pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
112
978k
source
stringlengths
37
43
__label__wiki
0.959704
0.959704
Vic Mensa Chicago, IL Hip-Hop, Rap 26,291 Downloads VicMensa1 VicMensa Mixtapes (2) Albums (0) Videos (3) About INNANETAPE Vic Mensa & Valee Vic Mensa ft. Pusha T We Could Be Free Vic Mensa ft. Ty Dolla $ign About Vic Mensa The founder of the SAVEMONEY collective who earned underground cred before he took it major, Chicago rapper and Roc Nation artist Vic Mensa made his debut in 2013 on Chance the Rapper's high-profile mixtape Acid Rap. Born Victor Kwesi Mensah, the rapper issued some solo product while a member of the hip-hop group Kids These Days, including the Straight Up EP in 2010, but it wasn't until their breakup in 2013 that he considered making a career out of going it alone. He didn't squander any time either, as he formed the SAVEMONEY crew in 2013 and appeared on fellow member Chance the Rapper's Acid Rap mixtape that same year, along with issuing his own mixtape, Innanetape, a mixing of the words "Internet" and "mixtape." Like Chance's before, Mensa's mixtape was both a critical and download-counting success, so much so that the independent rapper joined major-label artists J. Cole and Wale on their What Dreams May Come tour in 2014. That same year he topped XXL Magazine's Freshman Class list and released the hit single "Down on My Luck" on Virgin Records. He then appeared alongside Sia on Kanye West's 2015 single "Wolves," and Kanye returned the favor with a feature on "U Mad," Mensa's first single for his new label, Roc Nation. There's Alot Going On, Mensa's debut EP, arrived the following year. Another EP, The Manuscript, arrived in early 2017, and preceded the July release of Mensa's proper debut album, The Autobiography.
cc/2019-30/en_head_0021.json.gz/line1730127
__label__wiki
0.876927
0.876927
Peace talks restart in Geneva over Syria: Will they do any good? Dr. Abdul Ruff [yt_dropcap type=”square” font=”” size=”14″ color=”#000″ background=”#fff” ] S [/yt_dropcap]ix years ago, USA successfully instigated a civil war in Syria by using its opposition in order to remove President Assad from power and now with Russia supporting the Assad regime, escalation has reached the zenith. They now seek de-escalation of crisis in Syria without any sincere intention even as there is no possibility for Assad to step down or removed in any way. In fact, USA did not want to remove or kill Assad as it had done with Iraqi President Saddam Hussein. It only wanted to destabilize entire Arab world one by one. While President Saddam Hussein was a threat to US imperialism and its efforts to control Arab oil, Libyan leader President M. Qaddafi challenged US power, Syrian leader Assad was never such a threat to US power and control mechanism. That is the prime reason why Pentagon-CIA duo has left Assad alive. After all, he is only helping with the execution of US agenda of destabilization of Mideast. That is the reason why all the peace efforts by UN have failed. The United Nations has now convened a new round of indirect Syrian peace talks in Geneva, despite President Bashar al-Assad dismissing them as irrelevant. De Mistura met the government’s chief representative, Bashar al-Jaafari, at UN headquarters on Tuesday morning as the sixth round of talks got under way. The UN envoy said he would see Nasr al-Hariri and Mohammad Sabra of the main umbrella group representing political and armed opposition factions, the High Negotiations Committee (HNC). De Mistura told reporters the intention was to be “more businesslike, both in our meetings and in the way we hope we can get some progress”. The rooms would be small, the meetings would be more interactive and frequent, and discussions would be focused on particular subjects in an effort to achieve “more movement”, he said. De Mistura told played down last week’s dismissive comments by Syria’s president, who said the Geneva talks were “merely a meeting for the media” and praised the parallel process taking place in Kazakhstan’s capital that has been organised by the government’s allies Russia and Iran, along with key opposition backer Turkey. As the civilian death toll has mounted over the past six years, President Bashar Assad has rejected all allegations of atrocities as “devoid of logic” because “the Syrian Army is made up of Syrian people.” When confronted with overwhelming evidence of systematic violations of the laws of war, he has stuck to this line, insisting: “We don’t kill civilians, because we don’t have the moral incentive, we don’t have the interest to kill civilians.” Why don’t the Pentagon forces bomb the Assad palace and end the bloodshed? Apparently, without permission of Moscow, Washington simply cannot even think of doing that. Also, the great internationalization of Syria’s conflict and the fact that its rebels seek to topple the government work in Assad’s favor. Syria is a strong state with well-organized military fighting territory-holding rebels who have significant popular support. The scale of civilian death and the pattern of violations constitute human horrors of rights: custodial torture and extrajudicial killings of suspected regime opponents, attacks on civilian targets including hospitals and aid conveys, and the use of prohibited weapons. And in both cases international audiences raised the alarm about mass atrocities. Assad has said “nothing substantial” will come out of the talks. But UN envoy Staffan de Mistura insists that the government’s 18-strong delegation is in Switzerland “to work”. Five previous rounds of negotiations have made little progress towards a political solution to the six-year civil war, which has left more than 300,000 people dead. The Astana process resulted in the three powers signing a memorandum on 4 May establishing four “de-escalation” zones in the north-western province of Idlib, north of the central city of Homs, the Eastern Ghouta area outside Damascus, and in the southern provinces of Deraa and Quneitra. “We are working in tandem, in a way,” de Mistura said. “Everybody’s been telling us and we agree that any type of reduction of violence, in this case de-escalation, cannot be sustained unless there is a political horizon in one direction or the other. That is exactly what we are pushing for,” he added. The government and opposition have agreed to discuss four “baskets” – a political transition, new constitution, elections and combating terrorism. Meanwhile, officials from the Syrian government denied accusations that a prison crematorium was being used to hide mass killings of political prisoners. The Syrian foreign ministry said the accusations – made by the US state department – were “a new Hollywood story” and “totally baseless”. An anonymous source quoted in the statement accused the US government of making the allegations up to justify US aggression in Syria. Residents of a Damascus suburb are working to bring a sense of normality back to their lives after six years of war. When the rebel groups seized Eastern Ghouta in 2012, the Assad government responded by cutting basic services like power and water and also laying a military siege to the area, making life of people miserable. .UN has not made any speedy arrangements to mitigate the sufferings of such stranded populations. Over time, residents have worked to provide the kind of basic functions that many urban communities take for granted. But their efforts are often hampered by the brutal and prolonged conflict that touches every aspect of life. “Our reality is being intentionally isolated from the rest of the world,” Abou Ramez, one of the pioneers of civil projects there told the BBC. An elected “municipal council” for all opposition-held areas in the Damascus countryside was also formed, as well as an umbrella organisation representing over a hundred medical, relief, educational and other civil institutions.. Local councils were initially formed to provide relief work and basic municipal services, such as water and waste management. “We used cow manure to generate energy for generators to irrigate land,” Ramez says. Power is also generated from waste products, and heating oil extracted by melting plastic. Over time the councils’ role expanded to providing education and counseling centres. Projects are funded by external donors. Ramez, says that councils try to remain neutral towards militant groups, but they also recognize the opposition “interim government”, formed in 2013 and based in Turkey. Today, Syria tops the list of deadliest countries for journalists, in large part due to regime attacks on the domestic press. Humanitarian aid delivery has been restricted since the conflict began. In Syria, these measures cut off nearly all sources of independent information. In 2016, Assad disputed the existence of the Aleppo siege, arguing that if it were true, “people would have been dead by now.” (One estimate suggests that more than 30,000 people died in Aleppo between 2012 and 2016.) The regime has disputed the authenticity of photo and video evidence of chemical weapons attacks, barrel bombs, torture, and extrajudicial killings. Assad’s farcical suggestion last month that the dead children in the videos from Idlib were mere acting children. Syria disputed the attribution of all war crimes it can’t deny, and portrayed its opponent as the only blameworthy actor. Early in the conflict, Assad told international media that “Most of the people that have been killed are supporters of the government.” In 2013, he rejected responsibility for the sarin gas attack in Ghouta, insisting “We’re not there.” Finally, the Syrian government has accused the rebels of using civilians as human shields, and excused its targeting of hospitals and schools on the grounds that “terrorists” are using them as bases and weapons storage. Obfuscation and denial can be enough to exploit this inertia and prevent intervention, especially when big powers like USA and Russia shield them. Syrian reality shows that even an international pariah can get away with mass murder. The Syrian government does not recognize the councils and characterizes organised activity within rebel areas as the work of armed militia or “terrorist” groups. “It is exactly this kind of civil body that constitutes the biggest threat for the regime,” says Majd al-Dik, whose team works on opening support centres for children. It has also worked to put Eastern Ghouta’s large agricultural areas to use, by supporting local farmers to provide food for residents. However, Syrian forces seized the farmland just one week before the harvest in 2016. “Turning people from service providers into dependents – this is the goal behind targeting civilians,” al-Dik told the BBC. Over 42 councils have been formed in the area since 2013, and members have been elected through democratic means since 2015. Recurring internal fighting between rebel groups has also added to the obstacles facing civil work in Eastern Ghouta. When infighting first broke out in 2016, residents, activists and notable civil society figures staged demonstrations and sit-ins against the violence. Civil society figures also mediated between the disputing sides. And in late April 2017 – exactly a year later – clashes broke out once again and several civilians were injured as they protested. Al-Dik says that movement around the area is severely restricted due to rebel snipers and checkpoints. Meanwhile, the Syrian army and its allies have been advancing in the nearby strategic suburb of Qaboun, further tightening the siege and increasing the possibility of bombardment on the area. Around two million people lived in Eastern Ghouta before the war began in 2011. Today there are just around 400,000. As well as the threat of violence, residents also face the fear of forced evacuation as the conflict turns in the government’s favour. In recent months, thousands of people in rebel-held towns have left their homes as part of deals between the government and armed groups. “To evacuate the area is to destroy the civil body that has been established,” Majd al-Dik says. “It’s a catastrophe”. The Syrian government maintains that evacuations are not being forced on civilians. Looking ahead to post-war Syria, Majd al-Dik says: “People ask about alternatives. But no-one talks about the local councils or civil institutions. Who is providing services in such areas now in the worst possible conditions?” Ramez says that many in Eastern Ghouta will never leave their homes. “Over 200,000 of our residents are capable of carrying weapons. Their united choice is to die and be martyred on this land rather than move to other areas only to be annihilated later on.” Peace talks between Israel and Palestine have never been successful because Israel doesn’t want to give up the occupation posts and return the lands stolen from Palestinians. As talks have become bogus tools to gain legitimacy for illegal occupation and genocides. In Syria, none is sincere about peace