Madison, WI
Find tickets from 70 dollars to Wisconsin Badgers at Minnesota Golden Gophers Hockey on Friday November 22 at 1:00 pm at Mariucci Arena in Minneapolis, MN
Wisconsin Badgers at Minnesota Golden Gophers Hockey
Mariucci Arena·Minneapolis, MN
Find tickets from 75 dollars to Wisconsin Badgers at Minnesota Golden Gophers Hockey on Saturday November 23 at 1:00 pm at Mariucci Arena in Minneapolis, MN
Find tickets from 37 dollars to Michigan Wolverines at Wisconsin Badgers Hockey on Sunday December 1 at 1:00 pm at Kohl Center in Madison, WI
Michigan Wolverines at Wisconsin Badgers Hockey
Find tickets from 73 dollars to Wisconsin Badgers at Michigan State Spartans Hockey on Friday December 6 at 1:00 pm at Munn Ice Arena in East Lansing, MI
Wisconsin Badgers at Michigan State Spartans Hockey
Munn Ice Arena·East Lansing, MI
Find tickets from 77 dollars to Wisconsin Badgers at Michigan State Spartans Hockey on Saturday December 7 at 1:00 pm at Munn Ice Arena in East Lansing, MI
Find tickets to Wisconsin Badgers at Ohio State Buckeyes Hockey on Friday January 10 2020 at 1:00 pm at Schottenstein Center in Columbus, OH
Wisconsin Badgers at Ohio State Buckeyes Hockey
Schottenstein Center·Columbus, OH
Find tickets from 37 dollars to Ohio State Buckeyes at Wisconsin Badgers Hockey on Friday January 10 2020 at 1:00 pm at Kohl Center in Madison, WI
Ohio State Buckeyes at Wisconsin Badgers Hockey
Find tickets to Wisconsin Badgers at Ohio State Buckeyes Hockey on Saturday January 11 2020 at 1:00 pm at Schottenstein Center in Columbus, OH
Find tickets from 43 dollars to Ohio State Buckeyes at Wisconsin Badgers Hockey on Saturday January 11 2020 at 1:00 pm at Kohl Center in Madison, WI
Find tickets from 36 dollars to Michigan State Spartans at Wisconsin Badgers Hockey on Friday January 17 2020 at 1:00 pm at Kohl Center in Madison, WI
Michigan State Spartans at Wisconsin Badgers Hockey
Find tickets from 43 dollars to Michigan State Spartans at Wisconsin Badgers Hockey on Saturday January 18 2020 at 1:00 pm at Kohl Center in Madison, WI
Find tickets from 50 dollars to Wisconsin Badgers at Notre Dame Fighting Irish Hockey on Friday January 24 2020 at 1:00 pm at Compton Family Ice Arena in Notre Dame, IN
Wisconsin Badgers at Notre Dame Fighting Irish Hockey
Compton Family Ice Arena·Notre Dame, IN
Find tickets from 51 dollars to Wisconsin Badgers at Notre Dame Fighting Irish Hockey on Saturday January 25 2020 at 1:00 pm at Compton Family Ice Arena in Notre Dame, IN
Find tickets from 47 dollars to Minnesota Golden Gophers at Wisconsin Badgers Hockey on Friday January 31 2020 at 1:00 pm at Kohl Center in Madison, WI
Minnesota Golden Gophers at Wisconsin Badgers Hockey
Wisconsin Badgers Football
Playing At
Silvio O. Conte Forum in Chestnut Hill, MA
Kohl Center in Madison, WI
Pegula Ice Arena in University Park, PA
Baxter Arena in Omaha, NE
Mariucci Arena in Minneapolis, MN
Munn Ice Arena in East Lansing, MI
Schottenstein Center in Columbus, OH
Compton Family Ice Arena in Notre Dame, IN
Yost Arena in Ann Arbor, MI
This image is available through Creative Commons and has been modified from the original. Email images@seatgeek.com with any questions.
Related Seating Charts
Baxter Arena Seating Chart
Compton Family Ice Arena Seating Chart
Kohl Center Seating Chart
Mariucci Arena Seating Chart
Munn Ice Arena Seating Chart
Pegula Ice Arena Seating Chart
Silvio O. Conte Forum Seating Chart
Yost Arena Seating Chart
|
cc/2019-30/en_middle_0053.json.gz/line4415
|
__label__wiki
| 0.52038
| 0.52038
|
Seattle Sportsnet
UW Football
UW Hoops
Ryan Perkins, you have ruined my life
November 22, 2008 Alex 2 Comments
Ryan Perkins is the pseudo-placekicker for the Washington Huskies football team. He’s also the devil. In stunning fashion, Ryan Perkins has managed to ruin the few potentially joyous moments in this past Husky season by failing to do his one and only job.
First there was the infamous BYU “excessive celebration” game. A phantom penalty by Jake Locker near the end of regulation turned a chip-shot PAT into a 35-yard point-after instead. This, of course, pushed Perkins out of his 25-yards-or-less comfort zone and resulted in a blocked kick and a BYU victory.
Today, Perkins was at it again. With an 0-10 Husky team faced with the prospect of winning their first game, the 101st Apple Cup no less, Perkins missed not one, but two huge field goals that would have been difference-makers. With just over 3:00 minutes remaining in the fourth quarter, Perkins missed a 28-yard gimme that would have put the Dawgs up by six. Instead, with 56 seconds remaining in regulation, the Cougars were able to drive down the field and connect on a field goal of their own to tie the score at 10 and send the game to overtime.
Then, in the second overtime, with a chance to take a three-point lead and pressure the Cougs to convert on their ensuing possession, Perkins shanked yet another kick, this time from 37 yards out to all but seal the Husky loss.
After eleven of twelve games so far, Perkins is 7-11 on field goal tries and 15-16 on PAT’s. The 64% field goal conversion rate is bad, but made worse when you consider that Perkins hasn’t attempted a kick beyond 40 yards. That distinction is left up to distance kicker/kickoff specialist/punter Jared Ballman. Perkins has put up a “D” average inside what should be automatic range. Kickers are already one-trick ponies, so what does this make Ryan Perkins? A half-trick pony?
The numbers won’t likely show Perkins to have been a horrible kicker throughout his career, but when all factors are taken into account (no attempts beyond 40 yards, kicking on an artificial surface, the “clutch” factor, etc) he will have to be remembered as one of the worst full-time kicking specialists in Husky history, if not NCAA history. Of his five total misses (4 FG’s, 1 PAT), three have been at critical moments in the fourth quarter or overtime, in what ultimately proved to be game-deciding situations. He hasn’t just been inaccurate, he’s been inaccurate at the most inopportune times.
As if anyone cares, Perkins announced his retirement from football earlier this year, effective at season’s end. A debilitated knee has forced him to give up his trade, but were that knee not a problem, I know thousands of fans who would gladly help Perkins to the sidelines.
Besides the football aspect, there’s a level of ethics involved here, as well. Perkins was able to parlay his high school kicking ability into four years of free education. While his peers were paying thousands of dollars each quarter for the privilege to attend a four-year university, Perkins was sliding buy on scholarship money that one could argue he didn’t earn.
Ryan Perkins has been simply awful. I don’t doubt that’s he’s trying his hardest, nor that he’s truly a good person underneath that jersey, but when it comes to kicking footballs, Perkins is the walking definition of “failure.” He has put the rotten cherry on top of the poop sundae that is the Huskies miserable season, and in the process ripped out the hearts of loyal Husky fans all around the country. All I can say is good riddance to our lost season, and God forbid a kicker like Ryan Perkins ever set foot on Montlake again.
HuskiesRyan Perkins
Previous PostBeyond Seattle: Individual Power RankingsNext PostThe Top 11: Seattle sports heroes, #6-2
2 thoughts on “Ryan Perkins, you have ruined my life”
Travis Becker says:
You’re a disgusting person for having written this about Ryan Perkins.
everyone has an off day. Ive kicked with hime and he can hit 55 yarder plus. i bet you couldnt even toe poke a PAT
The fan's premier online source for all things Seattle sports.
SSN on Twitter
Who knew it was autoerotic asphyxiation? Incredible. twitter.com/komonews/statu… 4 hours ago
Wow, it's not enough to just sleep with a man's wife anymore, you have to insult him too twitter.com/PrideOfDetroit… 10 hours ago
Cal Raleigh is playing well enough that in a year or two Jerry can trade him for a veteran reliever in a last-ditch… twitter.com/i/web/status/1… 1 day ago
@RyanDivish @TheMattHolt I walked an 8k instead 1 day ago
This may come as a shock to many, but @TheMattHolt just went back to the hotel in a drunken state while the rest of… twitter.com/i/web/status/1… 1 day ago
Follow @alexssn
SSN on Facebook
Support SSN
In lieu of contributing money to Seattle Sportsnet, please direct any contributions as a donation to the Robert Vasen Foundation.
Subscribe to SSN
If you want all your SSN posts delivered to your email inbox, sign up here.
|
cc/2019-30/en_middle_0053.json.gz/line4416
|
__label__wiki
| 0.644441
| 0.644441
|
The Old, the New, and the Ugly – March 2001 Top Viruses
By GReAT on April 28, 2001. 5:48 pm
In the latest edition of its monthly compilation, anti-virus software developer Sophos lists, in descending order from the most frequent to least, the top-ten frequently occurring viruses for the month of March.
This month’s chart is dominated by Word 32 macro-viruses taking six of the ten places. Coming in at number one, up from number two last month, is the Word 32 macro-virus I-Worm.MTX (a.k.a. Apology) at 17.2%.
The Visual Basic Script virus Kakworm moves up two spaces to number four at 14.4%; I-Worm.Hybris holds steady in the third slot at 10.3%; I-Worm.LoveLetter makes the big climb from seventh last month to fourth this month, joined by a new entry, I-Worm.Magistr, at 3.8%.
Sharing the sixth spot on this month’s chart are the Trojan JetHome (up from nine last month) and another new entry, I-Worm.Naked, at 3.4%; and sharing the eighth slot are I-Worm.Navidad (still spreading its Christmas anti-cheer although dropping from number five last month) and Macro.Word97.Marker (holding at eight) at 3.1%.
Worm.RC5.a (a.k.a. Bymer) re-enters the top ten at ten at 2.4%, with the remaining 35.1% occupied by various other viruses, worms, and Trojans.
Be sure to keep an eye open come next month for the continuing drama that is “The Virus Top Ten.”
|
cc/2019-30/en_middle_0053.json.gz/line4417
|
__label__cc
| 0.739156
| 0.260844
|
Throwback Blog: The Norman Conquests, A NYC/Broadway #Throwback Blog
By Seletyn on March 14, 2018 • ( Leave a comment )
There were three Norman Conquests posts I published in Facebook Notes. I have been in the process of moving and combining old blogs into “throwbacks” to post here so I can have all of my blogs in one place. I know, I know…control freak. I also hate losing things or forgetting where I posted something. Attending plays while living in NY was one of the greatest things for me. It was really a dream come true. That I worked for a number of Broadway peeps helped that adventure along quite nicely. I miss the theater terribly.
(the posts below are in the order of newest to oldest, they are backwards – the plays interact in a way that you could watch them in any order)
Norman Conquests, Living Together
This blog was originally posted in Facebook notes on May 2, 2009
The Norman Conquests
“A trio of comedies set over one weekend at a home in the English countryside. Each play takes place in a different locations around the house: the dining room in Table Manners, the living room in Living Together, and the garden in Round and Round the Garden. The ingenious result is that as plots unfold, something seemingly incidental in one play takes on a hysterical new context in the next. Living Together: the events of the weekend as seen from the sitting room. In which Reg is driven mad by Tom…Tom tells Annie a thing or two…Annie nearly comes to blows with Sarah…Sarah sees a different side of Norman…Norman sorts things out with Ruth…Ruth discovers the charms of a fireside rug…and in which nobody enjoys playing board games.“
It was such an utter joy to watch the final installment of The Norman Conquests, Living Together. I am in awe of these amazing actors who are basically putting on three separate plays at the same time. The rehearsal that goes into it must be mind boggling. And yet they do it and make it seem effortless. The synergy among these players is a joy to watch. I cannot go on about it enough.
This trilogy was my first experience of “in the Round”. To have a stage that has 360 degree seating would have to be daunting for an actor. Each of the three performances I attended had audiences with good response. That is so important for me. A good responding audience bolsters you and makes you laugh harder, gasp louder or be still as much as possible. For this performance, my daughter Amanda and I sat against the stage (no literally, my toes tapped against the actual stage). What an amazing experience. I have only one time before been this close to the actors as they were working (Edward the King when it was a reading piece for GayFest NYC 2007 – Chad Hoeppner came right up to me while delivering his lines and I had to look at my feet because I was blushing). So, to be there right in the mix with the actors was a little intimidating at times. But to see their expressions, to smell their perfume, to see the details of their costumes – it added a new level of enjoyment for me.
I know I have said it before, but many kudos to The Old Vic for binging this play across the pond and into our hearts. I would love to meet Alan Ayckbourn. He really was genius in creating this play, the way that they fit together like puzzle pieces and yet you could watch just one and still understand. I like that his work had me researching his other work and ordering books to read. I actually walked out of Norman and bought the book at the stand. I usually never buy theater souvenirs.
I do find it interesting that even though these are three separate plays, the Tony rulings note that it will be considered “one” for purposes of Tony. Read the Playbill article here.
Stephen Mangan, Amanda Root, Paul Ritter and Amelia Bullmore.
This blog was originally posted in Facebook notes on April 11, 2009
IMDB: Table Manners
Ok, I know this IMDB link is for the 1970s tv version of the show. However, it is the same plot.
“Sarah and Reg arrive at mum’s house for the weekend so that invalid mum’s care-giver, Reg’s sister Annie, can get away for the weekend. But Annie ends up staying, their brother-in-law Norman shows up unexpectedly, and not long after, so does Norman’s wife Ruth (Annie and Reg’s sister). Sarah tries her best to organize a family dinner for the five of them plus Tom, a slow-witted neighbor whom everyone expects to propose to Annie. Sarah can’t get much cooperation and doesn’t realize that Annie had planned to sneak off with Norman. Norman is incorrigible, Annie is caught between Tom and a fling, mum is upstairs demanding attention, and there aren’t six proper chairs.“
This is the second installment of the trilogy of plays by Alan Ayckbourn. The great thing about this play is that as you enter into the second installment you realize what is going on and then you realize that as actors were entering and exiting the stage in the previous play, their characters were entering and leaving the next two plays (theoretically not literally, unless of course you go to a marathon day, but not simultaneously…you know what I mean, maybe).
This play was a little more serious. It dealt with the deeper issues that were occurring with the characters. That did not dampen the comedy in the least though. There were great moments of laughter. And I LOVE when the audience “gets it”. To hear an entire audience laugh at a site gag or a line makes my ears tickle. Also, it is nice when the audience applauds the actors as they enter the play. It is a sign of respect that tells the actor we appreciate what they are doing for us. This set of actors have such a great chemistry that it makes the show easy to watch. They work well off of each other, they know what to expect from each other.
We see a little more of Sarah in this play. She developed more for me. I like that. Again, Amanda Root has brought her facial expressions to the stage and sometimes without words was able to create waves of laughter through the audience. We now understand a little more why she is the nervous wreck that she is.
Tom also developed a little more for me as well. Played by Ben Miles, this character is very well portrayed. He is confuse-able. But here we see him stand up more for Annie and also kind of marks his territory, so to speak. The scene with him in the little chair, sitting next to Norman – my only complaint was that I was sitting behind him but would have LOVED to see his expressions.
Annie comes into her own as well. Jessica Hynes has crafted this character and for me Is almost the straight man out of the lot. Though she has great comedic lines through the play for me she is the more serious of all the character, the anchor.
For this play, I could not help but stare at Reg’s butt in his tight pants (that in another play gets squeezed by one drunk Norman). Paul Ritter has a way of quickly working his way through his lines and weaving for us a character who is crisp, quick spoken and funny to watch. He is your guaranteed laugh man.
Amelia Bullmore, who plays Ruth, was a joy to watch as she refused to wear her glasses. She, like the other actors, is a very “physical” actor. I love her fidgets like the way she messes with her hair, her mannerisms, etc.
And then there was Norm. Norm the lover of women. Norm who only wants to make you happy. Of course the “you” depends on who is (or is not) in the room with him. Stephen Mangan is a presence to respect on stage. The delivery of his lines, his sight gags, his interaction with the other actors – all is done with such great ease. Kudos to Mangan for bringing this character to life (and such a vivid life) before us.
This blog was originally posted in Facebook notes on April 8, 2009
Wikipedia: The Norman Conquests Round and Round The Garden
“The Norman Conquests is a trilogy of plays written in 1973 by Alan Ayckbourn. The small scale of the drama is typical of Ayckbourn. There are only six characters, namely Norman, his wife Ruth, her brother Reg and his wife Sarah, Ruth’s sister Annie, and Tom, Annie’s next-door-neighbour. The plays are at times wildly comic, and at times poignant in their portrayals of the relationships between six more or less unhappy characters.“
What an amazing group of actors. And, what a clever play. I have never used the word “clever” before when describing a piece I have seen. But last night that was the word that kept coming to mind when rethinking the show that had just concluded. Clever. The chemistry among the actors was wonderful. And for a first night of previews, the show went along without a hitch.
Stephen Mangan, who plays Norman, is a comedic genius. His timing was dead on, it was not forced. Such a cad, such a lovable cad. The scene with Norman and Sarah…oh, you will bust a gut!
Amelia Bullmore, who plays Ruth, is a riot as well. However, I kept thinking how her mannerisms reminded me of Bill Nighy (not the science guy) who I saw in The Vertical Hour a couple of years ago. And no, it is not simply because she is Brit.
Paul Ritter, who plays Reg, was amazing in the way he was able to rattle out his quick paced, oftentimes confusing, lines without a pause or stutter.
Jessica Hynes, who plays Annie, plays this character so well. She is truly believable in this role. I am hoping to see more of her in the other two plays.
Amanda Root as Sarah, wow. I would love the opportunity to sit down with Root just to see if she is ANYTHING like the character she portrays. She has such wonderful facial expressions and body language. I found that many times I would search her out on stage, more so than the other actors.
And then there was Ben Miles as Tom. Poor, gullible Tom. The scene with Tom and Ruth in the garden, oh my.
Another great thing for me was that the theater the show takes place in is Circle In The Square. I have never before seen a show with a round stage in the middle and seating the entire way around, 360 degrees. I believe it must be so hard to put together, not only for the cast but the production crew as well (not that it showed in the least).
And, of course there has to be a famous person story that goes along with my play blogs, right?
My friend, Big Sexy, came with me to the show. We get our tickets and head for our seats. I trip over the guy in the seats next to us, apologize, nice guy. I think…is that…?….no! See, I always think I see famous people and more times than not I am mistaken. So we take our seats and the show begins. Big Sexy has a great, deep laugh. It tickles the ears really. The combination of his laugh and the laugh of the guy whose toes I stepped on was quite pleasant. I like a good laugh, one that comes from within and is unrestrained. So intermission hits and my friend goes to the restroom. I read my Playbill. In the Playbill there is a page on The Old Vic theater. I am reading the article and looking at the picture of their artistic director, Kevin Spacey. Big Sexy returns from the restroom and we strike up a conversation regarding members of the production team who he knows and how they were commenting about who we were sitting next to. I look to my left trying to figure out who the old man is and then ask casually who the guy is. BS then looks to our right and whispers, “Um. Kevin Spacey.” Go figure! There are times when I really enjoy my life, last night was one of those times….
Categories: Theater - Literature - Language
Tagged as: Alan Ayckbourn, Amanda Root, Amelia Bullmore, Ben Miles, Broadway, In The Round, Jessica Hynes, Living Together, Paul Ritter, Plays, Round and Round the Garden, Round Stage, Stephen Mangan, Table Manners, The Norman Conquests, Theater, Theatre, Tony, tony awards
Journal: Morning March 14, 2018
Binge: A Series Of Unfortunate Events, Netflix S1:E1-E2
|
cc/2019-30/en_middle_0053.json.gz/line4419
|
__label__cc
| 0.742336
| 0.257664
|
Animating VueJS with Sarah Drasner
Podcast Friday, December 1 2017
http://traffic.libsyn.com/sedaily/AnimatingVueJS.mp3
Most user interfaces that we interact with are not animated. We click on a button, and a form blinks into view. We click a link and the page abruptly changes.
On the other hand, when we interact with an application that has animations, we can feel the difference. The animations are often subtle. If you aren’t sure what I’m talking about, pay attention the next time you use Slack or Facebook Messenger or iMessage. Airbnb values animation so much that they built Lottie, a library for animation.
In an animated application, the user interface feels alive. When a software team takes the time to build animations into small interactions, the user perceives the animations as polish and attention to detail.
Sarah Drasner has been evangelizing the value of animations for years, and she is an expert at implementing complex and beautiful animations on the web. She works at Microsoft as a developer advocate and joins the show to talk about how to build animations. If you are building a web application and want to create a unique UI, you might find this show useful.
JavaScript supports detailed animations, often through the manipulation of SVG files. SVG stands for “scalable vector graphics” a file format that represents an image in its own DOM. SVG is so flexible because of this DOM format, which defines the different parts of the SVG. This is in contrast to a bitmap, which is just a simple matrix of dots, without any rich metadata.
You could manipulate SVG with raw JavaScript—but most people use a frontend JavaScript framework like React, Angular, or VueJS. Sarah has been implementing most of her recent web animations using Vue, and she is a member of the Vue core team.
Vue has an entertaining story, because it gained popularity in a time when Google was supporting AngularJS and Facebook was supporting ReactJS. The first version of Vue was created from scratch by a single developer, Evan You.
If you are a Vue developer looking for an open source project to hack on, you can check out softwaredaily.com, which is an open source platform to consume content about software. In addition to the Vue web app, we also have the Software Engineering Daily app for iOS and for Android. All of these apps are open-sourced at github.com/softwareengineeringdaily. If you are looking for an open source project to get involved with, we would love to get your help.
Women 2.0 is a company with a vision of gender equality in the tech world. Women 2.0 is a community, a media company, and a jobs platform that connects top female talent with engineering jobs around the world. At the new Women 2.0 jobs platform, find vetted jobs for women engineers, data scientists, and product managers. To find a job that is right for you, go to women2.com/sedaily. And if you are an engineering company, you can connect with top female tech talent on Women 2.0. Companies like Twitter, MongoDB, and Craigslist use Women 2.0 to find new hires. Go to women2.com/sedaily to find out how to post your company’s jobs to Women 2.0. Thanks to Women 2.0 for being a new sponsor of Software Engineering Daily.
G2i is a talent platform built for engineers by engineers. React Native, React, and mobile: the developers on G2i have expertise in the best tools to build your applications. When I need engineers to help me out with my apps, G2i is the first place I go–especially when I am building with React or React Native. Contract a G2i developer to help you on a short-term basis, or hire a G2i developer full-time. And if you are looking to build cross platform applications in React Native, definitely check out G2i. The G2i platform is a community of React Native, React, and mobile engineers–these developers can become part of YOUR team. If you are looking for developers to build your product, check out g2i.co. You can also send me an email, and I’ll be happy to tell you more about my experience with G2i. Find your React Native, React, and mobile talent by going to g2i.co. Thanks to g2i for helping me ship my products, and thanks for becoming a sponsor of Software Engineering Daily.
IBM Cloud gives you all the tools you need to build cloud native applications. Use IBM Cloud Container service to easily manage the deployment of your Docker containers. For serverless applications, use IBM Cloud Functions for low cost, event-driven, scalability. If you like to work with a fully managed platform as a service, IBM Cloud Foundry gives you a cloud operating system to control your distributed application. IBM Cloud is built on top of open source tools, and integrates with all the third party services that you need to build, deploy, and manage your application. To start building with IBM today, go to softwareengineeringdaily.com/IBM and sign up for a free Lite account. With the Lite account, you can start building apps for free, and try numerous cloud services with no time restrictions. Check it out at softwareengineeringdaily.com/IBM.
|
cc/2019-30/en_middle_0053.json.gz/line4429
|
__label__cc
| 0.535236
| 0.464764
|
'Souls RPG » Archived Memories » Dead Topics
Without a Sound They Fly
And I don't care if I sing off key
I find myself in my melodies
I sing for love, I sing for me
I shout it out like a bird set free
The light blonde female had tossed in her bed of furs all night long, her brother of the same litter had slept soundly beside her but there was something wrong with the light hued adolescent that night and even into the morning. She had a stomach ache, and the night had found her restless as Aiwyn looked on from above her, his perch just next to that of her brother's raven, Beryl. The birds had sat with their feathers ruffled and their heads tucked against their bodies for warmth and comfort. It was a long night for the female Optime, but as soon as the sun began to streak in through the window of the siblings shared home, May got up, albeit a bit slowly and miserably, and walked up to the perch, where she gently lifted a sleeping Aiwyn from beneath his wings and hugged the bird lightly.
The lightly feathered barn owl was a bit snobbish at times, at least to her, but he was, what could be considered, one of her only friends. Besides her brother, he was the only one that she felt at ease with, and she brought him everywhere she could with her. Right now however, May was on a quest for an herbal remedy, something to ease her upset stomach. There had been a clinic built in the village recently, that May knew of, and she thought to try there first. The structure was not beautiful like the houses that adorned the village with their presence, but it was rustic and sturdy looking in the least, and it even had a stone chimney. With a sleepy bird perched atop her shoulder, May entered the structure that lacked a solid door, but instead sported heavy animal furs to cover the doorway and keep out the cold. "H...Hello...?" The soft voice called out, wondering if there could be a healer within to help with her predicament.
Word Count: [000] Form: Optime Date: 11 Mar Area: --
Table by Kitty. Image Credits: 9-liters-of-art
Hide Your Face
Avinalora
Word Count: [573]
Date: Feb?
Time: Morning
Form: Optime
A small figure stood in the middle of the new clinic. She was tiny, almost childlike with her stature. She looked very delicate with her skinny build. She could have been a fox Luperci with her long, bushy tail, but she had long legs that seemed very coyote-like. She also had long ears dominating her narrow head. Her muzzle didn't taper which was unlike a coyote's. She was a jackal.
Her base coat was almost white; as silver as snow or a moonbeam. Her coat color came from the drop of wolf blood running through her veins. Running from her ears to her tail, and ending in a white tail tip was a darker silver grizzled saddle that had black hairs dotting through it. A mop of black hair was pulled back into a ponytail. Her eyes were two shades of green, the left lighter than the right.
She was dressed in many layers of clothes due to her short, desert-adapted fur. A silver long-sleeved shirt was worn under a monochrome trench coat that went down a bit past her knees. The collar was pulled up to protect her neck. She also wore a pair of jeans to further protect herself from the Nova Scotia cold. The clothing was altered for her use but she had left the length unaltered and the shirt went a bit past her hips. A grey and white scarf was wrapped around her neck as further protection. She also wore a crescent moon pendant carved from wood.
Perched on her forearm was a large owl. The owl had a large, disc-shaped face that was white. Fawn, grey, and black ran down the owl's back and wings while white dominated the chest and under wings. The owl had deep, black eyes that were like the night. They were expressive and beautiful.
Avinalora had risen early to check on the new clinic. She had been helping to stock the clinic with herbs for use. And that meant getting up at the crack of dawn to make sure she had the day ahead of her since she walked very slowly because of her leg defect. The vixen had been accompanied by Tyler, her barn owl who was also an early riser.
The fox maiden felt a special kinship with the owl. She knew that the owl relied a lot on hearing and had very good hearing. Avi was like that since she was nearly blind and relied on her hearing and smell to get around. They were very alike with their senses. But at least the barn owl had good sight. the silver lady had always been almost blind.
Both the silver vixen and the tyto turned as they detected footsteps coming towards the building. But, she had a better image of the person since she could smell them. She smelled a young girl, one that carried the scent of Nyx and a barn owl. Without thinking, she placed her hand on the owl's back, just in case he got territorial.
A young girl entered through the furs that covered the entrance. She was around the winter wraith's height. The girl's fur was a mix of tan and fawn hues. Her eyes were purple, like the winter warrior's. The child also had a barn owl on her shoulder. She was sleepy, and looked miserable. The girl called out into the clinic and the vixen answered.
"Yes dear?" The monochrome fox replied.
"Somebody make me feel alive and shatter me!
Template by Kitty and Aso, image by Unsplash.com
Last edited by Avinalora Phoenix on Sat May 13, 2017 3:27 pm, edited 1 time in total.
Avinalora Phoenix
Silverfrost
Somebody make me feel alive
The queen of a wretched design
I walk through the fire
Being so early in the morning, the young looking coyote-wolf dog hybrid had not expected that anyone would be inside the clinic, but she was pleasantly surprised when a voice answered her timid call. Pale lavender eyes quickly adjusted to the dimly lit building and revealed within a small silver figure, the healer toting her own owl, one that was larger than Aiwyn and darker in color. The bird on her shoulder let out a strange crooning noise and tilted his head, but May paid it no mind. "Are you a healer...? I um... I have a stomach ache..." The child spoke in a shy tone.
Looking up at Aiwyn who appeared to be fully awake now and eyeing the other bird in the room, May tried to pat his ruffled feathers down and spoke softly to him. "Please be good, or I wont give you any extra mice tonight." her statement elicited an indignant response from the bird, who proceeded to fly up from her shoulder and perch lightly on one of the rafters of the clinic, wings folding soundlessly as the bird then turned his head back to look down at her. "Insolent child giving me orders." and then proceeded to close his eyes, returning to speak in his native tongue of avian low speech to the other bird, expressing his lack of ill will to the other owl, even going as far as to praise the other bird on his appearance, and May gave a strange look up to her owl companion before shaking her head slightly. "M-my name is May... I apologize if my friend caused any trouble..." she spoke, her ears angling back to show submission to the older more experienced Anatheman.
Word Count: [000] Form: Optime Date: -- Area: --
OOC Here
Word Count → 321
The girl asked if Avinalora was a healer and told her that she had a stomachache in a shy tone. The vixen nodded in response to the girl's question. She didn't remember the child's name, having had missed the Rast. Her sister had gone and told her elder sister that the child had brought an owl gris-gris, whatever that was. And now she was holding an owl. The irony of it.
"What did you eat?" The fox maiden asked, getting right to business. She didn't want to prolong the hybrid's suffering by introductions. The girl had a stomachache, but she still had to ask questions just in case. But, the waif knew that she should at least get the herbs ready. She heard the girl speaking to her owl, threatening to take away the bird's extra mice. She understood the owl's use of low-speech and let Tyler hop onto the counter and then flew up to the rafters with the other barn owl.
With well-practiced movements, the winter wrath proceeded to gather the herbs used to treat bellyache. Juniper berries, watermint, mallow, and pepermint would be useful in treating a bellyache. The healer decided to brew tea since it was better than drinking a cold beverage on a cold morning. She grabbed a small tin teapot that she had traded for a few months ago.
"Take a seat." The pale physician said as she began grounding up the juniper berries to add to the tea with her mortar and pestle. She squeezed the juices into the teapot. And then she ground up the watermint and mallow and squeezed the juices from the leaves into the teapot. Then, she added some water before repeating the process of grounding up the herbs. Then, went over to the heater and set a small fire and placing the teapot on the hanger.
"The tea should be ready in a few minutes." The monochrome fox said.
Last edited by Avinalora Phoenix on Mon May 01, 2017 10:34 pm, edited 1 time in total.
May was grateful that the silver furred healer decided to waste no time with pleasantries and simply got right down to the important questions to begin the girls treatment. The small vixen asked May what she had eaten and the younger female pondered her answer for a moment as she watched the other owl fly up into the rafters after her own. "E-eaten...? I haven't really eaten anything..." The young female spoke, thought it was true, May was an intelligent girl, but she often forgot to do even the simplest tasks of self care, including eating, and this was the reason that the female was so very thin.
Aiwyn cocked his avian head at the other bird as he joined him up in the darkened space of the rafters, crooning curiously and shimmying slightly along the wooden beam towards the other male. He was interested in the other owl, having been raised in captivity by Nyx from the time he was a chick, it was so far a nice experience for him to become acquainted with another bird.
The silver Jackal had asked May to sit, and the female obliged gratefully, moving over to one of the seats and easing herself down onto it, curling her legs up as she perched there. The moonlit healer was mixing some herbs into a tea kettle, and May was suddenly curious as to what combination of herbs could be used to relieve her problem, as well as any others. She was a student, and so she thought it wouldn't bring any harm for her to simply ask. "What kind of herbs are you using...? I want to train to be a healer too..." The girl added in, her ear flicking as she tried to suppress a wave of discomfort and mild nausea.
"The path to heaven runs through miles of clouded hell"
Optime | Morning | Feb? | Clinic
The girl said that she hadn't eaten anything. That was the problem. Well, at least the herbs Avinalora had given her would probable boost her. Though, she should be telling Nyx about this. The child did look skinny. The vixen knew the Malphas was a good mother, and probably wouldn't be starving her child. So, perhaps she forgot to eat? The healer made a mental note to have the winter warrior over for tea. The girl was still growing and needed all the food she could get.
"You should be eating." The fox maiden stated as she turned away from the tea she was making. It was obvious, but sometimes, the young ones didn't know that. "You're still growing, and your body needs food to keep you healthy and strong." She really hoped the kid would remember. And then the desert doctor turned away, mixing the herbs together. As she did, she communicated to the girl's owl in low-speech. She told him that she should remind her to eat.
The hybrid sat down obediently as the winter wraith continued the process of tea making. The kid had been raised well, it seemed. Them, she asked what was in the tea. By then, the waif had finished the mixture. She set a small fire in the heater and then hooked the teapot n the hanger. And then she turned to answer the questions asked.
"Juniper berries are useful for soothing the stomach. They can also be used to calm people and give them energy. Mallow also soothes the stomachache. And, watermint eases the suffering that originates from it. Mint also soothes the stomach, and makes the tea taste better." The grey-scaled girl explained. And then the tea was ready.
The moon-washed medic hooked the kettle from the hook with one of the curved sticks she kept around. She didn't want to get burned. She carefully moved it to the table she had cleared of the jars. She set the kettle down and then got out one of the cups. She carefully touched the handle to make sure it was cool enough to handle. It was warm, but not burning. She then poured it into the cup she managed to grab. And then walked over to the girl and said "Here. Be careful, it might still be hot." She gave it to her patient and then sat down.
"Didn't catch your name." The monochrome fox said. She didn't have a keen memory when it came to people's names.
Image | Background | Table by Andi
Last edited by Avinalora Phoenix on Mon May 08, 2017 6:36 am, edited 1 time in total.
May watched as the silver furred healer went about her work, listening with folded ears as the jackal mix told the coyote hybrid pup that she should be eating, and that she needed more food if she were to grow strong, and deep down May knew that was a fact, but she could never seem to remember when she was in the middle of a good book, even one that she had read once or twice already. May couldn't help but get lost inside those literary works until sleep took her sometimes, but since her Rast, and since May had moved out of the home of her mother and siblings that was far too crowded for her tastes, she had not been taking the best care of herself, and it was only Aiwyn who reminded her to eat whenever he himself got hungry, and they would go out to hunt together.
Avinalora even went so far as to tell her owl to remind the girl to eat however, and May silently groaned. The fawn colored hybrid got enough trouble from that bird as it were, and now there would be more fuel for the rude avian to pick on her from. The owl chirped down at the silver healer from the rafters, indicating that he did, but that the creature, indicating May, was too unintelligent to listen sometimes. May glared up at the bird and huffed audibly, her arms crossing over her chest, but she noticed that the two owls had gotten much closer, perched right up by each other and interacting in what seemed like a peaceful manner.
The fox healer had finished mixing the tea and heating it and brought the kettle over to the table at which May had sat herself down, she'd listened thoughtfully to the descriptions of each herb that had gone into the making of the tea, and the effects that each would have on the body, and she was fascinated. After the tea was served to her the young female gazed thoughtfully into her cup for a short moment, sniffing the steamy liquid before taking an experimental sip, and deciding that the taste wasn't so bad. "Thank you for this... My name is May... and yours..?"
"The fear of falling apart"
Avinalora's ears flicked as she heard the owl say that he did remind the child but she didn't. The vixen responded that he should try harder in a joking tone. She hoped that he would, since that wasn't healthy for the kid. Tyler was perched close to the other owl. The larger owl began preening the other one. And a small smile pulled at the healer's lips as she saw in interaction.
The girl listened as the fox maiden told her about the uses of the herbs. The hybrid would make a good student. She listened well and seemed like she might make a good healer. She didn't know what rank the girl was, though anyone could become a healer if they had the knowledge for it.
The fawn-colored female said that her name was "May". The winter wraith nodded and then the child asked of her name. "My name is Avinalora. I'm a friend of your mother's." She added that so the girl would know who she was. She didn't know if Nyx told her daughter about her, though she wouldn't mind if she didn't.
"So, what's your rank tier, if you don't mind me asking." The monochrome fox asked.
OOC: Sent from phone forgive the quality please lol
The meeting of the silver healer was going pretty straight forwards, the girl recieved her tea and she gave it a testing sniff before lapping up a bit of the scalding liquid. It had a strange taste, things that she had never experienced, but it didn't have a horrible taste. The female wasn't sure how to feel about the fact that the healer was instructing her bird to be even more of a pain in the butt than he already was.
As the female introduced herself and the silver healer returned her name, saying that she was a friend of May's mother, the girl blinked her pale lavender eyes and perked her ears a bit. "H-how did you know who my mom is..?" the naive girl asked before giving herself a subtle sniff and catching the scent of the white furred maternal figure there. "Oh, um, never mind." the girl muttered shyly, embarrassed about her own slip up.
The moonbeam fox maiden asked May about her rank then, and the thoughtful girl pondered for a moment before giving her answer. "I-I want to learn all I can, reading books, religion, medicine, anything I can learn, so I decided it might be good to become a Tuyul." she answered, lapping up more of her tea and marveling at the calming effect it was having on her upset stomach. "Thank you, Avinalora."
Your post is fine! Thanks for the thread <3
Avinalora chuckled softly as May seemed to forget that she smelled of Nyx. The vixen remembered how Luna used to forget that, too. The girl was still young, though and she had more to learn. The grey-scaled healer nodded and said, "Sometimes my wards forget that they smell like me and I smell like them." She noticed the kid's shyness and tried to joke.
The Malphas' daughter was a Tuyul. The ghostly jackal wasn't sure what that was, but judging by the kid wanting to learn, it would have to be some sort of scholarly tier. The fox maiden was in the medical tier, and her sister was in the warrior tier. She did know that there was some sort of domestic tier as well. "That's good." The fox-tailed female said.
The Tuyul thanked her and the winter wraith replied, "It was no trouble at all, May." She smiled and then said, "If you'll excuse me, I need to do my rounds. Just leave the cup on the counter when you're done." The monochrome fox got up and left the clinic.
Dead Topics
· Page 1 of 2 · 1, 2
|
cc/2019-30/en_middle_0053.json.gz/line4431
|
__label__cc
| 0.609222
| 0.390778
|
Tuesday 16 July 2019 , 9:37 am
Home » News » ‘Coaching must for competitive exams’
‘Coaching must for competitive exams’
Mysuru: Students who have completed graduation and post graduation must be bold enough to face the competitive exams. And coaching is very important part to gain confidence to write the competitive examinations, said Deputy Director of Pre-University Education Prof. Dayananda.
He was speaking at the free UGC-NET examination coaching organised by Jnanabuthi at Lakshmipuram Government Pre-University College auditorium on JLB Road, here recently.
In order to see that everyone gets higher education, the governments both at the State and Centre have brought in lot of changes in the system. Hence, undergraduate colleges have been opened in rural areas and as a result thousands of rural youth both boys and girls have access to higher education, he said.
As it is the responsibility to provide jobs to those who have completed higher education, every year competitive exams are held for IAS, IPS and other civil service jobs every year to fill the vacant posts. It is service minded organisations like Jnanabuthi that fill the gap, he said.
Last time, in Mysuru, nearly 50 per cent of aspirants who paid fees to write the competitive exams were absent. It is a matter of regret that such students are not getting proper guidance and hence they are absenting themselves from writing the exams, he bemoaned.
On the occasion, Ravindra Swamy who was conferred the Honorary Doctorate by Dharwad University was felicitated. Later, the competitive exam booklet ‘Jnanabhandar’ was released.
Former Vice Chancellor of Rani Chenamma University Prof. B.R. Ananthan, Litterateur and Humourist Prof. M. Krishnegowda, Prof. N.N. Prahalad, Prof. H.S. Mallikarjun Shastry, Prof. R. N. Padmanabha, Dr. G. V. Narasimhan, Prof. B. Jayaprakash, K.Sumathi Jayachandra, Coordinator C.K. Kiran Kaushik, Secretary H. Balakrishna, Jainahalli Satyanarayanagowda and Social Worker Manjula were present. Surabi Ramanujam rendered the invocation, while R. Ramakrishna compered.
Lack of study materials in Kannada irks KDA Chief Prof. Siddaramaiah
Sensitisation programme for school bus, van drivers held
|
cc/2019-30/en_middle_0053.json.gz/line4433
|
__label__wiki
| 0.87194
| 0.87194
|
Tuesday 16 July 2019 , 10:02 am
Home » News » By-polls: Chief Electoral Officer holds parleys
By-polls: Chief Electoral Officer holds parleys
Sreenivasa Prasad (BJP) and Kalale Keshavamurthy to file nominations on Mar. 20 in Nanjangud.
Stringent action will be taken against candidates who violate the Election Model Code of Conduct. Officers in-charge of conducting elections in Nanjangud and Gundlupet must ensure that candidates and party workers do not indulge in unfair practices to influence voters, said Chief Electoral Officer of Karnataka Anil Kumar Jha.
Jha, the State’s high-ranking officer who is overall responsible for the smooth conduct of elections, visited Nanjangud yesterday where the by-elections are scheduled on April 9 along with Gundlupet Assembly Constituency. The visit assumes significance as both BJP and Congress have taken the elections as prestige issue and there are reports that people might be influenced to cast votes for a particular candidate.
Chairing a meeting with Deputy Commissioner D. Randeep, who is also the Mysuru District Electoral Officer, and Superintendent of Police Ravi D. Channannavar and other officials at the Tahsildar’s Office in Nanjangud yesterday evening, Anil Kumar Jha asked the administrative machinery to ensure that there is free and fair poll.
“The Model Code of Conduct has come into force as soon as the poll schedule was announced and we are keeping tabs on the election expenditure, vehicles used for election campaigns, candidate rallies and election publicity materials,” he said.
Jha said that the voters’ list for Nanjangud Assembly constituency will be finalised by March 21. He added that political parties are not allowed to pay money or gifts to induce the voters. The Election Commission has formed sector and flying squads to check irregularities, he said.
Jha had also a piece of advice to the public when he said that people were free to approach officers if they feel that the poll code is violated. “We have publicised the phone numbers and names of the officers in-charge of the elections and public can report any violation,” he said.
Randeep said that the administration has formed various teams to keep a vigil on the possible illegal activities by political parties. Flying squads, static surveillance teams, accounting vigilance team, media authentication and supervisory committee and Model Code of Conduct teams have been formed at district and taluk levels.
Flying Squad members have been instructed to report on public events and the campaigning activities. Squads have been directed to visit campaigning places and videograph the proceedings and examine whether the political party had sought permission to conduct the rally. The static squad has been asked to check vehicles at check-posts for possible transportation of materials violating the poll code.
Assistant Commissioner C.L. Ananda, Assistant Poll Officer Kalavathi, Additional Superintendent of Police Divya Sara Thomas, Nanjangud Electoral Officer Jagadish, Tahsildar Dayananda and other officers were present.
NOMINATION PAPERS ON MARCH 20
READ ALSO Man goes missing
For the Nanjangud by-elections both V. Sreenivasa Prasad (BJP) and Kalale Keshavamurthy (Congress) will file their nomination papers on Mar. 20, one day before the deadline to submit the nomination papers expires. While Sreenivasa Prasad will file his papers between 12 noon and 1 pm on that day, Kalale Keshavamurthy will file nomination papers at 10 am.
Party sources said that before submitting their nomination papers, both the candidates will come in a large procession at their respective time.
bypolls Chief Electoral Nanjangud
Ramya to join BJP?
KUKKARAHALLI LAKE DEVELOPMENT: Experts visit Lake, seek public opinion
nine − nine =
|
cc/2019-30/en_middle_0053.json.gz/line4434
|
__label__cc
| 0.601912
| 0.398088
|
Biden Tests Waters For 2020 Run [Video]
Politico reports that Joe Biden on Sunday waltzed into the backyard of potential future opponent Sen. Bernie Sanders. He sounded an awful lot like a 2020 candidate.
FREE TRUMP CHRISTMAS COIN FREE TRUMP CHRISTMAS COIN
Biden took the stage here and railed against “naked nationalism,” “phony populism” and a GOP that is “not your father’s Republican Party.”It was six days after saying he’s “the most qualified person in the country to be president.
“Speaking of populism, Biden said, “If you have a problem, what’s the problem? The other. The other. That immigrant, that black guy, that woman.That’s the problem, instead of facing up to the problem called greed.” Biden did not mention President Donald Trump by name.
BONUS FOOTAGE BELOW: Compilation of Joe Biden being Creepy
Joe Biden Strikes Again, Gets Uncomfortable With Defense Secretary’s Wife.
Born in Pennsylvania on November 20, 1942, Joe Biden briefly worked as an attorney before turning to politics. He became the fifth-youngest U.S. senator in history as well as Delaware’s longest-serving senator.
Long before reaching one of the highest political offices in the nation, Joe Biden grew up in the blue-collar city of Scranton in northeast Pennsylvania. His father, Joseph Biden Sr., worked cleaning furnaces and as a used car salesman. His mother was Catherine Eugenia “Jean” Finnegan. Biden credits his parents with instilling in him toughness, hard work and perseverance.
Biden attended St. Paul’s Elementary School in Scranton. In 1955, when he was 13 years old, the family moved to Mayfield, Delaware—a rapidly growing middle class community sustained primarily by the nearby DuPont chemical company.
Thought Biden says he isn’t running, his actions of late prove other wise.
https://www.politico.com/story/2018/1…
http://www.wochit.com
Woman Arrested After PUSHING Elderly Golden Retriever Into Lake to Drown
Star Political News June 15, 2019
Great White Sharks CLUSTERING Off Georgia, Carolina Coasts; One Is a MASSIVE 2,137 Pounds
Star Political News May 16, 2019
BREAKING: Anti-ICE Protesters Raise Mexican Flag at ICE Facility
Star Political News July 13, 2019
Top Level DEMS Now Publicly Calling For Fellow Virginia Democrat Governor Ralph Northam to RESIGN
|
cc/2019-30/en_middle_0053.json.gz/line4435
|
__label__wiki
| 0.530139
| 0.530139
|
Legends articles, Wookieepedia comprehensive articles, News and entertainment programs
In the Political Pit
13:4:11[1]
HoloNet broadcast[1]
Politics[1]
In the Political Pit was a popular HoloNet political debate show which aired in the years prior to the outbreak of the Clone Wars.[2] It featured interviews with political figures. On the date 13:4:11, the show was broadcast on Feed CWN115 at 1935, featuring a panel consisting of RCLU Chairbeing Dotswa Ween, actor Reridan Reksiss, Representative Jar Jar Binks, and a recording artist named Gaeriala Boosin.[1]
In the Political Pit was mentioned in an issue of the HoloNet News feed (2002), Volume 531, Issue 51, that was published in-universe. The section that referenced the show, entitled "What to Scan," was written by Pablo Hidalgo and Paul Ens.[1]
What to Scan—HoloNet News Vol. 531 #51 (content now obsolete; backup link on Archive.org) (First mentioned)
What to Scan—HoloNet News Vol. 531 #51 (content now obsolete; backup link on Archive.org)
↑ The Complete Star Wars Encyclopedia, Vol. II, p. 108 ("In the Political Pit")
Retrieved from "https://starwars.fandom.com/wiki/In_the_Political_Pit?oldid=8411337"
Wookieepedia comprehensive articles
News and entertainment programs
|
cc/2019-30/en_middle_0053.json.gz/line4438
|
__label__cc
| 0.624283
| 0.375717
|
Hailmann
Humans of LP
Teacher RDS
Sanders Sister’s story
Alli Glen, Staff Writer
The Sanders twins have shown that even the quietest of people have a story to tell. Even though many have rarely heard sophomores Alexandrea and Brittney Sanders speak, the two have published a book called Crushin’ It on Wattpad, a website for budding authors, in October of 2018.
The idea of writing a book started all the way back in seventh grade when they first started writing the first draft part of the book with friends.
“We all decided that it would be best to stop because we all had such busy schedules,” Alex Sanders said.
After spending two years without adding to the book, the sisters decided to start it up again in April of 2018. When they began to write once more, they didn’t take it easy on themselves either.
The Sanders sisters wrote five chapters every week, and they admit it was quite the challenge, but it has been a journey well worth the ride.
Their story Crushin’ It has six parts to it. Each part focuses on a different girl, and each girl has her own exposition and rising action. The book, in total, has 90 chapters and an epilogue.
The sisters even came up with their very own synopsis to engage their readers.
“There once was a story about six best friends who went through everything together during high school–crushes, car crashes, even love. They experienced it all together, and they wouldn’t have changed a thing. Violet Owens has a problem. Nicole Taylor has a secret. Julia Owens is going through a rough time. Ash Reilly is a coward. Alaina Pierce is totally in love. Blake Reilly is overwhelmed with emotions. Each girl has her own struggle to go through. They said they would go through everything together, but what happens when boys divide them up?”
Since uploading Crushin’ It, the girls haven’t stopped editing the story daily.
“We have our paper copy where we edit with multicolored pens, and we have the document on GoogleDocs where we constantly read and edit when we have time,” Brittney Sanders said.
The entire process of writing a book has been special for the twins. They both wrote three parts a piece, and whenever one sister needed advice, the other sister was there to give it to her. Their family also gave the girls someone to lean on.
The twins were born into a family who loves reading, which made it easier for the girls to fall in love with it, too.
“We read a ton when we were younger, and then our love for reading seeped into our love for writing,” Alex Sanders said.
The Sanders twins are quiet and spend their days keeping to themselves, but through writing, they have found their own voice.
“I definitely want to write more because I want to show the world who I truly am,” Brittney Sanders said. “I don’t get that chance at school, and my writing helps me destress my already very much stressed life.”
The girls take several advanced classes, but their favorites are AP World History, AP Seminar, and Spanish. Coincidentally, they both hope to teach either Spanish or History one day, and they are certain that they will continue writing books.
The twin sisters mostly write stories together, but they have a few individual stories going.
“We work well together, so I will always bounce my ideas off of her even if we aren’t writing together,” Brittney Sanders said. “She is my number one fan who helps me figure out the plot of most of my books, so of course we’re going to write together more in the future.”
The Sanders hope to continue growing as writers. Maybe one day they will even pubish separate books, but for now, they are happy where they are with their story Crushin’ It.
The story Crushin’ It is found on the website called “Wattpad” and their username is “Multi-fandom_gurlz.”
Slicer Newsroom • Copyright 2019 • FLEX WordPress Theme by SNO • Log in
|
cc/2019-30/en_middle_0053.json.gz/line4443
|
__label__cc
| 0.56479
| 0.43521
|
Automating Transparency
How I Made CongressEdits
By Ed Summers
The House of many edits (Jeffrey Zeldman via Flickr)
Sometimes you write a piece of software and it gets used for purposes you didn’t quite imagine at the time. Sometimes you write a piece of software and it unexpectedly rearranges your life. I’d like to tell you a quick story about a Twitter bot named @CongressEdits. It tweets when someone edits Wikipedia anonymously from the United States Congress. In this post I’ll give you some background on how the bot came to be, what it has been used for so far, and how it works. @CongressEdits taught me how the world of archives intersects with the world of politics and journalism. To explain how that happened, I first need to give a bit of background.
The funny thing about @CongressEdits is that it wasn’t my idea at all. Back in July of 2014 I happened to see this tweet go by in my stream:
This Twitter bot will show whenever someone edits Wikipedia from within the British Parliament. It was set up by @tomscott using @ifttt.
— Parliament WikiEdits (@parliamentedits) July 8, 2014
Tom Scott’s insight was that there is a Wikipedia page for every IP address that has edited Wikipedia, and it could easily be plugged into Twitter. For example, you can see what edits 194.60.38.198 has made here. This page is also available as an Atom feed so it can be used by a feed reader or other software like IfThisThenThat (IFTTT). IFTTT lets you easily funnel data from one service (Facebook, Flickr, Instagram, Twitter, Gmail, etc) to another. Tom created an IFTTT recipe that watched the IP address feed for two IP addresses he knew were proxy servers for the UK Parliament, and tweeted them using the @parliamentedits account if any new edits were found. How did he know the IP addresses? Well from a FOIA request naturally.
According to Alexa, wikipedia.org is the sixth most popular destination on the Web. Wikipedia is, of course, the encyclopedia anyone can edit, so long as you can stomach wikitext and revert wars. Wikipedia is also a platform for citizen journalism, where events are documented as they happen. For example, the article about Germanwings Flight 9525 that crashed on March 24, 2015 was edited 2,006 times by 313 authors in 3 days.
What is perhaps less commonly known is that Wikipedia is a haven for a vast ecosystem of bots. These bots perform all sorts of maintenance tasks: anti-vandalism, spell checking, category assignment, as well as helping editors with repetitive operations. Some estimate that as much as half of the edits to Wikipedia are made by bots. There’s a policy for getting your bot approved to do edits, and software libraries for making it easier. Wikipedia bots are themselves the subject of study by researchers like Stuart Geiger, since in many ways this is terra incognita for information systems. What does it mean for humans and automated agents to interact in this way? What does it mean to think of Wikipedia bots in the context of computational journalism? Does it even make sense?
While these questions are certainly of interest, to understand the story of @CongressEdits you really only need to know two things about Wikipedia:
Wikipedia keeps a version history of all the edits to a particular article.
Wikipedia allows you to edit without logging in.
Typically editors log in, and any edits they make are associated with their user account. But to lower the barrier for making contributions you can also edit articles without logging in, so called anonymous or (more precisely) unregistered editing. When you edit this way there is no user account to tie the edit to, so Wikipedia ties the edit to the IP address of the computer that performed it.
If you go to Google and ask “what is my IP address” you should see a box at the top with our IP address in it. This is the IP address that Google thinks you are at. Given the way networks are set up at places of work, hotels, etc it’s possible that this IP address identifies a proxy server that filters content for many people on your network. So the IP address seen by Wikipedia may be for your organization, not your specific workstation.
Often spammers and other vandals will edit without logging in. Wikipedia uses these IP addresses to identify pages that have been vandalized, and will sometimes temporarily block edits from that IP address. It’s ironic that unregistered edits are often referred to as “anonymous,” since the IP address says a great deal about where the user is editing Wikipedia from. They add a physical dimension to the internet that we tend to think of as a disembodied space.
CongressEdits
So back in July of 2014, I saw Tom’s tweet and thought it could be interesting to try to do the same thing for the US Congress. But I didn’t know what the IP addresses were. After a quick search I found a Wikipedia article about edits to Wikipedia from the US Congress. A group of Wikipedians had been tracking edits from Congress already, but in a more manual way. I tweeted the IP addresses from the article to some experienced civic hackers I followed on Twitter, to see if they could verify them:
@joshdata @derekwillis @konklone do you happen to know of any more ip ranges for house & senate office buildings? https://t.co/gAyKOdj1eK
— Ed Summers (@edsu) July 9, 2014
Joshua Tauberer responded with a pointer to the GovTrack source code on GitHub, where he had a similar set of ranges. GovTrack is a government transparency site that aggregates information from government websites to provide easy access to the US legislative record. The good news is that Josh’s list matched the ranges in Wikipedia, and added a few more. The bad news was that the ranges included hundreds of thousands of individual IP addresses. I didn’t know what the proxy servers were in those ranges, or even if there were proxy servers at all—it just wasn’t immediately feasible to watch hundreds of thousands of Atom feeds.
Fortunately, I had previously worked on a very simple application, Wikistream, that visualizes the current edits to Wikipedias in all all major languages. To do this I needed to tap into the edit stream for all the langauge-specific Wikipedias, which sounds difficult, but in fact is quite easy. I learned a few years earlier that the MediaWiki instance behind each language-specific Wikipedia logs into a Internet-Relay-Chat chatroom, and announces all edits there. It is used by some of the previously mentioned anti-spam, anti-vandalism bots to keep abreast of what is changing on Wikipedia. Wikichanges is a program that simply logs into those IRC channels and displays the edits as a stream on a web page. While creating Wikistream I also created a little Node library called wikichanges that bundles up the channel watching and parsing code for reuse.
Here’s an example of a short Node program that uses the wikichanges library to print out the title of each change to all Wikipedias as they happen:
var wikichanges = require('wikichanges');
var changes = wikichanges.WikiChanges();
changes.listen(function(change) {
console.log(change.page)
Wikimedia Foundation now also host their own stream service which provides WebSocket, XHR, and JSONP polling interfaces to the stream of edits as they happen. What this means is you can write some static HTML and JavaScript that connects to the stream without having to bother with the IRC chatrooms or running a server of any kind. Here’s an example of a static HTML page that will display a list of edits in the English Wikipedia:
<script src="https://cdnjs.cloudflare.com/ajax/libs/socket.io/0.9.1/socket.io.js"></script>
<script src="https://code.jquery.com/jquery-1.11.2.min.js"></script>
var socket = io.connect("http://stream.wikimedia.org/rc");
socket.on("connect", function() {
socket.emit("subscribe", "en.wikipedia.org");
socket.on("change", function(change) {
$("ul").prepend("<li>" + change.title + "</li>");
<h1>English Wikipedia Edits !!!</h1>
You can copy and paste this into a text file and open it with your browser. In the change callback, each change object that is passed to that function has quite a bit of additional information about the edit. For example, here’s the JSON for an edit to the 2015 military intervention in Yemen English Wikipedia article:
"bot": false,
"comment": "",
"id": 727311673,
"length": {
"new": 64728,
"old": 64728
"minor": false,
"namespace": 0,
"revision": {
"new": 655651590,
"old": 655651542
"server_name": "en.wikipedia.org",
"server_script_path": "/w",
"server_url": "http://en.wikipedia.org",
"timestamp": 1428568783,
"title": "2015 military intervention in Yemen",
"type": "edit",
"user": "80.184.65.164",
"wiki": "enwiki"
From this information it’s possible to construct a url for the diff or to talk back to either the MediaWiki API or Wikimedia’s shiny and new REST API for more information about the article that changed.
When I realized that there were hundreds of thousands of IP addresses to monitor for the US Congress, it occurred to me that it would be pretty easy to watch the changes as they come in, and see if an IP matched a range, rather than needing to poll hundreds of thousands of Atom feeds. After a couple hours’ work, I had a short program that tweeted edits that came from the US Congress. I put the code on GitHub and thought a handful of my friends would follow it.
We’ve all heard about the promise of open-source software. I’m a believer, even though it has been rare for somemthing I’ve put on GitHub to get more than an occasional pull request or bug fix. The initial code for CongressEdits was 37 lines of CoffeeScript. Once this was up on GitHub I quickly got requests to make it configurable for other Twitter accounts, to customize the text of the tweet, provide IPv6 support, and (of course) to allow it to listen to other IP address ranges. Since it was such a small program it was easy to accommodate these requests. I renamed the project to anon, since it was for more than CongressEdits, and then things got interesting. A merry band of sixty or so Twitter bots administered by almost as many people sprouted up, such as:
@gccaedits: Government of Canada
@ItaGovEdits: Italian Parliament
@rugovedits: Russian government
@euroedit: European Parliament
@bundesedits: German Bundestag, federal ministries, and other federal agencies
@valleyedits: Google, Facebook, Apple, Twitter, and Wikimedia
@natoedits: North Atlantic Treaty Organization
Jari Bakken, a civic hacker in Norway, quickly put together a historical view of the edits for these bots using Google BigQuery and Wikipedia dumps. The Gitter chatroom for anon proved to be a great way to communicate with other people who were interested in running the bot or contributing to the project.
A few days after I put anon on GitHub, Tom Scott wrote to me saying that @parliamentedits hadn’t tweeted any changes yet, and he suspected that the two proxy servers in his IFTTT recipe were no longer being used by Parliament. He and Jonty Wareing were able to determine that, as with the US Congress, there was a large range of addresses that needed to be monitored. Jonty started up his own anon bot to monitor these Parliament IP ranges, and the original IFTTT recipe was retired. Tom Scott sent a second FOIA request to obtain the IP ranges, but this time it was denied.
I was shocked at how rapidly these bots popped up. I was equally surprised by how many people followed @CongressEdits: in 48 hours it jumped from 0 to 3,000 followers, and rapidly grew another order of magnitude to 30,000 followers.
Watching the followers rise, and the flood of tweets from them, brought home something that I believed intellectually, but hadn’t felt quite so viscerally before. There is an incredible yearning—in the United States and around the world—to use technology to provide more transparency about our governments. But at the same time, there are also efforts to obscure this access, and to make a mockery of our politics. I recently compiled the top five retweeted @CongressEdits tweets, which I think reflects this range:
tweet text
1347 Reptilians Wikipedia article edited anonymously from US House of Representatives http://t.co/B7VLkhLsb8
759 Senate Intelligence Committee report on CIA torture Wikipedia article edited anonymously from US Senate http://t.co/Bj4q8Naed1
740 Horse head mask Wikipedia article edited anonymously by Congress http://t.co/Ddh98AtAzx
658 Choco Taco Wikipedia article edited anonymously by US House of Representatives http://t.co/QzECJYjf6v
626 Step Up 3D Wikipedia article edited anonymously by US Senate http://t.co/8Cd1HfhUbP
The comparison with the top five @parliamentedits retweets yields similar results:
72 Barnett formula Wikipedia article edited anonymously from Houses of Parliament http://t.co/R6HyuF2ZhL
36 Revenge porn Wikipedia article edited anonymously from Houses of Parliament http://t.co/COoJFmwid8
35 List of steam locomotives in Slovenia Wikipedia article edited anonymously from Houses of Parliament http://t.co/V6pjvjtWJp
24 Mosaic (Star Trek) Wikipedia article edited anonymously from Houses of Parliament http://t.co/EqiaT1kf0h
21 Alexis Tsipras Wikipedia article edited anonymously from Houses of Parliament http://t.co/3yqusgcICN
It’s interesting to follow the links to the diff for the change and see how quickly many of these edits were reverted or modified by other Wikipedia editors. In truth I think this is the real value of these anon bots: they provide a focused channel for Wikipedians interested in monitoring a particular class of Wikipedia content. But what’s equally interesting, and perhaps most relevant for Source’s readers, is how these bots have been used as a source and subject for investigative journalism.
Take, for example, the story surrounding the Malaysian Airlines flight MH17, which was shot down near the Ukraine-Russia border. Soon after the crash, the RuGovEdits bot spotted an edit to the Russian Wikipedia article for commercial aviation accidents from an IP address within the All-Russia State Television and Radio Broadcasting Company (VGTRK). The edit replaced text that asserted MH17 had been shot down “by terrorists of the self-proclaimed Donetsk People’s Republic with Buk system missiles, which the terrorists received from the Russian Federation” with text that said it had been shot down by “Ukrainian soldiers.” This soon became news at Global Voices, The Telegraph, Wired, and the Washington Post.
Another story closer to home is an edit that was made to the English Wikipedia article for the Senate Intelligence Committee report on CIA torture from the US Senate:
Senate Intelligence Committee report on CIA torture Wikipedia article edited anonymously from US Senate http://t.co/Bj4q8Naed1
— congress-edits (@CongressEdits) December 9, 2014
The article was modified very slightly to remove text stating that enhanced interrogation techniques were a “euphemism for torture.” News of this edit was picked up in the Huffington Post, Mashable, and BoingBoing.
But probably the biggest story to break in the US recently on the topic of controversial edits to Wikipedia was Kelly Weill’s Edits to Wikipedia pages on Bell, Garner, Diallo traced to 1 Police Plaza:
Computer users identified by Capital as working on the NYPD headquarters’ network have edited and attempted to delete Wikipedia entries for several well-known victims of police altercations, including entries for Eric Garner, Sean Bell, and Amadou Diallo.
Instead of using anon, Weill wrote a program to crawl through historical Wikipedia data to identify edits made from the NYPD. Within hours of the news story, civic hacker John Emerson started up an anon bot to make new edits from the NYPD available via the NYPDEdits Twitter account. In an interview with Andrew Lih, a Wikipedia expert and journalism professor at American University, Weill described how she went about this work:
News of the story spread far and wide in The Washington Post, The Verge, NY Daily News, Rolling Stone, The New York Post, The Daily Mail, Essence, Time, and more.
The Apparatus
An important thing to note in these stories is that the bots let us know the edits came from a particular place (VGTRK, US Congress, NYPD), but without further traditional investigative journalism, we don’t really know who made the edits, or what their motivations were. Once @CongressEdits acquired 30,000 followers and individuals inside Congress became aware of its existence, some of the edits seem to be have been made knowing that they would broadcast—the observer effect kicked in. While it’s difficult (perhaps impossible) to spoof an IP address associated with a Wikipedia edit, it is possible that someone could go through the effort if the political stakes were high enough. Unsurprisingly, this technology is not transparency panacea. The same political landscape is replicated and implicated in these bots. They can be manipulated by actors for a variety of reasons once it’s clear how they operate.
I hope this article helped to lay bare the apparatus behind CongressEdits and other anon-style bots. Now that you know how simple it is to access the stream of edits on Wikipedia, I hope you have ideas for similar bots that could perform services of social or perhaps artistic value. Soon after I created CongressEdits, my friend Dan Whaley suggested it would be interesting to be able to observe all edits to articles related to US Congress, and so @congresseditors came into existence. The volume knob on @congresseditors is set quite high since there are so many edits (especially after an election)—but it can be an interesting stream to dip into. Or consider Hatnote’s Listen to Wikipedia project that taps into the Wikipedia edit stream to do just that: listen to Wikipedia. The mundane details of the edit stream can be reimagined, repurposed, and transformed. I hope that this article has sparked some ideas of your own. (If you do put together a bot I encourage you to put the code up on GitHub for others to see. You never know what might happen.)
Life after Bot
You may still be wondering how CongressEdits changed my life. In the interests of transparency I should tell you that when I created the bot I was a software developer working on archival systems at the the Library of Congress. As its name suggests the Library of Congress is part of the US Congress—it’s right next door from the US Capitol Building. I wrote the bot on my own time as a small experiment, not really expecting much of anything to happen. But when it (and I) became the subject of media attention—and the peril and promise of this simple script became apparent—I began to look at my employment in a new light. Where do the documentary interests of archives and journalism intersect? How do automated agents and humans interact in these new information spaces we are building?
I was fortunate to be offered a job at the Maryland Institute for Technology in the Humanities where working on questions like this was encouraged and supported—and was given a place in the UMD iSchool PhD program to study them. So as you write your bots to change the world, I also encourage you to consider how they can (and will) change you, too.
wikichanges
Ed Summers
I’m a software developer at @umd_mith study web archives at @iSchoolUMD & work on @documentnow // pro-social media at: https://t.co/uNbSDrHZf6
@edsu
Why We Issued a Newsroom Diversity Report on Day One
|
cc/2019-30/en_middle_0053.json.gz/line4444
|
__label__cc
| 0.601272
| 0.398728
|
Event Roundup, March 5
It’s NICAR week! Plus, we’re sponsoring the nerd social outing at the Design Museum.
March 8: #21 Journalismus und Künstliche Intelligenz (Zurich, Switzerland)
March 8: Expert tips for building an award winning newsletter (Seattle, WA)
March 8: Public Newsroom #54: The Chicago Data Collaborative (Chicago, IL)
March 8-11: 2018 National Institute of Computer Assisted Reporting Conference (Chicago, IL)
March 9: NICAR at the Design Museum (Chicago, IL)
March 10: Awesomest Journalism Party. Ever. at SXSW (Austin, TX)
March 19: Newsroom Coding Interest Group at Boston University: Immersives (Boston, MA)
March 19: Jornal Nexo - dados, reportagens e gráficos (São Paulo, Brazil)
March 21: Misinformation and the media: Flash talks and happy hour discussion (Philadelphia, PA)
March 7: Last day for local newsrooms to apply to Matter’s New York City workshop
March 26: Last day to enter the Data Journalism Awards
March 29: Last day to suggest a session to the Online News Association conference
April 1: Last day to propose a session to the International Open Data Conference
A Dinner for Journalists Means More Power at the Table
|
cc/2019-30/en_middle_0053.json.gz/line4445
|
__label__wiki
| 0.988567
| 0.988567
|
PKL 2019
Cricket Videos
La-Liga
ISL 2018-19
India not averse to day-night Tests
The former India women’s team captain, Diana Edulji, also indicated that India could play its first day-night Test even out of home.
Shayan Acharya
Mumbai 01 October, 2018 19:36 IST
A file photo of Adelaide Oval during a day-night Test. - AFP
For the last few years, Indian cricket has been a divided house when it came to playing a day-night Test. While the Board of Control for Cricket in India (BCCI) procrastinated the idea, there were reports that some of the top cricketers were not comfortable with the format yet.
But that picture will change soon as Committee of Administrators (CoA) member, Diana Edulji, on Monday made it clear that India will feature in day-night pink ball cricket in the near future.
“We are working on it. It will happen,” Edulji said on the sidelines of the 10th Dilip Sardesai Memorial Lecture at the Cricket Club of India.
The former India women’s team captain also indicated that India could play its first day-night Test even out of home. “It could be anywhere, but things will change,” she said.
Initially, India was to play a day-night Test in Adelaide in December but the BCCI had informed Cricket Australia (CA) that it was not ready for it. “We can confirm that we have received advice from the Board of Control for Cricket in India (BCCI) that it is not prepared to participate in a proposed day-night Test in Adelaide this summer,” the CA had said earlier this year.
The ICC playing conditions state that a home team can only host a day-night Test match with the agreement of the visiting board.
dilip sardesai
Diana Edulji
day-night test
World Cup Quiz: 2011, 2015, 2019
Take our quiz to see how much you remember from previous editions of the Cricket World Cup.
Take our quiz to see how much you remember from the fourth, fifth and sixth editions of the Cricket World Cup.
Take our World Cup Quiz for a test of how much you remember from the first three editions of the tournament.
Get your daily dose of Sportstar with handpicked stories delivered right to your inbox!
Tweets by sportstarweb
England celebrates World Cup triumph with young fans
Simon Taufel on Ben Stokes' overthrow episode: England should have been given five runs, not six
'I will be apologising for that the rest of my life': Stokes on deflected boundary in World Cup final
PKL 2019: All the final squads for the upcoming season
PKL 2019: World 7 wins a thriller against Indian 7 in All Star match - As it happened
England wins maiden World Cup after Super Over thriller
Cricket World Cup 2019: Full players list of all 10 teams
Ravi Shastri has to reapply for India coach position
World Cup 2019: Rohit Sharma, Jasprit Bumrah only Indians in ICC World Cup XI
Some players are Maradonas in training, but disappear during games - Igor Stimac on trying out new players
Jadeja slams Manjrekar on Twitter, says he has had enough of his 'verbal diarrhoea'
Twitter reacts to incredible World Cup final
Dejected, Ambati Rayudu bids goodbye
Djokovic outlasts Federer in record-breaking epic to defend Wimbledon title
TNPL 2019: Season four full schedule announced, Super Gillies to take on Dragons in opener
World Cup 2019: Gambhir blasts selectors after Rayudu retires
TNPL 2019 start date confirmed, full schedule to be announced shortly
PKL 2019: Focus on defence as U Mumba sets eyes on second title
Cricketers who may have played their last World Cup
PKL: Season 7 schedule, Telugu Titans face U Mumba in opener
Top 10 run-scorers of ICC Cricket World Cup 2019
Igor Stimac
M. V. Narasimha Rao
Tennis Videos
Businessline
defence contract
Group Sites :
The Site :
Copyright © 2019 THG PUBLISHING PVT LTD.
|
cc/2019-30/en_middle_0053.json.gz/line4450
|
__label__wiki
| 0.937821
| 0.937821
|
British Swimming Announces Appeals Procedure for World Championship Team
Great Britain has announced a fast-track appeals process with concerns over a limited roster size for the World Championships. (Photo of Adam Brown: Tim Binning/TheSwimPictures.com)
June 14th, 2013 Europe, International, News
Share British Swimming Announces Appeals Procedure for World Championship Team on Facebook
Tweet British Swimming Announces Appeals Procedure for World Championship Team
Submit British Swimming Announces Appeals Procedure for World Championship Team to Reddit
Share British Swimming Announces Appeals Procedure for World Championship Team on Pinterest
Share British Swimming Announces Appeals Procedure for World Championship Team on LinkedIn
After announcing that the British pool roster for the 2013 World Championship would be limited to just 30 athletes due to funding constraints, British Swimming has also revealed an appeals procedure on exactly how these 30 would be chosen in the likely event that more than 30 swimmers hit the qualifying times.
The organization feels as though it’s vital to fast-track the process, given that their trials this year come at the end of June, like the United States’ do, and bump right up against the FINA deadline. That timing won’t allow for a lengthy appeals process to the selection committee. The team will be announced on June 31st at 1:30 PM (London Time) on the British Swimming website.
Any athlete who wants to appeal a lack of selection will need to do so in writing (or their coach/parent if the athlete is under the age of 18.)
The Notice of Appeal shall, in particular, specify the provision(s) of the relevant Selection Policy which it is alleged have not been adhered to. The Appeal must be made within 48 hours of the date that the selections for the Team are announced.
The selection policy General Conditions lays out the guidelines by which British Swimming will select from the top two athletes who meet the lofty qualifying standards (which can be seen here.) When announcing the new roster limit of 30 athletes, British Swimming also emphasized that those meeting qualifying standards in Olympic events would receive preference in those who hit the standards in non-Olympic events (50 meter stroke events, women’s 1500 free, men’s 800 free.)
That could be slightly perilous for someone like defending 50m backstroke World Champion Liam Tancock. He hasn’t had a great year in 2013 so far, and there’s somewhat of a chance that he’d miss the 100 meter backstroke standard of 53.98, which would leave the selection committee with a bit of a predicament.
The full appeals document can be seen here.
« The Key to “Easy” Fly
Former Auburn All-American Abby Duncan Transferring Within SEC »
Liam Tancock
|
cc/2019-30/en_middle_0053.json.gz/line4472
|
__label__wiki
| 0.875041
| 0.875041
|
CJBC: Getting to the Core of Crimmigration (Topic)
Private Prisons, Private Governance: Essay on Developments in Private-Sector Resistance to Privatized Immigration Detention
Northwestern Journal of Law and Social Policy, Forthcoming
Danielle C. Jefferis
University of Denver Sturm College of Law
Penolakan Orang Asing ke Indonesia melalui Tempat Pemeriksaan Imigrasi Di Bandara Internasional: Sebuah Kedaulatan Absolut (Refused Entry Persons to Indonesia through Immigration Border Controls at International Airports: Absolute Sovereignty)
Jurnal Kajian Keimigrasian, Volume 1 No.1, Tanggal 1 Agustus 2018
Ridwan Arifin
Politeknik Imigrasi
Judicial Review of Disproportionate (or Retaliatory) Deportation
75 Wash. & Lee L. Rev. 1427 (2018), University of Georgia School of Law Legal Studies Research Paper No. 2018-37, Dean Rusk International Center Research Paper No. 2018-08
Number of pages: 48 Posted: 29 Aug 2018 Last Revised: 01 Nov 2018
Jason A. Cade
University of Georgia School of Law
Deportations and the Roots of Gang Violence in Central America
Criminal Justice, Borders and Citizenship Research Paper No. 3225314
Christian Ambrosius
Free University of Berlin (FUB) - Institute of Latin American Studies
Toward Proportional Deportation
Emory Law Journal Online, Vol. 63 (2014)
Number of pages: 6 Posted: 01 Apr 2018
Polly J. Price
Five Steps to a Better U: Improving the Crime-Fighting Visa
21 Richmond Public Interest Law Review 85 (2018)
Jason A. Cade and Meghan L. Flanagan
University of Georgia School of Law and University of Georgia School of Law
Crimmigration in Europe (Introduction)
European Journal of Criminology 14(1): 3-6, Criminal Justice, Borders and Citizenship Research Paper No. 3104493
Number of pages: 3 Posted: 30 Jan 2018
Maartje van der Woude, Vanessa Barker and Joanne van der Leun
Leiden Law School - Institute for Criminal Law & Criminology, Stockholm University and Leiden University - Leiden Law School
Over Crimmigratie En Discretionair Beslissen Binnen Het Mobiel Toezicht Veiligheid…Of Vreemdelingen…Of Veiligheid? (On Crimmigration and Discretionary Decision-Making in the Context of the Dutch Mobile Security Monitor… Or Aliens Monitor?)
Tijdschrift voor Veiligheid 14(2): 19-35
Maartje van der Woude, Dekkers Tim and Jelmer Brouwer
Leiden Law School - Institute for Criminal Law & Criminology, Leiden University - Institute for Criminal Law & Criminology and Leiden University - Institute for Criminal Law & Criminology
Crimmigration Resistance and the Case of Sanctuary City Defunding
Santa Clara Law Review, Vol. 57, No.3, 2018, UC Irvine School of Law Research Paper No. 2018-04, Criminal Justice, Borders and Citizenship Research Paper No. 3094952, U Denver Legal Studies Research Paper No. 18-04
Annie Lai and Christopher N. Lasch
University of California, Irvine School of Law and University of Denver Sturm College of Law
Crimmigration at the Internal Borders of Europe? Examining the Schengen Governance Package
Utrecht Law Review, 11 (1), 61-79, Criminal Justice, Borders and Citizenship Research Paper No. 3082543
Maartje van der Woude and Patrick van Berlo LLM MSc
Leiden Law School - Institute for Criminal Law & Criminology and Leiden University - Institute of Criminal Law and Criminology
Utrecht Law Review, Vol. 11, No. 1, p. 61-79, January 2015
Number of pages: 19 Posted: 28 May 2015
Exercising Discretion in Border Areas: On the Changing Social Surround and Decision Field of Internal Border Control in the Netherlands
International Journal of Migration and Border Studies 2(4): 382-402, Criminal Justice, Borders and Citizenship Research Paper No. 3082547
Dekkers Tim, Maartje van der Woude and Joanne van der Leun
Leiden University - Institute for Criminal Law & Criminology, Leiden Law School - Institute for Criminal Law & Criminology and Leiden University - Leiden Law School
Framing Migration and the Process of Crimmigration: A Systematic Analysis of the Media Representation of Unauthorized Immigrants in the Netherlands
European Journal of Criminology, Vol. 14(1) 100–119, Criminal Justice, Borders and Citizenship Research Paper No. 3082534,
Jelmer Brouwer, Maartje van der Woude and Joanne van der Leun
Crimmigration Checks in the Internal Border Areas of the EU: Finding the Discretion that Matters
European Journal of Criminology, Vol. 14(1) 27–45, Criminal Justice, Borders and Citizenship Research Paper No. 3082531,
Maartje van der Woude and Joanne van der Leun
Leiden Law School - Institute for Criminal Law & Criminology and Leiden University - Leiden Law School
Jennings v. Rodriguez and the Future of Immigration Detention
Harvard Latino Law Review, Vol. 20, No. 171, 2017, Criminal Justice, Borders and Citizenship Research Paper No. 3067537
Philip Torrey
Sanctuaries As Equitable Delegation in an Era of Mass Immigration Enforcement
113 Northwestern University Law Review 433 (2018)., Criminal Justice, Borders and Citizenship Research Paper No. 3053609, University of Georgia School of Law Legal Studies Research Paper No. 2018-40, Dean Rusk International Center Research Paper No. 2018-09
Number of pages: 73 Posted: 16 Oct 2017 Last Revised: 19 Nov 2018
Zone of Nondeference: Chevron and Deportation for a Crime
9 Drexel L. Rev. 323 (2017), University of Miami Legal Studies Research Paper No. 17-22
Number of pages: 30 Posted: 23 Jul 2017 Last Revised: 29 Aug 2018
Rebecca Sharpless
University of Miami - School of Law
Proportionality Lost? The Rise of Enforcement-Based Equity in the Deportation System and Its Limitations
22 Georgia Bar Journal 16 (2017), University of Georgia School of Law Legal Studies Research Paper No. 2017-16, Dean Rusk International Center Research Paper No. 2017-06, Criminal Justice, Borders and Citizenship Research Paper No. 2954013
Number of pages: 12 Posted: 19 Apr 2017 Last Revised: 12 Jan 2018
|
cc/2019-30/en_middle_0053.json.gz/line4477
|
__label__wiki
| 0.768468
| 0.768468
|
Vaccine Risk Perceptions and Ad Hoc Risk Communication: An Empirical Assessment
CCP Risk Perception Studies Report No. 17
Yale Law & Economics Research Paper # 491
82 Pages Posted: 29 Jan 2014 Last revised: 5 Feb 2015
See all articles by Dan M. Kahan
Dan M. Kahan
Yale University - Law School
Date Written: January 27, 2014
This Report presents empirical evidence relevant to assessing the claim — reported widely in the media and other sources — that the public is growing increasingly anxious about the safety of childhood vaccinations. Based on survey and experimental methods (N = 2,316), the Report presents two principal findings: first, that vaccine risks are neither a matter of concern for the vast majority of the public nor an issue of contention among recognizable demographic, political, or cultural subgroups; and second, that ad hoc forms of risk communication that assert there is mounting resistance to childhood immunizations themselves pose a risk of creating misimpressions and arousing sensibilities that could culturally polarize the public and diminish motivation to cooperate with universal vaccination programs. Based on these findings the Report recommends that government agencies, public health professionals, and other constituents of the public health establishment (1) promote the use of valid and appropriately focused empirical methods for investigating vaccine-risk perceptions and formulating responsive risk communication strategies; (2) discourage ad hoc risk communication based on impressionistic or psychometrically invalid alternatives to these methods; (3) publicize the persistently high rates of childhood vaccination and high levels of public support for universal immunization in the U.S.; and (4) correct ad hoc communicators who misrepresent U.S. vaccination coverage and its relationship to the incidence of childhood diseases.
Keywords: vaccines, risk, risk perception, risk communication, science communication
Kahan, Dan M., Vaccine Risk Perceptions and Ad Hoc Risk Communication: An Empirical Assessment (January 27, 2014). CCP Risk Perception Studies Report No. 17; Yale Law & Economics Research Paper # 491. Available at SSRN: https://ssrn.com/abstract=2386034 or http://dx.doi.org/10.2139/ssrn.2386034
Dan M. Kahan (Contact Author)
Yale University - Law School ( email )
HOME PAGE: http://www.culturalcognition.net/kahan
|
cc/2019-30/en_middle_0053.json.gz/line4478
|
__label__cc
| 0.690392
| 0.309608
|
US20130198823A1 - Presenting Managed Security Credentials to Network Sites - Google Patents
Presenting Managed Security Credentials to Network Sites Download PDF
US20130198823A1 US13/363,675 US201213363675A US2013198823A1 US 20130198823 A1 US20130198823 A1 US 20130198823A1 US 201213363675 A US201213363675 A US 201213363675A US 2013198823 A1 US2013198823 A1 US 2013198823A1
authentication management
network site
Daniel W. Hitchcock
Brad Lee Campbell
Amazon Technologies Inc
2012-02-01 Application filed by Amazon Technologies Inc filed Critical Amazon Technologies Inc
2012-02-28 Assigned to AMAZON TECHNOLOGIES, INC. reassignment AMAZON TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HITCHCOCK, DANEIL W., CAMPBELL, BRAD LEE
2013-01-30 Priority claimed from CN201710968939.0A external-priority patent/CN107659577B/en
H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
H04L63/0815—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
G06F21/31—User authentication
G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
H04L63/102—Entity profiles
Disclosed are various embodiments for providing managed security credentials to network sites for authentication. Multiple accounts of a user are maintained for multiple network sites. A secured resource of a network site is to be accessed by a computing device. One of the accounts is identified according to a domain name of the network site. The account is associated with a different network site having a different domain name from the domain name. The computing device is automatically authenticated with the network site using a security credential associated with the account.