or stability, including the President Assad who just wants to be the permanent president without facing any elections. Maybe he thinks he has no death.. UN must step in to end hostilities in Syria and genocides and bring back normalcy. Peace task are necessary but without sincerity nothing is going to work. Both USA and Russia are fighting their old cold war in Syria. The Assad regime’s close relationship with Russia means that it is well-protected. For six years, victims’ advocates, international human rights activists, and horrified onlookers have been asking themselves how high the death toll in Syria has to get before someone will step in. But international action on mass atrocities is the exception rather than the rule. Like Bush and Obama, Assad also should be tried for crimes against humanity. Related Topics:DAESHDefenseRussiaSyriaTerrorismUNUSA Tasks before reelected Iran President Hassan Rouhani Income Inequality, Polarization of Societies Biggest Long-Term Impact on Arab World Dr. James M. Dorsey Saudi attitudes towards the plight of thousands of illegal Rohingya in the kingdom fleeing persecution in Myanmar and squalid Bangladeshi refugee camps help explain Saudi support for China’s brutal clampdown on Turkic Muslims in its troubled, north-western province of Xinjiang. For more than half a year, Saudi Arabia has been deporting large numbers of Rohingya who arrived in the kingdom either on pilgrimage visas or using false travel documents, often the only way they were able to leave either Myanmar or Bangladesh. The expulsions of Rohingya as well as hundreds of thousands of other foreign workers coupled with the introduction of fees on their dependents and restrictions on the sectors in which they can be employed are part of crown prince Mohammed bin Salman’s efforts to reform the kingdom’s oil-dependent economy and increase job opportunities. The success of Prince Mohammed’s reforms rests to a large extent on his ability to reduce an overall 12.7 percent unemployment rate that jumps to 25.8 percent among its youth, who account for more than half of the population. Threatening up to 250,000 Rohingya believed to be residing in Saudi Arabia, the expulsions contrast starkly with condemnations by the kingdom as well as the Jeddah-based Organization of Islamic Cooperation (OIC) of Myanmar’s persecution of the Rohingya. The OIC last month called for filing a case against Myanmar at the International Court of Justice for its alleged violations of the Rohingya’s human rights. Some 750,000 Rohingya have fled to Bangladesh in recent years where they are housed in refugee camps. Saudi Arabia has donated millions of dollars in aid for the refugees and has said it is “gravely concerned and condemns the policy of repression and forced displacement carried out by the government of Myanmar against the Rohingya minority.” The deportations together with Saudi endorsement of the clampdown in Xinjiang that has put an estimated one million Uyghurs in re-education camps, where they are indoctrinated to prioritize communist party ideology and President Xi Jinping thought above their Islamic faith, suggests that the kingdom is not willing to compromise its economic interests even if they call into question its moral claim to leadership of the Islamic world. The Saudi approach constitutes a double-edged sword. On the one hand, its leadership role is bolstered. A majority of Muslim countries reluctant to criticize China take heart from the fact that the custodian of Islam’s two holiest cities, Mecca and Medina, has taken the lead in shielding China from Muslim criticism. On the other hand, China like other Muslim nations is making a risky bet in which it could end up on the wrong side of history. While there are no signs that hopelessness is fuelling widespread radicalization among the Rohingya, analysts suggest that in the Bangladeshi camps “almost every factor identified by radicalisation experts can be found, to a greater or lesser degree… It would only take a very small percentage of them (the refugees) to be radicalised for there to be a major security problem.” The emergence of Rohingya militancy with Saudi treatment of members of the group constituting one of the grievances could make the kingdom a target. Similarly, if history is anything to go by, Saudi Arabia and Muslim countries, are betting against the odds that China will succeed to Sinicize Turkic Muslims and ensure that growing anti-Chinese sentiment in Central Asian nations with close cultural and ethnic links to Xinjiang is kept in check. Adrian Zenz, a leading scholar on Chinese policy towards religion and minorities, has argued that past attempts to Sinicize minorities have failed. He said his research among Sinicized Tibetans showed that even assimilated Tibetans could become champions of the very ethnic identity they supposedly had renounced. Similarly, Mihrigul Tursun, an Uyghur activist released from a re-education camp, told the US Congress that “my experience in this state program actually made me more conscious of my ethnic identity.” Describing the Chinese clampdown in Xinjiang as an “upgraded version of the Cultural Revolution,” Mr. Zenz recently noted that Tibetan nomads and Christian villagers were being forced to replace their altars and depictions of Jesus with images of Chinese leaders, including Mr. Xi. Mr. Zenz’s reference to Tibetans and Christians highlights the fact that non-Muslim countries have been equally reluctant to put their money where their mouth is in condemnations of China’s assault on religion that go beyond Islam and are part of a larger attempt to replace religion with adherence to the country’s communist party and reverence of its party and political leaders. Nonetheless, Saudi Arabia is walking a tightrope in balancing its national interests with expectations of its role as a leader of the Muslim world. While needy Rohingya and other illegal Muslim workers were detained and deported to an uncertain future that was likely to fuel despair and hopelessness, Saudi Islamic affairs minister Abdullatif bin Abdulaziz al-Sheikh announced that King Salman would host for this year’s pilgrimage to Mecca 200 relatives of the victims of the attacks by a white supremacist on two mosques in New Zealand’s Christchurch. Fifty people died in the attacks. Clearly designed to project the kingdom as a generous supporter of Muslim causes and improve its image tarnished by the war in Yemen and last year’s killing of Saudi journalist Jamal Khashoggi, Mr. Al-Sheikh said the invitation was part of Saudi Arabia’s counter-terrorism effort. While public sentiment towards the clampdown in Xinjiang remains unclear despite vocal Saudi support for the plight of the Rohingya in Myanmar and Bangladesh, indications are that a significant segment of the kingdom’s population remain wedded to its ultra-conservative interpretation of Islam. A recent poll on Twitter showed that a majority of Saudis was opposed to the proposed halt to forcing stores to close during prayers, a key part of the kingdom’s tradition of enforced public religiosity. Adherence to ultra-conservative norms raises the question whether those segments of the Saudi population may be more empathetic to the plight of the Uyghurs. As part of its effort to co-opt the Chinese Diaspora and counter criticism, China has sought to woo Saudi Arabia’s ethnic Chinese community. To do so, China’s consulate in the Red Sea port of Jeddah hosts events not only in Mandarin and Arabic but also Uyghur, according to Mohammed Al-Sudairi, a Saudi China scholar. Mr. Al-Sudairi attributed China’s focus on Saudi Uyghurs, one of the largest and wealthy Chinese Turkic diaspora communities, “to the role of this community as a stronghold for anti-Chinse and anti-CPC (Communist Party of China) sentiment in Saudi Arabia, and one that has had some influence in shaping Saudi elite and popular perceptions toward the PRC (People’s Republic of China) and CPC.” That focus suggests that public sentiment towards the plight of Muslims in places like Myanmar and Xinjiang may be more layered than positions put forward by Muslim leaders. Eric Zuesse The success of Turkey’s takeover of Syria’s most pro-jihadist province, Idlib, is making less and less likely that Syria will be able to continue maintaining Idlib as being a part of Syria. (This is something I had predicted, back on 14 September 2018, to be possible or even likely, and now it is actually happening.) On July 10th, Reuters headlined “Assad hits a wall in Syrian war as front lines harden”, and reported that, “More than two months of Russian-backed operations in and around Idlib province have yielded little or nothing for Assad’s side. It marks a rare case of a military campaign that has not gone his way since Russia intervened in 2015. While resisting government attacks, the insurgents have managed to carve out small advances of their own, drawing on ample stocks of guided anti-tank missiles that opposition and diplomatic sources say have been supplied by Turkey.” It continues: Moscow has appeared keen to preserve its ties with Ankara even as its air force bombs in support of Assad: Turkey says Russia has intervened to stop attacks on Turkish forces from Syrian government-held territory. … The Idlib area is dominated by Tahrir al-Sham, the jihadists formerly known as the Nusra Front. [And before that, they were called Al Qaeda in Syria, but Western news-agencies, such as Reuters, prefer not to mention that fact, especially because the U.S. used_Nusra to train ‘our’ proxy boots-on-the-ground ‘moderate rebels’ in Syria to bring down Syria’s Government. Elsewhere, the Reuters article calls them ‘insurgents’.] Some 300,000 people fleeing bombardment have moved toward the Turkish border since April, prompting the United Nations to warn that Idlib was on the brink of a “humanitarian nightmare”. For Ankara, the Syrian opposition’s last major state sponsor, preventing another major influx of Syrian refugees is of paramount importance: Turkey already hosts 3.6 million of them. … A Russian private military contractor who was based near Idlib province told Reuters that rebel fighters there are far more professional and motivated than their adversary. Pro-government forces cannot win the battle for Idlib unless Moscow helps them on the ground, he said. … “Of course the regime [that’s the legitimate Government, but Western ‘news’-agencies such as Reuters call it ‘the regime’, and most of their audience don’t even recognize that their own intelligence has just been insulted by Reuters when it calls Syria’s Government a ‘regime’, which only the invading countries actually are] has the desire to recover Idlib by force [as if the sovereign Government of Syria doesn’t have this right — it’s Syrian territory, after all, but Reuters doesn’t care about that fact], but … without the Russians it can’t [tsk, tsk: those ‘nasty’ Russians are defending Syria from the supposedly ‘kindly’ U.S.-Saud-backed proxy-armies that are led mostly by Al Qaeda in Syria, and which invaders have actually destroyed Syria], because there are many militants and the Russians are completely committed to the Turks,” the source said. Reuters, naturally, quotes enemies, not defenders, of Syria. Western mainstream ‘news’-media are constantly insulting the intelligence of their audiences, as if their audiences cannot distinguish propaganda from honest news-reporting. Unfortunately, however, their assumption on that might be right. Syria’s Government is fighting hard against jihadist forces in Idlib who meet Turkey’s standard of being ‘moderate rebels’ against Syria’s Government, but unless Russian forces there — which were invited in by Syria’s Government, instead of being invaders there like Turkey and the United States are — will commit far more forces for the defense of Syria (which seems increasingly unlikely), Turkey will win Idlib as being a part of Turkey. Consequently, Turkey is already starting to build infrastructure even immediately to the north and east of Idlib in order to stake its claim to a yet larger portion of Syria than just Idlib. This might not have been part of the deal that was worked out by Russia’s Putin, Iran’s Rouhani, and Turkey’s Erdogan, in Tehran, on 9 September 2018, which agreement allowed Turkey only to take over — and only on a temporary basis — Idlib province, which is by far the most pro-jihadist (and the most anti-Assad) of Syria’s 14 provinces. Turkey was instead supposed to hold it only temporarily, but the exact terms of the Turkey-Russia-Iran agreement have never been publicly disclosed. Until that 9 September 2018 Tehran conference, Idlib had been the province to which Syria’s Government was busing defeated jihadists who had surrendered instead of choosing to stay and die where they were. Syria’s Government had given its surrounded jihadists this final option, in order to reduce as much as possible the numbers of jihadists’ civilian hostages who would also likely be killed in an all-out bombing campaign there. So, the existing population of Idlib, which was already the most pro-jihadist in Syria, was now starting to overflow with the additional thousands of defeated jihadists who had chosen to surrender instead of to be immediately killed. At that time, just prior to the Tehran conference — and this was actually the reason why the conference was held — the U.S. and its allies, and the U.N., were demanding that an all-out invasion of Idlib, which had been planned by the Governments of Syria and of Russia, must not take place, for ‘humanitarian’ reasons. There was all that ‘humanitarian’ concern (led by the United States) for the world’s biggest concentration of Nusra and Nusra-led jihadists — and for Syria’s most jihadist-supporting civilian population. So much ‘kindness’, such ‘admirable’ ‘humanitarianism’. Furthermore the U.S. Government was threatening to greatly increase its forces against Syria if that invasion by Syria and by Russia into Idlib (which is, after all, part of Syria — so, what business is it, even of the U.N., at all?) were to be carried out. The Tehran conference was meeting in order to resolve that emergency situation (mainly America’s threats of a possible war against Russia), so as to forestall this attack. However, now that it’s clear that Erdogan will not follow through on his generally understood promise that this would be only a temporary military occupation of Idlib, the question is: what can Syria and Russia and Iran do to keep Idlib inside Syria, and whether they even want to do so. If Syria loses those jihadists, then not only will it lose the perhaps hundred thousand surviving jihadists there — many of whom came from other countries in order to fight against Syria’s secular Government — but also will lose some of those Idlib natives, who were always against Syria’s secular Government. Since those people would no longer be voting against Bashar al-Assad, because they would become Turks, this would actually be a Syrian political advantage for Assad. Yet, he has been resisting it, in order to hold Syria together. He has always been committed to holding Syria together. Turkey’s negotiating position is exceptionally strong, because Turkey now is riding the fence between the U.S. alliance, NATO (of which Turkey has been the only predominantly Muslim member ever since it joined in 1952), versus Russia. According to a major report in English from Iran’s Fars News Agency — which had translated from published Arab sources in many countries and which report hasn’t been denied by any of them — Russia had saved Erdogan’s life on 15 June 2016, when there was a coup-attempt to get rid of him. Headlining on 20 July, just five days after the failed coup, “Erdogan Warned of Incoming Coup by Russian Alert”, Fars said that, Several Arab media outlets, including Rai Alyoum, quoted diplomatic sources in Ankara as saying that Turkey’s National Intelligence Organization, known locally as the MIT, received intel from its Russian counterpart that warned of an impending coup in the Muslim state. The unnamed diplomats said the Russian army in the region had intercepted highly sensitive army exchanges and encoded radio messages showing that the Turkish army was readying to stage a coup against the administration in Ankara. The exchanges included dispatch of several army choppers to President Erdogan’s resort hotel to arrest or kill the president. The standard treatment of this matter in U.S.-and-allied ‘news’-media was to ignore the coup and to downplay any U.S. role in it, but other news-media haven’t been so dismissive — for examples: On 29 July 2016, Erdogan tactfully suggested that “US general is on side of coup plotters: Erdoğan”, as one Turkish newspaper headlined it. On 2 August 2016, the New York Times bannered “Turks Can Agree on One Thing: U.S. Was Behind Failed Coup”. On 18 August 2016, I headlined at Strategic Culture Foundation, “What Was Behind the Turkish Coup-Attempt?” and provided some of the reasons why the U.S. regime almost certainly was. On 8 July 2019, Michel Chossudovsly, at his Global Research, headlined “A Major Conventional War Against Iran Is an Impossibility. Crisis within the US Command Structure” and he said, “Turkey’s exit from NATO is almost de facto. America can no longer rely on its staunchest allies.” He even said “Turkey is now aligned with Russia and Iran.” However, his article didn’t so much as even mention the coup — nor any other possible reason for this shocking switch. In any case, after that event, Turkey’s foreign policies definitely switched away from being clearly U.S.-allied, to being on the fence and calculated purely to serve Turkey’s advantage, no longer tied, at all, to NATO or the U.S., and, in many important respects, very much contrary to the U.S. regime. In fact, Erdogan has been emphatic that this coup had been led by Fethullah Gulen, a billionaire Muslim cleric, formerly allied with Erdogan, who since moving to the U.S. in 1999 has been his bitter enemy. In fact, some of NATO’s forces in Turkey were participating in the attempted coup. However, Erdogan holds on tenaciously to that NATO membership, because it gives Turkey enormous leverage it can use in order to grab territory from Syria, which the U.S. regime wants Turkey to do. Here is how Erdogan has clearlly committed Turkey to taking at least parts of Syria’s northeast: On 6 June 2018, Reuters headlined “Turkish university to open campus in northern Syria” and reported that, “Turkey’s Harran University, in the southeastern province of Sanliurfa [Turkey], said it is preparing to open a faculty in Al-Bab [Syria] for students in towns under Turkish control. … The Turkish cabinet has also approved opening a vocational high school in Jarablus [Syria] affiliated with Gaziantep University, Turkey’s official gazette said on Tuesday.” On 30 July 2018, Syria.LiveuaMap headlined “Turkey start[s] to build highways starting from Cobanbey-al-Bab to Jarablus-Manbij in Syria” — all of which is in the parts of Syria’s north that Turkey controls. On 23 May 2019, Gaziantep University posted an announcement of “The Global Syrian Refugee Crisis” conference to be held in Gaziantep, Turkey, on 14-18 October 2019, and also announced that: “The medium of instruction of our university is entirely English in %80 of faculties and Turkish in some faculties. However, after the ferocious civil war in Syria, we opened four departments (Engineering, Architecture, Administration and Theology) that teach in Arabic language. This was achieved by hiring Syrian academic staff in these programs which created opportunities for refugee students who want to continue their studies in Arabic.” So, it does seem to be Erdogan’s intention that directly across the border in Syria, this part of what has, until recently, been a part of Syria, is to be instead a part of Turkey. This would be the chief favorable outcome for the U.S. regime resulting from the Syrian portion of the CIA-planted “Arab Spring” rebellions in 2011. On 27 May 2019, the Daily Sabah headlined “Turkey to Build New Faculties to Promote Higher Education in Northern Syria” and reported that Gaziantep University, located in southern Turkey close to the Syrian border, decided to offer education for Syrians living in the northern part of the war-torn country, the areas that were liberated by Turkey’s two cross-border operations. … The university applied to Turkish education officials to set up four faculties in northern Syria’s al-Bab, Azaz and Mare districts, which is planned to focus on economics, business, teaching and engineering; some 2,700 prospective students have already taken proficiency exams. The faculties will be the second move by Gaziantep University as it previously opened a vocational school last year in Aleppo’s Jarablus district. While vocational education currently continues in five departments, the university is planning to expand it with four more and to provide education for 500 students. In 2016, Turkey launched Operation Euphrates Shield and cleared about 2,000 kilometers of area in northern Syria, which was once dragged into darkness by the Daesh terrorist organization. This seems to reflect Syria’s actual capitulation to Turkey, which henceforth is to control that area — permanently. The only question now is how large the seized area will turn out to be. The first person, it seems, who recognized quickly the significance of this takeover was the tweeter “domihol” who on 28 May 2019 posted Turkey is also throwing serious money at its seemingly permanent slice of Syria. You don’t build universities just so Damascus can take it over soon. Right below that is his: I’m sorry to say – my prediction for Syria’s near and possibly medium term future still holds … Dominic | دومينيك added, [15 December 2018] prediction: TRUMP gets the oil & gas ERDOGAN gets the water PUTIN gets the “mission accomplished” moment … 9:49 AM – 28 May 2019 However, his predictions there (as is routine for tweets, which are good for communicating only bumper-stickers) are unsupported by anything. For example: Where is Turkey’s oil and gas? Is it actually anywhere near to the Turkish border? Here’s a map which shows where it is, and that’s certainly not near the Turkish border. In addition, the U.S. regime is evidently preparing to assist Turkey’s takeover of parts of Syria, but focuses it specifically against Iran. On 24 May 2019, the U.S. State Department advertised a “Grant Opportunity” for NGOs to be “Supporting Local Governance and Civil Society in Syria” and are offering up to $75 million to each, in order to “Counter extremism and disinformation perpetuated by Iranian forces” and “End the presence of Iranian forces and proxies in Syria” and otherwise support America’s war against Iran. Perhaps the U.S. and Turkey have agreed that U.S. operations against Syria will continue in the Turk-seized areas after the U.S. occupation of the remaining parts of Syria has ended. If Assad were to give a press conference now, the first question to ask would be: “Is Syria going to allow Turkish universities and highways to be built on Turk-seized Syrian territory?” Because, if the answer to that is anything like yes, then not only would it seem that Turkey has won against Syria and Russia and Iran, but so too has the U.S., whose fall-back position, ever since it first tried a coup in Syria in 1949, has been to at least break off a piece of Syria, when and if it failed to take the whole thing. The construction of a Turkish university, highway, and/or etc., in Syria, would be a huge apparent win for Donald Trump, but an even bigger apparent victory for Tayyip Erdogan, who now seems to be, yet again, a member of America’s alliance against Russia. (And Iran, too, would seem to be endangered by Syria’s apparent defeat in that part of Syria. But maybe not: is Turkey going to end altogether its alliance with the U.S.?) Usually, successful aggression is impossible without allies, and the U.S., again, seems to have Turkey as one — and as an extremely important one (more important, perhaps, than ever before). The U.S. Government wants to remove land from Syria’s Government. The Turkish Government wants to be the Government that actually takes it. So, U.S. and Turkey seem to have made a deal. Turkey took Syrian territory while promising (as the Qatar regime’s Al Jazeera headlined on 5 June 2018 — “YPG confirms withdrawal from Syria’s Manbij after Turkey-US deal”). Al Jazeera reported there that, “The Syrian Kurdish People’s Protection Units (YPG) said its military advisers would leave the town of Manbij a day after Turkey and the United States said they reached an agreement on the armed group’s withdrawal.” Those two foreign invaders against Syria (Turkey and U.S.) came to this agreement in Washington DC, regarding their respective invasions: Turkish forces won’t conquer YPG (separatist-Kurd) forces in any part of Syria unless and until that part has already become instead a part of Turkey — swallowed-up by Turkey. The U.S. will be protecting those Kurds until the U.S. ends its military occupation of Syria. After that, those Kurds will be on their own. Back on 10 January 2018, Elijah J. Magnier had commented, “Syrian President Bashar Al-Assad also considers Turkey to be another occupying force in northern Syria. He would like to liberate the entire Syrian territory, which is not the case with Russia, which would prefer to end the war as soon as possible and undertake the work at the negotiating table.” Magnier seems to have been correct: Russia appears not to be objecting to Turkey’s land-seizures in Syria. Therefore, Turkey is a “middle-man” between both U.S. and Russia — strategizing with both. On 19 January 2018, Tony Cartalucci commented, “The Syrian government with support from its Russian, Iranian, and Lebanese allies has embarked on a major military operation to retake parts of Syria’s northern governorate of Idlib. As it does so, the US and its regional allies are rushing