The following application is related to co-pending U.S. patent application entitled “ACCOUNT MANAGEMENT FOR MULTIPLE NETWORK SITES” filed on even date herewith under attorney docket number 170107-1330 (patent application number not yet assigned), to co-pending U.S. patent application entitled “AUTHENTICATION MANAGEMENT SERVICES” filed on even date herewith under attorney docket number 170107-1660 (patent application number not yet assigned), to co-pending U.S. patent application entitled “RECOVERY OF MANAGED SECURITY CREDENTIALS” filed on even date herewith under attorney docket number 170107-1680 (patent application number not yet assigned), and to co-pending U.S. patent application entitled “LOGOUT FROM MULTIPLE NETWORK SITES” filed on even date herewith under attorney docket number 170107-1690 (patent application number not yet assigned), which are incorporated herein by reference in their entirety.
Many web sites require users to log in with a username and password so that the users may be securely identified. Users, however, often forget their username and/or password that are required to log in to a web site. It is also common for users to use the same username and/or password for multiple web sites. Managing tens or even hundreds of usernames and passwords is a major cause of pain for users and results in excessive abandonment rates where users simply fail to sign up for a new service if it requires a new account.
Many aspects of the present disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
FIG. 1 is a drawing of a networked environment according to various embodiments of the present disclosure.
FIGS. 2A-2C are drawings of examples of user interfaces rendered by a client in the networked environment of FIG. 1 according to various embodiments of the present disclosure.
FIGS. 3-6B are flowcharts illustrating examples of functionality implemented as portions of an authentication management client executed in a client in the networked environment of FIG. 1 according to various embodiments of the present disclosure.
FIG. 7 is a flowchart illustrating one example of functionality implemented as portions of an authentication endpoint executed in a computing device in the networked environment of FIG. 1 according to various embodiments of the present disclosure.
FIG. 8 is a flowchart illustrating one example of functionality implemented as portions of an authentication management service executed in a computing device in the networked environment of FIG. 1 according to various embodiments of the present disclosure.
FIG. 9 is a schematic block diagram that provides one example illustration of a client employed in the networked environment of FIG. 1 according to various embodiments of the present disclosure.
The present disclosure relates to managing security credentials such as usernames, passwords, security keys, and/or other security credentials. Although passwords may be a strong security credential when used properly, they are often misused. For example, a user may set a relatively weak password, such as a word from a dictionary or a password that is otherwise easy to guess. A user may also set the same password for multiple accounts across multiple network sites and with different security requirements. Thus, if one account is compromised, all other accounts using the same password are also vulnerable.
Thus, many problems associated with using passwords as a security credential are caused by humans being unable to process the type of data that passwords represent. Strong passwords often contain random characters and are long, which makes them hard to remember. Passwords are often not a single chunk of information and can stretch the limits of human working memory. The system disclosed herein largely separates the user from the password, thereby resolving many of the issues. For example, the system may automatically generate a unique, strong password for each network site, using characters selected from the entire set of characters acceptable by the network site. This can provide excellent resilience to brute force, rainbow table, and/or other attacks. In ordinary use, the user may not need to know the password for the network site. Further, the system may store the password on a server and make the password available to the user across multiple client devices, even on public-use client devices such as kiosks, etc. Access to the centrally stored passwords may be protected by knowledge-based questions, master passwords, and/or other approaches. Various techniques for strong credential lifecycle management are described by U.S. patent application Ser. No. 13/194,287 entitled “MANAGING SECURITY CREDENTIALS” and filed on Jul. 29, 2011, which is incorporated herein by reference in its entirety.
In various embodiments, accounts may be created automatically by an authentication management client providing a base set of information about a user to an account creation endpoint of a network site or identity provider. Accounts may be upgraded as necessary by providing additional information to access certain secured resources. Multiple users may be able to login to the authentication management client, which may allow the users to create respective accounts and to access secured resources of network sites by authenticating using the authentication management client. In some embodiments, multiple authentication management services may be available, and may be offered potentially by competing entities. Some network sites or identity providers may support some of the authentication management services but not others. Users may migrate from one authentication management service to another.
In various embodiments, an authentication management client presents security credentials to network sites (or identity providers) according to a domain name of the network site using domain name matching or other groupings. Some network sites may support authentication using multiple identity providers. Users may store preferences for preferred identity providers to be used by an authentication management client where multiple identity providers are available. In some situations, accounts and security credentials managed by an authentication management service may be recovered and used only by preauthorized clients. Also, credentials may be changed or exported to facilitate use outside of the authentication client. In some embodiments, where the authentication client facilitates logging into multiple network sites using multiple accounts, the authentication client may be configured to provide automatic logout functionality for the multiple network sites. In the following discussion, a general description of the system and its components is provided, followed by a discussion of the operation of the same.
With reference to FIG. 1, shown is a networked environment 100 according to various embodiments of the present disclosure. The networked environment 100 includes a client 103 that may be in data communication with computing devices 106, and computing devices 112 by way of a network 115. The network 115 includes, for example, the Internet, intranets, extranets, wide area networks (WANs), local area networks (LANs), wired networks, wireless networks, or other suitable networks, etc., or any combination of two or more such networks. The client 103 may also be in data connection with a portable data store 118 by way of, for example, a local interface, data bus, or another network 115.
The client 103 may comprise, for example, a computer system such as a desktop computer, a laptop computer, personal digital assistants, cellular telephones, smartphones, set-top boxes, music players, web pads, tablet computer systems, game consoles, electronic book readers, kiosks, or other devices with like capability. Further, the client 103 may also comprise any device that is network capable that may communicate with the computing devices 106, 112 over the network 115 to perform various functions. Such clients 103 may comprise, for example, processor-based devices having processor circuits comprising a processor and a memory.
The client 103 may be configured to execute various applications such as a browser 121, an authentication management client 124, and/or other applications. The browser 121 may be executed in a client 103, for example, to access and render network pages, such as web pages, gopher pages, mobile application content, or other forms of network content served up by the computing devices 106 and/or other servers. The authentication management client 124 may be executed to manage user accounts for network sites and identity providers, including usernames, passwords, private and public keys, certificates, and/or other security credentials.
In some embodiments, the authentication management client 124 runs as a plug-in application to the browser 121. For example, the authentication management client 124 may be implemented as a toolbar for the browser 121. Authentication management clients 124 may be implemented in hypertext markup language (HTML) version 5, or another language. In other embodiments, the authentication management client 124 may be a standalone application that interfaces with the browser 121, mobile applications, and/or other applications requiring management of authentication. The client 103 may be configured to execute applications beyond the browser 121 and the authentication management client 124 such as, for example, e-mail applications, instant message applications, and other applications.
The client 103 includes a data store 127, and potentially other data stores, which may comprise data and applications configured to provide access to the data. The data store 127 may be used to store client account data 130, identity provider preference data 131, certificate trust data 133, and/or potentially other data. The client account data 130 may include, for example, security credentials used to access various network sites or network pages, information regarding authentication endpoints, and/or other information. In various embodiments, client account data 130 may be stored in an encrypted format. In various embodiments, client account data 130 may be stored ephemerally such that the security credentials are erased upon expiration of a session of the authentication management client 124. In one embodiment, the data store 127 may store an encrypted key that may be decrypted in response to a master security credential obtained from the user. The decrypted key may then be used to decrypt the client account data 130.
The client account data 130 may also include a set of information about the user that may be employed by the authentication management client 124 in automatically creating or upgrading an account. Such information may include, for example, first name, last name, middle initial or middle name, email address, phone number, physical address, date of birth, and/or other information. The stored user information may be divided into more sensitive sets and less sensitive sets, which may be highlighted when a user provides consent to share the information. In one embodiment, information deemed less sensitive may be shared by default to create or upgrade accounts. If user information is requested for account creation or upgrade but is not stored in the client account data 130, a form may be rendered for the user to provide the missing information. In one embodiment, a “base” set of information may be defined by a standard.
The identity provider preference data 131 may indicate user preferences for identity providers to be used by the authentication management client 124 where multiple identity providers are available for a network site. Certificate trust data 133 may describe trusted certificate authorities that issue digital certificates used by network sites. Certificate trust data 133 may comprise, for example, public keys associated with the trusted certificate authorities. The public keys may be used to validate the digital signature of a trusted certificate authority on a digital certificate.
The computing device 106 may comprise, for example, a server computer or any other system providing computing capability. Alternatively, a plurality of computing devices 106 may be employed that are arranged, for example, in one or more server banks or computer banks or other arrangements. For example, a plurality of computing devices 106 together may comprise a cloud computing resource, a grid computing resource, and/or any other distributed computing arrangement. Such computing devices 106 may be located in a single installation or may be distributed among many different geographical locations. For purposes of convenience, the computing device 106 is referred to herein in the singular. Even though the computing device 106 is referred to in the singular, it is understood that a plurality of computing devices 106 may be employed in the various arrangements as described above.
The computing device 106 is configured to execute various applications such as, for example, a network page server 136, an authentication service 137 having an account creation endpoint 138 and an authentication endpoint 139, and other applications. The network page server 136 is configured to serve up network pages, such as web pages, and other data from the computing device 106 to various clients 103. The network page server 136 may be configured to send network pages by hypertext transfer protocol (HTTP), hypertext transfer protocol secure (HTTPS), or some other protocol. The network page server 136 may employ encryption using, for example, secure sockets layer (SSL), transport layer security (TLS), and/or some other approach. Non-limiting examples of network page servers 136 include Apache® HTTP Server, Apache® Tomcat, Microsoft® Internet Information Services (IIS), and other server applications.
The network page server 136 may be configured to serve up one or more network sites 140. Such a network site 140 is said to be hosted by the network page server 136. A network site 140 may include a set of network pages and/or files associated with a domain name, such as a canonical name, and a directory, such as a root directory (i.e., “/”) or some other directory. Each network site 140 may be associated with distinct configuration settings in the network page server 136, while other default configuration settings may be shared across network sites 140.
The authentication service 137 is executed to facilitate account creation and authentication. The authentication service 137 may be operated by the network site 140 or may be employed by multiple network sites 140. Where the authentication service 137 is employed by multiple network sites 140, the authentication service 137 may be referred to as an identity provider. As an identity provider, the authentication service 137 may be used by many different network sites 140 operated by many different entities. In some cases, a network site 140 may support multiple authentication services 137 or identity providers. In various embodiments, the network sites 140 and the authentication services 137 may be executed in the same computing device 106 or in different computing devices 106.
The account creation endpoint 138 may comprise a network page and/or software configured to facilitate creation of one or more accounts and/or the establishment of security credentials for existing accounts for one or more users at a client 103 for one or more network sites 140 using an account creation protocol. In various embodiments, the authentication management client 124 communicates with the account creation endpoint 138 through the network page server 136. To this end, the account creation endpoint 138 may be a plug-in or other module of the network page server 136, a script or other software embedded within a network page or otherwise within a network site 140 and executed by way of an interpreter or a common gateway interface, or accessed in some other way through the network page server 136. In other embodiments, the account creation endpoint 138 may be a server application executing on the same or a different computing device 106 as the network page server 136.
The authentication endpoint 139 may comprise a network page and/or software configured to facilitate authentication of a user at a client 103 for one or more network sites 140. In various embodiments, the authentication management client 124 communicates with the authentication endpoint 139 through the network page server 136. To this end, the authentication endpoint 139 may be a plug-in or other module of the network page server 136, a script or other software embedded within a network page or otherwise within a network site 140 and executed by way of an interpreter or a common gateway interface, or accessed in some other way through the network page server 136. In other embodiments, the authentication endpoint 139 may be a server application executing on the same or a different computing device 106 as the network page server 136.
The computing device 106 includes a data store 142 and potentially other data stores, which may comprise data and applications configured to provide access to the data. The data store 142 may be used to store network pages 145, configuration files 148, site account data 151, certificate data 154, and/or potentially other data. Network pages 145 may include the network pages and/or files served up for the network sites 140 hosted by the network page server 136. Configuration files 148 may include one or more security credential specifications and/or describe an interface of one or more account creation endpoints 138 and/or authentication endpoints 139. Site account data 151 comprises security credentials and/or other data associated with users of one or more network sites 140. Certificate data 154 comprises digital certificates that may be used by the network page server 136, the authentication endpoint 139, and/or other applications on the computing device 106 to identify a network site and/or encrypt data.
Various applications and/or other functionality may be executed in the computing device 112 according to various embodiments. Also, various data is stored in a data store 160 that is accessible to the computing device 112. The data store 160 may be representative of a plurality of data stores 160 as can be appreciated. The data stored in the data store 160, for example, is associated with the operation of the various applications and/or functional entities described below.
The components executed on the computing device 112, for example, include an authentication management service 163 and other applications, services, processes, systems, engines, or functionality not discussed in detail herein. The authentication management service 163 is executed to provide access to security credentials stored by the computing device 112 in association with a user account with a network site 140. In various embodiments, the authentication management service 163 may be configured to generate user accounts and/or establish security credentials with the network site 140 on behalf of a user at a client 103. In various embodiments, the authentication management service 163 may authenticate clients 103 using a master security credential and/or knowledge-based questions.
In one embodiment, the authentication management services 163 are registered in a directory of such services. Such a directory may be maintained by an impartial third party. The authentication management services 163 may be differentiated with respect to one another. Some authentication management services 163 may, for example, offer a privacy-friendly service that ensures users that their browsing habits are not being profiled by the authentication management service 163. Other authentication management services 163 may choose to track logins performed by the authentication management client 124. Users may be able to migrate their account data from one authentication management service 163 to another authentication management service 163 by way of a migration protocol.
The data stored in the data store 160 includes, for example, server account data 166, valid master credentials 169, valid supplemental credentials 170, static knowledge-based questions 172, user data 175, configuration files 176, and potentially other data. The data stored in the data store 160 may be partitioned into user-specific data and global data. The server account data 166 includes security credentials for users for authentication to network sites 140. Such security credentials may be stored in an encrypted form or a non-encrypted form. The server account data 166 may also include information regarding account creation endpoints 138, authentication endpoints 139 and/or other information. The authentication management clients 124 may be configured to update and synchronize the server account data 166 with the client account data 130 frequently to ensure freshness when the user logs in via multiple clients 103.
The valid master credentials 169 are employed to authenticate users for the authentication management service 163. In one example, the valid master credentials 169 may correspond to hashed versions of a master security credential established by users. The valid supplemental credentials 170 correspond to supplemental credentials that may also be employed to authenticate users for the authentication management service 163. Unlike the master security credential, a combination of one or more valid supplemental credentials 170 along with correct answers to one or more knowledge-based questions may be needed for a user to be authenticated. Respective weights may be applied to each component of a score used to determine authentication.
The static knowledge-based questions 172 correspond to knowledge-based questions for which the user has preconfigured an answer. Such questions may be selected by the user or may be preselected. The user data 175 corresponds to various data associated with users. Such user data 175 may relate to purchase transactions of a user with an online retailer, browsing history, order history, search history, profile information, and/or other data. The user data 175 may be employed to generate dynamic knowledge-based questions as will be described. The user data 175 may correspond to data describing the interactions of a user with a network site 140 in some embodiments.
The configuration files 176 may include one or more security credential specifications and/or describe an interface of one or more account creation endpoints 138 and/or authentication endpoints 139. While the data in the data store 160 that has been previously discussed has been of a user-specific nature, the configuration files 176 may be non-user specific and thus may be considered global data.
The portable data store 118 may comprise, for example, a universal serial bus (USB) flash storage device, a solid-state storage device, a portable hard disk, a floppy disk, an optical disc, and/or other portable storage devices. In various embodiments, the portable data store 118 may include a processor circuit comprising a processor and a memory. In other embodiments, the portable data store 118 may merely consist of a non-transitory computer-readable storage medium. The portable data store 118 may be removably attached to the client 103 in some embodiments.
The portable data store 118 may be configured to store portable account data 178, authentication management client code 179, and/or other data. The portable account data 178 may include, for example, security credentials used to access various network sites 140 or network pages 145, information regarding authentication endpoints 139, master security credentials to decrypt the client account data 130, and/or other information. In various embodiments, the portable account data 178 may be a mirror of the client account data 130 or the server account data 166. In other embodiments, the portable account data 178 may take the place of client account data 130 or the server account data 166. The portable account data 178 may be stored in an encrypted format.
To this end, the portable data store 118 may include a device (e.g., a fingerprint scanner or other biometric recognition device, a pin pad, etc.) used to authenticate a user in order to provide access to the data on the portable data store 118, such as portable account data 178; or it may include hardware and/or software to permit a user to enter a password and/or decryption key in order to provide access to the data on the portable data store 118. Additionally, in some embodiments, the authentication management client 124 may be stored as authentication management client code 179 on the portable data store 118 and executed in the client 103, for example, when the portable data store 118 is attached to the client 103.
Next, a general description of the operation of the various components of the networked environment 100 is provided. To begin, a user may install authentication management client 124 onto the client 103 and preconfigure the operation of the authentication management client 124 for existing accounts associated with network sites 140. For example, the user may provide to the authentication management client 124 and/or the authentication management service 163 existing security credentials such as, for example, usernames, passwords, security keys, certificates, and/or other security credentials along with identifying information for the network sites 140 and/or uniform resource locators (URLs) associated with the security credentials. The authentication management client 124 may be associated with one or more of multiple authentication management services 163. The authentication management clients 124 may or may not interact with the authentication management services 163 by way of a standard authentication management protocol. In some cases, the authentication management client 124 may show some logo or other branding associated with a corresponding authentication management service 163.
The user may also configure a master security credential such as, for example, a username, password, biometric identification, etc. for the authentication management client 124 so that the security credentials may be encrypted or otherwise protected from use or view on the client 103 without the authorization of the user. In one embodiment, upon installation of the authentication management client 124, the authentication management client 124 encrypts the client account data 130 using a randomly-generated, high-entropy master key. This master key may, in turn, be encrypted to a user-specified master key, which may be stored along with the client account data 130 to allow for local decryption. In some embodiments, access to the operating system user session in the client 103 may provide access to the client account data 130 without a separate user login. In one embodiment where the client 103 executes the Windows® operating system, the master security credential may be stored in “Credential Manager.”
Where the security credentials are stored in the server account data 166 of the computing devices 112, the user may establish a valid master credential 169 with the authentication management service 163. In one embodiment, the server account data 166 for the user may be stored in an encrypted form. In one embodiment, the server account data 166 for the user is encrypted using a security credential generated as the result of an SSL/TLS session between the client 103 and the computing device 112, e.g., a Rivest Cipher 4 (RC4) symmetric key or some other security credential. The encryption may be performed in the authentication management client 124 so that security credential details are not given in the clear to the authentication management service 163. In some cases, the user may configure answers to static knowledge-based questions 172 with the authentication management service 163.
The account information may be stored by the authentication management client 124 in client account data 130 on the client 103 and/or at some other location. For example, the authentication management client 124 may back up the account information to account data 160 located on the computing device 106, portable account data 178 located on in the portable data store 118, and/or another location. Various techniques relating to storage of the account information on the client 103 are described by U.S. patent application Ser. No. 12/539,886 entitled “AUTHENTICATION MANAGER” and filed on Aug. 12, 2009, which is incorporated herein by reference in its entirety.
In some embodiments, the account information may be centrally hosted in the server account data 166 of the computing devices 112. When the computing devices 112, the portable data store 118, or other storage locations are used to store account information, a user may be able to use the authentication management client 124 and the account information on another client 103. To this end, the authentication management client 124 may be, for example, downloaded, configured, and loaded automatically on another client 103. Additionally, various functions that are described as being performed by the authentication management client 124 may instead be performed by the authentication management service 163. For example, the authentication management service 163 may be configured to create accounts, regenerate security credentials, etc. in place of the authentication management client 124. The authentication management client 124 in some cases may be characterized as a client application of the authentication management service 163.
Security credentials may be shared among multiple users of the authentication management client 124. As a non-limiting example, several users in an organization may share an online banking account. A first user may create a username and password for the account using the authentication management client 124 and/or the authentication management service 163. The first user may mark the account as shared and provide a list of users that are authorized to access the account, including a second user. When the account is distributed to client account data 130, server account data 166, portable account data 178, it may be secured such that only the authorized users can access it. When the second user next uses the authentication management client 124, the second user may be given the opportunity to synchronize the new account with portable account data 178 located in the portable data store 118 belonging to the second user or in some other location.
During the installation process, in one embodiment, the user may specify whether the authentication management client 124 is to operate as a browser 121 plug-in or as a standalone application. The authentication management client 124 may be installed and configured for a plurality of browsers 121 such as Firefox®, Internet Explorer®, Safari®, Chrome®, and/or other browsers 121. The authentication management client 124 may also be configured for a plurality of users on the client 103.
When a user accesses a network site 140 with the browser 121 or another application, the authentication management client 124 determines whether the network site 140 is associated with stored account information, which may be stored, for example, centrally in the server account data 166 or locally in the client account data 130. The authentication management client 124 may communicate with an authentication service 137 of the network site 140 or of a separate identity provider.
The authentication management client 124 may refer to the domain name of the network site 140 in order to correlate a stored account with the network site 140. In some cases, multiple network sites 140 having different domain names may use the same stored account. Sometimes, this determination may be based on a portion of the domain name, such as the second-level domain portion. As a non-limiting example, a company may have several network sites 140 with different domain names for various geographic locales or generic top-level domains, e.g., “e-retailer.com,” “e-retailer.net,” “e-retailer.co.uk,” “e-retailer.eu,” “e-retailer.co.jp,” and so on. The authentication management client 124 may identify the user account according to the string “e-retailer” being in the domain name, rather than an exact match of the domain name. However, the matching may not be dispositive, and the network sites 140 may in fact be unrelated. Accordingly, the identification of the account may be presented to the user for explicit confirmation before any secured information from a stored account is exchanged with the network site 140.
If the network site 140 is not associated with stored account information, then the authentication management client 124 may notify the user and may prompt the user to provide security credentials if the user has an existing account. The user-provided security credentials may then be stored by the authentication management client 124 in one or more of client account data 130, server account data 166, or portable account data 178.
Alternatively, or additionally, the authentication management client 124 and/or the authentication management service 163 may assist the user in creating an account for the network site 140. The account may be a one-time account, a first account for the user, or a second or subsequent account for the user. The authentication management client 124 and/or the authentication management service 163 may determine how to create an account for a network site 140 based, for example, on the structure of a form embedded within a network page 145. Such a form may be defined in hypertext markup language (HTML), extensible markup language (XML), or some other language.
As a non-limiting example, the authentication management client 124 may identify an account creation form when a submit input element on a network page 145 is associated with text such as “Create Account.” The authentication management client 124 may also examine the URL for relevant keywords. As another non-limiting example, the authentication management client 124 may identify an account creation form when a challenge response test (e.g., a “Captcha”) is present. The authentication management client 124 may automatically identify required fields for security credentials using, for example, input elements on a network page 145 named “username,” “password,” or other identifiable names. In various embodiments, the authentication management client 124 may have the user identify the account creation form and/or tag input elements of the form so that the authentication management client 124 may accurately identify how the account may be created with form filling. Such a list of tags can be stored in a configuration file 176 which may then be uploaded to a computing device 112. There, the configuration file 176 can be accessed by other users using the authentication management client 124 and used by them to simplify account creation on the network site 140 described by the configuration file 176. Alternatively, or additionally, configuration files 176 may be stored by the computing device 112 to be accessed by the authentication management client 124, the authentication management service 163, and/or other applications.
In various embodiments, the authentication management client 124 and/or the authentication management service 163 may create the account in an automated way through methods other than form filling. For example, the authentication management client 124 and/or the authentication management service 163 may obtain a configuration file 148 associated with the network site 140 from either the network page server 136 for the network site 140 or a computing device 112 that may provide a configuration file 176 associated with the network site 140. The configuration file 148, 176 may define one or more account creation endpoints 138 for the network site 140 where the authentication management client 124 and/or the authentication management service 163 may authenticate and/or create an account other than by filling out a form. For example, the configuration file 148, 176 may define the URL, parameters, encoding, and/or other information required to create an account in an automated way through an account creation endpoint 138. In some embodiments, one account creation endpoint 138 may be shared by multiple network sites 140 and/or network page servers 136. To prevent unauthorized automatic creation of accounts, the authentication management client 124 and/or the authentication endpoint 139 may include “Captchas,” limit velocity of account creation, and/or take other measures.
The configuration file 148, 176 may also include a security credential specification associated with the network site 140. The security credential specification may specify a character set, minimum length, maximum length, and/or other parameters for usernames and/or passwords. The security credential specification may also specify minimum key length, acceptable algorithms and formats, and/or other parameters applicable to public key infrastructure or other types of security credentials.
The authentication management client 124 and/or the authentication management service 163 may generate one or more security credentials based on the security credential specification. In one embodiment, the authentication management service 163 may be configured to obtain the security credential specifications according to a subscription-based push model. In another embodiment, the authentication management service 163 may be configured to pull the security credential specifications from the computing device 106 at regular intervals.
When the authentication management client 124 and/or the authentication management service 163 is creating an account by form filling, the authentication management client 124 may prompt the user to supply a security credential specification so that the authentication management client 124 and/or the authentication management service 163 may generate one or more security credentials to be filled in on the form. The user may see information regarding required attributes for security credentials displayed on the network page 145 near the account creation form. The authentication management client 124 may provide options including, but not limited to, length of the security credential, directions to use a certain character set, directions to use at least one number, directions to use at least one non-alphanumeric character, and other options.
As a non-limiting example, the authentication management client 124 may present a graphical interface to the user listing various attributes that may be used in generating the security credentials. Such a graphical interface may include, for example, checkboxes, radio buttons, drop-down boxes, text fields, text areas, etc. The graphical interface may be preconfigured with default selections. Where the security credentials are generated by the authentication management service 163, the authentication management service 163 may perform the form filling, or the security credentials may be transferred to the authentication management client 124 for the authentication management client 124 to perform the form filling.
In various embodiments, when the authentication management client 124 is creating an account by form filling, the authentication management client 124 may replace, for example, the normal user interaction in filling out the form with a wizard interface. The wizard interface may omit tasks or fields that may be done automatically by the authentication management client 124. However, the wizard interface may obtain input from the user in order to fill out fields such as “Captchas” and other challenge response tests. Although the authentication management client 124 and/or the authentication management service 163 may be configured to fill out fields pertaining to other personal information (e.g., name, date of birth, social security number, phone number, address, etc.), the authentication management client 124 may instead be configured to prompt the user for that information. In various embodiments, the authentication management client 124 may leave unrecognized form fields blank for the user to complete.
Accordingly, the authentication management client 124 and/or browser 121 sends an account creation request associated with the generated security credential to the network site 140. After the account creation request is submitted, the account will either be created or not created for the network site 140. The network site 140 typically provides a response page indicating whether the account creation was successful. Such a network page 145 may be parsed automatically by the authentication management client 124 or may be left for additional user input to the authentication management client 124.
In some cases, the response page will include another form with an indication that there was a problem. As a non-limiting example, a username field may be highlighted with an explanation that the specified username was already taken. The authentication management client 124 may be configured to respond automatically to such requests and/or to seek user input. Account creation responses through an authentication endpoint 139 may be handled by the authentication management client 124 in an analogous way. In one embodiment, the authentication management client 124 may simply assume that the account was created.
Responsive to account creation, the authentication management client 124 and/or the authentication management service 163 store the account information including, but not limited to, security credentials, URLs, and domain names associated with the account and network site 140, in one or more of client account data 130, server account data 166, or portable account data 178. In particular, the network site 140 or authentication endpoint 139 may present a trusted certificate from certificate data 154 during the account creation process. Information relating to this trusted certificate, including domain name, certificate authority, and other information from the certificate, may be stored with the account information.
The account information may consequently be marked as usable on a network site 140 corresponding to the domain name provided in the trusted certificate, or only for a network site 140 able to present that specific certificate in higher assurance environments. Account information stored in any of client account data 130, server account data 166, or portable account data 178 may be manually or automatically copied by the authentication management client 124 and/or the authentication management service 163 to any other client account data 130, server account data 166, or portable account data 178 so that the account information may be mirrored across any two or more of client account data 130, server account data 166, or portable account data 178.
For purposes of backup, the authentication management client 124 and/or the authentication management service 163 may be capable of rendering a list of the stored account information in client account data 130, server account data 166, or portable account data 178 for viewing or printing. To facilitate viewing or printing, the authentication management client 124 and/or the authentication management service 163 may be configured to generate human readable or printable security credentials using an appropriate character set. Alternatively, the authentication management client 124 and/or the authentication management service 163 may encode security credentials in a printable form using an encoding approach such as, for example, UUencoding, BinHex, Multipurpose Internet Mail Extensions (MIME) encodings, Base64, and other encoding approaches.
Additionally, for purposes of recovery, the master security credential may be written to removable media such as a Universal Serial Bus (USB) key. To improve security in recovery cases, the master security credential may be encrypted to a secret stored in the client 103. This ensures that a lost USB key or other removable media cannot be used to access the server account data 166. In some embodiments, recovery could be something implemented at least in part by the operating system by tying the master security credential to the user account in the operating system.
To enable roaming and recovery, a set of one-time passwords may be generated by the authentication management client 124. Each of these may be used to generate additional encrypted versions of the master security credential, each of which may be appended to the server account data 166. The one-time password may be enforced by the authentication management client 124 removing each entry from the server account data 166 as it is used. The user may be responsible for keeping these one-time passwords somewhere outside of the system (e.g., on a print out, wallet card, etc.)
In some embodiments, recovery and reset capabilities may be managed on a per-machine basis by the authentication management service 163. In one embodiment, only the first client 103 for a given authentication management account may be capable of recovery. The authentication management service 163 could provide a user interface to manage clients 103, including the ability to allow recovery/reset at additional clients 103. Further, different types of account data recovery mechanisms may be supported (e.g., one-time passwords, operating system recovery, credential stored on removable media, etc.), and a subset of these account data recovery mechanisms may be enabled or disabled on a per-client basis. For example, the authentication management client 124 may be configured to request permission to use a particular one of the account data recovery mechanisms. Such a request may include a client-identifying token.
The authentication management service 163 may enable or disable the requested account data recovery mechanism according to whether authorization has been granted to the particular client 103. As a non-limiting example, a first registered client 103 (e.g., a home machine) may be able to use all recovery mechanisms, but by default, none of the recovery mechanisms may be available for use on other clients 103 (e.g., a friend's machine). This may be used to preempt the possibility of security attacks through such recovery mechanisms. An interface with the authentication management service 163 may be provided for a user to selectively enable or disable particular recovery mechanisms for particular clients 103.
To facilitate recovery of a lost master security credential, the master security credential may be written to a portable data store 118 or other removable media. To improve security in such a situation, the master security credential may be encrypted to a key that is stored in the client 103 so that the master security credential may be decrypted only at the client 103, even if the portable data store 118 or removable media is stolen. In some embodiments, the master security credential may correspond to an operating system credential that is managed by the operating system.
In some embodiments, a set of one-time passwords may be generated by the authentication management client 124, and each of these may be used to generate additional encrypted versions of the master security credential, each of which may be appended to the client account data 130 and server account data 166. To enforce the one-time passwords, each entry is removed by the authentication management client 124 from the client account data 130 as it is used. The user may be responsible for keeping these one-time passwords secure outside the system (e.g., on a print out, on a wallet card, etc.).
When a stored account exists for a network site 140, the authentication management client 124 and/or the authentication management service 163 determines whether to provide the security credentials to the network site 140. As a preliminary matter, the authentication management client 124 and/or the authentication management service 163 may require that the user be authenticated to the authentication management client 124 and the authentication management service 163 by way of a master security credential such as a password, presence of the portable data store 118 at the client 103, biometric identification, native operating system identification, or some other authentication. Responsive to authentication, the authentication management client 124 may decrypt the stored client account data 130, server account data 166, or portable account data 178. In some embodiments, the authentication management client 124 may be given access to the stored client account data 130, server account data 166, or portable account data 178 responsive to providing a master security credential. The authentication management client 124 then verifies the identity of the network site 140.
Verifying the identity of the network site 140 may be performed, for example, by comparing a domain name associated with a trusted certificate provided by a network site 140 at the time of logon with the domain name associated with the network site 140 in the stored account information. The authentication management client 124 may compare the domain name associated with the trusted certificate provided by the network site 140, for example, with a domain name provided by a user, a domain name inferred by heuristic analysis, or some other domain name, in order to identify which stored account the network site 140 appears to resemble. Verifying the identity of the network site 140 through the use of trusted certificates may be less susceptible to spoofing attacks than by verifying the identity merely through domain name service (DNS) name resolution, for example, or comparing a stored domain name to what is displayed in the address bar of the browser 121.
If the network site 140 provides no certificate (e.g., authentication under HTTP) or if the certificate is not trusted (e.g., self-signed or issued by a certificate authority not considered to be trusted in the certificate trust data 133), the authentication management client 124 may display a warning to the user. In some cases, the user may accept the warning and continue. In some embodiments, the authentication management client 124 may remember such characteristics and use them to aid in future identity verification of the network site 140. In other cases, the authentication management client 124 may identify a clear use of a spoofing attack or other phishing attempt and provide additional warnings, disable authentication at the particular network site 140, require reauthentication by the user to the authentication management client 124, and/or take other precautions. Additionally, by integrating the authentication management client 124 with a site providing reputation data for network sites 140, the authentication management client 124 can warn the user that a network site 140 is hostile.
The authentication management client 124 may additionally verify the identity of the network site 140 by other methods. One verification method may comprise comparing the contents of the address bar in the browser 121 with a stored URL or domain name. A second verification method may comprise comparing contents of the HTTP headers sent by the accessed network site 140 with a stored URL or domain name. A third verification method may comprise performing a reverse DNS look-up on an Internet Protocol (IP) address associated with the accessed network site 140 and comparing that domain name with a stored URL or domain name. Other verification methods may also be employed. More secure methods may be employed prior to downgrading to less secure methods, and the user may specify acceptable methods of proving the identity of network sites 140.
Once the identity of a network site 140 is verified, the authentication management client 124 may provide the security credentials to the network site 140 automatically through an authentication endpoint 139 or may obtain user confirmation. If the authentication management client 124 is configured to obtain user input, the authentication management client 124 may render a button or other user interface feature in or on top of the browser 121 to obtain confirmation.
When no authentication endpoint 139 is defined for a network site 140, the authentication management client 124 may be configured to detect whether an authentication form is presented. The authentication management client 124 may examine the network page 145 for elements such as a submit input element associated with text such as “Log In,” input fields matching “username” and/or “password,” fields using the password type, and other identifying elements. The authentication management client 124 may also examine the URL for relevant keywords. In some embodiments, the authentication management client 124 and/or the authentication management service 163 may store a URL associated with the network site 140 in client account data 130, server account data 166, or portable account data 178, which may be used for authentication. The authentication management client 124 may provide the security credentials to the network site 140 by form filling. The submission of such a form may be automatic or may be subject to user input such as selection of a “Submit” or “Log In” button or other user interface element.
In some cases, the user may forget the master security credential or may not have access to the master security credential on another client 103. The user may then be able to either reset the master security credential, or gain at least temporary access to stored security credentials, through a procedure implemented by the authentication management service 163. Upon a user selecting a master security credential or reset option, the authentication management service 163 may generate a user interface providing one or more knowledge-based questions. For example, the user interface may correspond to a network page for rendering in the browser 121. Alternatively, data may be sent to the authentication management client 124 in order for a user interface to be rendered by the authentication management client 124.
The user interface may present static knowledge-based questions 172 that are preconfigured by the user. For example, the user interface may present a question of “What is your mother's maiden name?,” “In what city were you born?,” “What was the mascot of your high school?,” and so on. The user interface may present true questions or false questions. True questions correspond to questions that can be validated by both the user and the authentication management service 163 that are unique to the user. False questions are those designed to catch an attacker who is attempting gain unauthorized access to the security credentials. For example, a false question may be: “What was the last payment amount for the truck you lease?” where the correct answer should be: “I do not have a truck.”
Furthermore, the user interface may present knowledge-based questions that are dynamically generated by the authentication management service 163. With dynamically generated questions, the user may have no foreknowledge as to what type of questions will be asked. Dynamically generated questions may employ user data 175 including unique customer information such as purchase transaction history and/or other data. One example of a dynamically generated question may be: “I see that you purchased an item from E-Retailer yesterday, can you tell me the bill amount?”
Multiple knowledge-based questions may be presented in a user interface. The answers to the knowledge-based questions may be used by the authentication management service 163 to generate a score. When the score meets a predefined threshold (e.g., one question answered correctly, three questions answered correctly, one dynamically generated question based on recent data answered correctly, etc.), the user may be granted access to the stored security credentials of the server account data 166 and/or access to establish a new valid master credential 169. It is noted that different weighting may be applied to different types of questions in generating a score. For example, dynamic questions based on a recent event may be given a greater weight than a static question based on information obtained during account creation. In the case of new or infrequent users for whom insufficient user data 175 is present for dynamically generated questions, the authentication management service 163 may fall back to employ the static knowledge-based questions 172.
Once a user is authenticated by the authentication management service 163 through the use of knowledge-based questions, or through a valid master security credential, security credentials of the user from the server account data 166 may be downloaded to the client account data 130 for use by the authentication management client 124. In one example, the client 103 corresponds to a kiosk or another public-use client 103. In such an example, the security credentials may be maintained ephemerally in the memory of the client 103 such that they are erased from memory when the user logs out, exits the browser 121, or otherwise ends the session of the authentication management client 124. Alternatively, the security credentials may be saved to the client account data 130 for future use through the client 103.
Moreover, once a user is authenticated by the authentication management service 163, the user may be presented with an opportunity to set a new security credential. For example, the user may supply the new security credential with or without the previous security credential. The valid master credentials 169 are updated by the authentication management service 163 to store the new valid master credential 169. It is noted that the valid master credential 169 may be hashed or otherwise encoded.
The authentication management service 163 may also be employed to generate or regenerate security credentials according to security credential specifications in the configuration files 176. In addition to initial account creation and configuration, the authentication management service 163 may be configured to regenerate security credentials periodically or when triggered by a user or administrator. For example, an administrator may trigger an automatic regeneration of security credentials for many users with accounts for a certain network site 140 in response to a potential security compromise. Upon regeneration of the security credentials, the authentication management service 163 may establish the newly generated security credentials with the various network sites 140 using the appropriate account creation endpoint 138. The authentication management service 163 may supply a previous security credential to facilitate establishing the newly generated security credential. The security credentials may be generated or regenerated to have a maximum security strength allowed by the security credential specification.
Where multiple authentication management services 163 are available, authentication management clients 124 may be configured to import/export the client account data 130 for use with different authentication management services 163. Authentication management clients 124 may be deployed by different providers of authentication management services 163 or by other parties. In some embodiments, a particular authentication management client 124 may function only with a corresponding authentication management service 163. Thus, the authentication management client 124 may be configured to allow import and export of client account data 130 to different authentication management clients 124 for use with different authentication management services 163.
In one embodiment, the authentication management service 163 may provide a revocation user interface in order to revoke security credentials associated with the server account data 166. To facilitate this central revocation, the security credentials in the server account data 166 may be token based, and not based on literal storage of user credentials. Revocation and reset may be performed by the authentication management client 124 in some embodiments. For example, the authentication management client 124 may include a “reset all credentials” function that would automatically reset each credential to a newly generated credential. Knowledge-based questions may be asked of the user to provide an additional check on the identity of the user before performing the automatic credential resets.
In addition to credential resets, the authentication management client 124 may support credential changes to user-specified passwords, etc. Such support may be useful in the case of a user going on vacation without access to the authentication management client 124. The user may want to change the automatically generated security credentials to a single temporary password that may be easy to remember. After returning from vacation, the user may reset the temporary password to new automatically generated security credentials. In one embodiment, the single temporary password may have an expiration period, to be enforced by the authentication management service 163.
Turning now to FIG. 2A, shown is an example of a network page 145 (FIG. 1) rendered by a browser 121 (FIG. 1) executed in a client 103 (FIG. 1) in the networked environment 100 (FIG. 1) according to various embodiments of the present disclosure. In this example, the user may have entered, or may have been automatically redirected to, the URL “https://www.e-retailer.site/,” which is displayed in the address bar 203 of the browser 121. The network page 145 provided by the network site 140 (FIG. 1) in response to the URL includes an authentication form having a username field 206, a password field 209, and a submit button 212.
The browser 121 includes a security indication 215 that indicates that the network site 140 has presented a trusted certificate and the communication between the client 103 and the computing device 106 (FIG. 1) is being encrypted. In FIG. 2A, the authentication management client 124 (FIG. 1) has verified the identity of the network site 140 and is presenting an authentication system selection 218. The authentication system selection 218 indicates that the user has installed the authentication management client 124 and that account information associated with the network site 140 is available. In particular, the authentication system selection 218 allows for selection of account data from among multiple authentication services 137 (FIG. 1). It may be assumed in FIG. 2A that the user has previously authenticated with the authentication management client 124 or that an opportunity to authenticate will be presented if a supported authentication service 137 is selected. If account data did not exist, the authentication system selection 218 may allow for account creation with a selected authentication service 137.
Once a user selects the authentication service 137, the authentication management client 124 may fill in the username field 206 and the password field 209. The authentication management client 124 may also automatically submit the logon request by programmatically pressing the submit button 212. In some embodiments, the username field 206 and password field 209 may be prefilled automatically with the security credential upon verification of the identity of the network site 140. The security credentials may be shown as place holding characters or as plain text.
Alternatively, if, for example, an authentication endpoint 139 (FIG. 1) is defined, the authentication management client 124 or the authentication management service 163 (FIG. 1) may authenticate with the authentication endpoint 139 in the background. The authentication management client 124 may give an indication of success or failure and may provide another user interface element in order to log out of the network site 140.
Moving on to FIG. 2B, shown is another example of a network page 145 (FIG. 1) rendered by a browser 121 (FIG. 1) executed in a client 103 (FIG. 1) in the networked environment 100 (FIG. 1) according to various embodiments of the present disclosure. In the example of FIG. 2B, an authentication management client 124 (FIG. 1) is configured in the client 103, but no account is found for the current network site 140 (FIG. 1). Thus, the user is presented with the username field 206 and the password field 209 and a notification 221 that no account is found. A checkbox or other user interface component may be provided in association with the notification 221 for the user to consent to add the provided legacy account information to the authentication management client 124. Further, a link, button, or other user interface component may be provided for the user to consent to account creation.
With reference to FIG. 2C, shown is yet another example of a network page 145 (FIG. 1) rendered by a browser 121 (FIG. 1) executed in a client 103 (FIG. 1) in the networked environment 100 (FIG. 1) according to various embodiments of the present disclosure. In the example of FIG. 2C, the network site 140 (FIG. 1) supports authentication by way of an authentication management client 124 (FIG. 1), but no authentication management client 124 is detected. In this case, a notification 224 may be presented to that effect. The notification 224 may be presented in association with a user interface component 227 such as a button, link, etc. to allow the user to view more information about the authentication management client 124, to create an account with an authentication management service 163 (FIG. 1), to download and/or install an authentication management client 124, and/or perform other actions. Alternatively, the user may log on to the network site 140 with a legacy username and password using the username field 206 and the password field 209.
Referring next to FIG. 3, shown is a flowchart that provides one example of the operation of a portion of the authentication management client 124 according to various embodiments. It is understood that the flowchart of FIG. 3 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication management client 124 as described herein. As an alternative, the flowchart of FIG. 3 may be viewed as depicting an example of steps of a method implemented in the client 103 (FIG. 1) according to one or more embodiments.
Beginning with box 303, the authentication management client 124 authenticates a user to an authentication management service 163 (FIG. 1). For example, a user may log in to an operating system session which is tied to a session of the authentication management client 124. Alternatively, the user may log in to the authentication management client 124 directly. In box 306, the authentication management client 124 obtains encrypted account data from the authentication management service 163. In some cases, this encrypted account data may already be stored in the client 103 as client account data 130 (FIG. 1) or in a portable data store 118 (FIG. 1) as portable account data 178 (FIG. 1). In box 309, the authentication management client 124 decrypts the encrypted account data based at least in part on a master security credential supplied by the user. The decrypted account data may be stored, at least ephemerally, as the client account data 130 for use during a user session of the authentication management client 124.
In box 312, the authentication management client 124 determines that a secured resource of a network site 140 (FIG. 1) is to be accessed. For example, the user may employ the browser 121 (FIG. 1) to navigate to a secured network page 145 (FIG. 1) or other secured network resource. In box 315, the authentication management client 124 determines whether the client account data 130 includes an account for the network site 140 (or an identity provider used by the network site 140). To this end, the authentication management client 124 may determine one or more authentication services 137 (FIG. 1) associated with the network site 140 having an authentication endpoint 139 (FIG. 1) and an account creation endpoint 138 (FIG. 1). The authentication services 137 may correspond to third-party authentication providers in some cases. The authentication management client 124 may send a query to the network site 140 to determine the supported authentication services 137 and/or may determine the supported authentication services 137 based at least in part on the content of a network resource already obtained by the browser 121.
The authentication management client 124 may determine the existence of an account in the client account data 130 according to the domain name of the network site 140 or through other identifying data available from the network site 140. In one embodiment, the authentication management client 124 may query the authentication management service 163 to obtain information to map the domain name of the network site 140 to a stored account. In another embodiment, the authentication management client 124 may perform a matching on at least a portion of the domain name, such as the second-level domain name, e.g., “e-retailer” within “e-retailer.com” and “e-retailer.co.uk.” Thus, the different first-level domain names may be ignored when determining which account may be used.
Where a matching is performed across different domain names, an explicit user confirmation may be solicited before an identified existing account is actually utilized. Where multiple accounts are configured for the same base domain name, the account having the longest match may be employed. As a non-limiting example, an account for “us.e-retailer.com” may be preferred to log into “www.e-retailer.com” instead of an account for “e-retailer.com.”
If an existing account is identified, the authentication management client 124 authenticates to the authentication service 137 of the network site 140 using the security credentials of the pre-existing account in box 318. Subsequently, the secured resources of the network site 140 may be accessed. In most cases, this authentication may happen automatically without user intervention. However, in some cases (e.g., with high-value transactions), the authentication service 137 may set a flag in the authentication protocol to require explicit consent, thereby forcing the user to consent to the log in using the authentication management client 124. Also, where multiple accounts are identified, the authentication management client 124 may be configured to render a user interface to obtain a user selection of one of the accounts. Thereafter, the portion of the authentication management client 124 ends.
If an existing account is not identified, the authentication management client 124 moves from box 315 to box 321 and determines whether the user has a legacy account, i.e., an existing account not available in the client account data 130. To this end, the authentication management client 124 may render a user interface that is configured to prompt the user to enter legacy account information and security credentials, if the user has a legacy account. If the user has a legacy account, in box 324, the authentication management client 124 obtains the legacy account information from the user.
In box 327, the authentication management client 124 stores the legacy account information in the client account data 130. In some cases, the authentication management client 124 may transition the provided security credentials to stronger credentials as defined in a security credential specification. The user may be prompted to consent to such a credential change. In box 330, the authentication management client 124 authenticates with the network site 140 using the respective authentication service 137 and the legacy account information. Thereafter, the portion of the authentication management client 124 ends.
If the user does not provide legacy account information, or if the user provides a confirmation that the user does not have an existing account capable of accessing the secured resource, the authentication management client 124 moves from box 321 to box 333. In box 333, the authentication management client 124 determines whether a new account is to be created for the network site 140. For example, the user may have specified a set of information (e.g., name, email address, age, etc.) that may be shared with account creation endpoints 138 in order to create an account. The user may have established rules to automatically consent to the sharing of some information but not other information. If an account is not to be created, e.g., the user does not give consent or stored preferences disallow sharing of the information, the portion of the authentication management client 124 ends. Otherwise, if a new account is to be created for the user, the authentication management client 124 transitions from box 333 to box 336.
In box 336, the authentication management client 124 obtains consent from the user to share the information needed to create an account capable of accessing the secured resource. Such a consent may correspond to an explicit confirmation in a user interface, a stored consent preference, and/or other forms of consent. The authentication management client 124 may determine which set of information (out of a superset of information) is needed by obtaining an indication of the particular set from the account creation endpoint 138. The authentication management client 124 may obtain additional information from the user in some cases. The additional information may include freeform data, multiple choice selections, yes or no answers, and/or other data.
In box 339, the authentication management client 124 automatically creates the account using the set of information about the user by communicating with the account creation endpoint 138. In some cases, the account may be with an operator of the network site 140. In other cases, the account may be with a third-party identity provider, which may enable the account to access multiple secured resources across multiple network sites 140 associated with multiple operators.
In box 342, if the account was created successfully, the authentication management client 124 stores the resulting account information, including, for example, automatically generated security credentials, in the client account data 130. In box 345, the authentication management client 124 authenticates with the authentication endpoint 139 of the network site 140 using the new account to facilitate access to the secured resource. Thereafter, the portion of the authentication management client 124 ends.
Turning now to FIG. 4, shown is a flowchart that provides one example of the operation of another portion of the authentication management client 124 according to various embodiments. Specifically, FIG. 4 relates to an account creation workflow that may include upgrading an existing account. Upgrading may be performed to access secured resources of a network site that are otherwise not accessible by the existing account. For example, a user may create an account with an online merchant to browse without providing a shipping address, but a shipping address may be necessary to place an order. The user may be able to upgrade the account to place the order by providing the shipping address. It is understood that the flowchart of FIG. 4 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication management client 124 as described herein. As an alternative, the flowchart of FIG. 4 may be viewed as depicting an example of steps of a method implemented in the client 103 (FIG. 1) according to one or more embodiments.
Beginning with box 403, the authentication management client 124 determines that an account is to be created with an authentication service 137 (FIG. 1) in order to access one or more secured resources of a network site 140 (FIG. 1). If an existing account is present, access to the specific secured resources may be denied through the particular existing account. In box 406, the authentication management client 124 determines whether the client account data 130 (FIG. 1) includes an existing account for the network site 140. If the client account data 130 does not include an existing account for the network site 140, the authentication management client 124 moves to box 409.
If the client account data 130 does include an existing account, the authentication management client 124 moves from box 406 to box 412 and determines whether the existing account is upgradeable in order to access the requested secured resource. If the existing account is not upgradeable, the authentication management client 124 moves from box 412 to box 409. It is noted that in some embodiments all or nearly all accounts may be capable of being upgraded and enriched with additional information when necessary. That is to say, it may be rare situation where a user already has an account with a network site 140 but has to create another account.
In box 409, the authentication management client 124 obtains consent from the user to share the information needed to create an account capable of accessing the secured resource. Such a consent may correspond to an explicit confirmation in a user interface, a stored consent preference, and/or other forms of consent. The user may also provide additional information. In box 415, the authentication management client 124 automatically creates an entirely new account using the set of information about the user, and potentially the newly provided information, by communicating with the account creation endpoint 138 (FIG. 1). In box 418, if the account was created successfully, the authentication management client 124 stores the resulting account information, including, for example, automatically generated security credentials, in the client account data 130. Thereafter, the portion of the authentication management client 124 ends.
If, instead, the authentication management client 124 determines that an existing account is upgradeable to access the secured resource, the authentication management client 124 proceeds from box 412 to box 421. In box 421, the authentication management client 124 determines a subset of the set of user information that is needed to upgrade the existing account to access the secured resource. In box 424, the authentication management client 124 obtains consent from the user to share the subset of user information. The authentication management client 124 may also or instead obtain further information from the user that is not already available in the set of user information. In box 427, the authentication management client 124 upgrades the existing account by providing the additional user information, including the subset of the set of user information and/or the newly provided user information, to the account creation endpoint 138 of the network site 140. Thereafter, the portion of the authentication management client 124 ends.
Moving on to FIG. 5, shown is a flowchart that provides one example of the operation of yet another portion of the authentication management client 124 according to various embodiments. In particular, FIG. 5 relates to multi-user use of the authentication management client 124 and logout from multiple network sites 140 (FIG. 1). It is understood that the flowchart of FIG. 5 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication management client 124 as described herein. As an alternative, the flowchart of FIG. 5 may be viewed as depicting an example of steps of a method implemented in the client 103 (FIG. 1) according to one or more embodiments.
Beginning with box 503, the authentication management client 124 authenticates a user with the authentication management service 163 (FIG. 1) in response to the user providing some security credential. In box 506, the authentication management client 124 obtains encrypted account data from the authentication management service 163. In box 509, the authentication management client 124 decrypts the account data based at least in part on a master security credential provided by the user. In box 512, the authentication management client 124 logs into a network site 140 by communicating with an authentication endpoint 139 (FIG. 1) of an authentication service 137 (FIG. 1).
The authentication management client 124 provides stored security credentials from the client account data 130 (FIG. 1). Where multiple authentication services 137 are available for a given network site 140, the user may explicitly select one of the authentication services 137, or one might be selected automatically according to a stored preference in the identity provider preference data 131 (FIG. 1). Where an account does not already exist, it may be created or upgraded automatically as previously described in connection with the flowcharts of FIGS. 3 and 4.
In box 515, the authentication management client 124 determines whether another network site 140 is accessed. Alternatively, another secured resource of the same network site 140 which requires a separate login may be accessed. If another network site 140 is accessed, the authentication management client 124 returns to box 512 and logs into the other network site 140 using stored security credentials. Thus, the authentication management client 124 may automatically authenticate with multiple authentication services 137 corresponding to multiple network sites 140. A respective session may be established for each network site 140, which may include session data such as session cookies stored by the browser 121 (FIG. 1), cached network resources, and so on. If another network site 140 is not accessed, the authentication management client 124 instead proceeds from box 515 to box 518.
In box 518, the authentication management client 124 obtains a universal logout request from the user. Such a logout request may be explicit, such as with the user selecting a single logout button on a user interface of the authentication management client 124, or implicit, such as with the user exiting the authentication management client 124. The user session of the authentication management client 124 may be ended upon a switch user request being made by the user, or when the user logs out of an operating system account. In some cases, a user session with the authentication management client 124 may be ended automatically after a predefined period of inactivity. In some embodiments, the user may provide a logout request for a specific network site 140 or a set of network sites 140.
In response to the logout request, in box 521, the authentication management client 124 logs out from each network site 140. To this end, the authentication management client 124 may automatically send a respective logout indication to each of the authentication services 137. In box 524, the authentication management client 124 may automatically flush any session data and client account data 130. Specifically, the decrypted account data may be removed from the client 103. Where the logout request is a specific logout request instead of a universal logout request, the logout may be performed only for the specified network sites 140. Thus, in the case of a specific logout, the user may continue to utilize sessions that were not indicated in the specific logout request.
In box 527, the authentication management client 124 determines whether another user is to use the authentication management client 124. For example, the authentication management client 124 may be configured to accommodate multiple users within a single operating system user session. If another user is to be authenticated, the authentication management client 124 returns to box 503. Otherwise, the portion of the authentication management client 124 ends.
Continuing now to FIG. 6A, shown is a flowchart that provides one example of the operation of yet another portion of the authentication management client 124 according to various embodiments. In particular, FIG. 6A relates to resetting security credentials. It is understood that the flowchart of FIG. 6A provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication management client 124 as described herein. As an alternative, the flowchart of FIG. 6A may be viewed as depicting an example of steps of a method implemented in the client 103 (FIG. 1) according to one or more embodiments.
Beginning with box 603, the authentication management client 124 authenticates a user to the authentication management service 163 (FIG. 1) in response to the user providing some security credential. In box 606, the authentication management client 124 obtains encrypted account data from the authentication management service 163. In box 609, the authentication management client 124 decrypts the account data based at least in part on a master security credential provided by the user. In box 612, the authentication management client 124 obtains a request to reset the security credentials in the client account data 130 (FIG. 1). Such a request may encompass a reset request, a change request, and/or a temporary change request.
In box 615, the authentication management client 124 determines whether the operation is permitted. For example, the authentication management service 163 may configure the authentication management client 124 such that only the first client 103 registered for a particular authentication management account with the authentication management service 163 is permitted to perform certain operations, such as resetting the credentials and/or other operations. Other clients 103 may be preauthorized by the user as well. In some cases, the user may provide a one-time password to effect the reset or change, and the authentication management service 163 may enforce the one-time password. Also, in some cases, the authentication management client 124 may present one or more static knowledge-based questions 172 (FIG. 1) to the user to verify the identity of the user. The determination as to whether the operation is permitted may be made by the authentication management service 163.
If the operation is not permitted, the authentication management client 124 moves to box 618 and generates an error. Thereafter, the portion of the authentication management client 124 ends. Otherwise, the authentication management client 124 proceeds to box 621 and resets or changes each one of the security credentials for the accounts of the user in the client account data 130.
In some cases, the authentication management client 124 may establish a single temporary password in place of the automatically generated credentials. The authentication management client 124 may configure an expiration for the temporary password, where the security credentials are regenerated and reset for each of the accounts of the user after the expiration. In box 624, the authentication management client 124 synchronizes the client account data 130 with the server account data 166 (FIG. 1). Thereafter, the portion of the authentication management client 124 ends.
Transitioning to FIG. 6B, shown is a flowchart that provides one example of the operation of yet another portion of the authentication management client 124 according to various embodiments. In particular, FIG. 6B relates to resetting security credentials in response to a server-originated request. It is understood that the flowchart of FIG. 6B provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication management client 124 as described herein. As an alternative, the flowchart of FIG. 6B may be viewed as depicting an example of steps of a method implemented in the client 103 (FIG. 1) according to one or more embodiments.
Beginning with box 633, the authentication management client 124 authenticates a user to the authentication management service 163 (FIG. 1) in response to the user providing some security credential. In box 636, the authentication management client 124 obtains encrypted account data from the authentication management service 163. In box 639, the authentication management client 124 decrypts the account data based at least in part on a master security credential provided by the user. In box 642, the authentication management client 124 obtains a request to reset the security credentials from the authentication management service 163. Such a request may be one-time or periodic in nature.
The authentication management client 124 proceeds to box 651 and resets or changes each one of the security credentials for the accounts of the user in the client account data 130. In some cases, the authentication management client 124 may establish a single temporary password in place of the automatically generated credentials. The authentication management client 124 may configure an expiration for the temporary password, where the security credentials are regenerated and reset for each of the accounts of the user after the expiration. In box 654, the authentication management client 124 synchronizes the client account data 130 with the server account data 166 (FIG. 1). Thereafter, the portion of the authentication management client 124 ends.
Referring next to FIG. 7, shown is a flowchart that provides one example of the operation of a portion of the authentication endpoint 139 according to various embodiments. It is understood that the flowchart of FIG. 7 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication endpoint 139 as described herein. As an alternative, the flowchart of FIG. 7 may be viewed as depicting an example of steps of a method implemented in the computing device 106 (FIG. 1) according to one or more embodiments.
Beginning with box 703, the authentication endpoint 139 obtains an authentication request from an authentication management client 124 (FIG. 1). The authentication request may be obtained by way of an authentication protocol supported by multiple authentication management clients 124 having different affinities for authentication management services 163 (FIG. 1). For example, an authentication management client 124 may be distributed by a provider of an authentication management service 163, and the authentication management client 124 may have an affinity for the particular authentication management service 163. As another example, the authentication management client 124 may be distributed by a third party but may still have an affinity for a particular authentication management service 163 or a set of a plurality of authentication management services 163.
In box 706, the authentication endpoint 139 determines the affinity of authentication management client 124 from the request. For example, the authentication endpoint 139 may determine the affinity of the authentication management client 124 according to an identifier in a user agent string. It may be the case that the authentication endpoint 139 supports some authentication management clients 124 but not others. Similarly, the account creation endpoint 138 (FIG. 1) may support some authentication management clients 124 but not others.
In box 709, the authentication endpoint 139 determines whether the particular authentication management client 124 is supported. If the authentication management client 124 is not supported, the authentication endpoint 139 moves to box 712 and denies the authentication request. Thereafter, the portion of the authentication endpoint 139 ends. If the authentication management client 124 is supported, the authentication endpoint 139 moves from box 709 to box 715.
In box 715, the authentication endpoint 139 obtains a security credential from the authentication management client 124. In box 718, the authentication endpoint 139 determines whether the credential is valid. If the credential is not valid, the authentication endpoint 139 moves to box 712 and denies authentication request. Thereafter, the portion of the authentication endpoint 139 ends.
In box 721, the authentication endpoint 139 creates a session for the user in response to the successful authentication. To this end, the authentication endpoint 139 may set one or more session cookies with a session token and/or perform other actions. In addition, the authentication endpoint 139 may send branded experience data (such as, for example, logos, graphics, text, etc.) to the authentication management client 124. The authentication management client 124 may be configured to customize a user interface in the client 103 (FIG. 1) for an identity provider associated with the authentication endpoint 139 based at least in part on the branded experience data. The branded experience data may include, for example, a logo for a network site 140 or identity provider, a link to a privacy policy, a link for terms of use, and/or other information.
In box 724, the authentication endpoint 139 determines whether the security credential employed by the authentication management client 124 is to be changed. Such a change may be prompted by a manual change request from the user or by expiration of a predefined change interval in the authentication endpoint 139 or in the authentication management client 124. If the security credential is to be changed, the authentication endpoint 139 moves from box 724 to box 727 and establishes the new security credential. Such a credential may be generated by the authentication endpoint 139 and sent to the authentication management client 124, or it may be generated by the authentication management client 124 and then sent to the authentication endpoint 139. Thereafter, the portion of the authentication endpoint 139 ends. If the security credential is not to be changed, the portion of the authentication endpoint 139 also ends.
Moving on to FIG. 8, shown is a flowchart that provides one example of the operation of a portion of the authentication management service 163 according to various embodiments. It is understood that the flowchart of FIG. 8 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the authentication management service 163 as described herein. As an alternative, the flowchart of FIG. 8 may be viewed as depicting an example of steps of a method implemented in the computing device 112 (FIG. 1) according to one or more embodiments.
Beginning with box 803, the authentication management service 163 obtains a request for account data from an authentication management client 124 (FIG. 1) at a client 103 (FIG. 1). In box 806, authentication management service 163 determines whether the request includes a valid master credential 169 (FIG. 1). If the request does not include the valid master credential 169 for the user associated with the account data, the authentication management service 163 transitions to box 809 and denies the request for the account data. Thereafter, the portion of the authentication management service 163 ends.
If the request does specify a valid master credential 169, the authentication management service 163 continues from box 806 to box 812 and determines whether the client 103 corresponds to a preauthorized client 103. For example, the authentication management service 163 may evaluate a source network address of the request, a client-identifying token presented in the request, and/or other data. If the authentication management service 163 determines that the client 103 does not correspond to a preauthorized client 103, the authentication management service 163 moves to box 813 and prompts the client 103 for a valid supplemental credential 170 (FIG. 1), such as a one-time password, an answer to a knowledge-based question, etc. If a valid supplemental credential 170 is not provided, the authentication management service 163 moves to box 809 and denies the request for the account data. Thereafter, the portion of the authentication management service 163 ends.
If a valid supplemental credential 170 is provided, the authentication management service 163 continues from box 813 to box 815. If the client 103 is instead preauthorized, the authentication management service 163 moves from box 812 to box 815. In box 815, the authentication management service 163 sends some or all of the encrypted account data from the server account data 166 (FIG. 1) to the authentication management client 124. In box 818, the authentication management service 163 may obtain updates to the encrypted account data from the authentication management client 124. If the authentication management service 163 obtains such updates, the authentication management service 163 synchronizes the server account data 166 in box 821. Thereafter, the portion of the authentication management service 163 ends.
With reference to FIG. 9, shown is a schematic block diagram of the client 103 according to an embodiment of the present disclosure. The client 103 includes at least one processor circuit, for example, having a processor 903 and a memory 906, both of which are coupled to a local interface 909. To this end, the client 103 may comprise, for example, at least one client computer or like device. The local interface 909 may comprise, for example, a data bus with an accompanying address/control bus or other bus structure as can be appreciated. The computing devices 106 and 112 may be illustrated similarly to the client 103, and the following discussion also pertains to computing devices 106 and 112.
Stored in the memory 906 are both data and several components that are executable by the processor 903. In particular, stored in the memory 906 and executable by the processor 903 are the browser 121, the authentication management client 124, and potentially other applications. Also stored in the memory 906 may be a data store 127 and other data. In addition, an operating system may be stored in the memory 906 and executable by the processor 903.
It is understood that there may be other applications that are stored in the memory 906 and are executable by the processor 903 as can be appreciated. Where any component discussed herein is implemented in the form of software, any one of a number of programming languages may be employed such as, for example, C, C++, C#, Objective C, Java®, JavaScript®, Perl, PHP, Visual Basic®, Python®, Ruby, Delphi®, Flash®, or other programming languages.
A number of software components are stored in the memory 906 and are executable by the processor 903. In this respect, the term “executable” means a program file that is in a form that can ultimately be run by the processor 903. Examples of executable programs may be, for example, a compiled program that can be translated into machine code in a format that can be loaded into a random access portion of the memory 906 and run by the processor 903, source code that may be expressed in proper format such as object code that is capable of being loaded into a random access portion of the memory 906 and executed by the processor 903, or source code that may be interpreted by another executable program to generate instructions in a random access portion of the memory 906 to be executed by the processor 903, etc. An executable program may be stored in any portion or component of the memory 906 including, for example, random access memory (RAM), read-only memory (ROM), hard drive, solid-state drive, USB flash drive, memory card, optical disc such as compact disc (CD) or digital versatile disc (DVD), floppy disk, magnetic tape, or other memory components.
The memory 906 is defined herein as including both volatile and nonvolatile memory and data storage components. Volatile components are those that do not retain data values upon loss of power. Nonvolatile components are those that retain data upon a loss of power. Thus, the memory 906 may comprise, for example, random access memory (RAM), read-only memory (ROM), hard disk drives, solid-state drives, USB flash drives, memory cards accessed via a memory card reader, floppy disks accessed via an associated floppy disk drive, optical discs accessed via an optical disc drive, magnetic tapes accessed via an appropriate tape drive, and/or other memory components, or a combination of any two or more of these memory components. In addition, the RAM may comprise, for example, static random access memory (SRAM), dynamic random access memory (DRAM), or magnetic random access memory (MRAM) and other such devices. The ROM may comprise, for example, a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other like memory device.
Also, the processor 903 may represent multiple processors 903 and the memory 906 may represent multiple memories 906 that operate in parallel processing circuits, respectively. In such a case, the local interface 909 may be an appropriate network that facilitates communication between any two of the multiple processors 903, between any processor 903 and any of the memories 906, or between any two of the memories 906, etc. The local interface 909 may comprise additional systems designed to coordinate this communication, including, for example, performing load balancing. The processor 903 may be of electrical or of some other available construction.
Although the browser 121, the authentication management client 124, the network page server 136 (FIG. 1), the authentication service 137 (FIG. 1), the authentication management service 163 (FIG. 1), and other various systems described herein may be embodied in software or code executed by general purpose hardware as discussed above, as an alternative the same may also be embodied in dedicated hardware or a combination of software/general purpose hardware and dedicated hardware. If embodied in dedicated hardware, each can be implemented as a circuit or state machine that employs any one of or a combination of a number of technologies. These technologies may include, but are not limited to, discrete logic circuits having logic gates for implementing various logic functions upon an application of one or more data signals, application specific integrated circuits having appropriate logic gates, or other components, etc. Such technologies are generally well known by those skilled in the art and, consequently, are not described in detail herein.
The flowcharts of FIGS. 3-8 show the functionality and operation of an implementation of portions of the authentication management client 124, the authentication endpoint 139 (FIG. 1), and the authentication management service 163. If embodied in software, each block may represent a module, segment, or portion of code that comprises program instructions to implement the specified logical function(s). The program instructions may be embodied in the form of source code that comprises human-readable statements written in a programming language or machine code that comprises numerical instructions recognizable by a suitable execution system such as a processor 903 in a computer system or other system. The machine code may be converted from the source code, etc. If embodied in hardware, each block may represent a circuit or a number of interconnected circuits to implement the specified logical function(s).
Although the flowcharts of FIGS. 3-8 show a specific order of execution, it is understood that the order of execution may differ from that which is depicted. For example, the order of execution of two or more blocks may be scrambled relative to the order shown. Also, two or more blocks shown in succession in FIGS. 3-8 may be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the blocks shown in FIGS. 3-8 may be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure.
Also, any logic or application described herein, including the browser 121, the authentication management client 124, the network page server 136, the authentication service 137, and the authentication management service 163, that comprises software or code can be embodied in any non-transitory computer-readable medium for use by or in connection with an instruction execution system such as, for example, a processor 903 in a computer system or other system. In this sense, the logic may comprise, for example, statements including instructions and declarations that can be fetched from the computer-readable medium and executed by the instruction execution system. In the context of the present disclosure, a “computer-readable medium” can be any medium that can contain, store, or maintain the logic or application described herein for use by or in connection with the instruction execution system.
The computer-readable medium can comprise any one of many physical media such as, for example, magnetic, optical, or semiconductor media. More specific examples of a suitable computer-readable medium would include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium may be a random access memory (RAM) including, for example, static random access memory (SRAM) and dynamic random access memory (DRAM), or magnetic random access memory (MRAM). In addition, the computer-readable medium may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other type of memory device.
It should be emphasized that the above-described embodiments of the present disclosure are merely possible examples of implementations set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiment(s) without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.
Therefore, the following is claimed:
1. A non-transitory computer-readable medium embodying at least one program executable in a computing device, the at least one program comprising:
code that maintains a plurality of accounts of a user for a plurality of network sites;
code that determines that a secured resource of a network site is to be accessed by the computing device;
code that identifies a plurality of the accounts which are accepted by the network site for authentication to the secured resource based at least in part on a domain name of the network site and a listing of supported third-party authentication providers obtained from the network site;
code that renders for display a user interface configured to obtain a user selection of one of the plurality of the accounts;
code that stores the user selection of the one of the plurality of the accounts in association with the domain name of the network site; and
code that automatically authenticates with the network site using a security credential associated with the one of the plurality of the accounts that is selected by the user selection.
2. The non-transitory computer-readable medium of claim 1, wherein at least one of the plurality of the accounts is associated with a plurality of the network sites.
3. The non-transitory computer-readable medium of claim 1, wherein the code that identifies the plurality of the accounts further comprises code that compares a second-level portion of the domain name with a second-level portion of a different stored domain name.
4. A system, comprising:
a computing device; and
an authentication management client application executable in the computing device, the authentication management client application comprising:
logic that maintains a plurality of accounts of a user for a plurality of network sites;
logic that determines that a secured resource of a network site is to be accessed by the computing device;
logic that identifies one of the accounts according to a domain name of the network site, the one of the accounts being associated with a different network site having a different domain name from the domain name; and
logic that automatically authenticates with the network site using a security credential associated with the one of the accounts.
5. The system of claim 4, wherein the logic that identifies the one of the accounts further comprises:
logic that sends an account identification request to an authentication management service, the account identification request including the domain name of the network site; and
logic that obtains an account identification from the authentication management service in response to the account identification request, the account identification specifying the one of the accounts.
6. The system of claim 4, wherein the different domain name of the different network site includes a portion in common with the domain name, and the portion in common excludes a first-level domain name.
7. The system of claim 4, wherein the network site is an affiliate of the different network site.
8. The system of claim 4, wherein the logic that automatically authenticates with the network site is further configured to obtain a consent indication from the user before automatically authenticating with the network site.
9. The system of claim 8, wherein the consent indication is previously stored by the user.
10. The system of claim 4, wherein the logic that identifies the one of the accounts is further configured to identify the one of the accounts according to a second-level domain name of the network site.
11. The system of claim 4, wherein the authentication management client application further comprises:
logic that determines that another secured resource of another network site is to be accessed by the computing device;
logic that identifies the one of the accounts according to another domain name of the other network site; and
logic that automatically authenticates with the other network site using the security credential associated with the one of the accounts.
12. The system of claim 11, wherein the domain name and the other domain name each have a same second-level domain name and a different first-level domain name.
13. The system of claim 4, wherein the logic that identifies the one of the accounts further comprises:
logic that identifies a plurality of the accounts according to the domain name of the network site;
logic that generates a user interface configured to obtain a user selection of one of the plurality of the accounts; and
logic that identifies the one of the accounts according to the user selection.
logic that identifies a plurality of the accounts according to the domain name of the network site; and
logic that identifies the one of the accounts out of the plurality of the accounts according to a stored user preference.
15. A method, comprising the steps of:
maintaining, in a computing device, a plurality of accounts of a user for a plurality of network sites;
determining, in the computing device, that a secured resource of a network site is to be accessed by the computing device;
determining, in the computing device, a plurality of the accounts which are accepted by the network site for authentication to the secured resource;
selecting, in the computing device, one of the plurality of the accounts for authentication to the secured resource; and
automatically authenticating, in the computing device, with the network site using a security credential associated with the one of the plurality of the accounts that is selected.
16. The method of claim 15, wherein the selecting step further comprises the steps of:
rendering for display, in the computing device, a user interface configured to obtain a user selection of the one of the plurality of the accounts; and
obtaining, in the computing device, the user selection.
17. The method of claim 15, wherein the selecting step further comprises the step of selecting, in the computing device, the one of the plurality of accounts according to a stored preference.
18. The method of claim 15, wherein at least one of the plurality of the accounts is with a third-party authentication provider.
19. The method of claim 15, wherein the step of determining, in the computing device, the plurality of the accounts which are accepted by the network site for authentication to the secured resource further comprises the step of identifying, in the computing device, the plurality of the accounts based at least in part on a domain name of the network site.
20. The method of claim 15, wherein the step of determining, in the computing device, the plurality of the accounts which are accepted by the network site for authentication to the secured resource further comprises the step of obtaining, in the computing device, a listing of a plurality of supported authentication providers from the network site.
US13/363,675 2012-02-01 2012-02-01 Presenting managed security credentials to network sites Active US8819795B2 (en)
US13/363,675 US8819795B2 (en) 2012-02-01 2012-02-01 Presenting managed security credentials to network sites
CN201710968939.0A CN107659577B (en) 2012-02-01 2013-01-30 Account management method and system for multiple websites
JP2014555667A JP6010139B2 (en) 2012-02-01 2013-01-30 Account management for a number of network sites
PCT/US2013/023818 WO2013116319A1 (en) 2012-02-01 2013-01-30 Account management for multiple network sites
CN201380018421.0A CN104364792B (en) 2012-02-01 2013-01-30 Account management system for multiple network sites
CA2861384A CA2861384C (en) 2012-02-01 2013-01-30 Account management for multiple network sites
CA2974536A CA2974536C (en) 2012-02-01 2013-01-30 Authentication management services
EP13743243.1A EP2810226B1 (en) 2012-02-01 2013-01-30 Account management for multiple network sites
IN5781/DELNP/2014A IN2014DN05781A (en) 2012-02-01 2014-07-10 Account management for multiple network sites
US13/363,675 Active US8819795B2 (en) 2012-02-01 2012-02-01 Presenting managed security credentials to network sites
US20130318585A1 (en) * 2012-05-22 2013-11-28 Canon Kabushiki Kaisha Information processing apparatus, control method thereof, storage medium, and image processing apparatus
US20140071478A1 (en) * 2012-09-10 2014-03-13 Badgepass, Inc. Cloud-based credential personalization and activation system
US20140095595A1 (en) * 2012-09-28 2014-04-03 Research In Motion Limited Device, method, and system for staging account setup
US20140137220A1 (en) * 2012-11-13 2014-05-15 F-Secure Corporation Obtaining Password Data
US9313100B1 (en) 2011-11-14 2016-04-12 Amazon Technologies, Inc. Remote browsing session management
US9330188B1 (en) 2011-12-22 2016-05-03 Amazon Technologies, Inc. Shared browsing sessions
US9374244B1 (en) * 2012-02-27 2016-06-21 Amazon Technologies, Inc. Remote browsing session management
US9544310B2 (en) 2014-01-27 2017-01-10 Microsoft Technology Licensing, Llc Discovering and disambiguating identity providers
US9607143B2 (en) 2013-06-21 2017-03-28 Amazon Technologies, Inc. Provisioning account credentials via a trusted channel
US9660982B2 (en) 2012-02-01 2017-05-23 Amazon Technologies, Inc. Reset and recovery of managed security credentials
US9674175B2 (en) 2013-03-11 2017-06-06 Amazon Technologies, Inc. Proxy server-based network site account management
US9767262B1 (en) 2011-07-29 2017-09-19 Amazon Technologies, Inc. Managing security credentials
US9864852B2 (en) 2015-07-27 2018-01-09 Amazon Technologies, Inc. Approaches for providing multi-factor authentication credentials
WO2018106743A1 (en) * 2016-12-09 2018-06-14 Microsoft Technology Licensing, Llc Integrated consent system
US10135813B2 (en) 2014-12-16 2018-11-20 Amazon Technologies, Inc. Computing device with integrated authentication token
US10237231B2 (en) 2011-09-26 2019-03-19 Verisign, Inc. Multiple provisioning object operation
US8863250B2 (en) 2012-02-01 2014-10-14 Amazon Technologies, Inc. Logout from multiple network sites
GB201409919D0 (en) * 2014-06-04 2014-07-16 Idscan Biometric Ltd System, method and program for managing a repository of authenticated personal data
US9930033B2 (en) * 2015-03-13 2018-03-27 Oath Inc. On demand passwords
CN105933120A (en) * 2016-04-06 2016-09-07 清华大学 Spark platform-based password hash value recovery method and device
US20080031447A1 (en) * 2006-08-04 2008-02-07 Frank Geshwind Systems and methods for aggregation of access to network products and services
US20080201768A1 (en) * 2005-07-08 2008-08-21 Hong-Sik Koo Method For Managing A Large Number Of Passwords, Portable Apparatus And Certification Information Storing Device Using The Same, And Certification Information Management Method Using The Same
US6182131B1 (en) 1998-07-17 2001-01-30 International Business Machines Corporation Data processing system, method, and program product for automating account creation in a network
US7441263B1 (en) 2000-03-23 2008-10-21 Citibank, N.A. System, method and computer program product for providing unified authentication services for online applications
US20020083012A1 (en) 2000-11-16 2002-06-27 Steve Bush Method and system for account management
US20050027713A1 (en) * 2003-08-01 2005-02-03 Kim Cameron Administrative reset of multiple passwords
US7797726B2 (en) * 2004-12-16 2010-09-14 International Business Machines Corporation Method and system for implementing privacy policy enforcement with a privacy proxy
US7788729B2 (en) 2005-03-04 2010-08-31 Microsoft Corporation Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm
US7552467B2 (en) * 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
US8095967B2 (en) 2006-07-27 2012-01-10 White Sky, Inc. Secure web site authentication using web site characteristics, secure user credentials and private browser
US20080146194A1 (en) 2006-12-15 2008-06-19 Yahoo! Inc. Automatic data back up and account creation
US20080168539A1 (en) * 2007-01-05 2008-07-10 Joseph Stein Methods and systems for federated identity management
US20090089883A1 (en) * 2007-09-29 2009-04-02 Sympact Technologies Llc Method and apparatus for controlling media content distribution
US8276190B1 (en) * 2008-08-19 2012-09-25 Google Inc. Cross-domain authentication
US20100178944A1 (en) 2009-01-15 2010-07-15 Nicolas Philippe Fodor Automatic Email Account Creation
US9166968B2 (en) * 2012-05-22 2015-10-20 Canon Kabushiki Kaisha Information processing apparatus, control method thereof, storage medium, and image processing apparatus
US9860222B2 (en) * 2012-09-28 2018-01-02 Blackberry Limited Device, method, and system for staging account setup
US9984215B2 (en) * 2012-11-13 2018-05-29 F-Secure Corporation Obtaining password data
Sun et al. 2012 The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
US8904477B2 (en) 2014-12-02 Configuring and providing profiles that manage execution of mobile applications
US8532620B2 (en) 2013-09-10 Trusted mobile device based security
US9053304B2 (en) 2015-06-09 Methods and systems for using derived credentials to authenticate a device across multiple platforms
US9948657B2 (en) 2018-04-17 Providing an enterprise application store
US10097350B2 (en) 2018-10-09 Privacy enhanced key management for a web service provider using a converged security engine
US8910239B2 (en) 2014-12-09 Providing virtualized private network tunnels
US9203819B2 (en) 2015-12-01 Methods and systems for pairing devices
KR101816863B1 (en) 2018-02-21 User and device authentication in enterprise systems
US8141138B2 (en) 2012-03-20 Auditing correlated events using a secure web single sign-on login
CN104094270B (en) 2017-06-30 For computing devices to protect user credentials
JP5795604B2 (en) 2015-10-14 Method and apparatus for providing a single sign-on access trusted to applications and internet-based services
US8997196B2 (en) 2015-03-31 Flexible end-point compliance and strong authentication for distributed hybrid enterprises
Li et al. 2014 The emperor’s new password manager: Security analysis of web-based password managers
CN104969231B (en) 2017-11-14 Password security challenges auxiliary agents
US20120227098A1 (en) 2012-09-06 Sharing user id between operating system and application
US9288195B2 (en) 2016-03-15 Single sign on with multiple authentication factors
JP6170158B2 (en) 2017-07-26 Mobile multi single sign-on authentication
US20140282992A1 (en) 2014-09-18 Systems and methods for securing the boot process of a device using credentials stored on an authentication token
US20150319252A1 (en) 2015-11-05 Application customization
EP1606914A4 (en) 2008-12-31 Secure object for convenient identification
EP2973166A1 (en) 2016-01-20 Systems and methods for identifying a secure application when connecting to a network
US20150244706A1 (en) 2015-08-27 Security object creation, validation, and assertion for single sign on authentication
US10013548B2 (en) 2018-07-03 System and method for integrating two-factor authentication in a device
Owner name: AMAZON TECHNOLOGIES, INC., NEVADA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HITCHCOCK, DANEIL W.;CAMPBELL, BRAD LEE;SIGNING DATES FROM 20120203 TO 20120206;REEL/FRAME:027772/0502
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)
|
cc/2019-30/en_middle_0053.json.gz/line4481
|
__label__wiki
| 0.602854
| 0.602854
|
US8224632B2 - Virtual prototyping and testing for medical device development - Google Patents
Virtual prototyping and testing for medical device development Download PDF
anatomical feature
geometric model
Robert G. Whirley
Michael V. Chobotov
TriVascular Inc
2010-10-14 Application filed by TriVascular Inc filed Critical TriVascular Inc
2012-10-12 Assigned to CAPITAL ROYALTY PARTNERS II L.P., PARALLEL INVESTMENT OPPORTUNITIES PARTNERS II L.P. reassignment CAPITAL ROYALTY PARTNERS II L.P. SHORT-FORM PATENT SECURITY AGREEMENT Assignors: TRIVASCULAR, INC.
2016-02-04 Assigned to TRIVASCULAR, INC. reassignment TRIVASCULAR, INC. RELEASE OF SECURITY INTEREST IN PATENT RIGHTS Assignors: CAPITAL ROYALTY PARTNERS II L.P., PARALLEL INVESTMENT OPPORTUNITIES PARTNERS II L.P.
2017-04-03 Assigned to DEERFIELD PRIVATE DESIGN FUND IV, L.P., AS AGENT reassignment DEERFIELD PRIVATE DESIGN FUND IV, L.P., AS AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ENDOLOGIX, INC., NELLIX, INC., TRIVASCULAR, INC.