to position themselves to ensure the permanent partition of Syria is achieved.” He continued (all of which has likewise subsequently been borne out): It should be noted that Afrin is located between [Idlib and] territory Turkey is currently occupying. Turkish troops, should they seize Afrin [which they soon did] , would effectively have expanded Turkey’s “Euphrates Shield” by 30 miles (53 km) and present an opportunity for its troops to link up with troops of Turkey’s “Idlib Shield.” This would create a large, singular buffer zone within which US-NATO forces could harbor militants driven back by Syria’s most recent offensive. Depending on Turkey’s success, the zone could be expanded even further, even as far as including Idlib city itself [which happened in September of that year] – thus granting the US an opportunity to present it as a second Syrian “capital” much in the way Benghazi was used in Libya during US-led regime change there. There remains, however, the fact that Idlib is openly occupied and administered by Al Qaeda, making the proposal of transforming it into an “opposition capital” particularly dubious. Meanwhile, the US itself continues its own uninvited, illegal occupation of Syrian territory east of the Euphrates, having previously justified the invasion and occupation of Syrian territory under the guise of fighting the so-called “Islamic State” (ISIS). … The US occupation of Syrian territory will be difficult for Damascus and its allies to contest without being drawn into a direct military confrontation. Turkey’s occupation may be easier to confound, but if sufficient political will exists to maintain it along with US backing, it could effectively result in a Golan Heights-style occupation of Syrian territory [by Turkey] that provides a long-term geopolitical pressure point versus Damascus for years to come. And while US efforts to destroy Syria have fallen short, the US now permanently occupies territory within one of Iran’s closest and most important regional allies. Like a splinter under the skin turning septic, the US occupation will remain a constant potential source of wider infection both for Syria and the rest of the region. Perhaps Cartalucci was the first person publicly to recognize what has been happening here. On 8 February 2018, Russia’s RT bannered, “US-led coalition conducts ‘defensive’ airstrikes against Syrian forces”, and reported, “The US-led coalition has also firmly stressed its ‘non-negotiable right to act in self-defense,’ since its service members are embedded with the [anti-Syrian] ‘partners’ on ground in Syria. … ‘It’s very likely that the Americans have taken a course of dividing the country. They just gave up their assurances, given to us, that the only goal of their presence in Syria – without an invitation of the legitimate government – was to defeat Islamic State and the terrorists,’ Lavrov said.” All of this, likewise, has since been borne out. Key was the September 2018 Tehran summit of Erdogan, Putin and Rouhani (Syria not even being represented there), to decide how to handle Syria’s most pro-jihadist province: Idlib. (It’s even more jihadist than Raqqah, where ISIS was headquartered, and which is the second-most-jihadist.) On 9 September 2018, the Turkish-Government-controlled (and this also means anti-Syrian) Daily Sabah newspaper bannered “The outcome of the Tehran summit” and reported that: We know for a fact that Erdoğan’s goal was to prevent the Russians and the Assad regime from carrying out a comprehensive operation in Idlib. In this sense, he got what he wanted. At the joint press conference, the Russian president announced that the three countries, at the request of President Erdoğan, urged all parties to lay down their arms. As such, it became possible to prevent another humanitarian disaster, a new influx of refugees, the collapse of the Astana process [which Putin had established to replace the U.N.’s U.S.-approved peace process immediately after Obama bombed on 17 September 2016 Syria’s Army at Deir Ezzor — which bombing by the U.S. violated the ceasefire agreement that Obama’s Secretary of State John Kerry had just signed with Russia’s Foreign Minister Sergey Lavrov on 9 September 2016] and the radicalization of moderate opposition, who would have moved closer to the Hayat Tahrir al-Sham (HTS) [Al Qaeda in Syria]. At the same time, a clear distinction was made between ‘terrorists’ and opposition groups. At the same time, there is no doubt that the Iranian president’s proposal to remove the United States from the east of the Euphrates river was in line with Erdoğan’s own agenda. Actually, however, the truthfulness of that last sentence is still very much in doubt. The ultra-reliable Al Masdar News reported on 10 September 2018 that “Russia and Iran have already informed Turkey that they will not accept any jihadist factions inside of Idlib; however, the latter is attempting to convince Moscow and Tehran to avoid carrying out the attack in favor of Ankara clearing these groups.” Putin and Rouhani accepted Erdogan’s promise there (of “Ankara clearing those groups”), and consequently allowed Turkey’s troops to handle Idlib. But, evidently, Erdogan had been lying about that. He didn’t eliminate the jihadists — he has instead been protecting them (except that his forces attack the Kurdish-independence forces against Syria’s Government, the anti-Assad fighters whom Erdogan authentically has been obsessed to kill). The very next day, on September 11th, Paul Mansfield at Syria News headlined “Erdogan Buys Time for Terrorists at the Tehran Summit” and he observed that The Turkish newspaper Daily Sabah released the components of Turkey’s plan for Idlib. It doesn’t take a genius to figure out it effectively means annexing Syrian territory, entrenching Turkish proxy Free Syrian Army forces, while falsely legitimizing their presence through a trilateral agreement, one made (it should be mentioned) without the presence of the country it concerns: Syria. On 18 September 2018, another of the Turkish regime’s major newspapers, Yeni Safak, headlined “Turkey tells 50,000 FSA fighters to be ready for deployment as tensions rise in Idlib” and reported that, “As the Assad regime and Russian warplanes viciously attack the last opposition-held stronghold of Syria’s Idlib, Turkey ramped up its military reinforcements in northern Syria and instructed over 50,000 Free Syrian Army (FSA) [that being the Turkish-led anti-Assad] fighters stationed in Afrin, Azaz, Jarabulus, al-Bab and al-Rai to ‘be ready for military deployment.’” This anti-Syrian report continued, “The Bashar al-Assad regime recently announced plans to launch a major military offensive in Idlib, which is controlled by various armed opposition groups.” It didn’t mention that those “armed opposition groups” were the members of Al Qaeda-led forces defeated elsewhere in Syria who had chosen to be bused by the Syrian Government into the most pro-jihadist Syrian province, Idlib, instead of to be outright shot to death on-the-spot by Syrian troops, where they had been fighting. Such crucial information was left out of Western news-reports. It went on: “An attack on Syria’s Idlib, the last opposition-held stronghold, would be a massacre,” and (since this newspaper reflected Erdogan’s anti-Assad, meaning anti-Syrian, viewpoint) it alleged that “Russia and Assad regime target civilians” instead of try to exterminate jihadists — especially now in Idlib itself, to which Syria’s Government had, indeed, been busing the surviving defeated jihadists. (As was previously noted, the only alternative that Syria’s Government had had regarding those hold-out fighters would have been simply to go in and slaughter not only them but the human shields behind whom they were fighting, which would have enormously increased the civilian casualties, which the ‘barbaric’ Assad-led Government was always trying to avoid doing. So: that’s how and why so many of the Al Qaeda-led forces came to be collected inside Idlib to begin with.) Erdogan might be a double-agent here. But how could Turkey be building infrastructure in Syria and not be permanently taking that land? All of those “seems to be” could be wrong, but it’s hard to see how Syria’s Government could accept any such blatant grab of land away from their nation. I had written on 14 September 2018 about Erdogan’s duplicity, headlining “U.S. Protects Al Qaeda in Syria, Proven”: Erdogan is in both camps — America’s and Russia’s — and playing each side against the other, for what he wants. But he could turn out to be the biggest loser from ‘his’ success here. If he exterminates Idlib’s jihadists, then the U.S. side will condemn him for it. But if he instead frees those jihadists to return to their home-countries, then both sides will condemn him for having done so. The biggest apparent ‘winner’ from all this, Erdogan, could thus turn out to be the biggest real loser from it. And the biggest apparent ‘loser’ from it, Assad, could turn out to be the biggest real winner from it. Then, three days later, on September 17th, I argued that the big winners from this will probably be Putin, Erdogan, Rouhani, and Assad. The headline of that was “Putin and Erdogan Plan Syria-Idlib DMZ as I Recommended”, and the basic case was presented that this would turn out to be only a feint on Erdogan’s part, and that he and Putin and Rouhani (and Assad) would all benefit from this feint by Erdogan, and take home the win. It still could be that. But only Erdogan himself probably knows. And who can read his mind? The main sign I would look at is whether Putin and Rouhani just ignore, as much as possible, Turkey’s ‘seizures’ of Idlib and of the most-jihadist parts of Aleppo province bordering Idlib to Idlib’s immediate east. (For example, this fundamentalist-Sunni family from Sweida — which is perhaps the most pro-jihadist southern province — migrated during the war to Al-Bab, which is Turk-controlled.) If Putin and Rouhani ignore Turkey’s solidification of its control over those areas of northern Syria, then this is how the U.S. side and proxy forces — jihadists and Kurdish fanatics — might lose in Syria, and be forced out of there. This Turkish ‘win’ would entail a loss for both the U.S. and its proxy-forces, especially the Kurds. But it would also entail Syria’s loss of the areas that were always the greatest thorn in Assad’s side. In that case, America’s former proxy-forces in northwest Syria — Al Qaeda’s surviving Syrian forces, plus the separatist Kurdish forces — would henceforth be under Erdogan’s control. If Putin, Rouhani and Assad won’t object to that, then the main loser could be the U.S. regime, which would cede to Erdogan not only America’s last holdout in Syria but also all of its proxy-forces in Syria, henceforth to be totally subject to whatever Erdogan has in mind for them. However, the biggest losers could still be the Turkish and the American regimes. But that would be true only if the surrounded U.S. forces in Syria’s northeast become forced out. If the U.S. occupation stays in Syria, then the U.S. and Turkey will have taken all of northern Syria. But no oil or gas is there, either. (It’s south of there.) What, consequently, is this war even about, any longer? Is it about contending national leaders who refuse to acknowledge defeat? Is that now the only real reason for all of this ongoing death, and destruction? Is it just pure ego? If Turkey quits NATO, then the biggest loser from the end-part of the Syrian war would be the U.S. and its allies. But, of course, the biggest losers from the entire war are the Syrian people. There’s no doubt, whatsoever, about that. Author’s note: first posted at The Saker Where is the end of Iran Nuclear Crisis? Sultana Yesmin Following the years of tension over Iran’s alleged efforts to develop a nuclear weapon, a long-term deal called Joint Comprehensive Plan of Action (JCPOA) between Iran and the five permanent members of the United Nations Security Council (UNSC)—the United States, the United Kingdom, France, China, Russia – plus Germany, known as P5+1— was reached on July 14, 2015. Based on these developments, the UNSC Resolution 2231 endorsed the nuclear deal among these parties, adopted on July 20, 2015. As per the deal, the IAEA remains under the charge to verify Iran’s compliance with the nuclear-related provisions of the JCPOA set forth in the agreement. Iran started providing the IAEA with necessary information to complete its investigation on the past records of its nuclear activities. The IAEA inaugurated increased monitoring and confirmed Iran’s adoption of numerous actions and key steps towards the limitation of its nuclear program. Under the 2015 accord, Iran was allowed to enrich uranium only up to a 3.67 percent concentration, to stockpile no more than 300kg of the material, and to operate no more than 5,060 centrifuges. Iran also agreed to limit the size of its stockpile of enriched uranium, used to make both reactor fuel and nuclear