2017-04-03 Assigned to DEERFIELD ELGX REVOLVER, LLC, AS AGENT reassignment DEERFIELD ELGX REVOLVER, LLC, AS AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ENDOLOGIX, INC., NELLIX, INC., TRIVASCULAR, INC.
2018-01-12 Assigned to TRIVASCULAR, INC., NELLIX, INC., ENDOLOGIX, INC. reassignment TRIVASCULAR, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: DEERFIELD ELGX REVOLVER, LLC, AS AGENT
G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
G06F17/50—Computer-aided design
G06G—ANALOGUE COMPUTERS
G06G7/00—Devices in which the computing operation is performed by varying electric or magnetic quantities
G06G7/48—Analogue computers for specific processes, systems or devices, e.g. simulators
G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
G09B23/00—Models for scientific, medical, or mathematical purposes, e.g. full-sized devices for demonstration purposes
G09B23/28—Models for scientific, medical, or mathematical purposes, e.g. full-sized devices for demonstration purposes for medicine
A61F2/82—Devices providing patency to, or preventing collapsing of, tubular structures of the body, e.g. stents
A system and method of developing better-designed medical devices, particularly cardiovascular stents and endovascular grafts. The system comprises a geometry generator, a mesh generator, a stress/strain/deformation analyzer, and a visualization tool. In one embodiment, the geometry generator receives three-dimensional volumetric data of an anatomical feature and generates a geometric model. The mesh generator then receives such geometric model of an anatomical feature or an in vitro model and a geometric model of a candidate medical device. In another embodiment, the mesh generator only receives a geometric model of the candidate medical device. Using the geometric model(s) received, the mesh generator creates or generates a mesh or a finite element model. The stress/strain/deformation analyzer then receives the mesh, and the material models and loads of that mesh. Using analysis, preferably non-linear analysis, the stress/strain/deformation analyzer determines the predicted stresses, strains, and deformations on the candidate medical device. Such stresses, strains, and deformations may optionally be simulated visually using a visualization tool.
RELATED PATENT APPLICATION
This patent application is a continuation and claims the benefit of U.S. patent application Ser. No. 09/679,725, filed Oct. 4, 2000 now U.S. Pat. No. 7,840,393, naming Robert G. Whirley and Michael V. Chobotov as inventors, entitled VIRTUAL PROTOTYPING AND TESTING FOR MEDICAL DEVICE DEVELOPMENT, the entirety of which is incorporated by reference herein, including all text and drawings.
This invention relates to systems and methods of developing better-designed medical devices, specifically, intracorporeal medical devices and particularly cardiovascular stents and endovascular grafts.
2. Background and Description of Related Art
Atherosclerotic vascular disease is a significant health problem facing the world population today. Atherosclerosis results in two primary types of lesions—occlusive and aneurysmal, with the aorta being the primary site of aneurysmal disease. Occlusive disease is a process in which a vessel lumen becomes narrowed and the blood flow restricted. Occlusive disease is typically associated with plaque buildup on the vessel wall or a biological response to vessel injury. One approach to treatment of occlusive disease involves placing a stent inside the vessel to act as a structural scaffold and hold open the vessel, and also possibly to provide local drug delivery or local radiation treatment. Aneurysmal disease is a process in which a vessel dilates under the influence of hemodynamic pressure, and may ultimately lead to rupture of the vessel and severe internal bleeding. One approach to treatment of aneurysmal disease involves placing a TPEG (transluminally placed endovascular graft, or “stent graft”) across the aneurysm, excluding the aneurysm from hemodynamic pressure and thereby reducing or eliminating the risk of rupture. Examples of such grafts can be found in co-pending U.S. patent application Ser. No. 09/133,978, filed Aug. 14, 1998 by Chobotov, which is hereby incorporated by reference herein in its entirety.
A TPEG is an endovascular prosthetic device that lines the interior of an artery to provide flow path integrity and structural support to the damaged or diseased blood vessel. TPEGs are sometimes called “stent grafts” because they were originally created using combinations of stents and synthetic vascular graft segments. TPEGs are delivered to a blood vessel location in a compressed state, through an incision, and are then deployed at the location of concern.
The current development process of TPEGs and medical devices generally, usually involves the reiterative and sequential steps of designing, fabricating the prototype, and testing the prototype until the required performance specifications are met. Fabrication of the prototype entails the building of the actual medical device, e.g., a TPEG. Testing can involve animal testings, human clinical trials, stress, strain, and deformation testing, and the like. Stents, TPEGs and other medical devices have suffered from long development times and from design deficiencies discovered late in the development and testing process. Thus, the development of improved medical devices could be significantly accelerated if design deficiencies could be identified earlier, before committing to lengthy laboratory testing, animal studies, and human clinical trials. A system that enables early evaluation of many aspects of device performance in vivo, and is applicable to development of stents for occlusive disease, TPEGs for aneurysmal disease, and other medical devices is highly desirable.
In designing a TPEG, several factors must be taken into account, such as the structural integrity of the TPEG, the prevention of perigraft leaks, the need for a more easily-controlled TPEG deployment to allow a more precise positioning of the TPEG, the kink resistance of the TPEG, the morphology of the arterial walls, the relatively large size and lack of TPEG flexibility in the undeployed configuration (which can create difficulties in passing the TPEG from its insertion site to its deployment site), and the like. In vivo boundary conditions and forces, particularly dynamic or static cyclic in vivo forces, and the material properties of a TPEG are also important factors. Taking these factors into consideration during virtual testing and development of a medical device generates a more accurate assessment of the maximum stresses, strains, and deformations, over time that may potentially be handled by a medical device such as a TPEG.
In designing a stent, several factors must be considered including radial force, crush resistance, flexibility (in both the compressed and the deployed configurations), fatigue life, and tissue intrusion through open stent cells. A system that allows rapid evaluation of these and other characteristics of a stent design before hardware prototypes are constructed, thereby reducing the cost and time required for development and also expanding the designer's capability to explore more exotic designs and possibly discover new and more advantageous stent designs within a given budget and timeframe is highly desirable.
Thus, systems and methods which allow accurate virtual testing of a medical device design with respect to one or more of the above noted factors, in addition to other factors not specifically enumerated, without the need for an actual prototype of the design, are needed. Such systems and methods can reduce the cost of medical device development and increase the safety and efficacy of the designs.
The invention provides a system and method for developing better-designed medical devices and particularly cardiovascular stents and endovascular grafts. The system comprises a Geometry Generator, a Mesh Generator, a Stress/Strain/Deformation Analyzer, and, optionally, a Visualization tool. The invention may obtain anatomic data from 3D volumetric data. In other embodiments, the invention utilizes an idealized anatomical feature, an in vitro model, or no anatomical feature at all.
In one embodiment, the Geometry Generator receives three-dimensional volumetric data of an anatomical feature and accordingly extracts the surface points of such data, which in turn is received by the Mesh Generator. In another embodiment, the Geometry Generator based on algorithms available in such Geometry Generator software generates an output that is directly received by the Mesh Generator. Using the output generated by the Geometry generator and the geometric model of a candidate medical device, the Mesh Generator generates a mesh or a finite element model incorporating either the anatomical feature or in vitro model and candidate medical device. In an embodiment where no anatomical feature is used, a mesh only incorporating the candidate medical device is generated. The Stress/Strain/Deformation Analyzer then receives the mesh and the material models, the loads and/or displacements placed on the anatomical feature or in vitro model, if applicable, and the candidate medical device. Using stress and strain deformation analysis, particularly non-linear analysis, the Stress/Strain/Deformation Analyzer simulates and analyzes the potential in vivo stresses, strains, and deformations or motions of the candidate medical device. Such strains, stresses, and deformations may optionally be displayed using a Visualization tool.
Various embodiments of the invention can be used to provide a variety of useful functions and capabilities to those who design, manufacture and use medical devices. Specifically, embodiments of the invention may be used to model anatomical features or anatomical environments dynamically. As a result, a computer generated model of a medical device, or the like, may be virtually placed or deployed within the anatomical model to measure the response of the device to the environment. The dynamics of the computer generated model of the anatomical features or environment can be accelerated dramatically such that large numbers of normal biological cycle, such as a heartbeat, can be imposed upon the computer generated medical device model in a relatively short period of time.
This gives medical device designers the ability to virtually test a proposed design in a short period of time relative to the time it would take for a similar number of dynamic biological cycles in vivo. Thus, the iterative process of device design and testing of designs is accelerated and improvements in medical device technology can be achieved at a quicker rate. Further, embodiments of the invention can be used to vary and test material properties of medical device components over a broad range in a short period of time using the non-linear modeling capabilities of the embodiments. This capability can be used to select materials having optimal properties for producing the safest and most efficacious designs within a given set of design parameters.
Another benefit of embodiments of the invention is directed to varying material and configuration properties of models of anatomical features such that a simulation of testing of a given device could be performed in a large number of patients, as might be carried out in a large scale clinical trial. If the statistical variation of tissue parameters of a given anatomical feature is known for a given patient population, a medical device model could be tested in anatomical models which vary over such a given range. In this way, a large scale clinical trial could be modeled with embodiments of the invention, at least as to certain performance parameters, without the need for large numbers of actual patients being subjected to clinical testing. The data generated from such a clinical trial modeling exercise could be used to produce or refine the design of a medical device such that it performs optimally over a broad range of anatomical environments. The design could be refined using such data to improve robustness and adaptability of the medical device design.
Also, it is possible to use embodiments of the invention to identify failure modes of given medical device designs when such designs are subjected to dynamic mechanical and chemical forces. By identifying the cause of failure in a design, the “weak link” in the design can be pinpointed and necessary corrections to materials or configuration made in order to obviate the problem. It is also possible to test theories of failure experienced during in vivo clinical testing using embodiments of the invention. In other words, if an in vivo clinical failure of a medical device should occur, there may be one or more theories postulated as to the cause of the failure, particularly in a situation where multiple components of a device have failed and it is not clear from the clinical data which failure occurred first, or if an initial failure of one component of the device precipitated subsequent failure of other components of the device. The dynamic modeling capabilities of embodiments of the invention can allow rapid testing of multiple theories as to the timing and causation of complex failure modes and quickly determine which of the postulated theories is correct.
In addition, the dynamic, non-linear analysis modeling capabilities of embodiments of the invention allow a physician, who is responsible for use or implementation of a medical device, to more accurately choose a proper size or type of medical device based on a specific patient's anatomy. Such is the case when a specific patient's anatomy or anatomical feature is substantially duplicated by a computer model of an embodiment of the invention generated from 3-D volumetric image data, or the like. A large number of sizes or types of virtual medical devices can then be placed and tested within the patient's specific anatomical feature to determine optimum safety and efficacy of the design choice.
FIG. 1 illustrates a block diagram representation of a virtual prototyping system having features of the present invention.
FIG. 2 illustrates a block diagram showing data received by an embodiment of a Geometry Generator and a Mesh Generator in accordance with the present invention.
FIG. 3 illustrates a block diagram representation of another embodiment of a system of the present invention.
FIG. 4 illustrates a block diagram showing data received by a Stress/Strain/Deformation Analyzer.
FIGS. 5A-5M contain an exemplary text of a command file that is read by a Mesh Generator, such as TRUEGRID, to conduct a component-level analysis of a stent, without the option for simulating deployment into CT-based anatomy.
FIGS. 6A-6F contain an exemplary text of a command file read by TRUEGRID for a simulated TPEG graft deployment in a proximal aortic neck to generate a mesh incorporating both an anatomical feature and medical device and to output files that are read by a Stress/Strain/Deformation Analyzer.
FIGS. 7A-7C contain an exemplary include file used by the command file listed in FIGS. 6A-6F.
FIGS. 8A-8L contain another exemplary command file read by TRUEGRID used in the virtual prototyping system of the present invention for simulating stent deployment into an anatomy from CT data, as opposed to a stent graft deployment.
FIGS. 9A and 9B illustrate a process to develop better-designed medical devices, particularly TPEGs, in accordance with an embodiment of the present invention using 3D volumetric data.
FIG. 10 illustrates a process to develop better-designed medical devices using in vitro anatomical features.
FIG. 11 illustrates the use of an embodiment of the present invention as a physician preprocedure planning tool.
FIG. 12 contains a representation of one simulation display of a cutaway lateral view of a vascular stent in the infrarenal aorta just proximal to an abdominal aneurysm.
FIG. 13 is a block diagram representation of one of the computers illustrated in FIG. 1.
The following detailed description illustrates an embodiment of the invention by way of example, not by way of limitation of the principles of the invention. Various embodiments of the invention will be described by way of illustration with reference to various software tools, but it should be understood that other software tools that have a comparable capabilities of the mentioned tools may be used and other medical device aside from TPEGs may also be developed using this invention. In addition, although the invention is discussed in the context of prosthesis and specifically endovascular grafts, this is in no way meant to limit the scope of the invention.
Systems and methods of embodiments of the invention are suitable for the development and testing of medical devices including those for therapeutic, diagnostic, monitoring and the like purposes. In general, any device that interacts inside a patient's body may be better developed and tested with the systems and methods of embodiments of the present invention.
Embodiments of the present invention are also well suited for development and testing of intracorporeal devices or prosthesis that generally have an acute interaction with anatomical features of a patent. A list of such devices, which is in no way exhaustive, could include endovascular grafts, stents, pacemakers, artificial joints, artificial tendons, heart valves, artificial limbs, orthopedic hardware, surgical equipment such as sutures, staples, etc., and the like.
Embodiments of the present inventions are particularly well suited for the development and testing of devices for use in the vascular system or other bodily systems that have stresses, strains, and deformations which are dynamic, or quasi-static, and cyclic in nature, e.g., the rhythmic pulsing of the arterial system resulting from variations in blood pressure from the patent's beating heart and the resulting cyclic dynamic or quasi-static stresses, strains, and deformations these variations impart on the patient's arteries and medical devices disposed therein or thereon.
Embodiments of the present invention are also suitable for development and testing of interventional medical devices, which have only transient or temporary contact with the anatomical features of a patient. Illustrative examples of such devices can include catheters, balloons, atherectomy devices, guidewires, and the like.
FIG. 1 is a block diagram showing one embodiment of a virtual prototyping system 105 for analyzing the use of a medical device constructed in accordance with an embodiment of the present invention. FIG. 1 shows that a Geometry Generator 120 receives CT scan or MRI Data 110 as input. The Geometry Generator 120 then processes the CT scan or MRI data and outputs data, which are then received by the Mesh Generator 130 as input. The Mesh Generator, in addition to receiving the output of the Geometry Generator 120, also receives a Medical Device Model data 140 as input. The Medical Device Model 140 contains the geometry (geometric shape or geometric model) of the candidate medical device. Such model may be the complete candidate, a portion, or an element of the candidate medical device. Similarly, a portion or an element of the anatomical features, not the entire anatomy scanned, may be received by the Mesh Generator 130. The Medical Device Model may be created by a computer-aided-design (CAD) software application and stored as a CAD data file. Examples of suitable CAD software packages include I-DEAS (available from SDRC, Inc. of Milford, Ohio) and CATIA (available from International Business Machines Corporation), however, any other suitable application could be used. The Medical Device Model could also, for example, be created through contact or non-contact three dimensional measurement/imaging of a physical device or model. In another embodiment, the medical device model 140 is created within the Mesh Generator 130 module itself.
In addition, although the embodiment of FIG. 1 contemplates the use of CT or MRI volumetric data 110 as input, volumetric input could also be generated from any other suitable source, including other imaging system sources such as ultrasound imaging systems, beta scan imaging, radionuclide scanning, thermography and the like. Anatomical volumetric input data could also be artificially fabricated from idealized versions of anatomical features, which may be initially obtained from CT-data and modified, or be created manually by modeling such idealized version. These could be created to test medical devices within anatomical features having specified characteristics. For example, it may be desirable to test a medical device in an aorta having two distended sections caused by aortic aneurysms, which are separated by a non-distended portion of the aorta. Input data representing such an anatomical feature could be generated by manually entering data known to wholly represent such an anatomical feature. Alternatively, input data representing such an anatomical feature could be constructed by manually entering data corresponding to portions of CT, MRI or other imaging created data of actual patient aortas.
The output of the Mesh Generator 130 is then received by the Stress/Strain/Deformation Analyzer 160. The Stress/Strain/Deformation Analyzer 160 also receives Materials Model data 170 and Load data 150 as input, which may also be outputs of the Mesh Generator 130. The output of the Stress/Strain/Deformation Analyzer 160 comprises the medical device performance data for evaluation, which may then be received by the Visualization tool 180 as input. The Visualization tool 180 in turn displays, through animation or visual representations, the predicted stresses, strains, and deformations on the candidate prosthesis “virtually in vivo.”
In an embodiment of the invention, the Geometry Generator 120 is a custom-developed software tool or the MIMICS software from Materialise NV (with offices in Ann Arbor, Mich., USA); the Mesh Generator 130 is TRUEGRID® of XYZ Scientific Applications, Inc. (Livermore, Calif., USA); the Stress/Strain/Deformation Analyzer 160 is a modified version of NIKE3D or DYNA3D available from Lawrence Livermore National Laboratory (LLNL); and the Visualization tool 180 is the GRIZ visualization software, also developed by LLNL.
The unique combination of tools, data, and processing techniques as described herein in conjunction with the preferred embodiment provides a more accurate in vitro representation of anticipated in vivo forces exerted on medical devices and thereby reduces cost and time in the fabrication and testing of prototypes.
The various systems or components 120, 130, 160, 180, inputs (e.g., via files), and outputs (e.g., via files) of the present invention may be contained in one or in a plurality of computers. Thus, the Geometry Generator may be contained in one computer, while the Stress/Strain/Deformation Analyzer and the Visualization tool are run and contained in a separate computer. Furthermore, the inputs need not directly be received by the receiving system, e.g., through a network transmission. The outputs for example, of the Geometry Generator may be stored in a floppy disk and read by a Mesh Generator via that floppy disk.
FIG. 2 shows the data flow for an embodiment of a Geometry Generator 120 of FIG. 1 in detail. The Geometry Generator 120 receives as input the CT scan, MRI data, or other three-dimensional (3D) volumetric data 110. It is preferred that data from CT scans or MRIs be used in this invention because they provide a 3D volumetric representation of patient anatomy and blood vessel morphology, including complex atherosclerotic plaque distribution within the flow lumen. This type of data thus provides an accurate representation, for example, of the environment on which a medical device, for example, a TPEG will be placed. The CT and MRI equipment that is used to capture such 3D volumetric data are those that are readily available.
Certain researchers and scientists in the biological sciences have at their disposal a wealth of voxel data A voxel is the unit of CT or MRI reconstructions, represented as a pixel in the display of the CT scan or MRI. Well-established methods to extract triangular surface representations (hereinafter referred to “surface points”) from these voxel data using criteria such as variation in density are available. An embodiment of the Geometry Generator 120 first extracts the surface points, at step 220, from the CT scan or the MRI image data (e.g., segmentation, contour based, or 3D approach). A CAD software is then used to generate the Geometric Model 230 of the anatomy scanned using the extracted surface points. The extraction of surface points can be implemented by writing a software program that implements the techniques stated above or by available software programs. An example of a software program that generates surface points based on CT scan or MRI data is PREVIEW from Medical Media Systems.
The output of the Geometry Generator 120 is in the form of an Anatomy Model 240, which contains the geometric model of the anatomy scanned. The Anatomy Model 240 and the Medical Device Model 140 (containing the geometric model of the candidate medical device) are then received by the Mesh Generator 130 as input (usually as CAD files). The anatomy model may be a portion or an element of the anatomy scanned. Similarly, the medical device model may be a portion or of an element of the candidate medical device. This is useful for analyzing the interaction between a portion of a candidate device, such as a proximal stent in a TPEG, and a certain anatomical feature, such as tissue. The Mesh Generator 130 then generates a finite element model incorporating both the anatomy model, whether idealized or actual, and the medical device model as represented by box 250.
In one embodiment, the geometric models of the anatomy and the medical device are created using CAD software. Generally, the geometric models are stored in the Initial Graphics Exchange Specification (IGES) format that is an industry-standard graphic file format for CAD systems. Because of its wide-use, many FEA software tools read and utilize the IGES format. In another embodiment, the geometric models are created directly in the Mesh Generator.
The Mesh Generator 130 in accordance with an embodiment of the invention is TRUEGRID®. TRUEGRID is a 3-D finite modeling and analysis tool that generates meshes or finite element models. It is a software that tessellates a geometric model into hexahedron brick elements and quadrilateral shell elements, creating a mesh or a grid. A FEA mesh generating tool, such as TRUEGRID, uses the anatomy model 240 and medical device model 140 created by a CAD software to generate a mesh. In another embodiment of a Geometry Generator 120 (not shown in the figures), the Geometry Generator is a software tool that interfaces between scanner data, such as CT, MRI, and technical scanner data, and Rapid Prototyping, CAD, or Finite Element analysis data. Such software tools typically generate surface points from such scanner data, which are then converted into STL (stereolithography), slice files, and/or IGES files, which may then be read by the Mesh Generator 130 as input. An example of such a Geometry Generator 120 is the “Materialise Interactive Medical Image Control System” (MIMICS) available from Materialise, referred to above. The output of the MIMICS program, for example, may be directly read and processed by the Mesh Generator 130. Thus, steps 220 and 230, illustrated in FIG. 2, are not necessarily implemented by this alternative embodiment of the Geometry Generator 120.
FIG. 3 is a block diagram showing another embodiment of a virtual prototyping system 105. FIG. 3 is similar to FIG. 1, except that the anatomical feature is not obtained from a 3D volumetric data, such as a CT scan. Rather, an in vitro model of the anatomical feature is presented for analysis. For example, instead of a CT-scan artery, the system analyzes the stresses, strains, and deformations of a medical device deployed in a latex tube, which represents the artery or the in vitro model. Such in vitro model may be a CAD file that is read by the Mesh Generator 130 or in another embodiment created within the Mesh Generator itself. Alternatively, an idealized anatomical feature may be created through this embodiment. In another embodiment of the invention, not shown in the figure, the system may do a component or element analysis of a proposed medical device, without the incorporation of either an anatomical feature or in vitro model.
FIG. 4 is a block diagram showing in detail the data flow of the Stress/Strain/Deformation Analyzer 160, which preferably is a non-linear finite element modeling software application such as DYNA3D or NIKE3D. The Stress/Strain/Deformation Analyzer receives a mesh incorporating both the medical device and the anatomy scanned (idealized or actual), a mesh incorporating both the medical device and in vitro model, or a mesh incorporating just the medical device model 250. A portion of the medical device, in vitro model, or the anatomy scanned may be used. The Stress/Strain/Deformation Analyzer 160 also receives the Materials Model 170, and the Load 150 on the applicable structures (e.g., TPEG and artery or just on the medical device) to generate an output used by the Visualization tool 180. In the preferred embodiment, the Materials Model 170 and the Load 150 are read by TRUEGRID through a command file (further discussed below). Thus, the outputs of TRUEGRID (the Mesh Generator) do not only include the finite element model 250 of the mesh incorporating both medical device and anatomy scanned, mesh incorporating both medical device and in vitro model, or a mesh containing only the medical device, but the materials model 170 parameters as well as load 150 information. This reduces the number of code changes, if necessary, within DYNA3D or NIKE3D, or the manual entry of input values to be read by DYNA3D or NIKE3D.
DYNA3D is a general-purpose, explicit, three dimensional, finite element program for analyzing and simulating the large deformation dynamic response of inelastic solids and structures. DYNA3D and NIKE3D implement a number of material models, for example, including elastic, orthotropic elastic, and kinematics/isotropic plasticity. NIKE3D is a general-purpose nonlinear implicit, three-dimensional, finite element program for analyzing and simulating the finite strain and static and dynamic response of inelastic solids, shells, and beams.
FEA Stress/Strain/Deformation Analyzers, such as DYNA3D and NIKE3D, are capable of analyzing and simulating sliding interfaces, body force loads due to base acceleration, body force loads due to spinning (geometry-dependent), concentrated nodal loads, pressure boundary conditions (geometry-dependent), and displacement boundary conditions.
The Materials Model 170 is the numerical representation of the material characteristics of the medical device, the anatomy, and/or the in vitro model being analyzed. Loads include pressures, displacement, forces, and deformations. Using the mesh 250, the Materials Model 170, and the Load 150, the Stress/Strain/Deformation Analyzer 160 then analyzes and simulates the non-linear stress, strain, and deformation over time such as on a medical device (e.g., a TPEG and the arterial wall). The Stress/Strain/Deformation Analyzer in accordance with an embodiment of the present invention utilizes non-linear analysis (e.g., using non-linear formulas) or linear analysis to simulate and to analyze the non-linear static or dynamic behavior in the structure.
In FIG. 4, the Materials Model 170 is directly received by the Stress/Strain/Deformation Analyzer 160. Another way to have the materials model be received by the Stress/Strain/Deformation Analyzer 160 is by modifying the source code of DYNA3D and NIKE3D, e.g., by hard-coding the materials model into the source code itself. Similarly, if the source code of the geometry generator, Mesh Generator, Stress/Strain/Deformation Analyzer, and/or Visualization tool are available, inputs as shown may be incorporated, for example, by actually hard-coding the input parameters into the source code or by changing certain equations in the code itself.
Once the Stress/Strain/Deformation Analyzer 160 has analyzed the stresses, strains, and deformations on the medical device, the Visualization module 180 (in FIG. 1) can then receive the output of the Stress/Strain/Deformation Analyzer to visually display the resulting stresses, strains, and deformations 190.
Generally, the numerical output of the Stress/Strain/Deformation Analyzer 160 may also be analyzed to determine the stresses, strains, deformations on the medical device without using the Visualization tool 180. Using the Visualization tool 180, however, facilitates such determination because the stresses, strains, and deformations are shown via a graphical and visual display. A virtual prototyping or simulation of a medical device design, rather than plain numerical output data, is thus produced.
In an embodiment, the Visualization tool 180 is provided by the above-referenced GRIZ software application. GRIZ is an interactive software for visualizing FEA results on three-dimensional unstructured grids, and calculates and displays derived variables from FEA software tools such as DYNA3D, NIKE3D, and TOPAZ3D (also developed by LLNL). GRIZ provides display control of the mesh materials on an individual basis, allowing the user to concentrate on the analysis and visually focus on important subsets of the mesh, and provides the ability to animate the representation over time.
GRIZ uses the Silicon Graphic Inc. (SGI) Graphics Library (GL) or Open GL for rendering and the “Motif widget” toolkit for its user interface. In order to compile and run GRIZ, both of these libraries are required. GRIZ can be used on SGI workstations as well as on SUN and other workstations using commercial GL emulation software.
Considering the visual result on the screen display 190, a user may then compare the candidate medical device as designed against selected performance requirements. If the selected design meets the performance requirements, then a prototype of the selected medical device design may be built and tested. In addition, the visual result on the screen display 190 can be used by a physician to aid in the selection of various versions (e.g., sizes) of a given medical device design. For example, prior to a procedure for placement of a TPEG in a patient's aorta, the physician may first virtually test the performance of various TPEG designs or various versions of a single TPEG design prior to the procedure. To accomplish this, the physician would obtain volumetric data from the patient's aorta by any of the various methods discussed above and input that data into an embodiment of a system 105 (in FIG. 1) for analyzing the use of a medical device. The same or similar type of volumetric and materials data for a version of TPEG design to be tested is also loaded into the system 105. Note that it may be possible to load volumetric data from several anatomical features and versions of TPEG designs to be analyzed at one time, and then for the physician to choose which two to test together at a later time. Once the input data is loaded into the system 105, the visual result of the analysis of the Stress/Strain/Deformation Analyzer 160 is viewed by the physician on the screen display 190 and based on those results, the physician determines whether the TPEG version tested meets, exceeds, or falls short of the clinical requirements of the patient.
If the version of the TPEG which was virtually tested by the system 105 falls short of the clinical requirements of the patient, another version may be tested and so on until an appropriate design is identified. The physician may then begin the actual procedure on the patient with the appropriate TPEG design version. The system 105 may be configured to display the performance of a given TPEG design version with regard to long term structural integrity, prevention of perigraft leaks or sealing function, the general sizing of the TPEG with respect to the patient's aorta and the like. With regard to testing of the long term durability or structural integrity of the TPEG or other medical device design, the system 105 has great utility. Specifically, system 105 has the ability, assuming the use of sufficiently powerful CPUs, to recreate large numbers of cyclic expansions and contractions in a short period of time. For example, as discussed above, the vascular system of a patient is constantly expanding and contracting as a result of dynamic or static pressure gradients within the vasculature from the patient's beating heart. These expansions and contractions can put stresses, strains, and deformations on intracorporeal medical devices, such as TPEG, which over time can lead to failure of the device. System 105 would give the physician the ability to quickly test a chosen TPEG design in a virtual model of the patient's expanding and contracting aorta for an amount of cycles that would equal or exceed the amount of cycles that would be expected in the patient's lifetime to determine the long term safety and efficacy of the design choice. Of course, a similar time compressed analysis could be used for any other type of medical device in any other part of a patient's body. Accordingly, if the invention is used as a preprocedure tool, physicians may analyze the use of various TPEG embodiments and select those that meet their performance requirements thereby allowing the physicians to select the best medical devices, such as the best TPEGs for treating their patients with aneurysm.
Because of the computing resources needed by FEA software tools, they are generally run on Silicon Graphics or other UNIX computer systems. The Mesh Generator, Stress/Strain/Deformation Analyzer, and the visualization of the stresses, strains, and deformations on the candidate TPEG have been run on a Silicon Graphics (R12000) machine with 640 MB of memory.
Modifications to DYNA3D or NIKE3D
In one embodiment, NIKE3D and DYN/A3D were used and modified to implement the features of the present invention (TPEG design was analyzed). In determining the required material model, an exemplary material model (herein called TPEG material model (W)) was used to accommodate a strain energy density of the form:
W=a 10(I 1−3)+a 01(I 2−3)+a 20(I 1−3)2 +a 11(I 1−3)(I 2−3)+a 02(I 2−3)2 +a 30(I 1−3)+a 21(I 1−3)2(I 2−3)+a 12(I 1−3)(I 2−3)2 +a 03(I 2−3)3+½K(I 3−1)2
with K=2(a 10 +a 01)/(1−2ν)
aij are material parameters;
ν is Poisson's ratio;
K is the bulk modulus given as a function of Poisson's ratio; and
I1, I2, and I3 are the first, second, and third invariants of the right Cauchy-Green strain tensor, respectively.
The TPEG material model (W), discussed above, was derived from a doctoral thesis, which discusses the stress in abdominal aortic aneurysm. (See Madhavan Lakshmiraghavan, Mechanical Wall Stress in Abdominal Aortic Aneurysm: Towards Development of a Clinical Tool to Predict Aneurysm Rupture (1998) (unpublished Ph.D. dissertation, University of Pittsburgh which is hereby incorporated herein in its entirety).
Other articles discussing a hyperelastic material, linear elastic, and non-linear elastic models of the aortic walls may also be used to derive a material model as exemplified above and other applications of the virtual prototyping system 105 (in FIG. 1). (See M. L. Raghavan et al., Ex Vivo Biomechanical Behavior of Abdominal Aortic Aneurysm: Assessment Using a New Mathematical Model, 24 Annals of Biomedical Engineering 573-582 (1996); David A. Vorp. Et al., Finite Element Analysis of the Effect of Diameter and Asymmetry on the Wall Stress Distribution in Abdominal Aortic Aneurysm, 35 BED (Bioengineering Conference ASME 1997) 33-34 (1997), both of which are incorporated by reference herein in their entirety).
Modifications to NIKE3D
NIKE3D has an existing material model, number 15, which is a three-dimensional continuum hyperelastic material that uses a strain energy density function of the form:
W = A ( I 1 - 3 ) + B ( I 2 - 3 ) + 1 / 2 K ( ln θ ) 2 with K = 4 ( A + B ) ( 1 + v ) ( 3 - 6 v )
A and B are material parameters;
K is the bulk modulus given as a function of Poisson's ratio;
I1 and I2 are the first and second invariants of the right Cauchy-Green strain tensor, respectively; and
θ is the current volume of the element divided by the undeformed volume.
Using the material model 15 as the framework, the material model 15 is modified to implement the TPEG Material Model “W” listed above. This entails ensuring that variables are accordingly updated or modified in the source code to capture the information required by the TPEG Material Model. Material model 15 was chosen from the NIKE3D models because it involves the least amount of code modification to implement the features of the present invention.
Implementation of the TPEG Material Model in NIKE3D
To implement the features in accordance with the present invention, two NIKE3D subroutines, weval.f and printm.f, were modified.
The following modifications were made to NIKE3D subroutine weval.f:
a) Ten material parameters (a10, a01, a20, a11, a02, a30, a21, a12, a03, K) were read instead of three (A, B, and K).
b) The calculation of K was changed from K=4(A+B)(1+ν))/(3−6ν) to K=2(a10+a01)/(1−2ν)
c) The calculation of
∂ W ∂ I 1
was changed from
∂ W ∂ I 1 = A to ∂ W ∂ I 1 = a 10 + 2 a 20 ( I 1 - 3 ) + a 11 ( I 2 - 3 ) + 3 a 30 ( I 1 - 3 ) 2 + 2 a 21 ( I 1 - 3 ) ( I 2 - 3 ) + a 12 ( I 2 - 3 ) 2
d) The calculation of
∂ W ∂ I 2 = B to ∂ W ∂ I 2 = a 01 + a 11 ( I 1 - 3 ) + 2 a 02 ( I 2 - 3 ) + a 21 ( I 1 - 3 ) 2 + 2 a 12 ( I 1 - 3 ) ( I 2 - 3 ) + 3 a 03 ( I 2 - 3 ) 2
e) The higher derivatives of W with respect to I1 and I2 were changed from zero to
∂ 2 W ∂ I 1 2 = 2 a 20 + 6 a 30 ( I 1 - 3 ) + 2 a 21 ( I 2 - 3 ) , ∂ 2 W ∂ I 2 2 = 2 a 02 + 2 a 12 ( I 1 - 3 ) + 6 a 03 ( I 2 - 3 ) , and ∂ 2 W ∂ I 1 ∂ I 2 = a 11 + 2 a 21 ( I 1 - 3 ) + 2 a 12 ( I 2 - 3 )
f) The derivatives with respect to I3 were changed from
∂ W ∂ I 3 = K ( ln I 3 / I 3 ) to ∂ W ∂ I 3 = K ( I 3 - 1 ) and from ∂ 2 W ∂ I 3 2 = K ( ( 1 - ln I 3 ) / I 3 2 ) to ∂ 2 W ∂ I 3 2 = K
g) When a completely incompressible material (I3=1) is specified by setting the augmented Lagrangian flag to true, the derivatives with respect to I3 are left in the log form. The log form shows substantially faster convergence and better stability for completely incompressible materials.
The NIKE3D subroutine printm.f was modified to print out all nine a material parameters to the material description in the high-speed printout file.
Invocation of the Modified NIKE3D TPEG Material Model
The TPEG material model (W) (i.e., the modified NIKE3D Material Model 15) is invoked in NIKE3D using the input data format shown in Table I. Poisson's ratio is kept as the third parameter to maintain compatibility with models using the original NIKE3D hyperelastic model. The documentation for NIKE3D, and the TRUEGRID Mesh Generator, provides an input format list for Material Model 15 similar to Table I given below, with A, B, and ν all defined on card 3 (it should be understood that the “card” represents lines of input data). The original NIKE3D code, however, reads A from columns 1-10 card 3, B from columns 1-10 of card 4, and ν from columns 1-10 of card 5. This format was changed to comply with the NIKE3D manual and the format in Table I in the modified weval.f and printm.f subroutines.
Input parameters format for the modified NIKE3D
material model (TPEG material model)
Card Columns Description Format
1 1-5 Material ID number I5
1 6-10 Material type (use 15) I5
1 11-20 Density E 10.0
1 21-25 Element class (not used) I5
1 26-35 Reference temperature (not used) E 10.0
1 36-45 Rayleigh damping parameter alpha E 10.0
1 46-55 Rayleigh damping parameter beta E 10.0
2 1-72 Material title 12A6
3 1-10 a10 E 10.0
3 11-20 a01 E 10.0
3 21-30 Poisson's ratio E 10.0
5-7 All Blank
8 1-10 Augmented Lagrangian flag E 10.0
.EQ.1: active, enforce
compressibility with augmented
Lagrangian iteration
8 11-20 Convergence tolerance for E 10.0
augmented Lagrangian
.GT.0.0: converged when
volume strain norm < TOL
(tolerance)
.LT.0.0: augment exactly -
TOL times
The format column specifies the expected data type. For example, a format of “I” means that an integer is expected (“I5” means integer with 5 positions), “E” means a real numeric value, and “A” means character data type.
Modifications to DYNA3D
DYNA3D has an existing material model number 27, which is a three-dimensional continuum hyperelastic material that uses a strain energy density function of the form
W = A ( I 1 - 3 ) + B ( I 2 - 3 ) + C ( I 3 2 - 3 ) + D ( I 3 - 3 ) 2 with C = 1 / 2 A + B and D = A ( 5 v - 2 ) + B ( 11 v - 5 ) 2 - 4 v
ν is Poisson's ratio; and
The material model 27 may be modified to implement the TPEG Material Model (W)). This also entails ensuring that variables are accordingly updated or modified in the source code to capture the information for the TPEG material model (W).
Implementation of the TPEG Material Model in DYNA3D
To implement the features in accordance with the present invention, two DYNA3D subroutines, f3dm27.f and printm.f, were modified. The “C(I3 −2−1)” term was left in the modified material model since without it, the explicit time integrator becomes unstable very easily. This term only significantly changes the result when the material undergoes significant change in volume. If ν≈0.5, the material behaves in a nearly incompressible matter, in this case D is much larger than C, and the inclusion of C has little to no effect on the final result.
The following modifications were made to DYNA3D subroutine f3dm27.f:
a) Ten material parameters (a10, a01, a20, a11, a02, a30, a21, a12, a03, K) were read instead of four (A, B, C, and D).
b) The calculation of D was changed from D=(A(5ν−2)+B(11ν−5))/(2−4ν) to D=(a10+a01)/(1−2ν)
c) The computation for I1 and I2 were added.
∂ W ∂ I 1 = A to ∂ W ∂ I 1 = a 10 + 2 a 20 ( I 1 - 3 ) + a 11 ( I 2 - 3 ) + 3 a 30 ( I 1 - 3 ) 2 + 2 a 21 ( I 1 - 3 ) ( I 2 - 3 ) + a 12 ( I 2 - 3 ) 2 .
e) The calculation of
∂ W ∂ I 2 = B to ∂ W ∂ I 2 = a 01 + a 11 ( I 1 - 3 ) + 2 a 02 ( I 2 - 3 ) + a 21 ( I 1 - 3 ) 2 + 2 a 12 ( I 1 - 3 ) ( I 2 - 3 ) + 3 a 03 ( I 2 - 3 ) 2 .
f) The calculation of
∂ W ∂ I 3 = 2 D ( I 3 - 1 ) - 2 C ( I 3 - 3 - 1 )
remains unchanged, however, the value of D has changed.
The DYNA3D subroutine printm.f was modified to correctly output the hyperelastic material constants to the resulting high-speed printout file.
Invocation of the Modified DYNA3D Material Model (TPEG Material Model)
The TPEG material model (i.e., the modified DYNA3D material model 27) is invoked in DYNA3D using the input data format shown in Table II. Poisson's ratio is kept as the third parameter to maintain compatibility with models using the original DYNA3D hyperelastic model.
Input parameters format for the modified DYNA3D
Reading the doctoral thesis mentioned above, the appropriate values of input parameters may accordingly be provided as input to the Stress/Strain/Deformation Analyzer (see Madhavan Lakshmiraghavan, Mechanical Wall Stress in Abdominal Aortic Aneurysm: Towards Development of a Clinical Tool to Predict Aneurysm Rupture (1998) (unpublished Ph.D. dissertation, University of Pittsburgh).
TRUEGRID Command File
FIGS. 5A through 5M contain a command file that is an exemplary file read by TRUEGRID to implement the features of the present invention (e.g., for stent design). This exemplary command file illustrates a component-level analysis of a stent, without the option for simulating deployment into CT-based anatomy (isim mode=6, not present in the command file).
TRUEGRID, in its basic form, is not only a Mesh Generator, but is also a format generator. It outputs data in a certain format, which are then read by NIKE3D and/or DYNA3D. The invention utilizes both TRUEGRID's capability as a Mesh Generator and an output generator to create an output file (e.g., Tables I and II discussed above), containing the appropriate values that would be read by NIKE3D and DYNA3D, respectively. The outputs created by TRUEGRID may be created by other means, e.g., by other Mesh Generator software or proprietary software.
The command file (contained in FIGS. 5A-5M) contains the parameters and the instructions that are read by TRUEGRID to generate the mesh and the output file(s), which are read by DYNA3D and/or NIKE3D.
The line numbers at the start of each line are only added to facilitate reference to particular lines in the command file and are not part of the command file. Text after the “c” are ignored by TRUEGRID (comments). To take advantage of the capabilities of TRUEGRID, the command file contains various parameters that help developers customize their simulation and/or Stress/Strain/Deformation analysis. Mesh generating tools, such as TRUEGRID, in the non-interactive mode, generally require that command files or similar files be created to enable them to generate finite element models. In the interactive mode, a finite element model may be created by a medical device designer (e.g., TPEG designer) using the options available in the interactive mode of TRUEGRID.
Referring to FIG. 5A, the inike parameter (lines 5 and 21) tells TRUEGRID that the output file is to be read by a NIKE3D Stress/Strain/Deformation Analyzer. The command file also tells TRUEGRID that the stent to be modeled is a full 3-segment stent design (line 6 and 22), the model is a full 360 degree model of a stent (lines 6 and 23), to model the stress on the initial expansion of the stent in vivo (lines 16 and 24), and to refine the elements by 2 in each direction of the cross section (lines 18 and 25). (Crowns can be a pointed or barbed portion of a stent—see lines 7 through 9). The command file thus enables TRUEGRID to generate a mesh and a model of a stent subjected to various component-level in vitro tests such as radial force and predelivery compression. Simulation of these tests enables a designer to refine and optimize the stent design for its intended application (e.g. as component of a TPEG or for treating occlusive disease).
TRUEGRID can also act like an interpreter. It reads the information contained in the command file, and interprets and processes the lines accordingly. For example, the text after the word “para” or “parameter” are parameters read by TRUEGRID. These terms indicate the value or the formula that should be used by TRUEGRID. For example, line 21 denotes that the parameter inike contains the initial value 1.
Line 46 in FIG. 5B means that the value of the parameter dCIA3 contains the value 0.0.
Line 138 in FIG. 5D indicates that the initial value of the parameter rocompcyl is the value evaluated by the formula “[0.95*(min(% RCyl3,% RCyl6,% RCyl12—1,% RCyl12—2)−% RW6).” TRUEGRID understands that the min function has to be evaluated. The min function compares the value contained in each variable, in this case, contained in RCyl3 (e.g., contains 1), RCyl6 (contains 0.005), RCyl12—1 (contains 0.987), and RCyl12—2 (contains 0.0002), and returns the content of the variable, which holds the least value—0.0002 (value contained in Rcyl12—2). Assuming the variable RW6 contains the value 0.18, TRUEGRID then evaluates the rocompcly variable to contain 0.95*0.0002−0.18, which equals to negative 0.17981. This value is thus the initial value of rocompcyl when initially processed and read by TRUEGRID.
Embodiments of the invention can simulate various phases of TPEG use. For example, it calculates the stresses, strains, and deformations on the TPEG when it is compressed then decompressed for deployment, when the TPEG is compressed into the catheter for deployment, when the TPEG expands, and the like.
Referring to line 432, in FIG. 5L, the term “include” indicates to TRUEGRID that when the condition as defined in line 431 is met, the istent.mts_nike_solid file is read. The contents of this include file could be added in the command file itself. For flexibility and readability, however, they were placed in a separate file. Programmers typically use include files, such as done in C or C++, for code control and ease of maintenance
FIGS. 6A-6F contain an exemplary text of a command file called “seal.run” (line 2) read by TRUEGRID for a simulated TPEG graft deployment in a proximal aortic neck to generate a mesh incorporating both an anatomical feature and medical device and to output files that are read by a Stress/Strain/Deformation Analyzer.
FIGS. 7A-7C is an exemplary include file, called “tpeg.part_ct_aorta3,” used by “seal.run” command file listed in FIGS. 6A-6F. See line 217 of FIG. 6F. This file contains the commands which read in surfaces created by the Geometry Generator 120 from CT data for the aorta and builds the mesh for the vessel.
FIGS. 8A-8L is another exemplary command file read by TRUEGRID used in the virtual prototyping system of the present invention for simulating stent deployment into an anatomy from CT-data, as opposed to a stent graft. The stent could be a part of a stent graft, could be intended for use to treat occlusive disease in the vasculature, or could even be used for nonvascular application, such as an esophageal stent.
The files listed in FIGS. 5A-5M, 6A-6F, 7A-7C, and 8A-8L are written to be read by TRUEGRID. Variations on such files are expected depending on the Mesh Generator 130 deployed in the system.
FIG. 9A illustrates a flow chart, which sets forth the basic components of an embodiment of the inventive system and process in accordance with the present invention. In particular, this figure illustrates how to develop better-designed TPEGs. The steps illustrated may of course be utilized for developing other medical devices, other than TPEGs.
To start, a TPEG designer first determines, in box 905A, the performance requirements desired, such as to secure an optimal structural integrity of the TPEG, to avoid potential health risks such as ruptures and endoleaks, or to have a smaller TPEG packaging. 3D volumetric data of the anatomy desired, for example, in this case a blood vessel, is then acquired at box 910A, using CT or MRI scanners. Alternatively, if 3D volumetric data are already available, such acquisition may be skipped and such 3D volumetric data be obtained from the archive.
It should be noted here that the “anatomy” desired, which defines the embodiment in which a medical device is to be tested, is not necessarily limited to a patient's body. For example, embodiments of the present invention could be used to obtain test results for medical device performance in a wide variety of in vitro tests, some of which may be necessary or desirable for Food and Drug Administration (FDA) approval of the medical device in question. Various forms of in vitro failure mode testing such on tensile pull testing and the like could be performed by an embodiment of the invention and allow the tester to easily vary test parameters, device design, and test frequency to quickly obtain the desired test results. In addition, volumetric anatomical data for animals could be used to simulate animal testing that is necessary or desirable for FDA approval of a medical device. This may be of particular importance for a medical device design, which seeks to establish equivalence with an existing approved product which has been previously tested in animal studies.
The geometry generator (120 in FIG. 1) then generates a blood vessel geometric model in box 920A. As discussed above, the blood vessel geometric model may be an actual idealized or in vitro model. If the geometry generator is an embodiment where surface points are first extracted, a CAD system may then be used to generate such geometric model.
Next, a candidate TPEG model or design, which is obtained typically from a model created using a CAD software, is selected or modeled by the TPEG designer (step 925A). The Mesh Generator (130 in FIG. 1) then generates a mesh model incorporating both the blood vessel and the TPEG (930A). A TPEG designer then determines the material properties of the candidate TPEG model and the blood vessel at step 935A. The material properties may also have been assigned by the TPEG designer during the previous step (i.e., the generation of the mesh model). Using a Stress/Strain/Deformation Analyzer (160 in FIG. 1), assuming that the load (150 in FIG. 1) and the Materials Model (170 in FIG. 1) are available to the Stress/Strain/Deformation Analyzer for input, a TPEG designer then simulates the candidate TPEG design behavior in a stress/strain/deformation analysis (at step 940A) to determine if the candidate TPEG meets the performance requirements.
If the candidate TPEG does not meet the performance requirements, a “no.” outcome at decision box 955A, the TPEG designer chooses another TPEG design or model at step 980A, and repeats the steps as shown by the arrow to box 925A. If it, however, meets the target performance requirements, a “yes” outcome at decision box 955A, a prototype is then fabricated based on the candidate TPEG model and design at step 960A. The fabricated prototype is then subjected to testing, e.g., animal testing or clinical testing, at step 965A. If the fabricated prototype meets the target performance requirements, the candidate TPEG model thus is a final design and may be used to produce other TPEGs.
If the fabricated prototype, however, does not meet the performance requirements, a “no” outcome at decision box 970A, the TPEG designer modifies the TPEG design or selects a new TPEG design, and repeats the steps as shown with the arrow to box 925A. If necessary, the process is repeated several times until the performance requirements and the final design is obtained. A benefit of the invention is to reduce the number of “no” outcome at decision box 970A compared to a development process which uses only hardware prototypes for design verification.
As discussed above, a proposed TPEG model may be evaluated against a number of anatomical features to determine the suitable range of conditions of an applicable TPEG model (e.g., size). Similarly, a set of anatomical features may be evaluated against a number of TPEG models to determine the type of suitable TPEG model for such set of anatomical feature. Furthermore, an analysis of the stresses, strains, and deformations may be conducted on the medical device without interaction to certain anatomical features.
FIG. 9B, is similar to FIG. 9A except for the additional step (box 942B) of displaying the visual simulation of the stresses and strains on the TPEG. The display of the simulation is typically employed using the Visualization tool (180 in FIG. 1), which in the preferred embodiment is the GRIZ software.
Visual display of the simulation is not necessary because a reading of the numerical representation of the stresses, strains, and deformation on the TPEG may guide a TPEG designer whether the performance requirements are met. However, visual display is often desirable because a visual representation of the stresses and strains, for example, red hot spots on the visual TPEG model can be easier to understand than mere numerical representations.
FIG. 10 is similar to FIG. 9A and illustrates a process to develop better-designed medical devices using in vitro features. In the first step as shown in 1005, a medical device designer, determines the performance requirements. The next step is to generate a geometry model of the in vitro model, step 1020A, (e.g., latex tube to represent an artery), using software tools, such as a CAD software or even TRUEGRID. The steps are then similar to those illustrated in FIG. 9A. In another embodiment, the in vitro model such as a latex tube may be scanned to obtain a 3D volumetric data Such acquired 3D volumetric data may also be modified by the medical device designer.
In another embodiment not shown, only the medical device model is analyzed absent the anatomical feature or in vitro model. The operations shown in FIG. 10 would be implemented, without the operation of generating blood vessel geometric model (step 1020A) and the analysis would only be performed on the geometric model of the candidate medical device or a potion of it. Material properties and load information pertinent only to the medical device are generally used in the analysis process.
FIG. 11 contains steps similar to those illustrated in FIG. 9A. FIG. 11 illustrates an embodiment of the present invention as a preprocedure planning tool, for example, to guide a physician in deciding which particular TPEG to implant in a patient.
To start, a physician first determines, in box 1105, the surgical or interventional procedure objectives, typically, to ensure robust sealing and structural integrity of the TPEG in vivo for a particular patient. The physician then obtains 3D volumetric data of the potential site of the TPEG, e.g., the abdominal aorta, at step 1110. The Geometry Generator (120 in FIG. 1) then extracts the surface points from the 3D volumetric data acquired in step 1115. Based on the surface points extracted, a blood vessel geometric model is created 1120.
Next, a candidate TPEG, which is obtained typically from a model created using a CAD software, is selected by the physician (step 1125). (TPEG models may be created in advance and stored in a library in the system. At this point, the physician is determining which available TPEG design is best suited for that patient or individual). The Mesh Generator (130 in FIG. 1) then generates a mesh model incorporating both the blood vessel and the selected TPEG. A physician may then identify the material properties of the candidate TPEG and the blood vessel at step 1135. The material properties may have also been assigned during the previous step (i.e., the generation of the mesh model). Using a Stress/Strain/Deformation Analyzer (160 in FIG. 1), assuming that the load (150 in FIG. 1) and the materials model (170 in FIG. 1) are available to the Stress/Strain/Deformation Analyzer for input, a physician may then run the candidate TPEG to a stress/strain/deformation analysis (at step 640) to determine if the candidate TPEG meets the surgical objectives.
If the candidate TPEG does not meet the procedural objectives, a “no” outcome at decision box 1155, a physician may decide to change the TPEG to be used in the procedure at step 1180 and repeat the process as shown by the arrow to box 1125. Based on the physician's judgment, if the candidate TPEG does meet the procedural objectives, a “yes” outcome at decision box 655, the physician then may decide whether to proceed with the planned TPEG implant procedure or not, at step 1160.
FIG. 12 contains a representation of one simulation display of a cutaway lateral view of a vascular stent in the infrarenal aorta just proximal to an abdominal aneurysm. Using the system as described above, several displays may be presented to the user showing the progressive stent expansion and contact with the luminal surface of the vessel. The system may be also be used such that the visualization module displays the medical device and the anatomical feature in color, with colors and their gradients representing the various stresses, strains, and deformations on the medical device and the anatomical feature. Other views, such as a proximal view, may also be used in simulation. FIG. 13 is a block diagram of an exemplary computer 1300 such as might comprise any of the computers containing a Geometry Generator 120, a Mesh Generator 130, a Stress/Strain/Deformation Analyzer 160, and a Visualization tool 180. Each computer 1300 operates under control of a central processor unit (CPU) 1302, such as a high-end microprocessor, e.g., typically found in Silicon Graphics workstation, and associated integrated circuit chips. A computer user can input commands and data from a keyboard and mouse 1312 and can view inputs and computer output at a display 1310. The display is typically a video monitor or flat panel display device. The computer 1300 also includes a direct access storage device (DASD) 1304, such as a fixed hard disk drive. The memory 1306 typically comprises volatile semiconductor random access memory (RAM). Each computer preferably includes a program product reader 1314 that accepts a program product storage device 1316, from which the program product reader can read data (and to which it can optionally write data). The program product reader can comprise, for example, a disk drive, and the program product storage device can comprise removable storage media such as a floppy disk, an optical CD-ROM disc, a CD-R disc, a CD-RW disc, DVD disk, or the like. In the preferred embodiment, each computer 1300 can communicate with the other connected computers over the network 1320 through a network interface 1308 that enables communication over a connection 1318 between the network and the computer. This facilitates having each separate system as illustrated in FIG. 1, provide inputs and outputs to the other components in the system.
The CPU 1302 operates under control of programming steps that are temporarily stored in the memory 1306 of the computer 1300. When the programming steps are executed, the pertinent system component performs its functions. Thus, the programming steps implement the functionality of the system components illustrated in the figures. The programming steps can be received from the DASD 1304, through the program product 1316, or through the network connection 1318. The storage drive 1304 can receive a program product, read programming steps recorded thereon, and transfer the programming steps into the memory 1306 for execution by the CPU 1302. As noted above, the program product storage device can comprise any one of multiple removable media having recorded computer-readable instructions, including magnetic floppy disks, CD-ROM, and DVD storage discs. Other suitable program product storage devices can include magnetic tape and semiconductor memory chips. In this way, the processing steps necessary for operation in accordance with the invention can be embodied on a program product.
Alternatively, the program steps can be received into the operating memory 1306 over the network 1318. In the network method, the computer receives data including program steps into the memory 1306 through the network interface 1308 after network communication has been established over the network connection 1318. The program steps are then executed by the CPU 1302 to implement the processing of the present invention.
Although the present invention is implemented on UNIX workstations, typical personal computers could likely be adopted to perform these functions in the future.
It should be understood that all of the computers of the systems embodying the various systems illustrated in FIG. 1, preferably have a construction similar to that shown in FIG. 13, so that details described with respect to the FIG. 13 computer 1300 will be understood to apply to all computers or components of the system. Any of the computers can have an alternative construction, so long as they have sufficient resources and processing power to handle finite element analyses and other functions in accordance with the present invention.
Those skilled in the art will recognize that variations in the steps, as well as the order of execution, may be done and still make the various embodiments of the invention operate. Furthermore, one skilled in the art will realize that although the examples described herein generally refer to TPEGs, other medical devices may be designed in accordance with the present invention.
In addition, although the modules of the system 105 (FIG. 1), the Geometry Generator, the Mesh Generator, Stress/Strain/Deformation Analyzer, and the Visualization module, are shown in different boxes, depending on the software tools utilized their functions may with each other. Some functions, for example, that are done by one module, e.g., the Mesh Generator, TRUEGRID, thus, may also be done by the Geometry Generator, MIMICS, or vice versa.
Embodiments of the present invention have been described above so that an understanding of the present invention can be conveyed. There are, however, many alternative software programs available or able to be written that would embody the functions of the present invention, and thus, may be used accordingly. The present invention should therefore not be seen as limited to the particular embodiments described herein, but rather, it should be understood that the present invention has wide applicability with respect to medical device design generally. All modifications, variations, or equivalent arrangements and implementations that are within the scope of the attached claims should therefore be considered within the scope of the invention.
1. A computer system including at least one processor and memory for analyzing medical devices comprising:
a geometry generator that receives three-dimensional volumetric data of at least one anatomical feature(s) and generates a geometric model of said anatomical feature(s);
a mesh generator that receives said geometric model of said anatomical feature(s) and a geometric model of a medical device, and generates a finite element model representing both of said geometric model of said anatomical feature(s) and said geometric model of said medical device; and
a stress/strain/deformation analyzer that receives said finite element model, material properties of said anatomical feature(s) and said medical device, load data on said anatomical feature(s) and/or said medical device and simulates an interaction between said anatomical feature(s) and said medical device over at least one dynamic expansion and contraction cycle of the anatomical feature(s) to determine predicted stresses, strains, and deformations of said medical device due to the interaction of the medical device with the anatomical feature(s).
2. The system of claim 1 wherein said geometric model of said anatomical feature(s) is an idealized geometric model.
3. The system of claim 1 wherein said three-dimensional volumetric data are acquired via CT scan.
4. The system of claim 1 wherein said three-dimensional volumetric data are acquired via MRI.
5. The system of claim 1 wherein said geometry generator is a software application which generates surface points from the three-dimensional volumetric data, which are then converted into stereolithography, slice files, ICES files or a combination thereof.
6. The system of claim 1 wherein said mesh generator includes three-dimensional finite modeling software.
7. The system of claim 1 wherein said stress/strain/deformation analyzer is a non-linear finite element modeling software application.
8. The system of claim 6 wherein said three dimensional finite modeling software tessellates a geometric model into hexahedron brick elements and quadrilateral shell elements to create the finite element model.
9. The system of claim 7 wherein said non-linear finite element modeling software application is configured to accommodate a strain energy density of the form:
W=a 10(I 1−3)+a 01(I 2−3)+a 20(I 1−3)2 +a 11(I 1−3)(I 2−3)+a 02(I 2−3)2 +a 30(I 1−3)+a 21(I 1−3)2(I 2−3)+a 12(I 1−3)(I 2+3)2 +a 03(I 2−3)3+½K(I 3−1)2
with K=2(a 10 +a 01)/(1−2v) where
v is Poisson's ratio;
I1, I2, and I3 are first, second, and third invariants of a right Cauchy-Green strain tensor, respectively.
10. The system of claim 1 further comprising a visualization tool that receives said simulated stresses, strains, and deformations of said medical device from said stress/strain/deformation analyzer and displays one or more of said stresses, strains, and deformations of said medical device via visual representation.
11. The system of claim 10 wherein said visualization tool includes interactive software for visualizing finite element analysis results of three-dimensional grids.
12. A computer implemented method for analyzing a medical device comprising:
acquiring three-dimensional volumetric data of at least one anatomical feature of a patient;
generating a geometric model of said anatomical feature(s);
receiving data representing a geometric model of a candidate medical device design;
receiving said geometric model of said anatomical feature(s);
generating a finite element model representing both said geometric model of said anatomical feature(s) and said geometric model of said candidate medical device design with a mesh generator;
receiving material properties of said anatomical feature(s) and said candidate medical device design;
receiving load data imposed on said candidate medical device design and said anatomical feature(s); and
simulating an interaction between said anatomical feature(s) and said candidate medical device design over at least one dynamic expansion and contraction cycle of the anatomical feature(s) with a stress/strain/deformation analyzer to determine predicted stresses, strains, and deformation of said candidate medical device design by said load data.
13. The method of claim 12 wherein the step of simulating stresses, strains, and deformations is performed to a point of failure of said candidate medical device design.
14. The method of claim 12 wherein where said three-dimensional volumetric data are acquired via CT scan.
15. The method of claim 12 wherein said three-dimensional volumetric data are acquired via MRI.
16. The method of claim 12 wherein said geometric model for said anatomical feature(s) is generated by a software application which generates surface points from the three-dimensional volumetric data, which are then converted into stereolithography, slice files, ICES files or a combination thereof.
17. The method of claim 12 wherein said step of generating a finite element model is performed by using three-dimensional finite modeling software.
18. The method of claim 12 wherein said stresses, strains, and deformations are simulated by a non-linear finite element modeling software application.
19. The method of claim 17 wherein said three dimensional finite modeling software tessellates a geometric model into hexahedron brick elements and quadrilateral shell elements to create the finite element model.
20. The method of claim 18 wherein said non-linear finite element modeling software application is configured to accommodate a strain energy density of the form:
21. The method of claim 12 wherein said stress/strain/deformation analysis is performed using a non-linear finite element analysis tool.
22. The method of claim 12 further comprising receiving results of said stress, strain, and deformation analysis into a visualization tool and wherein said visualization tool visually presents one or more of said strains, stresses, and deformations of said medical device.
23. The method of claim 22 wherein said visualization tool includes interactive software for visualizing finite element analysis results on three-dimensional grids.
US12/904,994 2000-10-04 2010-10-14 Virtual prototyping and testing for medical device development Active US8224632B2 (en)
US09/679,725 US7840393B1 (en) 2000-10-04 2000-10-04 Virtual prototyping and testing for medical device development
US09/679,725 Continuation US7840393B1 (en) 2000-10-04 2000-10-04 Virtual prototyping and testing for medical device development
US13/523,765 Division US8666714B2 (en) 2000-10-04 2012-06-14 Virtual prototyping and testing for medical device development
US09/679,725 Active 2024-03-17 US7840393B1 (en) 2000-10-04 2000-10-04 Virtual prototyping and testing for medical device development
US12/904,994 Active US8224632B2 (en) 2000-10-04 2010-10-14 Virtual prototyping and testing for medical device development
JP (1) JP2004528858A (en)
US20070293965A1 (en) * 2006-06-16 2007-12-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Stent customization system and method
US20070294152A1 (en) * 2006-06-16 2007-12-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Specialty stents with flow control features or the like
US20080133040A1 (en) * 2006-06-16 2008-06-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Methods and systems for specifying a blood vessel sleeve
US20080172073A1 (en) * 2006-06-16 2008-07-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Active blood vessel sleeve
US20080201007A1 (en) * 2006-06-16 2008-08-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Methods and systems for making a blood vessel sleeve
US20090024152A1 (en) * 2007-07-17 2009-01-22 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Custom-fitted blood vessel sleeve
US20110087465A1 (en) * 2007-08-17 2011-04-14 Mohamed Rashwan Mahfouz Implant design analysis suite
US8577693B2 (en) 2011-07-13 2013-11-05 The Invention Science Fund I, Llc Specialty stents with flow control features or the like
US8666714B2 (en) 2000-10-04 2014-03-04 Trivascular, Inc. Virtual prototyping and testing for medical device development
US20150145515A1 (en) * 2013-11-28 2015-05-28 Medimagemetric LLC Differential approach to quantitative susceptibility mapping without background field removal
US8533029B2 (en) 2001-04-02 2013-09-10 Invivodata, Inc. Clinical monitoring device with time shifting capability
US8065180B2 (en) * 2001-04-02 2011-11-22 invivodata®, Inc. System for clinical trial subject compliance
US7873589B2 (en) 2001-04-02 2011-01-18 Invivodata, Inc. Operation and method for prediction and management of the validity of subject reported data
GB0220514D0 (en) 2002-09-04 2002-10-09 Depuy Int Ltd Acetabular cup spacer arrangement
US7150758B2 (en) 2003-03-06 2006-12-19 Boston Scientific Santa Rosa Corp. Kink resistant endovascular graft
US20050264562A1 (en) 2004-03-05 2005-12-01 Macura Matthew J System and method of virtual representation of thin flexible materials
US7937253B2 (en) 2004-03-05 2011-05-03 The Procter & Gamble Company Virtual prototyping system and method
US7899516B2 (en) 2004-06-23 2011-03-01 M2S, Inc. Method and apparatus for determining the risk of rupture of a blood vessel using the contiguous element defined area
EP1811896A4 (en) * 2004-06-23 2009-08-19 M2S Inc Anatomical visualization and measurement system
US7340316B2 (en) * 2004-06-28 2008-03-04 Hanger Orthopedic Group, Inc. System and method for producing medical devices
DE102004044435A1 (en) * 2004-09-14 2006-03-30 Siemens Ag Process and apparatus for diagnosis and treatment of aortic aneurysm
DE602005011478D1 (en) * 2004-12-17 2009-01-15 Koninkl Philips Electronics Nv System and method thereof of a three-dimensional model to predict physical properties of an aneurysm
EP1746559A1 (en) * 2005-07-20 2007-01-24 Richstone Consulting LLC A method for simulating a manual interventional operation by a user in a medical procedure
US20070293936A1 (en) * 2006-04-28 2007-12-20 Dobak John D Iii Systems and methods for creating customized endovascular stents and stent grafts
JP4968821B2 (en) * 2006-07-12 2012-07-04 学校法人早稲田大学 Blood vessel operation simulator
US7979256B2 (en) 2007-01-30 2011-07-12 The Procter & Gamble Company Determining absorbent article effectiveness
WO2009049681A1 (en) * 2007-10-19 2009-04-23 Vascops Automatic geometrical and mechanical analyzing method and system for tubular structures
US8380531B2 (en) 2008-07-25 2013-02-19 Invivodata, Inc. Clinical trial endpoint development process
US20110153286A1 (en) * 2009-12-22 2011-06-23 Siemens Corporation Method and System for Virtual Percutaneous Valve Implantation
US20110313508A1 (en) * 2010-06-21 2011-12-22 Vijaya Kolachalama Endovascular platforms for uniform therapeutic delivery to local targets
US8315812B2 (en) 2010-08-12 2012-11-20 Heartflow, Inc. Method and system for patient-specific modeling of blood flow
RU2013150250A (en) * 2011-04-12 2015-05-20 Конинклейке Филипс Н.В. Built-in three-dimensional modeling
US20150127031A1 (en) * 2011-08-26 2015-05-07 EBM Corporation Bloodstream simulation system for simulating blood vessel treatment effect, method therefor, and computer software program
US8818544B2 (en) 2011-09-13 2014-08-26 Stratasys, Inc. Solid identification grid engine for calculating support material volumes, and methods of use
US8978448B2 (en) 2011-10-11 2015-03-17 Trivascular, Inc. In vitro testing of endovascular device
US10276054B2 (en) 2011-11-29 2019-04-30 Eresearchtechnology, Inc. Methods and systems for data analysis
US20150057982A1 (en) * 2012-03-30 2015-02-26 Arthur G. Erdman Virtual design
US9811613B2 (en) 2012-05-01 2017-11-07 University Of Washington Through Its Center For Commercialization Fenestration template for endovascular repair of aortic aneurysms
US9636238B2 (en) * 2012-05-04 2017-05-02 University Of Washington System to evaluate prosthetic sockets
GB201308979D0 (en) 2013-05-17 2013-07-03 Vascutek Ltd Analysis, design and production of products comprising superelastic materials
CN106456250A (en) * 2013-08-13 2017-02-22 波士顿科学国际有限公司 Computer visualization of anatomical items
JP2017507685A (en) * 2014-01-06 2017-03-23 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Arrangement modeling
US9636872B2 (en) 2014-03-10 2017-05-02 Stratasys, Inc. Method for printing three-dimensional parts with part strain orientation
US9754053B2 (en) * 2014-08-11 2017-09-05 The Boeing Company System and method for reading geometric data from a computer-aided design (CAD) model
US9693830B2 (en) 2014-12-10 2017-07-04 Henry Ford Health System Evaluating prosthetic heart valve placement
JP5839638B1 (en) * 2015-06-01 2016-01-06 川澄化学工業株式会社 Tubular treatment instrument design apparatus, a method of manufacturing a tubular treatment instrument, and a tubular treatment instrument design program
CN107949346A (en) 2015-07-08 2018-04-20 主动脉公司 Devices and methods for anatomic mapping for prosthetic implants
KR101781498B1 (en) * 2016-06-27 2017-09-25 부산대학교 산학협력단 Patient-specific medical stent manufacturing method easy to cultivate endothelium
US4742464A (en) 1982-04-14 1988-05-03 Francois Duret Method of making a prosthesis, especially a dental prosthesis
US5041141A (en) * 1987-11-03 1991-08-20 Orthopaedic Technology B.V. Method of shaping an endo-prosthesis, a femoral head prosthesis, an acetabulum prosthesis and a method of fixing a femoral head prosthesis in a bone
US5150304A (en) 1989-10-28 1992-09-22 Metalpraecis Berchem+Schaberg Gesellschaft Fur Metallformgebung Mbh Method of making an implantable joint prosthesis
US5233992A (en) 1991-07-22 1993-08-10 Edison Biotechnology Center MRI method for high liver iron measurement using magnetic susceptibility induced field distortions
EP0574098A1 (en) 1992-06-10 1993-12-15 AMEI TECHNOLOGIES Inc. Method and apparatus for making customized fixation devices
US5273038A (en) 1990-07-09 1993-12-28 Beavin William C Computer simulation of live organ
US5506785A (en) 1993-02-11 1996-04-09 Dover Systems Corporation Method and apparatus for generating hollow and non-hollow solid representations of volumetric data
US5590261A (en) 1993-05-07 1996-12-31 Massachusetts Institute Of Technology Finite-element method for image alignment and morphing
US5594651A (en) 1995-02-14 1997-01-14 St. Ville; James A. Method and apparatus for manufacturing objects having optimized response characteristics
US5601084A (en) 1993-06-23 1997-02-11 University Of Washington Determining cardiac wall thickness and motion by imaging and three-dimensional modeling
US5612885A (en) 1993-12-17 1997-03-18 Autogenics Method for constructing a heart valve stent
US5798924A (en) 1993-12-04 1998-08-25 Eufinger; Harald Process for producing endoprostheses
US5880976A (en) 1997-02-21 1999-03-09 Carnegie Mellon University Apparatus and method for facilitating the implantation of artificial components in joints
US5926650A (en) 1995-06-15 1999-07-20 Canon Kabushiki Kaisha Method and system utilizing a negotiation phase to transfer commands and data in separate modes over a host/peripheral interface
US6121042A (en) 1995-04-27 2000-09-19 Advanced Tissue Sciences, Inc. Apparatus and method for simulating in vivo conditions while seeding and culturing three-dimensional tissue constructs
US6201543B1 (en) 1997-12-17 2001-03-13 Siemens Corporate Research, Inc. Framework for segmentation of cylindrical structures using two dimensional hybrid models
US6301496B1 (en) 1998-07-24 2001-10-09 Biosense, Inc. Vector mapping of three-dimensionally reconstructed intrabody organs and method of display
US6381562B2 (en) 1998-07-13 2002-04-30 John A. Keane Configurable bio-transport system simulator
US20020068968A1 (en) 2000-08-16 2002-06-06 Thomas Hupp Virtual stent making process based upon novel enhanced plate tectonics derived from endoluminal mapping
US20020103505A1 (en) 2001-02-01 2002-08-01 Medtronic, Inc. Custom manufacturing of implantable medical devices
US6463351B1 (en) 1997-01-08 2002-10-08 Clynch Technologies, Inc. Method for producing custom fitted medical devices
US6684754B2 (en) 2001-07-10 2004-02-03 Alan Elbert Comer Pneumatic muscle analogs for exoskeletal robotic limbs and associated control mechanisms
US20070203679A1 (en) 2005-11-17 2007-08-30 Macura Matthew J Virtual prototyping system and method
US5741327A (en) * 1997-05-06 1998-04-21 Global Therapeutics, Inc. Surgical stent featuring radiopaque markers
2001-09-28 JP JP2002533253A patent/JP2004528858A/en active Granted
2001-09-28 AU AU9317901A patent/AU9317901A/en not_active Withdrawn
US5365996A (en) 1992-06-10 1994-11-22 Amei Technologies Inc. Method and apparatus for making customized fixation devices
WO2003015666A2 (en) 2001-08-15 2003-02-27 Edwards Lifesciences Corporation Virtual stent making process derived from endoluminal mapping
"Modeling the Biomechanics of Human Joints and Prosthetic Implants," Lawrence Livermore National Laboratory (http://www-iscr.llnl.gov) Science and Technology Review, Sep. 19-21, 1996.
Bossart, et al., "Finite Element Analysis of Human Joints," IEEE Signal Process Society 1996 International Conference on Image Processing Lausanne, Switzerland Sep. 16-19, 1996 (Preprint submitted from Lawrence Livermore National Laboratory).
Bozic et al., "Three-dimensional finite element modeling of a cervical vertebra: An investigation of burst fracture mechanism," J. Spinal Disorders, 7(2):102-110 (Apr. 1994).
C.K. Chong et al., "A Prototype Simulator for Endovascular Repair of Abdominal Aortic Aneurysms", 1997, W.B. Saunders Company Ltd., pp. 330-333. *
Campbell et al., "Balloon-Artery Interactions During Stent Placement: A Finite Element Analysis Approach to Pressure, Compliance, and Stent Design as Contributors to Vascular Injury"; 1999; American Heart Association; pp. 378-383.
Canero et al., "Optimal stent implantation: three-dimensional evaluation of the mutal position of stent and vessel via intracoronary echocardiography," Computers in Cardiology, 261-264 (Sep. 1999).
Chang et al., "Computer aided stress analysis of the femur with prosthetic hip stem utilizing computer topography." Bioengineering Conference, Proceedings of the 1993 IEEE, Nineteenth Annual Northeast, pp. 60-61, Mar. 18-19, 1993.
Christon et al. "Visualization of High Resolution, Three-Dimensional, Nonlinear Finite Element Analyses," Proceedings. Visualization '92 (Car. No. 92Ch3201-11 (1992).
De Hart, "A three-dimensional analysis of a fibre-reinforced aortic valve prosthesis," 1988 Elsevier Science Ltd., pp. 629-638.
Dooley, et al., "Orthopedic Implant Design, Analysis, and Manufacturing System", Bioengineering Alliance of South Carolina, Clemson University, Rhodes Research Center, Clemson, S.C. 29634, pp. 60-64.
Dovey et al., "GRIZ", Finite Element Analysis Results Visualization for Unstructured Grids, Method Development Group Mechanical Engineering, Oct. 1993, pp. 1-42.
Dumoulin C. et al., "Mechanical behavior modeling of baloon expandable stents." Journal of Biomechanics, vol. 33, No. 11, pp. 1461-1470 (available online: Sep. 8, 2000).
Elger et al. "The Influence of Shape on the Stresses in Model Abdominal Aortic Aneurysms," Transactions of the ASME 326:326-32 (1996).
F.D. Whitcher, "Simulation of in vivo loading conditions of nitinol vascular stent structures", 1997, Elsevier Science Lts., pp. 1005-1011. *
Furusawa et al., "3D-FEM stress analysis in a walking cycle of a tibia replaced by TKA," Japanese Society for Medical Biological Engineering (Jun. 1997).
Haridas et al., "Predictive Analysis at the Forefront of Medical Product Development", Medical Device & Diagnostic Industry Magazine, MDLDI, Oct. 1999.
Holzapfel et al., Large strain analysis of soft biological membranes: Formulation and finite element analysis, Elsevier Science: Oct. 1995, pp. 45-61.
Hoover et al. "Parallel Algorithms for Finite Element Analysis (DYNA3D/NIKE3D)," UCRLJC-127647 Abstract. Lawrence Livermore National Laboratory Technical Publication. (1997).
How et al. "Mechanical Properties of Arteries and Arterial Grafts," Chapter 1 of Cardiovascular Biomaterials Hasting, G.W. (ed.) London; New York: Springer-Verlag, 1992 pp. 1-35.
Kelly et al., "Failure of All-Ceramic Fixed Partial Dentures in vitro and in vivo" Analysis and Modeling; Jun. 1995, J. Dent. Res. 74(6), pp. 1253-1258.
Lakshmiraghavan, M. Mechanical Wall Stress in Adominal Aortic Aneurysm: Towards the Development of a Clinical Tool to Predict Aneurysm Rupture. Submitted to the University of Pittsburgh, vol. 59/09-B of Dissertaion Abstracts International p. 4948. 285 pages (1998).
Lee et al., "Automated Mesh Generation of an Arterial Bifurcation Based upon in vivo MR Images", Jul. 23-28, 2000, World Congress on Medical Physics and Bioengineering, pp. 1-4.
Leotta et al., "Cross-Sectional Area Changes in Peripheral Vein Grafts Monitored by Three-Dimensional Ultrasound Imaging", 2000 IEEE Ultrasonic Symposium; May 2000; pp. 1865-1869.
Maker et al.; "NIKE3D, A nonlinear, implicit, three-dimensional finite element code for solid and structural mechanics user's manual"; Apr. 14, 1995.
Mosora et al. "Modelling the arterial wall by finite elements," Archives Internationales de Physiologie, de Biochimica et de Biophysique 101 ;185-91 (1992).
Mower et al. "Stress Distributions in Vascular Aneurysms: Factors Affecting Risk of Aneurysm Rupture," J. Surgical Research 55:151-61 (1993).
Muccini et al., "Selection of the Best Elemental Type in the Finite Element Analysis of Hip Prostheses", Journal of Medical Engineering of Technology, vol. 24, No. 4 (Jul./Aug. 2000) pp. 145-148.
Nicholas, "Critical issues in high cycle fatigue", 1999, International Journal of Fatigue, vol. 21, pp. S221-S231.
Papageorgiou, G.L. and N.B. Jones, "Physical Modelling of the Arterial Wall. Part2: Simulation of the Non-Linear Elasticity of the Arterial Wall," J. Biomed. Eng. 9:216-21(1987).
Perry, M. D. and Chang, R. T., "Finite Element Analysis of Ni-Ti Alloy Stent Deployment," Proceedings of the Second International Conference on SMST, Asilomar Conference Center, Pacific Grove CA. USA (1997).
Perry, M. D. and Chang, R. T., "Finite Element Analysis of Ni—Ti Alloy Stent Deployment," Proceedings of the Second International Conference on SMST, Asilomar Conference Center, Pacific Grove CA. USA (1997).
Raboin "Computational Mechanics Moves Ahead", May 1998 Science & Technology.
Raghavan et al. .. Ex Vivo Biochemical Behavior of Abdominal Aortic Aneurysm: Assessment Using a New Mathematical Model, Journal of Biomedical Engineering 24:573-582 (1996).
Rebello et al.; "Finite element analysis for the design of Nitinol medical devices"; Pacific Consultants; 1999.
Rogers et al., "Balloon-Artery Interactions During Stent Placement: A finite element analysis approach to pressure, compliance and stent design as contributors to vascular injury", 1999 American Heart Association pp. 378-383.
Santosh et al., "Interface Mechanics in Lower-Limb External Prosthetics: A Review of Finite Element Models", 1996, IEEE Transactions on Rehabilitation Engineering, vol. 4 No. 4, pp. 288-302.
Simon et al. "Finite Element Models for Arterial Wall Mechanics" J. Biomechanical Engineering 115:489-96 (1993).
Speck et al., "GRIZ Finite Element Analysis Results Visualization for Unstructured Grids", Mar. 1996; Lawrence Livermore National Laboratory; contents, pp. 1-2, 21-27.
Stern et al., "Interactive Definition of Endoluminal Aortic Stent Size and Morphology Based on Virtual Angioscopic Rendering of 3D Magnetic Resonance Angiography (MRA)," Cars. Computer Assisted Radiology and Surgery, Proceedings of the International Symposium on Computer Assisted Radiology and Surgery:176-180 (Jun. 1999).
Tanaka et al. "Inelastic Constitutive Modeling of Arterial and Ventricular Walls," Computational Biomechanics Hayashi, Ishikawa (eds.) Springer Press pp. 137-163 (1996).
Taylor et al, "Finite Element Modeling of Three-Dimensional Pulsatile Flow in the Abdominal Aorta: Relevance to Atherosclerosis"; Annals of Biomedical Engineering; vol. 26; 1998; pp. 975-987.
Testi et al., "Risk of fracture in elderly patients: A new predictive index based on bone mineral density and finite element analysis," Computer Methods and Programs in Biomedicine, 60:23-33 (Jul. 1999).
Uflacker et al., "Endovascular treatment of abdominal aortic aneurysms: a review", 11:739-753 (2001).
Vito et al. "Stress Analysis of the Diseased Arterial Cross-section," 1990 Advances in Bioengineering American Society of Mechanical Engineers, Bioengineering Division (Publication) BED v.17, ASME:New York, (1990). pp. 273-276.
Witcher, F., "A Finite Element Treatment of the In-Vivo Loading Conditions of NITI AD Vascular Stent and Graft Structures," Proceedings of the Second International Conference on SMST, Asilomar Conference Center, Pacific Grove. CA, USA (1997).
Xu et al. "Coupled Modeling of Blood Flow and Arterial Interactions by the Finite Element Method," Proceedings of the Coml2uters in Cardiology 1993 IEEE Computer Society Press Sep. 5-8, 1993 pp. 687-690.
Zacek et al., "Numerical stimulation of the blood flow in the human cardiovascular system", (1995) Elsevier Science Ltd., pp. 13-20.
Zachariah et al., "Interface Mechanics in Lower-Limb External Prosthetics: A review of Finite Elemental Models", 1996 IEEE Transactions on Rehabilitation Engineering, vol. 4. No. 4, pp. 288-302.
US20070293756A1 (en) * 2006-06-16 2007-12-20 Searete Llc Specialty stents with flow control features or the like
US20090084844A1 (en) * 2006-06-16 2009-04-02 Jung Edward K Y Specialty stents with flow control features or the like
US8430922B2 (en) 2006-06-16 2013-04-30 The Invention Science Fund I, Llc Stent customization system and method
US8478437B2 (en) * 2006-06-16 2013-07-02 The Invention Science Fund I, Llc Methods and systems for making a blood vessel sleeve
US8831302B2 (en) * 2007-08-17 2014-09-09 Mohamed Rashwan Mahfouz Implant design analysis suite
US10145928B2 (en) * 2013-11-28 2018-12-04 Medimagemetric LLC Differential approach to quantitative susceptibility mapping without background field removal
Holzapfel et al. 2002 A layer-specific three-dimensional model for the simulation of balloon angioplasty using magnetic resonance imaging and mechanical testing
Kühnapfel et al. 2000 Endoscopic surgery training using virtual reality and deformable tissue simulation
Chen 1991 Pump it up: Computer animation of a biomechanically based model of muscle using the finite element method
Sacks et al. 2009 On the biomechanics of heart valve function
Dawson et al. 2000 Designing a computer‐based simulator for interventional cardiology training
Hsu et al. 2015 Dynamic and fluid–structure interaction simulations of bioprosthetic heart valves using parametric design with T-splines and Fung-type material models
EP1994482B1 (en) 2013-02-27 Virtual heart valve
Scotti et al. 2005 Fluid-structure interaction in abdominal aortic aneurysms: effects of asymmetry and wall thickness
Li et al. 2005 Blood flow and structure interactions in a stented abdominal aortic aneurysm model
Delingette 1998 Toward realistic soft-tissue modeling in medical simulation
Tzamtzis et al. 2013 Numerical analysis of the radial force produced by the Medtronic-CoreValve and Edwards-SAPIEN after transcatheter aortic valve implantation (TAVI)
Votta et al. 2013 Toward patient-specific simulations of cardiac valves: state-of-the-art and future directions
Morris et al. 2016 Computational fluid dynamics modelling in cardiovascular medicine
Perktold et al. 1995 Computer simulation of local blood flow and vessel mechanics in a compliant carotid artery bifurcation model
US7739090B2 (en) 2010-06-15 Method and system for 3D blood vessel localization
Cebral et al. 2005 Efficient pipeline for image-based patient-specific analysis of cerebral aneurysm hemodynamics: technique and sensitivity
Montgomery et al. 2002 Spring: A general framework for collaborative, real-time surgical simulation
Fernandez et al. 2005 An anatomically based patient-specific finite element model of patella articulation: towards a diagnostic tool
Taylor et al. 1996 Computational investigations in vascular disease
Huyghe et al. 1991 A two-phase finite element model of the diastolic left ventricle
Zhan et al. 2008 A finite element simulator for spine orthopaedics with haptic interface
Li et al. 2006 Analysis of biomechanical factors affecting stent-graft migration in an abdominal aortic aneurysm model
Weinberg et al. 2007 Transient, three-dimensional, multiscale simulations of the human aortic valve
Nobili et al. 2008 Numerical simulation of the dynamics of a bileaflet prosthetic heart valve using a fluid–structure interaction approach
Li et al. 2010 Association between aneurysm shoulder stress and abdominal aortic aneurysm expansion: a longitudinal follow-up study
Owner name: PARALLEL INVESTMENT OPPORTUNITIES PARTNERS II L.P.
Free format text: SHORT-FORM PATENT SECURITY AGREEMENT;ASSIGNOR:TRIVASCULAR, INC.;REEL/FRAME:029117/0323
Owner name: CAPITAL ROYALTY PARTNERS II L.P., TEXAS
Owner name: TRIVASCULAR, INC., CALIFORNIA
Free format text: RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNORS:CAPITAL ROYALTY PARTNERS II L.P.;PARALLEL INVESTMENT OPPORTUNITIES PARTNERS II L.P.;REEL/FRAME:037701/0097
Owner name: DEERFIELD PRIVATE DESIGN FUND IV, L.P., AS AGENT,
Free format text: SECURITY INTEREST;ASSIGNORS:ENDOLOGIX, INC.;NELLIX, INC.;TRIVASCULAR, INC.;REEL/FRAME:042141/0354
Owner name: DEERFIELD ELGX REVOLVER, LLC, AS AGENT, NEW YORK
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:DEERFIELD ELGX REVOLVER, LLC, AS AGENT;REEL/FRAME:045059/0971
Owner name: NELLIX, INC., CALIFORNIA
Owner name: ENDOLOGIX, INC., CALIFORNIA
|
cc/2019-30/en_middle_0053.json.gz/line4482
|
__label__wiki
| 0.633493
| 0.633493
|
US9076164B2 - Method and apparatus for performing targeted advertising in documents - Google Patents
Method and apparatus for performing targeted advertising in documents Download PDF
Walter Chang
Nadia Ghamrawi
Adobe Inc
2007-03-23 Application filed by Adobe Inc filed Critical Adobe Inc
2007-03-23 Assigned to ADOBE SYSTEMS INCORPORATED reassignment ADOBE SYSTEMS INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHANG, WALTER, GHAMRAWI, NADIA
G06Q30/0207—Discounts or incentives, e.g. coupons, rebates, offers or upsales
G06Q30/0225—Avoiding frauds
G06Q30/0255—Targeted advertisement based on user history
G06Q30/0256—User search
A method, apparatus and computer program product for performing targeted advertising in documents is presented. A document is identified as having advertisements associated therewith. A statistical ranking of terms derived from said document is received and at least one term is selected from the results to use as a keyword for associating at least one advertisement with the document. The at least one term is stored with the document. When the document is viewed, the document is identified as being enabled to have advertisements associated therewith. The at least one stored term is retrieved from the document and is submitted to an advertisement aggregator. At least one advertisement is received from the advertisement aggregator and is rendered with the document.
Conventional technologies for presenting advertisements to potential customers provide a variety of mediums in which to present those advertisements. For example, advertisements can be displayed electronically on web sites or via search engines. Advertisements can also be displayed on web sites, for example, via an advertisement banner. Additionally, advertisements can be displayed on search engines via a sponsored advertisement. Advertisers pay for the advertisements by choosing keywords or keyword phrases, and competing against other advertisers who also want their advertisements to appear on web sites relevant to those keywords or keyword phrases.
When an end user enters a web site containing advertisements, the advertisements (for which the advertisers have bid on keyword or keyword phrases) are displayed. The displaying of the advertisements is referred to as an ‘impression’. The advertisers do not pay for impressions. However, when an end user selects (i.e., “clicks”) on an advertisement, the advertiser is charged for that selection. The advertiser is charged whatever amount the advertiser bid on the keyword or keyword phrase that caused the displaying (i.e., impression) of the advertisement. Each time an end user clicks on the advertisement, the advertiser is charged for that selection. This is known as “pay per click” since the advertiser only pays for the advertisement when an end user selects (i.e., “clicks”) on the advertisement. Web site owners also receive a small amount of revenue each time an end user selects (i.e., “clicks”) on an advertisement that appears on the web site owner's web site.
Conventional computerized devices, such as personal computers, laptop computers, and the like utilize graphical user interfaces in applications such as operating systems and graphical editors (i.e., web page editors, document editors, video editors, etc.) that enable users to quickly provide input and create projects. In general, using a graphical user interface, a user operates an input device such as a mouse or keyboard to manipulate digital content on a computer display. The digital content is often represented as icons, and the user can operate an input device such as a mouse to move a mouse pointer onto an icon (i.e., graphically overlapping the icon on the graphical user interface). By depressing a mouse button, the application (such as the operating system desktop) selects the icon, and if the user maintains the mouse button in a depressed state, the user can drag the icon across the graphical user interface. By releasing the mouse button, the icon is placed on the graphical user interface at the current position of the mouse pointer. Using graphical user interface technology, users can create projects by dragging and dropping digital content (i.e., graphical objects, text, text boxes, images, videos, etc) into the project.
People can insert advertisements in their documents presently by selling space within the document, similar to how a magazine publisher would sell advertisement space in their magazine.
Prior art content providers manually provide a few keywords, Ad aggregators try to match with manually provided keywords advertisers provide with ad. Web Search engines use keywords contained in user queries to match against ad keywords of the ads in their pool of advertisers. Web based mail systems such as Gmail compare text in e-mail messages against a large pool of keywords and associated content to determine best ads.
Conventional mechanisms such as those explained above suffer from a variety of deficiencies. One such deficiency is that conventional advertisement mechanisms such as Adsense (available from Google) deals strictly with website content and places advertisements via dynamic advertisement insertion within the rendered web page. Adsense does not deal with non-website content documents such as Portable Document Format (PDF) documents, files created using a word processing application such as Microsoft Word or WordPerfect, files comprising slides created using Microsoft PowerPoint, files comprising drawings created by Visio or Micrografx, or the like.
In order to sell advertisements requires considerable effort similar to what a magazine publisher would do. The author of the document (e.g., a PDF file) would need to identify potential advertisement sponsors. The author would also need to design how much space the non-website content would have available for advertisement space. Next, the author would have to develop a business model for selling the advertisement space (e.g. identify the circulation numbers, target demographics, advertising rates, and the like). Further, if required for the business model or the potential advertisement sponsors, the author would have to conduct analysis of the reach and effectiveness of the market that the non-website content document reaches. The author would also be required to sell the advertisement space to the advertisement sponsors and insert the sponsor advertisements into the non-website content document.
The above process is costly (e.g., requiring potential market research, a sales team for the advertisements) is static and is not responsive to changes in market. Once an advertisement is inserted into a document, the advertisement it is there for good. As an example, if the advertisement sponsor goes out of business, the document author can only re-sell that advertisement space by creating a new document however, the old document is still out in the market. As another example, if an author has created a compelling document on a topic area, they may find that over time, more and more people would want to have an advertisement in that document and as such, the author could receive a higher rate for that same document over time. Further, the cost of proving in the value of the advertisement and tracking results is very high and can only reasonably be accomplished through sampling. This requires considerable effort, especially for document publishers who would view advertisements as a side benefit to publishing their content versus their entire business model.
Prior art attempts fail to directly and automatically analyze document content and then finds the most relevant ads to show with that content. Current search engine based targeted advertising schemes use search terms provided by the user to match advertisement keywords provided by an advertiser and display advertisements typically in a side panel. For website sidebar or banner advertising, the content hosting service finds advertisements from a pool of advertiser websites by matching advertisement keywords with website content keywords provided explicitly by the content author.
In targeted advertising models, advertisers provide keywords based on their products and the users they are targeting. Web content publishers independently provide keywords based on site topics and user demographics (profiles). The targeted advertising system then uses content/site keywords to find the best (most relevant) advertiser keywords to determine which ads to show on the site. We note that this is a process that requires a fair degree of manual input.
Once ads are selected, these ads are automatically placed on relevant content sites, and possibly within other products such as email programs and newsletters. Search engines such as Google have technology to scan the content and URL of a web page and then automatically display ads whose keywords are similar to the content of the page. As an example, if users look at a web page about building storage sheds, users may see Google ad keywords for storage sheds or tool sheds. Similarly, if a user views a page containing cake recipes, they may see ads about pie recipes, or delicious dessert recipes. Some targeted ad systems attempt to find the most appropriate content sites to display sponsored ads.
Prior art is thus either search engine and search keyword based, or relies on content keywords for websites. Current advertisement generation systems also include a method to present a time-dependent advertisement to a user based on search terms in a search query string during some period of time (e.g., U.S. Pat. No. 7,007,074). This system includes a search engine coupled to a web server for receiving the search query and for presenting a search results page. The search results page is accompanied with an immediate advertisement. The system includes an advertisement repository to store data representing multiple advertisements and includes the immediate advertisement as well as time-dependent advertisement. The system also includes a user profiling mechanism configured to communicate searcher characteristics and a data structure to store these search characteristics. An ad server is used to provide to the web server the immediate ad with an associated search results page and the time-dependent ad with a web page presented after the display of the search results page, until a period of time expires. We note again that users must provide both search keywords, and advertiser must provide ad keywords.
Except for Google GMAIL which finds advertisements based on user e-mail content, other prior art techniques fail to perform content analysis from within a document reader (such as Acrobat reader) or perform advertisement serving for an application other than a browser.
In targeted advertising models, advertisers provide keywords based on their products and the users they are targeting. Web content publishers independently provide keywords based on site topics and user demographics (profiles). The targeted advertising system then uses content/site keywords to find the best (most relevant) advertiser keywords to determine which ads to show on the site.
Embodiments of the invention significantly overcome such deficiencies and provide mechanisms and techniques that provide the ability for authors of documents to include dynamic, contextual targeted advertisements to their content. A user can review and edit a list of candidate advertisement terms received from a statistical ranking of terms derived from the document. The user can then select certain terms as keywords based on how well they return advertisements, and inject the selected advertisement terms back into the document. When the document with advertisement terms is distributed and opened in a reader such as Acrobat Reader, the reader advertisement plug-in uses the injected advertisement terms to find and show advertisements provided by one or more advertisement aggregators.
In a particular embodiment of a method for performing targeted advertising in a document, the method includes identifying a document for having advertisements associated therewith. Results from a of statistical ranking of terms derived from the document are received and at least one term is selected from the results to use as a keyword for associating at least one advertisement with the document. The at least one term is stored with the document.
In another particular embodiment, a method of rendering a document having advertisements associated therewith is described. The method includes identifying that the document has advertisements associated therewith. The method further includes retrieving at least one stored term from the document and submitting the at least one stored term to an advertisement aggregator. At least one advertisement is retrieved from the advertisement aggregator in response to the submitting the at least one stored term to an advertisement aggregator, and the at least one advertisement is rendered with the document.
Other embodiments include a computer readable medium having computer readable code thereon for associating advertisements with a document. The computer readable medium, in a particular embodiment, includes instructions for identifying a document having advertisements associated therewith. The computer readable medium further includes instructions for receiving results of statistical ranking of terms derived from the document and instructions for selecting at least one term from the results to use for associating at least one advertisement with the document. The computer readable medium additionally includes instructions for storing the at least one term with the document.
Yet other embodiments include a computer readable medium having computer readable code thereon for rendering a document having advertisements associated therewith. The computer readable medium includes instructions for identifying that a document is enabled to have advertisements associated therewith, and instructions for retrieving at least one stored term from said document. The computer readable medium further includes instructions for submitting the at least one stored term to an advertisement aggregator and instructions for receiving at least one advertisement from the advertisement aggregator in response to the submitting the at least one stored term to an advertisement aggregator. The computer readable medium additionally includes instructions for rendering the at least one advertisement with the document.
Still other embodiments include a computerized device, configured to process all the method operations, disclosed herein as embodiments of the invention. In such embodiments, the computerized device includes a memory system, a processor, communications interface in an interconnection mechanism connecting these components. The memory system is encoded with a process that provides targeted advertisements in documents as explained herein that when performed (e.g. when executing) on the processor, operates as explained herein within the computerized device to perform all of the method embodiments and operations explained herein as embodiments of the invention. Thus any computerized device that performs or is programmed to perform up processing explained herein is an embodiment of the invention.
Other arrangements of embodiments of the invention that are disclosed herein include software programs to perform the method embodiment steps and operations summarized above and disclosed in detail below. More particularly, a computer program product is one embodiment that has a computer-readable medium including computer program logic encoded thereon that when performed in a computerized device provides associated operations providing targeted advertising in documents as explained herein. The computer program logic, when executed on at least one processor with a computing system, causes the processor to perform the operations (e.g., the methods) indicated herein as embodiments of the invention. Such arrangements of the invention are typically provided as software, code and/or other data structures arranged or encoded on a computer readable medium such as an optical medium (e.g., CD-ROM), floppy or hard disk or other a medium such as firmware or microcode in one or more ROM or RAM or PROM chips or as an Application Specific Integrated Circuit (ASIC) or as downloadable software images in one or more modules, shared libraries, etc. The software or firmware or other such configurations can be installed onto a computerized device to cause one or more processors in the computerized device to perform the techniques explained herein as embodiments of the invention. Software processes that operate in a collection of computerized devices, such as in a group of data communications devices or other entities can also provide the system of the invention. The system of the invention can be distributed between many software processes on several data communications devices, or all processes could run on a small set of dedicated computers, or on one computer alone.
It is to be understood that the embodiments of the invention can be embodied strictly as a software program, as software and hardware, or as hardware and/or circuitry alone, such as within a data communications device. The features of the invention, as explained herein, may be employed in data communications devices and/or software systems for such devices such as those manufactured by Adobe Systems, Incorporated of San Jose, Calif.
The foregoing will be apparent from the following more particular description of preferred embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
FIG. 1 illustrates an example computer system architecture for a computer system that provides targeted advertisements with a document and rendering a document having targeted advertisements associated therewith in accordance with embodiments of the invention;
FIG. 2 is a bock diagram of a system for providing targeted advertisements with a document in accordance with embodiments of the invention;
FIG. 3 is a screen shot of a Graphical User Interface (GUI) showing results of a semantic analysis of terms used in selecting terms for associating targeted advertisements with a document in accordance with embodiments of the invention;
FIG. 4 depicts a flow diagram of a method of associating targeted advertisements with a document in accordance with embodiments of the invention;
FIG. 5 depicts a flow diagram of a method of selecting terms for associating targeted advertisements with a document in accordance with embodiments of the invention;
FIG. 6 depicts a flow diagram of a method of associating targeted advertisements with a document, securing the document and enabling or disabling serving in accordance with embodiments of the invention;
FIG. 7 depicts a flow diagram of a method of rendering a document having targeted advertisements associated therewith in accordance with embodiments of the invention;
FIG. 8 depicts a flow diagram of a method of determining a location for associating targeted advertisements with a document in accordance with embodiments of the invention; and
FIG. 9 depicts a flow diagram of a method of tracking revenue regarding an advertisement for a document having targeted advertisements associated therewith in accordance with embodiments of the invention.
FIG. 1 is a block diagram illustrating an example architecture 100 of a computer system 110 that executes, runs, interprets, operates or otherwise performs an targeted advertisement application 540-1 and a targeted advertisement process 150-2 suitable for use in explaining example configurations disclosed herein. The computer system 110 may be any type of computerized device such as a personal computer, workstation, portable computing device, console, laptop, network terminal or the like. An input device 116 (e.g., one or more user/developer controlled devices such as a keyboard, mouse, etc.) couples to processor 113 through I/O interface 114, and enables a user 108 to provide input commands, and generally control the graphical user interface 160 that the an targeted advertisement application 150-1 and an targeted advertisement process 150-2 provides on the display 102. As shown in this example, the computer system 110 includes an interconnection mechanism 111 such as a data bus or other circuitry that couples a memory system 112, a processor 113, an input/output interface 114, and a communications interface 115. The communications interface 115 enables the computer system 110 to communicate with other devices (i.e., other computers) on a network 120.
The memory system 112 is any type of computer readable medium, and in this example, is encoded with a targeted advertisement application 150-1 as explained herein. The targeted advertisement application 150-1 may be embodied as software code such as data and/or logic instructions (e.g., code stored in the memory or on another computer readable medium such as a removable disk) that supports processing functionality according to different embodiments described herein. During operation of the computer system 110, the processor 113 accesses the memory system 112 via the interconnect 111 in order to launch, run, execute, interpret or otherwise perform the logic instructions of the user selected advertising application 140-1. Execution of the targeted advertisement application 140-1 in this manner produces processing functionality in a targeted advertisement process 150-2. In other words, the targeted advertisement process 150-2 represents one or more portions or runtime instances of the targeted advertisement application 150-1 (or the entire targeted advertisement application 150-1) performing or executing within or upon the processor 113 in the computerized device 110 at runtime.
It is noted that example configurations disclosed herein include the targeted advertisement application 150-1 itself (i.e., in the form of un-executed or non-performing logic instructions and/or data). The targeted advertisement application 150-1 may be stored on a computer readable medium (such as a floppy disk), hard disk, electronic, magnetic, optical, or other computer readable medium. The an targeted advertisement application 150-1 may also be stored in a memory system 112 such as in firmware, read only memory (ROM), or, as in this example, as executable code in, for example, Random Access Memory (RAM). In addition to these embodiments, it should also be noted that other embodiments herein include the execution of the targeted advertisement application 150-1 in the processor 113 as the targeted advertisement process 150-2. Those skilled in the art will understand that the computer system 110 may include other processes and/or software and hardware components, such as an operating system not shown in this example.
A display 102 need not be coupled directly to computer system 110. For example, the targeted advertisement application 150-1 can be executed on a remotely accessible computerized device via the network interface 115. In this instance, the graphical user interface 104 may be displayed locally to a user 108 of the remote computer, and execution of the processing herein may be client-server based.
Referring now to FIG. 2, a block diagram of a system 200 for providing targeted advertising with documents is shown. The system includes content providers 202a and 202b, a third party content server 204, a reader 206, a server 208, a metadata database 210 and a plurality of ad aggregators 2121a-c. The resulting document 214 is also shown, having an advertisement 216 associated therewith.
In operation a content provider (e.g. content provider 202 a) provides a document to a content server 204. The document may be any type of document, such as Portable Document Format (PDF) documents, files created using a word processing application such as Microsoft Word or WordPerfect, files comprising slides created using Microsoft PowerPoint, files comprising drawings created by Visio or. Micrografx, or the like.
An application is used to read the document. In this example, Acrobat Reader 206 is used to read the document (a PDF document) from content server 204. The server 208 has access to a metadata database 210. In this PDF document, terms have been determined to use as keywords, and have been stored in the Extensible Metadata Platform (XMP) section of the PDF document. The terms are read from the XMP section of the PDF document and are submitted to an advertisement aggregator 212. The advertisement aggregator 212 then provides an advertisement 220 to be rendered with the PDF document. The document 218 is rendered and the advertisement 220 is rendered along with the document.
FIG. 3 is an example screen shot of a Graphical User Interface (GUI) showing received results of a statistical ranking of terms derived from a document. A description of a statistical ranking of terms from a document is described in detail in co-pending patent application Attorney Docket No. ADO07-006, entitled SEMANTIC ANALYSIS OF DOCUMENTS TO SELECT KEYWORDS, filed on even date herewith, and assigned to the same assignee as the present application, and which is incorporated by reference in it's entirety.
In this example, a graphical user interface (GUI) 250 is provided in the system to display and summarize results of the statistical ranking. In the shown example, a token is defined as any string comprising one or more of a “word” (including misspelled, or fictitious), some punctuation, abbreviation, number, etc. A term is defined as a contiguous grouping of tokens, a mention is defined as an instance of a term in a document, a term is “a word or concept with special significance”; i.e., a term (not just a token or word) that has been set apart, either automatically by an algorithm or by a person, as having special significance. This is not the same as a ranked term, as ranked terms have not been set apart from one another. A ranked term comprises a term with an associated score (used in this invention to help recommend terms).
In the GUI 250, document terms are shown with COUNT (frequency), text, positional (offset) standard deviation, and the actual AdScore ranking. In addition, the terms themselves are enabled so that the actual advertisements from the ad aggregator can be returned to determine how useful the recommended ad term is. COUNT 252 indicates the total occurrences of a specific term, NAME 254 is the term, CATEGORY 256 indicates what type of thing NAME is (person, place, thing, product), ADSCORE 258 is the result of the statistical ranking, AvgTokFreq 260 indicates the mean token frequency, STDDEV 262 is the standard deviation of the offsets of all mentions of the term.
Certain terms can be selected as keywords and a test run which displays the results obtained using the selected term. Inset 262 shows the actual advertisements 264, 266 that were returned using the selected advertisement term or phase (here Chemical Engineering).
Once terms are reviewed and tested, another set of GUIs allows a user to finalize the terms to use as advertisement keywords for a document. These are indicated by a checkbox. Selected finalists are then injected into the metadata portion of a document (e.g., the XMP section of a PDF) for inclusion in a document.
The final document is then optionally secured using a Digital Rights Management DRM system such as Adobe Policy Server (or other security type system) and is ready for distribution to readers. This may further include encrypting the terms. This may be used to prevent nefarious users from tampering with the terms such that the terms are not disabled or overwritten.
Advertisement serving can also be enabled or disabled at this point if advertisement terms are present. For example, if there is a subscription fee for having advertisements associated with a document, then if the fee has been paid and the subscription is up to date, advertisement serving can be enabled. However if the subscription has expired and/or the fees have not been paid, then advertisement serving can be disabled.
When a user receives/downloads the ad enabled document, the document is viewed in a reader such as Acrobat. The reader contains a plug-in that then retrieves the stored terms in the XMP metadata section of the document and submits the first (or selected subset) of these terms to the designated ad aggregator (e.g., Google or Yahoo.) The plug-in then reads the advertisement links that are provided by the ad aggregator and renders them in a special viewing panel which displays these links for the user to click on if he/she decides to visit the advertisers listed.
Flow charts of particular embodiments of the presently disclosed methods are depicted in FIG. 4 through FIG. 9. The rectangular elements are herein denoted “processing blocks” and represent computer software instructions or groups of instructions. Alternatively, the processing blocks represent steps performed by functionally equivalent circuits such as a digital signal processor circuit or an application specific integrated circuit (ASIC). The flow diagrams do not depict the syntax of any particular programming language. Rather, the flow diagrams illustrate the functional information one of ordinary skill in the art requires to fabricate circuits or to generate computer software to perform the processing required in accordance with the present invention. It should be noted that many routine program elements, such as initialization of loops and variables and the use of temporary variables are not shown. It will be appreciated by those of ordinary skill in the art that unless otherwise indicated herein, the particular sequence of steps described is illustrative only and can be varied without departing from the spirit of the invention. Thus, unless otherwise stated the steps described below are unordered meaning that, when possible, the steps can be performed in any convenient or desirable order.
Referring to FIG. 4, a flow diagram of a particular embodiment of a method 300 of associating targeted advertisements with a document in accordance with embodiments of the invention is shown. The method 300 begins with processing block 302 which discloses identifying a document for having advertisements associated therewith. The document may be any type of document, such as Portable Document Format (PDF) documents, files created using a word processing application such as Microsoft Word or WordPerfect, files comprising slides created using Microsoft PowerPoint, files comprising drawings created by Visio or Micrografx, or the like.
Processing block 304 states receiving results of statistical ranking of terms derived from the document. In a particular example, a graphical user interface (GUI) is provided in the system to display and summarize results of the statistical ranking. In the GUI, document terms are shown with COUNT (frequency), text, positional (offset) standard deviation, and the actual AdScore ranking.
Processing block 306 recites selecting at least one term from the results to use as a keyword for associating at least one advertisement with the document. In an example, once terms are reviewed and tested, another set of GUIs allows a user to finalize the terms to use as advertisement terms for a document.
Processing continues with processing block 308 which discloses storing the at least one term with the document. As shown in processing block 310, this may further include storing the at least one selected term in a metadata portion of the document. For example, terms can be determined and stored in the Extensible Metadata Platform (XMP) section of a PDF document.
Referring now to FIG. 5, a flow diagram of a particular embodiment of a method 320 of selecting terms for associating targeted advertisements with a document in accordance with embodiments of the invention is shown. The method 320 begins with processing block 322 which recites receiving results of statistical ranking of terms derived from the document. In a particular example, a graphical user interface (GUI) is provided in the system to display and summarize results of the statistical ranking. In the GUI, document terms are shown with COUNT (frequency), text, positional (offset) standard deviation, an d the actual AdScore ranking. .
Processing block 324 discloses providing a user interface display summarizing the results of the statistical ranking of terms derived from the document. For example, a graphical user interface (GUI) is provided in the system to display and summarize results of the statistical ranking.
Processing block 326 states displaying the terms with at least one of the group consisting of a count indicating the total occurrences of the text of the term within the document, a name indicating a specific term or terms, a positional standard deviation for the term within the document, and a ranking of the term. In the GUI, document terms are shown with COUNT (frequency), text, positional (offset) standard deviation, and the actual AdScore ranking.
Processing block 328 recites retrieving advertisements relating to the terms from an advertisement aggregator and determining how useful the recommended at least one term is. For example, the terms themselves are enabled so that the actual advertisements from the advertisement aggregator can be returned to determine how useful the recommended advertisement term is.
Referring now to FIG. 6, a flow diagram of a particular embodiment of a method 340 of associating targeted advertisements with a document, securing the document and enabling or disabling serving in accordance with embodiments of the invention is shown.
The method 340 begins with processing block 342 which discloses identifying a document for having advertisements associated therewith. The document may be any type of document, such as Portable Document Format (PDF) documents, files created using a word processing application such as Microsoft Word or WordPerfect, files comprising slides created using Microsoft PowerPoint, files comprising drawings created by Visio or Micrografx, or the like.
Processing block 344 states receiving results of statistical ranking of terms derived from said document. In a particular example, a graphical user interface (GUI) is provided in the system to display and summarize results of the statistical ranking. In the GUI, document terms are shown with COUNT (frequency), text, positional (offset) standard deviation, and the actual AdScore ranking.
Processing block 346 recites selecting at least one term from said results to use for associating at least one advertisement with said document. In an example, once terms are reviewed and tested, another set of GUIs allows a user to finalize the terms to use as advertisement terms for a document.
Processing block 348 discloses storing the at least one term with said document. For example, terms can be determined and stored in the Extensible Metadata Platform (XMP) section of a PDF document.
Processing block 350 states securing said document. As shown in processing block 352 this may comprise using a Digital Rights Management (DRM) system to secure the document. The final document can be secured using a DRM system such as Adobe Policy Server (or other security type system) and is ready for distribution to readers. This may be used to prevent nefarious users from tampering with the terms such that the terms are not disabled or overwritten.
Processing block 354 recites enabling advertisement serving and disabling advertisement serving when advertisement terms are stored with the document. For example, if there is a subscription fee for having advertisements associated with a document, then if the fee has been paid and the subscription is up to date, advertisement serving can be enabled. However if the subscription has expired and/or the fees have not been paid, then advertisement serving can be disabled.
Referring now to FIG. 7, a particular embodiment of a method 360 of rendering a document having advertisements associated therewith is shown. The method 360 begins with processing block 362 which discloses identifying that a document is enabled to have advertisements associated therewith. The document may be any type of document, such as Portable Document Format (PDF) documents, files created using a word processing application such as Microsoft Word or WordPerfect, files comprising slides created using Microsoft PowerPoint, files comprising drawings created by Visio or Micrografx, or the like.
Processing block 364 states retrieving at least one stored term from the document. Processing block 366 recites submitting the at least one stored term to an advertisement aggregator. For example, when a user receives/downloads the ad enabled document, the document is viewed in a reader such as Acrobat. The reader contains a plug-in that then retrieves the stored terms in the XMP metadata section of the document and submits the first (or selected subset) of these terms to the designated advertisement aggregator (e.g., Google or Yahoo.)
Processing block 368 discloses receiving at least one advertisement from the advertisement aggregator in response to the submitting the at least one stored term to an advertisement aggregator. Processing block 370 states rendering the at least one advertisement with the document. In one embodiment, the plug-in then reads the advertisement links that are provided by the advertisement aggregator and renders them in a special viewing panel which displays these links for the user to click on if he/she decides to visit the advertisers listed.
Referring now to FIG. 8, a flow diagram of a method 380 of determining a location for associating targeted advertisements with a document in accordance with embodiments of the invention is shown. The method 380 begins with processing block 382 which recites rendering the at least one advertisement with the document. The plug-in reads the ad links that are provided by the ad aggregator and renders them in a special viewing panel which displays these links for the user to click on if he/she decides to visit the advertisers listed.
Processing block 384 discloses identifying a location for the advertisement. As shown in processing block 386, this may include wherein the location for the advertisement comprises one of the group consisting of a location within the document for the advertisement and a location adjacent to the document for the advertisement.
Referring now to FIG. 9, a flow diagram of a method of tracking revenue regarding an advertisement for a document having targeted advertisements associated therewith in accordance with embodiments of the invention is shown. The method 390 begins with processing block 392 which states rendering the at least one advertisement with the document. The plug-in then reads the advertisement links that are provided by the advertisement aggregator and renders them in a special viewing panel which displays these links for the user to click on if he/she decides to visit the advertisers listed.
Processing block 394 discloses determining when an action is taken regarding the advertisement, and processing block 396 states tracking revenue from the action being taken regarding the advertisement. When an end user selects (i.e., “clicks”) on an advertisement, the advertiser is charged for that selection.
Having described preferred embodiments of the invention it will now become apparent to those of ordinary skill in the art that other embodiments incorporating these concepts may be used. Additionally, the software included as part of the invention may be embodied in a computer program product that includes a computer useable medium. For example, such a computer usable medium can include a readable memory device, such as a hard drive device, a CD-ROM, a DVD-ROM, or a computer diskette, having computer readable program code segments stored thereon. The computer readable medium can also include a communications link, either optical, wired, or wireless, having program code segments carried thereon as digital or analog signals. Accordingly, it is submitted that that the invention should not be limited to the described embodiments but rather should be limited only by the spirit and scope of the appended claims.
identifying, at a computer system, a document for having advertisements associated therewith;
receiving results of statistical ranking of terms derived from said document by the computer system;
selecting, at the computer system, at least one term from said results to use as a keyword for associating at least one advertisement with said document;
storing the at least one term in a metadata portion of said document at the computer system.
2. The method of claim 1 wherein said receiving results of statistical ranking of terms derived from said document further comprises providing a user interface display summarizing the results of the statistical ranking of terms derived from said document.
3. The method of claim 2 wherein said receiving results of statistical ranking of terms derived from said document further comprises displaying said terms with at least one of the group consisting of a count indicating the total occurrences of a specific term of said term within said document, a name indicating a specific term or terms, a positional standard deviation for said term within said document, and a ranking.
4. The method of claim 3 further comprising retrieving advertisements relating to said terms from an advertisement aggregator and determining how useful the recommended at least one term is.
5. The method of claim 1 further comprising securing said document using a Digital Rights Management (DRM) system.
6. The method of claim 1 further comprising encrypting said terms.
7. The method of claim 1 further comprising at least one of enabling advertisement serving and disabling advertisement serving when advertisement terms are stored with said document.
identifying, at a computer system, that a document is enabled to have advertisements associated therewith;
retrieving at least one stored term from a metadata portion of said document at the computer system;
submitting, from the computer system, said at least one stored term to an advertisement aggregator;
receiving, at the computer system, at least one advertisement from said advertisement aggregator in response to said submitting said at least one stored term to an advertisement aggregator; and
rendering the at least one advertisement with said document.
9. The method of claim 8 further comprising identifying a location for said advertisement, wherein the location for said advertisement comprises one of the group consisting of a location within said document for said advertisement and a location adjacent to said document for said advertisement.
10. The method of claim 8 further comprising determining when an action is taken regarding said advertisement.
11. The method of claim 10 further comprising tracking revenue from said action being taken regarding said advertisement.
12. A computer readable medium having computer readable code thereon, the medium comprising:
instructions for identifying a document for having advertisements associated therewith;
instructions for receiving results of statistical ranking of terms derived from said document;
instructions for selecting at least one term from said results to use for associating at least one advertisement with said document;
instructions for storing the at least one term in a metadata portion of said document.
13. The computer readable medium of claim 12 wherein said instructions for receiving results of statistical ranking of terms derived from said document further comprises instructions for providing a user interface display summarizing the results of the statistical ranking of terms derived from said document.
14. The computer readable medium of claim 13 wherein said instructions for receiving results of statistical ranking of terms derived from said document further comprises instructions for displaying said terms with at least one of the group consisting of a count indicating the total occurrences of a specific term within said document, a name indicating a specific term or terms, a positional standard deviation for said term within said document, and a ranking of said term.
15. The computer readable medium of claim 14 further comprising instructions for retrieving advertisements relating to said terms from an advertisement aggregator and determining how useful the recommended at least one term is.
16. The computer readable medium of claim 13 further comprising instructions for securing said document using a Digital Rights Management (DRM) system.
17. The computer readable medium of claim 13 further comprising instructions for encrypting said terms.
18. The computer readable medium of claim 13 further comprising instructions for at least one of enabling advertisement serving and disabling advertisement serving when advertisement terms are stored with said document.
19. A computer readable medium having computer readable code thereon for rendering a document having advertisements associated therewith, the medium comprising:
instructions for identifying that a document is enabled to have advertisements associated therewith;
instructions for retrieving at least one stored term from a metadata portion of said document;
instructions for submitting said at least one stored term to an advertisement aggregator;
instructions for receiving at least one advertisement from said advertisement aggregator in response to said submitting said at least one stored term to an advertisement aggregator; and
instructions for rendering the at least one advertisement with said document.
20. The computer readable medium of claim 19 further comprising instructions for identifying a location for said advertisement, wherein the location for said advertisement comprises one of the group consisting of a location within said document for said advertisement and a location adjacent to said document for said advertisement.
21. The computer readable medium of claim 19 further comprising instructions for determining when an action is taken regarding said advertisement.
22. The computer readable medium of claim 21 further comprising instructions for tracking revenue from said action being taken regarding said advertisement.
23. A computer system comprising:
a memory;
a communications interface;
an interconnection mechanism coupling the memory, the processor and the communications interface; and
wherein the memory is encoded with an application associating advertisements with a document, that when performed on the processor, provides a process for processing information, the process causing the computer system to perform the operations of:
identifying a document for having advertisements associated therewith;
receiving results of statistical ranking of terms derived from said document;
selecting at least one term from said results to use as a keyword for associating at least one advertisement with said document;
storing the at least one term in a metadata portion of said document.
24. The computer system of claim 23 wherein the computer system performs the operations of:
identifying that a document is enabled to have advertisements associated therewith;
retrieving at least one stored term from a metadata portion of said document;
submitting said at least one stored term to an advertisement aggregator;
receiving at least one advertisement from said advertisement aggregator in response to said submitting said at least one stored term to an advertisement aggregator; and
US11/728,069 2007-03-23 2007-03-23 Method and apparatus for performing targeted advertising in documents Active 2034-05-06 US9076164B2 (en)
US11/728,069 US9076164B2 (en) 2007-03-23 2007-03-23 Method and apparatus for performing targeted advertising in documents
US11/728,069 Active 2034-05-06 US9076164B2 (en) 2007-03-23 2007-03-23 Method and apparatus for performing targeted advertising in documents
US20040181525A1 (en) * 2002-07-23 2004-09-16 Ilan Itzhak System and method for automated mapping of keywords and key phrases to documents
US20050091106A1 (en) * 2003-10-27 2005-04-28 Reller William M. Selecting ads for a web page based on keywords located on the web page
US20050229258A1 (en) * 2004-04-13 2005-10-13 Essential Security Software, Inc. Method and system for digital rights management of documents
US20070198344A1 (en) * 2006-02-17 2007-08-23 Derek Collison Advertiser interface for entering user distributed advertisement-enabled advertisement information
US20080086779A1 (en) * 2006-10-04 2008-04-10 Gigamedia Access Corporation System and method for digital rights management with license proxy
Kannan 2017 Digital marketing: A framework, review and research agenda
US8533236B1 (en) 2013-09-10 Video-related recommendations using link structure
Wang et al. 2012 Identify online store review spammers via social review graph
US7890451B2 (en) 2011-02-15 Computer program product and method for refining an estimate of internet traffic
US7548929B2 (en) 2009-06-16 System and method for determining semantically related terms
AU2005231156B2 (en) 2008-10-30 Systems and methods for determining user actions
US8494897B1 (en) 2013-07-23 Inferring profiles of network users and the resources they access
US7225182B2 (en) 2007-05-29 Recommending search terms using collaborative filtering and web spidering
US8090625B2 (en) 2012-01-03 Extrapolation-based creation of associations between search queries and items
Hillard et al. 2010 Improving ad relevance in sponsored search
US9165055B2 (en) 2015-10-20 Automated creation and delivery of database content
US20080005313A1 (en) 2008-01-03 Using offline activity to enhance online searching
US20080189408A1 (en) 2008-08-07 Presenting web site analytics
US20080004884A1 (en) 2008-01-03 Employment of offline behavior to display online content
US7594189B1 (en) 2009-09-22 Systems and methods for statistically selecting content items to be used in a dynamically-generated display
US8200662B2 (en) 2012-06-12 System and method for application programming interfaces for keyword extraction and contextual advertisement generation
US9009152B2 (en) 2015-04-14 Smart widgets
US20050086105A1 (en) 2005-04-21 Optimization of advertising campaigns on computer networks
US20090112840A1 (en) 2009-04-30 Method For Selecting Electronic Advertisements Using Machine Translation Techniques
US8209320B2 (en) 2012-06-26 System and method for keyword extraction
US20090144141A1 (en) 2009-06-04 Feature-value attachment, reranking and filtering for advertisements
US20070027865A1 (en) 2007-02-01 System and method for determining semantically related term
US20110010244A1 (en) 2011-01-13 Sponsored application launcher suggestions
US8972282B2 (en) 2015-03-03 Method for transformation of a website
US20110145064A1 (en) 2011-06-16 Systems and methods for managing content associated with multiple brand categories within a social media system
Owner name: ADOBE SYSTEMS INCORPORATED, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHANG, WALTER;GHAMRAWI, NADIA;REEL/FRAME:019149/0311
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY
|
cc/2019-30/en_middle_0053.json.gz/line4483
|
__label__wiki
| 0.527696
| 0.527696
|
So You Think You Can Dance S11 Los Angeles Day 2 and Philadelphia Auditions
Los Angeles Day 2
Christina Applegate joined Mary Murphy and Nigel Lythgoe for day 2 of the LA auditions.
Serge Onik (age 25 from Upper Saddle River, NJ) made it to the green mile last season. He has a new partner this year, Alla Kocherga, a 24-year-old woman from Los Angeles. Five seconds in and I loved it. Goosebumps! Rarely does ballroom give me goosebumps. That had a sizzle finish. Mary loved it. They are through.
Timothy Joseph is a 24-year-old, B-boy dancer from Sacramento, California who specializes in “suicides.” He is fantastic. He reminds me of Legacy. Mary thinks he is fearless. He was flipping too much for this. They send him to choreography; however he hurt himself during the solo so he has a decision to make. He was in too much pain to continue.
Casey Askew, 19 years of age, a contemporary dancer from Seattle, Washington. Goosebumps! I loved watching him. He had such great emotion. I got more impressed the more he dances. They stop the music and give him a ticket.
After a montage of successes J4 might have a problem with his height. But he IS only 9. He wants to show him hip hop “for the experience.” Fik-shun and Cyrus join him on stage. This kid is fabulous! What a joy and talent he is. Everyone is on their feet. He was able to meet his idol Stephen ‘Twitch’ Boss. According to him, it was the best day of his life.
Her dance is for her brother who was struggling with addiction who is now sober and healthy. Jourdan Epstein, age 24, from Plymouth, Minnesota is fabulous. I again had goosebumps. She gave Christina chills. Mary puts her on the hot tamale train. She is through.
Johnny “Waackd” Gibson, age 22, from New York City. I think he had improved from his audition 2 years ago. It is a “yes” to choreography and from there he is through to the next round.
Armen Way is a 28-year-old from Glendale, California, who tried out in season 10. I was turned off by him last year. His dance appeared to be all about himself. He seemed to objectify women from this rap video they showed in his audition packet. Last year he was sent home because he dropped Malece Miller on her head. I LIKE this version of Armen better. This year he had a new partner, Malene Ostergaard, a 25-year-old from Studio City, California. She reminded me of Mila Kunis. That dance was hot and sexy. I felt that Armen’s attention was on his partner this time and the dynamic between them sizzled. Yep, I like this version of Armen much better. Mary Murphy talked the entire way through the dance about how impressed she was. What a dynamic couple they are. She felt Malene ran the hot tamale train straight off the tracks. Christina said people would love them both. They are through to the next round.
Philadelphia Day 1
Prima ballerina Misty Copeland joined Mary Murphy and Nigel Lythgoe during this audition.
Bridget Whitman, age 19, from Tempe, Arizona was up first. Her back-story was making me cry. One of her last memories of her dad before a tragic car accident killed him was her telling him that she wanted to be on the show. He told her that she could get there through a lot of hard work. I was sobbing. Mary Murphy was crying, too. Is she the best contemporary dancer I have seen during the auditions? No. But she does deserve a shot in the next round. Misty thinks she is a beautiful dancer. Mary can feel everything she is going through. She gets her ticket.
They then showed a montage of really fantastic male dancers.
Amir Sanders, age 21, is a self-described funky ballerina from Baltimore, Maryland. She is interesting from her look to her style of dance. It did not give me goosebumps, but I enjoyed it. Misty thinks her technique and lines are beautiful, but there were small moments she needs to focus on to improve. Mary thought for a moment it was like watching Diana Ross striking a pose. They sent her to choreography, which shocked both the audience and me. However, she does make it through to the next round after choreography.
Last year’s Jenna Johnson had a partner last season who was too young to audition. Landon Anderson, age 18, from Springville, Utah came back to audition (along with Jenna). He had some nice foot work but is he as strong as some of the other guys on the show? I don’t know about that. Mary thought he was a great partner. Misty said that he became someone else for dancing–like a little boy in speaking but a man in dancing. He gets a ticket to move to the next round. Jenna gets a surprise as well when Nigel extends to her an invitation to come back this season to be an all-star, something they don’t usually do when they were just contestants the prior year.
The last contestant for day 1 was Shafeek Westbrook. In season 9, he left with a really bad attitude. His words were “not coming back ever.” He hails from Upper Darby, Pennsylvania and is 24 years old. I loved his moves, but I was not sure why he felt the need to take his shirt off. Mary wanted more “wow” moments. Misty felt like he was trying to sell them his body versus his dancing. Nigel says yes to choreography. He makes it through to the next round after the choreography sessions.
Billy Porter joins the judging panel for this round of auditions.
First up is Stanley Glover. His mother died when he was 4 years old while he was sleeping next to her; she had a heart attack in her sleep and they found her dead in the morning. Both sides of his family failed to go to the court date that would decide guardianship of him. His mother’s friend, Margaret Chamberlain, stepped up and brought him into their home. He is a 19-year-old from Chicago, Illinois. His choreography was genius and for a moment the words “Shelob’s mate” popped into my mind. Or at least a creature from the show on the CW called “The 100.”
Krumper James “Banks” Davis was shot twice in his knee four years ago. They were about to amputate his leg but his pulse came back. He is from Brooklyn, New York, age 24. This gave me goosebumps. It was such a unique style of krumping. Way to represent Brooklyn (I was born there). Billy felt like he was a true storyteller and it was fantastic. He gets to go to choreography, but he does not get to the next round.
Dance Crews
This was a tough choice. It was between a Bollywood/Hip-Hop Dance Crew called Wanted Ashiqz versus a group of hip-hop street style called Mix’d Elements. I’m really torn between them. As of right now, we do not know the results of the vote.
Tags: Alla Kocherga, Amir Sanders, Armen Way, Bridget Whitman, Casey Askew, Christina Applegate, Cyrus, dance crews, Fik-Shun, Fox Broadcasting, J4, James "Banks" Davis, Jenna Johnson, Johnny "Waackd" Gibson, Jourdan Epstein, Landon Anderson, Legacy, Los Angeles, Malece Miller, Malene Ostergaard, Mary Murphy, Misty Copeland, Mix'd Elements, Nigel Lythgoe, Philadelphia, season 11, Serge Onik, Shafeek Westbrook, So You Think You Can Dance, Stanley Glover, Stephen 'tWitch' Boss, SYTYCD, Timothy Joseph, Wanted Ashiqz
Categories : Fox Shows, So You Think You Can Dance, So You Think You Can Dance, TV shows
So You Think You Can Dance S11 Chicago Day 2 and Los Angeles Auditions
Chicago Day 2
Joining Mary Murphy and Nigel Lythgoe for day 2 of the Chicago auditions was Fabrice Calmels from the Joffrey Ballet.
First up was “The Puppet” Paul Brushaber. He is 18 and from Mokena, Illinois. He makes it look so easy but I cannot imagine how difficult his style of dance is. I would send him to choreography just to give him an opportunity to partner with someone. The judges surprised me. Mary wanted to live in his world. Fabrice loved that he created his own style.
Emily James, a 21-year-old from North Kingstown, Rhode Island, auditioned twice before in seasons 8 and 9. She took season 10 auditions off so she could use her degree, but she discovered that it is dance is what she should be doing. I got a mini-set of goosebumps at times. She has power but there is something missing here. Maybe it was just nerves or maybe a disconnection of her dance to the chosen music emotionally. I remember when I first saw Melanie Moore and I knew she would be the winner. Melanie always extended her reach lines just a little bit further. But Emily had some interesting moves I have not seen others do. Fabrice said it was solid. She is through to the next round.
We are then shown a montage of people who get through, but they are cutting the audition features down it seems.
Next up is Franchesca Bass, an 18-year-old young lady from Crown Point, Indiana. I loved that she created this story behind her dance. It was unique and interesting. Nigel was mesmerized by her and she had fabulous techniques. Fabrice, too, thought it was unique and he really enjoyed it. She is through to the next round.
Jenna Scaccia is an 18-year-old trainee with the Joffrey Ballet and apparently has a slight crush on Fabrice. She is a ballet dancer but it looks more like contemporary with ballet mixed in. It was light and heavenly and I’d give her a ticket. And they do. Nigel said she had a good flow of movement and it was very beautiful. Mary said it was like she floated on a cloud. She made Fabrice proud; he loved it.
James Thomas is a hip-hop dancer who does contortion and bopping. He is from Chicago. This type of dance is always so freaky to watch (in a good way). Fabrice thought it was insane. He tells them that he knows other styles so they give him a yes to choreography. Choreography proved too much for him and he drops out.
Christina Applegate joined Mary and Nigel for this round of the auditions.
Jessica Richens from Yorba Linda, California did a jazz number. I loved the routine but I hope her “sexy” does not become a crutch. I think this particular audition was my favorite to watch so far of all the ones shown to date. Mary and Christina thought she could win the show and she is through.
I enjoyed Valerie Rockey‘s tap routine quite a bit. Mary said she was full of light and life. Christina said she wanted to look at her feet but she was drawn up to her face and then she saw what she was looking for in her expressions. She is through to choreography and from there she got through to the next round.
Jana “JaJa” Vankova is part of Phillip Cheeb’s animation crew who hails from the Czech Republic but now lives in Chatworth, California. She needs some lessons from Cyrus to get her animating to the next level. It was enjoyable. She is through to the next round.
The next contestant was a joy. Kyle Taylor is a 28-year-old man from Wichita, Kansas. He does popping in his home, but has never had professional guidance. I was amazed. Kyle just wanted to get a favorable opinion from other dancers. Kyle, I don’t know if my opinion counts, but that was hot! You were on fire! Nigel proposes a battle and Fik-Shun, Cyrus, and Legacy get up from the audience and join Kyle on stage for a little dance-off. I enjoyed this part so much. It made this guy’s day. He did such a great job that they give him a yes to choreography but he bowed out when he realized it was too much above his level.
Justine Lutz has experience in ballet and jazz but decides to do a contemporary routine for her audition. For a moment I was worried for her. For someone who has no experience in contemporary (and freely admitted this to the judges) who had the guts to do contemporary, it was beautiful. I had goosebumps. All three judges were standing and she is, of course, through to the next round.
Mauricio Vera and Deise Mendoza are in love. They are 27 and 23 respectively from Santa Barbara, California. I got goosebumps. Christina was in tears. She wanted to watch them all day long. Mary started crying. Off to the next round for both of them.
Hailee Payne is a 19-year-old from Roy, Utah. Her family is a lot of fun as well. I think Sonya Tayeh will LOVE getting her hands on her. I loved her hair (I want it). I also loved her dance. I will remember her because of the unique style that makes her stand out. I also liked her personality. That is a big part of the ability to win over people’s votes. It is not always being about the best dancer. She is through.
Sebastian Serra, a 24-year-old from Orlando, Florida, was fabulous! He was cut last year right before the green mile. I hope he makes it further this year.
Dani Platz‘s story of overcoming an eating disorder (and still fights these demons) between ages 16 and 18 was powerful. Her story was in her dance. She is such a brave young lady and a great role model for other dancers who starve themselves. Not only did I have goosebumps, but I was crying. I felt like she was broken and then at times healed and then broken and then healed throughout the entire dance. This is what I mean about having an emotional connection to the dance that I felt was lacking in Emily James. This is NOW my favorite dance shown to date. “Dance is like oxygen for the soul.” I loved that. Christina saw her story in her dance, too. She said she was healing through dance and it was beautiful. I was SHOCKED that they wanted to put her through choreography (and Christina was, too). But she fortunately made it through that round.
Marie “Poppins” Bonnevay is a popper who lives in North Hollywood, California and performs on the street. In doing such, she has to engage the audience in order for them to leave money to support herself. She utilized this skill during her audition with a very positive response as well. When she got close enough to the show’s previous contestants, Fik-Shun jumped up on stage and engaged with her. I love seeing this with the other dancers coming up and getting caught up in the moment (or if it is rehearsed, who cares about that). They need to keep this portion of it. She is moved to tears by it and she gets a ticket to the next round.
Breaksk8 versus Academy of Villains.
Breaksk8 was interesting but I liked the Academy of Villains better.
Tags: Academy of Villains, Breaksk8, Chicago, Christina Applegate, Cyrus, Dani Platz, Deise Mendoza, Emily James, Fabrice Calmels, Fik-Shun, Fox Broadcasting, Franchesca Bass, Hailee Payne, James Thomas, Jana "JaJa" Vankova, Jenna Scaccia, Jessica Richens, Joffrey Ballet, Justine Lutz, Kyle Taylor, Legacy, Los Angeles, Marie "Poppins" Bonnevay, Mary Murphy, Mauricio Vera, Nigel Lythgoe, Paul Brushaber, season 11, Sebastian Serra, So You Think You Can Dance, SYTYCD, The Puppet, Valerie Rockey
So You Think You Can Dance — Top 6 Performance
After tomorrow night’s show, we will be down to our final 4 contestants and our season finale show. Last week we said goodbye to our favorite J’s: Jordan and Jess. Each was the consummate professional full of gratitude the journey and for the fans. Even for a brief moment when Jordan looked like she was about to fall apart, she took a deep breath and remained positive and hopeful for her career, a trail both will blaze after the tour.
2011 So You Think You Can Dance Top 6 --Season 8
Guest judges for this evening were the lovely Christina Applegate, and the loquacious Lil’C. They discussed the stupendous success of National Day Dance on July 30, 2011. Perhaps it needs to be renamed “International Dance Day” as people across the world celebrated dance, including physicists in Switzerland. Although not shown on the show this evening, even Vancouver, BC got into the fun.
Dancers: Melanie and all-star Twitch Boss
Song: “Roman’s Revenge”
Artist: Nicki Minaj featuring Lil Wayne
Choreographers: Napoleon & Tabitha Dumo (aka NappyTabs)
Style: Hip-hop
Story: Little Red Riding Hood with a twist
Melanie did well, but I’ve seen some of the other ladies do a better job with hip-hop. The routine was weird. I might have liked it better if in the end she would have slay the big bad wolf versus tame him, but that is the choreography and not the dancers. I think she might have needed to be lower to the ground. Lil’C felt she got off to a rough start but found her ghetto groove and ascended. Christina agreed with Lil’C. Mary felt she was on fire. Nigel loved the dance as well. He confronted internet allegations that Melanie has never been given a dance out of her style, but he dispelled that quickly, saying she was good at everything. Itsy bitsy problem with that. If they are randomly drawing dance styles out of a hat, and last week the talk on the internet was the biggest it’s been about this issue, and she suddenly gets hip-hop, it doesn’t help the argument that these dances are random. It is, however, one of these no-win situations. You will have a group of people who will believe it and some that will not, and like politics, there is no changing anybody’s mind about it.
Dancers: Sasha and all-star Kent Boyd
Song: “Fool on Me”
Artist: Me’Shell Ndegeocello
Choreographer: Tyce DiOrio
Story: Two people who have hit a wall in their relationship and the emotions you go through when someone hurts you.
During the rehearsal taping about the song, Sasha began to cry. The meaning of the dance runs deep for her and I was sure it would come through in her dance–and it did. I had goosebumps but I lost my breath at the moment of the lift that had her legs upside down on the wall, a great symbolism for how upside-down you can feel when you are hurting inside when someone you love hurts you. You love them, you hate them, you want them stay, you want them to go. All the feelings are taken the n’th level. Sometimes you can bust through that wall and sometimes you cannot. I love when Tyce choreographs dances like this (like the dance he created for his friend who had cancer, danced who beautifully by Ade and Melissa). They have a way of reaching a place deep inside your soul that is universal to everyone. Christina described the difference between technicians of dance and dancers like Sasha who can affect your heart, and thanking her for being so courageous as to share with us whatever it was that hurt her so badly in this life. Mary called her intoxicating and got all choked up about the move of when Kent threw her to the floor, and that it only matters that you get back up. When she said that, I was thinking of Mary’s courageous battle with her thyroid cancer. Nigel also complimented Tyce, as did Mary, at this routine being at his best, as was Sasha. Sasha then won Nigel’s “favorite” dancer something that he ping-pongs between Melanie and Sasha. Lil’C was trying not to cry, having identified personally with the dance with experiences in his own life. He wishes that he could have worked with Sasha this season and called her phenomenal. Oh, and did I mention, first kiss on tonight’s show. The kissing season, season 8.
Dancers: Marko and all-star Janette Manrara
Song: “Zorongo” (Traditional)
Artists: Antonia Gomez, Ely “La Gambita”, Guillermo Basilisco and Paco Pena
Choreographer: Dmitry Chaplin
Style: Paso doble
Story: Marko is the matador and Janette is an activist trying to keep him away from killing the bull. (I laughed).
I didn’t recognize Dmitry with his beard. Has it been that long? You have to been pretty beautiful and passionate to sway a matador from his mission. How could Janette be ignored? I had a problem at first with that story stuck in my head since we are so used to the woman being the bull or the cape, but after a minute, I concentrated on the actual dance and let the story go. After Cat drew comparisons to the matador costume and Mary Murphy’s shoulder pads, she complimented him for being spot-on at the arrogance that was necessary for the dance. She pointed out that he lost his footing from time-to-time, but most of the time, he nailed it. Nigel loved the twirls that mimicked the movement of the matador’s cape (as did Mary). However, Nigel said it left him feeling cold. He was looking for more passion. I think it is difficult to bring a ballroom routine up against a brilliantly danced contemporary piece. It’s like coming back from San Diego Comic Con. You are on this incredible high and then–CRASH–everything around you seems so boring and mundane. Lil’C loved his stoic performance which was necessary to this particular dance. Christina wanted him to drop it down a little (lower in his crotch level), but loved the bravado.
They took a break in the action to listen to messages from home. The love and pride of all the contestants’ families touched my heart and my tear ducts. Then Ricky took the stage to dance his solo to “After Tonight” by Justin Nozuka. It was lovely.
Dancers: Tadd and all-star Ellenore Scott
Song: “The Gulag Orkestar”
Artist: Beirut
Choreographer: Sonya Tayeh
Style: Contemporary?/Jazz?
Story: A period piece where everyone was prim and proper, but once they touch, everything gets thrown out the window and becomes with wild, reckless, lustful.
Sonya Tayeh is the goddess of strange and Ellenore was the perfect all-star to fill that role. I was not feeling the passion that Sonya demands from her dancers coming from Tadd. The spin on the chandelier was reminiscent of Cirque de Soleil. It was an interesting prop. Nigel had no words and said he felt like it needed more time to develop, that he was left “hanging.” (Oh, Nigel, you make me laugh). Lil’C complimented Sonya’s talent of showcasing a dancer’s unique abilities. He felt like Tadd was just going through the movements instead of making them last a lifetime. Christina likes the dirtier side of dance, and complimented Tadd that he is a b-beat pointing his toes and how great is that. Mary felt Tadd was still growing and complimented Sonya’s trust in doing such a dangerous thing with a prop.
Next was Caitlynn’s mom sharing that she one day said she was going to be on this show. Via the internet, Caitlynn’s dad, away on business, shared his pride. Caitlynn then performed her solo to “What’s Love Got to Do With It” by Katie Thompson. Afterwards, Caitlynn was crying, moved from the words from her parents, the song, the moment or all the above.
Dancers: Ricky and all-star Jaimie Goodwin
Song: “Inside These Lines”
Artist: Trent Dabbs
Choreographer: Dee Caspary
Story: A couple trying to stay together, but he feels her slipping away so he tries to control her. (I call this The Puppetmaster.)
I noticed that when Ricky was close to Jaimie during the routine, he didn’t extend himself as you would see him do when they were apart. Perhaps he was concentrating on the sticks and not hurting his partner. While the sticks did enhance the routine, you can’t forsake the dance for the prop. At the end of the dance, Jaimie did what I was hoping–she took the sticks and threw them to the ground. Lil’C gave props to him and the props (and Cat Deeley just stole my line, damn). As usual Lil’C had a mouthful, “What a magically, magnificent puppeteer of physically rhythmic artistry you are.” In other words, buckness. Christina said he was a beautiful dancer, but wanted to help him grow and said he does not always dance with the clearest intention, like a push and a pull, like when he reached for Jaimie, it was harder to let her go away from him. That would help take him up another notch, which was great advice. Mary added, “All of that” plus that it was beautiful, free-flowing movement. Nigel loved the story of the dance from Dee. The only advice Nigel had to help Ricky was that he wants him to feel the movement more in his gut because he is so up and high in his dancing.
Tadd’s parents, and his entire Filipino community, are very proud of his accomplishments (and the first story that did not make me cry but smile). His song selection also made me laugh, “We Speak No Americano” by Yolanda B Cool and DCup. Tadd’s solos have always been interesting in that he is a b-boy and he chooses all these songs from eras past that make for a weird and wonderful combination. It has become his signature.
Returning from the break, Sasha’s solo was shown but not before her parents got to boast about their beautiful, bubbly baby girl. I smiled, too, when I saw Sasha picked “Teeth” by Lady Gaga after she received such high praise from Lady Gaga last week (and her shoe!). Again she did a terrific job.
Dancers: Caitlynn and all-star Pasha Kovalev
Song: “Drop It Low (District 78 Remix)”
Artist: Kat DeLuna
Style: Samba
Story: None, just sexy, great music and being sexy.
Pasha and Dmitry behind one dance? Wow. Double boiler kind of hot. Was it sexy? YES IT WAS! Was there great music. YES , THERE WAS! And was it really sexy? SIZZLING. At that precise moment, I desperately wished to have use of the communication stones that are used in the show Stargate Universe (where people can swap consciousness with another body–yes, I’m a geek). I wanted to be dancing with Pasha. Be still my heart. Wait, this is about Caitlynn. She did a fabulous job. I have to remind myself she is just a senior in high school (or was). Christina loved it. Mary thought it was great, especially on the reverse samba rolls. Her only criticism were some of her facial expressions. Nigel ad Lil’C had similar advice.
Marko’s mother was very emotional about his journey to the show. Dancing to “Wonderful World” By James Morrison, Marko combined a lot of technique with acrobatics. I always enjoy his solos.
Then Melanie’s mother had a message for her. Instead of talking, she sang; instead of walking, she danced. Melanie chose to dance to “Cracks (Flux Pavilion Remix)” by Freestylers featuring Belle Humble. Some truth rang to me with the name “Belle” and “Humble” to describe Melanie. Her solos have become more complex as she incorporates what she has learned over the weeks into her dance. She is both beautiful and humble. It was the best solo of the night.
Dancers: Sasha and Ricky
Song: “Schoolin’ Life”
Choreographer: Kumari Suraj
Style: Waacking
Story: None.
Waacking is a new style of dance to SYTYCD, the origins from Los Angeles in the 1970’s. It’s about the individual and who you are right now in your life. It’s about skill, precision and control. After watching the routine, it does bring fond memories of the 70’s back to me. Sasha was great; Ricky less so. He was too stiff once again. I would have hoped he would have taken to heart the earlier critique and applied it to this dance. Mary never liked this type of dance until Samara “Princess” Lockeroo, who was the first to audition and win to a ticket to Vegas with this type of dance. She felt like Sasha had the edge in the dancing. Both were out of their styles, but neither could take it to Princess Lockeroo’s level. Nigel says when Ricky is thinking about dancing, he does lose a little bit. Then Nigel took a comment that they said to Caitlynn and applied it to Sasha, saying she did not have to act sexy because she is sexy. Oops! Lil’C wishes both of them would have enjoyed it more because he felt they were so focused on the steps and speed. Christina enjoyed it and thought perhaps they could have “whacked it harder.” She’s so funny.
Dancers: Melanie and Tadd
Song: “(Where Do I Begin) Love Story (Away Team Mix)
Artist: Shirley Bassey
Choreographer: Spencer Liff
Style: Broadway/Jazz?
Story: A rehearsal within a rehearsal. Tadd uses Melanie’s crush on him to bring out the best dance in her, but she discovers her feelings are not reciprocated.
They paired well together. It was a lovely dance that did not affect me on any emotional level but just was fun to watch. The use of the mirror where Melanie’s hands touched it and it got these weird distortions to it made me think, yes, just like the relationship between this dancer in the dance and the choreographer in the dance, played by Tadd. The relationship is not what it seems to be to Melanie’s character. I look for meaning sometimes that may or may not be in subtle things. Lots of prop use tonight. Cat compared it to “Black Swan” (which I have not seen yet). Nigel complimented Melanie on her solo as the best solo across all the seasons. She is not only the original beast, but a great actress and a great dancer. She now stole Sasha’s earlier place of the evening and is now Nigel’s favorite again. I think if SYTYCD could have a tie, he would be happy having the two of them there. To Tadd he said, “…to say you didn’t suck is a compliment.” He pointed out the things he did well in the routine. Lil’C says Melanie has a quiet fire and Melanie is EXTREMELY buck. Lil’C also wanted to give accolades to her solo performance that it was so beefy. And as an afterthought, he told Tadd he was growing by leaps and bounds and to continue doing so. Christina also commented on her solo, saying they were all banging on the table. She described Melanie’s performance as being better than that of Donna McKechnie in “A Chorus Line.” Tadd continues to surprise Christina with his technique since he is a b-boy. Mary says America has fallen in love with them and they are brilliant in their styles. She got all choked up that she was able to be here for this wonderful season to see it.
Dancers: Caitlynn and Marko
Song: “Heavy in Your Arms”
Artist: Florence and the Machine
Style: Jazz
Story: Marko is a controlling, overbearing man and Caitlynn is trying to break free.
Perfect song to close the show. This was dynamite and gave me goosebumps. It was much better than the Puppeteer routine performed by Ricky. My breaths felt heavy of the weight of this relationship. The judges were standing in ovation of their performance. Lil’C thought this was double-hashtag buck (#buck #buck or ##buck)? “Reckless and convicted, it was murderous,” according to Lil’C. Translation: Lil’C loved it. Christina makes Marko join the beasts. Christina believes that was Caitlynn’s moment (maybe, but she had one with Mitchell, too). Mary thought it was Caitlynn’s best routines ever. She brought the grit to it and brought it to another level. Marko is Mary’s favorite dancer (I bet Mary and Nigel have a friendly bet going on the side as to who is going to win). Nigel thought this routine redeemed Sonya from her earlier Cirque de Soleil choreography. Regarding Caitlynn, she came of age today, he felt. She is a brilliant dancer. Marko is sensation. Cat added, “But you’re very pretty, too” to Marko.
Common sense would dictate that Marko, Melanie, and Sasha will be in the top 4. Up in the air is whether Tadd or Ricky gets into the final 4. Or we could use any number of science-fiction shows and their technologies to merge Ricky and Tadd into 1 dancer to get Radd or Ticky so we don’t have to make up our minds. Of course, it would be temporary….unless…well, they are wearing a red shirt that evening. What do you say?
Stay tuned tomorrow about more news regarding Miranda’s and Jordan’s fan clubs and what they are doing to show them their love.
Tags: "(Where Do I Begin) Love Story (Away Team Mix)", "After Tonight", "Antonia Gomez Ely "La Gambita" Guillermo Basilisco and Paco Pena", "Beirut", "Cracks (Flux Pavilion Remix)" "Freestylers featuring Belle Humble", "Drop it Low (District 78 Remix)", "Fool on Me", "Heavy in Your Arms", "Inside These Lines", "James Morrison", "Justin Nozuka", "Kat DeLuna", "Me'Shell Ndegeocello, "Nicki Minaj featuring Lil Wayne", "Roman's Revenge", "Schoolin Life", "Shirley Bassey", "Teeth", "The Gulag Orkestar", "Trent Dadds", "We Speak No Americano", "What's Love Got to Do With It", "Wonderful World", "Yolanda B Cool and D Cup", "Zorongo (Traditional)", 8 Emmy nominations, Adam Shankman, Adele, Alexander Fost, Alhambra, all-star, all-stars, Allison Holker, Antioch, Atlanta, Bakersfield, ballroom, beasts, Beyonce, bottom 2, bottom 3, Broadway, Brooklyn, buck, California State University, Cat Deeley, cheerleading, Chicago, choreographers, Chris Koehl, Christina Applegate, Clarice Ordaz, contemporary, Dallas, Dee Caspary, Dmitry Chaplin, Ellenore Scott, Filipino, Florence and the Machine, forgiveness, Fox 26 Houston, Fox Broadcasting, Fox VIP, fun, Georgia, Guam, hazing, hip-hop, Hot Tamale Train needs more room, initiations, Iveta Lukosiute, Jaimie Goodwin, Janette Manrara, Jason Gilkison, jazz, Jess LeProtto, jive, Jordan Casanova, Katie Thompson, Kent Boyd, Kumari Suraj, Lady Gaga, Lil'C, Lithuania, Little Falls, little red riding hood, Long Beach, Los Angeles, making history, Marietta, Marko Germar, Marko reads romance novels, Mary Murphy, Miranda Maleski, Missy Morelli, Morgan Hill, Moses Lake, NappyTabs, National Dance Day 2011, New Jersey, New York, Nick Young, Nigel Lythgoe, not a drag queen, outdoor activities, Pasha Kovalev, paso doble, peace, pop jazz, puppetmaster, Ricky Jamie, Robert Taylor Jr., ruing, rumba, Ryan Ramirez, Sacramento, Salt Lake City, samba, San Francisco, Sasha Mallory, siren, So You Think You Can Dance, solos, Sonya Tayeh, Spencer Liff, SYTYCD, Tabitha and Napoleon Dumo, Tadd Gadduang, Tampa, Texas, tomboy, Twitch, Twitch Boss, Twitter, Tyce Diorio, waacking, Wadi Jones, Washington State, Whacking
Categories : So You Think You Can Dance
|
cc/2019-30/en_middle_0053.json.gz/line4485
|
__label__cc
| 0.516469
| 0.483531
|
How Does Windows 10 Improve Security and Data Protection?
Windows 10 comes a step closer to preventing cyberattacks and privacy threats facing users. It’s a next-generation solution that helps you fight threats from hackers and criminals who target your business. This is a big plus for cybersecurity managers. The past several years have brought some of the worst and most frequent cyberattacks in history. Security professionals are constantly on the lookout for new ways to prevent network breaches and safeguard the data of clients and the enterprise. Let’s take a closer look at how Windows 10 can help.
What Are the Security Advantages of Window 10?
Microsoft introduces Windows as a service in this version of their OS. It includes a unique way of creating, implementing and maintaining Windows. Each update adds new features to protect the security and privacy of users. The idea is that protection is layered into the functionality so that it doesn’t affect performance or distract users.
Windows; Core Services Engineering and Operations is thus better able to protect data and privacy. Built-in features identify suspicious activity that can put your business in jeopardy. This helps your security team detect and block sophisticated attacks faster. Releases focus on adding new features that combat new or anticipated risks. This is all possible thanks to the software giant’s finger on the pulse of the latest ransomware and malware hitting around the globe.
Windows 10 is considered to be the most secure version yet released. Because Microsoft has addressed cyberattacks during the engineering phase, improved security itself becomes a major bulwark, protecting your system from files and executables sent by hackers.
How Does Windows 10 Protect Your Data Better?
Here are some of the ways that Windows 10 improves its protection, including the new tools that can detect threats:
Windows 10 disrupts malware and thwarts hackers by changing the playing field. Bad actors can’t attack systems in the same old ways.
Device Guard acts as a shield against malware by allowing you to block unwanted apps. This gives users a proactive way to prevent ransomware and malware attacks as well as spyware.
Windows Defender uses machine learning, the cloud and behavior analysis to respond to new threats. This is like having a smart guard dog that not only prevents intruders from entering but smells them coming a mile away.
Microsoft Edge systemically disrupts malware, phishing and hacking attacks so that fewer threats make it through the system to trick users.
Windows 10 has aggressive data protection that meets compliance requirements without slowing down users, who expect the same solid performance Windows has always offered.
Windows Information Protection contains business data so it cannot be leaked to unauthorized users via apps, docs and the web.
BitLocker helps your security team protect sensitive data from prying eyes. Military-grade encryption takes over when a device is lost, stolen or otherwise compromised.
Azure Information Protection partners with Windows Information Protection to assign permissions that govern how certain data is shared.
What Ways Does Windows 10 Protect User Identify?
Windows 10 has built-in identity and access management protocols. This advanced technology safeguards user identities. For example, Windows Hello presents an alternative to passwords. It uses many factors to achieve solid security, such as a PIN, biometrics and a companion device.
Credential Guard uses NTLM-based authentication protocols, while Windows pass the hash (PtH) method authenticates without displaying the user’s text when a password is being entered. There’s also a hardware-based component that also limits access.
What Does This Additional Protection Mean for Security Teams?
While 57% of organizations offer training and incentives to security recruits, it’s hard to keep these resources for very long. This is due mainly to the high demand for qualified candidates. With additional protection built into applications themselves, busy cybersecurity teams can concentrate on other crucial tasks to protect the company’s data and reputation.
I keep coming back because you get my computers fixed, are honest, and great with follow up questions! Keep your eyes on your customer service and you will be in business for a very long time!
Todd Butler
|
cc/2019-30/en_middle_0053.json.gz/line4486
|
__label__cc
| 0.57651
| 0.42349
|
Teeing it up for The Topgolf Tour
By Caroline Jerome
| Jul. 26, 2016
Armed with inflated egos, perfected golf games and lots of water, the Associates of Topgolf’s Home Office and DFW venues were ready for a competition unlike anything before. The Topgolf Tour in all its glory was played at Topgolf The Colony just a couple weeks ago. We learned a great deal from this dry run, but the most important thing we learned was how much FUN our Associates were having competing against each other outside of the office.
Joining in on the fun at the last minute, my partner and I barely knew each other before playing together. Not surprisingly, we hit it off and had a blast competing and chatting with the other Home Office Associates in and around our bay. It was so different from any golf competition I’ve ever played; there was upbeat music playing throughout the venue, there wasn’t a separate teebox for men and women, and there was so much riding on every shot because of the match play component.
Topgolf was the first game we played, alternating every other shot. However, the struggle was definitely real when it came to TopDrive. Fortunately, we came back and totally slayed at TopPressure. After signing our scorecard and turning it in, we were sure that we would be heading into the next round.
That is until we saw the bomb scores that some of these guys’ teams posted for all to see. It was clear that these teams were experiencing the thrill of victory and us, the agony of defeat. We were out of the tournament, but there were still eight teams in contention for the title.
Fast forward to the championship round and we have our ultimate Topgolf Tour Associate Tournament champs! It came down to the wire, but the underdogs, Team Ketner/Ketner from Topgolf Allen scored the win with some clutch shots against their opponents.
Congrats, guys, and a big thanks to all Associates who came out and helped! We couldn’t have done it without you.
Now it’s YOUR turn to play on The Topgolf Tour. Winners from each region will compete in Topgolf’s newest Venue in Las Vegas for a chance to win $50,000! For more information or to register for your regional tournament, please go to tour.topgolf.com.
Caroline Jerome
Caroline is a graduate from Baylor University and serves as the communications coordinator for Topgolf. She enjoys an unlimited amount of sweet tea, reading, travelling, country music and Mexican food (always willing to pay extra for guac). An avid golfer herself, Caroline can be found swinging at Topgolf or at a traditional golf course in the DFW area.
|
cc/2019-30/en_middle_0053.json.gz/line4488
|
__label__wiki
| 0.929521
| 0.929521
|
All articles with unsourced statements, Morris, Companies founded in 1910,
1952 disestablishments
Defunct motor vehicle manufacturers of the United Kingdom
Defunct Brands UK
Morris Motor Company
See also: Morris Commercial Cars
1952 (marque used until 1984)
Cowley, Oxford, Oxfordshire, England
The former Morris engine factory, now called The William Morris Building, part of Coventry University. (photo 2007)
Morris Cowley 2-Seater
1927 Morris Cowley
1928 Morris Minor Saloon
1933 Morris 10/4
1946 Morris Ten Series M
1953 Morris Minor Series 2
1955–59 Morris FE-series van
1971 Morris 1000 Traveller
1976 Morris Marina in England
Morris badge, on a Royal Mail van
The Morris Motor Company was a British car manufacturing company. After the incorporation of the company into larger corporations, the Morris name remained in use as a marque until 1984 when British Leyland's Austin Rover Group decided to concentrate on the more popular Austin marque. The trademark is currently owned by the China-based automotive company SAIC after being transferred from bankrupt subsidiary Nanjing Automotive.
Early history Edit
The Morris Motor Company was started in 1910 when bicycle manufacturer William Morris turned his attention to car manufacturing and began to plan a new light car. A factory was opened in 1913 in a former military college at Cowley, Oxford, United Kingdom, and the company's first car, the 2-seat Morris Oxford "Bullnose" was introduced.[1] Nearly all the major components were bought-in, with only final assembly being undertaken in the Morris works. In 1914 a coupé and van were added to the line-up but the chassis was too short and the 1018 cc engine too small to make a much-needed 4-seat version of the car. White and Poppe, who made the engine, wanted more money than Morris was prepared to pay for a larger version, so the company turned to Continental of Detroit, Michigan, United States for supplies of a 1548 cc unit.[1] Gearboxes and axles were also sourced in the US. In spite of the outbreak of the First World War the orders were maintained and, from mid-1915 a new larger car, the 2-seat and 4-seat Morris Cowley was introduced.
Inter War years Edit
After the war the Continental engine was no longer available, so Morris arranged for the French company Hotchkiss to make a near-copy in their Coventry factory. This was used to power new versions of the basic Cowley and more up-market Morris Oxford cars. With a reputation for producing high-quality cars and a policy of cutting prices, Morris Motor Company continued to grow and increase its share of the British market and, in 1924, overtook Ford to become the UK's biggest car manufacturer, holding a 51% share of the home market. They had a policy of buying up suppliers with, for example, Hotchkiss in Coventry becoming the Morris Engines branch in 1923. In 1924 the head of the Morris sales agency in Oxford, Cecil Kimber, started building sporting versions of Morris cars, called "MG" — after the agency, Morris Garages. The MG factory was in Abingdon, Oxfordshire.
The small car market was entered in 1928, with the Morris Minor, using an 847 cc engine from the Wolseley Motor Company, a company which became part of Morris Motors Company in 1927. This helped the company through the economic depression of the time. The Minor was replaced at the 1934 London Motor Show by the Morris Eight, a direct response to the Ford Model Y and heavily based on it. In 1932 Morris appointed Leonard Lord as Managing Director and he swept through the works, updating the production methods and introducing a proper moving assembly line, but Morris and Lord fell out, and Lord left in 1936 — threatening to "take Cowley apart brick by brick". [1] Also in 1936 William Morris sold Morris Commercial Cars Limited, his commercial vehicle enterprise, to Morris Motors. In 1938 William Morris became Viscount Nuffield, and the same year he merged the Morris Motor Company (incorporating Wolseley) and MG with newly acquired Riley to form a new company: the Nuffield Organisation.
In the summer of 1938 the Nuffield Organisation agreed to build equip and manage a huge new factory at Castle Bromwich in the west Midlands, which was built specifically to manufacture Supermarine Spitfires.[2]
Post World War II production Edit
Production restarted after World War II, with the pre-war Eight and Ten designs. In 1948 the "Eight" was replaced by what is probably the most famous Morris car, the Morris Minor designed by Alec Issigonis (who later went on to design the Mini) and reusing the small car name from 1928. The "Ten" was replaced by a new 1948 Morris Oxford, styled like a larger version of the Minor. A later Morris Oxford (the 1956 Morris Oxford III) was the basis for the design of India's famous Hindustan Ambassador which continues in production to the present day.[citation (source) needed]
BMC Edit
In 1952, the Nuffield Organisation merged with its old rival the Austin Motor Company to form the British Motor Corporation (BMC). Nuffield brought the Morris, MG, Riley and Wolseley marques into the merger. Leonard Lord was in charge, which led to Austin's domination of the organisation. Badge-engineering was important to the new company and for many years the several marques would be seen on several families of similar vehicles.
British Leyland Edit
In 1968, in further rationalisations of the British motor industry, BMC became part of the newly-formed British Leyland Motor Corporation (BLMC), and subsequently, in 1975, the nationalised British Leyland Limited (BL).
The Morris marque continued to be used until the early 1980s on cars such as the Morris Marina. The Morris Ital (essentially a facelifted Marina) was the last Morris-badged passenger car, with production ending in the summer of 1984. The last Morris of all was a van variant of the Austin Metro.
In the early 1980s, the former Morris assembly plant in Cowley was turned over to the production of Austin and Rover badged vehicles, and continued to be used by BL's Austin Rover Group and its successor the Rover Group, which was eventually bought by BMW, and then by a management consortium, leading to the creation of MG Rover.
The rights to the Morris marque were owned by MG Rover, but after that company's financial collapse, and partial purchase by one or more Chinese state businesses, it is not clear who will finally own the Morris marque. Neither of the former Morris Assembly Plants now exist, they were demolished and replaced by the "Oxford Business Park", the adjacent Pressed Steel Company site ( Cowley Body Plant ) is now owned and operated by BMW, who use it to assemble the new Mini. MINI.
The history of the company is commemorated in the Morris Motors Museum at the Oxford Bus Museum.
Post-Morris cars to have been built at Cowley include the Austin/MG Maestro, Austin/MG Montego, Rover 600, Rover 800 and (for a short time) the Rover 75.
Badge Edit
The Morris badge shows an Ox crossing a river — a reference to the company's home town, Oxford.[citation (source) needed]
Car models (excludes light vans) Edit
1913–1926 - Morris Oxford (Bullnose)
1915–1935 - Morris Cowley
1920–1929 - Morris Six
1926–1935 - Morris Oxford
1928–1932 - Morris Minor
1931–1933 - Morris Major
1929–1935 - Morris Isis
1933–1939 - Morris Twenty-One/[[MorrissTwenty-Five
1935–1939 - Morris Twelve
1935–1939 - Morris Fourteen
1935–1948 - Morris Eight
1933–1948 - Morris Ten
1948–1952 - Morris Minor MM
1955–1971 - Morris Minor 1000
1948–1954 - Morris Oxford MO
1948–1953 - Morris Six MS
1954–1971 - Morris Oxford II / III / IV / V / VI
1957–1960 - Morris Marshal (BMC Australia)
1958–1964 - Morris Major (BMC Australia)
1959–1969 - Morris Mini Minor
1964–1968 - Morris Mini Moke (United Kingdom)
1966–1973 - Morris Mini Moke (Australia)
1962–1971 - Morris 1100
1969–1972 - Morris 1500 (Australia)
1969–1972 - Morris Nomad (Australia)
1971–1980 - Morris Marina
1980–1984 - Morris Ital
Preservation Edit
Examples of most morris models exist either in private collectors owners ship and appear on the Classic car circuit at Classic vehicle shows or in motor museums in the UK. A number of examples also exist in places were Britain had a strong export market, such as India and Australia.
Known examples can be listed here, (when the list gets longer it can be split & transferred to the individual model pages).
Template:PML Morris cars
Morris-badged tractors Edit
Morris-badged Tractor Models
Morris-Leyland 154 28 hp (21 kW) built by BMC Sanayi in Turkey
Morris-Leyland 184 built by BMC Sanayi in Turkey
Nuffield Morris 10/60 60 hp (45 kW) built by BMC Sanayi in Turkey
British Leyland Motor Corporation
Morris Commercials
Classic vehicle shows
↑ 1.0 1.1 1.2 Georgano, N. (2000). Beaulieu Encyclopedia of the Automobile. London: HMSO. ISBN 1-57958-293-1.