weapons for 15 years – until 2031 and the number of centrifuges installed to enrich uranium for 10 years -until 2026. These developments triggered the relief of sanctions imposed by the United States, the European Union (EU), and the United Nations (UN) on Iran. The former US President, Barack Obama, referred to the deal as the significant step towards building “more hopeful world” and “opportunity to move in a new direction”. However, the first crisis over landmark nuclear deal arose soon after the announcement of the US President Donald Trump’s withdrawal from the JCPOA on May 8, 2018. In light of Trump’s decision, the US took actions to re-impose all sanctions on August 6, 2018 that were lifted in connection with the JCPOA. President Trump denounced the Obama-era nuclear agreement with Iran as “defective, decaying, and rotten” as well as “one-sided deal”. He also accused that the accord only restricted Iran’s nuclear activities for a fixed period that failed to stop Iran from the development of its ballistic missiles and to facilitate real, comprehensive, and lasting solution of the nuclear crisis. President Trump also raised the concern of the continuation of Iran’s aggression and malign activities under the cover of the JCPOA to threaten the US and its allies as well as to exploit the international financial system and support terrorism and foreign proxies in favor of its withdrawal from the deal. Iran responded the US withdrawal from the JCPOA with its further preparation for the restoration of uranium enrichment required for both nuclear energy and weapons on an industrial level without any limitations. The second tension over Iranian nuclear crisis emerged from Donald Trump’s signing of an executive order imposing “hard-hitting” new sanctions on Iran on June 24, 2019 in response to the downing of an unmanned U.S. surveillance drone in international airspace by Iranian surface-to-air missile one week ago of the same month. Donald Trump also reaffirmed Washington’s stand of continuing pressure on Tehran until latter’s complete abandonment from nuclear activities. It elevated tensions and worsened relations between the US and Iran. The confrontation was about to turn into military dimension though finally it did not happen thanks to Trump’s swift repeal of its decision of launching military strikes against Iran. The third and most recent crisis generated from Iran’s announcement on boosting its uranium enrichment above the limit set by 2015 nuclear deal has drawn attention to international community in general and the involved global powers in particular, mostly the US, UK, and France. In the first week of July 2019, Iran declared to resume enriching uranium to higher levels, up to 5 percent concentration, to provide fuel required for its Bushehr nuclear power plant. Iran also threatened to abandon more commitments under 2015 nuclear deal unless practical and tangible steps from the European powers are taken to implement European mechanism, known as, Instrument In Support of Trade Exchanges (INSTEX) in order to facilitate trade and circumvent US sanctions on Iran. Iran argued for the decision of its uranium enrichment as a step against the Trump administration’s unilateral exit from the 2015 nuclear deal and the re-imposition of multilateral sanctions in Iranian regime. Iran also accused that the world powers had failed to abide by their commitments. Since the beginning, Iran has been averring the development of its missile program as entirely peaceful and defensive in nature with the compliance of the principles verified by the IAEA. In response, the US confirmed its policy of “maximum pressure” on Tehran acknowledged by the Trump administration referring to Iran’s infringement to the limit as “playing with fire”. The rest world powers such as the UK and Germany urged Iran for reversing its decision. France, Germany, and Britain expressed concerns over Iran’s new announcement in the wake of heightening tensions certainly condemning Iran’s decision as a “violation” of the nuclear pact. The IAEA arranged an urgent nuclear agency meeting on July 10, 2019 requested by the US soon after Iran’s confirmation of exceeding the stockpile of enriched uranium permitted under JCPOA. The rest concerned powers, Germany, France and the UK confirmed their supports for the JCPOA only after Iran’s full compliance with its commitments. The closed-door meeting however ended without any unified stance. However, China mentioned the US “unilateral bullying”, e.g. the maximum pressure exerted by the US on Iran, as the major cause behind Tehran’s announcement of breaching its uranium enrichment cap and the escalating Iranian nuclear crisis. China also expressed “regret” on Tehran’s decision for further enrichment of its nuclear activities. The re-imposition of the US sanctions and Iran’s announcement of uranium enrichment have already generated high tension not only in US-Iran relations but also for global security. Iran’s threat to enrich uranium beyond the limit has become a major issue of concern for the proliferation of nuclear weapons in Middle Eastern region. The peaceful solution of Iran nuclear crisis has thus become uncertain. The strategic rivalry among great powers, lack of mutual trust between the US and Iran, and absence of the fulfillment of commitments under the nuclear deal have been posing severe challenges to the durable solution of the nuclear crisis.
cc/2019-30/en_head_0021.json.gz/line1730128
__label__cc
0.619801
0.380199
Make your stay at Navarro Beach RV Resort a true destination vacation. In addition to the fun things to do at the resort, following are some of the area hot spots! Gulf Breeze Zoo, Gulf Breeze With 850+ animals, covering 137 species of mammal, bird and reptile, we have plenty of monkeys, mobs of kangaroo, flocks of squawkers, cats like crazy, and tons of tortoises! Take a ride on our Safari Line Limited Train (see the zebras, gorillas and chimps) Feed the giraffes, goats, pig, llamas, bunnies, guinea pigs, and much more. Gulfarium, Fort Walton Beach Gulfarium Marine Adventure Park is dedicated to educating, entertaining, and inspiring our guests to respect and preserve wildlife by providing unique and memorable experiences for visitors of all ages to connect with marine life. National Naval Aviation Museum, Pensacola At the core of the Museum’s collections are more than 700 aircraft — most of which are on display at other museums, with approximately 150 located aboard Naval Air Station Pensacola. These include record-setting aircraft like the NC-4 flying boat, the first plane to fly across the Atlantic, including the SBD Dauntless that flew at the Battle of Midway, two Vietnam MiG-killers, an A-7 Corsair II that logged missions over Iraq during Operation Desert Storm and the last F-14 Tomcat to fly a combat mission. Navarre Beach Marine Science Station, Navarre Beach The mission of the Navarre Beach Marine Science Station is to promote the appreciation, conservation, and understanding of the marine ecosystem of coastal Florida through education and service. Located at the Navarre Beach Park in Santa Rosa County, the center is the focal point of marine, natural resource and watershed education for Northwest Florida K-12 students, visitors, and the community. Pensacola Lighthouse and Museum, Pensacola The Pensacola Lighthouse and Museum offers climbing tours of the landmark 1859 lighthouse. The Lighthouse, situated on Pensacola Bay across from the Naval Aviation Museum, offers indoor and outdoor history exhibits, gift shop, Light of the Moon Tours, Ghost Hunts, weddings and special events. All proceeds benefit the restoration and repair of the Pensacola Lighthouse. As an active aid to navigation, the 1000-watt bulb is magnified by the First Order Fresnel Lens to be seen up to 27 miles out to sea. Perdido Key State Park, Pensacola Barrier islands protect the Florida mainland from the harsh effects of storms and provide habitats for shorebirds and other coastal animals. Perdido Key is a 247-acre barrier island near Pensacola on the Gulf of Mexico. White sand beaches and rolling dunes covered with sea oats make this park a favorite destination for swimmers and sunbathers. Surf fishing is another popular activity. Boardwalks from the parking lot allow visitors to access the beach without causing damage to the fragile dunes and beach vegetation. Covered picnic tables overlooking the beach provide a great place for family outings. Located 15 miles southwest off Pensacola, off State Road 292. Southern Raceway, Milton Heart-racing fun every Saturday night on the 3/8th mile dirt track in the South! Featured racing includes IMCA modified, Cajun sprints, street stock, vintage cars, mini-sprints, etc. Special events include USCS and ASCS Sprints. See website for schedule.
cc/2019-30/en_head_0021.json.gz/line1730131
__label__cc
0.712172
0.287828
A city’s predicament I fear for Trib reporter Matt Artz’s email inbox, because it’s about to get pummeled. In today’s edition, Artz tries to explain why Oakland’s three teams are varying shades of noncommittal with regards to staying at the Coliseum, or even in Oakland in general. For most of us who follow the situation closely, the information is pretty much old hat. Still, it’s good to read someone in the local media deal it as plainly as Artz did, even if the truth is unpleasant. As Oakland fights to keep its teams, industry leaders say it’s hampered by the fact that its main lure was a site more attractive 40 years ago than it is today. “I think that’s a real problem,” Smith College economics Professor Andrew Zimbalist said. “The times have passed it by.” Exactly. No one questions how devoted or hardcore Oakland and East Bay fans are, they are among the best in the nation. Unfortunately, the business of pro sports has become such a high-stakes affair that economically, Oakland is practically a AAA market while San Francisco and San Jose/Silicon Valley are major league markets. Nowadays money trumps hardcore seven days a week. Yesterday I was looking into how Orlando’s Amway Center was built, hoping to understand how it surpasses Oracle Arena in terms of amenities. Oracle does well in having four premium seating options: courtside seats, suites, and two different club options. Amway Center has an astounding seven options: courtside seats, founders suites, presidents suites, legends (party) suites, MVP tables, 4- and 6-person loges, and club seats. All seven options are priced specifically to target certain well-heeled demographics, whether they are big corporations, prominent small businesses, or rich people who simply want more elbow room. A future post will go into how all of this works. For now let me tell you that there’s no going back. All four North American pro sports leagues are multibillion dollar outfits. So are NASCAR and NCAA football. Oakland Mayor Jean Quan talked Thursday about having a huge Cowboys Stadium-like facility in the Coliseum complex, to be co-anchored by a convention center. One thing she didn’t mention was the price tag for such a complex, or even just the stadium itself. Lest we forget, Santa Clara’s Stadium Authority is on the hook for $700 million of the 49ers stadium costs. Zygi Wilf and the Vikings will be paying 49% of the Metrodome’s $1 billion replacement, leaving the rest to public funding sources. Even if you buy the somewhat dubious argument that the 49ers are paying for the lion’s share of the cost (who runs the Authority, again?), Santa Clara had to put up $144 million in hard dollars initially. What price will Oakland/Alameda County have to pay to stay in the game? $200 million? $500 million? Quan cites the $200 million NFL G-4 fund, but that’s available to every team, every market. Any new stadium will cost at least $1 billion. Also today, a sobering analysis by the Atlanta Journal-Constitution shows how cities struggle to make their money back even with glistening new stadia, characterizing these efforts as an “arms race”. Good thing that the leagues appear to be bedrock solid for the foreseeable future, because if they weren’t municipalities would be wading into their own “mutually assured destruction”. So dream big, people, because it’s not your money! Until there’s a price tag. Then it’s definitely your money. This entry was posted in Baseball, Basketball, Coliseum, Football, News, Oakland. Bookmark the permalink. ← Mayors go on the offensive, Wolff to meet with Knauss on Friday Pretty nice view → 12 thoughts on “A city’s predicament” Its good to point out that the economic climate is was it is. Oakland is no longer a viable economic option if the A’s are going to stay in the Bay Area. This along with the anti-trust exemption & “territorial rights” having no real teeth to it, the A’s or the city of San Jose need to get Bud Selig’s attention through filing or the threat of filing a lawsuit to get this process moved along. I am a life-long A’s fan who no longer lives in the Bay Area but doesn’t want the A’s ever to move out of the Bay Area. The numbers don’t lie. San Jose Athletics of Oakland anyone? A little OT but somewhat pertinent seeing as the floundering Coliseum City is currently the city of Oakland’s only plan on the table, I wonder why no one has heard from Knauss yet. It’s been nearly 48 hours since he met with Wolff and the papers have all got their soundbites from Wolff on the meeting. But so far not a peep out of Knauss who was supposedly going to be bringing “new ideas” to the meeting with Wolff. Wonder if he found out his ideas weren’t so new and that they weren’t going to work in Oakland. Also good on Artz. Nice to see someone in the press come out and say what the reality of the Coliseum City plan is… that it’s a plan 40 years too late and not likely to work now that the Warriors have bolted (not that it was going to work before they bolted with the requirements that the teams pay for the entire thing). At first glance, it really seems like Coliseum City is dead without the W’s there building an arena. After all, without concerts and basketball games, there isn’t anything drawing people there once the baseball season ends. Football is only there every other Sunday ’till January at that point. Then nothing to keep the restaurants, bars, and shops afloat there for several months. But maybe they can work around Oracle and turn it into a venue that specializes in putting on concerts and underbidding the arena in SF. After all, it’s almost paid for. I read that the Sharks are only 20% of the events at HP Pavilion. Otherwise, without an arena, Coliseum City RIP. @Dan- I expected Knauss to be awfully quiet after his meeting with Wolff. I am sure Wolff pointed out his efforts in the East Bay over a decade and why each site (7-8 total) were all eliminated because of unique problems with each site. These 7-8 sites have nothing to do with corporate dollars or $$. It is because of physical issues such as businesses unwilling to move, freeway access, utilities that can not be moved etc…. Knauss being a business man now understands Wolff’s efforts over the years in the East Bay and why the BRC has been so quiet over 1170 days. Knauss knows what is fact…..San Jose is the only way in the Bay for the A’s to survive. How about the Warriors can move to San Jose until their new arena in San Francisco is built. Then we knock down the Oracle Arena and build a new ballpark for the A’s on that site? It’s amazing to me, now that the Warriors have made their plans known, that the local media’s to e appears to be changing. Oh, you mean Lew Wolff isn’t some cartoonish super villian lighting cigars with hundred dollar bills anymore? Now they choose to point to economic realities? Wow. About time for a little realism, isn’t it Jeffrey? I don’t think we’ll see any retractions from Dickey, Poole, and Cohn for the insane columns they wrote when Billy traded the pitchers, however. Dave, sure but who is going to pay for it? Wolff and even Knauss don’t want to build at the Coliseum site. It’s a non-starter due to it being a crappy location 40 years out of date. If it’s not downtown it’s not worth building. Pudgie I was looking at the list of Fortune 500 companies earlier tonight, and the highest listed California-based company is actually headquartered within the A’s territory: Chevron, which is #3 nationally and is based in San Ramon. FWIW, Clorox is #49 statewide (#456 nationally). I also thought it was interesting that the Bay Area has 8 companies listed higher than any company in Southern California (Walt Disney Company is #66 nationally). Pudgie, it isn’t about one single company (one that you may have noticed hasn’t been very vocal about where the A’s should play)… It isn’t about MLBs territory, either. Ever notice who has a cartoon car plastered down the left field line at AT&T Park? MLB Territories don’t restrict the Giants from getting sponsors in the A’s Territory or vice versa. What is important is the depth of corporate support for keeping the A’s in Oakland or moving them to San Jose. Take the dozen companies that were at Knauss’ press conference and compare them with those that wrote a letter to Bud Selig supporting a move. It’s not even close. Look at the Chron 200 list of the largest Bay Area companies. Over 100 are in San Jose, and Oakland has three. There are more in Pleasanton than in Oakland. As Jeffrey said, it’s not even close. Leave a Reply to Jeffrey Cancel reply
cc/2019-30/en_head_0021.json.gz/line1730132
__label__wiki
0.747475
0.747475
You are at:Home»Raw»Jailed Aboriginals In Excess: Gladue Workers Positioned in Northeastern Ontario Jailed Aboriginals In Excess: Gladue Workers Positioned in Northeastern Ontario By Steffanie Petroni on March 23, 2015 Raw “The very first thing people need to know is that Gladue isn’t a ‘get out of jail free’ card. Gladue reports are about restorative justice and healing.” ~ Mary Bird, Nishnawbe Aski Legal Services On March 12th, 2015 Legal Aid Ontario announced provision of funding in the amount of $467,376 to Aboriginal Legal Services of Toronto (ALST) for the hiring of four Gladue writers in Sault Ste. Marie, Sudbury, North Bay and Windsor. ALST is the acknowledged best practice leader and provider of Gladue services and were the first organization to provide Gladue reports to the Courts beginning in the fall of 2001. “Gladue workers are very needed in the Algoma District,” commented Linda Beam-Senecal, Native Liaison Worker with the Algoma Remand and Treatment Centre. “I’m very happy that Aboriginal Legal Services have received that funding and are able to provided services. They are the leaders in Gladue report writing.” Statistics provided through the Office of the Correctional Investigator show that in 2013 Aboriginal people made up about 4% of the Canadian population, as of February 2013, 23.2% of the federal inmate population is Aboriginal (First Nation, Métis or Inuit). There are approximately 3,400 Aboriginal offenders in federal penitentiaries, approximately 71% are First Nation, 24% Métis and 5% Inuit. Information provided by Ministry of Correctional Safety and Correctional Services indicates that for the 2013/2014 year, there were 786 total admissions to the Algoma Remand and Treatment Centre. Of those admitted 212, or 27%, self-identified as Aboriginal. Johnathan Rudin, LLM, is the Program Director with ALST. His roots with the organization run deep having been hired to establish the entity in 1990. In 1999, Mr. Rudin appeared before the Supreme Court of Canada in R. v. Gladue and represented ALST before the Supreme Court in R. v. Ipeelee in 2012. His extensive curriculum vitae includes assisting with the creation of the first Gladue Court in Toronto, Ontario. In an interview with the Northern Hoot, Rudin remarked of the expansion of Gladue services, “We certainly have known that there is a need for this service in the North for a long time. We have been advocating for this service to be provided and we’re very happy that it has finally come to pass.” Gladue rights refer to the special considerations set out by the Supreme Court of Canada that must be applied to all Aboriginal individuals- status or non-status Indians, First Nations, Métis, or Inuit and regardless of whether or not the individual lives on or off reserve or in an Aboriginal community. “It is important to know that Gladue reports aren’t done as a favour to Aboriginal people,” explained Rudin. “First of all the need for this sort of information comes from the Criminal Code of Canada.” Section 718.2 (e) of the Criminal Code of Canada states in part, “A court that imposes a sentence shall also take into consideration the following principles: all available sanctions other than imprisonment that are reasonable in the circumstances should be considered for all offenders, with particular attention to the circumstances of aboriginal offenders.” “The requirement is not for the Gladue reports,” continued Rudin. “Rather it is that people have to provide information to the Courts and we have found that Gladue reports are a very good way of providing that information.” In 1995 Jamie Gladue was a young Aboriginal woman with one child and a second on the way. Gladue’s fiancé was known to have had several affairs during their relationship, including an affair with Gladue’s sister. It was at Gladue’s birthday party that she observed her fiancé and sister leave the gathering together. After consuming an excessive amount of alcohol Gladue confronted her fiancé back at their home and stabbed him to death. Gladue was eventually charged with manslaughter and sentenced to three years in prison. Gladue appeal of the sentence was dismissed before the British Columbia Court of Appeal. In 1999, believing that the Court of Appeal had not acknowledged her Aboriginal status, Gladue’s case was brought before the Supreme Court of Canada who agreed that the Court of Appeal failed to acknowledge her status but also agreed that the sentencing was fair. Jamie Gladue’s case was the first to challenge section 718.2 (e) of the Criminal Code. The significance of Gladue’s case was the resulting message issued by the Supreme Court that Aboriginals in Canada and in the justice system experience racism and as evidenced in the penal system, are over-represented. These factors, according to the Supreme Court of Canada, emphasized subsection (e) of section 718.2 that special consideration must be given to Aboriginal people in the Courts to ensure fair treatment. “The Supreme Court told us what we knew- that the over-representation of Aboriginals is a crisis in the Canadian criminal justice system,” remarked Rudin. “Judges also told us that to address this they need two things- they need information about the individual and their individual circumstances as well as their background and systemic factors. And secondly, in light of that information, they need recommendations that would make sense for the individual as an alternative to incarceration.” In 2001, Rudin, in his role with ALST, established the first Gladue Court in Toronto. “When the Court was set up we thought that it would be necessary and a good idea to have someone that could write reports and we came up with the name ‘Gladue report’.” It is estimated some 40% of Aboriginal inmates in prisons today are residential school survivors. Many others are intergenerational survivors, and /or have survived the child welfare system, including the 60’s scoop, and other legislated legacies of colonization. ~ Native Women’s Association of Canada So why the need of ‘special consideration’ for Aboriginal people before the Courts? Centuries of systemic abuse beginning with the height of colonization in the early 17th century and extending hundreds of years later to the closure of the last residential school in Canada just eighteen years ago in 1996, have left a dark stain upon the legacy passed from one generation to the next. These atrocities, short of the near genocide of the First Nations, have left a people struggling to reclaim their cultural identity and spirituality, recover lost ancestral tongues and restore family unity that was defiled by the intervention of the government and church between parents and their children. And what were the long-term consequences of the governments organized attempt to wipe out the First Nation culture? Among them, lower rates of education and income and increased rates of addiction, homelessness, abuse and incarceration. “The Supreme Court, as well as many other people, have said that there is a history of colonialism and specific government practices that have targeted Aboriginal people that have had a particular impact on Aboriginal people and are certainly one of the root causes as to why Aboriginal people find themselves before the Court,” expounded Rudin. “The other important point to note is that many people find themselves before the Court. What is of particular concern is that Aboriginal people in the Courts often find themselves getting a jail sentence. Not everybody that is found guilty goes to jail but Aboriginal people tend to be disproportionally over-represented among those who do go to jail.” According to a 2013 report issued through the Office of the Correctional Investigator: In 2010-11, Canada’s overall incarceration rate was 140 per 100,000 adults. The incarceration rate for Aboriginal adults in Canada is estimated to be 10 times higher than the incarceration rate of non-Aboriginal adults. Since 2000-01, the federal Aboriginal inmate population has increased by 56.2%. Their overall representation rate in the inmate population has increased from 17.0% in 2000-01 to 23.2% today. Since 2005-06, there has been a 43.5% increase in the federal Aboriginal inmate population, compared to a 9.6% increase in non-Aboriginal inmates. “We’re incarcerating Aboriginals at astounding rates,” remarked Mary Bird, lawyer and manager at Nishnawbe Aski Legal Services in Thunder Bay. NASL provides service to all members of Treaty 9- an area that