↑ Castle Bromwich Retrieved: 9 February 2008.
v · d · e The British car industry – companies & marques
Marque 1900s 1910s 1920s 1930s 1940s 1950s 1960s 1970s 1980s 1990s 2000s
Rolls-Royce Rolls-Royce Limited Rolls-Royce Limited & Bentley Rolls-Royce Motors Rolls-Royce Motors (Vickers) BMW & VW Group BMW
Bentley Bentley VW Group
Armstrong Siddeley Siddeley-Deasy Armstrong Whitworth Armstrong Siddeley Bristol Siddeley Rolls-Royce Limited Rolls-Royce plc
Aston Martin Aston Martin Aston Martin Lagonda PAG (Ford) Aston Martin Lagonda
Lagonda Lagonda
Tickford Tickford
Jaguar SS Cars Jaguar Jaguar
Daimler BMH British Leyland Jaguar
Daimler PAG (Ford) Tata
Daimler Daimler BSA BSA
Lanchester Lanchester
Rover Rover Rover Rover Austin Rover Group
Land Rover Group (BL plc) Rover Group (BAe) Rover Group
(BMW) MG & Rover (BMW)
Land Rover PAG (Ford)
Alvis Alvis BAE Systems
Standard Standard Standard Triumph Leyland Motors British Motor Heritage
Triumph Dawson Triumph BMW
Riley Riley Nuffield Organisation BMC BMH
MG Morris Garages (MG) Rover Group
(BMW) MG Rover Group (Phoenix) SAIC
NAC SAIC
Morris Morris Morris
Wolseley Wolseley
Austin Austin Austin
Vanden Plas Vanden Plas
Mini Mini (BMW)
Austin-Healey Austin (BMC) & Donald Healey
Jensen Jensen Motors Britcar Holdings Jensen Cars
Reliant Reliant Reliant
Bond Bond
AC AC Cars (several ownership & company name changes)
Argyll Argyll Argyll
Bristol (cars) Bristol Cars
Caterham Caterham
Crossley Crossley
Dutton Dutton Dutton
Ginetta Ginetta
Gordon-Keeble Peerless & Warwick Gordon-Keeble
Jowett Jowett Blackburn
Lea-Francis Lea-Francis
Lotus Lotus GM Europe (General Motors) Proton
McLaren McLaren
Marcos Marcos Marcos Marcos
Morgan Morgan
Napier Napier
Turner Turner
TVR TVR
Westfield Westfield Potenza Sports Cars
GTM GTM
Vauxhall Vauxhall Motors General Motors GM Europe (General Motors)
Vulcan Vulcan
Hillman Hillman Humber Rootes Chrysler Europe (Chrysler) Peugeot (PSA)
Humber Humber
Singer Singer Rootes
Sunbeam Sunbeam Sunbeam-Talbot-Darracq Rootes (As Sunbeam-Talbot) Rootes Rootes
Talbot Talbot
v · d · e British Leyland – car companies & marques
This page uses some content from Wikipedia. The original article was at Morris Motor Company. The list of authors can be seen in the page history. As with Tractor & Construction Plant Wiki, the text of Wikipedia is available under the Creative Commons by Attribution License and/or GNU Free Documentation License. Please check page history for when the original article was copied to Wikia
Retrieved from "https://tractors.fandom.com/wiki/Morris_Motor_Company?oldid=124668"
Pages with content from Wikipedia
|
cc/2019-30/en_middle_0053.json.gz/line4489
|
__label__wiki
| 0.845144
| 0.845144
|
THE SERENA-VENUS JOURNEY
It is one of the most remarkable sports stories of our time that two siblings who have won 30 major singles titles combined, plus 14 women’s doubles major titles together, plus two mixed doubles majors apiece — 48 major championships total — came from such difficult circumstances in Compton, California, to conquer women’s tennis. That in itself is mind-blowing and inspiring beyond all description.
It is even more jawdropping and remarkable that these siblings — beyond being extraordinarily GREAT at their shared profession — have been that great for a very… long… period… of… time.
For 20 years — on an overall level and at the major tournaments — Serena and Venus Williams have played each other. Like their own individual careers and their doubles careers; like their relationships with American tennis fans; like their complicated human lives, their rivalry has evolved.
It might not be easy to see that evolution in the wake of Serena’s lopsided victory Friday night at the U.S. Open. it might not be natural or instinctive to think that this latest Williams match, their 30th, marked a higher level of sporting excellence. To be sure, any great rivalry — which this certainly is — grows larger when both players play well at the same time, forging close contests in which the drama drips from every point and the athletes involved are forced to handle the pressure of the scoreboard in addition to the pressure of playing a formidable opponent they respect.
By that measurement, Serena-Venus 30 wasn’t particularly special. Yes, this match — in its finer details — wasn’t especially memorable. However, this match was a treat for the simple reason and fact that it happened. One more time, a U.S. Open crowd was able to bathe these sisters in appreciation and admiration. One more time, these two giants of American sports were able to play inside the biggest arena in regular tournament tennis, on the largest stage American tennis has to offer. One more time, Serena and Venus met at a major. This time, they met at a major after Serena’s childbirth, a moment which owns extra poignancy in light of the fact that when they contested the 2017 Australian Open championship, Serena was pregnant with her child.
Yes, this match was memorable for its milestones and markers, not for its forehands or serves or volleys. It wasn’t a complete tennis feast, but it was still something tennis fans couldn’t have easily expected at the end of May, when Serena’s status was uncertain and Venus was struggling to do anything. Serena has picked herself up — exceeding expectations, as she has a way of doing quite frequently — while Venus shrugged off less-than-ideal health to power through the first two rounds and make this date possible. It is a gift to tennis fans that this match became a reality at all.
Yet, if the more detailed aspects of the match didn’t give rise to a soaring, pulse-pounding thrill ride, there was still something to appreciate in the match: Very simply, Serena Williams — a person who has evolved so much in the two decades of her shimmering and iconic career — showed how much she has evolved within the context of matches against Venus.
In the early stages of this rivalry, it was very emotionally uncomfortable for these sisters to play each other. To be sure, it made complete sense for this discomfort to exist. It was not and is not a natural experience to play tennis with a beloved sibling in childhood… and then play finals at Wimbledon and the U.S. Open and other larger-than-life tennis tournaments. It figures that Serena and Venus needed a lot of time to walk through that complicated section of their inner worlds. They did play a few special and exceptionally good matches, but many of them contained an unavoidable vibe which simply didn’t — and doesn’t — flow through any other match on the WTA Tour. It was no one’s fault. It was no one’s failure. It was no one’s problem. It was just THERE.
Image – Jimmie 48
In light of that backdrop, how impressive it was to see Serena be so comfortable in putting her night-vision goggles on (metaphorically, of course) and calmly tending to business so that she could move to the fourth round and face Kaia Kanepi on Sunday.
Growing older is supposed to create wisdom. That reality has been so profoundly true in both Williams Sisters, but Serena’s near-death experiences, her childbirth, and her social justice initiatives have magnified her journey. Wisdom owns many manifestations. One of them is the ability to be more at peace in the face of complicated emotions or situations which represented more of a puzzle in past years.
You could see that inner freedom in Serena on Friday. That freedom didn’t mean she loved Venus any less, or that a part of her no longer carried some inner shred of regret that her own win meant Venus’s loss. It simply meant that Serena did the job put in front of her to do: Play a professional tennis match. After it was over, she could hug Venus, smile with Venus, praise Venus, and credit her older sister for everything she had meant — and does mean, and will always mean to her.
This is what maturity looks like. This is what an evolving journey looks like. This was not a spellbinding match or a night which crackled with unusual intensity. It was a match in which Serena Williams did her job to the best of her ability… and had plenty of love to give afterward.
Simple, but profound — that is how many of life’s best examples and most important lessons are delivered. Serena sent quite the message on Friday night in New York.
Header Image -Source: Kevork Djansezian/Getty Images North America
Related Topics:#WTAAccentUSOSerena WilliamsVenus Williams
KYRGIOS NEEDS TO LOOK IN THE MIRROR — AND AT FEDERER
KHACHANOV — A STORY OF LUNG CAPACITY
To get 24, Serena needs more matches and challenges
Halep Upsets Serena. 24 Proves Elusive, Again
Chicken or Egg? Serena doesn’t care, and she shouldn’t
Again versus Atypical: Serena-Strycova in focus
Serena, steadfastly solving
Anisimova uses a reliable formula to end Halep’s repeat bid in Paris
|
cc/2019-30/en_middle_0053.json.gz/line4491
|
__label__wiki
| 0.535182
| 0.535182
|
Tigua Indian Cultural Center, El Paso
NATIVE TEXANS
In the first known chronicle of American Indian life in Texas by outside sources, the shipwrecked survivors of Spanish explorer Cabeza de Vaca's party report that they were confronted with a rhythmic entreaty of shouts, claps, and pebble-filled gourd rattling by indigenous peoples, perhaps members of what we now call the Karankawas or the hunter-gatherers of the Coahuiltecan region. This took place in 1535, a considerably late date for a record of indigenous populations, particularly considering that the earliest evidence we have on hand so far of an occupied Texas rolls us back about another 12,000 or more years.
The lucky settlers and pioneers already residing in Texas during its transformation to statehood may be considered the first true Texans in name but the territory surrounding them had already been populated for millennia. Archeologists continue to search for and study material clues of these early Texans such as discarded stone tools, cookfire remnants, traces of long-gone houses, plant and animal food remains, and symbols painted or incised on rock shelter walls. In the absence of written records, these are the only clues that can shed light on the prehistory of the peoples occupying Texas territory. History, however, is more thorough thanks to the journals of de Vaca and other explorers, to ethnographers and anthropologists, as well as to the ancestors of Native tribes like the Kiowa, Comanche, Apache, Kickapoo, Caddo, and Tigua, who can recall their heritage in oral histories and traditions. Newly discovered archeological evidence, in fact, places the earliest known human inhabitants in North America right here in Texas. Depending on how we look at it, the term "Native Texan" may have taken on a whole new meaning.
Alibates Flint Quarries National Monument
Armstrong County Museum
Comanchero Canyons Museum
Quitaquie
Copper Breaks State Park
Downtown Medicine Mound Museum
Medicine Mound
Heart of West Texas Museum
Hutchinson County Historical Museum
Kwahadi Museum of the American Indian
Lubbock Lake National Historic Landmark
Museum of the Llano Estacado
Museum of the Plains
Read more about American Indians in the Handbook of Texas Online.
|
cc/2019-30/en_middle_0053.json.gz/line4494
|
__label__cc
| 0.644414
| 0.355586
|
← Seeds vs Nails
Shift →
Who Will You Love?
Posted on November 29, 2016 by clubfredbaja
When it comes to empathy, I was late to the party. I arrived to find the presents opened and the cake mostly eaten. I was embarrassed at my inexcusable tardiness.
Lately, empathy has been occupying a significant chunk of space in my thoughts. How do some of us, even the godless heathens, come to empathy so early and so naturally while others, even the good Christians, struggle with imagining ourselves in the shoes of others? Why is empathy innate in some and hard-learned by others?
I look at my life and ask when my own empathy developed. Not all at once, that much I know. My empathy came by millimeters at times, a painfully slow awakening.
Those of us cursed with vivid memories of childhood can probably look back at one or two cringe-worthy, empathy-lacking moments. For me, the earliest involved fish. For some reason, bugs and fish never really felt like animals to me as a child, at least not the way cats or dogs or birds did. Fish, to young me, were soulless, unfeeling creatures. And, yes, I still kill and eat fish but I endeavor to do so humanely. This incident was not humane.
How old was I? Nine? Perhaps? Younger? I’m not sure. I’d traveled to Victoria with my friend “R” and her mother, to visit someone who may have been a grandmother or an aunt—that part of the memory fails me. My friend R and I were bored, as kids often were before tablets and smart phones and 24 hour entertainment. We walked to the beach, collected a bunch of small fish in a bucket, and brought them back to the house where we performed scientific experiments on them. We set out several jars and put a single fish in each jar. The “test” was to see how the fish reacted to varying levels of salt in the water. Some of the jars had regular ocean water, some had fresh, some had a combination of salt and fresh, some had ocean water with extra salt added. It was all very fascinating to us then and all quite stomach-churning to me now.
I don’t have to tell you how most of the fish fared in the end, do I?
I’m not trying to squick you out, I only want to show you what a person lacking in all but basic empathy is capable of. I wasn’t a bad kid. I was nice to other humans and pets. I was the kid teachers would ask to show new students around or look after the class gerbil for winter break because they could trust me to be kind. In fact, as kids go, I bet I was pretty average in the empathy department.
And, because I lived a safe, quiet life in the ‘burbs, I stayed average.
My first big leap toward greater empathy didn’t occur until the end of my first marriage. How, I wondered after it was over, had I ever asked of abused women, “Why don’t they just leave?” These people I had seen as pitiful weaklings, cowards unable to do something as simple as pack a bag and walk out a door? Well, now, at the age of twenty-five, I was one of them. The answer to the question, “Why don’t they just leave?” is a thousand shades of complicated, answers upon answers, twined together like the worst fishing tackle mess you have ever seen. The answer is also simple and boils down to “Because they do not love themselves enough”.
I was a tough young woman. I regularly stood toe-to-toe with men much bigger and stronger than me and traded punches and kicks without flinching, but that was easy compared to packing a bag and walking out the door. I did not love myself enough. Even after I had finally worked up the courage to leave, it would be several more years before I could look at myself and really like what I saw—inside and out.
That first big leap toward empathy was awful, humbling, and, yet, it gave me strength. You see, empathy connects us to others. Like the Force, it binds us. There is strength in connection and community.
My mom’s death pushed me further down the empathetic path. So this was loss? What a horrible feeling.
I back-slid a bit once my stunt career took off and I was suddenly flush with cash and frequently the subject of awe and admiration. But then there were more failures and struggles and I was back on Empathy Road once more.
The combination of peri-menopause, loss of my father and sister, and uprooting from my Nelson community was as a gate being closed behind me. There is no other way forward now but with empathy.
If there is a silver lining to human suffering it is that, usually, it makes us more aware of and sympathetic to the suffering of others. I am proud of my empathy not because it makes me superior to others but because of what I endured to acquire it.
I’ve been thinking about empathy in the post-Trump, post-truth world. What a struggle we face—and by “we” I mean many of us in the western world at this moment, not just Americans. It is so easy and so tempting to shut off our empathy and dehumanize “the enemy”, whoever we imagine that to be, depending on which side our loyalty falls.
And yet, I cannot deny what is right in front of my eyes—those spewing hate and those turning a blind eye to that hate. How do I reconcile the reality that there are people in my circle of friends (some who occupy the inner circles) who I know to be decent, kind and intelligent but who also support or voted for a fascist? These people in my life may be a distinct minority but that doesn’t change that I have laughed and traveled and shared heartaches and broken bread with them. Their willingness to overlook such blatant lies, dangerous doublespeak, and violence-inciting rhetoric chills me. I want to grab them by the shoulders and shout, “If someone spoke this way to your wife or sister or daughter, you would punch them in the face! Why is it acceptable simply because it’s not directed toward you?”
The morning after the election, like so many others, I was caught in the gyre of shock and disbelief. What could I do? Nothing. Not my country. Powerless.
Later that day, talking with one of my dearest American friends, we discussed the results and he explained how Trump’s promised repeal of the Affordable Care Act would mean my friend would once more be without health insurance. I remembered how relieved he had been when he had been approved, and I’ve watched as his health has benefited since that time. He was pragmatic about the sad possibility of an end to that insurance; I was not so stoic. As we typed back and forth, my eyes grew hot and a knot of dread cinched in my gut. I brushed away tears. How could they do this to my friend? How could they even think about it?
I have other friends who now exist in a state of fear. Regardless of which promises Trump keeps and which fall by the wayside (next to the stacks and stacks of other lies), the veil of civility has been ripped away and the worst aspects of human nature have been encouraged to run free. I feel my friends’ fear. I feel their uncertainty. I feel like a small fish in a jar, looking out at all the other fish in their jars, wondering what will become of us.
In the friends department, there are a few who rest at the other end of the empathy spectrum from Trump supporters. This year, two sets of my friends have organized and carried out sizable humanitarian projects in Nepal. I can’t begin to state the enormity and complexity of these endeavors, the innumerable pieces that had to be put into place to bring help to people on the other side of the world.
Becky Rippel of Peak Freaks, working with First Steps Himalaya, headed up the Earth Bag Build project. Her husband, Tim Rippel, led a group of local and international volunteers to build an earthquake resistant school for Nepalese children. The devastation wreaked by the 2015 earthquake in Nepal was staggering and many areas have still not recovered. Many Nepalese still live under “temporary” tin roof structures. Becky and Tim have spent decades working and traveling in Nepal and wanted to do something to help the people they’ve come to think of as family. After a successful build this year, they plan on continuing the good work in 2017. (Want to join them?)
The new kindergarten under construction. Photo: Tim Rippel
Amy Stevenson had planned on volunteering on the Peak Freaks earth-bag project in 2015 but her plans had to be put on hold at the last minute because of a fuel crisis that cancelled flights in and out of Nepal. Determined to pitch in despite this obstacle, she looked into opportunities through her local Rotary Club in Campbell River, BC, of which she is a member. Over the course of a year, she put together and secured funding for a women’s reproductive health project that would bring much needed medical care and education to rural Nepalese women. A little more than a week ago, she and her husband Derek Marcoux flew to Nepal to oversee the project and volunteer. The project just wrapped up, with over 15,000 people (women, men and children) receiving medical care in rural Nepal.
Amy Stevenson with a nurse volunteer in Nepal. Photo: Derek Marcoux
While some shout about building walls, my friends are building schools. While some shout about taking away health care from the poor, my friends are bringing health care to the poorest. If I remain sane and optimistic in the face of this new wave of cruelty and callousness, it is because of these humane, caring and empathetic friends of mine.
Empathy is infectious. Surround yourself with people who care about others—not just people who look like you, share your beliefs, and speak the same language but ALL others—and you will have a difficult time not feeling what they feel, not caring about what they care about. Learn to really love others and you may be surprised at how much easier it is to love yourself.
I have decided to keep the doors of communication open with my few pro-Trump friends as long as they will let me. Perhaps they will change their minds. Perhaps their empathy will win out in the end. I remain hopeful.
Empathy doesn’t develop from turned backs, lectures or finger wagging. Empathy comes quietly, in face-to-face discussions with real people. It comes when we share our suffering and are comforted by others. It comes when we see it at work in people we admire and respect.
But that doesn’t mean I will bite my tongue or withhold my opinion. When I see wrong, I will call it out. Gently, yes, but honestly.
Most of all, I will continue to share stories of good people like my friends, shining lights in dark corners of the world. I will continue to ask myself…
What will you build?
What will you give?
One of the Nepalese children who will use the new earth bag school. Photo: Wanda Viveguin
This entry was posted in Family & Children, Friends, Health and wellness, News and politics, Travel, Women's Issues and tagged Amy Stevenson, Becky Rippel, earth bag building, Empathy, how to deal with pro-Trump friends, Nepal earthquake, Peak Freaks, post-Trump, Rotary Campbell River. Bookmark the permalink.
|
cc/2019-30/en_middle_0053.json.gz/line4497
|
__label__wiki
| 0.959642
| 0.959642
|
Economic Theories
Matches seen
My first game
Non League Notes
June 1, 2015 by stuartnoel
Will the Europa League be a distraction for West Ham’s most important season?
Like most football clubs, West Ham United fans can be divided into a number of groups. Those who wanted Allardyce to stay (a few), those who wanted him to go (a few thousand); those who think Upton Park is perfectly adequate for us, to those who can’t wait for the move to the Olympic Stadium (about 50/50 I’d say) and those who think Andy Carroll was worth every penny of the £15m (John, from Hornchurch) to those who think we paid over the odds by £14.9m (the rest of the world). But the news that the Hammers had been allocated a place in the Europa League has seriously divided the fans.
Let’s wind back to start with before we get too excited about potential trips to San Marino, Moldova and the Faroes. What happened on the pitch at Upton Park, and the other Premier League stadium is for the most part irrelevant in the Hammers getting their sun towels and beach balls out. Firstly, Fair Play is a mixture of what happens on the pitch but also the behaviour of the fans. West Ham’s travelling support, which continues to be superb have been accused in the media in the past of creating issues at White Hart Lane in the past two seasons surrounding the use of the “Y” word. This would count against them. The official criteria, as assessed by a “Fair Play Delegate” would penalise a club if their fans engaged in:-
– Persistent foul and abusive language
– Persistent abuse of the officials’ decisions
– Aggressive and threatening conduct towards opposing fans
Whilst West Ham finished top of the Fair Play table from the Premier League, they still had to rely on the rest of the Premier League sides to behave themselves so that the overall English score was one of the top 3 out of the 54 UEFA associations. So potentially, a mass brawl involving the two Manchester clubs, or Mourinho punching Wenger’s lights out in the press conference could have impacted West Ham’s position.
England will finish in second place once the official cut off point arrives on the 30th May, behind the Netherlands and just in front of Republic of Ireland which meant the Golden Ticket landed on the doormat of Upton Park today, much to the delight of the fans. What makes it even sweeter is that this is the last time Europa League places will be given to the Fair Play winners. As of next season, the three winning national associations will get a pot of cash towards “fair play or respect-themed projects”. Enough said.
The Hammers will join 103 other teams in the draw on the 22nd June. There are some very good teams who are also going to have to try and battle through 22 games to reach the final in May in Basel. Brøndby, Slovan Bratislava, Aberdeen, Hadjuk Split and Red Star Belgrade will all be cutting short their time on the sun loungers, whilst Champions League stalwarts Rosenborg, IFK Göteborg and AIK will be slap-bang in the middle of their season. The good news is West Ham are actually the highest ranked team in the draw and as such will be drawn against an unranked team, which could mean a trip into unchartered territories such as Gibraltar, Cyprus and Faroe Islands. The longest potential trip is to Almaty, where the Kazakhstan Cup winners Kairat play, a 6,960 mile round trip.
So whilst the fans will be rubbing their hands at the thought of a visit to somewhere new, what will the impact be on preparations for the most important season in the club’s history? It’s fair to say that it would be a financial disaster to start the next chapter in the club’s history in the Olympic Stadium in the Championship. That’s one of the reasons why the club have been very forthcoming in announcing season ticket pricing for that first season, a very commendable and unusually significant price reduction. Most clubs would be coming back for pre-season in the second week of July, with friendlies kicking off a week or so later. So with the first tie due to be played on the 2nd July, the players will need to be back in the next few weeks – hardly a break at all for the West Ham players.
If the timescales weren’t tight enough, there’s the added issue of the club not yet having a manager. Whilst the board will move quickly to find a successor, setting out clear criteria for the successful candidate such as “the candidate will be expected to understand the club, its fans and culture, and can encourage the ‘West Ham way’ of playing attacking football”. The new manager, if they have been appointed, will probably go into that first leg without having seen anything of his new side. By the time the Premier League season kicks off in mid-August, West Ham could have played six games in the Europa League. That throws the whole pre-season schedule up in the air.
How seriously will the club take the competition? Bar Hull City’s gamble last season, which nine months later seriously back-fired on them after they put out a weakened side for their tie against Lokeren in the Play-Off round, English clubs have faired quite well in the Europa League. The furthest that a team has progressed from a fair-play entry is the quarter-finals, achieved by Aston Villa in 1998, Rayo Vallecano in 2001 and Manchester City 2009. City also progressed beyond the Group Stages in 2005. Changes to the competition from next season mean we will never see the romantic notion of a plucky FA Cup runner up such as Portsmouth playing in the competition, with the place instead going to the next placed team in the league. Whilst the timing is poor, I’d expect West Ham to take the tournament more seriously as the rounds progress. On the 2nd July I wouldn’t expect many of the first team to be involved. Whilst it’s a risk, especially if they are drawn against a team who are half-way through their summer season such as one from Finland, Sweden or Norway, they cannot risk bringing players back too early and thus compromising the Premier League season.
It’s not the first time West Ham have agreed to enter European football early. Sixteen years ago the club accepted an invite to play in the now-defunct Intertoto Cup, which meant that the Hammers kicked off the season on the 17th July at Upton Park against the Finns Jokerit. Paul Kitson’s goal in front of a respectable 11,000 crowd kicked the season off. Come August and the start of the Premier League, the Hammers had already tested themselves against Heerenveen and FC Metz before anyone else had kicked a ball in earnest, giving them the momentum to get a flying start, sitting in third after five games, with four wins. Alas the squad side and momentum faded at Christmas, although the final position of ninth was still commendable.
Despite the poor second half of the season form (16 points from 19 games) and uncertainty around who will accept the manager’s role, the news that the club has been given a free airplane ticket certainly raised spirits and for some fans, the revelation of where they will be heading in early July is as important as who will be next manager. That’s the nature of football.
This entry was posted in Barclaycard Premier League, European Football, Premier League, Upton Park, West Ham United and tagged Europa League, Hammers, Premier League, West Ham, West Ham United. Bookmark the permalink.
Post-season Blues….and Citizens and Spurs
The eye of the Tiger
Available to buy NOW
Search the blog for good stuff
@RepossSTPodcast There are fixtures on Boxing Day across all four divisions. As per last season, clubs could nomin… twitter.com/i/web/status/1… 7 hours ago
@bazzacollins There a nightly show in the Pasadena Stadium, where the 1994 WC Final was, showing the landing footag… twitter.com/i/web/status/1… 7 hours ago
@bazzacollins That’s what I’m (not) paid to remind you of 21 hours ago
You can contact us on Twitter @Theballisround
Alan devonshire
Barclaycard Premier League
Blue Square North
Blue Square Premier League
Blue Square South
Djurgarden
Dorchester Town
England Games
FC Lewes
FC Nordjaelland
FC Nordsjaelland
Football in Greece
Football in Sweden
Hampton and Richmond Borough FC
Ilkeston Town
Kenny Pavey
Kingstonian
Maltese football
nPower Championship
Rymans League
Rymans Premier
SAS Ligean
Swedbank Stadion
The Beveree
US Football
Worcester City
Next up at The Dripping Pan
The 100 Grounds Project
Gone and Forgotten
Aberdare Athletic FC
Burton Wanderers FC
Glossup FC
Manchester Central FC
Nelson FC
New Brighton Tower FC
South Shields FC
Thames FC
Wigan Borough FC
Budget Airline Guide To European Football
Doing the 116
European Football Weekends
Football Kit News
Football Tripper
In Bed with Maradona
Non League Day
The London Football Guide
The real FA Cup
The Swiss Ramble
Adam Lloyd
Charlie Connelly
Christine Hamilton
Christopher Harris – EPL
Danny Last
Daryl Grove – The Offside.com
Dave Roberts – The Bromley Boys
Garry Nelson
Grant Brown
Jack Collison
Jeremy Nicholas
Kenny Pavey update
Linzi Robinson – Top female referee
Mark Van Aken – GGA
Mick Harford
Paul Watson
Ryan Storrie
Sam Allardyce
Steve Portway
TBIR and EFW meet The Real Stoffers
Tom Dickinson – Tom the Pie Man
Our stuff elsewhere
EFW – a Belgium Cup Bonanza
EFW – Danish 2nd Division bonanza
EFW – Gent v Standard Liege
In Bed With Maradona – Calcio Tavolo
In Bed With Maradona – Lego Football Stadiums
In Bed With Maradona – Subutteo in Italy
In Bed With Maradona – The rise of FC Copenhagen
The Real FA Cup – Burnham v Bishops Stortford
The Real FA Cup – Chertsey Town v Lewes
The Real FA Cup – When Harry met Dowie
|
cc/2019-30/en_middle_0053.json.gz/line4501
|
__label__wiki
| 0.826212
| 0.826212
|
A Norwegian F-16 at Bodø Main Air Station in 2015 when Norway was the lead nation for the fighter exercise Arctic Challenge Exercise. Photo: Thorbjørn Kjosvold / Forsvaret
Arctic Challenge 2017 set for take off
More than 100 aircrafts from 12 nations will crowd the skies over northern Finland, Sweden and Norway.
The Norwegian Defence says at least one, maybe three, American B-52H strategic bomber will take part at the end of the exercise. Being the largest bomber in the world, the aircraft will not land at any of the air bases in the north, but participate in one of the missions near the end of the exercise.
Arctic Challenge 2017 kicks off on May 22 and will last until June 2.
Rotating every second year between the three northernmost air bases in the Nordic countries, Bodø (Norway), Luleå (Sweden) and Rovaniemi (Finland), the Arctic Challenge 2017 is led by the Finnish Air Force that is responsible for planning and direction of the training events.
Additional to the three Nordic nations, aircrafts and military personnel from the Netherlands, Belgium, Spain, Great Britain, Canada, France, Germany, Switzerland and the United States will participate.
1,000 people are directly participating in the training, while additional 2,500 are support personnel, the Swedish Armed Forces informs.
This year’s exercise will see even more planes than during Arctic Challenge 2015 when nearly 100 aircrafts took part. Fighter jets, transport aircrafts, tankers, AWACS, helicopters and aircrafts for electronic warfare are all set for take off during the 10 days the exercise takes place.
Norwegian P-3 Orion surveillance aircraft flying together with two F-16 fighter aircrafts. Photo: Thomas Nilsen
The Norwegian Air Force has posted an overview over the different aircrafts, which countries they belongs to, and from which of the three air stations they will operate from. According to the list, one, maybe three, B-52 bombers will participate.
Finnish Air Force says the exercise provides opportunity to train the large-scale planning and conducting of air operations in a real-like operating environment that involves a wide range of aircraft and forces of modern air warfare.
All three air bases from where the aircrafts will operate, Rovaniemi, Luleå and Bodø are the northernmost bases for fighter jets in the three Nordic countries.
The aim is to exercise and train units to plan and conduct complex air operations in close relations to NATO partners. The unique cross-border air space makes ACE a one of a kind training ground for increasing interoperability and skills in all parts of the chain. There are no other places in Western Europe where fighter jets can train over such large areas across boders where there little civilian air traffic.
Russia details Barents military plane spotting
Norway acquires five new maritime patrol aircraft for Arctic waters
Norway hikes 2017 defense budget
U.S. military returns to Iceland
Ballistic missiles across the Arctic
B-52s en route to Norway
Strategic bombers striking targets in Syria departed from Kola
Barents Region playground for Kremlin’s nuclear war-games
Life and Public
|
cc/2019-30/en_middle_0053.json.gz/line4502
|
__label__cc
| 0.658539
| 0.341461
|
Book Review: Drink Like a Woman-Shake, Stir, Conquer, Repeat by Jeanette Hurt
Posted by bookishjen in Book Reviews, Bookish Jen, Books, Cocktails and Mixology, Creativity, Drink Like a Woman, Drinking, Education, Feminism, Food, History, Jeanette Hurt, Jennifer B Kaufman, Non-Fiction, Nostalgia, Recipes, The Book Self, Uncategorized, Women's Suffrage, Workplace and Careers
When it comes to liquor and libations Milwaukee-based food and drink writer Jeanette Hurt knows her stuff. So I was only too delighted to come across her book Drink Like a Woman: Shake, Stir, Conquer, Repeat.
Drink Like a Woman provides over 70 cocktail recipes and so much more. It goes beyond the fruity, sweet, pink and girly drinks like the Cosmopolitan popularized by Sex and the City to provide cocktail recipes for all kinds of palates and tastes.
After a foreward by Ann Tuennerman, founder of Tales of the Cocktail, Hurt share a few words on so-called “girly drinks,” in which she claims there are no “girly drinks.” Women like what they like and we don’t have to apologize for it.
But before we can make a cocktail we need to get our home bar together. Hurt provides a very thorough list of needed accessories like jiggers, muddlers, shakers, strainers, pourers and glasses to make your home bar top notch whether you’re new to the cocktail game or an experienced mixologist. And you don’t have to break the bank. Many of these items can be found at thrift stores, estate sales and rummage sales.
Okay, now we’re onto the fun part-the cocktail recipes, which are inspired by fierce femmes and our herstory, which spans from the 1600s to the modern age.
Chapter One, Witches and Bar Wenches covers the years 1600-1900, which celebrates the Revolutionary War, authors Jane Austen (Jane Austen’s Zombie) and the Bronte Sisters (Bronte’s Brew). You can also make a toast to trailblazers with drinks like Nellie Bly-Tai, Curie Royale and Amelia Takes Flight. That time of month? Ditch that Midol and enjoy a Monthly Medicinal instead.
Chapter Two, Votes for Women, Whiskey for All, covers the years 1900 to 1950. Drinks celebrate flappers with Flapper’s Firewater, Rosie the Riveter with Rosé the Riveter and the iconic artist Frida Kahlo with a Frida Kahlúa. Do you need a virgin cocktail for non-drinkers or those underage? Stir up it up with a Suzy B’s Virgin Voter, which honors Susan B Anthony, famous suffragette and a proponent of the temperance movement.
Chapter Three, Libations for the Liberated, covers the years 1950 to 2000. Pop culture icons like Mary Richards, Princess Leia and Buffy the Vampire Slayer get their own drinks (Bloody Mary Richards, Kissed by a Wookie, and Buffy’s Stake), feminism is in fine form with the Bra Burner, Sister Solidaritea, and the Gloria Stein’em.
Chapter Four, Stirring Up Cocktails and Shaking Up the World, covers the 2000s. You can also make a toast the LBD with The Little Black Dress, denounce manpslaining with Mansplainer Antidote and celebrate friendship with the BFF.
Drink Like a Woman also provides recipes for all kinds of syrup, the rules for creating creamy drinks, and hangover cures in case you indulge too much. And Drink Like a Woman also provides a list and brief bios of the ladies of liquor, the mavens of mixology who shared these cocktail recipes.
Drink Like a Woman is also a fun read for its quotations, lists of music and movies to love while enjoying your cocktails and Paige Clark’s charming illustrations. Drink Like a Woman is a welcome addition to any one’s book shelf whether one imbibes or does not.
|
cc/2019-30/en_middle_0053.json.gz/line4505
|
__label__wiki
| 0.822163
| 0.822163
|
With inspired cast, Met’s “Iphigénie” still a powerful experience, the dancing apart
By Corinna da Fonseca-Wollheim
Susan Graham, Placido Domingo and Paul Groves in the Metropolitan Opera's "Iphigénie en Tauride." Photo: Ken Howard.
It may seem odd to praise an opera for its moments of silence. But Saturday’s revival of Gluck’s Iphigénie en Tauride at the Met was a powerful illustration of the fact that it is silence that adds depth to music, like shadows to a painting. When the curtain goes up there is an awful silence, pierced by Iphigenie’s anguished cry, as she is forced to perform a human sacrifice. There are numb silences as she sits between Oreste and Pylades, the two men she is told to kill, one of whom she may choose to be spared. And there is the desperate pause before she lunges at the altar to sacrifice Oreste only to find that her hand will not obey.
It takes guts to pull off such silences, as well as a cast of charismatic singers. The Met is fortunate to have been able to reunite the three principals who created Stephen Wadsworth’s production in 2007: Susan Graham as the tormented priestess Iphigénie, Plácido Domingo as Oreste, her guilt-racked matricidal brother, and tenor Paul Groves as Pylades, the loyal friend ready to sacrifice his life for Oreste.
Tall and regal, Graham commands the stage in each scene. Her voice appears alive with an electric current that pulsates in every note. Even at a very brisk tempo, her lament, O malheureuse Iphigénie, was charged with emotion, though her low notes did not always match the vibrant colors of her high register. In her acting she combines intensity of expression with an economy of gesture that seemed very much in keeping with an aristocratic character held captive not only by a foreign king but also by memories of her family’s bloody history. When she does explode into movement, taking that running lunge at Oreste, for instance, or struggling against his attempts to embrace her in the final scene, it is like the sudden release of a tightly coiled spring.
Domingo’s Oreste finds few opportunities for any such release, not least of all because he is almost always in chains. His voice has lost some of its polish with age, but its emotional and dramatic core remains powerfully intact. His runs in O Dieux qui me poursuivez came out uneven, though that may have something to do with the sets by Thomas Lynch which compartmentalize the stage into unequally resonating boxes. But by the final act, when he recognizes Iphigénie as his sister, it was as if the chains had fallen off his voice, too, revealing a glorious, burnished sound.
With Oreste sung by Domingo (the role was initially conceived for baritone) the duets with his friend and brother-in-arms Pylades lose some of their dynamic variety, but Groves’s incisive, somewhat metallic, tenor managed to stand out. He brought exquisite phrasing to his moving aria Unis dès la plus tendre enfance.
There were few revelations among the supporting roles, many of whom made their house debuts. King Thoas was sung by Gordon Hawkins with a beefy baritone; Lei Xu and Cecilia Hall made somewhat flimsy priestesses. Julie Boulianne was a radiant Diane, descending undaunted from the flies. Patrick Summers presided over a slightly restrained performance by the Met orchestra.
The only truly distracting element of an otherwise gripping production were the dances choreographed by Daniel Pelzig with puzzling eclecticism. One moment he has the ballet of priestesses slapping their bellies in gestures loudly reminiscent of Pina Bausch’s Rite of Spring, the next he has soldiers linking arms for a round of Balkan folk dances. Even worse are the male dancers cavorting atop the sacrificial altar that holds so much evident terror for the protagonists, and has served as a landing pad for the Goddess of the Hunt herself. In an opera in which dance, recitative and aria are so organically interwoven, it would have been nice if the choreography, too, plumbed the depths of the tragedy’s shadows and silences.
Iphigénie en Tauride will be performed at the Metropolitan Opera on February 21 and 26 and March 2 and 5. metopera.org; 212-362 6000
|
cc/2019-30/en_middle_0053.json.gz/line4507
|
__label__wiki
| 0.828649
| 0.828649
|
Messi rescues Argentina as Paraguay pay penalty
BELO HORIZONTE (Agencies): A Lionel Messi penalty salvaged a 1-1 draw for Argentina against Paraguay on Wednesday as the two-time world champions once again struggled at the Copa America.
Messi swept in a 57th-minute spot-kick at Belo Horizonte’s Mineirao Stadium to cancel out a first-half opener from Paraguay’s Richard Sanchez. Argentina also had goalkeeper Franco Armani to thank for a second half penalty save that prevented Paraguay from taking a 2-1 lead in the Group B battle.
The draw left Argentina with one point from two games and on the bottom of the table with one game remaining. However with the two best third placed teams advancing to the quarter-finals, Argentina can still reach the last eight with a decisive win over Qatar in their final group game.
“We have to win,” Argentina coach Lionel Scaloni said of his team’s date with Qatar. “We will take stock of what we did well and what we did not do well and we will make decisions. We are lucky that we are still alive in this tournament,” added Scaloni, singling out goalkeeper Armani for special praise.
“We trust Franco,” Scaloni said. “He is our starting goalkeeper. He saved a penalty and kept us alive. I’m glad he had a good performance.” The South American giants will need to raise their game however to advance any further after another disjointed performance which followed their opening defeat to Colombia on Saturday.
A lacklustre opening saw both sides struggle to generate any sort of attacking momentum, with neither side managing to get a shot on goal until Paraguay striker Derlis Gonzalez’s effort was deflected behind for a corner in the 29th minute. From the ensuing setpiece, centre-half Junior Alonso scooped a half-chance wide as Argentina escaped.
Penalty drama –
That flurry of activity spurred Argentina fleetingly at the other end, with Lautaro Martinez winning a free-kick in a dangerous position on the edge of the area after a foul by Paraguay skipper Gustavo Gomez.
Messi however was unable to conjure anything from the free-kick, floating his effort up and over the wall but without the pace to trouble goalkeeper Roberto Fernandez, who gathered comfortably. In the 37th minute however, Paraguay’s more organised performance got its reward.
A swift counter-attack saw the ball transferred to Newcastle United’s Miguel Almiron near halfway. The livewire forward turned on the after-burners to roast Roberto Pereya down the left wing before crossing for Sanchez who drove a low finish into the bottom corner of the Argentina net.
A rattled Argentina were given a huge let-off moments later when Armani came racing out of his area to shut down Gonzalez. A wild kick brought down the Paraguayan player but Armani somehow escaped a red card and was only cautioned.
Scaloni went for broke at half-time, bolstering his attack with the introduction of Sergio Aguero and the move paid instant dividends. Aguero deftly lost his marker on 51 minutes and pulled back for Martinez, whose shot cannoned off the woodwork. Messi pounced on the rebound but Fernandez blocked with a diving save.
The chance appeared to have gone begging but VAR had spotted that Martinez’s shot had in fact struck Ivan Piris’s arm before hitting the bar and Brazilian referee Wilson Sampaio pointed to the spot. Messi stepped up to sweep in the spot-kick and Argentina were level.
Yet there was more drama in the 62nd minute when Paraguay’s Gonzalez burst into the box and was clumsily hacked down by Nicolas Otamendi for a clear penalty. Armani, who was fortunate to be on the pitch, dived the right way and parried Gonzalez’s spot-kick wide.
|
cc/2019-30/en_middle_0053.json.gz/line4510
|
__label__cc
| 0.702541
| 0.297459
|
Tommy Muncie, Writer
Science fiction crime novels
A review of Dead Sleep by Will Swardstrom
Date: December 30, 2015Author: Tommy Muncie 0 Comments
Buy Dead Sleep on Amazon or borrow with Kindle Unlimited
Dead Sleep was not the book I was expecting it to be, yet I’m reviewing it favourably anyway.
I first found this book after the author got my attention by following my blog on WordPress (indie authors take note, this does work for your book’s visibility) and when I saw its cover it ‘promised’ me an adult book in the sci-fi and horror genres. I say ‘promised’ here in inverted commas because authors and cover designers often talk about what a cover ‘promises,’ but it can be a little objective, as was the case with Will Swardstrom’s debut novel. And my perception turned out to be wrong: it’s a YA novel, but it can also be read comfortably by adults, and fits into its genre without lashings of King or Barker-esque violence and cursing. Therein lies the first compliment – I wasn’t disappointed despite realising from an early stage that this novel wasn’t what I imagined when I saw the cover.
Will Swardstrom has written effectively for the YA audience, and yet I devoured this book in 5 or 6 sittings, as an adult reader who aside from The Hunger Games doesn’t really touch YA often. It’s a quick read but isn’t simply action. There were times when I felt like I was getting a history lesson aimed at school-age readers, but I was always told an effective story as part of this, rather than just given facts. I’m walking the lines of flattery here but what the hell: that’s the mark of a good history teacher, and the author is himself a school teacher who has brought his day job into his authorial voice quite effectively. I’m jumping to conclusions I know, but the style of this novel did make me wonder if the author deliberately wrote a book some of his students might enjoy if they happened to find it. There’s a familiar touch of ‘my school life was complicated’ surrounding the main character’s backstory, as well as a school prom being used as the event behind a tension-build around 2/3 of the way through the novel.
Will Swardstrom was also a journalist like the main character, and has created a character who garners a fair amount of reader sympathy without simply being an avatar for the author himself – Jackson Ellis is very much his own person during his novel, even if he does seem a little too conveniently enamoured with the female lead of this story at times. But then, there’s plenty about Kristina that would intrigue most male readers, if not attract them in slightly odd ways.
Books about characters who see the future are hard to write, because visions have been done to the death since they appeared in early religious texts and invaded science fiction later, yet this story doesn’t feel like a copy of anything. There’s a standout moment when Jackson Ellis gets a revelation about his powers that felt refreshing after a lot of narrative where this character seemed highly self-aware. On the antagonist side is Donnie Cloyd, a character who would have fitted in well with the Clive Barker or Chuck Palahniuk ilk of deeply disturbed antagonists has this been written for adults (and yeah, I’ll admit that’s perhaps the one time I felt like the book was stretching for the horror territory I was expecting but then didn’t quite get). Despite being the villain of the piece, there’s a humorous story behind Cloyd’s name and at times his reactions paint him as a quirky lunatic rather than a chessmaster or Anton Chigur (No Country for Old Men) style of unstoppable monster.
Its hard to say where the science fiction comes into play in this novel without spoilers, but I liked the ideas at work here. Dead Sleep was an effective blend of genres that kept me reading until reaching a satisfying climax, even if it did feature one dreadful movie-style line that made me laugh and roll my eyes in equal measure. Perhaps the biggest curveball in this book wasn’t the surprises dished out to Jackson Ellis but in how during the climax the story did begin to shift into the more adult side of the horror genre. Not full on enough to take it out of YA, but with a good helping of wince-material nonetheless.
There are a handful of overly familiar tropes in Dead Sleep, but the skill of the narrative and writing makes them forgivable as they are in most other books like this – in particular the mixture of 1st and 3rd person (often falsely labelled a must-to-avoid in writing workshops, and here’s a book that demonstrates why I think those writers who avoid experimenting with narrative shifts often miss out on some nice variety.) Will Swardstrom has taken a risk on ideas most readers will have seen before and made them his own. Dead Sleep is an admirable novel, and let’s remember it’s a debut. I get the feeling bigger things are still to come from this author.
Dead Sleephorrorscience fictionsuspenseWill SwardstromYAYa Fiction
Published by Tommy Muncie
View all posts by Tommy Muncie
Previous Previous post: A review of The Cyborg Chronicles
Next Next post: Starting the new year with a critical review
Follow Tommy Muncie, Writer on WordPress.com
© 2019 Tommy Muncie, Writer
|
cc/2019-30/en_middle_0053.json.gz/line4518
|
__label__cc
| 0.555369
| 0.444631
|
Tag Archives: morality
A Civil Concoction
May 23, 2017 Tuesday Morning Love ™ Leave a comment
International Civility Awareness Month 2017
Modified Excerpt from the book Tuesday Morning Love: 52 Commentaries and Weekly Affirmations to Honor the Soul within the Souldier [2014] Week 10 (Responsibility) Amazon
“We are coming to the point in this country where doing what is right is merging with what we need to do to save our national skins.” ~ Marian Wright Edelman
“Que sera sera, whatever will be – will be – the future’s not ours to see…”
The lyrics of this classic Doris Day song often encourage me to want to see more, though the transparent question of every day now is, “What really are we seeing?”
I did not want to believe my eyes while headed home from the office one day and sitting on a crowded train with standing room only. A man and his baggage occupied two seats in three rows ahead of me, while a pregnant woman stood on her feet with a toddler and during most of the ride. I thought, surely this man is going to stop reading his newspaper and give his seat to this expecting mother. But that did not happen at all. After minutes of observation, another passenger and I simultaneously stood up to accommodate the pregnant woman aboard. Needless to say, I was visibly disturbed for the remainder of the commute.
I am often disturbed by the public behaviors of people everywhere I go, from the lack of basic manners to the lack of fashion countenance. When I pass through environments where vulgar language is exchanged or the disclosure of ‘uncensored’ body parts are displayed, I am, indeed, disturbed. And so it seems, the more modern we become with technology, verbal exchange, and fashion too, the more we adapt to the negligence of exercising civility, genuine concern and consciousness.
As the song moves along…“The future is not ours to see.”
But in fact, it is. It is ours to envision, assimilate and amend. The manifestation of self-awareness on an individual level will awaken the necessity for universal respect.
The Founders of the Institute for Civility in Government state, “Civility is about more than just politeness, although politeness is a necessary first step. It is about disagreeing without disrespect, seeking common ground as a starting point for dialogue about differences, listening past one’s preconceptions, and teaching others to do the same. Civility is the hard work of staying present even with those with whom we have deep-rooted and fierce disagreements. It is political in the sense that it is a necessary prerequisite for civic action. But it is political, too, in the sense that it is about negotiating interpersonal power such that everyone’s voice is heard, and nobody’s is ignored.”
What is painfully obvious are the continual immoral acts of incivility around our world. Much of the society in which we live has settled – and to a large degree – conformed to relentless acts of character assassination, cross identity differences, mass aggression, and the extreme epidemic of rudeness. The lack of civility and human rights liberties continue to run the gamut around the globe, for there is no corner of the world that has been ‘untouched’.
In 2015, on one episode of Bravo TV’s The Real Housewives of Atlanta Reunion, two cast members, Kenya Moore and Porsha Williams, battled it out in a relentless brawl in which Kenya Moore ‘ignited’ the cat-fight by screaming and waving a scepter in Porsha Williams face. I can assume that many fans viewed this occurrence as some form of quality discussion, but what began as an evening of entertainment quickly ended in a physical attack and arrest between the two.
In 2010, a series of civic atrocities occurred. A student in Lafayette, Georgia pulled an unloaded firearm on another student in a dispute over a Twinkie cake [Lafayette, Georgia News]. At South Hadley High School in Western Massachusetts, a 15 year-old girl committed suicide after intense stalking, name calling, harassment, threatened physical abuse and relentless bullying from other high school “mean girls” who even after her death, did not demonstrate any regret or remorse for their actions. Instead, they used Facebook to mock her death. [The Boston Globe] A 40 year-old Charter school teacher in Houston, Texas was fired and arrested for attacking and repeatedly hitting, kicking, then banging a 13 year-old pupils head into the wall of a school bathroom, an incident where the remainder of the teachers and many of the students stood around and watched. In another city, an angry man missed a flight connection and threw his suitcase at an eight-month pregnant airline employee. [Dailymail.com] And the beat goes on.
The tragic reports of incivility continue to rise, covering the pages of newspapers and magazines across the world. We bear witness to many of these behaviors in countless numbers, from public figures to everyday folks alike. Now in 2017, rudeness, the lack of human dignity, vulgar language, character assassination, and misdemeanors have reached an all-time high, while charitable giving and acts of philanthropy continuously decline. If we’re going to continue to wander around in a state of sheer unconsciousness and assume that it is all out of our control – and the only thing we can do is view it from afar and accept whatever happens – then we really can’t seize any opportunity for powerful transition and positive change. Now can we?
A sense of morality fosters an act of civility, which internally guides us in how we respond in and around the world. The end result becomes transparent in how we view ourselves, our bodies, our minds and others. When we honor and respect ourselves, we honor and respect others in the same manner. Our self-awareness is heightened and we begin to heal the world by resigning our ego, respecting multiculturalism, exercising civility, practicing etiquette and honoring the human rights of others. True civility takes into account the humanity of other people with whom we are engaged. It challenges us to embrace change, make connectivity, and cultivate accountability because we have certain moral responsibilities to one another.
Mahatma Gandhi once said, “The day the power of love overrules the love of power, the world will know peace.”
As an etiquette and life skills consultant, I have witnessed the decline of basic manners in the world from road courtesy to classroom chaos. But I also see the rewards in making the youth aware of the need for civility. From time to time, I wonder if my work gives meaning; if anyone’s child is really paying attention in my workshops. I cherish opportunities where I can engage with youth of both genders and from every walk of life. Be they the under-privileged or the most poised, something remarkable happens. Once the season of etiquette workshops has ended, a student, somewhere, will write to express their personal gratitude for how my instruction has made a difference in their life, inspired them to excel, or simply helped them to consider a more adequate way of thinking, behaving, and speaking. They are grateful because I believed in them, but more importantly, because now, they can believe in themselves. While I take no credit for this intervention, I do take a moment to be thankful and clear on the position I hold.
We are all travelers on the same spaceship of life. The earth beneath our feet is our earth; it belongs to all of us. The air we breathe is common property too. Yet, we spend so much time drawing distinctions, defending divisions, and delineating differences from countries to culture to color. We go bananas for borders and boundaries. “That’s my property – that’s yours. This is my land – you keep out!”
An act of true civility requires consciousness, compromise, collaboration, connection and real change. We need to build bridges, not walls in our communities. And we need to concoct an ingredient that is civil, peaceful, and promising. Just because someone may not employ the best policy of pleasantries does not excuse you of being courteous and aware. We can rectify acts of incivility in our world by starting with ourselves. We can change. We can serve as better examples for the young and seek advice from the elders who possess infinite wisdom. We can modify the way we treat each other because civility begins and ends within each of us.
Yes, the future is ours to see, and to save.
Always choose civility.
Weekly Affirmation: I am living in the spirit of accountability.
love, light, and awareness for your Tuesday
Copyright © 2009-2017. All rights reserved. Tuesday Morning Love is a trademark of Wind of Light Publishing
accountabilityawarenessbehaviorsChangeCharactercivilitycourtesiesdisrespectepidemicsetiquettegratitudehumanityhumilityidentityincivilitymannersmoralitymulticulturalismour worldpeacepowerresponsibilityrudeness
|
cc/2019-30/en_middle_0053.json.gz/line4521
|
__label__wiki
| 0.754292
| 0.754292
|
Onion News Network
Josh Modell
As you may have read, we're excited that our sister publication The Onion has finally made its way to your television. Tonight is the debut of Onion News Network, a half-hour of hard-hitting journalism that blows your CNNs and your Fox Newses right out of the water in the hyperbole department. It airs at 10 p.m. (9 central) on IFC, and you should really watch it. Because of our affiliation with the fine folks who created it, we don't feel like a review is in order. But the comments area, as always, is open for your polite discourse. Clip below!
Recent from Josh Modell
Rick Rubin’s Shangri-La is a magical-yet-hokey monument to music—and to Rick Rubin
Deadwood lives again: A catch-up guide to its cast and characters
Relationship status with Morrissey’s new covers album: It’s complicated
|
cc/2019-30/en_middle_0053.json.gz/line4523
|
__label__wiki
| 0.914141
| 0.914141
|
NCAAMNCAAM
RecruitingRecruiting
RankingsRankings
Coaching ChangesCoaching Changes
BracketologyBracketology
Dick VitaleDick Vitale
Ivy League Digital NetworkILDN
ESPN EventsESPN Events
What is the transfer portal?
91dJeff Borzello
Binghamton hoops player Anyichie, 19, drowns
Binghamton Bearcats
College basketball coaching changes for 2019-20
2dJeff Borzello
Biggest recruiting needs for Way-Too-Early Top 25 schools
Cleveland State fires Felton after two seasons
Cleveland State Vikings
Kentucky AD next to lead D1 hoops committee
Iowa adds Valparaiso graduate transfer Evelyn
Missouri State Bears
Florida makes big move in Way-Too-Early Top 25 for 2019-20
A player can remove his name from the portal if he decides to stay at his current school like Alabama's John Petty did. Donald Page/Getty Images
Jeff BorzelloESPN Staff Writer
Basketball recruiting insider.
Joined ESPN in 2014.
Graduate of University of Delaware.
You've probably heard a lot about college basketball and the transfer portal over the last couple of months. There are more than 500 Division I names in it right now, and that number is sure to increase as the offseason begins. But what is it, really?
To fill in the blanks, we got a sneak peek at the portal a couple of months ago and talked to a number of coaches about it.
So what is this transfer portal?
Essentially, it's a database of every player who has interest in transferring from his or her current school. The portal includes every collegiate sport, so a basketball coach could theoretically track football transfers or field hockey transfers.
How does a student-athlete enter his/her name into the portal?
College basketball transfer rankings for 2019-20 and 2020-21
Sources: Nevada's Brown enters transfer portal
St. Joseph's Kimble transferring to Louisville
It's very simple: They go to their school's compliance department and tell them they want to be entered into the transfer portal. Some schools ask the student-athlete to tell the coach first, but once a player goes to compliance and makes the request, they have 48 hours to be entered into the portal. Compliance and/or the coaching staff can't say no; they can only delay it for a day or two. At the end of the day, the transfer request has to be fulfilled.
Once a student-athlete's name is in the portal, schools can begin to contact him/her -- unless the student-athlete puts "do not contact" on the entry. Also, being in the portal doesn't necessarily mean the athlete is leaving. A player can remove his/her name from the portal. Alabama's John Petty did that earlier this offseason.
What's included in the portal?
It's sortable by a number of things: sport, name, conference, division, school. A coach can sort by most recent players to enter the portal and save names to a "Transfer Watch List."
Each entry also has a "Transfer Tracer," where coaches can find a player's information. There are no phone numbers for the student-athletes, just email addresses.
Who has access to it?
A school's compliance department and one coach from each sport's staff. Not every assistant coach and head coach have an email address; there's just one for a coaching staff. Sometimes it's a generic one, sometimes it's specific to one coach.
Do coaches like it?
Yes and no. One coach told ESPN that you still have to be cognizant and monitor potential transfers, to be ready once a student-athlete's name is in the portal.
"By the time the kid hits the portal, it's fair game," he said. "Coaches have to know about them beforehand."
One coach told ESPN he checks it at least 15-20 times per day; another said he rarely goes on there.
"If someone transfers, it's on the internet," he said. "If I'm interested, I follow up. What do I need to go on the portal for?"
There are also complaints about the technology and user-friendliness of the portal.
"The dumb thing about the portal is they put the kids' email as a way to contact him," one coach said. "What college kid in America regularly checks their email?
"It's not user-friendly," he continued. "You click on a kid's name and then you hit the 'back button' and it brings you back to the main page."
The general idea behind the portal was to make it easier for student-athletes to have their transfer intentions known. And it's on its way to accomplishing just that.
"It does give a little bit more power to the player," one high-major coach said.
|
cc/2019-30/en_middle_0053.json.gz/line4524
|
__label__wiki
| 0.645864
| 0.645864
|
http://tvtropes.org/pmwiki/pmwiki.php/Funny/TheTonightShowStarringJimmyFallon
Funny / The Tonight Show Starring Jimmy Fallon
Create New - Create New - Analysis Characters FanficRecs FanWorks Fridge Haiku Headscratchers ImageLinks Laconic PlayingWith Quotes Recap ReferencedBy Synopsis Timeline WMG
Jimmy's first night started with a bang. Besides him and Will Smith chronicling a history of hip-hop dances (ala Justin Timberlake and his and Jimmy's "History of Rap"), and U2 performing on the roof of 30 Rock, we have a moment where Jimmy mentions a "friend" who says he'd never host the Tonight Show, saying they owe him $100. Cue Robert De Niro, Tina Fey, Joe Namath, Rudy Giuliani, Mariah Carey, Tracy Morgan, Joan Rivers (in her 1st Tonight Show appearance, of any kind, since being banned from the show in 1986; the ban was kept by Leno out of respect to Johnny Carson), Kim Kardashian, Seth Rogen, Lindsay Lohan, Sarah Jessica Parker, Mike Tyson, and Lady Gaga all throwing crumpled C-Notes on the desk, culminating with Stephen Colbert pouring a bucket of 10,000 pennies on Jimmy's head, ending with "WELCOME TO 11:30, BITCH".
Brian Williams raps (transplanted from Late Night)
And Brian Williams' response to that after he raps "Gin and Juice".
Brian Williams: This is spooking me out, because there's a guy who, for a job, for months, has been sitting in an edit room looking at images of me and finding individual words. I have never said "hippity", never. And I know that he works here, intellectually, I have never met- like you have, I have never met him. If you're on my staff, I know your hopes, your fears, your dreams, I know all about your family, um... your staff, I imagine, is a much more, y'know, anonymous place-
Jimmy Fallon: (laughing) What are you talking about?
Brian Williams: You've told me, these are little people to you. (Jimmy laughs) But there's a guy who I've seen in the cafeteria, there's a guy who I've seen in elevators, who has looked at my face for a living, and it's spooky, it's frightening.
And now, "Baby Got Back". If you listen carefully, you can hear the audience singing along on the "anaconda" line!
Whenever Hashtag the Panda is brought out, a hilarious Overly Long Gag is in the cards as Jimmy and the band make the "bear" dance again...and again...and again.
It gets particularly energetic when Miley Cyrus plays Hashtag .
This bit after one "Thank You Note" about protein bars just being glorified chocolate bars:
Fallon: (in jock tone) All I eat is protein bars!
Higgins: (also in jock tone) That's it, man. I eat Monkey Milk protein bars.
Fallon: Nothing but Monkey Milk protein bars. They're the best ones. You get Monkey Milk, that's the best protein bar.
Higgins: If you don't get it, you're a fool. You're a damn fool if you don't get Monkey Milk. You're a fool.
Fallon: Don't call me a fool! I'm just saying-
Higgins: What do you get?? Do you get Monkey Milk?
Fallon: I don't know what kind of protein bar I got.
Higgins: Ehhh, you should, if you don't know what's going in your body, then you're some kind of fool. I went to Cinnabon the other day, I got the tiny little ones.
Fallon: You do?
Higgins: Yeah, about eight, nine of 'em, squeeze them up in the tube, shove them down my throat, two- (cracks up) I figured I'd down the Monkey Milk!
A spectacular Brick Joke: Hugh Jackman mentions in an interview that you should never let Aussies stay at your house, as "they will never leave," and he demonstrates by crashing on Jimmy's couch for a few minutes. The next night, Jimmy comes out for his monologue, and casually looks over to the couch. Sure enough...
A truly spectacular Epic Fail on Jimmy's part: when he had Nicole Kidman on as a guest, she tells him the story of their disastrous blind date...in that he didn't realize that it was a date and had spent the night playing video games and eating snacks, accidentally ignoring her. He literally fell out of his chair as everyone cracked up. Both Patton Oswalt (the next guest after her) and Jude Law spent part of their appearances reminding him.
One "In Reply To" had a joke about Chipotle. Steve asked Jimmy if he eats Chipotle in his new truck, and Jimmy got confused how you could eat a burrito one-handed while driving. Then he took the joke one step further by saying he gets a wearable trough and tells the cashier to "load it up". And he also pays without using his hands, by swiping his Google Glass. The absurd visual it puts in your head is hilarious.
Wheel of Impressions with Kevin Spacey. Among some of the best highlights are Spacey's spot-on impression of Johnny Carson:
Kevin Spacey: [as Carson] A lot of people are dressing up as ghosts and witches, goblins and vampires. But this year, Ive decided Im going as the scariest creature in the world: my ex-wife. [raucous laughter from everyone, including Fallon] Oh, and I scare the kids, too.
...or Spacey outdoing Jimmy in Michael Caine impressions.
Spacey appeared on the show again and played Phone Booth. Pointing out how stupid (but fun) Jimmy's games are is nothing new (see Bo Burnham's takedown of Lip Sync Battle), but Spacey is so determined to point out just how stupid getting shoved into a phone booth with Keegan-Michael Key and Big Bird is.
Spacey: (answering the phone) Yes? Most ridiculous sketch ever?
Christina Aguilera's eerily accurate impression of Britney Spears singing "This Little Pig".
Jimmy trolls The Roots by convincing them into watching the Fifty Shades of Grey trailer...not knowing that he snuck in a Screamer Prank.
When the show spent a week at Universal Studios in Orlando, Jimmy convinces some of The Roots to ride Dr. Doom's Fearfall . Hilarity Ensues and Damon cusses Jimmy out to high heaven.
Jimmy and Steve talking about Monster Cables.
Jimmy invites kids to write skits, with the prompt "Write what you think a film called Magic Mike would be about," and then invites Channing Tatum to do dramatic readings of said skits :
Channing Tatum: [deadpan] "Yes, I am Magic Mike. I'm like regular Mike, except magic."
Jimmy and Blake Shelton doing the Whisper Challenge
Blake Shelton: [after telling Jimmy the name Benedict Cumberbatch] That doesn't even mean anything!
Similarly, Jimmy taking Blake out for sushi when he's never eaten sushi before. Blake is less than enthusiastic (especially since Jimmy throws in all of the more disgusting dishes, like sea urchins).
Can we get some more rice wine?
The September 2015 Good Burger sketch , perfectly replicating the layout, style and humor of the original shorts while also bringing back stars Kenan Thompson and Kel Mitchell.
The skit "Real People, Fake Arms" with Jim Carrey and Jeff Daniels as burger restaurant employees. Of special note is the moment when Jeff Daniels gets Jimmy a shake, but the shake machine is so unexpectedly powerful that it blasts the cup out of Daniels's fake arms.
Given Creed was about to get released, Jimmy would welcome it WITH ARMS WIDE OPEN, UNDER THE SUNLIGHT... (complete with Pearl Jam nod). And later guest Billie Lourd decided to join in the Yarling.
In the 2/18/16 episode, Vince Vaughn observed how nobody has ever won against Jimmy in "Box of Lies". He became suspicious that everything Jimmy did during their interview was merely "info reading" to help him win the game. In a Moment of Awesome, Vince brought his A-game to "Box of Lies" and stumped Jimmy with his poker face and descriptions. The whole ordeal can be viewed here and here .
During the "Whisper Challenge" with Carol Burnett:
Jimmy: "Me Tarzan, you Jane."
Carol: Piss off...?
When Eugene Levy was Jimmy's partner in "Pictionary", Jimmy had the phrase "cat got your tongue". Jimmy drew a cat and a tongue, and Eugene still couldn't quite get it.
Jimmy: ARE YOU KIDDING ME?! ARE YOU KIDDING ME?! CAT TONGUE, CAT TONGUE, THE CAT GOT YOUR TONGUE, CAT GOT- THE ONLY PHRASE WITH THE WORDS "CAT" AND "TONGUE" IN IT! Mona Lisa! Mona Lisa!
Eugene: I would've got it!
Jimmy: A complete nightmare!
Eugene: Another ten minutes, I would've had it!
"Kid Letters" from the 11/16/16 episode:
"Dear little Jimmy, my name is Koen Chacoband, I'm in 5th grade, when I was in 4th grade I just started watching your show. It seems interesting. P.S.: YMG (Yo My Goodness) Nerds Rule! Stay in school. (Hey that rhyms!) #Pepperoni = Pizza = Life = Heavens of Awesomeness = GODS of Coolness = ...TACOS... (Give a evil look at the camera when you say tacos) Peace out, guard up, guard down, KOEN."
One monologue joke in February 2017 was about a women's strike. Jimmy showed a clip of what a day without women would be like: Cue a clip from Vampire's Kiss of Nicolas Cage's character slumping down the street while moaning in agony, "OHHHHHHHHHHHHH!!!!"
Jimmy and Elijah Wood getting sidetracked in a deep discussion of The Bachelor when it is revealed that the latter is friends with Nick Viall.
Elijah: I can't believe I'm having this conversation!
Jimmy and Steve break down during "Thank You Notes" on 3/24/17:
Jimmy: (doing Trump impression) Gazongas.
Steve: (laughing) Going down the tubers ! (Jimmy laughs) Where's it goin'?
Jimmy: Goin' down the tubers.
Steve: God...
Jimmy: Oh man...
Steve: That's the president!
(Jimmy tries to move onto the next Thank You note, but the music stops as he keeps laughing)
Steve: ...Of the UNITED STATES!
Jimmy: Oh my gosh!
Steve: Goin' down the... (laughs) (miming pulling a truck horn) Meep-meep!
Jimmy: Unbelievable.
Steve: What the F?! Unbelievable! This is REAL! (laughs)
Steve's bizarre persona when explaining the rules of Egg Russian Roulette. Behold an example.
Questlove's skepticism in "Do Not Play". He is convinced that all the tracks Jimmy plays are fake.
Questlove: (while Becca Ann's "Who I Am" plays) It's one of the interns, man!
Questlove and Tariq laughed so hard after the end of a sketch about appropriate voter dress code they start coughing.
Much like the one they did for Black Panther, Jimmy sets up a hidden booth with Tina Fey outside the Mean Girls stage show, where assorted fans are recorded giving thanks to Tina with a Mean Girls poster for reference, only to be surprised by Tina herself. It goes along pretty well until Tina trips and falls out of the booth.
"I did a Carol Burnett pratfall! My heel got caught in my pants leg! (hobbling on all fours) I'm almost there!"
Camp Winnipesaukee with Justin Timberlake, Keegan-Michael Key and Billy Crystal . Of note is Keegan's Large Ham delivery, and this joke when Billy Crystal appears late in the skit:
Jimmy: You're twelve?
Billy: Yeah.
Jimmy: Why do you have a beard?
Billy: I didn't when the sketch started!
Recurring guest Robert Irwin stopped by in September 2018 to show off some of the animals he works with at the Australia Zoo as he always does. However, this time the appearance coincided with Kevin Hart guest co-hosting the show and Hart proved to be completely terrified of the animals.
Kevin: [in regards to a baby ostrich's chirping] You know what shes saying? I want some little black man. Thats what shes saying.
Teaming up with Paul Rudd to remake shot-for-shot the video for "You Spin Me Right Round" by Dead or Alive.
The Tonight Show with Conan O'Brien
Funny/Live-Action TV K-Z
Too Cute
|
cc/2019-30/en_middle_0053.json.gz/line4525
|
__label__wiki
| 0.636204
| 0.636204
|
Dominica: One Year after Maria
0 0 Wednesday, September 19, 2018 Edit this post
© Flickr PHOTO: Aftermath of Hurricane Maria in Dominica. (photo via Flickr/The Office of Dominica Prime Minister Roosevelt Skerritt)
By Brian Major, TravelPulse
September 2018 marks one year since back-to-back Category 5 hurricanes wracked several Caribbean destinations. While it was largely spared from Irma’s impact, Dominica was among the Lesser Antilles islands hard-hit by Maria.
As we continue to monitor the Caribbean storm season, TravelPulse takes a look back at the region’s recovery since Hurricane Irma and Hurricane Maria hit last September.
Dominica had just recovered from the significant damage caused by Tropical Storm Erika when Hurricane Maria struck. The storm devastated large swaths of the mountainous nation, claiming 30 lives and causing damage and losses exceeding $1.3 billion, equal to 225 percent of the country’s annual economic output according to Discover Dominica Authority (DDA) officials.
Dominica’s government has since launched a recovery plan in partnership with the World Bank, which is providing $65 million for reconstruction. Plan priorities include adopting climate-smart agricultural techniques and encouraging resilient building practices.
In addition, many of the tourism-reliant nation’s visitor attractions are open.
“Twenty-one of our 23 top sites toured by visitors have reopened since January,” said Colin Piper, DDA’s CEO. “The dive product continues to rank among the best in the region and the world [and] most importantly the hills of Dominica are green again.”
Piper added, “The progress made this past year represents a milestone in the recovery process during which the people of Dominica, and the natural environment itself, have shown their resilience and indomitable spirits.”
Improved Air and Sea Access
Dominica’s airports, Douglas-Charles and Canefield, were spared major damage and air connectivity was restored by October 2017. Both facilities are now fully open; Douglas-Charles offers same-day connectivity with international flights. Dominica’s L’Express des Iles is also available and a new operator, Val Ferry, launched service between Dominica and Guadeloupe in August.
Long a significant cruise port, Dominica is rebuilding its previously robust traffic. Ship re-routings and storm-generated itinerary changes limited the island to only 33 cruise ships during the 2017-2018 season (out of an expected 219 visits prior to Maria).
Carnival Cruise Line has stepped into the void, resuming its Dominica service aboard s 2,056-passenger Fascination with bi-weekly stops between July and November. Dominica is projected to host 181 calls (carrying 304,031 passengers) during the 2018-2019 cruise season.
Hotels Reopened
A majority of Dominica’s properties are open, with more than 540 rooms available, representing more than 50 percent of the 962 rooms available prior to hurricane Maria.
Piper said several properties used Marie as an opportunity to undertake significant renovations. Two hotels, Secret Bay and Jungle Bay, are scheduled to re-open in November and February, respectively.
The Fort Young Hotel, a signature Dominica property, is currently operating with 40 rooms while undergoing a major renovation that will add 60 new rooms. The property is slated to re-open in October 2019.
Severely damaged by hurricane Maria, Citrus Creek Plantation will re-open in December. Additionally, two new luxury hotels will debut in Dominica in October 2019: the Cabrits Resort Kempinski Dominica and the Anichi Resort, part of Marriott’s Autograph Collection.
Travel - U.S. Daily News: Dominica: One Year after Maria
https://3.bp.blogspot.com/-Et0MOIIn9xA/W6MpQsUG8WI/AAAAAAAA_nI/mnHcWkiQoD4cJVY6rik-tB7NrpoVPz6UgCEwYBhgL/s1600/4.jpg
https://3.bp.blogspot.com/-Et0MOIIn9xA/W6MpQsUG8WI/AAAAAAAA_nI/mnHcWkiQoD4cJVY6rik-tB7NrpoVPz6UgCEwYBhgL/s72-c/4.jpg
https://travel.dailynews.us.com/2018/09/dominica-one-year-after-maria.html
|
cc/2019-30/en_middle_0053.json.gz/line4528
|
__label__wiki
| 0.89966
| 0.89966
|
Free High-Speed Wi-Fi Debuts in New York Airports
0 0 Thursday, October 25, 2018 Edit this post
© Getty Images PHOTO: A man using a smartphone inside of an airport. (photo via travnikovstudio/iStock/Getty Images Plus)
By Alex Temblador, TravelPulse
There’s nothing worse than receiving only 30 minutes of free Wi-Fi at an airport. It’s not enough time to do work and barely offers enough speed to catch a full episode of The Office on a three-hour layover.
New York City airports previously lacked in the free Wi-Fi department – offering as little as 30 minutes for free with partner Boingo, and this significantly hurt them in terms of customer satisfaction.
While there were a few exceptions like JetBlue’s Terminal 5 in JFK that provided free Wi-Fi access for passengers, as of today, every traveler through the three main New York City airports, as well as Stewart Airport in Newburgh, will receive access to free Wi-Fi for up to four hours.
Not only will the Wi-Fi be free, but it will also run at a faster rate of up to 50 megabits per second. With a larger bandwidth, travelers can easily stream Netflix, download large files, and participate in video conferences.
“Our testing consistently shows speeds that will comfortably allow for that,” said Robert Galvin, Port Authority's chief technology officer.
With four free hours of Wi-Fi at high speeds, New York City airports will have entered an age of better customer service.
As Rick Cotton, executive director for the Port Authority of New York and New Jersey told CN Traveler, “Passengers shouldn’t have to wait for better Wi-Fi” as it has evolved from a perk to “a bedrock expectation of today’s customers.”
Get breaking news and in-depth coverage at Daily News
Travel - U.S. Daily News: Free High-Speed Wi-Fi Debuts in New York Airports
https://4.bp.blogspot.com/-9sNP0Ou_Jm0/W9KZ_K70oaI/AAAAAAABF48/jQ9zO03kvLQY7I5V9ZAyE0jX_vvU54KiwCEwYBhgL/s1600/2.jpg
https://4.bp.blogspot.com/-9sNP0Ou_Jm0/W9KZ_K70oaI/AAAAAAABF48/jQ9zO03kvLQY7I5V9ZAyE0jX_vvU54KiwCEwYBhgL/s72-c/2.jpg
https://travel.dailynews.us.com/2018/10/free-high-speed-wi-fi-debuts-in-new.html
|
cc/2019-30/en_middle_0053.json.gz/line4529
|
__label__cc
| 0.553748
| 0.446252
|
Matt’s Movie Corner: Birdman or (The Unexpected Virtue of Ignorance)
Hi, you’re appreciated
Best Lead Actress
Kyle Och, Reporter
Best Actress in a Leading Role - Nominees Marion Cotillard - Two Days, One Night Julianne Moore - Still Alice Felicity Jones - The Theory of Everything Rosamund Pike - Gone Girl Reese Witherspoon - Wild Want to win: Rosamu...
Best Actor in a Supporting Role - Nominees J.K. Simmons - Whiplash Ethan Hawke - Boyhood Robert Duvall - The Judge Edward Norton - Birdman Mark Ruffalo - Foxcatcher Want to win: Mark Ruffalo - Foxcatcher Should...
Best Actress in a Supporting Role - Nominees Patricia Arquette - Boyhood Laura Dern - Wild Keira Knightley - The Imitation Game Emma Stone - Birdman Meryl Streep - Into the Woods Want to win: Meryl Streep - Into the Woods Sh...
Best Adapted Screenplay (Best Screenplay based on a Previously Published/Produced Work) Imitation Game Whiplash The Theory of Everything Inherent Vice American Sniper Want to win: The Imitation Game S...
And Finally…Best Picture
Best Picture - Nominees Boyhood Birdman Theory of Everything The Grand Budapest Hotel The Imitation Game Selma American Sniper Whiplash Want to win: The Grand Budapest Hotel Should win: Boyhood...
Best Director - Nominees Richard Linklater - Boyhood Alejandro Gonzalez Inarritu - Birdman Bennett Miller - Foxcatcher Wes Anderson - The Grand Budapest Hotel Morten Tyldum - The Imitation Game Want to win: Wes Anderson - The Grand Budapest H...
Best Original Screenplay - Nominees (Best Screenplay written directly for the Screen) Boyhood Birdman Nightcrawler Foxcatcher The Grand Budapest Hotel Want to win: The Grand Budapest Hotel Should win...
Best Animated Feature: Big Hero 6 How to Train Your Dragon 2 Boxtrolls Song of the Sea The Tale of Princess Kaguya Want to win: Song of the Sea Should win: How to Train Your Dragon 2 Long Shot: Boxt...
Although not much praise goes to the technical categories, I believe they have great significance on the movie. Here are some of my notable categories: Best Cinematography - Emmanuel Lubezki vs. Roger Deakins I find t...
Matt’s Movie Corner: American Sniper
|
cc/2019-30/en_middle_0053.json.gz/line4538
|
__label__wiki
| 0.753917
| 0.753917
|
Multicloud Strategies Are Important for Developer Ergonomics
contributed,
Cloud Services / Contributed
25 Jun 2019 11:00am, by Jevon MacDonald
Jevon MacDonald
Jevon MacDonald has spent the last decade building high technology businesses. Jevon is the co-founder and the CEO of Manifold, the cloud native marketplace company. Before Manifold, he was co-founder and CEO of GoInstant, acquired in 2012, by Salesforce for $100 million. After the acquisition, he worked for Salesforce as GM, Service Cloud Mobile. Before that, he worked at Dachis Group, Firestoker.com and silverorange.com.
Hidden among the numbers revealed when technology startups go public for the first time, there’s been an interesting trend in recent years: the majority of startups about to go public are entering into exclusive, multiyear contracts with a single cloud provider — locking in cost savings, but also, the company’s business for the long haul.
When Snap, the company behind Snapchat, went public in 2017, we learned that it had entered into an agreement with Google Cloud to use a minimum of $2 billion in services over five years. Lyft’s IPO in April revealed a $200 million commitment with Amazon Web Services through 2021. Pinterest, which will IPO in the coming weeks, committed $750 million of spending for Amazon Web Services as well. Uber and Slack’s S1 filings contained similar agreements as well.
But, there’s an elephant in the room: signing these large commitments to a cloud platform comes with the expectation of using a single cloud provider, regardless of the product or developer’s need.
Why are all of these enormous startups locking themselves into a single cloud for the long run? Cost savings — and ensuring that the cost of running their platforms is predictable enough for public investors to feel confident investing their money. But, there’s an elephant in the room: signing these large commitments to a cloud platform comes with a second expectation: using a single cloud provider, regardless of the product or developer’s need.
In the search for cost savings in modern cloud, we’ve lost sight of an important and difficult to measure problem: developer productivity. Startups thrive on taking advantage of the best-in-breed tools, hiring developers that help them choose tooling that gives them an edge over incumbents and emerging competitors, but single-cloud commitments mean losing access to many of those tools.
Locking into a single cloud has other costs, too: attracting engineering talent is harder, due to a narrower set of languages and stacks, application performance can suffer and interoperability with third parties can become limited. The promise of the cloud over traditional data centers was freedom of choice, which sped up implementation of new ideas dramatically as developers experimented with tooling, API-as-a-Service, and other emerging ideas — so why artificially limit that again?
The technology landscape for developing modern applications is moving fast. A large advantage comes with a multicloud strategy: you’re ready and able to make the jump to new technologies and platforms as they become available and viable for your business, without lag.
A great example of this can be found in the current fight for dominance in machine learning tooling. Both Amazon and Google offer a range of tools for companies leveraging machine learning, but Google Cloud has a distinct edge with custom hardware designed for AI workloads which helps complete jobs faster. If you were locked into a contract with Amazon and didn’t have a service that competes in that space, your team couldn’t take advantage of that innovation.
We can look to the leaders of the industry today to see multi-cloud strategies that work. Apple, for example, has operated iCloud across both Google Cloud and AWS since at least 2016, using services from both platforms to ensure it gets access to the best tools and costs, while avoiding backing itself into a situation where it has all of its bets on a single external provider.
Netflix has developed powerful internal tooling like Spinnaker, which allows its teams to leverage multiple cloud platforms transparently. While Netflix remains the poster child of AWS, its platform-agnostic tooling encourages developers to experiment with new services and cloud technologies without introducing friction.
Netlify, a company that specializes in static-site hosting at scale, hosts across Google Cloud (GCP), AWS, and Rackspace Cloud. It moved from a single provider to leveraging three to “make sure that in the face of a major outage from an underlying provider, anywhere in our network, Netlify’s service would continue with minimal interruption”
Chief Technology Officers (CTOs) are moving toward cloud-agnostic technology stacks which can run anywhere — the first step towards being able to operate on any cloud — containerization has become the standard first step, followed by orchestration tooling such Kubernetes to add an abstraction layer above the platform you’re deployed to. At Google Cloud Next, the company even unveiled its own first-party tool for running workloads seamlessly across multiple clouds simultaneously, regardless of whether it’s Amazon, GCP and Azure. Multicloud is truly already arriving.
These innovations make it crazy to ignore multicloud. By choosing flexibility, you gain access to the best price available as “other” clouds rise in popularity, which forces the big three to compete. Looking at the market share of the public cloud today, “other” clouds make up over 30% of active usage because they offer something different from the large incumbents.
A great example: clouds like BackBlaze’s B2 data storage or DigitalOcean’s Kubernetes platform are built by more nimble companies that ship features faster and compete aggressively on cost, providing unique features along with higher levels of support than the bigger platforms.
Tools like Manifold connect with all of the services a startup might use — from Mailgun to LogDNA — allowing developers to drop in the platforms they prefer to use, without worrying about getting access or IT to negotiate a contract.
This provides a central stop for developers to jump off from, circumventing vendor lock-ins and providing instant tooling access. It also helps avoid “shadow IT” — where developers simply hide their use of unsanctioned tooling — before it occurs and preserves the development team’s ergonomics: they’re never blocked by red tape or cost controls.
The developer is given the flexibility of the best tools for the job, while the chief financial officer and CTO maintain broad visibility into what’s being used in the organization; a rare win-win scenario. Centralized management like this was only thought of when using a single cloud platform — but it’s an important part of a cross-cloud strategy, enabling properly governed infrastructure regardless of who’s actually billing you, and removing friction from the process of implementing new services.
It’s clear that there’s a strong desire among late-stage startups and executive teams to rein in their cloud costs, but focusing on cost alone loses sight of what made those businesses competitive in the first place: being early to market, and having the flexibility to jump onto new tooling that provides an edge.
Today, developers are spending up to 90% of their time maintaining software rather than innovating or building something new. There is a clear opportunity for gaining an edge through enhanced developer productivity by breaking the trend, and focusing on a multicloud strategy that provides developers with best-of-breed cloud services that enable them to use the best tools for the job.
Multicloud doesn’t need to increase complexity as a startup scales and can be just as cost-effective as a single-cloud strategy. But, most of all, your developers will thank you by sticking around and getting more done.
Image via Pixabay.
DevOps / Kubernetes / Contributed
The Kubernetes Hierarchy of Needs
15 Jul 2019 12:00pm, by Josh Grose
DevOps / Sponsored / Contributed
Traditional Quality Assurance Is Dead (And Why That’s a Good Thing)
12 Jul 2019 12:00pm, by Wayne Ariola
|
cc/2019-30/en_middle_0053.json.gz/line4542
|
__label__cc
| 0.664979
| 0.335021
|
Top 10 Trails in DFW for Trail Running
September 12, 2018 /in Blog /by Party Run
Get outside for your running and training by hitting the 10 most popular running trails around the Dallas-Fort Worth area.
1. Fort Worth Trinity Trails
Winding around the city of Fort Worth, the Trinity Trails are the most notable trail for locals looking for a place to cycle, run or walk. By connecting 21 local parks, the Log Cabin Village, Fort Worth Zoo, Fort Worth Botanic Garden and Japanese Garden, the Stockyards and downtown Fort Worth, the Trinity Trails span over 40 miles; giving you easy access to hop on and get back home wherever you’re located in the city.
Many trail-goers find themselves at Woodshed Smokehouse right off South University Dr. or Chuy’s Mexican restaurant off West 7th street for a bite to eat or to meet up with friends before or after their run or bike ride.
2. Trinity Skyline Trails
Similar to the Fort Worth Trinity Trails, the Trinity Skyline Trails originate from the same Texas river system but offer trail-goers impressive views of downtown Dallas. At just over 4.5 miles, and accessible off Trammell Crow Park, the Continental Avenue Bridge or the Trinity Overlook, you won’t want to miss trail running along the scenic Trinity Skyline Trails.
3. Katy Trails
Built on the historic Katy Railroad line that connects the Victory Park and Uptown neighborhoods, the 3.5 mile-long scenic Katy Trails is dotted with great eateries and entertainment for trail-goers to enjoy before or after their trail running. Starting from SMU and weaving down to the American Airlines Center, the Katy Trails features both a 12 ft-wide concrete path and a 8ft-wide dirt running path for you to choose from.
4. North Shore Trails
Near Grapevine Lake, the North Shore Trails are ten miles of dirt roads, and scenic views of lakeside cliffs and the beautiful Northern Shore. Open all-year, the North Shore Trails are for runners who prefer tougher terrain as the trail ranges from rolling terrain to more wooded areas. Located on the northside of Lake Grapevine, the North Shore Trails connect Rockledge and Twin Coves parks.
5. White Rock Lake
With nine miles of paved paths encircling White Rock Lake, this trail is great for everything from biking and running to walking. The larger White Rock Lake park stretches over a thousand acres and offers a great view of Downtown Dallas. With the popular entry point being Big Thicket cabin, most runners follow the yellow line around the lake along the concrete trail.