runs along the Quebec border, along the James Bay coast, down to the Manitoba border and then back across Haida land. According to Bird, statistics gathered during March 2011 regarding the percentage of incarcerated Aboriginals at the Kenora jail indicate that 93% of the inmate population are Aboriginal. However, the jail services the Kenora district which encapsulates about thirty First Nation communities. “If we look at the northeastern region of Ontario as a whole the incarceration number of Aboriginal people is close to 80%,” stated Bird with a degree of exasperation in her voice. “That number makes no sense. To accept that it does, would be to accept that Aboriginal people are bad people and worse than the rest of the population. That simply isn’t true.” It was announced in November 2014 that NASL would receive funding from Legal Aid Ontario to hire 3 Gladue workers to be located in Thunder Bay, Timmons and Sioux Lookout. In 2012 the Gladue case was referenced before the Supreme Court once again in R. v. Ipeelee. The case involved two Aboriginal men. One defendant was Manaise Ipeelee, a 39 year old Inuk from Iqaluit, and the other defendant was Frank Ladue, a 50 year old from Ross River Dena Council in Whitehorse. Ipeelee’s alcoholism began at the age of 12 years when he lost his mother who also experienced addiction. By the age of 19 years Ipeelee had 36 convictions including one charge of a violent sexual assault. Ladue was sent to residential school when he was 5 years old and began drinking at the age of 9 years and shortly turned to hard drugs. His offences included numerous sexual assaults against women who were drunk or unconscious. Their appearance before the Supreme Court regarded their violation of their long term supervision order (LTSO) which resulted in their resentencing. Upon reviewing the Gladue factors and the purpose of the Gladue principles, the Supreme Court reaffirmed the importance of Gladue and that its’ principles must also apply to sentencing long term offenders for breach of LTSO’s. Also, “the majority of justices in Ipeelee note that over-representation and alienation of Aboriginal people in prison has only worsened in the years following Gladue.” “The very first thing people need to know is that Gladue isn’t a ‘get out of jail free’ card. Gladue reports are about restorative justice and healing,” asserted Bird. “Equality doesn’t mean treating people the same. You have to treat people according to the circumstances. We hear it all the time- that Gladue’s are supporting a two-tiered justice system. But that’s not true. We have a multi-tiered justice system because every individual that comes to our Courts should be treated as an individual. And that’s what Gladue principle’s reinforce.” According to John Braithwaite (2004), restorative justice is “a process where all stakeholders affected by an injustice have an opportunity to discuss how they have been affected by the injustice and to decide what should be done to repair the harm. With crime, restorative justice is about the idea that because crime hurts, justice should heal. It follows that conversations with those who have been hurt and with those who have inflicted the harm must be central to the process.” Rudin went further to explain that a Gladue report, when conducted thoroughly, is in and of itself a component of restorative justice. “Ideally a good Gladue report is restorative justice in the sense that what we do is try to get the individual to think about their life in a different light. Part of that process is for the person to think about what has worked for them, what their strengths and challenges are and how they might address those challenges.” The legacy of the residential school system demoralized Aboriginal cultures and disrupted families for generations. The devastating effects of residential schools have a long reach. Those who are survivors were abusively conditioned to disassociate from their culture and the generations after have carried this stigma forward. Rudin noted that reviving, or in some cases discovering, cultural identity is significant to the restorative justice process for Aboriginals. “What we see often is that for most of our clients, they don’t have any sense of cultural identity. Other people may have told them who they are but that person-the offender, doesn’t know who they are. They may not even feel like an Aboriginal person because they don’t know much about their culture but that’s how everybody else views them. They’ve often experienced racism. It is a huge issue that we give a lot of attention to.” On release, in a way that is similar to their exit from residential schools, they are sent back out more wounded, angry and institutionalized. Communities are generally ill prepared to accommodate ex-offenders. The cycle of re-offending then continues: individuals are blamed while families and communities bear the brunt of a failed system. ~ Native Women’s Association of Canada Aftercare services for people is utmost and Rudin admitted that it is an issue that can be challenging. “Gladue is not the end of a process but ideally the beginning of a process that others will help the individual carry through with. Often people say that the challenge in trying to make Gladue real is that there are not resources in the community – or not enough. I think that is probably true of most communities.” However, for a community like Sault Ste. Marie, Gladue services introduced into the local social fabric can serve as an impetus for positive growth. “We have noticed a couple of recurring themes in communities where Gladue’s are introduced,” elaborated Rudin. “One, there are resources in communities, particularly small communities, that are not necessarily professional resources. There may be Teachers or Elders in the community that we can rely on and we need to explain that to the Courts. The other thing that we’ve found is that sometimes once we start writing reports that gaps and services are identified. That allows the community to address those particular gaps.” Of meeting the challenge of follow-up resources Rudin commented, “We hope that it will galvanize people and we’re certainly willing to help in that regard as well.” The hiring process for Gladue workers in northeastern Ontario is underway. It is hoped that the new writers will be established and operational by the middle of May.
cc/2019-30/en_head_0021.json.gz/line1730135
__label__cc
0.597019
0.402981
Lease-Operator Drivers Reach Settlement in Class Action Lawsuit Salt Lake City, April 26, 2019 (GLOBE NEWSWIRE) -- After lengthy litigation, Plaintiffs representing a certified nationwide class of lease-operator drivers have reached a settlement with C.R. England, Inc. and Opportunity Leasing, Inc. (together “Defendants”). The settlement was the result of good faith, arm’s-length negotiations between the parties over an extended period of time and was achieved through the assistance of a mediator. The settlement resolves the class action Roberts, et al. v. C.R. England, Inc., et al., Case No. 2:12-cv-00302-RJS-BCW (D. Utah), filed against Defendants in May 2011 on behalf of a class of independent contractors who drove for and leased trucks from Defendants. Plaintiffs brought a variety of claims related to Defendants’ independent contractor and truck lease program, which Defendants denied and contested. The agreement settles all claims of Plaintiffs and the Class against Defendants, with neither party conceding any aspect of their positions regarding Plaintiffs’ claims or Defendants’ defenses. Under the terms of the settlement, Defendants will, among other things, pay a cash settlement of $37.8 million and grant relief to qualifying Class Members of business debts owed to Defendants. A spokesperson for Defendants stated “We are proud of the opportunity we offered to enterprising people to start and grow their own businesses, much like our founder, C.R. England, did with just one truck. However, we understand that some were not happy with their experience and we hope that this settlement resolves any lingering concerns." C.J. Krawczyk, co-lead attorney for the class, stated “If this settlement is approved, all Class Members will be eligible to receive four-figure cash payments, relief from collection of disputed outstanding debts for truck operations and driving school tuition, and an opportunity for credit and DAC reporting repair.” The Court granted preliminary approval of the settlement on January 22, 2019 after an in-person hearing, which was conducted on January 10, 2019. To be effective, the settlement must still be granted final approval by the Court as being fair, reasonable, and adequate to the Class. The hearing date for final approval of the settlement has been scheduled for July 9, 2019. Krawczyk added “After more than seven years of litigation, this resolution is timely, and fair. It is being submitted to the Court unopposed.” More information will be available at www.crenglandclassaction.com. Counsel for Plaintiffs: C.J. Krawczyk, Kravit Hovel & Krawczyk s.c., Milwaukee, WI; Robert Boulter, San Rafael, CA; Heather Sneddon, Anderson & Karrenberg, Salt Lake City, UT; Jon Harper, Salt Lake City, UT; and Kevin Roddy, Wilentz, Goldman & Spitzer P.A., Woodbridge, N.J. Counsel for Defendants: Neal Ross Marder, Akin Gump Srauss Hauer & Feld LLP, Los Angeles, CA; and James S. Jardine, Ray Quinney & Nebeker, Salt Lake City, UT. David Allred C. R. England, Inc. david.allred@crengland.com
cc/2019-30/en_head_0021.json.gz/line1730137
__label__wiki
0.846469
0.846469
Hungary Click here for the Hungary Newsroom 17 Branches Missions | 2 Districts In 1885, Elder Thomas Biesinger and Paul E.B. Hammer entered Budapest, Hungary, after preaching in Prague, Bohemia (Czechoslovakia). After a month with little success in the area, Elder Biesinger and his companion left Hungary. Later, Hungarian Mischa Markow was converted near Constantinople (Istanbul) in 1887 and returned to preach in his native land the following year, but he was banished from Hungary after being imprisoned in solitary confinement. In 1900, Elder Markow and his companion preached in Temesvar, Hungary, until the government forced them to leave. The day before they left, they baptized 12 people and appointed leaders for a congregation of 31 people. Due to the efforts of these missionaries and others who arrived later, a total of 106 people were baptized prior to World War I. The war forced missionaries to evacuate Europe and join the other half of Hungary's Church membership who had already emigrated to the United States. Several of those who remained in Hungary continued to live gospel teachings while the Church organization was away from their area. In June 1988, Hungary gave the Church legal recognition. Ground was broken for the first meetinghouse in eastern Hungary about 20 miles from the Romanian border. Hungary's first meetinghouse was dedicated in October 1989, by President Thomas S. Monson, a Counselor to the Church President. The Hungary Budapest Mission was created in June 1990. In 1991, the Mormon Tabernacle Choir performed in Budapest to an enthusiastic audience that gave the choir eight curtain calls. Elder Dallin H. Oaks of the Quorum of the Twelve Apostles visited Hungary in 1992 for an international consultation on religious liberty and ethnic rights for Eastern European nations, partially sponsored by the Hungary-based Democracy after Communism Foundation. For Journalist Use Only: National Director of Public Affairs and Communications Krisztina Nagy
cc/2019-30/en_head_0021.json.gz/line1730138
__label__cc
0.595137
0.404863
Home POLITICS APC in Delta lacks spirit of winning elections – Uduaghan APC in Delta lacks spirit of winning elections – Uduaghan Dr. Uduaghan Former Governor of Delta, Dr Emmanuel Uduaghan, has said that members of the All Progressive Congress (APC) in the state have not imbibed the spirit of winning elections. Uduaghan made the assertion in Asaba on Friday while being inaugurated as the Chairman of APC Campaign Council in the state. “As a party, we must campaign. I just want to recognise something and I must tell the truth. “What I have noticed in APC in Delta is that we have not inculcated the spirit of winning elections. “That is what I want us to know today; without that spirit of winning elections, and if you do not win elections, you are nothing,” he said. He however pledged his commitment to awaken election victory spirit in the party and “teach” the members how to win elections in the state. Our correspondent reports that Uduaghan is the APC candidate for Delta South Senatorial District seat for the 2019 elections. The PDP governor between2007 and 2015 said that he was not an anti-party man. According to him, now that he has crossed over to the ruling party, Chief Great Ogboru, the party’s governorship candidate will be taught how to clinch power. “Now that I have crossed to the APC, I have come to hold his (Ogboru) hand to show him the road to become governor,” he said. Uduaghan observed that some members of the party were interested only in the presidential election, adding that efforts should be geared towards winning all elections in the state. He said members of the council would meet to enable them to strategies on how to win the 2019 general elections in the state. The former governor said that elections were won at the unit level and that all candidate of the party would return to their various units to vote and secure their votes. “So, this party must be built from the units up and it is from the unit level that we will determine whether we shall win or not. “This is because on the day of election every candidate will be in his or her own unit. Previous articleFabregas leaves Chelsea to join Monaco Next articleTrump promises changes to visas for skilled immigrant workers