6. Cedar Ridge Preserve
Located near Arlington, Cedar Ridge Preserve features over eight miles of hill country just twenty minutes southwest of Downtown Dallas. With a total of 13 trails, there’s plenty of terrains and trail lengths to choose from. Entry to the Preserve is free but donations are welcomed. Dogs are welcome too, as long as they stay on leash, and with over 600 acres, many visitors enjoy the north Texas blackland prairie ecosystem with beautiful trees, wildflowers, and wildlife. Since this trail system doesn’t allow cyclists, the Cedar Ridge Preserve is great for Dallasites who want to escape the bustling city for their run.
7. Cedar Hill State Park: DORBA Trail
Found just miles away from Cedar Ridge Preserve, the Cedar Hill State Park DORBA (Dallas Off Road Bicycle Association) trail is great for cyclists who also want to escape the busy Dallas environment. The DORBA Trail has three loops — a 3-mile short loop, 8-mile mid-sized loop, and a 12-mile long loop — designating the area as an intermediate-level course with tight turns, making it perfect for endurance training cyclists and runners alike.
8. Fort Worth Nature Center
Slow down by taking a hike or peaceful run on 20 miles of hiking trails at the Fort Worth Nature Center. With 3,000 acres to enjoy, the Nature Center and Refuge is home to buffalo, a prairie dog colony, alligators, deer, and other extraordinary wildlife. Just ten miles from downtown Fort Worth, the Nature Center is great for trail runners who want to escape the often busy Trinity Trails for a more relaxed environment. Be sure to check the Nature Center’s website before you head out to research the various trails and to make sure they’re open for the season.
9. Chisholm Trail
Plano’s Chisholm Trail is a paved 9.3-mile trail that spans across Harrington Park on the southern end to Jack Carter Park on the trail’s north side. Connecting community areas like the Copper Creek Playground and Big Lake Park, makes the Chisholm Trail easily accessible and centrally located in Plano; making it a safe, family-friendly trail for everyone to enjoy.
10. Campion Trail
Offering a mix of urban and nature views, the Campion Trail winds through the Dallas suburb of Irving with separate northern and southern sections; totalling over 13 miles of paved trail. Frequently used as both a commuting and recreational-use trail, the northern section begins in the Valley Ranch community (at Sam Houston Trail Park) and follows the Elm fork of the Trinity River south to Irving’s central business district, Las Colinas.
Similar to the north, the southern part of the Campion Trail follows the West Fort of the Trinity River; beginning in Trinity View Park and traveling along through Twin Wells Park and Mountain Creek Preserve. Eventually, the city is hoping to connect the pathways along tributaries of the Trinity River in part of the larger regional effort to join the Irving, Grand Prairie, Arlington, Fort Worth and Dallas trail systems, but until then, lace up your running shoes and pick a side and enjoy!
Whether you’re wanting a view of urban downtown Dallas or Fort Worth on your run or wanting to opt for a more scenic view of North Texas landscape, we hope you enjoy these Top 10 trails for your trail running adventures.
https://thepartyrun.com/wp-content/uploads/2018/09/top-10-trails-in-dfw-for-trail-running.jpg 960 1280 Party Run https://thepartyrun.com/wp-content/uploads/2019/05/the-party-run-logo-blue.png Party Run2018-09-12 08:00:142018-09-20 10:02:32Top 10 Trails in DFW for Trail Running
Top 5 Best Wireless Earbuds for RunningOctober 4, 2018 - 10:28 am
The 5 Best Sunglasses for Competitive RunnersSeptember 30, 2018 - 9:36 am
Top 5 Best Running Shoes for BeginnersSeptember 24, 2018 - 8:53 am
How to Increase Your Running Speed (5 Training Tips)September 20, 2018 - 10:00 am
How to Increase Your Running Endurance (5 Training Tips)September 13, 2018 - 8:00 am
Top 10 Trails in DFW for Trail RunningSeptember 12, 2018 - 8:00 am
How to Stretch Before & After Your RunSeptember 10, 2018 - 2:16 pm
Tips for Staying Hydrated During a 5K RunSeptember 4, 2018 - 3:04 pm
5 Nutrition Tips for RunnersSeptember 1, 2018 - 6:49 pm
How to Train for a 5K Race – 5 Training Tips For RunnersAugust 27, 2018 - 3:13 pm
The Party Run team is a group that loves to run, party and make a difference! We have always participated in charity golf tournaments, but wanted to do something different and get the Metroplex involved with causes near to our heart, all while having a great time and getting some exercise.
Sponsorship & Vendor Opportunities
© ThePartyRun.com || Digital Marketing by Base3Group
How to Stretch Before & After Your Run How to Increase Your Running Endurance (5 Training Tips)
|
cc/2019-30/en_middle_0053.json.gz/line4545
|
__label__wiki
| 0.769634
| 0.769634
|
← US Using 4 Airports to Support Haiti Relief or to …???
Pak beat India in U-19 World Cup, qualifies for Semis →
India: Triggering Mechanism of Self Destruction
India Fails to contain Internal Freedom Movements, wants to attack the neighbours
One of the major causes that led to the First World War was Emperor William’s ambitions for the German Empire to be a world power. He believed in an uncompromising policy of ‘power or downfall’ which ultimately resulted in the ‘downfall’ of the empire. Similarly, it is the misfortune of South Asia that India has been trying to endanger the region’s peace by aspiring to become a ‘world power’, or at least a ‘regional power’ in wake of modern world trends like renunciation of war, peaceful settlement of disputes and economic development.
Over the years, India has not only been developing its conventional and nuclear arsenals, but is also obtaining latest weapons from the US, Russia and Israel in violation of the Non-Proliferation Treaty (NPT). In this context, presuming a peace-loving China as an enemy New Delhi often justifies arms accumulation, while in practice India has constantly deployed its forces along the Pakistani border. As regards Indian belligerent approach, it is the result of India’s shattered hope of intimidating other neighbouring countries, especially Pakistan which the former considers a continuous obstacle in the way of its designs.
Under the pretext of Talibinisation, the Indian secret agency, RAW, has well established its tentacles in Afghanistan, and has been running secret operations against Pakistan from its consulates located near the Pak-Afghan border. It has spent millions of dollars in Afghanistan to strengthen its grip in order to get strategic depth against Islamabad.
Meanwhile, Prime Minister Gilani and Foreign Minister Qureshi have repeatedly stated: “India supports terrorism in Pakistan, and its evidence will be shown to the western countries at the right occasion.” Indeed, this is in coordination with the statements of the ISPR spokesman Major General Athar Abbas who revealed that during the ongoing military operations huge cache of arms and ammunition had been captured while it was being shifted from Afghanistan.
Perhaps, frustrated in achieving its aims of becoming a world power, and a permanent seat in the UNSC, now the Indian rulers have started openly threatening nuclear powers like Pakistan and China.
In this backdrop, the Indian Army Chief, General Deepak Kapoor, vocally revealed on December 29 that the Indian army “is now revising its five-year old doctrine” and is preparing for a “possible two-front war with China and Pakistan.”
However in response to New Delhi’s threat, Pakistan’s JCSC chairman, General Tariq Majeed, stated:
“The Indian army chief’s statement exhibits a lack of strategic acumen…[such a path could] fix India on a self-destructive mechanism.”
It is surprising to note that in more than seven states, India itself faces separatist movements which are the result of acute poverty and social injustices. Particularly, Maoist movement that has been raging in West Bengal, and has now expanded to other regions including Maharashtra. At present, it is a popular insurgency by the downtrodden who have massive support of the people for their ideology.(images below)
A Maoist camp in the Nallamala forest in AP
Naxals/Maoists
Red hood locals pledge support to Maoists in the jungles of Bastar
Villagers watch as Maoists burn effigies of Sonia Gandhi and Manmohan Singh in Dumariya district -Bihar
Maoist rebels at a memorial for those killed in Police encounters in the Nallamalla foresr - South of Hyderabad
Mass rally in Hyderabad organized by Maoists
Naxalite base in Karnatka
“India’s Maoist rebels are now present in 20 states and have killed more than 900 Indian security officers…India’s rapid economic growth has made it an emerging global power but also deepened stark inequalities in society.” (31st Oct. New York Times)
Thus, by neglecting all these ground realties New Delhi has been advancing towards a self-destructive path.
Notably, USA’s dependence on Pakistan for war against terrorism and for close economic cooperation with China will roll back the Indian clandestine agenda which is part of its regional ambition against Islamabad and Beijing. Nonetheless, like the failed foreign policy of Emperor William II, the Indian policy of ‘power or downfall’ is bound to result in a nuclear catastrophe in the region as ‘nuclear’ Pakistan and China cannot ignore their defence, while their adversary is determined to act upon its aggressive designs.–>modified
Filed under India, World Tagged with Afghanistan, Andhra Pardesh, AP, Beijing, Bihar, border, Chattisgarh, Chhattisgarh, China, Coldstart doctrine, Defence, Emperor William’, First World War, Gen Deepak kapoor, Gen. Tariq Majeed, Hope, Hyderabad, India, Indian army, Indian Army chief, Indian Clandestine agenda, Indian Maoists, Indian secret agency, Indian security, Islamabad, Jharkhand, Karnatka, Kerala, Lal Garh, Maharshtra, Manmohan Singh, Maoists, Maoists rebels, Nallamala forest, Naxalites, Naxals, New Dehli, New York Times reort, NPT, Nuclear, Nuclear war, Orissa, Pakistan, Pakistan Armed Forces, PLA, Poverty, power or downfall, RAW, Red hood locals, Self-destructive mechanism, sepratist movements in india, Social injustice, Sonia Gandhi, Talibanisation, Tamil Nadu, The Spreading Naxal Threat, two-front war, UNSC, Uttar Pradesh, Uttaranchal, West Bengal, wolrd power, World War
About ThePeopleOfPakistan
最新消息 ,آخر الأخبار,خبر یں ,Son Haberler Latest News,Views,Opinions. In-depth Analysis on broad range of news/politics/social issues/terrorism/current events
|
cc/2019-30/en_middle_0053.json.gz/line4546
|
__label__cc
| 0.667055
| 0.332945
|
Day 118: St Davids to Porth y Dwfr – Faith & Light
St David’s Cathedral at dusk from the gatehouse, started 1123, Pembrokeshire.
Path to the ruins of St Non’s Chapel, held by tradition to mark the birthplace of St David, Pembrokeshire.
Nave of St David’s Cathedral, Pembrokeshire.
Seascape (glimmer), St Bride’s Bay, Pembrokeshire.
Early morning, St David’s Cathedral, Pembrokeshire.
Seascape II, St Bride’s Bay, Pembrokeshire.
St. Non’s Well, said to have sprung up during a thunderstorm when St. David was born about 500 AD. Its waters are reputed to have healing properties, St Davids, Pembrokeshire.
Porth y Ffynnon, St Davids, Pembrokeshire.
Oak ceiling above the nave, St David’s Cathedral, Pembrokeshire.
Seascape III, St Bride’s Bay, Pembrokeshire.
Chest tomb showing incline of nave, St David’s Cathedral, Pembrokeshire.
Seascape IV, St Bride’s Bay, Pembrokeshire.
Tomb stone, St David’s Cathedral, Pembrokeshire.
Treginnis Uchaf, St David’s head, Pembrokeshire.
West front of St David’s Cathedral made of distinctive purple Cambrian sandstone, Pembrokeshire.
Seascape V, St Bride’s Bay, Pembrokeshire.
Entrance to the Great Hall of the Bishop’s Palace, St David’s, Pembrokeshire.
Carreg yr Esgob, St David’s Head, Pembrokeshire.
Great Hall of the Bishop’s Palace, St David’s, Pembrokeshire.
Seascape VI, St Bride’s Bay, Pembrokeshire.
St David’s Cathedral from the Bishop’s Palace, Pembrokeshire.
Ramsey Island & St David’s Head, Pembrokeshire.
Irish oak ceiling above the nave, constructed between 1530-40, St David’s Cathedral, Pembrokeshire.
Ynys Cantwr, Ynys Gwelltog & Foel Fawr, Ramsey Island, Pembrokeshire.
Steps to St David’s Cathedral, Pembrokeshire.
Porth y Rhaw, St Davids, Pembrokeshire.
St Non’s Cross, 7th to 9th century, St Non’s Chapel, Pembrokeshire.
Bwthyn Trehilyn, cottage with traditional lime mortar over tile roof, Porth Clais, Pembrokeshire.
Pen Dal-aderyn (western most point of mainland Wales) & Ramsey Island from St Justinian, Pembrokeshire.
Last light, Whitesands Bay, Pembrokeshire.
Sunset over Ramsey Island & South Bishop Lighthouse, Whitesands Bay, Pembrokeshire.
Sunset over South Bishop Lighthouse, Pembrokeshire.
South Bishop Lighthouse, Pembrokeshire.
Coetan Arthur, a Neolithic burial chamber believed to date from around 4,000 B.C, Porth Mawr, Pembrokeshire.
At Pen Dal-aderyn, the most westerly point of mainland Wales looking towards Ramsey Island.
Camp below Carn Perfedd, Porth y Dwfr, Pembrokeshire.
Dawn by St George’s Channel , Porth y Dwfr, Pembrokeshire.
27 thoughts on “Day 118: St Davids to Porth y Dwfr – Faith & Light”
I think these are among your best photos. All are fantastic!
Thank you, It was an astonishing day of riches!
These photos are very powerful, I just had the feeling of being there. This must be so good for your soul! Continued safe travels!
it certainly was, nature and the best of human culture combined in a single day are a recipe for calm
Beautiful evocative images-it makes me feel I’m there. Such beautiful places.
Beautiful and interesting photos. I didn’t know of this cathedral. Lovely use of light conditions.
Its quite hidden, literally – it was built in a depression in the ground so it was hidden from the sea so as not to be a target for viking raiders
That’s really interesting to know. Thanks.
Myriam says:
OMG, what a beautiful pictures. I wanna go there!!!!
Les Petits Pas de Juls says:
fantastic shots! as always, the fog makes for dramatic landscape views. and the Cathedral is very impressive.
Thanks, very enjoyable contrasts, it’s easy to see why the area is such a focus for spirituality
That’s for sure! It looks very attractive!
Oh and those camping spots you find along the way are absolutely fantastic! 😉
calijones says:
What gorgeous coastline
special isn’t it
pamatography says:
Oak Ceiling
incredible carving huh!
exploringmycalifornia says:
These photos are amazing! Love the angles in the Cathedral. I couldn’t stop admiring the details of such a beautiful place. I love the photo of “Entrance to the Great Hall of the Bishop’s Palace, St David’s, Pembrokeshire.” I think I would have stayed here just looking at this entrance. The “St David’s Cathedral from the Bishop’s Palace, Pembrokeshire,” photo was perfect with the cathedral framed perfectly. If I was thereI would have stayed there for hours and filled up my memory card. Thanks for sharing your beautiful photos. We don’t have beauty like what you have in the States.
Many thanks, It’s certainly a very inspiring location for photography, I did good job of filling up my cards! You have great beauty in the States too but the sense of ancient history is around every corner in the landscape here.
gillis9728 says:
Stunning! I must go to Wales!
you won’t regret it 🙂
Ruth Livingstone says:
Love the juxtaposition of photos – hard lines of human constructions, versus the melting softness of the landscape.
Thanks Ruth – that’s how it felt that day – the morning spent admiring the cathedral and the rest of the day wandering through the mist thinking about what I’d seen earlier
dunaganagain says:
Your series of seascapes is gorgeous. I would love to see them printed on a monumental scale and exhibited all together.
Thank you – so would I!
|
cc/2019-30/en_middle_0053.json.gz/line4547
|
__label__wiki
| 0.586339
| 0.586339
|
Killing Without Boarders: Is Government Helpless?
April 26, 2018 Oji Odu
By Oji Odu
Had members of the Executive, National Assembly, and the leaders of this our great country earlier received information one day that the wives, children and other close relatives they left at home while performing their Executive and legislative duties in Abuja had been gruesomely murdered by alleged Fulani herdsmen while in their farms, or worshipping their God in their Churches or Mosques, would this plaguing herdsmen killings not have been checked?
Would they have taken it as the Lords doing, and continued to describe the inhuman and barbaric act with various high sounding English terminologies, or would they have risen up in anger and put a stop to the daily mournings the nation has been subjected to? This is because both the knife and the yam are in their hands.
Nigerians have expressed dissatisfaction to President Muhammadu Buhari’s reaction to Tuesday, April 24, 2018, herdsmen’s latest killings at St. Ignatius Catholic Church in Ukpor-Mbalom community in Gwer-east of Benue state.
The President in his reaction in a statement by his Aide, Femi Adesina, had described the murder as vile and satanic insisting that the perpetrators of the crime were clearly making attempt to stoke up religious conflict and possibly plunge our communities into endless bloodletting.
“I extend my sincere condolences to the government and people of Benue State, the Mbalom community, and especially the Bishop, priests and members of the St Ignatius’ Catholic Church, whose premises was the unfortunate venue of the heinous killings by gunmen.”
“This latest assault on innocent persons is particularly despicable. Violating a place of worship, killing priests and worshipers is not only vile, evil and satanic, it is clearly calculated to stoke up religious conflict and plunge our communities into endless bloodletting,” he said.
Buhari noted that the country will not bow to the machinations of evildoers, adding that the assailants would be hunted down and made to pay for the sacrilege committed.
The killings came barely few days after an attack in Naka community, where two persons were feared dead and several houses burnt to ashes, and while President Buhari was assuring Nigerians that the perpetrators would be brought to book, they attacked again on Wednesday and Thursday morning, April 25th and 26th. “ I dare you to catch me if you can,” they seem to be taunting the President and his government.
In his reaction, Paul Ameh, a Sociologist, told the Magazine: “ With the trend, it seems the government is helpless and cannot do anything to check this herdsmen menace. But I tell you that it is not so. This country has the needed human and material requirements to curb these needless and barbaric killings. The issue is that those to give the order seem to be dragging feet for their selfish religious, socio-cultural and political reasons.
“ I don’t think Mr. President has given the right order. For Christ sake, the Nigerian President wields enormous powers. I don’t know what is withholding him from exercising them, especially now that he wants to go for a second term. Let President stop condoling the bereaved, ‘speak the word and see if his servant will not be healed.”
In her own reaction, an angry Mrs. Unyio Johnson, lamented thus: “ We are tired of their condolences. We are tired of their playing politics with the lives of Nigerians which are worth nothing, and shows when our people are murdered in foreign countries and our government does nothing.
“We are tired of being made homeless in our land and the government stands and watches, even withdrawing our security and forcing us not to defend ourselves. The way it is going, what is good for the goose is gradually reaching the gander.”
Following protests on the killings, the Christian Association of Nigeria (CAN) and the Benue Valley Professionals Network (BPN) have condemned the attack.
In his reaction, Special Assistant (Media and Communications) to the CAN President, Pastor Bayo Oladeji, stated that Christians had become endangered species in the country, while regretting that the security agencies have failed the nation by their inability to curb the killings and asked President Buhari and his security team to end the killings.
“CAN reiterates its position that our security agencies have failed the country; Christians have truly become endangered species in the country. Until they wake up from their slumber, the killing of innocent Nigerians with impunity will remain unabated.
“We also ask those who have friends and family in high places to plead with President Muhammadu Buhari, his security team, Miyetti Allah Cattle Breeders Association of Nigeria to use all power at their disposal to end this senseless slaughter of unarmed defenceless people in the Benue Valley, Middle Belt, Zamfara and everywhere else in the country.”
While appealing to the global community to come to the aid of the farming communities in Benue and other parts of the country by ending the terror attacks across the nation, it stated:
“We reject in totality the ungodly idea that cattle matter more than human lives and call on all who have an iota of human feeling in them to end this madness before it consumes us all and leaves us without a country.”
Many believe that the President can do something to check the mindless killings of the helpless and unarmed innocent, but will he do it? Are there powers above him that are influencing his taking urgent steps to check the menace?
Not a few Nigerians feel that he is dragging his feet. “Speak the word, and let your servant be healed”, they seem to chorus to the President.
Life & Style, News, Trending
Operation Clean Up Seme
2019: Atiku’s Formula Rattles Opponents
|
cc/2019-30/en_middle_0053.json.gz/line4550
|
__label__cc
| 0.577467
| 0.422533
|
Three children pictured arguing about whether the plural of referendum should be referendums or referenda
It’s raining referendums, hallelujah
Andrew Geddis | Contributing writer
New Zealanders could be getting votes on cannabis reform, MMP and assisted dying – but politicians have a bunch of questions to answer first, writes Andrew Geddis
New Zealand’s recent experience with using referendums to make decisions has all been a bit odd, really. We had a rather pointless one in 2011 on whether to retain or junk MMP, mainly because John Key inherited Don Brash’s promise that we would and couldn’t back away from it. Then we had a couple of votes in 2015 and 2016 on the flag we should use, mainly because John Key thought it would make a nice legacy project. And in between, we had a (pointless and wasteful) Citizens’ Initiated Referendum on whether National’s part-selling off the state’s power companies was a good idea.
None of these matters, I think it fair to say, really moved the electorate greatly. Sure, people formed solid reckons and took to social media to express them heatedly, but it seems that they did so primarily as a proxy for other, partisan-driven political commitments. The actual substance of the vote in question was of secondary importance for many, perhaps even most, of us.
Andrew Little’s recent musing that we may have three (three!) referendum votes – on cannabis law reform, end of life choice and electoral reform – looks likely to change that history. At least the first two of these are things normal people will care deeply about, while the third will cause political nerds to go very “squeee!”
Why, though, will we be voting on these questions at all? After all, the first two matters are the sort of “conscience” issues that MPs have decided in the past without asking the public directly; think of banning smacking, or legalising same-sex marriage. And the third, despite putative claims of a need for cross-party near unanimity, could easily be justified by the government as simply implementing what the Electoral Commission recommended.
I suspect the answer to this “why?” question lies in the core definition of politics – it’s the art of the possible. Recall that getting anything into law requires 61 votes in the House, and without NZ First’s support there isn’t a government majority in place. So, why would NZ First be wanting to have referendums on these specific matters?
Things start with the cannabis law reform issue. The post-election Labour-Green supply and confidence agreement committed the two parties to “have a referendum on legalising the personal use of cannabis at, or by, the 2020 general election.” It’s quite possible, perhaps even likely, NZ First would rather this not take place. Unfortunately, it’s agreed with Labour to “act in good faith to allow any other agreements to be complied with”. So, as with the Greens and party hopping, this is a rat they are going to have to swallow.
All sensible people who have commented on the referendum then agree that the best model would be for parliament to first consider and pass legislation setting out exactly what “legalising the personal use of cannabis” will look like, with that law only coming into effect if the public approve it. Doing this allows everyone to know exactly what it is they are voting for (or against). But taking the issue through parliament in this way will take some time – and it probably can’t be done quickly enough to allow for a referendum prior to the 2020 election.
That then requires voting on cannabis law reform alongside voting for our next government. You can see why NZ First might be worried about having a bunch of younger, socially liberal, Spinoff reading voters flocking to the ballot box in order to Free the Weed (and, while they are at it, vote for the Greens or Labour). That is not, shall we say, their natural political constituency.
Consequently, it seems likely NZ First wants something to turn out their sort of voters, too. And end of life choice (or, euthanasia, if you are not woke) provides just such a topic. David Seymour may then be persuaded that amending his End of Life Choice Bill to incorporate NZ First’s demand for its approval by a referendum is preferable to having it voted down at second reading.
Why, then, put changing the threshold at which parties can get into parliament under MMP into the voting mix? Simon Bridges’ unsurprisingly cynical explanation – that “what you’re seeing here is the minor parties in this government, particularly NZ First, worried about how they poll” – falls apart if the vote actually is going to be held at the general election. In that case, any rule change wouldn’t take effect till after the 2020 voting is done and dusted, too late to help NZ First stay in power.
It may instead simply be that NZ First is being true to its expressed principles; that matters such as voting reform should be decided by the people and not MPs. Never completely discount the idea that politicians will actually be motivated to do what they have said was the right thing to do.
However, Bridges may be a little more on the money about something else. As he also told TVNZ: “Why not have the courage of your convictions, let’s throw this out there, why not [reduce the MMP threshold to] two or three per cent? Actually let’s be genuinely democratic.”
Bloody good point, actually. For back in 2012 when the Electoral Commission recommended lowering the party vote threshold from five to four per cent (while also getting rid of the Seymour Lifeboat rule), it did so in part because: “In our view, anything below a party vote threshold of three per cent would amount to too great a departure from the balanced approach recommended by the Royal Commission and affirmed by New Zealanders in referendums.”
Well, having a public vote on changing the threshold at which parties can enter parliament gives us a change to collectively revisit this matter anew. Why not, as a people, affirm that a threshold of 2.5% – the figure recommended by some exceptionally intelligent individuals – is a better fit for the sort of open and responsive political process we would like to see? Because I agree with Simon Bridges on this matter: let’s be genuinely democratic.
The Bulletin: UN Migration Pact wounds still fester
There’s a land in the South Pacific where you can vote based on owning property
Julienne Molineaux
|
cc/2019-30/en_middle_0053.json.gz/line4551
|
__label__wiki
| 0.6814
| 0.6814
|
Thailand | Russian tourist drowns in red flag swimming zone in Trat
Wild animals and wild flowers – tulip season at the Khon Kaen Zoo
Russian tourist drowns in red flag swimming zone in Trat
PHOTOS: The Pattaya News | Siam Rath
A Russian tourist has drowned at a beach on Koh Chang in Trat, far east Thailand, in the red-flagged, no swimming zone yesterday.
Navy officers on Koh Chang are warning tourists going to beaches with red flags along the shore to stay out of the water when there are high waves in the monsoon season.
55 year old Vladimir Antonov was found floating face down 300 metres from shore. Local rescue workers and Navy officers patrolling the beach rushed out to bring him back to shore. He was later pronounced dead when he arrived at the local hospital. The Russian Embassy have been informed.
His 45 year old wife said they had been staying at a hotel two kilometres away. She told police that her husband had been hit by a big wave and been swept away.
SOURCE: The Pattaya News
Thailand to sit on UN committee from 2020
Thailand’s dengue fever cases “double the five year average” – epidemic declared
Read more headlines, reports & breaking news in Thailand. Or catch up on your Thailand news.
“Thailand is now fully a democratic country with a constitutional monarchy, with a parliament whose members are elected.”
Thai PM Prayuth Chan-o-cha has formally stepped down as the head of the NCPO military junta saying Thailand will now function as a normal democracy after five years of army rule.
Prayut’s “normal democracy” includes a loaded upper house of Senators all appointed by the Junta before they relinquished government yesterday.
The new Thai lower house of Parliament is led by the pro-Junta Palang Pracharat Party in a shaky coalition which includes 18 other members needed to rally the numbers to form government.
In a televised address last night, Prayut claimed the country’s military rule had, among many successes, fixed the problem of illegal fishing, tracked down human traffickers, been involved in the rescue of 13 football players from the Tham Luang Cave and overseen peace and growth during the five years in power.
He reiterated that the intervention in May 2014 had been necessary to restore order after six months of street protests and violent clashes.
Referring to the sweeping powers that NCPO commanded over the five years, including the controversial Article 44 which granted the Junta absolute power and absolving of responsibility, Prayut said things will now return to normal under the laws of the Thai constitutional monarchy.
“All problems will be addressed normally based on a democratic system with no use of special powers.”
According to Reuters, last week Prayut used his Article 44 powers one final time to end various restrictions on media. He also transferred civilian legal cases from military to civilian court though he controversially retained the power to allow Thai security forces to carry out searches and make arrests unchallenged.
The new government will be sworn in by His Majesty The King this afternoon. The government will face its first tests in parliament next week where the opposition parties have already foreshadowed a number of censure motions to test the new government’s majority.
Asanha Bucha Day is a public holiday in Thailand marking the day when the Lord Buddha delivered his first sermon at Benares in India over 2,500 years ago. The exact date of the holiday is determined by the waxing moon and the lunar months, but is usually held in July or August. This year it falls on July 16.
The Buddha preached his first sermon at a deer park and from this sermon the Dharma (doctrine) of the Buddha was symbolised as a wheel. The Dharmachakra is also known as the Wheel of Life, Wheel of Law or Wheel of Doctrine and can be seen on flags in temples and buildings all across Thailand. Similarly, pictures or models of deer can often be seen at temples or in depictions of the Buddha.
Like many other Buddhist festivals and holidays, Asahna Bucha (also written as Asalha Puja and other English equivalents) is a day when Thai Buddhists will make merit and visit the local wat. Traditionally, candles are amongst the items donated to the wat for Asahna Bucha and processions featuring candles are held at various towns in Thailand.
The tradition dates back to the times before electricity where extra light was needed at the temple during the darker days of the rainy season. Local people will also ‘wian tian’ which involves walking around the wat with a lit candle, lotus flowers and incense. The day after Asahna Bucha is another significant day with Wan Khao Phansa marking the start of the three-month ‘Phansa’ period which is sometimes referred to as ‘Buddhist Lent’.
Events11 mins ago
Koh Samui2 hours ago
Thailand Podcasts & Videos
Thailand Events
Thailand Jobs
Thailand Classifieds
Thailand Medical
Thailand RSS Feed
Research Thailand Hospitals and Book Surgeries
Thailand Real Estate Property Group
Thailand Employment & Jobs in Thailand & SE Asia
|
cc/2019-30/en_middle_0053.json.gz/line4553
|
__label__wiki
| 0.657332
| 0.657332
|
Archive | November, 2015
Penis town
Tumbleweed on the main street
And drunks abound
Another Sunday afternoon
In penis town
Two pubs and a co-op
Green, blue and brown
A ghostly man hangs out of a window
Looking up and then down
He returns to drilling plaster
Cock-topped tollbooth, slim shaft cross,
standing stone with bulbous crown
The past re-created
Blue pain road splatter
Graffiti down town
Dog shit collectors
Cyclists pause by the stone
They dismount with a frown
One of them goes shopping
The stone drips efflorescence
A sickly white gown
Wrapped around its girth
The mighty shaft leans
Like a megalithic clown
Crying tears of laughter
Grey skies and grey stone
Grey tarmac on the ground
Blue plastic bag man staggers
High Street, Main Street
Adjective and noun
Tracing words with your feet
Passers-by glare at the stone
Pacing round and round
Nothing new to see here
Always penis town
(c) Crown Copyright RCAHMS image number DP00203
Facts and figure
1. The Stone of Mannan, or King Robert’s Stone, is a composite standing stone consisting of a single whinstone boulder connected to a tall megalith by an internal metal support and external mortaring.
2. It is located in Main Street, Clackmannan, the county town of Clackmannanshire. Clack Mannan means the Stone of Mannan
3. It has NMRS number NS99SW 6 and National Grid Reference NS 9111 9188.
4. There main component of this megalith, the upright standing stone, is apparently little more than a 19th century sourced plinth which support the really old bit, which is the smaller stone on top – the actual Stone of Mannan.
The Stone of Mannan being played with in Celtic times (detail from noticeboards that used to stand next to the Stone)
5. It has moved at least once, in 1833, from the preposterously named Lookabootye Brae (this is Scottish for ‘Look About You Steep Road’).
6. In 2005, The Times reported: ‘A plan to move an ancient phallic stone said to contain the spirit of a Celtic god has been abandoned by councillors after locals threatened to stage a sit-in around the monument. Councillors confirmed last night that they had shelved a proposal to shift the Stone of Mannan just five yards from its site in the Scottish town of Clackmannan after furious opposition from local women’.
7. On March 26th 2006 The Daily Record claimed: ‘A giant stone penis is to be repaired at a cost of more than £160,000. Work starts today on the crumbling 2500-year-old Mannan Stone, which stands on a plinth in the centre of Clackmannan’
8. Conservation and consolidation work was carried out by stone conservators NBSC in 2007, the work consisting of: ‘Removal of ferrous fixings and OPC mortar, structure consolidation of subjects. Removal of biological growth, salt efflorescence, impact damage residue. Replace ferrous dowel and treat oxide jacking, treatment of plaque fixings, and treatment of delamination’.
9. A plaque on the tollbooth wall beside the standing stone reads: ‘The stone of Clack, originally placed at the foot of Lookabootye Brae, was sacred to the pre-Christian deity Mannan and is a unique relic of pagan times. It was raised on the large shaft in 1833’.
10. This is a monument that has suffered confusion and indignity. But after all these years, after all the maltreatment, it remains erect.
Sources and acknowledgements: there is further information on the Stone from the local Community Council webpage. There is also a lot of detail about a proposed project by Andrew Gryf Paterson available from this website but I am not sure if this came to anything. But it is fun. And powerpoint slides on that website are the source of the sketch of the Stone of Mannan in Iron Age times, which itself came from noticeboards that used to stand next to the Penis Stone. The RCAHMS copyright image is a drawing by J Drummond from 1861, part of the Society of Antiquaries of Scotland collection.
Tags: Standing Stone
Categories Modern monuments, Urban standing stones, Weird
The cemetery in the quarry
Fragments of a site, documented poorly, beyond living memory. The excavation of a Bronze Age cist cemetery in a sand pit on the south-west fringe of Glasgow in 1928. By Ludovic Mann, who else? Piecing together the pieces, re-telling the story, making sense of it all. All we are left with: fragments, pots, photos, rumour, myth, mystery. Only fragments of a site, material clues, things, both familiar and unfamiliar. Found in a sand pit on a ridge beside Mount Vernon: a place now a quarry and landfill site. Fragments. That’s all we have. As archaeologists, as (pre)historians of Glasgow, the voice of the past drowned out by the quarry machine, the truck, the motorway. The quarry and the cemetery. The cemetery and the quarry. The cemetery in the quarry. The quarry on the cemetery.
Green-oak-hill
Brown-sand-ridge
Mount Vernon.
Windy Edge.
Fragments of a site, documented poorly, all we are left with.
But it is – thankfully – enough.
(c) Crown Copyright. Source: http://canmore.org.uk/file/image/1332949
Complete Skeleton. Find Near Glasgow. A poem.
LONDON, Wednesday
Ludovic Mann –
well-known archaeologist –
discovered a complete Bronze Age skeleton in splendid condition
when carrying out excavations recently
on a sandy hillock at Mount Vernon near Glasgow
the skeleton is about 4000 years old
and it is quite possible
that a number of others may be found in the vicinity
as it was the practice of the people of that age
to have tribal burying grounds
over which they raised cairns.
The discovery was made
at a [sand pit] worked
by the Greenoakhill Sand Company.
Until recently
a mansion-house which was built 130 years ago stood near the spot
and it is thought [that] the cairn raised
over the tomb
was demolished when the ground was being cleared to [make] a garden for the mansion.
When some workmen were removing sand
from the hillock
an earthenware vessel of beautiful design
rolled out of a cavity constructed of slabs of stone
the find was at once reported to Mann
who went out and started systematic excavations.
Found three feet below the level of the grass a walled chamber 3 feet 3 inches by 2 feet the sides of which were built of vertical red sandstone slabs as a rule these tombs have a solid stone cover but in this case the covering consisted of about [X] rounded stones carefully packed over the skeleton.
Above these stones
was a handful of bones
which it is thought had been food intended for the dead
but this matter will have to be more carefully investigated.
When the black earth and boulders were removed
there was discovered a skeleton
carefully placed in position facing south-east
exactly along the medial line of the structure
the head was that of the brachycephalic or round-headed type
usually associated with the Bronze Age.
According to the fashion of the time
bodies were some[times] cremated
and the reason why
some bodies were disposed of in this way
while others were simply buried in the usual manner
puzzles archaeologists.
Beside the skeleton was a vessel of earthenware,
in which it was the practice to place food to sustain the spirit
on its journey to
the other world.
Food Vessel from Greenoakhill, held in Glasgow Museums collection, who hold the copyright for this image
Ludovic Mann and assorted suited visitors – dead and alive – antiquarians and magistrates – at Greenoakhill (c) Glasgow Museums
Attempt at an Inventory of the Material, Sediment and Human Deposits Excavated by Ludovic Mann at Greenoakhill in the Course of the Year Nineteen Hundred and Twenty-Eight
Six Food Vessels, two pottery bowls.
Five cists, one wooden coffin
One crouched inhumation of an elderly man, one crouched inhumation of a young woman, one crouched inhumation of an adolescent, one fragmentary inhumation, two skeletons, one cremation deposit.
One flint arrowhead, two flint knives, one white pebble, one hair moss garment.
Two charcoal deposits.
Oats, rye, sand.
N soils.
A Perambulation to Wyndy Hege
A place of restricted access. A gated community. Movement within mediated by fences, signs, barriers. Specialised and highly regulated clothing needs to be worn to secure entry to the scene. For your own safety. And the safety of others.
A Bronze Age cemetery? Or a modern industrial quarry?
The cemetery and the quarry, both places of danger, of transformation, places we need protection from, locations and activities that need to be contained.
The wearing of special safety gear is compulsory. Without exception. PPE. Personal Protective Equipment.
Hard-hats / Stag frontlets / High-vis / Low-vis / Identity badge / Pendant / Steel-toed boots / Leather wraps.
The quarryman and the mourner.
Personal Protective Equipment. Sealed off from danger. Wrapped up for safety. Clearly marked out from the others. Distinctive. Safe. Because these are taboo places. The quarry and the cemetery. The cemetery and the quarry. Places where digging into the ground is an act of devotion, an act of conviction, a dangerous and troubling activity, hidden away from the others.
Things happen here that have to be taken seriously and carried out appropriately, according to the rules and regulations.
Removal. Insertion. Extraction.
Digging. Burying. Replacing. Modifying. Regenerating.
And access has to be mediated by key individuals – gatekeeper, shaman, foreman, security guards, man in a wee wooden shed.
To enter the inner sanctum.
KEEP OUT. TRESPASSERS ON SITE WILL BE PROSECUTED.
DANGER. QUARRY WORKINGS.
NO ENTRY. DANGER!! PLACE OF DEATH.
Because the quarry and the cemetery are both polluted places. They have depth, they have power, and they are repositories of value and potential energy, derived from underground. Social capital. They are connected places, entangled across and beyond the societies from within which they emerged: Pastoralism / Capitalism. Entangled in networks of meaning that expand beyond this geographical location and its enforced boundaries, beyond the knowledge of any one individual visiting a grave, laying the dead to rest, driving a truck, reading the Daily Record in a cab. Exploded places, shrunk down to just this one place, a dot on a map, a high point, a special place, a pit. The quarry and the cemetery.
During the daylight hours: the traffic in and out of this place is incessant, unrelenting, tireless. It never stops. Back and forth, in and out, a hive of activity, of noise and light. It never seems to end.
By night, it is silent and dead. It reeks of death, of waste, of subterranean detritus. Landfill. Burying the very things and bodies of a community. Murmurations of crows and ravens and blackbirds fly overhead. There is a miasma. A stench. The long dead and their ancient bones. The assorted containers buried and put beyond use: Food Vessels and food vessels, Beakers and beakers, skulls and rusted beer cans. Encased in a shroud of stone and earth and grass. Put in a stone box. Fenced off.
The quarry and the cemetery. The cemetery and the quarry. The quarry on the cemetery. The cemetery in the quarry. The quarry on the cemetery.
Neither one nor the other. Both.
The location of the cemetery today
Sources and acknowledgements: each element of the tripartite structure of this post depended on different sources and inspiration. Image credits are in captions; those with Glasgow Museums copyright came from The Glasgow Story website.
Complete Skeleton. Find Near Glasgow. A poem. The entire ‘poem’ is a very slightly adapted version of a newspaper story about the excavations that appeared in the Glasgow Herald on 27th July 1928.
Attempt at an Inventory of the Material, Sediment and Human Deposits Excavated by Ludovic Mann at Greenoakhill in the Course of the Year Nineteen Hundred and Twenty-Eight. The data contained in this inventory was derived from a summary of the discoveries that can be found in the CANMORE entry for this site. The site has NMRS number NS66SE 2. The title for this short section owes much to the Georges Perec piece ‘Attempt at an Inventory of the Liquid and Solid Foodstuffs Ingurgitated by Me in the Course of the Year Nineteen Hundred and Seventy-Four’. This first appeared (in the original French of course) in Action Poétique in 1976 and was translated and appeared in the Penguin collection of Perec writings Species of Spaces and Other Pieces (1997).
A Perambulation to Wyndy Hege. All images and words my own. The name of this section was taken from the supposed original name of Mount Vernon – Windy Edge or Wyndy Hege. According to Wikipedia.
Ludovic Mann’s excavations at Greenoakhill have never been published.
Tags: Glasgow, Ludovic Mann, Psychogeography
Categories Bronze Age burials about town, Ludovic McLellan Mann, Prehistoric Glasgow, Psychogeography
|
cc/2019-30/en_middle_0053.json.gz/line4554
|
__label__wiki
| 0.619664
| 0.619664
|
Farm Loan Waivers and Corporate Defaulters are Two Sides of the Same Coin
Why is Rs 1.84 lakh crore a "frightening challenge" for banks, but Rs 10.17 lakh crores not?
Credit: PTI
Seshadri Kumar
The great farm loan waiver debate is back. The Congress kicked it off this time with the announcement of waivers in the newly-elected governments of Chhattisgarh, Madhya Pradesh, and Rajasthan.
This was followed up by similar announcements from BJP-ruled Gujarat and Assam. Rahul Gandhi even went onto to demand a nation-wide farm loan waiver from Prime Minister Narendra Modi.
As if on cue, India’s bankers and economists claim to be alarmed.
United Bank of India’s MD, Ashok Kumar Pradhan, said, “It is a deadly poison. It’s a wrong way of addressing the real issue.”
“It is not good for the country’s credit culture,” said Mrutyunjay Mahapatra, managing director at Syndicate Bank.
“Clearly, (this is) a frightening challenge for Indian banks!” said Soumya Kanti Ghosh, SBI group’s chief economic adviser, reacting to the information that the combined waiver amount may be Rs 60,000-70,000 crore.
The government’s think-tank, the NITI Aayog, pointed out that farm loan waivers only benefit 10-15% of all farmers, as the rest do not have access to institutional loans.
Now, a reality check.
How much will the farm loan waivers cost? MP’s waiver will cost around Rs 35,000 crore. Chhattisgarh’s waiver will cost Rs 6,100 crore.
Also read: Without Rise in Farm Income, Congress’s Loan Waivers Won’t End Rural Distress
Rajasthan’s waiver will cost around Rs 18,000 crore. All put, about Rs 60,000 crore.
Following this, the Assam government announced a Rs 600 crore waiver in the state. Gujarat also followed suit with a Rs 650 crore waiver of farm electricity bills. Both states are BJP-ruled.
Let’s add the others up from the recent past as well. Congress-ruled Karnataka recently announced a farm loan waiver amounting to Rs 44,000 crore. UP announced a farm loan waiver after Yogi Adityanath took over, in 2017, of Rs 36,000 crore. Maharashtra, under the BJP’s Devendra Fadnavis, announced a farm loan waiver of Rs 34,000 crore.
Some other farm loan waivers include Andhra Pradesh at Rs 3,600 crore; Telangana at Rs 3,000 crore; Tamil Nadu at Rs 1,800 crore and Punjab at Rs 1,500 crore.
Let’s do the math. The total effectively comes to Rs 1,84,250 crore. In words, one lakh, eighty four thousand, two hundred fifty crore.
On the surface, this is a significant chunk of change. For instance, it easily dwarfs what the Congress has alleged is the value of the supposed Rafale scam (Rs 58,000 crore).
So it is important that we examine the concerns that have been expressed about these waivers.
To summarise, the concerns are:
Waivers are not good for the credit culture. If people realise they don’t have to repay loans, they will borrow recklessly.
They do not benefit all the farmers. They only benefit 10-15% of the farmers. Clearly, this is quite selective.
It’s not a long-term solution for what ails India’s agriculture industry.
All good points. Now, have you heard the term “NPA”?
No? Let me help you.
NPA stands for “non-performing asset”. It’s a bit of jargon in the banking industry to indicate that someone took a loan and did not pay it back… er… will never pay it back.
Now, this is really bad, isn’t it? If someone took a loan, they must repay it. If they did not repay it, the bank must seize whatever collateral was used for the loan. Because, otherwise, people will borrow recklessly, and that’s not good for the credit culture.
So loan repayment must be strictly enforced. But is it? Unless you’ve been living under a rock, you must have heard of the huge “NPA problem” that all our banks are saddled with. Essentially, it means companies have borrowed huge sums of money but not repaid them.
Now, instead of seizing collateral, what have banks done? They engage in questionable “restructuring” of the loan – in other words, extending the repayment period of the loan, even when nothing has yet been paid back – so that they do not have to seize the assets of the borrower.
Also read: The Farm Loan Waiver Debate, in Ten Tweets
There is also some evidence to show they may engage in a practice called ‘evergreening’ – a practice whereby they give even more loans to the companies that have not paid back previous loans. The logic is that they then may earn enough revenue to get out of trouble and start repaying their loans.
After one or two cycles of restructuring and evergreening, eventually the bank realises that the loan will never be repaid. In other words, it is a “non-performing asset,” and will have to be written off. No assets are seized, except maybe worthless plots of land or empty buildings – if at all. In banking parlance, it is said that the lending bank “got a haircut.”
Do the people who have taken such loans pay a penalty? Are they blacklisted? Are they termed defaulters who can never again get credit (because, you know, farmers who have defaulted on their loans can never get loans again)?
Wrong again. They will get credit again and again, and may be allowed to default again and again. Very little action will be taken against them.
Do you know how much industrialists owe banks that they will never pay back? A whopping Rs 10.17 lakh crores for the quarter ended May 2018.
Now, let me remind you again the total amount of all the farm loan waivers: Rs 1.84 lakh crore, or less than 20% of the total NPAs.
Also read: Big Business Strikes Again, this Time Through Modi Government’s Assault on RBI
So why does the Rs 1.84 lakh crore attract such swift condemnation and receive such public scrutiny but the Rs 10.17 lakh crore does not? Partly because the predominant view is that businessmen are seen as job-creators while farmers are seen as inefficient producers of food.
But it’s mostly because the folks who have taken those big amounts of money and not repaid them are what we could call politically influential or highly connected.
To understand this, let us look at two lists. The first is a list of the top 12 companies constituting 25% of the total NPAs, and the other is a list of the top eight companies with the largest indebtedness.
As of October 2017, these are the top companies which contribute to 25% of the total NPAs of banks:
Bhushan Steel: Rs 44,478 crore
Lanco Infratech: Rs 44,364 crore
Essar Steel (Ruias): Rs 37,284 crore
Bhushan Power and Steel: Rs 37,248 crore
Alok Industries: Rs 22,075 crore
Amtek Auto Ltd: Rs 14,074 crore
Monnet Ispat and Energy Ltd: Rs 12,115 crore
Electrosteels Steels Ltd.: Rs 10,273 crore
Era Infra Engineering Ltd.: Rs 10,065 crore
With the advent of the Insolvency and Bankruptcy Code, some of these companies have started resolving their debt issues.
For the second list, here are the top eight companies with the most debt in India:
Anil Ambani Group: Rs 1,25,000 crore
Vedanta Group (Anil Aggarwal): Rs 1,03,000 crore
Ruia Group (Ruias): Rs 1,01,000 crore
Jaypee Group: Rs 75,000 crore
Jindal Group (JSW): Rs 58,000 crore
GMR Group (T3 terminal at Delhi International): Rs 48,000 crore
Videocon Group: Rs 45,000 crore
GVK Group: Rs 39,300 crore
It is important to note that the second group does not necessarily equate to NPAs. However, they are still outstanding amounts that have not been paid to banks. The Ruias are common to both lists, and you can see how much of their total loan has already been declared irrecoverable.
Does it not seem that the non-repayment of 1 lakh crore by a single group might seriously hurt the credit culture of the country rather than the farm loan waivers? And forget 10-15% of the total number of companies – this list has only eight groups, and you can add up how much their cumulative debt is.
So why is Rs 1.84 lakh crore a “frightening challenge” for banks, but Rs 10.17 lakh crores not?
Perhaps, despite everything, we believe this country needs failed businessmen more than it needs failed farmers.
Seshadri Kumar is an R&D Chemical Engineer with a BTech from IIT Bombay and an MS and a PhD from the University of Utah, U.S.
|
cc/2019-30/en_middle_0053.json.gz/line4556
|
__label__cc
| 0.656823
| 0.343177
|
Institute for Clinical and Translational Research
VICTR Home
Vanderbilt's
CTSA
Investigator Resources
and Training
BioVU &
Synthetic Derivative
Welcome to The Vanderbilt Institute for Clinical and Translational Research (VICTR ) website
What is VICTR?
VICTR's Director
Vanderbilt Research:
A Historical Perspective
Important Research Discoveries Since 2000
Vanderbilt employee? Visit StarBRITE to access VICTR resources (requires VUNet ID)
What is The Vanderbilt Institute for Clinical and Translational Research (VICTR)?
VICTR is Vanderbilt's virtual home for clinical and translational research. Supported by the Vanderbilt University Medical Center's Office of Research and the NIH sponsored Clinical and Translational Science Award (CTSA), the mission of the institute is to transform the way ideas and research discoveries make their way from origin to patient care. This is accomplished using a multi-faceted approach: through collaboration with a wide variety of research partners; by training, nurturing and rewarding participating researchers; by funding research; by developing new and innovative ways to involve the community in research; by developing new informatics and biostatistical systems; and by making available the latest technologies and sound research results affecting patient care.
Questions, Comments, Suggestions...
Ask a question about VICTR or the CTSA
or provide comments or suggestions
regarding this website. Include your name and address if you wish to receive a response.
Type characters above to submit
Copyright © 2019 by Vanderbilt University Medical Center | 21st Avenue and Garland | Nashville, TN 37232
Vanderbilt University Medical Center is committed to principles of equal opportunity and affirmative action.
|
cc/2019-30/en_middle_0053.json.gz/line4557
|
__label__wiki
| 0.894163
| 0.894163
|
Volleyball beats Presentation 3-2 overall in non-league home game match
Paige Borsos, Photo Editor
The Palo Alto High School varsity volleyball team (10-0) beat Presentation High School (6-1) in five games on its home court this Wednesday evening, Sept. 7. The final score of the fifth game was 15-11. While last year the Lady Vikes were crowned the CIF State champions in Division I, Presentation...
Tags: Dave Win, Kimmy Whitson, Maddie Kuppe, Palo Alto HIgh School, Presentation
Bump, set, dance? Girls’ volleyball teams perform flash mob
Sam Borsos, Managing Editor
Whether it's the girls' volleyball team suiting up as ninjas or the boys' basketball team keeping it classy with ties and collared shirts, it is not unusual to see a sports team at Palo Alto High School rock bold attire on game day. But today was a little different. The girls' varsity, junior varsity...
Tags: Dance, flash mob, High Sierra Tournament, junior varsity, Kimmy Whitson, Maddie Kuppe, Palo Alto HIgh School, varsity, volleyball
Column: Varsity volleyball 2011: Can they do it again?
For the 2010 Palo Alto High School girls volleyball team, last year was a banner year. The Lady Vikes dropped jaws throughout the entire Palo Alto community by not only winning the Santa Clara Valley Athletic League (SCVAL) De Anza Division title, the first-ever Central Coast Section (CCS) championship,...
Tags: CCS, Long Beach Poly, Maddie Kuppe, megan coleman, Melanie Wade, Northern califonia, scval, state championship, Trina Ohms, volleyball
Female Team of 2011: Girls’ Volleyball
Gracie Marshall, Managing Editor
It's been five months since the Palo Alto High School Volleyball team made history. The moment that Maddie Kuppe's ('12) game winning ace captured the CIF State Championship title over favorite Long Beach Poly has been replayed in the minds of players and spectators alike. The team has soaked it in,...
Volleyball wins MaxPreps national team of the year
Mark Raftrey, News Editor
The Paly volleyball team added another accolade to its near-perfect season on Friday when it finished first in voting for the MaxPreps national female team of the year. The Lady Vikes beat out four other finalists to win the award, which is decided upon by the public as well as a group of judges. The...
Tags: Dave Winn, Lady vikes, Maxpreps, paly, state champions, volleyball
Palo Alto High School volleyball clinches spot in NorCal finals after 3-1 victory over St. Francis
Gracie Marshall
Coming off a 19-25 loss in the first game, a repeat of last year was a mere two games from becoming reality. “We wanted to come out really hard from the beginning,” Paly setter Kimmy Whitson ('12) said. “But that didn’t work out quite as we thought.” In typical Paly fashion, two kills from middle blocker Melanie Wade ('12) gave the L...
Tags: Melanie Wade, NorCal, Palo Alto HIgh School, Saint Francis of Sacramento, Trina Ohms, volleyball
Transition from middle school to high school sports
Anne Hildebrand, Staff Writer
Jordan, Jane Lathrop Stanford and Terman.Most of us came from one of these middle schools. When we competed against each other then, the last thing on our minds was that these opponents would soon be our teammates. But now our time in middle school has come and gone, and the schools have combined into ...
Tags: High school and middle school sports, Jane Lathrop Stanford, jls, jordan, team chemistry, terman
Volleyball conquers State Championship in five-game thriller
Paige Borsos, Staff Writer
The Palo Alto High School volleyball team has proved itself capable of doing it all. As if winning league, the Central Coast Section (CCS) and Northern California championships weren't enough, the Lady Vikes concluded their season on the highest of notes by claiming the California Interscholastic...
Tags: CCS, CIF, division I, megan coleman, palo alto, paly, state championship, Trina Ohms, volleyball
Live Blog: Volleyball takes on Long Beach Poly in State Championship
(7:45 pm) Paly started off strong with a kill from Melanie Wade (’12) to secure the first point. From there, Paly kept the lead throughout the entire game, winning 25-17. Although the rousing Jackrabbit fans contributed to four Paly service errors early on in the game, Shelby Knowles ('13) was unaffected...
Tags: CIF, Long Beach Poly, megan coleman, paly, state championship, Trina Ohms, volleyball
Volleyball kicks off quest for state championship with three game victory over Lincoln
Will Glazier and Sam Borsos, Editor in Chief and Staff Writer
The Palo Alto High School volleyball team (38-1) began the final push of its historic season by powering past the seventh seeded Lincoln High School Mustangs from San Francisco (15-7). The second seeded Lady Vikes quickly dispatched the San Francisco Section champion Mustangs in three games by s...
|
cc/2019-30/en_middle_0053.json.gz/line4559
|
__label__wiki
| 0.661163
| 0.661163
|
Full moon concert in front of the Museum of the Olympic Games of Antiquity.
© Hellenic Ministry of Culture and Sports / Ephorate of Antiquities of Ilia
August Full Moon
With the archaeological site open until late, enjoy musical performances and see the temples in a different light.
In Olympia concerts open to the wide public and dedicated to famous Greek songwriters and composers are being hosted in the Museum’s courtyards. – © Nansy Spyropoulou / Patris Newspaper
Every year in August on the night of the full moon, the archaeological site of Olympia stays open with free admission until midnight. To celebrate the event, there are public concerts dedicated to famous Greek songwriters and composers.
Concert in the courtyard of the Museum of the Olympic Games of Antiquity. – © Hellenic Ministry of Culture and Sports / Ephorate of Antiquities of Ilia
You will be able to feel the magic energy of the site as you stroll under the light of the full moon among the temples, monuments and the ancient stadium. Discover the 'secrets' of the archaeological site under the moonlight.
Olympia’s ancient stadium during August Full Moon, a nationwide campaign of the Hellenic Ministry of Culture for the celebration of the brightest full moon of the year. – © Giannis Spyrounis / www.ilialive.gr
For the romantic souls and for those who are inspired by mythology, you might like to think of the famous love story of Endymion, the king of Olympia, who was loved by the goddess Selene, the Titan goddess of the moon. Selene had 50 daughters with Endymion and they are equated by some scholars with the fifty months of the Olympiad.
That night, the entry to the site of Olympia is admission free.
|
cc/2019-30/en_middle_0053.json.gz/line4561
|
__label__cc
| 0.705912
| 0.294088
|
DESPERADO: Khloe Kardashian rechristens Nigerian girl who complained about her show
How we killed Aisha Alli-Balogun; abducted her daughter, others — Suspects
Aeroplane, February 1, 2017 February 1, 2017 , 0
. . The police high command in Abuja yesterday, disclosed that it has apprehended two more suspects who took...
New born baby buried in a shallow grave in front of a house in Edo State.
Aeroplane, July 30, 2015 July 30, 2015 , 0
Your browser does not support the video tag Yesterday, the owner of the house located at Aviation Street, off...
Luxembourg Prime Minister becomes the first leader in the EU to enter into a same-sex union
Aeroplane, May 16, 2015 May 16, 2015 , 0
Minister, Xavier Bettel, 42, tied the knot yesterday with Gauthier Destenay, just months after the Roman Catholic duchy legalized...
Who is an adult? Nigerian senate makes age of sexual consent 11 years old.
Aeroplane, June 4, 2015 June 4, 2015 , 0
There were jubilation sa cross the country after the Sexual Offenses Bill was passed yesterday and life jail was...
Video of two Nigerian police fighting hits the net ( see video )
The video was recorded at the front of a bank in Nigeria recently. No one knows what caused the...
Here is how the identities of these iPad thieves were revealed.
These thieves in pictures recently stole an iPad belonging to the brother of Chidi Ashley. But little did they...
Lady’s reason why she feels women love s*x more than men, goes viral
Victoria Onwuchekwa posted this on Facebook some days ago and it has become a topic of intense debate...
FG gives late minister’s son automatic employment, gives others scholarship
This was revealed today by the Attorney-General of the Federation, Abubakar Malami, when he paid a visit to...
Olamide laughs hysterically as Tiwa Savage's husband goes savage on fan demanding a video for his favorite song of SavageMany states now want to replicate our religious bill, they’ve asked for our copy – El-Rufai
|
cc/2019-30/en_middle_0053.json.gz/line4562
|
__label__wiki
| 0.876111
| 0.876111
|
RSS & Podcasts
Support usDonate Now!
In Images
30 April 2019 putsch
NewsSocial Movements
Venezuelan Social Movements Protest Israeli “Genocide” Outside UN HQ in Caracas
Venezuelan social movements gathered outside the United Nations' headquarters in Caracas on Wednesday to protest an ongoing Israeli crackdown against Palestinians in the occupied territories, which has claimed the lives of at least 35 Palestinians since October 1.
"In Gaza the houses always had their doors open, when the children sang, the people dreamed. Today, everything is different, no more genocide" (Lucas Koerner:Venezuelanalysis)
By Lucas Koerner
Oct 16th 2015 at 1.39pm
IsraelPalestineUnited NationsSocial movementsinternational solidarity
Caracas, October 16, 2015 (venezuelanalysis.com) – Venezuelan social movements gathered outside the United Nations' headquarters in Caracas on Wednesday to protest an ongoing Israeli crackdown against Palestinians in the occupied territories, which has claimed the lives of at least 35 Palestinians since October 1.
Unfurling a giant Palestinian flag at the entrance to the office building, the several dozen protesters held signs and chanted slogans calling on the international community to take action in defense of Palestinian rights.
“We are here at the United Nations office in Caracas simply because we cannot remain silent in the face of the genocide being committed against the Palestinian people,” Hindu Andari, spokesperson for the Itinerant Forum of Popular Participation, told venezuelanalysis.
The most recent Israeli crackdown has sought to quell a Palestinian uprising gaining momentum in the past two weeks, sparked by Israeli restrictions on Palestinian access to the Al-Aqsa Mosque compound in occupied East Jerusalem.
On Tuesday, 27-year-old Mutaz Ibrahim Zawahreh was shot and killed with live ammunition by Israeli occupation forces during clashes near the illegal Israeli separation barrier in Bethlehem, while 33 others were injured, nine with live fire.
Thirty-five Palestinians have been killed since the beginning of October, including at least seven children, as well as numerous bystanders and unarmed protesters shot dead in “extrajudicial killings”, according to Amnesty International. 1300 Palestinians have also been injured this month, including 550 by live fire and 600 by rubber-coated bullets, the Palestinian Ministry of Health confirms. Meanwhile, seven Israelis have been killed, mostly in stabbing attacks.
Coming on the heels of Venezuela’s commemoration of “indigenous resistance day” on October 12, several present at Wednesday’s protest drew parallels between Palestinian resistance to Israeli colonization and indigenous struggles in South America.
“The Venezuelan people survived a similar genocide when Columbus came to America. The Palestinian people are resisting as we resisted, as our indigenous peoples resisted in the face of that [Spanish] genocide. Venezuela cannot be indifferent to this cause,” explains Mercedes “Chelena” Rosa of the Movement of Revolutionary Anti-Imperialist Artists.
Last year, Venezuela shipped tonnes of humanitarian aid to the Gaza Strip in response to a 51-day Israeli assault that killed close to 2200 Palestinians, two-thirds of whom civilians, provoking international outrage and renewed calls for international sanctions.
Boycott, Divestment, and Sanctions
The recurrent US-backed Israeli assaults on the Gaza Strip in recent years have fueled the rise of the international Boycott, Divestment, and Sanctions (BDS) movement, which seeks to replicate the nonviolent tactics successfully used against apartheid South Africa to force Israel’s compliance with international law.
The international movement has been so successful that Venezuelan social movements are in the process of organizing their own BDS campaign, says Andari.
“We must break relations with companies that finance the occupation of Palestine,” she stated, noting that the Caracas UN office is located in the HPTower, also home to the offices of US multinational IT firm Hewlett-Packard, which produces biometric ID technology used both in Israeli checkpoints and US prisons.
“We have to turn up the pressure so that no university in the country can have educational and athletic agreements with Israeli [universities]. We believe that the Bolivarian government shouldn’t send Venezuelan athletes to any international competitions in Israel,” Andari added, underscoring the importance of the academic and cultural boycott.
A New Era of Solidarity
Under the administrations of Hugo Chávez and Nicolás Maduro, Venezuela has become a key ally to the Palestinian cause, signing a number of agreements with the Ramallah-based Palestinian Authority, including a “solidarity” oil deal, the creation of a scholarship program for Palestinian medical students, as well as the extension of the Cuban-Venezuelan eye surgery mission to the West Bank.
Before the Bolivarian Revolution, Palestine solidarity work was extremely difficult and even dangerous, emphasizes Susana Khalil, spokesperson for the Canaan Association of Aid to the Palestinian People.
“It’s important to stress that in the years before the Bolivarian Revolution, to speak about the Palestinian issue was taboo, censured, and often when we organized activities like this one, we were persecuted, blacklisted, even jailed. But today we can speak freely.”
“Venezuela has become the epicenter of the Palestinian struggle, the epicenter of the struggle for popular democracy, and for me as a Venezuelan-Palestinian, Arab-Latina, it’s a point of great pride,” affirmed Khalil, whose family fled to Venezuela following their expulsion from Palestine during what historians have termed a campaign of “ethnic cleansing” allegedly perpetrated by Zionist forces between 1947 and 1949.
Fresh Violence
In the latest round of Israeli violence, occupation forces opened fire on Palestinian demonstrators in the Gaza Strip on Friday, killing two and injuring over a hundred so far.
Yahiya Abd al-Qader Farhat, 24, was shot in the head by Israeli soldiers in northern Gaza, according to the Gaza Health Ministry. Later on, Mahmoud Hatim Hmeid, 22, was also shot and killed in the northern part of the Gaza Strip.
Last weekend, Israeli forces killed 12 Palestinians in Gaza, 10 of whom shot dead during protests at the border and two killed in an Israeli airstrike, including a two-year-old and her pregnant mother.
Under international law, Gaza remains occupied by Israel, with the Israeli military exercising “effective control” over the strip’s borders, airspace, and territorial waters.
This work is licensed under a Attribution Non-commercial No Derivatives Creative Commons license
Bolivarian Project
Indigenous and Afro-Venezuelans
Labor and Workers' Control
Venezuelan Media
Venezuela: Guaido Bodyguards Arrested as Barbados Talks Resume
De Zayas: UN Human Rights Council’s Report on Venezuela is 'Unbalanced'
UN Human Rights Council Adopts Resolution Rejecting US Sanctions
Economic Downturns and State Violence: A Conversation with Andres Antillano
Venezuela: ‘Progress’ Reported in Gov’t-Opposition Talks as US Sanctions Counter-Intelligence Agency
Venezuela, NAM Reject Trump’s “Extremist Actions” Against Palestine
Speaking on behalf of the Non-Aligned Movement, Venezuelan President Nicolas Maduro re-affirmed the group's support for the Palestinian people.
Venezuela: UN Should Support Sovereignty in Syria and Palestine
Venezulea’s foreign minister spoke out at the UN Security Council Wednesday against unilateral intervention in Syria, and the occupation of Palestine
Venezuela and Palestine Dispel Rumors of Diplomatic Rift Over Scholarship Program
Venezuelan and Palestinian authorities reaffirmed their close ties today following rumors of diplomatic friction circulated by an Associated Press report last...
Venezuela and Palestine Sign New Round of Agreements
Venezuelan President Nicolas Maduro signed a series of agreements with Palestinian Foreign Minister Riyad al-Maliki during an official meeting in Miraflores on...
The self-declared “Interim President” claimed his men were victims of a "set up."
VA interviews a Chavista professor and activist about the social effects of hard-on-crime policies.
The agenda of the talks has not been disclosed but the topic of elections is reportedly being left for last.
Venezuela: Oil Output Stagnant as Inflation Continues Slowdown
The Venezuelan economy has now had four consecutive months without hyperinflation.
Crisis & Critique: Norway, Bachelet, and the Twilight of Guaido’s Insurrection
In his first column for VA, Venezuelan analyst Ociel Lopez examines Guaido's US-backed coup following Bachelet's visit and new gov't-opposition...
More audios
Understanding the Global North's Disinformation War Against Venezuela
Ear to the Ground #11: VA Exclusive with the Embassy Protection Collective
Voices from the Frontlines: Recent Developments in Venezuela
Caracas Reporter on Why Venezuela's Opposition Is Imploding Again
U.S. Sanctions Block Medicine from Venezuela, Killing Thousands
Pride Parade in Caracas
In the Venezuelan Llanos Music Delivers a Message: ‘No Mining Near Our Productive Lands’
Mining Project Threatens Local Population and Nature Preserve
New to Venezuela?
If you are new to Venezuela or want to know background info, please see:
"Venezuelanalysis.com has regularly provided very useful description, analysis, and commentary on developments in Venezuela, rarely available in the US". Read more
Noam Chomsky. Linguist, philosopher, cognitive scientist, and activist.
“Venezuelanalysis is an invaluable resource for anyone who wants to know what is happening today in one of Latin America's most dynamic countries". Read more
Oliver Stone. Film director, producer and screenwritter.
"Venezuela Analysis has been an essential tool not just for those trying to keep up to date with developments in the Bolivarian revolution, but also because it provides an invaluable space for critical discussion about the process". Read more
Marta Harnecker. Chilean journalist, psychologist, and writter.
"I can't think of another website on the web more deserving of support." Read more
John Pilger. Documentary Filmmaker (“War on Democracy”) and author of Freedom Next Time (Bantam, 2006)
"A must-read for anyone who wants to follow what is happening in Venezuela, especially in English. Factually accurate and timely information." Read more
Mark Weisbrot. Economist, co-director of the Center for Economic and Policy Research (CEPR)
"I look to Venezuelanalysis regularly as a vital source of news and analysis from a progressive perspective. I highly recommend it as an indispensable source of truth, sober analysis and advocacy for activism." Read more
Gloria La Riva. Coordinator of the Cuba and Venezuela Solidarity Committee of the ANSWER Coalition
"Venezuelanalysis has been an indispensable source for many of us for well over a decade." Read more
Tariq Ali. Historian, writer and filmmaker, editor at New Left Review
"Venezuelanalysis not only offers readers the crucial political context denied to them in the pages of the MSM, it exposes them to the revolutionary reality that is still living and breathing in Venezuela today." Read more
Max Blumenthal. Author, filmmaker and editor of GrayzoneProject.com.
"For years Venezuelanalysis.com has been the gold standard in reporting on Venezuela and the Bolivarian Revolution. With Venezuela increasingly subject to economic sanctions imposed by Washington, it is all more essential that this independent voice be preserved." Read more
John Bellamy Foster. Editor of Monthly Review (New York), Professor of sociology of University of Oregon
“Venezuelanalysis is a refreshing corrective to the one-sided reporting in the establishment media on Venezuela." Read more
Steve Ellner. Author and professor at the Universidad de Oriente and the Misión Sucre.
Support us DONATE NOW!
Venezuelanalysis.com is 100% reader funded and independent. We rely on your donations to keep us online.
Alborada.net
Green Left Weekly
Latin American Bureau
Venezuelanalysis.com is an independent website produced by individuals who are dedicated to disseminating news and analysis about the current political situation in Venezuela (read more).
Get news and analysis in your inbox
Support us, Donate Now!
|
cc/2019-30/en_middle_0053.json.gz/line4564
|
__label__cc
| 0.738203
| 0.261797
|
bayside development
Located directly on Toronto’s inner harbour, Bayside will become one of Toronto’s next great neighbourhoods.
The Bayside development site, located south of Queens Quay between Sherbourne Common in the west and the Parliament Slip in the east, is Waterfront Toronto's largest private sector development project to date. Led by Hines, one of the world’s premier real estate firms, Bayside will transform an underutilized, industrial area into an active and diverse mixed-use community and thriving waterfront destination.
Hines’ plans for Bayside will deliver a vibrant, sustainable new neighbourhood built on a human scale, with mews and small streets that promote a sense of closeness and community all year round. The neighbourhood’s main street — Merchants' Wharf — will draw visitors from across the city and will provide connections to neighbouring public spaces, including Sherbourne Common, Queens Quay linear park, the Water’s Edge Promenade and future Parliament WaveDeck.
Known for its design focus and longstanding commitment to sustainability, Waterfront Toronto selected Hines as the developer of the Bayside site. As the world's largest privately held real estate firm, Hines has the breadth of experience, network of expertise and financial strength required to ensure the timely development of this large and complex waterfront site.
aqualina at bayside Toronto
Hines has selected Tridel, one of Canada’s leading condominium developers, as its exclusive residential partner for Bayside. Plans for the first new residential building, Aqualina, are underway. Located on the east side of Sherbourne Common, and designed by world renowned architects, Arquitectonica, the building will be defined by a series of distinctive cubes made of glass and steel with angled windows and balconies to maximize views of the skyline and lake. The 13-storey, 363 unit condominium will also target a LEED® Platinum designation.
Landscape design for Bayside, including Aqualina, will be led by West 8 + DTAH, the award-winning team responsible for East Bayfront’s water’s edge promenade and the design for the revitalization of Queens Quay. Learn more and register for updates.
selecting a master developer for bayside
To select a private sector development partner for Bayside, Waterfront Toronto followed the same detailed two stage Request for Qualifications (RFQ)/Request for Proposals (RFP) process used to select Urban Capital for the River City project in the West Don Lands and Great Gulf Group of Companies for the Parkside development site in East Bayfront.
The RFQ was launched in March 2008 and promoted broadly to draw the highest calibre private sector developers from around the world. RFP submissions from the four shortlisted candidates were received in November 2009.
Submissions were reviewed based on a set of criteria stemming from Waterfront Toronto’s long term policy objectives and overall vision for East Bayfront. The criteria included both financial and city building measures such as vision, design and development concept and sustainability plan.
Learn more about the selection process.
a leader in sustainable development
Sustainable development is not new to Hines. With a 53 year track record for energy efficiency and innovation, sustainable development is an integral part of the Hines model. In line with the firm’s longstanding commitment to sustainability, Hines has been a leader in the growth of the LEED program since its inception and in other sustainability initiatives such as the ENERGY STAR® program.
In addition to meeting or exceeding Waterfront Toronto’s Mandatory Green Building Requirements, Hines is planning a number of strategic green programs for Bayside, including the implementation of the Hines GREEN OFFICE Tenant Program, which enhances the sustainable features and operations of employer spaces in commercial buildings. The firm has also proposed the creation of an ENERGY STAR® pilot program for commercial construction, which would see Hines partner with Natural Resources Canada to expand the Canadian Building Standard for single-family residential construction into commercial development.
Currently the only high-rise office building in Canada to achieve LEED Platinum is Hines' Eight Avenue Place. Hines will bring this kind of environmental leadership to Bayside.
east bayfront revitalization begins
Boundaries: Queens Quay East to the north, Parliament Slip to the east, Lake Ontario to the south, and Sherbourne Common to the west.
5.3 hectares (13 acres)
1,800 residences
Master Developer: Hines
Residential Development Partner: Tridel
Master Plan Design Team: Pelli Clarke Pelli; Ehrenkrantz Eckstut & Kuhn Architects; and Adamson Associates
Aqualina Design Team: Arquitectonica; II BY IV Design Associates
Landscape Architect: West 8 + DTAH
Development Space: 190,000 square metres (approximately 2 million square feet) of residential, employment, cultural and commercial space
Proximity: 1.5 km from Toronto’s downtown
Value of development: $910 million
Total economic activity: approx. $1.6 billion in economic output; 1,400 jobs
Board Book - Investment, Real Estate and Quayside Committee Meeting - May 30, 2019
Appendix to Board Book - Finance, Audit and Risk Management Committee Meeting - May 23, 2019
Board Book - Finance, Audit and Risk Management Committee Meeting - May 23, 2019
Construction Notice 20 - Queens Quay East Interim Improvements - April 11, 2019
Presentation: Waterfront Toronto Five-Year Strategic Plan - a legacy of achievement, an exciting future - April 5, 2019
Design Review Panel Meeting Minutes - March 20, 2019
Design Review Panel Meeting Presentation - Bayside C2 T3 (Draft) - March 20, 2019
gallery: Bayside
animated flythrough
Animated video that will show what Bayside will look like
unveiling plans for bayside
A short informational video from the Bayside announcement.
|
cc/2019-30/en_middle_0053.json.gz/line4570
|
__label__wiki
| 0.531154
| 0.531154
|
Fortune Telling All-Seeing Trump Zoltar Stalks NYC Street Corners to Glee of New Yorkers & Internet
Michelle Young 10/12/2016 Arts & Culture, New York, News
Misfortune telling machine Trump Zoltar appeared on the streets of NYC yesterday and today
[Update: We have new photos from today’s appearance of the All-Seeing Trump at Trump International Hotel at Columbus Circle. Here’s a Facebook live video we took, also embedded below.]
The internet pretty much exploded yesterday after Gothamist reported that an all-seeing Trump Zoltar machine, akin to Grandma’s Predictions out on Coney Island but much more vulgar, was spotted on street corners around New York City from a mosque in Queens, and a Mexican restaurant in Greenpoint, to the sidewalks in front of the Trump Tower in Midtown, the New York Times building and NewsCorp.
Then yesterday afternoon, Untapped Cities received a curious message from a non-press partner of ours: “A friend of mine from work did this yesterday,” with a link to the news coverage on the Trump Zoltar. Speaking to one of the artists through this proxy, they informed us that the Zoltar would be moving around indefinitely. As of 5:36 pm yesterday, they told us “Planned Parenthood just happened not sure what’s next.” They noted that last night would be dedicated to editing a video (now below) and that they planned to become “more friendly with press tomorrow.”
The Zoltar machine is emblazoned with the title “All-Seeing Trump,” and the tagline “SEES EVERYTHING! KNOWS NOTHING!” The undefined-yellow haired Trump Zoltar says such Trump platitudes like, “I’m going to be the most popular President, EVER. And everybody loves me.” He predicts what the “dishonest lying media” will say about him in the future, of course, since it’s a fortune telling machine. He brags that he builds the “best deportation trains” which run on “green energy, salsa verde.” He’ll use a “huge investment into modern high speed rail – very advanced, very fast…to deport 11 million illegal Mexicans.” He will replace Obamacare with “I don’t care.” There are more than 30 messages total, voiced by comedian Anthony Atamanuik, who has been portraying Trump in comedy skits with the Upright Citizens Brigade.
Like Grandma’s Predictions, and other fortune telling machines, the All-Seeing Trump also distributes fortunes, but in this case, “misfortunes.” There are numerous Trump related messages on the cards, like, “THE FUTURE IS NOT TO BE FEARED UNLESS YOU ARE BLACK, MUSLIM, OR MEXICAN” with the hashtag #TRUMPSPEAKS. An initial website, The All Seeing Trump is currently a simple splash page with a contact address and Twitter hashtag. The Twitter account, All Seeing Trump, has the tagline, “Consider your pussy grabbed.”
The machine itself was built over the course of six weeks by Characters Unlimited, a company based in Boulder City, Nevada, that makes not only the famous Zoltar machines and other fortune telling machines, but also a host of mechanical animals, characters, even trees. Trump’s hands, which do indeed look anatomically quite small (Vanity Fair editor Graydon Carter would be pleased), move back and forth across faux Poloroids (of him with Ivanka, Chris Christie, and a kitten), rather than tarot cards. One of his pockets contains a card with top secret launch codes.
Next, check out the statue of the naked Donald Trump that was also on the streets of NYC.
Donald Trump, Trump Tower
10 Trump Buildings You Can Find in NYC
The Privately Owned Public Space Inside Trump Tower is Already Less Accessible
10 Man-Made Urban Waterfalls in NYC
|
cc/2019-30/en_middle_0053.json.gz/line4580
|
__label__wiki
| 0.757024
| 0.757024
|
Hear NYC Ghosts Stories from The Midnight Society at LES Speakeasy Caveat
Nicole Saraniero 04/17/2019 Arts & Culture, New York, News
Photograph by Mike Bryk
Was it aliens or hypnosis? Ghosts or hallucination? Demons or delusion? Join the Midnight Society as they examine the science behind scary stories, focusing this month on the ghosts of New York City. At this story telling show hosted by Kevin Townley at the Lower East Side speakeasy Caveat, storytellers will dive into the scary stories that haunt us, and the psychology behind them. Guests will uncover the unexplained and realize that the reasons we invent supernatural stories are often more terrifying than the stories themselves.
DATE: Wednesday, May 1st, 2019 Doors open at 9:00pm, Show: 9:30pm-11:00pm.
PRICE: FREE for Untapped Cities Insiders! ($15 in advance, $20 at the door for the general public)
CAPACITY: 10 guests. Spots allocated on a first come, first served basis.
THINGS TO KNOW: This event is mixed seated and standing room. Seats are first-come first-served. Must be 21+ to attend.
REGISTRATION: Wednesday, April 17th at 12 PM EST
BECOME A MEMBER TO JOIN THIS EVENT FOR FREE!
At this special Caveat event, one of the ghosts you will hear about its the Gay Street Phantom. The little side street in Greenwich Village started as an alley of stables (named after the owner Mr. Gay). It was right next to the city morgue and when it eventually became a proper street it housed black servants of wealthy families in the area. In the 1920s, Gay Street was the location of an infamous speakeasy called the Pirate’s Den, owned and operated by Mayor Jimmy Walker. Nowadays the street is haunted with ghosts of the old bar. People claim to see men in silk top hats as well as moldering corpses in tattered rags vanishing around corners.
Photograph by Dennis Cahlo, Courtesy of Caveat
About host Kevin Townley: Townley has performed in Hollywood blockbusters, elementary school cafeterias and everywhere in between. With Waterwell Theatre Company: developed ‘Blueprint Specials’ (Intrepid Museum), GOODBAR (Public Theater Under the Radar). Other NYC: Shockheaded Peter (Little Shubert), My Deah (Abingdon). Film: Men In Black 3, The Sitter, My Super Ex-Girlfriend. TV: The Last OG, The Detour, The Following, All three Law & Orders, Sherri. The Associated Press has called him “Magnetic” and “Fabulous”, and in The New Yorker Hilton Als wrote that he was a star, but spelled his name wrong, so who knows
If you haven’t yet been to Caveat, it’s a beautiful underground speakeasy for intelligent nightlife serving up drinks and high-grade nerdery from experts in a wide variety of fields including storytellers, historians, comedians, scientists and science communicators, musicians, artists, and authors. You’ll leave each show a little smarter, and a little drunker.
See our full list of Untapped Cities Insiders Tours and our upcoming Public Tours.
Caveat, Untapped Cities Insiders
Get an Inside Look at the Skyscraper Museum’s New Exhibition on Housing Density in NYC
Crack Open the Secrets of NYC Oysters at the Brooklyn Historical Society
Party Along the Water at Riverside Park’s Hudson Beach Party
|
cc/2019-30/en_middle_0053.json.gz/line4581
|
__label__wiki
| 0.802935
| 0.802935
|
Celebrate 20 Years Of ‘The Professional’ With This Action-Packed Ranking Of Movie Hitman Vengeance
Ashley Burns
11.18.14 54 Comments
The backlash came and went pretty quickly from Gary Oldman’s June interview in Playboy. If you don’t recall, the celebrated actor was very candid and open about everything from the politics of Hollywood to whether or not Philip Seymour Hoffman could have been “saved,” and in between he revealed that he didn’t really care for some of his most popular films. For example, Oldman admitted that he “can’t bear it” when asked about The Fifth Element, and as for his roles in Christopher Nolan’s Dark Knight franchise or the Harry Potter films, he replied, “It was work.” And don’t even get him started on Sid and Nancy.
Naturally, when the interviewer mentioned True Romance and The Professional, we got a little nervous, because those films are modern masterpieces in our eyes and hearts, so if Oldman had revealed that he hated them, it would have been a heavy bummer. Fortunately, he was a lot kinder, as he called Drexl Spivey “a nice little turn” and of The Professional, he said, “I could take it or leave it personally.” Considering he said that he could have done “most of” his career’s work better, that checks in as high self-praise.
But I don’t really care if Oldman liked The Professional or not, because I love that damn movie and was determined to celebrate its place in hitman movie history on this day, the 20th anniversary of its American release. The lasting legacy of Luc Besson’s film is truly remarkable, seeing as just the other day a friend of mine asked me who was going out for someone’s birthday dinner, and I shouted, “EVERRRRYONNNNNNE!!!” The performance of that line may have been meant as a joke, but the scene was epic for it.
But the thing that I love about The Professional more than anything else is that final sequence between Léon and Norman Stansfield, the corrupt DEA agent and coward who would murder the hitman by shooting him in the back. It was so beautifully scripted and filmed that you almost forget that you’re watching this guy die after he laid waste to a building full of cops. That made me wonder where such a scene – the hitman makes his name or gets revenge in the cruelest and most appropriate way possible – ranks among the best of a genre that I love so much. Thus, I used my time-honored scientific process to put together this ranking of hitman/assassin movie bad guy death scenes, based on qualifications that are too scientific to even mention.
Honorable Mention: The Jackal
I’m only mentioning this dumb movie because it was on the other day and if I catch it in time, I have to watch the Jack Black death scene. It might be my favorite death scene in movie history, because it’s so cathartic to pretend that Black is playing one of his most annoying characters and I’m watching that character meet his hilariously gory end. And then the movie goes back to Richard Gere’s terrible accent.
20) In Bruges
The Hitman: Harry
How’d He Do It? With a bullet to his own head, but only after a series of dark-yet-amusing events. Ray (Colin Farrell) was probably the mopiest and all-around worst hitman you could hire, but that’s only because he accidentally killed a young boy. Ken (Brendan Gleeson) was also pretty bad at his job, because he had a soft spot for Ray’s depressed, suicidal behavior, and that led to Harry (Ralph Fiennes) shooting him in the neck. However, while attacking Ray, Harry accidentally blew a dwarf’s head clean off and he believed that it was a child, so he shot himself in the head. Somehow, in spite of that morose description, it’s a really fun movie.
19) Assassins
The Hitman: Robert Rath
How’d He Do It? People love to dump all over this box office bomb, but it’s a huge guilty pleasure of mine. Rath (Sylvester Stallone) just wanted out of the hitman business, and Miguel Bain (Antonio Banderas) was happy to oblige, because it meant that he’d be No. 1. So after they dispatched of the Cold War’s top assassin – and the man who contracted them to kill each other – Rath tried to walk away. But Bain couldn’t simply settle for being the default world’s best killer, so Rath had to put him down with a little behind-the-back action.
(Did You Know? The original writers of Assassins were Andy and Larry (now Lana) Wachowski, but director Richard Donner thought a film named Assassins should be less violent, so he brought Brian Helgeland in to “fix” it. The Wachowskis tried to get their names scrubbed from the awful finished product, but the WGA said no. Fortunately, since Joel Silver had bought their Assassins script at the same time as the script for The Matrix, and since he liked their work on Bound, he supposedly apologized and Warner Bros. allowed them to direct The Matrix.)
18) Nikita
The Hitwoman: Nikita
How’d She Do It? She didn’t, really. After she became an unstoppable killing machine for the French intelligence agency, Nikita realized she couldn’t hack it thanks to all of those stupid emotions in her brains and heart. Instead of having to kill her way out, Nikita just kind of ran away, but for the sake of celebrating Luc Besson’s ability to write good a good ass-kicking story, I’m including Nikita’s restaurant scene, because she managed to kill just about every bad guy in the world with two clips.
17) The Bourne Identity
The Hitman: Jason Bourne
How’d He Do It? The problem with including the Bourne franchise is that Jason never actually takes out any of the so-called top bad guys, because he wants to change and live a normal life, or “Marie wouldn’t want me to” or something like that. Like, in The Bourne Identity, instead of killing Conklin, Bourne walked away and forced Abbott to call in the hit. Or in The Bourne Supremacy, he had that insane car chase with Kirill, and then he ended it like, “Aw, I’m not gonna kill you, Russian bro.” However, because I am constantly forced to defend this franchise, I’m including Bourne’s field scene with Clive Owen from The Bourne Identity, because it’s pretty rad.
16) Shoot ‘Em Up
The Hitman: Mr. Smith
How’d He Do It? At least I think he was a hitman. Otherwise, he was just a dude who was really good at slaughtering actual hitmen and thugs in hilariously bizarre action sequences. Ultimately, Smith had to kill the incredibly angry Karl Hertz (Paul Giamatti) in an even more bizarre shootout, in which Smith had to use his actual hand as a gun. I’m no expert of biology or the physics of firearms and whatnot, but I have to imagine that only an expert could pull off such a ridiculous move. Smith even gets a cheap bonus point for trying to take his guy out with a clever catchphrase.
15) Pulp Fiction
The Hitman: Butch Coolidge, kind of
How’d He Do It? In this case, because I can’t write about hitman movie comeuppances without mentioning Pulp Fiction, I will argue that Butch (Bruce Willis) became a killer the moment that he decided to turn on Marsellus Wallace and incur the wrath of his hitmen. Does that work? Probably not, but that has never stopped me before. Anyway, poor Vincent. Sure, he was a junkie and a killer, but we had a soft spot for him because he showed heart by saving Mia Wallace’s life, and even though he blew Marvin’s brains all over the back of the car, he made a fun team with Jules. He sort of deserved better than being shot dead with his own gun right after he got off the shitter.
14) The Boondock Saints
The Hitmen: Connor and Murphy MacManus
How’d They Do It? Beloved favorites of action fan bros everywhere, the Saints fulfilled their God-given destinies by eventually teaming up with Il Duce – their dad, if you can believe it! – to circumvent local and federal law enforcement and assassinate Papa Joe in a courtroom. All they had to do was hone their skills as bar room brawlers, purchase some black market weapons and quickly learn how to shoot their guns better than a bunch of professional Russian hired guns, as well as their hitman father, who presumably had significantly more training and success. It’s a real rags-to-rich-in-ammunition story.
13) Wanted
The Hitman: Wesley Gibson
How’d He Do It? After Wesley was trained to become a better killer than his father by the assassins of the Fraternity, he learned that Sloan had been lying to him the whole time, which sucks considering he was tricked into murdering his own father. Whoops! Using his rage and newfound superhuman abilities to curve bullets and see things in slow motion, Wesley invaded the Fraternity’s headquarters to attempt to kill Sloan, as well as the rest of the cool hitmen with the awesome nicknames. He basically failed, since Fox actually killed most of the real assassins and herself for him, and Sloan escaped. However, Sloan was really bad at being a mastermind, because he thought that Wesley would actually return to his crappy office job, and that led to him being popped in the dome by a magic bullet.
12) Lucky Number Slevin
The Hitman: Slevin
How’d He Do It? I don’t know whether to call this one underrated or a guilty pleasure, because it’s not the worst movie of its kind, but it definitely tried a little too hard. Regardless, Slevin (squinty Josh Hartnett) designed the ultimate revenge game on the city’s top two mob bosses, played very well by Ben Kingsley and Morgan Freeman (this list’s first two-timer!), as he was raised by the man who should have killed him, Mr. Goodkat (Bruce Willis). Since everyone loves a story about a kid who grows up to get clever revenge on the people who killed his parents over his father’s gambling debt, watching The Boss and The Rabbi suffocate to death, as well as Stanley Tucci’s cop’s demise, was sort of bittersweet.
11) The Mechanic
The Hitman: Arthur Bishop
How’d He Do It? There’s a debate to be had here about the sanctity of original films and the creative liberties of remakes, considering the 1972 version of The Mechanic, starring Charles Bronson, had both of the hitmen dying in the end, while only one met his maker in the 2011 version with Jason Statham. I like the ’72 version’s story better, though, because as much as I like to see the main character walk away at the end, these aren’t heroes. Bishop was a bad, bad man in both versions, but what made the ’72 ending so interesting was the revelation (very poorly acted by Jan Michael Vincent, I might add) that Steve had no clue that Arthur killed his dad. Steve just wanted to be a killer, and he’d prove it by taking out the company’s top guy. It’s a tale of two endings, as Bronson’s Bishop got what he deserved, while Statham’s Bishop walked away as the better and smarter killer. I’ll take the ’72 version for justice served.
Also, I love how quickly the ’72 version ends. It’s just, “Bang, your dead,” explosion and then credits. Nobody f*cked around with the little stuff back then.
TOPICS#Anniversaries
TAGS13 ASSASSINSANNIVERSARIESassassinsCOLOMBIANAGARY OLDMANghost dogGROSSE POINTE BLANKHANNAHitmenIN BRUGESJEAN RENOJOHN WICKKill Billlucky number slevinnatalie portmanNIKITAPULP FICTIONrankingsRANKINGS THAT DONT MEAN ANYTHINGSHOOT EM UPthe boondock saintsthe bourne identityTHE KILLERthe long kiss goodnightTHE MECHANICTHE PROFESSIONALWANTED
|
cc/2019-30/en_middle_0053.json.gz/line4583
|
__label__wiki
| 0.859313
| 0.859313
|
Illinois not alerted to early clues in womb-cutting case
CHICAGO (AP) — Police and Illinois’ child welfare agency say staff at a Chicago-area hospital didn’t alert them after determining that a bloodied woman who arrived with a gravely ill newborn had not just given birth to the baby boy, as she claimed.
The woman, Clarisa Figueroa, was charged more than three weeks later with killing the baby’s mother , Marlen Ochoa-Lopez, after police found her body outside Figueoa’s home. Chicago police say she cut Ochoa-Lopez’s baby out of her womb on April 23, then called 911 to report she had given birth to a baby who wasn’t breathing. Paramedics took Figueroa and the baby to Advocate Christ Medical Center in suburban Oak Lawn.
Ochoa-Lopez’s family spent those weeks searching for her and holding press conferences pleading for help finding her, unaware the child was in a neonatal intensive care unit on life support.
The baby remained hospitalized on life support on Saturday, according to authorities.
Prosecutors say that when Figueroa was brought with the baby to the hospital, she had blood on her upper body and her face, which a hospital employee cleaned off. They also say Figueroa, 46, was examined at the hospital and showed no physical signs of childbirth.
Advocate Christ Medical Center has declined to say whether or when it contacted authorities, citing state and federal regulations. Oak Lawn police said they were not contacted about Figueroa by the medical center or any other agency.
Illinois Department of Children and Family Services spokesman Jassen Strokosch said Saturday the agency was alerted May 9 that there were questions about who had custody of the child in order to make medical decisions. He said he couldn’t speculate about why the agency wasn’t contacted sooner.
“We don’t know what was happening at the hospital,” he said.
Strokosch said the Department of Children and Family Services was alerted by someone required by law to contact the department about suspected abuse or neglect, but he couldn’t say who contacted the agency.
However, that was after Chicago police had connected Figueroa to Ochoa-Lopez’s disappearance.
Chicago Police Superintendent Eddie Johnson said police learned Ochoa-Lopez was missing when her husband reported it on April 24. On May 7, Chicago police learned from one of Ochoa-Lopez’s friends that she had been communicating via a private Facebook group with Figueroa about buying clothing. Police then went to Figueroa’s home, where her 24-year-old daughter eventually told them her mother had recently had a baby.
“There was nothing to point us in that direction in the beginning,” Johnson told reporters on Thursday, after police had arrested Figueroa and her daughter on murder charges.
Police spokesman Anthony Guglielmi said Saturday authorities had to subpoena medical records from the hospital for Figueroa and the child. He said police didn’t learn that Figueroa showed no signs of childbirth until “a couple weeks” after she was examined.
Both Johnson and Guglielmi referred questions about hospital protocol and policies to the medical center. A spokesman said in an emailed statement: “We have been cooperating with authorities and as this is an ongoing police matter, we’re referring all inquiries to local law enforcement.”
DNA testing determined Figueroa was not the baby’s mother and that Ochoa-Lopez’s husband was his father. Strokosch said his department let protective custody of the child lapse on May 13 because his father had been identified.
|
cc/2019-30/en_middle_0053.json.gz/line4588
|
__label__wiki
| 0.850708
| 0.850708
|
IS-2 (1944)
Revision as of 16:11, 17 March 2019 by Inceptor57 (talk | contribs) (Expanded "About" template)
USSRIV Rank
Heavy tankClass
4 peopleCrew
46.2 tWeight
8 forward
2 backGear box
122 mm D-25T cannonWeapon 1
28 roundsAmmunition
-3° / 20°Vertical guidance
12.7 mm DShK machine gunWeapon 2
50 roundsBelt capacity
-10° / 60°Vertical guidance
7.62 mm DT machine gunWeapon 3
1 890 roundsAmmunition
78 000 Research
230 000 Purchase
3 600 / 4 737/2 430 / 3 197/3 320 / 4 369Repair
230 000 Experts
This page is about the heavy tank IS-2 (1944). For the early version, see IS-2. For the premium version, see IS-2 "Revenge".
2.2 Mobility
3 Armaments
3.1 Main armament
3.2 Additional armament
3.3 Machine guns
4 Usage in battles
5.1 Development
5.3 Combat usage
The IS-2 (1944) is a Rank IV Russian heavy tank with a battle rating of 6.3 (AB/RB/SB). It was introduced during the Closed Beta Test for Ground Forces before Update 1.41.
The IS-2 mod. 1944 was created after the initial disadvantages of the previous IS-2 model (IS-2 mod. 1943), being vulnerable against the 75mm guns of the German StuGs and Panzer IVs due to the nearly flat frontal armor. The Soviet high command then decided to produce another version of the IS-2 with a heavily sloped armor plate, generally known as the IS-2 mod. 1944. It was used successfully on the Eastern front until the end of the war and is remembered as one of the mightiest tanks of World War 2.
In the game, the IS-2 mod. 1944 sits at a BR of 6.3, which is 0.6 higher than the first IS-2. It now features a mighty frontal plate, sloped at 61° backwards and also a 12.7 mm DShK machine gun on top for AA-defense. It has the same gun as its predecessor, but even at BR 6.3, it is one of the most destructive guns in the game, with high penetration and devastating post-penetration damage.
The armor, while having a nigh impenetrable frontplate and a decent turret, has many weakspots.
First there is the right part of the turret, because while on the left side the gun mantlet is connected to the turret armor, there is no mantlet on the right-hand side, so it has just half the thickness of the left side.
Next we have the lower glacis, which is a very prominent target, with very little armor for its BR (~130mm effective thickness). Shots of a German 88 mm or an American 90 mm will wreak your IS-2 1944.
Last but not least, we have the driver's hatch. While not as prominent as the first two mentioned, many experienced players will go for a shot right here, when you are hull-down. With around 120 mm effective thickness, it is really easy to penetrate even with small guns such as the American 76 mm, and has devastating effect on your tank.
Write about the mobility of the ground vehicle. Estimate the specific power and manoeuvrability, as well as the maximum speed forward and backward.
Main armament
Give the reader information about the characteristics of the main gun. Assess its effectiveness in a battle based on the reloading speed, ballistics and the power of shells. Do not forget about the flexibility of the fire, that is how quickly the cannon can be aimed at the target, open fire on it and aim at another enemy. Add a link to the main article on the gun: {{main|Name of the weapon}}. Describe in general terms the ammunition available for the main gun. Give advice on how to use them and how to fill the ammunition storage.
Additional armament
Some tanks are armed with several guns in one or more turrets. Evaluate the additional weaponry and give advice on its use. Describe the ammunition available for additional weaponry. Give advice on how to use them and how to fill the ammunition storage. If there is no additional weaponry remove this subsection.
Offensive and anti-aircraft machine guns not only allow you to fight some aircraft, but also are effective against lightly armoured vehicles. Evaluate machine guns and give recommendations on its use.
Usage in battles
Describe the tactics of playing in the vehicle, the features of using vehicles in the team and advice on tactics. Refrain from creating a "guide" - do not impose a single point of view but instead give the reader food for thought. Describe the most dangerous enemies and give recommendations on fighting them. If necessary, note the specifics of the game in different modes (AB, RB, SB).
Summarize and briefly evaluate the vehicle in terms of its characteristics and combat effectiveness. Mark its pros and cons in a bulleted list. Try not to use more than 6 points for each of the characteristics. Avoid using categorical definitions such as "bad", "good" and the like - they can be substituted with softer forms such as "inadequate" and "effective".
Great 122 mm D-25T gun, featuring good penetration and devastating post-penetration damage.
Extremely strong upper glacis, with about 230 mm effective thickness, sloped at 61°
Superb reverse speed (18 kph)
Decently mobile for a tank of its size
12.7 mm machine gun on top against planes
Decent turret armor on the left side
Trollish armor, can bounce some unexpected shells
Playing the tank while stock isn't bad
Long reload for its main gun (27 seconds without crew skills)
Many weakspots (Driver's hatch, lower glacis, right side of the turret)
Only 4 crew members
Worse optics than its predecessor
Can't sidescrape, due to its cheeks
Ammo capacity for the MG on top is low, only 250 rounds
Effort began on another heavy tank after the IS-1's 85 mm gun no longer had a firepower advantage after the standard T-34 medium tank was upgraded with the same gun into the T-34-85. Due to that, the IS-1 was discontinued in January 1944 with about 107 units produced.[1] Those in storage still awaited upgrade to become a more powerful heavy tank.
In late 1943, the upgrade of the IS tank began and the choices available were rounded down to two weapons, the 122 mm A-19 gun and the 100 mm D-10 gun. Both guns had their advantages and disadvantages in their specifications, the 100 mm D-10 had a much better armour penetration capabilities and uses a single-piece ammunition, the 122 mm A-19 has a better high-explosive round and used a two-piece ammunition In the end, the 122 mm A-19 (adopted as the D-25T) gun was chosen as the gun of the new IS tank due to larger supply of the gun available for use (the D-10 was a newly produced gun) and the better high-explosive round available. The better high-explosive round is due to the heavy tank's specification as a "breakthrough" tank than a anti-tank role, so it was meant to fight fortifications more than against armour. Nevertheless, against armour, the 122 mm gun proved a very lethal cannon against armour, having the capacity to knock out any German tanks fielded in the war, even the Tiger II, though the ease of knocking them out vary from their armour protection.
The 122 mm gun's two-piece ammunition was perhaps the gun's worst drawback, this along with the heavy shells and charges that it uses causes reloading speed to only be one and a half rounds per minute maximum. Even after some modernization to the gun including a semi-automatic breech, the firing rate only increased to two to three rounds per minute. Another drawback of the gun was the size of the ammunition that the 122 mm gun uses, the IS tank interior could only hold 28 of such ammunition, which restricts the time the IS could last in battle before requiring a resupply. In battle, the usual distribution of the shells is 20 high-explosive and 8 armour-piercing rounds.
The finished IS tank with the 122 mm gun, first called the IS-122, was finally approved and renamed the IS-2 heavy tank, some were rearmed IS-1s from the factory with the 122 mm gun. The IS-2 tank, like the IS-1, was superior to the previous KV-1 tanks used in the Red Army. Production of the IS-2 started in October or November 1943 and by the end of World War II when production ended, a total of 3,854 units were produced.
The IS-2 tank hull was similar to the IS-1 tank, but the turret was modified to accommodate the larger 122 mm D-25T gun. The suspension was a torsion-bar suspension system and the tank was powered by a diesel V2-IC engine. The drivetrain and the engine were taken from the KV-1 tank, yet was considerably more mobile. The armour on the IS-2 was a 120 mm thick front plate sloped at 60 degrees with a small step in the front for the driver's hatch. This "early version", developed from the KV-13 design, was produced from the initial production lines until some time in late 1944, where a IS-2 mod. 1944 version was modified with the front plate now a single sloped 120 mm plate at 60 degrees with no interruptions in order to eliminate shot traps and weaknesses in the armour design. Other design changes when the IS-2 was upgraded to the 1944 model was a stronger gun mount, wider mantlet, and an addition of a Dshk machine gun on the turret. The formidable armour of the IS-2 is able to withstand the 88 mm shells from the Tiger I at 1,000 meters out, yet the whole tank weighs less than the Panther at only 46 tons. Despite its construction, the IS-2 was still quite crude in quality and can have signs of being hastily built from the factories. This did not affect its battlefield performance greatly and the crude construction is merely a side effect of the fast production of the tanks to fill battlefield demands.
Combat usage
The IS-2 first saw action in early 1944. The IS-2 was organized in heavy tank regiments, each with 21 tanks. Their role was to spearhead the offensives launched at each sector, breaking through enemy emplacements and supporting the infantry by destroying enemy fortifications, they were not meant to exploit breakthroughs and this role was given to the lighter T-34 tanks. Their first reported action was in April 1944 in the 11th Special Guards Heavy Tank Regiment near Tarnopol, Ukraine. The IS-2 presented such a surprise to the Germans as no Soviet tanks before could engage with accurate fire from more than 3 kilometers away. A bigger shock was when they found out the 88 mm of the Tiger I couldn't adequately penetrate their armour. The IS-2 initial combat experience was limited due to the inexperienced crew and organization, but more and more IS-2 started to come in to reinforce the Soviet forces.[1]
The IS-2's next great effort was in Operation Bagration in July 1944. By this time period, the heavy tank regiments were allocated to one for each tank corps. During Operation Bagration, the IS-2 combat effort contributed to the decimation of German Army Group Center. The IS-2 was able to deal with the troublesome German Panther and Tiger I tanks with ease. By December 1944, enough IS-2 was produced that the Soviets began outfitting them to Guards heavy tank brigades, consisting of 65 IS-2 tanks with other vehicles for support. Though the number of these brigades were still limited, they proved valuable in breaking through German lines, as used in January 1945 against the German in the Oder Offensive. It should be noted that despite having a role similar to the Tiger heavy tank battalions in the German service, they are produced in far greater numbers to enforce every tank corp with one heavy tank regiment that allowed even the IS-2 to overwhelm German defenses. The IS-2 continued to see combat service for the Red Army all the way to the Battle of Berlin and the end of World War II.[1] T
After World War II, the IS-2 production was replaced by the more heavily armoured IS-3, but the IS-2 stayed in service up until 1982 due to modernization efforts on the IS-2. These modernized IS-2 were named the IS-2M and were done in the mid-1950s. These modernization efforts added external fuel tanks and stowage bins onto the hull, and protective skirts on the edges of the tracks. The IS-2 were finally placed into storage in 1990s and were kept in reserves or sold out as scrap metal.
Like most of Soviet Union's military hardware, the IS-2 was given out to the Warsaw Pact nations as supplies. The IS-2 was thus lent out to Poland, Czechoslovakia, Hungary, China, North Vietnam, and maybe North Korea. Later in 1960, a shipment of IS-2 was also sent to Cuba, these were converted into bunkers and coastal defenses as spare parts for the tank never made it to Cuba due to the US blockade imposed in 1962.
Skins and camouflages for the IS-2 (mod.1944) from live.warthunder.com. They are filed under the terms #is_2_1944 and #is2_44.
↑ 1.0 1.1 1.2 Zaloga, Steven J. IS-2 Heavy Tank 1944-73 Great Britain: Osprey Publishing Ltd., 1994
Links to the articles on the War Thunder Wiki that you think will be useful for the reader, for example:
reference to the series of the vehicles;
[Vehicle Profile] IS-2 Mod. 1944
USSR heavy tanks
KV KV-1 (L-11) · KV-1E · KV-1 (ZiS-5) · KV-1S · KV-85 · KV-122 · KV-220
KV-2 (1939) · KV-2 (1940) · KV-2 (ZiS-6)
IS IS-1 · IS-2 · IS-2 (1944) · IS-2 "Revenge for the Hero brother" · IS-3 · IS-4M · IS-6 · IS-7 · T-10M
Multi-towers T-35 · SMK
Lend-Lease ▂MK-II "Matilda"
Retrieved from "https://wiki.warthunder.com/index.php?title=IS-2_(1944)&oldid=18208"
USSR ground vehicles
Fourth rank ground vehicles
|
cc/2019-30/en_middle_0053.json.gz/line4594
|
__label__wiki
| 0.517819
| 0.517819
|
Focused Inbox coming to Outlook, along with more features
By: Ivan Jenic
▪ October 2, 2016 ▪
outlook, windows 10 apps
Home » News » Focused Inbox coming to Outlook, along with more features
For some reason, Microsoft pays more attention to the development of Outlook on other platforms, than on its native environment. In other words, the company provides more frequent updates, and delivers more features to Android and iOS versions of Outlook, than to the Windows 10 version.
However, as Outlook is one of the most popular email services for Windows, Microsoft decided that it’s worth delivering frequent updates and new features to this version, as well. The first feature already available on Android and iOS, that’s going to arrive to Outlook Mail on Windows 10 is Focused Inbox.
Focused Inbox is the feature that allows you to set the priority of emails, something like in Gmail. Instead of showing all messages equally, with Focused Inbox, you’ll see messages with higher priority first.
As for the other features that should make their way to Outlook Mail for Windows 10, Microsoft also plans to bring @-mentions and cloud attachments, but nothing more was specified.
Microsoft officials confirmed that the company wants to bring the same Outlook experience to every platform. This means that updates and new features are going to be released at the same time. Time will tell if Microsoft respects this promise.
All these features should arrive on Windows 10 and Windows 10 Mobile versions of Outlook by the year’s end. Of course, as soon as they’ve been implemented, we’re going to make sure to tell you about it.
What else would you like to see in Outlook for Windows 10? Tell us in the comment section below.
Microsoft should restrict what apps Windows can run, analysts suggest
Skype Preview update brings hidden conversations, URI support an
Fix: Message stuck in Outlook 2007 Outbox
Users complain recalling Outlook emails almost never works
|
cc/2019-30/en_middle_0053.json.gz/line4596
|
__label__cc
| 0.598711
| 0.401289
|
Obj. Name
TNS AT YesNoAll
Public YesNoAll
Unclasssified ATs
Classified SNe
Degrees (0..360, with decimal point) or sexagesimal: HH:MM:SS.SS / HH MM SS.SS
Degrees (-90..+90, with decimal point) or sexagesimal: ±DD:MM:SS.SS / ±DD MM SS.SS
arcsecarcmindeg
Discovering Group NoneASAS-SNASOATLASATSAZTECBlackGEMBOSSBraTSBTDGC-SNAILSCRAFTCRTSCSNSCSPDAO_OTSDECam-GROWTHDESDESGWDLT40EHSSPePESSTOePESSTO+FDSTGaiaAlertsGattiniGlobal SN ProjectGOTOGREATGSNSTGWAC-ToPHETHHSCiPTFISSPJWST-ERSKEGSKSPLCOGT SN-KPLOSSLSQMASTERMeerLICHTMUSSESNUTSOGLEOOICLEPadova-AsiagoPan-STARRS1PESSTOPIKAPOSSPOTSPSHPTSSRANSSPSAGUAROSCATSkyMapperSKYSSNHuntSTARGATESUNBIRDSwope SN SurveyTAROTTCDTexSNsTMTSTNTSTomo-eXOSSXTSSZTF
Classifying Group NoneASAS-SNASOATLASATSAZTECBlackGEMBOSSBraTSBTDGC-SNAILSCRAFTCRTSCSNSCSPDAO_OTSDECam-GROWTHDESDESGWDLT40EHSSPePESSTOePESSTO+FDSTGaiaAlertsGattiniGlobal SN ProjectGOTOGREATGSNSTGWAC-ToPHETHHSCiPTFISSPJWST-ERSKEGSKSPLCOGT SN-KPLOSSLSQMASTERMeerLICHTMUSSESNUTSOGLEOOICLEPadova-AsiagoPan-STARRS1PESSTOPIKAPOSSPOTSPSHPTSSRANSSPSAGUAROSCATSkyMapperSKYSSNHuntSTARGATESUNBIRDSwope SN SurveyTAROTTCDTexSNsTMTSTNTSTomo-eXOSSXTSSZTF
Object Type AfterglowAGNComputed-IaComputed-IIbComputed-IIPComputed-PISNCVFRBGalaxyGapGap IGap IIILRTImpostor-SNKilonovaLBVM dwarfNovaOtherQSOSLSN-ISLSN-IISLSN-RSNSN ISN I-faintSN I-rapidSN IaSN Ia-91bg-likeSN Ia-91T-likeSN Ia-CSMSN Ia-pecSN Ia-SCSN Iax[02cx-like]SN IbSN Ib-Ca-richSN Ib-pecSN Ib/cSN IbnSN IcSN Ic-BLSN Ic-pecSN IISN II-pecSN IIbSN IILSN IInSN IIn-pecSN IIPStd-specTDEVarstarWRWR-WCWR-WNWR-WO
AT Type Other - UndefinedPSN - Possible SNPNV - Possible NovaAGN - Known AGNNUC - Possibly nuclearFRB - Fast Radio Burst event
Discovery Date Range
Discovery Mag Range
Redshift Range
Min spectra num
Classifier
Discovery Instrument SelectAAT - RGOANU-2.3m - WiFeSAPO-3.5m - APO-TSPECAPO-3.5m - DISASASSN-1 - BrutusASASSN-2 - CassiusASASSN-3 - PaczynskiASASSN-4 - LeavittASASSN-5 - Payne-GaposchkinAST3 - AST3-CamATLAS1 - ACAM1ATLAS2 - ACAM2BAO-0.6m - BATCBAO-0.85m - CCDBAO-2.16m - CassegrainBAO-2.16m - Phot-specBG2 - BlackGEM-Cam2BG3 - BlackGEM-Cam3BG4 - BlackGEM-Cam4Bok - BC-BokBTA-6 - SCORPIOCA-2.2m - CAFOSCA-3.5m - MOSCACA-3.5m - PMASCA-3.5m - TWINCFHT - MegaCamCNEOST - STA1600CrAO - AZT-8Crossley - PNSCTIO-0.41 - CTIO-PhotomultiplierCTIO-0.9 - CASS-DICTIO-1.0 - CTIO-OtherCTIO-1.5m - LORALCTIO-1.5m - RC-Spec-1.5CTIO-4m - ARCoIRISCTIO-4m - COSMOSCTIO-4m - DECAMCTIO-4m - IR-SpecCTIO-4m - RC-Spec-4Danish-1.54m - DFOSCDCT - Deveny-LMIDDO - CassEkar - AFOSCEkar - BC-EkarESO-1.5m - ARCESESO-1.5m - BC-ESOESO-1m - QUESTESO-2.2m - EFOSC-2.2ESO-2.2m - GRONDESO-3.6m - EFOSC2-3.6ESO-NTT - EFOSC2-NTTESO-NTT - EMMIESO-NTT - SofiFLWO-1.5m - FASTFLWO-1.5m - TRESFTN - EM01FTN - FLOYDS-NFTN - FS02FTS - FLOYDS-SFTS - FS01Gaia - Gaia-astrometricGaia - Gaia-photometricGaia - Gaia-RVSGALEX - GALEXGalileo - AVIGalileo - BC-AsiGAO-0.65m - GCSGAO-1.5m - GLOWSGattini - Gattini-cameraGemini-N - GMOSGemini-N - GNIRSGemini-S - Flamingos-2Gemini-S - GMOS-SGOTO-N - GOTO-1GTC - OSIRISHarlan-Smith - ES2Harlan-Smith - IDS-McDonaldHarlan-Smith - LCSHCT-2m - HFOSCHET - HET-HRSHET - HET-LRSHET - HET-MRSHST - STISHST - WFC3IGO - IFOSCINT-2.5m - FOSINT-2.5m - IDSIRTF - SpeXIUE - IUEJWST - MIRIJWST - NIRCamJWST - NIRISSJWST - NIRSpecKAIT - KAITCamKanata - HOWPolKAO - LOSA-F2Keck1 - HIRESKeck1 - LRISKeck1 - MOSFIREKeck2 - DEIMOSKeck2 - ESIKPNO-2.1m - IDS-KPNOLBT - LUCILBT - MODS1LBT - MODS2LCO-duPont - BC-duPontLCO-duPont - Mod-specLCO-duPont - WFCCDLCO1m - SinistroLCO2m - SpectralLick-3m - KASTLick-3m - ShARCSLick-3m - UV-SchmidtLick-3m - VNIRISLick1m - Nickel-SpecLijiang-2.4m - YFOSCLT - FRODOspecLT - SPRATMagellan-Baade - BC-MagellanMagellan-Baade - FIREMagellan-Baade - IMACSMagellan-Baade - MagEMagellan-Clay - LDSS-2Magellan-Clay - LDSS-3Magellan-Clay - MIKEMayall - KOSMOSMayall - RC-SpecMDM-2.4 - BC-OSUMDM-2.4 - MARK-IIIMDM-2.4 - modspecMDM-2.4 - OSMOSMDM-2.4 - TIFKAMMercator - HERMESML1 - MeerLICHT-CamMLO-1.5m - ITS-MLOMLO-1m - CCD-MLOMMT - HectospecMMT - MMIRSMMT - MMT-BlueMMT - MMT-RedMSO-74in - BC-MSOMt-Abu - Abu-NICSNayuta - MALLSNOT - ALFOSCNOT - StanCamOAO-188 - KOOLSOGLE-1.3m - OGLEIV-CamOHP-1.93m - CarelecOther - OtherOtto-Struve - IGSP200 - DBSPP200 - LFCP200 - P200-TSPECP48 - CFH12kP48 - ZTF-CamP60 - P60-CamP60 - SEDMPlaskett - PlaskettPS1 - GPC1SAAO - G-SpecSALT - HRS-SALTSALT - RSSSkyMapper - SM-WFCamSloan - SDSS-SpecSOAR - GoodmanSOAR - SOAR-OSIRISSPM15 - RATIRSSO-2.3m - DBSSST - IRACSST - IRSSubaru - FOCASSubaru - HDSSubaru - HSCSubaru - IRCSSwift-UVOT - UV-grismSwift-UVOT - UVOT-ImagerSwift-UVOT - V-grismTMT - CCD-TMTTNG - DOLORESTNG - HARPS-NTNG - NICSTNG - SARGUH88 - SNIFSUKIRT - CGS4VLT-UT1 - FORS1VLT-UT1 - FORS2VLT-UT2 - FORS1-UT2VLT-UT2 - UVESVLT-UT2 - X-ShooterVLT-UT3 - ISAACVLT-UT3 - VIMOSVLT-UT4 - MUSEVLT-UT4 - SINFONIWHT-4.2m - ACAMWHT-4.2m - FOS-1WHT-4.2m - FOS-2WHT-4.2m - ISISWHT-4.2m - LIRISWise-C18 - C18-CamWise1m - FOSCWise1m - LaiwoWise1m - PIWIYN - HydraXLT - BFOSCXLT - HRS-XLTXLT - OMR
Classification Instrument SelectAAT - RGOANU-2.3m - WiFeSAPO-3.5m - APO-TSPECAPO-3.5m - DISASASSN-1 - BrutusASASSN-2 - CassiusASASSN-3 - PaczynskiASASSN-4 - LeavittASASSN-5 - Payne-GaposchkinAST3 - AST3-CamATLAS1 - ACAM1ATLAS2 - ACAM2BAO-0.6m - BATCBAO-0.85m - CCDBAO-2.16m - CassegrainBAO-2.16m - Phot-specBG2 - BlackGEM-Cam2BG3 - BlackGEM-Cam3BG4 - BlackGEM-Cam4Bok - BC-BokBTA-6 - SCORPIOCA-2.2m - CAFOSCA-3.5m - MOSCACA-3.5m - PMASCA-3.5m - TWINCFHT - MegaCamCNEOST - STA1600CrAO - AZT-8Crossley - PNSCTIO-0.41 - CTIO-PhotomultiplierCTIO-0.9 - CASS-DICTIO-1.0 - CTIO-OtherCTIO-1.5m - LORALCTIO-1.5m - RC-Spec-1.5CTIO-4m - ARCoIRISCTIO-4m - COSMOSCTIO-4m - DECAMCTIO-4m - IR-SpecCTIO-4m - RC-Spec-4Danish-1.54m - DFOSCDCT - Deveny-LMIDDO - CassEkar - AFOSCEkar - BC-EkarESO-1.5m - ARCESESO-1.5m - BC-ESOESO-1m - QUESTESO-2.2m - EFOSC-2.2ESO-2.2m - GRONDESO-3.6m - EFOSC2-3.6ESO-NTT - EFOSC2-NTTESO-NTT - EMMIESO-NTT - SofiFLWO-1.5m - FASTFLWO-1.5m - TRESFTN - EM01FTN - FLOYDS-NFTN - FS02FTS - FLOYDS-SFTS - FS01Gaia - Gaia-astrometricGaia - Gaia-photometricGaia - Gaia-RVSGALEX - GALEXGalileo - AVIGalileo - BC-AsiGAO-0.65m - GCSGAO-1.5m - GLOWSGattini - Gattini-cameraGemini-N - GMOSGemini-N - GNIRSGemini-S - Flamingos-2Gemini-S - GMOS-SGOTO-N - GOTO-1GTC - OSIRISHarlan-Smith - ES2Harlan-Smith - IDS-McDonaldHarlan-Smith - LCSHCT-2m - HFOSCHET - HET-HRSHET - HET-LRSHET - HET-MRSHST - STISHST - WFC3IGO - IFOSCINT-2.5m - FOSINT-2.5m - IDSIRTF - SpeXIUE - IUEJWST - MIRIJWST - NIRCamJWST - NIRISSJWST - NIRSpecKAIT - KAITCamKanata - HOWPolKAO - LOSA-F2Keck1 - HIRESKeck1 - LRISKeck1 - MOSFIREKeck2 - DEIMOSKeck2 - ESIKPNO-2.1m - IDS-KPNOLBT - LUCILBT - MODS1LBT - MODS2LCO-duPont - BC-duPontLCO-duPont - Mod-specLCO-duPont - WFCCDLCO1m - SinistroLCO2m - SpectralLick-3m - KASTLick-3m - ShARCSLick-3m - UV-SchmidtLick-3m - VNIRISLick1m - Nickel-SpecLijiang-2.4m - YFOSCLT - FRODOspecLT - SPRATMagellan-Baade - BC-MagellanMagellan-Baade - FIREMagellan-Baade - IMACSMagellan-Baade - MagEMagellan-Clay - LDSS-2Magellan-Clay - LDSS-3Magellan-Clay - MIKEMayall - KOSMOSMayall - RC-SpecMDM-2.4 - BC-OSUMDM-2.4 - MARK-IIIMDM-2.4 - modspecMDM-2.4 - OSMOSMDM-2.4 - TIFKAMMercator - HERMESML1 - MeerLICHT-CamMLO-1.5m - ITS-MLOMLO-1m - CCD-MLOMMT - HectospecMMT - MMIRSMMT - MMT-BlueMMT - MMT-RedMSO-74in - BC-MSOMt-Abu - Abu-NICSNayuta - MALLSNOT - ALFOSCNOT - StanCamOAO-188 - KOOLSOGLE-1.3m - OGLEIV-CamOHP-1.93m - CarelecOther - OtherOtto-Struve - IGSP200 - DBSPP200 - LFCP200 - P200-TSPECP48 - CFH12kP48 - ZTF-CamP60 - P60-CamP60 - SEDMPlaskett - PlaskettPS1 - GPC1SAAO - G-SpecSALT - HRS-SALTSALT - RSSSkyMapper - SM-WFCamSloan - SDSS-SpecSOAR - GoodmanSOAR - SOAR-OSIRISSPM15 - RATIRSSO-2.3m - DBSSST - IRACSST - IRSSubaru - FOCASSubaru - HDSSubaru - HSCSubaru - IRCSSwift-UVOT - UV-grismSwift-UVOT - UVOT-ImagerSwift-UVOT - V-grismTMT - CCD-TMTTNG - DOLORESTNG - HARPS-NTNG - NICSTNG - SARGUH88 - SNIFSUKIRT - CGS4VLT-UT1 - FORS1VLT-UT1 - FORS2VLT-UT2 - FORS1-UT2VLT-UT2 - UVESVLT-UT2 - X-ShooterVLT-UT3 - ISAACVLT-UT3 - VIMOSVLT-UT4 - MUSEVLT-UT4 - SINFONIWHT-4.2m - ACAMWHT-4.2m - FOS-1WHT-4.2m - FOS-2WHT-4.2m - ISISWHT-4.2m - LIRISWise-C18 - C18-CamWise1m - FOSCWise1m - LaiwoWise1m - PIWIYN - HydraXLT - BFOSCXLT - HRS-XLTXLT - OMR
Assoc. Discovery Group/s ASAS-SNASOATLASATSAZTECBlackGEMBOSSBraTSBTDGC-SNAILSCRAFTCRTSCSNSCSPDAO_OTSDECam-GROWTHDESDESGWDLT40EHSSPePESSTOePESSTO+FDSTGaiaAlertsGattiniGlobal SN ProjectGOTOGREATGSNSTGWAC-ToPHETHHSCiPTFISSPJWST-ERSKEGSKSPLCOGT SN-KPLOSSLSQMASTERMeerLICHTMUSSESNUTSOGLEOOICLEPadova-AsiagoPan-STARRS1PESSTOPIKAPOSSPOTSPSHPTSSRANSSPSAGUAROSCATSkyMapperSKYSSNHuntSTARGATESUNBIRDSwope SN SurveyTAROTTCDTexSNsTMTSTNTSTomo-eXOSSXTSSZTF
Associated with external catalog: -Select-TESS-active sector/s (12,13)TESS-Sector12TESS-Sector13
Download as CSVDownload as TSV
Results in page 510203040501005001000
Columns to display
Host Redshift
Discovering Group
Classifying Group
Disc. Instrument/s
Class. Instrument/s
Assoc. Disc. Group/s
Disc. Internal Name
Object Spectra
Discovery Mag Filter
External Catalog/s
Showing results 2751 to 2800 out of 37962
Obj. Type
Discovering Group/s
Classifying Group/s
Associated Group/s
Ext. catalog/s
11455 AT 2016bco 1 05:47:11.593 +07:53:55.19 Pan-STARRS1 Pan-STARRS1 PS16bcq PS1 - GPC1 Y Y 20.0635 w-PS1 2016-03-05 06:19:41 Young
1533 2016-03-14 04:27:30 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 05:47:11.593 +07:53:55.19 2016-03-05 06:19:41 20.0635 w-PS1 1 PSN PS16bcq Pan-STARRS1
Obs-date (UT)
1718 2016-03-05 06:19:41 20.0635 ABMag w-PS1 PS1_GPC1
11456 AT 2016bcp 1 10:24:59.787 -06:36:36.63 Pan-STARRS1 Pan-STARRS1 PS16bcr PS1 - GPC1 Y Y 20.1294 w-PS1 2016-03-06 09:02:43 Young
1534 2016-03-14 04:27:33 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:24:59.787 -06:36:36.63 2016-03-06 09:02:43 20.1294 w-PS1 1 PSN PS16bcr Pan-STARRS1
11457 AT 2016bcq 1 10:28:35.465 +07:49:46.22 Pan-STARRS1 Pan-STARRS1 PS16bcs PS1 - GPC1 Y Y 20.2951 w-PS1 2016-03-06 07:54:35 Young
1535 2016-03-14 04:27:36 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:28:35.465 +07:49:46.22 2016-03-06 07:54:35 20.2951 w-PS1 1 PSN PS16bcs Pan-STARRS1
11458 AT 2016bcr 1 10:18:45.446 +08:01:33.32 Pan-STARRS1 Pan-STARRS1 PS16bct PS1 - GPC1 Y Y 19.8206 w-PS1 2016-03-07 08:03:56 Young
1536 2016-03-14 04:27:39 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:18:45.446 +08:01:33.32 2016-03-07 08:03:56 19.8206 w-PS1 1 PSN PS16bct Pan-STARRS1
11459 AT 2016bcs 1 14:29:18.560 -02:36:48.63 Pan-STARRS1 Pan-STARRS1 PS16bcu PS1 - GPC1 Y Y 21.3953 w-PS1 2016-03-06 14:36:53 Young
1537 2016-03-14 04:27:42 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 14:29:18.560 -02:36:48.63 2016-03-06 14:36:53 21.3953 w-PS1 1 PSN PS16bcu Pan-STARRS1
11460 AT 2016bct 1 14:58:30.771 -25:02:09.85 Pan-STARRS1 Pan-STARRS1 PS16bcv PS1 - GPC1 Y Y 20.2441 w-PS1 2016-03-07 13:15:30 Young
1538 2016-03-14 04:27:45 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 14:58:30.771 -25:02:09.85 2016-03-07 13:15:30 20.2441 w-PS1 1 PSN PS16bcv Pan-STARRS1
11461 AT 2016bcu 1 12:37:18.520 -08:30:03.97 Pan-STARRS1 Pan-STARRS1 PS16bcw PS1 - GPC1 Y Y 20.9805 w-PS1 2016-03-10 09:53:03 Young
1539 2016-03-14 04:27:48 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 12:37:18.520 -08:30:03.97 2016-03-10 09:53:03 20.9805 w-PS1 1 PSN PS16bcw Pan-STARRS1
11462 AT 2016bcv 1 13:35:13.873 -05:08:15.18 Pan-STARRS1 Pan-STARRS1 PS16bcx PS1 - GPC1 Y Y 20.9251 w-PS1 2016-03-10 11:19:15 Young
1540 2016-03-14 04:27:52 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 13:35:13.873 -05:08:15.18 2016-03-10 11:19:15 20.9251 w-PS1 1 PSN PS16bcx Pan-STARRS1
11463 AT 2016bcw 1 14:37:08.764 -14:32:07.93 Pan-STARRS1 Pan-STARRS1 PS16bcy PS1 - GPC1 Y Y 20.4663 w-PS1 2016-03-10 13:02:20 Young
1541 2016-03-14 04:27:55 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 14:37:08.764 -14:32:07.93 2016-03-10 13:02:20 20.4663 w-PS1 1 PSN PS16bcy Pan-STARRS1
11464 AT 2016bcx 1 14:39:34.670 +03:55:01.18 Pan-STARRS1 Pan-STARRS1 PS16bcz PS1 - GPC1 Y Y 20.3446 w-PS1 2016-03-11 14:31:08 Young
1542 2016-03-14 04:27:59 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 14:39:34.670 +03:55:01.18 2016-03-11 14:31:08 20.3446 w-PS1 1 PSN PS16bcz Pan-STARRS1
11466 AT 2016bcz 1 11:34:10.500 +55:34:40.50 SDSS J113409.59+553437.0 XTSS XTSS-16C Other - Other Y Y 18.1 B-Johnson 2016-03-03 16:18:13 Niu
1544 2016-03-14 17:40:17 abiao Hubiao Niu(XAO),Shuguo Ma(XAO),Xiaofeng Wang, Wenxiong Li (THU),Ali Esamdin, Lu Ma,Jinzhong Liu(XAO) XTSS 11:34:10.500 +55:34:40.50 2016-03-03 16:18:13 18.1 B-Johnson 2 1 PSN SDSS J113409.59+553437.0 XTSS-16C This supernova candidate was discovered during the XAO (Xinjiang Astronomical Observatory) and THU (Tsinghua University) Supernova Survey (XTSS), using the Nanshan 1.0-m telescope of XAO, China.
1732 2016-03-03 16:18:13 18.1 Other B-Johnson Other_Other 60
1731 2015-03-19 17:55:17 20 Other B-Johnson Other_Other 60 Hubiao Niu [Last non detection]
Last Modified (UT)
tns_2016bcz_atrep_1544.png Graphics 2016-03-14 17:40:17 abiao
11467 AT 2016bda 1 06:52:59.836 -17:24:03.56 Pan-STARRS1 Pan-STARRS1 PS16bda PS1 - GPC1 Y Y 18.4422 i-Sloan 2016-02-25 07:40:09 Young
1545 2016-03-14 19:37:05 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 06:52:59.836 -17:24:03.56 2016-02-25 07:40:09 18.4422 i-Sloan 1 PSN PS16bda Pan-STARRS1
1733 2016-02-25 07:40:09 18.4422 ABMag i-Sloan PS1_GPC1
11468 AT 2016bdb 1 08:15:36.761 -06:03:36.72 Pan-STARRS1 Pan-STARRS1 PS16bdb PS1 - GPC1 Y Y 19.942 i-Sloan 2016-02-25 08:40:01 Young
1546 2016-03-14 19:37:07 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:15:36.761 -06:03:36.72 2016-02-25 08:40:01 19.942 i-Sloan 1 PSN PS16bdb Pan-STARRS1
1734 2016-02-25 08:40:01 19.942 ABMag i-Sloan PS1_GPC1
11469 AT 2016bdc 1 08:22:26.211 -05:55:55.21 Pan-STARRS1 Pan-STARRS1 PS16bdc PS1 - GPC1 Y Y 19.1722 i-Sloan 2016-02-25 08:45:00 Young
1547 2016-03-14 19:37:09 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:22:26.211 -05:55:55.21 2016-02-25 08:45:00 19.1722 i-Sloan 1 PSN PS16bdc Pan-STARRS1
11470 AT 2016bdd 1 08:23:50.504 -01:58:30.44 Pan-STARRS1 Pan-STARRS1 PS16bdd PS1 - GPC1 Y Y 20.1295 i-Sloan 2016-02-25 08:43:08 Young
1548 2016-03-14 19:37:11 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:23:50.504 -01:58:30.44 2016-02-25 08:43:08 20.1295 i-Sloan 1 PSN PS16bdd Pan-STARRS1
11471 AT 2016bde 1 08:54:02.485 -02:01:00.29 Pan-STARRS1 Pan-STARRS1 PS16bde PS1 - GPC1 Y Y 19.5846 i-Sloan 2016-02-25 08:53:26 Young
1549 2016-03-14 19:37:13 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:54:02.485 -02:01:00.29 2016-02-25 08:53:26 19.5846 i-Sloan 1 PSN PS16bde Pan-STARRS1
11472 AT 2016bdf 1 07:32:10.018 +12:37:19.02 Pan-STARRS1 Pan-STARRS1 PS16bdf PS1 - GPC1 Y Y 19.7405 r-Sloan 2016-02-26 09:18:56 Young
1550 2016-03-14 19:37:15 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 07:32:10.018 +12:37:19.02 2016-02-26 09:18:56 19.7405 r-Sloan 1 PSN PS16bdf Pan-STARRS1
1738 2016-02-26 09:18:56 19.7405 ABMag r-Sloan PS1_GPC1
11473 AT 2016bdg 1 07:45:29.952 +08:12:08.08 Pan-STARRS1 Pan-STARRS1 PS16bdg PS1 - GPC1 Y Y 20.3798 r-Sloan 2016-02-26 09:25:25 Young
1551 2016-03-14 19:37:17 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 07:45:29.952 +08:12:08.08 2016-02-26 09:25:25 20.3798 r-Sloan 1 PSN PS16bdg Pan-STARRS1
11474 AT 2016bdh 1 16:13:13.811 +40:41:14.87 Pan-STARRS1 Pan-STARRS1 PS16bdh PS1 - GPC1 Y Y 19.8386 r-Sloan 2016-02-26 14:52:57 Young
1552 2016-03-14 19:37:19 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 16:13:13.811 +40:41:14.87 2016-02-26 14:52:57 19.8386 r-Sloan 1 PSN PS16bdh Pan-STARRS1
11475 AT 2016bdi 1 10:04:24.898 -04:25:19.97 Pan-STARRS1 Pan-STARRS1 PS16bdi PS1 - GPC1 Y Y 20.2642 r-Sloan 2016-02-27 09:42:03 Young
1553 2016-03-14 19:37:21 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:04:24.898 -04:25:19.97 2016-02-27 09:42:03 20.2642 r-Sloan 1 PSN PS16bdi Pan-STARRS1
11476 AT 2016bdj 1 11:31:22.651 +40:08:22.50 Pan-STARRS1 Pan-STARRS1 PS16bdj PS1 - GPC1 Y Y 20.2448 r-Sloan 2016-02-27 12:14:45 Young
1554 2016-03-14 19:37:23 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 11:31:22.651 +40:08:22.50 2016-02-27 12:14:45 20.2448 r-Sloan 1 PSN PS16bdj Pan-STARRS1
11477 AT 2016bdk 1 11:43:48.604 +35:56:46.61 Pan-STARRS1 Pan-STARRS1 PS16bdk PS1 - GPC1 Y Y 20.4947 r-Sloan 2016-02-27 12:22:11 Young
1555 2016-03-14 19:37:25 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 11:43:48.604 +35:56:46.61 2016-02-27 12:22:11 20.4947 r-Sloan 1 PSN PS16bdk Pan-STARRS1
11478 AT 2016bdl 1 08:49:25.341 +09:37:40.32 Pan-STARRS1 Pan-STARRS1 PS16bdl PS1 - GPC1 Y Y 21.3305 w-PS1 2016-02-28 06:25:34 Young
1556 2016-03-14 19:37:27 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:49:25.341 +09:37:40.32 2016-02-28 06:25:34 21.3305 w-PS1 1 PSN PS16bdl Pan-STARRS1
11479 AT 2016bdm 1 09:14:30.649 +11:07:39.11 Pan-STARRS1 Pan-STARRS1 PS16bdm PS1 - GPC1 Y Y 20.8843 w-PS1 2016-02-28 07:33:46 Young
1557 2016-03-14 19:37:29 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 09:14:30.649 +11:07:39.11 2016-02-28 07:33:46 20.8843 w-PS1 1 PSN PS16bdm Pan-STARRS1
11480 AT 2016bdn 1 09:36:13.647 +15:24:19.76 Pan-STARRS1 Pan-STARRS1 PS16bdn PS1 - GPC1 Y Y 21.3446 w-PS1 2016-02-28 07:39:20 Young
1558 2016-03-14 19:37:31 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 09:36:13.647 +15:24:19.76 2016-02-28 07:39:20 21.3446 w-PS1 1 PSN PS16bdn Pan-STARRS1
11481 AT 2016bdo 1 09:45:31.843 +09:46:51.63 Pan-STARRS1 Pan-STARRS1 PS16bdo PS1 - GPC1 Y Y 20.5016 w-PS1 2016-02-28 07:44:01 Young
1559 2016-03-14 19:37:33 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 09:45:31.843 +09:46:51.63 2016-02-28 07:44:01 20.5016 w-PS1 1 PSN PS16bdo Pan-STARRS1
11482 AT 2016bdp 1 09:51:42.020 +16:35:29.24 Pan-STARRS1 Pan-STARRS1 PS16bdp PS1 - GPC1 Y Y 21.3267 w-PS1 2016-02-28 07:57:21 Young
1560 2016-03-14 19:37:35 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 09:51:42.020 +16:35:29.24 2016-02-28 07:57:21 21.3267 w-PS1 1 PSN PS16bdp Pan-STARRS1
11483 AT 2016bdq 1 10:14:28.738 +26:50:13.85 Pan-STARRS1 Pan-STARRS1 PS16bdq PS1 - GPC1 Y Y 20.6198 r-Sloan 2016-02-28 11:48:51 Young
1561 2016-03-14 19:37:38 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:14:28.738 +26:50:13.85 2016-02-28 11:48:51 20.6198 r-Sloan 1 PSN PS16bdq Pan-STARRS1
11484 AT 2016bdr 1 10:18:33.112 -15:14:20.57 Pan-STARRS1 Pan-STARRS1 PS16bdr PS1 - GPC1 Y Y 19.9633 r-Sloan 2016-02-28 10:29:06 Young
1562 2016-03-14 19:37:40 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:18:33.112 -15:14:20.57 2016-02-28 10:29:06 19.9633 r-Sloan 1 PSN PS16bdr Pan-STARRS1
11485 AT 2016bds 1 10:36:11.602 -12:17:55.86 Pan-STARRS1 Pan-STARRS1 PS16bds PS1 - GPC1 Y Y 19.9806 r-Sloan 2016-02-28 10:36:30 Young
1563 2016-03-14 19:37:42 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:36:11.602 -12:17:55.86 2016-02-28 10:36:30 19.9806 r-Sloan 1 PSN PS16bds Pan-STARRS1
11486 AT 2016bdt 1 13:00:59.037 +10:57:09.02 Pan-STARRS1 Pan-STARRS1 PS16bdt PS1 - GPC1 Y Y 19.9474 r-Sloan 2016-02-29 13:22:21 Young
1564 2016-03-14 19:37:44 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 13:00:59.037 +10:57:09.02 2016-02-29 13:22:21 19.9474 r-Sloan 1 PSN PS16bdt Pan-STARRS1
11488 AT 2016bdv 1 13:16:10.519 -01:45:21.76 Pan-STARRS1 Pan-STARRS1 PS16bdv PS1 - GPC1 Y Y 19.937 r-Sloan 2016-03-02 13:07:10 Young
1566 2016-03-14 19:37:50 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 13:16:10.519 -01:45:21.76 2016-03-02 13:07:10 19.937 r-Sloan 1 PSN PS16bdv Pan-STARRS1
1754 2016-03-02 13:07:10 19.937 ABMag r-Sloan PS1_GPC1
11489 AT 2016bdw 1 14:49:01.211 +07:03:16.69 Pan-STARRS1 Pan-STARRS1 PS16bdw PS1 - GPC1 Y Y 19.9795 r-Sloan 2016-03-02 14:21:32 Young
1567 2016-03-14 19:37:52 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 14:49:01.211 +07:03:16.69 2016-03-02 14:21:32 19.9795 r-Sloan 1 PSN PS16bdw Pan-STARRS1
11490 AT 2016bdx 1 08:24:39.623 +19:05:03.83 Pan-STARRS1 Pan-STARRS1 PS16bdx PS1 - GPC1 Y Y 20.7664 w-PS1 2016-03-03 05:45:03 Young
1568 2016-03-14 19:37:54 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:24:39.623 +19:05:03.83 2016-03-03 05:45:03 20.7664 w-PS1 1 PSN PS16bdx Pan-STARRS1
11491 AT 2016bdy 1 09:02:29.680 +24:39:15.67 Pan-STARRS1 Pan-STARRS1 PS16bdy PS1 - GPC1 Y Y 21.7467 w-PS1 2016-03-03 06:48:22 Young
1569 2016-03-14 19:37:57 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 09:02:29.680 +24:39:15.67 2016-03-03 06:48:22 21.7467 w-PS1 1 PSN PS16bdy Pan-STARRS1
11492 AT 2016bdz 1 14:01:48.796 -00:24:57.29 Pan-STARRS1 Pan-STARRS1 PS16bdz PS1 - GPC1 Y Y 20.1967 r-Sloan 2016-03-03 15:09:29 Young
1570 2016-03-14 19:37:59 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 14:01:48.796 -00:24:57.29 2016-03-03 15:09:29 20.1967 r-Sloan 1 PSN PS16bdz Pan-STARRS1
11493 AT 2016bea 1 15:26:07.003 -05:53:04.10 Pan-STARRS1 Pan-STARRS1 PS16beb PS1 - GPC1 Y Y 20.3959 r-Sloan 2016-03-03 13:07:46 Young
1571 2016-03-14 19:38:01 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 15:26:07.003 -05:53:04.10 2016-03-03 13:07:46 20.3959 r-Sloan 1 PSN PS16beb Pan-STARRS1
11494 AT 2016beb 1 07:53:00.052 +32:48:21.59 Pan-STARRS1 Pan-STARRS1 PS16bec PS1 - GPC1 Y Y 20.8761 w-PS1 2016-03-04 05:39:15 Young
1572 2016-03-14 19:38:03 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 07:53:00.052 +32:48:21.59 2016-03-04 05:39:15 20.8761 w-PS1 1 PSN PS16bec Pan-STARRS1
11495 AT 2016bec 1 08:40:42.949 +04:59:07.32 Pan-STARRS1 Pan-STARRS1 PS16bed PS1 - GPC1 Y Y 22.0265 w-PS1 2016-03-04 07:06:55 Young
1573 2016-03-14 19:38:06 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:40:42.949 +04:59:07.32 2016-03-04 07:06:55 22.0265 w-PS1 1 PSN PS16bed Pan-STARRS1
11496 AT 2016bed 1 08:57:15.381 +02:25:15.65 Pan-STARRS1 Pan-STARRS1 PS16bef PS1 - GPC1 Y Y 21.9317 w-PS1 2016-03-04 07:13:50 Young
1574 2016-03-14 19:38:08 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:57:15.381 +02:25:15.65 2016-03-04 07:13:50 21.9317 w-PS1 1 PSN PS16bef Pan-STARRS1
11497 AT 2016bee 1 08:57:20.733 +25:30:48.12 Pan-STARRS1 Pan-STARRS1 PS16beg PS1 - GPC1 Y Y 21.4378 w-PS1 2016-03-04 05:55:58 Young
1575 2016-03-14 19:38:10 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:57:20.733 +25:30:48.12 2016-03-04 05:55:58 21.4378 w-PS1 1 PSN PS16beg Pan-STARRS1
11498 AT 2016bef 1 08:58:57.479 +26:04:46.81 Pan-STARRS1 Pan-STARRS1 PS16beh PS1 - GPC1 Y Y 20.7547 w-PS1 2016-03-04 05:55:58 Young
1576 2016-03-14 19:38:12 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 08:58:57.479 +26:04:46.81 2016-03-04 05:55:58 20.7547 w-PS1 1 PSN PS16beh Pan-STARRS1
11499 AT 2016beg 1 09:15:04.604 -00:52:35.48 Pan-STARRS1 Pan-STARRS1 PS16bei PS1 - GPC1 Y Y 21.7742 w-PS1 2016-03-04 08:12:55 Young
1577 2016-03-14 19:38:15 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 09:15:04.604 -00:52:35.48 2016-03-04 08:12:55 21.7742 w-PS1 1 PSN PS16bei Pan-STARRS1
11500 AT 2016beh 1 05:18:12.483 +03:59:30.91 Pan-STARRS1 Pan-STARRS1 PS16bej PS1 - GPC1 Y Y 21.1512 w-PS1 2016-03-05 06:07:18 Young
1578 2016-03-14 19:38:17 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 05:18:12.483 +03:59:30.91 2016-03-05 06:07:18 21.1512 w-PS1 1 PSN PS16bej Pan-STARRS1
11501 AT 2016bei 1 13:58:46.531 -09:40:45.38 Pan-STARRS1 Pan-STARRS1 PS16bek PS1 - GPC1 Y Y 21.3719 w-PS1 2016-03-04 12:57:15 Young
1579 2016-03-14 19:38:19 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 13:58:46.531 -09:40:45.38 2016-03-04 12:57:15 21.3719 w-PS1 1 PSN PS16bek Pan-STARRS1
11502 AT 2016bej 1 15:22:51.568 +05:43:57.29 Pan-STARRS1 Pan-STARRS1 PS16bel PS1 - GPC1 Y Y 20.4523 w-PS1 2016-03-05 13:07:54 Young
1580 2016-03-14 19:38:22 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 15:22:51.568 +05:43:57.29 2016-03-05 13:07:54 20.4523 w-PS1 1 PSN PS16bel Pan-STARRS1
11503 AT 2016bek 1 10:11:07.409 -04:03:06.15 Pan-STARRS1 Pan-STARRS1 PS16bem PS1 - GPC1 Y Y 20.8825 w-PS1 2016-03-06 08:58:55 Young
1581 2016-03-14 19:38:25 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:11:07.409 -04:03:06.15 2016-03-06 08:58:55 20.8825 w-PS1 1 PSN PS16bem Pan-STARRS1
11504 AT 2016bel 1 10:14:26.205 +16:40:56.95 Pan-STARRS1 Pan-STARRS1 PS16ben PS1 - GPC1 Y Y 19.9715 w-PS1 2016-03-06 07:50:53 Young
1582 2016-03-14 19:38:27 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:14:26.205 +16:40:56.95 2016-03-06 07:50:53 19.9715 w-PS1 1 PSN PS16ben Pan-STARRS1
11505 AT 2016bem 1 10:38:46.165 +11:23:50.48 Pan-STARRS1 Pan-STARRS1 PS16bep PS1 - GPC1 Y Y 20.1159 w-PS1 2016-03-06 07:55:31 Young
1583 2016-03-14 19:38:29 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:38:46.165 +11:23:50.48 2016-03-06 07:55:31 20.1159 w-PS1 1 PSN PS16bep Pan-STARRS1
11506 AT 2016ben 1 10:52:33.988 +14:50:21.86 Pan-STARRS1 Pan-STARRS1 PS16beq PS1 - GPC1 Y Y 22.0026 w-PS1 2016-03-06 08:00:08 Young
1584 2016-03-14 19:38:32 David Young K. C. Chambers, M. E. Huber, H. Flewelling, E. A. Magnier, N. Primak, A. Schultz, (IfA, University of Hawaii), S. J. Smartt, K. W. Smith, (Queen's University Belfast), J. Tonry, C. Waters, (IfA, University of Hawaii) D. E. Wright, D. R. Young (Queen's University Belfast) Pan-STARRS1 10:52:33.988 +14:50:21.86 2016-03-06 08:00:08 22.0026 w-PS1 1 PSN PS16beq Pan-STARRS1
|
cc/2019-30/en_middle_0053.json.gz/line4597
|
__label__cc
| 0.713899
| 0.286101
|
Trespassers (album)
In the law of tort, property, and criminal law a trespasser is a person who commits the act of trespassing on a property, that is, without the permission of the owner. Being present on land as a trespasser thereto creates liability in the trespasser, so long as the trespass is intentional. At the same time, the status of a visitor as a trespasser (as opposed to an invitee or a licensee) defines the legal rights of the visitor if they are injured due to the negligence of the property owner.
Trespassing as a tort
The tort of trespass to land requires an intentional physical invasion of the plaintiff's real property by the defendant or a refusal to leave when ordered to leave.
Intent required
For example, a person walking in a public park who trips and rolls down a hill will not be liable for trespass just because the bottom of the hill is on private land.
Physical invasion
The trespasser need not enter the land in person. Throwing any physical object onto the land of another - a rock, a clod of dirt, a bucket of water - is a trespass. Indeed, if A and B are standing next to C's land, and A pushes B onto the land without entering it himself, it is A (and not B, who did not intend to enter that space) who is liable for the trespass to C's land. There must be some physical entry, however. Causing noise, light, odors, or smoke to enter the land of another is not a trespass, but is instead a different tort, nuisance.
This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Trespasser
Trespassers is the sixth album by the Danish band Kashmir. It was released on 1 February 2010.
"Mouthful of Wasps" – 5:16
"Intruder" – 4:24
"Mantaray" – 4:10
"Pallas Athena" – 2:28
"Still Boy" – 5:12
"Bewildered in the City" – 6:29
"Pursuit of Misery" – 4:07
"Time Has Deserted Us" – 4:04
"Danger Bear" – 3:40
"The Indian (That Dwells in This Chest)" – 5:23
"Track 11" - Hidden Track - 7:01
"Mouthful of Wasps" (30 November 2009)
"Still Boy"
"Pursuit of Misery"
"Bewildered in the City"
This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Trespassers_(album)
Trespassers, Kashmir
A list of things that should be said
now weighs a forest on your tongue
and all your virtues safely kept
in vaseline have slipped bygone.
Put it on the vast choir sings
let the Broncos run wild again
wipe it off that purgatory grin
because it's all too convincing.
Show me that it's easy
say that you are in need of me
don't talk of the costs
with a mouthful of wasps
time is up so let them all fly
up in the sky.
Yes, I was taught among your kind
by drilling tunnels towards the core
in through the multi detailed mind
where rich and simple is at war.
Put it on the choir sings
wipe it off that diabolic grin
'cause it's so contrived
and it frightens me.
Show me that you're easy
say that you believe in me
don't act out your frost
time is up so them all fly
Behind those weary eyes
some broken story hides
and you have to show
before it strikes its roots and strangles everything.
Latest News for: trespassers
Chloe Grace's alleged stalker faces new charges for trespassing
Daily American 15 Jul 2019
An obsessed fan who jumped the gate at Chloe Grace Moretz's family home has been hit with four trespassing charges but dismissed for stalking ... ....
Police Briefs - Man arrested for trespassing
Fremont Tribune 15 Jul 2019
Marcum, 20, of Fremont on suspicion of First Degree Criminal Trespassing after he entered a residence in the 1000 block of north Broad Street after having been previously notified that ......
Chloe Grace Moretz’s alleged stalker has been hit with four trespassing charges
Chloe Grace Moretz’s alleged stalker has been hit with four trespassing charges ... However, now TMZ reports that he has been let off the hook with regards to stalking and now faces four counts of misdemeanour trespassing, two per each day he forced his way into the front of her family’s home....
Mumbai's Filmcity earns Rs 7.55 cr from visitors and Rs 9.29 lakh fine from trespassers in 5 years
Bollywood Life 15 Jul 2019
The Maharashtra Film, Stage and Cultural Development Corporation Limited (MFSCDCL), which operates the Filmcity here, earned Rs 7.55 crore from visitors as entry fee and Rs 9.29 lakh fine from trespassers in last five years, according to official figures ... trespassers in 5 years....
Trespasser on Caltrain Tracks in San Bruno Killed by Train
Northbound train No. 381 hit a person at 6.35 p.m. on the tracks near Scott Street....
Man charged with trespassing at Burger King: Avon Lake police blotter
Cleveland 13 Jul 2019
AVON LAKE , Ohio – Criminal trespassing, Avon Belden Road. On July 7, the manager of Burger King reported a man on the property after being told twice by Avon Lake police that he was not allowed on site because he causes disturbances. The 23-year-old Avon Lake man was arrested and charged with criminal trespassing. Assault, Moore Road ... View Comments ... ....
Sheriff’s Office K-9 finds hot springs trespassers: The Record for Thursday, July 11, 2019
Steamboat Pilot 13 Jul 2019
Thursday July 11, 2019. 12.42 a.m. Steamboat Springs Police Department officers were called about a bear that broke into a van, then a dumpster, in the 1500 block of Mid Valley Drive. 1.26 a.m. Police received a report of theft from the 10 block of East Maple Street ... 1.58 a.m ... They were OK, just intoxicated. 7.03 a.m ... They received a trespass warning ... ....
Trespassing call leads to multiple charges in Cherokee County
The Gadsden Times 12 Jul 2019
A trespassing call led to Cherokee County deputies arresting a man sought by Rome, Georgia, authorities according to Sheriff Jeff Shaver.Deputies got the call Thursday reported a man trespassing on property in the Gaylesville area ... Bo Jolly and Deputy Will Bailey approached, but after a quick foot chase they apprehended the man. [...] ... ....
Former Idaho GOP chairman faces a new unlawful entry charge in addition to stalking, trespass
Idaho Statesman 12 Jul 2019
Former Idaho GOP chairman and lobbyist ......
Blotter: Trespass, larceny charges in Norwalk
The Hour 12 Jul 2019
July 11. A 65-year-old Glasser Street man was charged with simple trespass and second-degree breach of peace. He was given a court date of July 25. An 18-year-old Stamford woman was charged with violation of a protective order. She was held on $100 bond and given a court date of July 12 ... He was given a court date of July 18 ... ....
Creech Air Force Base warns against trespassing on firing range
Review Journal 11 Jul 2019
Gunfire training at the the 799th Security Forces Squadron firing range complex are conducted day and night, and trespassing on the property is illegal and dangerous, a Creech Air Force Base spokeswoman said ... ....
Reviews for Polly McIntosh’s ‘Darlin’’; ‘Trespassers,’ ‘Saving Zoë’ and more
Daily Press 11 Jul 2019
'Darlin' '. In 2011, Pollyanna McIntosh played the title role in writer-director Lucky McKee’s “The Woman” (co-written with Jack Ketchum), a controversial horror film about a feral cannibal abducted by a respected attorney, who abuses her in front of his family. McIntosh had played the same character ... ....
Bonfires: Council in trespass warning over Avoniel
BBC News 11 Jul 2019
Anyone in the grounds of Avoniel Leisure Centre will be trespassing, warns Belfast City Council ... ....
|
cc/2019-30/en_middle_0053.json.gz/line4599
|
__label__cc
| 0.52229
| 0.47771
|
2019 Inkwell Awards Winners Announced
The 2019 Inkwell Winners
2019 marks the 11th year of the Inkwell Awards. The awards look to put a spotlight on the great comic book inkers of the year and celebrate past inkers. Inkers are able to send in what they considered their best work to be nominated for a category. It was also noted that “Nominators could also submit their own nominees and include inkers from both sources. For the first time, the same candidate could no longer be nominated for both the Favorite Inker and the Props categories.” The Inkwell Awards celebrates five different categories and all the work must be dated in 2018. So without further ado here are the winners!
For the Favorite Inker Category, Walden Wong took home the most votes with 48%; Wong also took home the award for most adaptable inker with 50% of the votes. Following that was the PROPS award or inker deserving more attention; Elisabetta D’Amico took home the award with 30% of the votes. Then to the S.P.A.M.I. (Small Press and Mainstream Independent) category; Stefano Gaudiano took home the top prize with 37% of the votes. Now the legendary Lee Weeks was the winner in the All-In-One (penciling and inking together) category with 31% of the votes in a tight race.
There were some great artists who barely missed out. Liam Sharp and Joelle Jones were both on the cusp of winning.
The Stacey Aragon Special Recognition Award (SASRA) went to Jack Davis and Marie Severin. Last but not least, inducted into The Joe Sinnott Hall of Fame were Neal Adams and Dan Adkins.
Inking
Inking is a tough job and it is great that these creators are getting some good recognition. Is there anybody you would have nominated for an Inkwell Award in 2018? How about right now? We are almost mid-way through 2019—who is standing out in comic books? Who would you possibly nominate for their 2019 work? Who is a legend that deserves an award? Let us know in the comments.
Tags2019 Inkwell Awards comic book news comics Dan Adkins Elisabetta D'Amico inker Inkwell Awards jack davis Joëlle Jones Lee Weeks Liam Sharp Marie Severin Neal Adams Stefano Gaudiano Walden Wong
Has DC Comics Canceled MAD Magazine?
Earlier this week Editors at MAD Magazine tweeted out that the satirical...
Sea of Stars #1 has space truckers, family dynamics (and issues), alien...
Review – Crowded #7 (Image Comics)
Charlie is still not learning from past mistakes, and Vita is still doing her...
8 Strongest Female Characters in DC Comics
Interview – Kirsten Thompson Talks I Am Hexed #2
|
cc/2019-30/en_middle_0053.json.gz/line4601
|
__label__cc
| 0.748248
| 0.251752
|
Workday done
We have quit our jobs and sold our house. Here you can follow us on our travels.
The Legion of Legends
ES has a brother who is a professional impersonator. He makes a living looking and acting like and being Wilhelm Tell. Thru him we spent a summer weekend touring central Switzerland with Robin Hood, The Rat-catcher from Hameln and no less than two Sheriffs of Nottingham.
The event was the annual gathering of The Legion of Legends, where three main European legendary characters turn into flesh and blood, sponsored by their various home-towns and tourist offices. They have been touring Germany and England in 2015 and 2016, and this year they did a tour of central Switzerland.
The complete party, with the Nasty Sheriff trying to put Robin to the sword, and the Nice Sheriff screaming her head off!
ES and DHH were not part of the show because we are legends, but because we had volunteered to make a picture website of the travelling circus. We had a couple of long days, but also a lot of laughs. We spent time with Wilhelm Tell making his own crossbows in his own medieval carpenter shop, we had the Nasty Sheriff of Nottingham juggling knives and bottles and pretending to behead people, we had both sheriffs feeding deer in the Goldau zoo and then Robin shooting at them with his bow and arrow. He did not dare to kill them, though. He pretended he missed on purpose. He was never afraid of the sheriff of course, but he did have some respect for the Swiss wildlife authorities. Deep down he is a softie, he just does not want the sheriffs to know.
The Pied Piper of Hameln walked about in a jesters costume with a dead rat in his belt. It was probably the only rat the rat-catcher ever caught. In the original story he kills more than just rats, however, he also disposes of all the town’s young children. We never saw our own Rattenfanger do that. On the other hand… all the children who hung around the travelling circus of legend as we moved from town to town… we never saw any of those kids more than once when we think of it…
Visiting Schuler, a local vine distributor.
As Robin has his nasty sheriff to fight, Wilhelm Tell also has his archenemy, the cruel Herr Gessler, the nobleman who forces Tell to shoot the apple off the head of his own son. He was also there of course. In our party Gessler was also the organiser of the whole tour, the guy who got the local tourist authorities hooked on the project and who paid part of the show from his own pocket. He organized our hotel, our wining and dining, our transport and our museum-visits. We did our best to dislike him as we should, but that was not so easy either. You do not bite the hand that gives you beer.
Robin and his two sheriffs.
Last, but very much not least, we spent three days with the Nice Sheriff of Nottingham. Unlike the Nasty one, the Nice Sheriff is a modern invention. The good city of Nottingham has actually made the honourable sheriff an official position, held this year by a politician from the local council. While the Nasty Sheriff sneers and waves his knives about and does his best to look evil, the Nice Sheriff was there to make friends and promote the city and lighten the party up a bit. Which she did. Maybe we go and see her when we get to England in the fall. That is the dangerous thing when you are nice to people, you might make friends that you are not able to get rid of later.
When he did not catch rats, which he actually never did, the rat-catcher enjoyed a glass of wine.
Herr Gessler, the evil Austrian, the enemy of Wilhelm Tell.
The Nasty Sheriff.
Wilhelm Tell in person, also known as The Brother.
The Swiss Guards were hired, even though there was no pope to protect.
The Nice Sheriff of Nottingham.
The rat-catcher, sporting the only rat he ever caught.
The rat-catcher met these two children on the steam boat on the Lake of Lucerne. Come to think of it, we never saw them again after this photo was taken…
The Nasty Sheriff feeding sleeping pills to the deer in the zoo. The idea was to make it easy for Robin to shoot them, and later make sure he was arrested.
Robin taking aim. He later claimed he missed on purpose.
The group outside the Swiss Museum of the Swiss Charters of Confederation in Schwyz. The alphorns were not part of our circus, they were there as part of the local scenery.
With the alphorn drowning the sound of the Piper, the rats in Schwyz were safe for a few minutes.
In the Schwyz Town Hall.
The legends in open air.
The Nasty Sheriff ready to make some heads roll.
The Schwurplatz on the famous Rutli by the Lake of Lucerne is where the oath of the first Swiss federation was taken in 1291 – they say.
One for all and all for one – the legends retaking the oath.
Wilhelm Tell making sure the enemies of the federation stay away.
The Swiss Rote Brigade followed the legends on the tour, protecting them from tourists, fans and enemies.
The Piper playing in front of the famous bridge of Luzern.
The Nasty Sheriff and the Pied Piper.
William Tell’s companion announcing the legend’s arrival.
Nobody can really be trusted, can they? As soon as Robin turned his back, Tell befriended the Nasty Sheriff.
The Nasty Sheriff chopping heads of tourists on a train ride up mount Rigi.
Wilhelm Tell showing the group his workshop in the village of Gersau.
The tour is over and the Red Brigades can celebrate with a beer or ten.
ES celebrating a nice weekend with Tell’s companion Hedwig.
For more pictures of the Legends’ weekend in Switzerland visit our Smugmug Site.
GalleryPosted in EuropeBy DHH4 Comments
4 thoughts on “The Legion of Legends”
thepiedpiper1284 says:
Did you mention http://www.legionoflegends.org ? If not, then I can. 😀
Pingback: The Legion of Legends Report – Legion Of Legends
#meinniedersachsen
Pitched us to a festival organizer in France. You never can tell, Tell.
← Norwegian Wool
Same procedure as last year, James →
About us – ES + DHH
Hard Brexit and crowded buses
We are allowed some luck
Ein ganz gewöhnlicher Samstag
Geriatrica revisited!
the #1 Itinerary on Hard Brexit and crowded buses
heatherlyw on Hard Brexit and crowded buses
thepiedpiper1284 on The Legion of Legends
The Legion of Legend… on The Legion of Legends
|
cc/2019-30/en_middle_0053.json.gz/line4604
|
__label__wiki
| 0.680437
| 0.680437
|
Westleigh-Feindel & Rand Families in Manie
Entries: 21542 Updated: 2016-02-19 21:39:05 UTC (Fri) Owner: Edward Westleigh
Essex, William b: 1490
Essex, Winifred b: 1500 in Mount Edgcomb, Cornwall, England
Esterbrooks, Anna
Estes, Alfred b: 6 Apr 1818
Estes, Alice b: 6 Jul 1825
Estes, Alvah b: 19 Mar 1808
Estes, Amanda
Estes, Anna
Estes, Arabell b: 22 Jun 1839
Estes, Augustus b: 21 Mar 1834
Estes, Benjamin b: 2 Jul 1807 d: 1886
Estes, Benjamin F. b: 1858 in Bethel, Oxford County, Maine, United States Of America d: 1921 in Los Angeles, CA
Estes, Betsey b: 28 Dec 1792 in Bethel, Oxford County, Maine, United States Of America d: 14 Nov 1882 in East Bethel Cemetary
Estes, Betsey b: 23 Apr 1794
Estes, Catherine b: 19 Jul 1814
Estes, Charles Francis b: 12 Aug 1831
Estes, Charles Shapleigh b: 8 Nov 1830
Estes, Daniel b: 27 Dec 1801 in Bethel, Oxford County, Maine, United States Of America
Estes, Dolly b: 15 Oct 1805
Estes, Dolly b: 3 Nov 1835
Estes, Edmond b: 22 Sep 1797 in Bethel, Oxford County, Maine, United States Of America d: 1874
Estes, Eli b: 11 May 1797 in Bethel, Oxford County, Maine, United States Of America d: 10 Aug 1848 in Bethel, Oxford County, Maine, United States Of America
Estes, Eliza Ann b: 26 Apr 1820
Estes, Elvira b: +/- 1808 in Bethel, Oxford County, Maine, United States Of America
Estes, Enoch b: 2 Jun 1791
Estes, Eunice b: 21 Jan 1833
Estes, Hannah b: 26 Oct 1838
Estes, Hannibal K b: 14 Dec 1836
Estes, Hiram Cushman b: 27 Jul 1823
Estes, Hulda Andrews b: 20 Dec 1825 d: 11 Sep 1829
Estes, Infant b: 26 Aug 1814 d: 21 Sep 1814
Estes, James b: 2 Jan 1800 d: 1874
Estes, James Henry b: 7 Dec 1827
Estes, Jedediah b: 1 Apr 1815
Estes, Joel b: 8 Oct 1793 in Bethel, Oxford County, Maine, United States Of America d: 2 Apr 1803 in Bethel, Oxford County, Maine, United States Of America
Estes, Joel b: 28 Jul 1810
Estes, John b: 2 Feb 1795 in Bethel, Oxford County, Maine, United States Of America d: in Greenwood, Oxford Co., ME
Estes, Joseph b: in Rockland, Mass
Estes, Joseph b: 8 Mar 1804 in Bethel, Oxford County, Maine, United States Of America d: 19 Sep 1836 in Bethel, Oxford County, Maine, United States Of America
Estes, Joshua B. b: 9 Jul 1843
Estes, Louisa b: 18 Jun 1811 in Bethel, Oxford County, Maine, United States Of America
Estes, Lyman b: 23 Jan 1826
Estes, Mary Ann b: 23 Jul 1829
Estes, Mary Jane b: 12 May 1819
Estes, Masell Ann b: 28 Apr 1837
Estes, Molly b: 21 Nov 1799 in Bethel, Oxford County, Maine, United States Of America d: 6 Aug 1872 in Bethel, Oxford County, Maine, United States Of America
Estes, Moses b: 25 Apr 1817
Estes, Nathan C b: 31 Mar 1818
Estes, Nathaniel S. b: 14 May 1839
Estes, O'Neil Jewett b: 3 Jan 1836
Estes, Peter b: 10 Mar 1795 in Bethel, Oxford County, Maine, United States Of America d: 7 Mar 1871 in Bethel, Oxford County, Maine, United States Of America
Estes, Phebe
Estes, Rebecca
Estes, Relief
Estes, Richard b: 7 Sep 1769 in Berwick, York County, Maine, United States Of America d: 1858 in Probably Oxford, County, Maine
Estes, Ruben b: 1829 d: BET and 1919 1853
Estes, Samuel Sanford b: 30 Aug 1828 in Bethel, Oxford County, Maine, United States Of America
Estes, Stephen b: +/- 1765 in Berwick, York County, Maine, United States Of America d: 1858 in Probably Oxford, County, Maine
Estes, Stephen b: 1814
Estes, Sumner b: 11 Jun 1827
Estes, William b: 30 Jan 1792 in Berwick, York County, Maine, United States Of America d: 23 Jun 1850 in Albany, Carroll, New Hampshire
Estey, Aaron b: 16 Feb 1699 in Topsfield, Massachusetts, d: 21 Apr 1783 in Topsfield, Massachusetts,
Estey, Abigail b: 8 Jan 1692 in Topsfield, Essex County, Massachusetts, United States Of America d: 10 Jan 1730 in Topsfield, Essex County, Massachusetts, United States Of America
Estey, Abigail b: Abt 8 Jan 1692 in Massachusetts, United States Of America d: 10 Jan 1730 in Of Smallpox, Topsfield, Massachusetts
Estey, Benjamin b: 29 Apr 1669 in Topsfield, Ma,
Estey, Christopher b: 1552 in Hintlesham, Suffolk, England d: 7 Nov 1621 in Freston Par, Suffolk Co, England
Estey, Hannah b: Aft 1663 in Topsfield, Ma,
Estey, Hannah b: 18 May 1702 in Topsfield, Massachusetts, d: 23 Jun 1743 in Sutton, Worcester Co, MA
Estey, Isaac b: 17 Nov 1627 in Freston, Suffolk, England d: 11 Jun 1712 in Topsfield, Essex County, Massachusetts, United States Of America
Estey, Isaac b: 1662 in Topsfield, Essex, Massachusetts d: Apr 1714 in Lynn, Massachusetts,
Estey, Isaac b: 1662 in Topsfield, Essex County, Massachusetts, United States Of America d: Apr 1714 in Topsfield, Essex County, Massachusetts, United States Of America
Estey, Isaac b: 20 Nov 1696 d: Unknown
Estey, Jacob b: 24 Jan 1674 in Topsfield, Ma,
Estey, Jacob b: 28 Jun 1700 d: Unknown
Estey, Jeffrey b: 1515 in Hintlesham, Suffolk, England d: 6 Dec 1592 in Hintlesham, Suffolk, England
Estey, Jeffrey b: 1 Jul 1586 in Woolverstone Parish in Freston, Suffolk County, England or '87 d: 4 Jan 1657 in Huntington, East Neck, New York, United States of America or Little Neck, Queens
Estey, John b: 2 Jan 1663 in Topsfield, Ma,
Estey, Joseph b: 5 Feb 1658 in Topsfield, Ma,
Estey, Joshua b: 2 Jul 1678 in Topsfield, Ma,
Estey, Mary b: 15 Jan 1692 in Topsfield, Massachusetts, d: Unknown
Estey, Moses b: Bef 6 Sep 1712 d: Unknown
Estey, Rebecca b: Bef 8 Aug 1708 d: Unknown
Estey, Richard b: Bef 7 Apr 1706 in Topsfield, Essex Co, MA d: Abt 1784 in Maugerville, St John River Area, New Brunswick, Canada
Estey, Samuel b: 25 Mar 1672 in Topsfield, Ma,
Estey, Sarah b: 4 Oct 1694 in Topsfield, Essex County, Massachusetts, United States Of America d: 1 Sep 1750 in Topsfield, Essex County, Massachusetts, United States Of America
Estey, Sarah b: 4 Oct 1694 in Topsfield, Massachusetts d: Abt 1750
Estey, William b: 1486 in Abresford, Essex, England d: 1558 in Burstall, Suffolk, England
Esteys, Hannah b: 18 May 1702 d: 23 Jun 1743
Esticker, Elizabeth b: +/- 1587 in Ipswich, Suffolk Co, ENG
Eston, Margaret
Estow, Mary b: Bef 8 Jun 1628 in Ormesby, Norfolkshire, England d: 13 Dec 1708 in Hampton, Rockingham, NH
Estrid b: 979 d: 1035
Esty, Isaac b: 1627 in Suffolk, England d: 1712 in Topsfield, Essex County, Massachusetts, United States Of America
Esty, Sarah b: 30 Jun 1660 in Topsfield, Ma,
Etheridge, Asa b: Abt 1812 in New Hampshire, , d: in Probably Maine, ,
Etton, Isabel b: +/- 1274 in of, Titsey, Surrey, England
Euddigan, Rhydeyrn ap b: 140 in powys, montgomeryshire, wales d: 236
Euddolen, Eudos ap b: 0005 in Siluria, Wales
Eudeyrn, Euddigan ap b: 0090 in Montgomery, Radnorshire, Wales d: 184
Eudos, Brenin Powers Eifydd ap b: 0025
Eure, Muriel Meriall Ewer b: 1557 in Ribston, York, England, Great Britain
|
cc/2019-30/en_middle_0053.json.gz/line4610
|
__label__cc
| 0.717453
| 0.282547
|
The Obligation to Like Books
The obligation to like books is a very real thing in the blogging community: whether those books be written by authors you know personally, or novels by authors from your home country, or because they’ve been hyped up by other prominent readers in the bookish community. But you shouldn’t have to feel obliged to like a particular book.
If there’s one thing I dislike about the bookish community it’s the idea that if you like a certain book, you’re a terrible person, and if you dislike a certain book, you’re also a terrible person. I understand that there are some books that shouldn’t be supported because of their problematic elements, but it’s also not okay to attack those for what they choose to read or not read — like or dislike.
But one of the most challenging aspects of being a reviewer, for me, is writing a negative review for a book I’ve felt obliged to like. I always try to share my honest opinion, even when I feel judged or like writing my thoughts out on my laptop crushes my soul slowly, but that doesn’t mean writing a “bad” review for a book I disliked has gotten any easier over the few years I’ve been blogging.
What prompted my thoughts about this issue was a book I read a couple of months ago — The Undercurrent by Paula Weston. This one is an Australian novel that I’d been hearing phenomenal things about before I had the chance to pick it up, so I was expecting to love it like everyone else had. And plus, it’s #LoveOzYA. There’s nothing I love more than supporting Aussie authors, but sometimes there’s a real obligation to like these books simply because the author was born on, or lives, in the same country as you reside in.
Alas, I failed to fall in love with The Undercurrent. I was expecting a fast-paced action novel with a range of characters I could connect with and a story that I couldn’t help but want to reread. However, The Undercurrent left me feeling very underwhelmed. I struggled to get into the novel in the beginning and I felt that its main downfall was that there was so much going on, and I simply couldn’t seem to follow it 100% of the time. There was so much action and so much conflict between the characters, and it just got exhausting. Even characters must need a tea break from time to time.
Another aspect I found disappointing was that I’d already read a novel where the protagonist has an electrical current running through them and can use it as a weapon, so the overall idea didn’t feel overly unique to me. It was interesting enough, but nothing that kept me captivated or eager to find out what was going to happen in the end. The characters were difficult to connect with because there was so much action consuming the narrative, and while I did enjoy the romantic elements, it wasn’t enough to be a redeeming factor.
Disappointingly, The Undercurrent fell short of my expectations. Perhaps that’s because I felt obliged to like it before I even started reading it, or perhaps it was because I’ve already read a book with similar elements. Too much action and not enough time to connect with each character on an individual basis was the downfall of this novel for me, and I just wish it had chosen to deal with one main issue, instead of trying to combat twenty.
Ultimately, the obligation to like books is a very real thing in the bookish community, and I think it’s something that has to come to an end. Feeling obliged to like certain books is sure to disappoint at least half the time, and readers shouldn’t feel the need to rate books higher just because they’re by a well-known author or by an author from your own country. Moral of the story — reviewers are here to share our honest opinions, so we shouldn’t feel ashamed to do just that. You do you!
Have you ever felt obliged to like a certain book? Do you feel this pressure too? What’s one hyped book you don’t like, or one commonly disliked book that you enjoyed reading? Spill your secrets!
Thanks to Text Publishing Australia for providing me with a copy of this book in exchange for an honest review!
The Undercurrent by Paula Weston
Eighteen-year-old Julianne De Marchi is different. As in: she has an electrical undercurrent beneath her skin that stings and surges like a live wire. She can use it—to spark a fire, maybe even end a life—but she doesn’t understand what it is. And she can barely control it, especially when she’s anxious.
Ryan Walsh was on track for a stellar football career when his knee blew out. Now he’s a soldier—part of an experimental privatised military unit that has identified Jules De Marchi as a threat. Is it because of the weird undercurrent she’s tried so hard to hide? Or because of her mother Angie’s history as an activist against bio-engineering and big business?
It’s no coincidence that Ryan and Jules are in the same place at the same time—he’s under orders to follow her, after all. But then an explosive attack on a city building by an unknown enemy throws them together in the most violent and unexpected way.
Heart of Mist • Ida • Aurora
Graphics used in header sourced from Zzorna Art, Winged Graphics and OpiaDesigns.
book review, books, fiction, LoveOzYA, Reading, writing, YA
Why GENUINE FRAUD was just… meh.
17 thoughts on “The Obligation to Like Books”
Liv Morffew says:
I’ve totally felt that ‘obligation’ to like certain books. It’s frustrating that there’s all of these expectations to like a certain book because of a certain reason (e.g. a book is Love Oz YA therefore all the Aussie readers MUST love it), and it just sucks that it’s a thing that exists.
It’s happened to me heaps of times, more recently when I read ‘Gap Year In Ghost Town’. I felt so bad for giving it a low rating but I just couldn’t gel with it?!
Exactly! I’m glad I’m not the only one who’s felt that obligation. And it’s totally fine to not enjoy books! 💕
It’s Lu Again says:
OH MY GOSH YES THIS IS SO RELATABLE. This is such a good post!
So many times I’ve felt that I had to like a book because everyone else was, or that I couldn’t like a book because sooooo many people didn’t like them. And, I think that this really needs to stop because we all interpret books differently when we read them. I, when I read a book, don’t go into the book looking for problematic factors, or things to hate on, and I only notice bad things if they’re realllllllyyyy visible, like my issues when I read When Dimple Met Rishi. I end up liking so many of my books, and giving them mostly 4/5 /5 stars and then at one stage I even thought that I was liking books too much and giving easy ratings because some people had very little 5 star ratings, (even though I know that 4 stars can be one thing for one person, and a different thing for another). I feel like sometimes I can never win with the community.
Thank you so much – I’m so glad you relate. I couldn’t agree more with you in that different books mean different things to everyone, and the way we read them and how we feel about them is very subjective. Thanks for checking out my post! 💜
lucykc says:
I completely agree with this post! I’ve been thinking about it a lot recently and how it should be okay to be able to like a book is another person doesn’t without being attacked. Even if there are problems with the book, if a person enjoyed the book, they should be allowed to be able to enjoy it.
I felt bad for not enjoying Fangirl by Rainbow Rowell as everyone seems to love it and I felt like I should have too. But there are also books I didn’t enjoy and felt okay with sharing that.
Absolutely! People should know that they are free to like or dislike any book they choose because reading is such a subjective experience. And yes, you should never feel bad about sharing your honest thoughts about things! Thanks for sharing! 💖
I FEEL THIS SO MUCH. Especially when you’ve chatted to an author on Twitter or even in real life, it’s sooooo hard to remain objective. But as a hopefully future author I guess I’d want people to be honest, and a person is always going to be separate from their art. Wonderful discussion!
Exactly! And then I feel really judged or ashamed when sharing my thoughts if I didn’t enjoy their content. I completely agree with you about wanting people to be honest about your own work though! Thanks for reading my post 💕
kozbisa says:
I never feel obligated to like anything, but I have sort of see what you are talking about. Those reviews that begin with apologies or disclaimers that they are going to be the unpopular opinion. I see them a lot when it is attached to issues books, which is probably why I stay away from those kinds of books. I feel if I don’t like it enough, and I come out and say I don’t like it, the community will hang me for it. I may quietly read the book, but I will not share my feelings if they are not totally positive.
It’s great that you don’t feel that obligation a lot of the time! But I definitely understand the hesitancy to share negative thoughts about certain novels, especially when they’re widely praised or enjoyed by many readers. Thanks for reading my post ❤️
I love this post so much! There’s def an obligation to like certain books, especially if they’re overhyped!
Ah thank you so much! Agreed 🙌🏼💜
cherryandjellybeans says:
Yes, I wanted to enjoy ‘Thief of Lies’ and ‘Valentine’ as well as ‘Frogkisser’ recently but they just fell flat for me. Maybe I was too old to enjoy them who knows. But I do understand the pressure of wanting to enjoy books because everyone else does. Great topic
Sadly, I didn’t enjoy those ones as much as I had hoped either! But I guess that’s okay – we can’t enjoy every book we read, and it’s better to be honest about that 💕
KatieLou says:
I went to university and one question a group of us were asked was what is your favourite book. Everyone immediately jumped to the likes of Charles Dickens, Emily Bronte, William Shakespeare, ect it seemed that just because we were studying English, everyone wanted to appear well read in classic literature. It might be some people’s favourite book sure, but I don’t think it everyone’s in the room. It was like no one could say what their favourite books actually were because they felt like they were being judged by the rest of the group.
#relatable
I can definitely relate! I hate how some people are judged based on what they like to read, like some books are higher up on the hierarchy than others. Thanks for sharing! 💖
|
cc/2019-30/en_middle_0053.json.gz/line4614
|
__label__wiki
| 0.699204
| 0.699204
|
Putnam woman sues Huntington Bank for termination, discrimination
By Kyla Asbury | Nov 23, 2010
CHARLESTON -- A Putnam County woman is suing Huntington Bancshares and and employee after she claims she was wrongfully terminated from her employment and discriminated against.
Carolyn Hall began her employment with the defendant in September 1999, where she eventually became the vice president of regional marketing before her employment was terminated on Nov. 17, 2009, according to a complaint filed Nov. 3 in Kanawha Circuit Court.
Hall claims she worked directly under Clayton W. Rice, who was Huntington Bancshares' president at its Clarksburg location.
From Aug. 20, 2009, until Nov. 17, 2009, Hall was supervised by Rice and was "denigrated, intimidated and otherwise forced to remain in a hostile work environment," according to the suit.
Hall claims Rice requested her to have lunch catered for the monthly management meeting in Charleston and that she initiated arrangements through a local caterer, but jokingly advised Rice's secretary that "she was '... not his gopher.'"
Rice also subjected Hall to listen to voicemail messages on his cell phone containing inappropriate and offensive language, according to the suit.
Hall claims she was terminated in retaliation for the Aug. 20, 2009, corporate management team meeting held in Morgantown when regional employee morale issues were raised, causing Rice to appear in a negative light for which he "unfairly, inappropriately and without reason" blamed her.
She claims her employment was terminated because of her gender and age and "in retaliation for knowledge possessed by plaintiff of defendant Rice's misuse of company property."
Hall is seeking compensatory and punitive damages. She is being represented by Scott H. Kaminski.
The case has been assigned to Circuit Judge James C. Stucky.
Kanawha Circuit Court case number: 10-C-1964
|
cc/2019-30/en_middle_0053.json.gz/line4616
|
__label__cc
| 0.69227
| 0.30773
|
High Voltage: An Up to 99% Efficiency Buck-Boost Controller from Linear Technology
March 09, 2018 by Nick Davis
A four-switch DC/DC controller that operates from input voltages above, below, or equal to the regulated output voltage.
Linear Technology, now part of Analog Devices, has announced the LTC3777, which is a 48-pin, high performance, four-switch buck-boost switching regulator controller that operates from input voltages above, below, or equal to the output voltage, hence the term buck-boost.
According to its datasheet, this controller uses a proprietary current mode control architecture for achieving constant frequency in buck, boost, or buck-boost modes of operation. And while many external components, both active and passive, are required (see the figure below), perhaps that's a small price to pay given all the features that this IC offers; we'll discuss some of the features below.
The LTC3777 requires many external components. This typical application circuit is from the datasheet (PDF).
High Voltage: At 150 V, They Aren't Kidding
Depending on the choice of external components, this device is able to generate an output voltage ranging from 1.2 V to 150 V from an input voltage range of 4.5 V to 150 V (see the figure below). However, if your design calls for an input voltage of less than 4.5 V, don’t give up on this part just yet, because note 4 (see the figure below) tells us that operation from an input voltage lower than 4.5 V is possible when the IC is biased from an auxiliary supply through the EXTVCC pin.
The LTC3777 offers a wide VIN and VOUT voltage range, up to 150 V max. Table taken from the datasheet (PDF).
Seriously High Efficiency
According to the datasheet section entitled Integrated Switching Bias Supply, achieving high-efficiency levels across a wide range of load currents is made possible, in part, by the integrated switching bias supply, which is a synchronous step-down regulator with internal power switches that utilize "burst mode" control. Burst mode, which as the name implies uses short "burst" cycles, incorporates sleep cycles, during which the power switches are turned off and the load current is supplied by the output capacitor; sleep-cycle operation requires a mere 12 µA of supply current.
In the figure below, Linear Tech shows us a plot of the IC's efficiency—which looks to be a bit over 99%, say 99.2%—along with a plot of the IC's power loss. I personally have not seen power loss displayed like this before (i.e., together with efficiency), and I wonder what value this power loss information offers above and beyond the efficiency plot.
Do you have experiences to share where this type of power loss information has proven useful? If so, please pass along the details in the comments section.
Power loss (for 480 W output power) and efficiency, from the datasheet.
The figure below shows us a circuit for achieving a 99% efficient, 480 W, 48 V output converter. So, if your own design requirements meet the specs of this example, then perhaps half your design challenge is complete since Linear Tech has even provided part numbers for a few of the components.
An example implementation, from the datasheet (PDF).
Some Help for the Designer...
This IC certainly won’t be as easy to implement as numerous other DC/DC converters that require few external components. Fortunately, to help designers with this challenge, Linear Tech has provided—within the datasheet—sixteen pages (pages 20 to 36) of application information, tips, hints, and suggestions: selection of components (such as MOSFETs, inductors, and diodes), adjusting the overvoltage and undervoltage lockout settings, checking the IC's transient response, and so on. They even provide a PCB layout checklist. And Linear Tech would probably be happy to assist you further if you were to kindly reach out to them.
Before we finish up, it’s worthwhile to say a few words about datasheet quality. Semiconductor companies are publishing some mediocre datasheets these days, and it is greatly appreciated when time is taken to produce clear, comprehensive product literature that goes the extra mile in attempting to help the engineer understand and successfully implement an IC. This Linear Tech document certainly represents the higher-quality end of the datasheet spectrum: example circuits, six pages of multicolored performance plots, a carefully drawn block diagram showing the internal functionality, timing diagrams, the extensive applications information mentioned above…. Nicely done, Linear Tech.
Have you had an opportunity to use this new buck-boost controller in any designs? If so, leave a comment and tell us about your experiences.
high voltage switching regulator controller linear tech dc-dc converter
Working with Fluctuating Input Supplies: A New Tiny DC/DC Buck Regulator from Linear Technology
A new, smaller, and more versatile DC/DC step-down voltage regulator that's designed for noisier applications such as avionics, factory...
An Integrated High-Current Power Module: 0.5 to 2 Volt at 35 Amps from Texas Instruments
Texas Instruments has released a fixed-frequency step-down power module that delivers up to 35 Amps at output voltages ranging from 0.5 to 2...
Intel’s Response to ARM Servers: Xeon D Processors with a Twist
Intel Xeon D processors will now contain FPGAs, which directly combats the upcoming ARM-based server-grade processors.
Dylan Wadler
Managing USB Type-C Power: A New USB Power Delivery Controller for Sink Devices from STMicro
This article takes a look at STUSB4500 which is a standalone USB Power Delivery controller from STMicroelectronics.
Steve Arar
|
cc/2019-30/en_middle_0053.json.gz/line4618
|
__label__wiki
| 0.942913
| 0.942913
|
Boeing Guidance on 737 Max Stall Protection System Under Fire
by Gregory Polek
- November 13, 2018, 9:45 AM
The Boeing 737 Max 8 features a stall protection system that differs in design from that of the narrowbody family's earlier iteration. (Photo: Boeing)
Boeing failed to communicate with 737 Max operators new procedures for addressing cases in which the airplane’s automatic stall prevention system commands the nose of the airplane downward, potentially resulting the kind of steep dive that appears to have led to the fatal crash of Lion Air Flight 610, according to pilot union officials quoted by the Wall Street Journal.
Meant to improve pitch response at high angles of attack and prevent pilots from raising the airplane’s nose too high, the maneuvering characteristics augmentation system (MCAS) in the 737 Max 8 and Max 9 does not appear in the 737 NG. Engineers made the change to address differing stall characteristics in the Max resulting from its larger and heavier CFM Leap-1B engines. MCAS can, however, force the airplane into a dive under circumstances such as faulty inputs from its angle of attack sensors, potentially leading to a crash, according to an emergency airworthiness directive issued by the FAA.
The November 7 AD required a revision to the chapters in the airplane flight manual dedicated to certificate limitations and operating procedures for addressing runaway stabilizer. It also highlighted the procedures to follow in the event of runaway horizontal trim caused by faulty angle-of-attack inputs to the airplane’s flight control system. According to the AD, analysis performed by Boeing showed the defect could lead to repeated nose-down trim commands of the horizontal stabilizer, thereby compromising aircraft controllability and leading to excessive nose-down attitude, “significant” altitude loss, and, ultimately, a crash.
“We are issuing this AD to address this potential resulting nose-down trim, which could cause the flight crew to have difficulty controlling the airplane, and lead to excessive nose-down attitude, significant altitude loss, and possible impact with terrain,” said the AD.
The directive came a day after Boeing issued an operations manual bulletin in response to investigators’ findings that the Lion Air 737 Max 8 that crashed into the Java Sea on October 29 experienced erroneous input from one of the sensors. The Boeing bulletin directed 737 Max operators to follow existing procedures to address circumstances of false input from the airplane’s angle of attack (AOA) sensors.
For its part, the FAA referred AIN to the AD when asked about any possible investigation into whether Boeing improperly omitted MCAS information from airplane flight manuals. “The FAA will take further action if findings from the accident investigation warrant,” said an agency spokesman. “We will not provide further comment on any aspect of the investigation while it remains open.”
Boeing expressed its confidence in the safety of the 737 Max and issued its condolences to the families of the 189 people who died in the Lion Air crash. "We are taking every measure to fully understand all aspects of this incident, working closely with the investigating team and all regulatory authorities involved," it added.
For operators, part of the appeal of the Max centered on the ease with which NG pilots could transition to the new model with minimal training differences training and no additional simulator time. In fact, the latest revision of the FAA’s Flight Standardization Board Report for the Boeing 737 family, dated October 17, does not call for any differences training related to the MCAS.
Meanwhile, Indonesian authorities continue their probe into the October 29 crash that killed 189 people. Search teams found the airplane’s flight data recorder early this month, and the device contained more than 1,790 parameters spanning 19 flights over some 69 hours. Despite incurring heavy damage due to the force of impact, the FDR’s data recording module remained operable, allowing investigators to confirm the airspeed indicator had malfunctioned on four separate flights.
However, divers have yet to recover the cockpit voice recorder (CVR), believed embedded in the muddy seabed, northeast of Jakarta, where the 737 Max 8 crashed 13 minutes into its flight. On November 5, navy divers recovered the emergency locator transmitter from a depth of 98 feet. Searchers have also retrieved parts of the airplane’s landing gear and fuselage from the Java Sea.
https://www.ainonline.com/aviation-news/air-transport/2018-11-13/boeing-guidance-737-max-stall-protection-system-under-fire
Eviation's Alice To Fly This Year
|
cc/2019-30/en_middle_0053.json.gz/line4623
|
__label__cc
| 0.559839
| 0.440161
|
Published on August 21st, 2016 | by Amber Healy
Last Night in Kingston (Final Update)
Whether you stood shoulder-to-shoulder with friends and strangers, sat by yourself in front of a screen, listened while driving or found another way to participate, Saturday night’s CBC broadcast of the Tragically Hip’s concert in Kingston was incredible. It’s unlikely a moment like that will be repeated again–let’s be honest, we don’t want another reason for another moment like that, not for a good long while–and we’ll be speaking in reverent tones for quite some time about where we were when we watched The Hip sing and dance and perform together in their hometown.
Before the photos I promised you, most of which were taken in Buffalo (we like to think of ourselves as The Hip’s adopted US hometown), an observation: The first set of every night’s show, the band played in close proximity to each other. A clear, loving, lovely message: We are one, we protect each other, we’re in this, we’ve got each other’s backs. A beautiful thing to see. We saw it again during the third and final encore.
This is a smattering of what I saw–please feel free to keep sending them to phfyrebyrd@gmail.com or via Twitter (@AmberMHealy) or add them in the comments below. There’s another great collection over at CrowdAlbum.com worth checking out. And thanks for sharing.
This came from Tish and Will in Port Glasgow, Ont., who sent it over Friday evening. “This is a celebration of the soundtrack of our lives! Filled with emotion and forever thankful to The Hip!!!!! We love you!!!!”
Nicholas Jameson sent that one in from a party in Toronto’s Distillery District (above).
From the comfort of an Edmonton couch (left and above) to the enthusiastic and well-populated Buffalo crowd:
And then there’s this one, reportedly from a “secret show” at the Showplace Theater in Buffalo in 1994, which pretty much sums it up:
Here’s a few more from Randy Sexsmith out in Vancouver:
He writes: “Last night, I went to watch the show at the Imperial Ballroom in Vancouver. The cover charge was a donation to the Sunnybrook Foundation. Here are some pics from the show. It was an emotional night with many fans shedding tears while singing all the words.” His email is signed “In Gord We Trust.”
And here’s another collection of screenshots sent by a fan from Edmonton:
Gerry from Ottawa sent along these beauties, taken from inside what must have been an overwhelmingly emotional K-Rock Centre. “Had the pleasure of being at the K-Roc Centre last night, and the Ottawa show two days ago. Never seen a crowd so electric. So emotional. The Hip were outstanding in every way.”
More from Kingston, courtesy of Scott, who has a series of videos posted on YouTube under Kingston 360 DOTCOM:
When the band walked offstage, it was with heavy and tired hearts, but hopefully also hearts filled with joy and appreciation. We don’t know what tomorrow brings, but we shared this moment. It might be enough.
Tags: Kingston, The Tragically Hip, Tour
Amber Healy I write about music policy and lawsuits because they're endlessly fascinating.
4 Responses to Last Night in Kingston (Final Update)
Mark Fleetwood says:
We watched the broadcast at The Riviera Thearte in N Tonawanda, great sound, big sharp feed, cold beer. I hear there were some issues at Larkinville…
Beautiful show, I hope it’s not the end.
Amber Healy says:
Larkinville was a bit disappointing, between sound issues and not getting to hear two-thirds of the final encore on the PA. But I’m grateful they hosted the event for so many of us. The people sitting near me were delightful and kind of saved the night.
Pingback: Canada has lost a great man. - Geeks and Beats Podcast
Pingback: A Journal of Musical ThingsGord Downie Dead at 53 - A Journal of Musical Things
|
cc/2019-30/en_middle_0053.json.gz/line4626
|
__label__cc
| 0.660725
| 0.339275
|
Yazaki Creates Clever Terminal
Even though there are plenty of things that people take for granted and consequently that that’s just the way things are, innovative thinking can change them, significantly.
Gary S. Vasilash
Editor-in-Chief , Automotive Design & Production
Take the classic battery cable terminal that’s fastened to the post with a horizontal bolt.
Volvo Trucks to Invest $400-million in Manufacturing How do you assure a better future? By investing in it. That’s what Volvo Trucks is doing.
ZF and AKC Rear steering can provide big benefits. And ZF is building lots of them.
Bosch Locates AVs with Precision It goes without saying that an autonomous vehicle really needs to “know” where it is at any given ti...
Yazaki has developed a new approach to this, a multi-directional battery terminal that uses a bolt-and-wedge design that vertically fastens it to the battery with evenly distributed clamping pressure between the terminal and the battery posts. It uses a bolt, bracket, and plate nut combination to transfer force to the terminal body.
There are said to be several advantages to this design, including a 40 percent weight reduction as well as a 50 percent cost reduction.
What’s more, it accommodates different battery designs. According to David Scheffler, Yazaki North America's head of engineering, “Whether it is a EN [European Normal], BCI [Battery Council International] Group, or JIS [Japanese Industrial Standard] battery standard, our multi-directional terminal doesn't need to change to accommodate battery layout and design. In addition, it simply makes installing batteries safer and easier.”
Explains Schaeffler, “Yazaki tackled the challenge of developing a battery terminal that would convert a downward force into a horizontal force, evenly distributing clamping pressure around a cylindrical battery post to establish a stable, reliable electrical connection. The result is an innovative design that actually maximizes electrical clamping force, eliminates wire routing issues caused by in-vehicle battery layout, and improves assembly efficiency and ergonomics.”
Even a simple thing like the cable terminal can be made even better through clever design.
Building by Bonding: BMW, the i3 and Carbon Fiber
BMW brings carbon fiber into mass production: reducing vehicle weight, parts, and production time.
2017 Mazda CX-5 Grand Touring AWD
The Mazda CX-5 first appeared on the scene in 2012, and for 2017, the vehicle has undergone some major transformations, to enhance what was already a notable small crossover.
Honda Accord: The Ninth Generation
Although the term “continuous improvement” is generally associated with another company, Honda is certainly pursuing that approach, as is evidenced by the Accord, which is now in its ninth generation.
|
cc/2019-30/en_middle_0053.json.gz/line4630
|
__label__cc
| 0.531
| 0.469
|
The Dispatch 002: A Time of Upheaval
Posted by Samantha Ferreira | Jan 20, 2019 | The Dispatch |
Tags: editorial, the dispatch
Happy Sunday, everyone.
I’m sure that many of you are aware of the scandal that rocked the greater AniTwitter community over the past week. On January 15, allegations of sexual abuse and worse befell Dylan Keilman, a prominent member of the AniTwitter community who goes by the handle “Hazukari.”
In the wake of these reports, fans began sharing their own stories of abuse and harassment that have arisen in the North American anime community.
(Before I go further, I want to state publicly that I, and the rest of the Anime Herald staff, support the victims, and thank the brave people who have stepped up and spoken out.)
This led to the creation of a spreadsheet, has been collecting allegations of suspected harassers from the public. Whether you’ve been reading about it on Twitter, or the events that occurred in the aftermath on Kotaku, it’s been a topic that has begun to reverberate within the anime community at large. People began to discuss their experiences with other users in the anime fan sphere, as well as specific voice actors, prominent industry figures, and many other individuals.
Meanwhile, major players in the media, including Anime News Network’s Bamboo Dong and Lynzee Loveridge have begun collecting stories for an article that aims to shed light on the bad actors working within the greater anime world.
As Kotaku’s Cecilia D’Anastasio put it, this is our community’s #MeToo moment.
Things have died down in the days that have followed, but it’s clear that we’re on the brink of great changes within the greater anime subculture. In the days, weeks, and months to come, we can expect a greater light to be shone on figures within the anime community, as untold stories and allegations are finally unearthed.
Right now, though, we have no idea about what will happen next. All we know is that we’re seeing the very first sparks of something that will lead to major changes in the greater anime community.
Still, I can’t help but wonder: will we welcome this change, and take the steps to prevent further disasters? Or will things die on the vine, as people bitterly fight back to defend their favorite personalities?
The Latest From the AniBlogging Community
Anime fans’ #MeToo moment: In the wake of the events that occurre on January 15, an anonymous user started a spreadsheet, which compiles allegations of suspected harassers. Kotaku’s Cecilia D’Anastasio investigated the spreadsheet and the events leading up to its creation, which are being called our #MeToo moment by many.
Lily Hoshikawa: zombie, idol, icon: Rai from Rai’s Anime Blog takes a look at Zombie Land Saga‘s Lily Hoshikawa: the undead idol turned trans icon. They give a deep dive into Lily’s gender dysphoria, before diving into a detailed analysis of the general opinions of trans people in Japan, and the treatment of those undergoing transition in the nation.
Flipping the Script: Anime Feminist writer Alex Henderson dives into Revue Starlight. They take a look at the show’s bold critique of the Takarazuka Revue, from its “Star” system and its love of tragic endings. Moreover, they examine the way that the series uses its framework to not only challenge but outright defy the now-tired “bury your gays” trope that exists in fiction.
Never running from a game fight / She is the one called Sailor Moon: Ashley took a trip to Toronto’s The Hive to check out a growing scene in the fighting game community. In recent years, the game has seen some serious play: partly due to the game’s tight mechanics, and partly from its Arc System Works pedigree.
This Week's Fun Stuff
With Chihayafuru‘s third season on the way, what better way is there to celebrate than with some karuta action? With cats?
This quirky video by au recreates the tension of Yuki Suetsugu’s manga, albeit with an adorable feline bent. So, by all means, come for the kitties and stay for the dramatic tension.
Our Supporting Patrons
The following Patrons help to keep us talking nerdy to you every day of the week:
HERA’S HELPERS
Nick Penrhyn
Reinesis
ZicklePop
NERDY TALKERS
David Majors
Karel P Kerezman
Lauren Orsini
Martin Butler
Renfamous
Silver Huskey
Vadim Chirchakov
Support Anime Herald on Patreon
This article is only possible thanks to our amazing Patrons. It's through their help that we're able to offer a high-quality publication that's ad-free and free to access.
Consider backing us on Patreon for as little as $1 a month, to support new content from our amazing team, and ensure that we can keep talking nerdy to you for some time to come.
PreviousBunny Girl Senpai Movie Gets New Web Trailer
NextLand of the Lustrous English & Spanish Dubs Hit HIDIVE On 1/23/2019
The Dispatch 006: Onward, to the Past
The Dispatch 003: Convention Season Is Coming!
The Dispatch 007: Anime Boston: A Homecoming And A Reboot
The Dispatch 004: The One With the Real Talk
|
cc/2019-30/en_middle_0053.json.gz/line4634
|
__label__wiki
| 0.985884
| 0.985884
|
Irregular at Magic High School Film Reveals June 17 Opening, New Visual
posted on 2017-02-09 10:00 EST by Jennifer Sherman
Anime with returning cast features new character Kokoa
The official website for the Gekijōban Mahōka Kōkō no Rettōsei: Hoshi o Yobu Shōjo (The Irregular at Magic High School The Movie: The Girl Who Calls the Stars) film unveiled a new visual on Thursday and revealed that the anime will open in Japan on June 17. The film's staff announced the opening date during a Niconico live streaming program on Thursday.
Advance tickets for theatrical screenings will go on sale in theaters in Japan on February 18. The tickets will cost 1,500 yen (US$13) each, and they will come with a B2-size poster of the new visual as the initial bonus item.
The staff had revealed a second key visual for the film in October.
The film will feature a new character named Kokoa (pictured below), who is a deserter from the National Defense Navy's base, and who ends up in Miyuki's care. Her appearance is that of a very young woman, but her true character is shrouded in mystery.
Original light novel author Tsutomu Satou is writing an original new story for the film. In the story, the seasons have changed, and it will soon be the second spring. The poor student older brother Tatsuya and the honor student younger sister Miyuki have finished their first year at their magic high school, and are on their spring break. The two go to their villa on the Ogasawara Island archipelago. After only a small moment of peace, a lone young woman named Kokoa appears before them. She has abandoned the Naval base, and she tells Tatsuya her one wish.
The film's returning cast includes:
Saori Hayami as Miyuki Shiba
Yūichi Nakamura as Tatsuya Shiba
Yumi Uchiyama as Erika Chiba
Takuma Terashima as Leonhart Saijo
Satomi Satou as Mizuki Shibata
Atsushi Tamaru as Mikihiko Yoshida
Sora Amamiya as Honoka Mitsui
Yuiko Tatsumi as Shizuku Kitayama
Tsutomu Satou began writing the novel series with character designs and illustrations by Kana Ishida (Aquarion Evol character design) in 2008 under the Dengeki Bunko label. Yen Press licensed the original light novel series and the spinoff manga The Honor Student at Magic High School.
The earlier 26-episode television anime adaptation debuted in April 2014 from director Manabu Ono at Madhouse. Aniplex of America licensed the anime and released it on home video in 2015.
Source: Dengeki Online via 0takomu
served by kurisu-chan
cloudflare ray# 4f711cf7e7ba5769-IAD
|
cc/2019-30/en_middle_0053.json.gz/line4635
|
__label__wiki
| 0.724368
| 0.724368
|
Mercury in Delhi touches all-time high of 48°C
New Delhi [India], June 10 (ANI): The national capital on Monday recorded a temperature of 48 degrees Celcius, the highest-ever to be seen in the month of June.
“Delhi records the highest temperature in history. Sets an all-time record at 48°C. This is the hottest ever in June,” read a post on the official Twitter handle of Skymet.
Skymet's Vice President - Meteorology and Climate Change - Mahesh Palawat said today's temperature surpasses the earlier record of 47. 8 degrees Celcius in June 2014.
According to the India Meteorological Department (IMD), heat wave conditions will prevail in states like Rajasthan, Haryana, and Delhi, among others, for a couple of days.
In Uttar Pradesh, Prayagraj and Banda recorded 48.9 and 49.2 degree Celsius temperature on Monday.
In Rajasthan, Churu and Sriganganagar recorded 50.3 and 48.5 degree Celsius temperature respectively.
Earlier today, the IMD had issued a red alert in West Rajasthan, orange alert in West Madhya Pradesh and yellow alert in various parts of the country including in East Rajasthan, Punjab, Haryana, Uttar Pradesh, and East Madhya Pradesh.
A red alert calls for taking an action, orange alert calls for staying prepared while the yellow alert is for staying updated.
Maximum temperatures were markedly above normal at many places on Sunday. The temperature was reported 5.1degC above than the normal temperature at many places over East Rajasthan.
A heat wave is usually declared when the temperature stays above 45 degC for two consecutive days.
According to Skymet, some relief is in sight during the next 24 hours.
The private forecaster said that by tomorrow, a fresh Western Disturbance will approach the Western Himalayan. Its induced cyclonic circulation would be seen over Central Pakistan and adjoining parts of West Rajasthan. Therefore, due to these weather systems, pre-Monsoon activities like dust storm and thunderstorm will occur over parts of Delhi, Noida, Gurugram, Faridabad, and Ghaziabad during the late afternoon or evening hours on June 11.
However, forenoon hours would be hot, and dust storm, thunderstorm, and patchy rains will occur in parts of Delhi and NCR for the coming two to three days.
Even though the intensity and effect of these weather activities will not be major but slight relief may occur from the ongoing heat wave like conditions. Temperatures will also drop only by a few degrees (ANI)
Skymet
|
cc/2019-30/en_middle_0053.json.gz/line4636
|
__label__cc
| 0.699985
| 0.300015
|
Need for Speed Review - 2 Stars
“Breaking Bad” co-star Aaron Paul breaks in his new high-profile career in “Need for Speed.” Don’t expect anything near as sharp as the “Fast and Furious” series. “Need for Speed” sticks to the basics—a best friend whose dialog telegraphs that he’s gonna die—a dead father, an ex girlfriend, a really bad villain driver, and only Aaron can win the day. Paul must share his stardom with a 50th anniversary hotter than hot new Ford Mustang which he drives across country at maniacal speeds. He brings Imogen Poots along for the ride which includes several show downs with bad guys who don’t want them to make the New York to San Francisco run. But they do and after a hiccup or two, Aaron enters an exclusive high stakes race where the winner will receive justice and a lot of money. The cars really steal the show as well as the stunts the filmmakers have the cars do. Aaron Paul has a certain charisma and I imagine he’ll enjoy a long career in major movies. I hope he starts getting scripts better than this one which made the audience I watched with laugh out loud far too many times. Does it deliver what it promises? Race car drama by the book. Is it entertaining? Nice cars. Is it worth the price of admission? For car guys.
Posted by Arch Campbell at 6:49:00 PM
|
cc/2019-30/en_middle_0053.json.gz/line4640
|
__label__wiki
| 0.899441
| 0.899441
|
Shuckers Bar and Grill in North Bay Village Rebuilding
Shuckers Bar and Grill in North Bay Village rebuilding seven months after deck collapse
Posted on Sunday, 01.19.14
BY Charles Rabin [email protected]
Seven months after a wooden deck collapsed into Biscayne Bay, plunging dozens of diners into murky, shallow water, an effort to rebuild by the owners of Shuckers Bar & Grill is being delayed by an insurance company that wants to piece those frantic moments back together.
Late last week, barges with large hoists finally began to clear the still-cluttered waters behind the North Bay Village attraction.
The plan is to transfer the salvaged wooden deck pieces and concrete seawall to an upland warehouse, where forensics experts would try to rebuild it as close as possible to its old self.
Although Shuckers owners Charles Grentner and his son Chris have refused interview requests since the June incident, several people with knowledge of the rebuilding process have confirmed that the insurance company representing Shuckers convinced the owners to make efforts to clear and restore the debris field before rebuilding.
“The issue is the insurance company wouldn’t let them remove the debris,” said interim North Bay Village Manager Frank Rollason. “Chris told me that’s the plan — taking the big pieces to a warehouse and putting it back together.”
Personal injury attorney Spencer Aronfeld, who represents several of the victims who have filed 10 civil lawsuits in Miami-Dade Circuit Court since the incident, said that rebuilding the deck could give the defendants an opportunity to find out what caused the collapse.
The Grentners and their attorney John F. Kennedy didn’t return phone calls or respond to questions through their publicist Seth Gordon. Legal records obtained by Aronfeld show that CRC Insurance Services Inc. and First Specialty Insurance Corp. represent Inn on the Bay and Inn on North Bay Ltd., which own Shuckers and and the attached Best Western Hotel. Calls to the insurance companies were not returned.
Aronfeld said he believes the court disputes will be resolved. He said dialogue with the representatives of Shuckers has been “positive.” One of his clients who was on the deck when it collapsed had a series of facial plastic surgeries just before the New Year.
The Grentners have secured the permits necessary to rebuild, North Bay Village records show.
The upland interior of the popular sports restaurant will look similar but have a new bar. Foundations holding up the roof and canopy will be replaced, and the retaining wall along the water will be raised. The deck over the water will remain the same size — 30 feet by 120 feet — but it will be concrete instead of wood.
Miami-Dade County has approved the deck plans over the water, and North Bay Village has approved plans for the other sections of the facility. North Bay Village inspectors have been watching the reconstruction carefully and signing off as it goes along, said inspector Michael Arronte.
“They’ve been cooperating with the city a lot and have provided all the documents requested,” Arronte said. “As a matter of fact, they’ve been pushing us.”
Yet the water behind the restaurant at 1819 79th Street Cswy. remains a debris field. Although the seawall has new wood pilings, large chunks of the deck, concrete and steel remain submerged and visible. Large, rusted fans tilt perilously from parts of the broken deck. Yellow police tape is torn and strewn about.
The Grentners are important property owners in tiny North Bay Village, whose 7,000 residents live on a spit of land on the 79th Street Causeway between Miami Beach and the mainland. Shuckers, and the nearby Best Western hotel that the Grentners also own, pays about $60,000 a year in taxes. The hotel didn’t close after the collapse and remains open.
As important as the tax base, the popular sports bar is one of only a few on the bay’s calm waters in Miami-Dade, and Shuckers is probably North Bay Village’s main attraction. Aronfeld, the injury attorney, said he has received calls from Shuckers patrons begging him to refrain from trying to delay construction.
“Apparently, this neighborhood establishment has a cult-like following,” he said.
Shuckers’ popularity was never more evident than on June 13, when the restaurant was packed with Miami Heat fans watching a finals playoff game against the San Antonio Spurs.
At 9:48 p.m., as the Heat were completing a furious comeback just before halftime, a loud cheer was followed by a train-like roar, then deafening silence, as the deck split in half in a V-formation and tore away from the concrete seawall.
In a few seconds, dozens of Shuckers patrons found themselves standing or sprawled in the bay’s waist-deep water amid tons of broken wood, concrete and steel. Remarkably, there were no deaths, though close to 100 people pulled from the water by Shuckers employees and first responders suffered cuts, bruises and some broken bones. Dozens were transported to area hospitals.
The unfolding events played out nationally, with Heat players sending get-well wishes and speaking about the sports bar on national television after the game.
Six months prior to the collapse, the property had been inspected by engineer Steven Jawitz, who didn’t inspect the deck — he said there was no requirement in the building code to do so. North Bay Village officials were stunned at Jawitz’s response, even after learning that city building official Raul Rodriguez had signed off on the inspection.
A further look into the incident by the Miami Herald found that deck inspections in South Florida were few and far between, required only 40 years after a deck over water is built, and then once a decade after that.
Rollason, the interim manager, said city officials have determined that the calculations in the rebuilding plans submitted by the Grentners more than meet code requirements. He said the debris in the bay should be cleared by the end of January, after which the deck can be rebuilt. Arronte, the inspector, speculated that if that’s the case, Shuckers could be in good shape by sometime this coming summer, and certainly by the end of the year.
“For what they have to have, it’ll probably be the safest deck in South Florida,” Rollason said.
Read more here:Miami Herald
Published on aronfeld.com with permission. These materials have not been altered. You may not reproduce or publish these materials without prior consent of publisher. These materials may be copyrighted.
|
cc/2019-30/en_middle_0053.json.gz/line4643
|
__label__cc
| 0.611116
| 0.388884
|
Bernard-Marie Lauté
Born in 1943, Bernard-Marie Lauté lives and works in Brittany since 1971.
Bernard-Marie Lauté plays with colors and light in allusive representations filled with nature. His work is an infinite continuation in which every day brings a discovery. He returns constantly on his work; correct, find the balance, start again indefatigably until life irrigates all the surface of the painting: "How long it will it take for my "work" to get as close as possible to what I want to reach?", he wonders.
Introduced to painting at 16 by Paul Bigo, cleric keen on modern art, he starts his career as photographer at the "Réunion des Musées Nationaux". Bernard-Marie Lauté leaves the Paris region in 1971 for Brittany after he discovered Ouessant. Begin then the years of apprenticeship and of important meetings such as with Marguerite and Aimé Maeght and Jean Guichard-Meili.
In 1977, Guillaume Beaugé, prize-winner of the Casa Velasquez, invites him to join him in a cortijo, in Frigiliana, where he practices watercolor under the burning Andalusian sun. At the beginning of the 80's, he joins a group of friends painters led by Alexandre Hollan, Janos Ber and Jean-Baptiste Ambroselli with whom he will exhibit around Paris. In 1990, he realizes the stained-glass windows of the Anne de Gaulle's Foundation Chapel near St Rémy-les-Chevreuse with the cooperation of Jacques Bony. In 1997, he is part of the Valley of Perrier art adventure in Kermoroc'h with Jean-Luc Bourel, Catherine Urien and Jan Maï.
Two years later, is the first of a series of exhibitions in the Gallery Art/space of Thonon-les-Bains, who will be followed by a famous project due to Pome Jacques and to her friend Catherine Bouchetal: to realize eight exhibitions at the same time in eight altitude refuges in the Mont Blanc mountains. Roland Naouri made possible an exhibition at "The Argonautes" bookstore and on the same year, he stays in Turin at Léa Gyarmati and Francesco Franco.
Since 2003, he realized eight short movies and medium-length films and he also was the inspirator of several exhibitions as those dedicated to Frédéric Chigaden and to Jean Guichard-Meili, as well as for a presentation of the wood engraved works of Louttre. B in the mill of Blanchardeau.
French Artist
No works available by Bernard-Marie Lauté
Unfortunately, there are currently no available works by Bernard-Marie Lauté.
Bernard-Marie Lauté doesn’t have any exhibitions.
Follow Bernard-Marie Lauté to receive a notification as soon as new exhibitions are added.
|
cc/2019-30/en_middle_0053.json.gz/line4646
|
__label__cc
| 0.600453
| 0.399547
|
Proactive Approach to the Threat of Privatization of our Community College System
Resolution Number:
Jon Drinnon
Assigned to :
Resolutions Committee
Whereas, Newspapers like the Washington Post, which owns Kaplan University and Kaplan Prep, large and successful private education conglomerates, have mounted concerted campaigns to discredit community colleges for being inefficient and harmful to their students and their faculty for being lazy and overpaid, and organizations like the American Legislative Exchange Council (ALEC) have mounted concerted conservative legislative campaigns to advantage corporate goals to privatize education at the expense of our public educational institutions;
Whereas, As its name clearly implies, California Competes (and groups like it), as a veiled attempt to privatize education in this country have launched a full frontal assault on our faculty and community college system with claims that are best addressed by taking over the rhetoric with regards to public education rather than always responding point by tortuous point after the fact;
Whereas, AB 515, a California Legislative bill, if it had not been defeated, would have legislated a two-tiered fee system among the community colleges in effect setting up a private system within the public system geared towards creating an access hierarchy based on the ability to pay much larger fees, leaving less advantaged students competing for what is left; and
Whereas, California is notorious for its unwillingness to fund its public education system from primary to secondary to higher education at appropriate levels that value the education of its citizens or the wellbeing of its students, leaving the public education system extremely vulnerable to corporate and legislative intrusions to privatize the system on many fronts;
Resolved, That the Academic Senate for California Community Colleges create a standing committee whose sole charge is to proactively counteract moves to privatize our community college education system by actively and publicly promoting the community colleges and actively and publicly opposing any moves to privatize them in all venues in which we are legally permitted to engage.
MSR Reason: Referred to clarify intent and to review how Exec is already doing this to determine if resolution is necessary or if it is even feasible.
Status Report:
The Executive Committee deemed this resolution unnecessary as this is one of its key roles. The Executive Committee already serves the role of the proposed standing committee requested in the resolved statement through its advocacy work accomplished through plenary session breakouts, its institutes and its publications. Furthermore, the President regularly communicates concerns through letters to appropriate individuals and parties, consistent with established senate positions.
|
cc/2019-30/en_middle_0053.json.gz/line4648
|
__label__cc
| 0.594065
| 0.405935
|
Select the department you want to search in All Categories Prime Day Alexa Skills Amazon Devices Amazon Fashion Amazon Global Store Amazon Pantry Appliances Apps & Games Baby Beauty Books Car & Motorbike Clothing & Accessories Computers & Accessories Electronics Furniture Garden & Outdoors Gift Cards Grocery & Gourmet Foods Health & Personal Care Home & Kitchen Industrial & Scientific Jewellery Kindle Store Luggage & Bags Luxury Beauty Movies & TV Shows Music Musical Instruments Office Products Pet Supplies Prime Video Shoes & Handbags Software Sports, Fitness & Outdoors Tools & Home Improvement Toys & Games Video Games Watches
Hello, Sign in Account & Lists Sign in Account & Lists Orders Try Prime Cart
Your Amazon.in Prime Day Deals Amazon Pay Sell Customer Service
Books Advanced Search New Releases & Pre-orders Best Sellers Browse Genres Children's & Young Adult Textbooks Exam Central All Indian Languages
A GOOD KIND OF CRAZY
Give your kids the gift of science-fiction
by Anil Menon
I wasn’t lucky enough to inherit a crazy uncle, but I discovered science-fiction, so it worked out more or less. Craziness, like cholesterol, comes in a good form and a bad form, and science-fiction is the good kind of crazy. Read science-fiction, and we come to realize that humans are meant to use our imaginations the way trees use green, dancers their bodies, or birds their wings. Imagine a world ten billion years from now. Imagine a world without night. Imagine a world where women live twice as long as men. Imagine a world where mosquitoes carry the secret of immortality. Imagine your child freed to imagine worlds never before imagined. Fortunately, the last item is easy. Just give the kid some science-fiction.
Science-fiction does one very specific thing for a reader’s imagination. You become comfortable with figuring out things as you go along. There is a lot of unpredictability and uncertainty in science-fiction, partly because you don’t know how the world is supposed to work. For example, Manjula Padmanabhan’s story Sharing Air begins with the line: “On the bargain network today, there was a selection of antique atmospheres advertised.” A science-fiction reader will guess they’ve just stepped into a world where atmospheres can be bought and sold like bronze figurines. But what the heck is an antique atmosphere? Crazy! The reader will shiver with pleasure, snarf down some peanuts, and read on.
Science-fiction has been around for at least a couple hundred years. In the 1930s and 40s, science-fiction was mostly published in seedy American magazines with lurid covers. So it acquired a reputation as something seedy, lurid and American. Things eventually got respectable, and now science-fiction is in the process of transforming itself into a true world literature.
This is an important point. Early science-fiction writers were very imaginative but their imaginations had some interesting blind spots. For example, their stories had all kinds of extraterrestrials, but they rarely had Asian, Chinese, African or South-American characters. If present, such characters were usually marginal, expendable, or in need of being saved. Sometimes their role was to be suitably exotic and give the white hero heavy fundas about life. Aliens also never landed in Delhi or Dhaka or Nairobi. Everything worth inventing or conceptualizing had begun with the Greeks. So on and so forth. It is curious that many writers who prided themselves on their cosmic imaginations couldn’t see their own planet very well.
Of course, this isn’t a problem unique to science fiction. C. S. Lewis’ novels consistently depict eastern cultures in a negative light. Enid Blyton’s fictional kids seem to live in an England without brown people. In Agatha Christie’s novels, non-white characters are mostly used for serving drinks. When such dismissals are multiplied by a thousand authors in every genre, the overall result of literature is to cripple the imagination rather than give it wings. Then literature does more harm than good.
Fortunately, a lot has changed. Science is no longer the privilege of a few Western nations. There is far greater appreciation of non-western contributions to civilization. And there are now many Indian writers who, along with their compatriots the world over, are reworking science-fiction.
This continues a tradition rather than make a new one. Perhaps it will come as a surprise to learn that the first short story in English by an Indian author was set in the near-future. Published in the Calcutta Literary Gazette on 6 June 1835, its young author, Kylas Chundar Dutt, a student at Hindu College, imagined an Indian freedom fighter’s final days in the year 1945. In 1896, Acharya J. C. Bose wrote a science-fiction story about a toofan tamed with the application of a little hair-oil. Yes, hair-oil! Kuntalini hair-oil, to be precise. In fact, nineteenth-century Bangla magazines had many SF stories intended for a general audience. Things went a bit quiet in the 30s, 40s and 50s, perhaps because we were busy with the Independence struggle.
Today we have writers like Samit Basu, Vandana Singh, Roopa Pai, Suniti Namjoshi, Mainak Dhar, Indrapramit Das, Priya Sharma, Jerry Pinto, Manjula Padmanabhan, Priya Sarukkai Chabria, Rimi Chatterjee, Shovon Chowdhury, Shweta Narayan, Andaleeb Wajid and Payal Dhar. Their distinct stories are a beautiful blend of influences. There are also an emerging generation of writers like Sami Ahmad Khan, Nishant Joshi and Mahesh Paranjape. In the regional sphere, Marathi, Bengali and Tamil have always been quite strong in children’s SF. All this makes the future of Indian science-fiction rather promising.
In a sense, the job of science-fiction isn’t to predict the future. It is to keep us from running out of futures. We'll never run out of futures worth building, worth living in, so long as we gift our kids the right kind of crazy.
Recent Indian sci-fi reads I enjoyed
Shockwave & Other Cyber Stories, edited by Himanjali Sankar (Scholastic)
Eat the Sky, Drink the Ocean, edited by Kirsty Murray, Payal Dhar and Anita Roy (Zubaan)
About Anil Menon
Anil Menon’s short fiction has been translated into Hindi, Tamil, Chinese, Czech, French, German, Hebrew and Romanian. He is the author of The Beast With Nine Billion Feet (Zubaan Books, 2010), a YA novel that explores the connection between language and longevity. His most recent work Half Of What I Say (Bloomsbury, 2015).
Give Kids the Gift of Science Fiction : Books
Unlimited FREE fast delivery, video streaming & more
Prime members enjoy unlimited free, fast delivery on eligible items, video streaming, ad-free music, exclusive access to deals & more.
Amazon Cares
Gift a Smile
Amazon Pay on Merchants
Amazon App Download
Amazon Assistant Download
& collectibles Amazon Web Services
Audio Books DPReview
Photography IMDb
& Celebrities
Fashion Brands Amazon Business
Your Business Prime Now
on Everyday Items Amazon Prime Music
Stream millions of songs,
|
cc/2019-30/en_middle_0053.json.gz/line4652
|
__label__cc
| 0.729786
| 0.270214
|
HomeThe Circus Is Coming To San Pedro Village
The Circus Is Coming To San Pedro Village
/ Aug 06, 2014
/perlita_zapata
Volume No:
By Angel Nuñez
Circuses are very scarce in coming to town and so it was many years ago in San Pedro but in the 1950’s the village of San Pedro had the distinct pleasure of a visit of a circus. You guessed right! The excitement mounted that day from the time the boat arrived to the final minutes when the grand show was to commence.
For all of the children and even most of the people, it was the first time we even heard of the word “circus”. We noticed a huge tent being set up in the backyard of Mr. Nando Trejo which is the present day the corner of Pescador Drive and Pelican Street. We had never seen such a huge tent and we kept wondering what in the world was going to happen there. Someone had commented that there was a man who would eat a snake and that stirred up quite a thrill.
Early in the afternoon this man dressed as a clown went all around the village with a cone shaped object like a funnel shouting out aloud that the show would commence at 7 p.m. and that all were invited. It would only cost 25 cents for children and 50 cents for adults. He shouted in Spanish, “Come one come all to the Saca Trapos Circus where a magician will thrill the crowd and Saca Trapos will make everyone laugh until you cry.” He was so funny that it sent the children running home to ask for permission to go to the show and most important to beg for a shilling (25 cents).
It was required that if you wanted to sit down, you had to purchase your ticket and take your chair or stool so that it would be placed around the ring. Practically everyone of the fifty families or so took their chairs for mom and dad and the children were told that they would stand up because that way they could move about and get a good viewing spot. That was cool! Man, you should have seen people shining up their best varnished chairs or cleaning off the cobwebs from their kitchen chairs. Soon the circus ring looked like a luxurious furniture gallery of myriad styles of furniture.
At 7 p.m. the circus was full to capacity. Every woman was wearing something on her feet. The men, however, were stubborn. They did not care of shoes, or better yet did not own one yet. The show commenced with Saca Trapos the clown opening up a huge chest and pulling up items of clothing to what seemed like an endless activity and with every item pulled out, there were shouts and applause and laughter. There were huge underwear, panties without elastic, bras with one tiny cup and one extra large. There was extra laughter when he pulled out a bra with 3 cups and even louder laughter with the actions he did with them. Indeed everyone was laughing until there were tears.
Then a man dressed in black and red came to the middle of the ring and did all kinds of tricks with cards, cigarettes and coins. He smoked a cigarette and crushed it then pulled it out of a guy’s ears. He pulled out a pigeon out of a hat. He did many tricks with a deck of cards and everyone was going “ahh, uuhh, wowww,” and then an outburst of laughter when he pulled a chicken egg from between the legs of an elderly man.
THE END OF THE SHOW: Saca Trapos the Clown then came out claiming that he could outdo the magician. He asked the crowd and everyone hollered, “Yessssss”! He brought out a small box claiming that he had fifty snakes from all over the world in that box including the most poisonous snakes from Africa and China. I don’t know if the word snake or China or Africa had the effect of sending thrills down our bodies. Everyone was tense. The first snake he put it around his neck and everyone thought it was cool. But then he attempted to put it around the neck of Mrs. Pilar and she pushed him. She picked up her chair and left the arena cussing the hell out of Saca Trapos.
Everyone laughed and Saca Trapos then announced that he would release the 50 poisonous snakes into the crowd. Men you should have seen the women picking up their chairs and following Mrs. Pilar. Then the men walked out following their wives and the children right behind or under them. And that was the end of the circus performance in the sleeping village of San Pedro twenty five years ago.
25 Years Ago Books Can Be Purchased At:
-Ambergris Today -Jose Luis Zapata Photography –Richie’s Stationery -Lala’s Store -Pampered Paws -San Pedro BTB Office -S.P. Town Library -Di Bush
Contact the Author at: [email protected]
Click Here For More 25 Years Ago Articles
Things We Take for Granted – Electricity and Ice
perlita_zapata
BTB Clarifies Internet Marketing Issues
Tough Times and Good Times in San Pedro as a Village (Part 2)
San Pedro Hellfighters Donate to Red Cross Chapter
|
cc/2019-30/en_middle_0053.json.gz/line4653
|
__label__wiki
| 0.580807
| 0.580807
|
Nissan Begins 2018 Leaf Production
December 5, 2017 • by Staff
Photo courtesy of Nissan.
Production for the 2018 Nissan Leaf is underway at Nissan’s assembly plant in Tennessee for a nationwide release to start off the New Year.
Production for new Nissan Leaf is being held at the Smyrna Vehicle Assembly Plant in Smyrna, Tenn., according to Nissan. The vehicle's range exceeds 150 miles on a single charge and is currently priced at $29,990. It offers available ProPILOT Assist technology, which helps drivers navigate stop-and-go traffic by assisting control of acceleration, braking and steering during single-lane highway driving.
The Leaf has been in production at Smyrna since 2013, with more than 114,550 models sold in the United States since 2011. The Smyrna facility currently produces six models, which also includes the Altima, Maxima, Pathfinder, Rogue and the INFINITI QX60. It has an annual production capacity of 640,000 vehicles, the automaker stated.
Related: 2018 Nissan Leaf Adds Range, Cuts Price
Read more about Nissan Vehicle Production Nissan Leaf Battery-Electric Vehicles
Ford, VW Partner on Autonomous Driving, High-Volume EV for Europe
Volkswagen will invest in Ford's Argo AI autonomous vehicle platform. Ford will use VW’s electric vehicle architecture to design and build at least one high-volume fully electric vehicle in Europe for European customers starting in 2023.
CARB Approves Lightning Systems' Electric Ford Transit
The California Air Resources Board (CARB) approved the second generation model of Lightning Systems' battery-electric Ford Transit 350HD.
First Battery-Electric Mini Arrives in 2020
BMW's first battery-electric Mini will arrive in early 2020, and the automaker hopes fleets that are now using BMW's i3 or have set sustainability goals will consider it as an option to add to their selector list.
Walmart To Install EV Charging Stations Across Arkansas
As part of a coast-to-coast charging initiative, Walmart plans to install EV charging stations across the state, with plans to expand to an additionally 46 states.
N.H. Governor Vetoes Green Fleet Bill
New Hampshire Governor Chris Sununu has vetoed a bill that aimed to replace all of the state’s fleet vehicles with zero-emission vehicles (ZEVs) by 2041.
Clean Cities Funding Preserved
U.S. Congressman Paul Gosar did not offer an amendment to the FY-2020 Department of Energy budget, one that would have eliminated funding for the Clean Cities program.
ChargePoint, Electrify America Sign Roaming Agreement
A new partnership between ChargePoint and Electrify America will allow users of each electric-vehicle charging network to use the other network with no additional charges, the operators have announced.
WEX Sets Up EV Charging Payment Solution
WEX Inc. commercial fleet clients that manage plug-in electrified vehicles will be able to pay for charging under a new partnership with ChargePoint, which now operates the nation's largest EV charging network.
Exploring Propane as a Fleet Fuel Source
Propane may be a viable option for certain fleets looking for an alternative fuel source. While converting a vehicle to a propane system comes with a high initial cost, the system may come with reduced lifecycle costs over the course of that vehicle's life.
Whitepaper eNews
Global Fleet
|
cc/2019-30/en_middle_0053.json.gz/line4663
|
__label__cc
| 0.632933
| 0.367067
|
8 Bit Soul
Holy Continuity Batman!
by Buddy Reno | May 15, 2013 | buddy reno, Comic Books
How I learned to stop worrying and start reading comics. I started collecting comics when DC rebooted their entire lineup in 2011 with The New 52. Until that point, I’ve always had a borderline interest in reading comics, but a few things have always scared me off of...
How to Survive a Steam Sale
by Buddy Reno | Apr 22, 2013 | buddy reno, Games, Mac, PC
Steam has become almost synonymous with PC gaming in recent years. Even though it’s a form of always-online DRM (Digital Rights Management), the benefits outweigh the costs. One of those benefits are the insane amount of sales and deals the service offers. When...
Remembering Fatal Frame
by Buddy Reno | Apr 9, 2013 | buddy reno, Games, PS2
When Resident Evil (RE) was released in 1996, it changed the way we played horror games. RE had a distinctly creepy atmosphere (excluding the cheesy dialogue) and introduced an entirely new way to play: Not only items were scarce, but actual game saves were items...
Spider-Man Homecoming: A Love Letter to the Greatest Teenage Voice
Where to Watch the 2017 E3 Keynote Presentations
Go, Go Power Rangers!
Retro Review: Project Gotham Racing 3
Brian Daniel
buddy reno
marchione
testani
|
cc/2019-30/en_middle_0053.json.gz/line4670
|
__label__cc
| 0.518679
| 0.481321
|
Fare Evasion/Warrant Arrest/Possession of Narcotics
Officers detained a male (Benjamin SEWALL, 28, Oakland) for fare evasion. Record checks showed that Sewall had an outstanding $5,000 arrest warrant for possession of narcotics paraphernalia, held by SFPD. Sewall was arrested on his warrant. Incident to arrest, quantities of suspected methamphetamine and heroin were found on his person. Sewall was booked at Santa Rita Jail.
Sunday, Sept. 24, 6:41 PM
Possession of Narcotics / Loitering for Drug Activities
Officers on patrol observed a suspect smoking a suspected narcotic substance. The suspect (Kalied Mousa, 20 years old, San Francisco) was arrested and cited for possession of narcotics and loitering for drug activities.
Violation of Prohibition Order/Vandalism
Officers responded to a report of a male creating a disturbance. Officers recognized the man as having a valid prohibition order, and he was arrested. During the incident, the man also damaged a fare gate. The suspect (Antonio HAYES, 52, San Francisco) was booked at the SF County Jail for vandalism and violation of a prohibition order.
General Disturbing the Peace Quality of Life Violation of Prohibition Order
An officer detained the suspect (Lopez, Isai, 21 years old, Pittsburg) for fare evasion. A records check revealed an outstanding no bail warrant held by the Alameda County Sheriff's Office. The suspect was placed under arrest for the warrant. The suspect was booked into the Martinez Jail on the warrant and issued a citation for fare evasion.
Disturbing the Peace/Probation Violation
Officers detained a male suspect for harassing female patrons on the train. Record checks showed that the man was on probation for burglary. The man was arrested for probation violation and was booked at the Martinez Detention Facility.
General Disturbing the Peace Violation of Court Order Quality of Life
Fare Evasion / Resisting Arrest
An officer observed a suspect (Tre Eric Thomas, 19 years, Hayward) enter the BART system without using a ticket in violation of the law. The officer attempted to detain the suspect, but the suspect resisted the detention and attempted to flee from the officer. The suspect was arrested and booked for resisting arrest.
Sunday, Sept. 03, 10:05 AM
Fare Evasion / Criminal Threats
The station agent observed a suspect (Antonio Hayes, 52 years, San Francisco) enter the BART system without using a ticket in violation of the law. The station agent advised the suspect that he needed to use a ticket to enter the system at which point the suspect became verbally hostile, cursing at the station agent and making verbal threats to harm the station agent. BART Police responded and detained the suspect, and the suspect was arrested and booked for making criminal threats against the station agent. The suspect was also issued a prohibition order.
Disturbing the Peace Quality of Life Crimes Against BART Employees
Sunday, Sept. 03, 8:16 AM
An officer detained the suspect for fare evasion. A records check revealed an outstanding $10,000 no-cite warrant held by SFPD for theft. The suspect was taken into custody on the warrant and booked into the Martinez Jail. The suspect was also cited for the fare evasion.
General Quality of Life
Saturday, Sept. 02, 11:08 AM
An officer contacted the suspect (Robinson, Lafayette, 6/29/65, Oakland) for fare evasion. A records check revealed an outstanding no bail warrant held by Mendocino County for a probation violation. The suspect was taken into custody on the warrant and booked into the Santa Rita Jail. The suspect was also cited for fare evasion.
Tuesday, Aug. 29, 9:08 AM
A sergeant and four officers conducted a Focused Enforcement Operation at the Daly City and Millbrae Stations on 8/28/17 between 1100 and 1900 hours. Twenty-seven (27) violators were contacted. Twenty-five (25) were issued citations. The sergeant and the officers also completed eight (8) train rides. L24
Monday, Aug. 28, 7:00 PM
An officer attempted to detain a male suspect for fare evasion. The male fled on foot, but was detained a short distance away. The man was arrested and booked at Glenn Dyer Jail for resisting arrest.
Friday, Aug. 11, 7:12 PM
A Sergeant detained the suspect (Warren, Marcus 56, Hayward) for fare evasion. A records check revealed a valid stay away order from all BART stations. The suspect was placed under arrest for the court order violation and booked into the Santa Rita Jail. The suspect was also cited for fare evasion.
Wednesday, Aug. 09, 8:57 AM
An officer detained the suspect (Woods, Karl 52, Oakland) for fare evasion. A records check revealed a $10,000 warrant for theft. The suspect was placed under arrest for the warrant and booked into The Martinez Jail. The suspect was also cited for fare evasion.
An officer detained the suspect for fare evasion. A records check revealed an outstanding $100,000 warrant for a probation violation. The suspect was placed under arrest for the warrant. The suspect was booked into the Santa Rita Jail on the warrant and issued a citation for fare evasion.
Monday, July 31, 11:41 AM
An Officer detained the suspect for fare evasion. A records check revealed an outstanding $5,000 no-cite warrant held by Belmont PD for theft. The suspect was cited for fare evasion before being booked into the Martinez Detention Facility on the warrant.
Saturday, July 29, 9:50 AM
Narcotics Activity/Warrant Arrest
Officers detained a male for loitering in a drug area. Record checks showed that he had two outstanding arrest warrant, totaling $27,500, for possession of narcotics paraphernalia, held by the Marin County Sheriff's Office. The man was arrested and booked at the SF County Jail.
Monday, July 24, 6:58 PM
Fare Evasion/Warrant Service
Officers detained a female suspect for fare evasion. Record checks showed that she had three outstanding arrest warrants, totaling $19,500, for theft and possession of stolen property, held by San Francisco, San Mateo and Alameda Counties. The suspect was arrested and booked at the SF County Jail.
Officers responded to a report of a partially naked male in the station. Record checks showed that the man had an outstanding $20,000 arrest warrant for burglary, held by Fremont PD. The man was arrested and booked at the Martinez Detention Facility.
Battery on Train Operator (Prohibition Order)
A train operator was punched by a male suspect. An officer detained the man and he was identified by the victim. The suspect was arrested for battery on a train operator and was issued a prohibition order before being booked at the Martinez Detention Facility.
General Quality of Life Prohibition Order Issued Crimes Against BART Employees Assault/Battery
Possession of Narcotics for Sale/Warrant Arrest (Prohibition Order)
Officers detained a male suspect for loitering in a drug area. The man had no identification and provided a false name. A search incident to arrest revealed a quantity of suspected cocaine, packaged for sale. The man was booked at the SF County jail, where fingerprint checks revealed his true identity. Record checks showed that the man had outstanding arrest warrants totaling $300,000, for narcotics, stolen property and weapons charges, held by SFPD. The man was issued a prohibition order.
Warrant Arrest General Quality of Life Prohibition Order Issued Narcotics False Identification
Officers detained a male suspect for fare evasion. Record checks showed that the man had three outstanding arrest warrants: $125,000 for robbery, held by ACSO; $25,000 for narcotics violations, held by the Sonoma County Sheriff's Office; and $7,500 for narcotics violations, held by Newark PD. The man was arrested and booked at the SF County Jail.
Officers responded to a report of a male smoking on the Richmond bound train. They detained the suspect and learned that he had an outstanding $2,500 arrest warrant for battery on transit property, held by BART PD. The man was arrested and booked at the Martinez Detention Facility.
Officers detained a male suspect for fare evasion. Record checks showed that the man had an outstanding $25,000 arrest warrant for probation violation, held by ACSO. The man was arrested for his warrant and was booked at Glenn Dyer Jail.
Saturday, May 06, 10:13 PM
An officer on patrol detained a suspect for fare evasion and determined that the suspect was wanted on a no-bail felony warrant for assault with a deadly weapon. The suspect was cited for fare evasion and booked for the warrant.
Saturday, April 29, 11:56 AM
Possession of Narcotics/Possession of Drug Paraphernalia/Possession of Burglary Tools/Warrant Arrest
Critical Asset Patrol Team officers were conducting a high visibility operation at the Civic Center station when they were dispatched to drug activity occurring near the bicycle racks. They responded to the area and were directed to a group by a patron in the area. The officers detained three people and one male subject had a no bail misdemeanor warrant out of Alameda County for theft. During a search incident to arrest, the officers located a loaded syringe of suspected heroine, drug paraphernalia, and burglary tools. The suspect was booked into San Francisco County jail for his violations and warrant. The other two people detained were released.
Warrant Arrest Quality of Life Narcotics Burglary Tools
|
cc/2019-30/en_middle_0053.json.gz/line4677
|
__label__wiki
| 0.651131
| 0.651131
|
The NBA’s Best Out-of-Bounds Sets and Coaches
Ben Dowsett breaks downs some of the best out-of-bounds sets and coaches from around the NBA.
Ben Dowsett
Evaluating the day-in, day-out job of an NBA coach from a media perch will always be a supremely incomplete exercise. There’s just a ton of stuff that goes on within the confines of a given coach’s responsibilities that we’ll never see or hear about, and often some of the details herein are the biggest differentiators between what makes a good coach and a bad one.
There are bits of visible minutiae that allow us to judge a partial picture, though. Some of these are related to things like player development, in-game rotations, offensive and defensive schemes, and other elements – though even in these areas, player execution and other confounding factors will still always be at play. Over the years, though, one area that’s become a fun way to examine one distinct skill in a given coach’s arsenal has been looking at his team’s success on plays where coaches can have some of the largest tangible impact: out-of-bounds sets, particularly following timeouts and even more particularly in high-leverage situations.
Again, while this covers only a very small sub-section of a coach’s responsibilities and is absolutely influenced by external factors outside their control, it can be a fun proxy for which coaches are consistently the most inventive. A few guys have teams who consistently show up on the top end of efficiency for these kinds of plays year after year – at some point it’s no longer coincidence. It’s a real skill for coaches to draw up stuff that can create big openings given the constraints: just five seconds to get the ball inbounds, and a set defense waiting for trickery.
With that in mind, let’s have a little fun today. Here are a few examples, from basic to complex, of coaches running creative and exploitative out-of-bounds sets to get their teams some easy points. To the NBA junkie, this is more art than basketball (one quick clarification: these are not necessarily the teams or coaches who have the most consistent success, though several herein would be on that list).
Simple Stuff
Dwane Casey, like most coaches, has generally simple actions built into his scheme for out-of-bounds sets. He’s typically not looking for quick-hitters, but rather to get the ball inbounds safely to a free man and then initiate what’s been an efficient halfcourt offense in his time at the helm.
When teams start to prepare only for this, though, you can toss in the occasional wrinkle that preys on their assumption and finds an effortless look. See if you can spot the simple misdirection they use to get Cory Joseph a wide open three here:
James Johnson inbounds the ball, then immediately moves to take a Joseph down screen that looks like a standard way of getting Johnson into the post with good position on a smaller defender:
As he finishes his screen, though, Joseph leaps quickly up to the top of the key, and as he does, big man Lucas Nogueira activates what’s known as “screening for the screener” action, where he immediately sets a second pick for Joseph, whose man is already lagging way behind after trying to adjust for Joseph’s first screen. What results is gravy:
To be perfectly fair, some of the success on this play is Denver mangling their coverage somewhat badly. Jameer Nelson, checking Joseph, is a full second late realizing what’s happening. But it’s an example of how you can catch a team off guard with a small wrinkle if you normally run very simple stuff. The Raps are second in the league for sideline out-of-bounds efficiency, per Synergy Sports, and first for all after-timeout plays, in large part because they strike a good balance between low-risk stuff and the occasional bit of creativity.
More Inbounder Fun
Utilizing the inbounder as a piece of the resulting set is a popular way of creating some confusion, and Mike Budenholzer in Atlanta has an extremely simple way of doing so that’s almost guaranteed to create a mismatch at worst and a layup at best. It utilizes Paul Millsap (as the inbounder in this case) and Kyle Korver, two of the headiest players in the league, both of whom know exactly how their individual gravity will make defenses lean.
Millsap inbounds to the top of the key, then runs into a very similar Korver down screen as the one we saw from Toronto above. This is especially dangerous with Korver as the screen-setter – teams are quite wary by now of him setting screens as a way to get open threes for himself, and they don’t want to get burned. As a result, with no further complication needed, Millsap simply takes the screen and gets a layup when two OKC defenders are more focused on Korver:
It won’t always work this well, of course, but this easy set is nearly guaranteed to create at least small problems for the defense. At worst, Millsap likely ends up with good post position on a smaller defender who’s switched off of Korver, and if any D is too focused on Paul, one of the best off-screen shooters in league history gets an open triple. If they execute well and set firm screens, this is nearly guaranteed to create difficult rotations even in the best-case scenarios for the defense.
Gravity Machines
Another great way to find pockets of open space on inbound sets is to exploit the gravity certain shooters possess while on the floor, something the Hawks were doing above by utilizing Korver as their screen-setter. This can be done even more directly, though, and a couple coaches with some of the highest-gravity options in the game know just how to use them.
First take Rick Carlisle in Dallas, who has long been one of the strongest tactical minds in the game. Rick knows Dirk Nowitzki is one of the more unique gravity players to ever lace up – Dirk is big enough to set heavy screens on smaller guys, but such a threat from anywhere on the floor that teams are terrified of giving him any separation to help elsewhere.
We’ve slowed this one down so anyone watching carefully should be able to catch it. Watch as Dirk preps to set a basic cross-screen for Devin Harris to loop around (Dirk even motions for Harris to sell the façade), but a very easy counter (one that’s almost certainly at Harris’ own discretion when he sees the opening) gets one of the easiest layups you’ll see in the halfcourt:
Look what Jerami Grant (39), Dirk’s man, is doing as Harris cuts past him for the layup – he’s staring at Dirk:
In retrospect, Grant should have helped down on Harris to prevent the layup, which is a much more efficient shot in the long run than a Dirk jumper. But Carlisle and the Mavs are counting on defenses consistently overreacting to Dirk’s presence – his defenders have spent the better part of two decades hearing about how much trouble they’ll be in if they let this slow, lumbering seven-footer find an open jumper. Voila, you get a layup. Great stuff, Rick, and stuff he’ll have at his disposal in some form until the day Nowitzki hangs it up.
Another example of exploiting insane gravity from a single player comes from the Warriors, though in this case (like most of their stuff), it’s truly tough to discern how much is pre-planned involving Luke Walton or Steve Kerr and how much is just a group of remarkably heady players improvising awesomeness.
Steph Curry, of course, is the linchpin allowing space to open up everywhere else. Watch as he and Klay Thompson loop simultaneously, then proceed to enter into the “spin cycle” of confusion they’re better at than anyone else in the league, intentionally creating chaos within a group of players. Steph will often rocket out of these anarchical pockets with confused and defeated defenders too far behind, but on this occasion, he’s just a decoy for Klay:
Just…poetry. That’s all this is. Within a span of under half a second, Klay realizes that both his defender and Steph’s are going with Curry as he leaves the spin cycle and sprints back up outside the arc – so Thompson simply slips along the baseline and gets a wide open layup before anyone even knows what’s happening. The Dubs can do this kind of stuff from anywhere on the floor so long as Curry and Thompson (at least the former, at minimum) are in the game, and it’s no coincidence they’ve surrounded these guys with smart, unselfish ball-movers who can find them when they inevitably open up cracks.
Opinions will differ regarding which coaches are truly the best with their out-of-bounds and after-timeout sets, but a few names will appear frequently on these lists. Budenholzer and Carlisle were both listed above, but three others are perhaps the most common you’ll hear, not only for this niche area but for coaching overall: Brad Stevens, Gregg Popovich and Frank Vogel.
Brad Stevens in Boston has quickly developed a reputation as maybe the best in-game coach in the league, even surpassing guys like Pop and Carlisle in many eyes. He’s a legitimate savant for recognizing a trend or matchup that can yield his team an easy bucket, and while the execution can’t always be perfect, there’s an easy argument that he puts his group in a better position time in and time out than any other bench boss in the league. Watch the following Celtics set and see if you had even the slightest inkling of what was coming before it happened:
Not much analysis is really even necessary here. Stevens is the league’s foremost master at playing on what an opponent thinks is coming before pulling the wool over their eyes in an instant, and sets like these aren’t even uncommon at this point. Many keen observers would pick him over anyone else in the world if their life depended on an end-of-game OOB set working for two points.
Just a few years Stevens’ senior within the NBA ranks, Pacers coach Frank Vogel also has an excellent all-around reputation. The way he’s re-worked his team’s style on the fly this summer after wide roster turnover has been special, and the way he’s leveraged the shooting available to him on his roster has trickled down to some of his out-of-bounds actions. This one looks pretty standard at first glance, but see if you can catch what makes it work so well:
If you missed it, get ready for a slo-mo replay after we break it down, and keep a keen eye on the middle of the floor. Chase Budinger begins the set by streaking from the foul line past a Jordan Hill screen into the strong side corner, but this is a decoy action. C.J. Miles simultaneously moves over to set what appears to be a cross-screen for Monta Ellis to free Monta for a catch, but this is where it gets fun. Watch how Miles and Ellis do the same “spin cycle” reversal as the Warriors above, giving Hill his own extra beat to make his way in their direction before both Hill and Ellis end up screening for Miles as he backs out into an open triple:
Again, this is nothing complex – one decoy action to get eyes moving the wrong way, one extra reversal in the main action, and a lethal volume shooter gets an open three.
Finally, among the NBA’s OGs for creative play-calling is Spurs boss Gregg Popovich. To be totally honest, the 2015-16 iteration of the Spurs has involved less overall creativity on these sets than we might normally be accustomed to from Pop – he’s seemed more focused on entering the ball safely in general, allowing the Spurs to play the grind-it-out halfcourt style they’ve transitioned to on the year.
That doesn’t mean there’s no room for some ingenuity even on these sets, though. On this occasion watch Patty Mills, who starts the play on the strong side baseline – Mills makes as if to accept a pindown screen to the top of the key, but then acts almost as if he’s aborting his cut as the ball is instead inbounded to Manu Ginobili, slowing down as if to reset himself in the corner. But before the Bulls are ready, watch what Mills does next:
Yummy! One would prefer, of course, that Mills ended up behind the three-point line instead of shooting a long two, and the two cross-screens he gets from Spurs bigs could certainly have been better. But the quick action is designed as a way to catch a defense leaning the wrong way and initiate damning rotations, which the Spurs are the class of the league at exploiting. No one will ever out-Pop Pop.
How the NBA’s Top Shooters Do Their Damage
VIDEO: Discussing Early NBA Trade Rumors
Ben Dowsett is a Deputy Editor and in-depth basketball analyst based in Salt Lake City. He covers the Jazz on a credentialed basis for Basketball Insiders, and has previously appeared in the Sports Illustrated and TrueHoop Networks. He can be found on Twitter at @Ben_Dowsett.
Basketball Insiders’ Intern Program 2018-2019
Maximum Salary Cap Space Projections for 2018-19
PODCAST: Lonzo’s Shot, How To Cut Luol Deng and More
|
cc/2019-30/en_middle_0053.json.gz/line4678
|
__label__wiki
| 0.709595
| 0.709595
|
Lennon and McCartney finish writing She Loves You
Thursday 27 June 1963 Songs 1 Comment
The day after they began writing She Loves You in a Newcastle hotel room, John Lennon and Paul McCartney finished the song in the dining room of McCartney's family home at 20 Forthlin Road, Liverpool.
We sat in there one evening, just beavering away while my dad was watching TV and smoking his Players cigarettes, and we wrote She Loves You. We actually just finished it there because we'd started it in the hotel room. We went into the living room – 'Dad, listen to this. What do you think?' So we played it to my dad and he said, 'That's very nice, son, but there's enough of these Americanisms around. Couldn't you sing, "She loves you. Yes! Yes! Yes!"' At which point we collapsed in a heap and said, 'No, Dad, you don't quite get it!' That's my classic story about my dad. For a working-class guy that was rather a middle-class thing to say, really. But he was like that.
Many Years From Now, Barry Miles
Live: Majestic Ballroom, Newcastle
Live: Queen's Hall, Leeds
2014: Ringo Starr live at DTE Energy Music Theatre, Clarkston, Michigan
2013: Paul McCartney live at Ernst-Happel-Stadion, Vienna, Austria
2010: Paul McCartney live at Hard Rock Calling, Hyde Park, London
1968: Recording: Everybody’s Got Something To Hide Except Me And My Monkey
1966: Travel: Hamburg, London, Alaska
1965: Live: Teatro Adriano, Rome, Italy
1964: Live: Majestic Theatre, Christchurch, New Zealand
1962: Live: Cavern Club, Liverpool (evening)
Paul D Monday 24 November 2014
Just my theory but could some of the lyrics of She Loves You have been subconsciously inspired by the Bob Wooler incident?
The reason I say so is that it was six days previously i.e before writing commenced, that Lennon was ordered by Epstein to send a telegram apology to Wooler. Check out the lyrics:
“You know it’s up to you
I think it’s only fair
Pride can hurt you too
Apologize to her”
Also..
She said you hurt her so
She almost lost her mind (Lennon actually said he was out of his mind)
And now she says she knows
You’re not the hurting kind
The whole theme of the song is of reconciliation. I think the fact that the events were so close and that it really shook Lennon up (he said he thought he was close to killing Wooler) it can’t be coincidence. Or perhaps McCartney wrote those words in the third person with the events in mind.
|
cc/2019-30/en_middle_0053.json.gz/line4682
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.