cc/2019-30/en_head_0021.json.gz/line1730140
__label__wiki
0.783525
0.783525
Tag Archives: Brefni O’Rorke I See a Dark Stranger (July 4, 1946) Posted on August 30, 2010 by Adam Lounsbery Frank Launder’s I See a Dark Stranger, which premiered in the United Kingdom on July 4, 1946, is half a loaf of noir slathered with generous helpings of romance and comedy. It’s a very enjoyable picture that’s notable as a star vehicle for the lovely Deborah Kerr before she was well-known in Hollywood. The opening of the film is pure noir. Shadows fall heavily on the quiet nighttime streets of a little town with signs all about in French. A panicked man rushes through the town, searching for something. Suddenly there’s a shot of something that doesn’t quite fit, and the narrator’s voice appears on the soundtrack. “An Isle of Man signpost outside a French town,” he says. “That’s odd. But we’ve started this tale at the wrong moment.” He goes on to tell us that this is really the story of Bridie Quilty (Kerr), and we see the young woman in the pub where she works as she eavesdrops on her father’s boozy tales of the Irish Revolution, rapt, even mouthing the words of his story at one point. Bridie hates the English and the memory of Oliver Cromwell as much as the most hardened member of the I.R.A. does, and wants nothing more than to join the group when she reaches the age of majority, just like her father did. The film treats her fervor lightly, however, and right off the bat the viewer knows that this coming-of-age story will contain a fair measure of disillusionment for its protagonist. But not, of course, before she gets in over her head. As soon as Bridie turns 21, she heads for Dublin to make contact with a former compatriot of her father, a man named Michael O’Callaghan (Brefni O’Rorke). Far from the fearsome soldier she expected, O’Callaghan is a mild-mannered curator of a museum who doesn’t seem to mind seeing a large painting of Cromwell every day and feels that the terms of the Government of Ireland Act 1920 that partitioned the country were fair enough, which boggles Bridie’s mind. More significantly, he seems to have never heard of her father, which should raise a red flag, but doesn’t, since Bridie is as bull-headed as she is patriotic. Undeterred by her experience in the museum, Bridie looks for resistance where she can find it, and falls in with a man named Miller (Raymond Huntley). He appears at first glance to be a rumpled Englishman, but Bridie learns that he’s a spy working against the English, so she goes to work for him without a second thought. Bridie is blithely unaware of politics outside of Ireland and the U.K., and the film is clever enough to share her point of view for some time. Astute viewers, of course, will immediately be able to suss out exactly which nation Miller is spying for, but it’s not directly stated for awhile. As far as Bridie’s concerned, the enemy of her enemy is her friend. After hearing how much Bridie hates every last Englishman, Miller says to her, “For a subject of a neutral country, aren’t you being a little belligerent?” Bridie responds, “There’s nothing belligerent about it. It’s entirely a question of which side I’m neutral on.” As I said, I See a Dark Stranger is a mixture of noir and comedy. It’s heavier on the comedy than it is on the thrills, especially toward the end, but for the first half, there are some sequences that wouldn’t be out of place in any other espionage potboiler, such as the scene in which Bridie has to dispose of a corpse, and comes up with the ingenious notion of putting the body in a wheelchair and pushing it through town as though she’s just taking an old man for a walk (she’s really heading for the cliffs overlooking the ocean). It’s never very serious, though, and the film is generally more interested in humorous situations and amusing characterizations than it is in plot points. Kerr is fantastic, and carries the picture with ease. Trevor Howard is great, too. He plays Lt. David Baynes, a Brit who becomes infatuated with Bridie and realizes too late the amount of trouble she’s in. There are also two very funny caricatures of stiff upper-lipped British policemen, Capt. Goodhusband (Garry Marsh) and Lt. Spanswick (Tom Macaulay) who may very well have served as the inspiration for Hergé’s comic characters Dupont et Dupond (Thomson and Thompson in English translation), two detectives who are indistinguishable from each other. Spanswick and Goodhusband are both bald, have neat little black mustaches, and say things like “Cheerio, old boy.” By the end of the picture, however, they’re allowed to grow out of their stereotyped roles, are fairly easy to tell apart, and even get a few intentionally funny lines, such as when Spanswick says to a hotel manager who is afraid that German prisoners of war may have escaped from the nearby internment camp to hide out in her hotel, “If the food I’ve had here is anything to go by, they’re more likely to escape from the hotel and beat it for the internment camp.” Posted in 1946, July 1946 and tagged Brefni O'Rorke, British Cinema, Comedy, David Tomlinson, David Ward, Deborah Kerr, Eagle-Lion Films, Eddie Golden, Everley Gregg, Film Noir, Frank Launder, Garry Marsh, General Film Distributors, George Woodbridge, Gerald Case, Harry Hutchinson, Harry Webster, Humphrey Heathcote, I See a Dark Stranger, Individual Pictures, James Harcourt, John Salew, Kathleen Boutall, Katie Johnson, Kenneth Buckley, Liam Redmond, Marie Ault, Michael Howard, Norman Shelley, Olga Lindo, Pat Leonard, Raymond Huntley, Sidney Gilliat, The Adventuress, Thelma Connell, Tom Macaulay, Torin Thatcher, Trevor Howard, Wilkie Cooper, William Alwyn, William G. O'Gorman, Wolfgang Wilhelm. Bookmark the permalink.
cc/2019-30/en_head_0021.json.gz/line1730142
__label__wiki
0.566558
0.566558
Don't Pay More, Just Get More As a preferred partner for the world's top cruise lines, tour companies and hotel brands, we can get you free upgrades, bonus amenities, onboard spending credit and other unpublished discounts you won't find anywhere else. Our travel specialists are here to provide you with unmatched service and help you get the best possible price on your next trip. There's no obligation, no pressure, and with our price-match guarantee, you never pay more for your vacation, only get more. So take one minute, give us some basic information below, and let us get to work, finding the best price and greatest value for your vacation. Prefer to talk about your travel plans? We'd love to. Call us toll free at 888-213-6227 and we'll answer any questions about your next adventure. 7-night Timeless Cuba Voyage Example: 5551230987 United States Canada Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua And Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Botswana Bouvet Island Brazil British Indian Brunei Bulgaria Burkina Faso Burundi Cambodia Cameroon Cape Verde Cayman Islands Chad Chile China Christmas Island Cocos Islands Columbia Comoros Congo Cook Islands Costa Rica Croatia (Hrvatska) Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic East Timor Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Faroe Islands Fiji Finland France France, Metropolitan French Guinea French Polynesia Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guinea Guinea-Bissau Guyana Haiti Honduras Hong Kong Hungary Iceland India Indonesia Iran Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Kuwait Kyrgyzstan Laos Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macau Macedonia Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia Moldova Monaco Mongolia Montserrat Morocco Mozambique Myanmar (Burma) Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Korea Norway Oman Pakistan Palau Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russia Rwanda Saint Helena Saint Lucia Saint Vincent San Marino Saudi Arabia Senegal Seychelles Sierra Leone Singapore Slovak Republic Slovenia Solomon Islands Somalia South Africa South Georgia South Korea Spain Sri Lanka Sudan Suriname Swaziland Sweden Switzerland Syria Taiwan Tajikistan Tanzania Thailand Togo Tokelau Tonga Tunisia Turkey Turkmenistan Tuvalu Uganda Ukraine United Kingdom Uruguay Uzbekistan Vanuatu Venezuela Vietnam Virgin Islands Virgin Islands(US) Western Sahara Western Samoa Yemen Yugoslavia Zambia Zimbabwe Please Select 1 2 3 4 5 6 7 8 9 10 or more Please Select No Children 1 2 3 4 5 6 7 8 9 10 or more Your Stateroom Preference Please Select InsideOcean View (Window)Ocean View BalconySuite Additional Comments Or Requests See Prices With: If You Need Airfare, Please List Airport Please SelectAlbany, New York, United States (ALB)Albuquerque, New Mexico, United States (ABQ)Atlanta, Georgia, United States (ATL)Baltimore, Maryland, United States (BWI)Billings, Montana, United States (BIL)Birmingham, Alabama, United States (BHM)Boise, Idaho, United States (BOI)Boston, Massachusetts, United States (BOS)Buffalo, New York, United States (BUF)Calgary, Alberta, Canada (YYC)Charleston, South Carolina, United States (CHS)Charlotte, North Carolina, United States (CLT)Chicago, Illinois, United States (MDW)Chicago, Illinois, United States (ORD)Cincinnati, Ohio, United States (CVG)Cleveland, Ohio, United States (CLE)Columbus, Ohio, United States (CMH)Dallas/Fort Worth, Texas, United States (DFW)Dayton, Ohio, United States (DAY)Denver, Colorado, United States (DEN)Des Moines, Iowa, United States (DSM)Detroit, Michigan, United States (DTW)Edmonton, Alberta, Canada (YEG)Fargo, North Dakota, United States (FAR)Fort Lauderdale, Florida, United States (FLL)Fort Myers, Florida, United States (RSW)Fresno, California, United States (FAT)Grand Rapids, Michigan, United States (GRR)Hartford, Connecticut, United States (BDL)Honolulu, Hawaii, United States (HNL)Houston, Texas, United States (IAH)Huntsville/Decatur, Alabama, United States (HSV)Indianapolis, Indiana, United States (IND)Jackson, Mississippi, United States (JAN)Jacksonville, Florida, United States (JAX)Kansas City, Missouri, United States (MCI)Knoxville, Tennessee, United States (TYS)Las Vegas, Nevada, United States (LAS)Little Rock, Arkansas, United States (LIT)Los Angeles, California, United States (LAX)Louisville, Kentucky, United States (SDF)Lubbock, Texas, United States (LBB)Madison, Wisconsin, United States (MSN)Memphis, Tennessee, United States (MEM)Miami, Florida, United States (MIA)Milwaukee, Wisconsin, United States (MKE)Minneapolis, Minnesota, United States (MSP)Montreal, Quebec, Canada (YUL)Nashville, Tennessee, United States (BNA)New Orleans, Louisiana, United States (MSY)New York, New York, United States (JFK)New York, New York, United States (LGA)Newark, New Jersey, United States (EWR)Norfolk, Virginia, United States (ORF)Oklahoma City, Oklahoma, United States (OKC)Omaha, Nebraska, United States (OMA)Orlando, Florida, United States (MCO)Ottawa, Ontario, Canada (YOW)Palm Beach, Florida, United States (PBI)Palm Springs, California, United States (PSP)Philadelphia, Pennsylvania, United States (PHL)Phoenix, Arizona, United States (PHX)Pittsburgh, Pennsylvania, United States (PIT)Portland, Oregon, United States (PDX)Quebec, Quebec, Canada (YQB)Raleigh/Durham, North Carolina, United States (RDU)Richmond, Virginia, United States (RIC)Rochester, New York, United States (ROC)Sacramento, California, United States (SMF)Saint Louis, Missouri, United States (STL)Salt Lake City, Utah, United States (SLC)San Antonio, Texas, United States (SAT)San Diego, California, United States (SAN)San Francisco, California, United States (SFO)Savannah, Georgia, United States (SAV)Seattle, Washington, United States (SEA)Spokane, Washington, United States (GEG)Syracuse, New York, United States (SYR)Tahoe/Reno, Nevada, United States (RNO)Tampa, Florida, United States (TPA)Toronto, Ontario, Canada (YYZ)Tucson, Arizona, United States (TUS)Tulsa, Oklahoma, United States (TUL)Vancouver, British Columbia, Canada (YVR)Victoria, British Columbia, Canada (YYJ)Washington, District of Columbia, United States (DCA)Washington, District of Columbia, United States (IAD)Wichita, Kansas, United States (ICT)Winnipeg, Manitoba, Canada (YWG) Have you sailed on Oceania Cruises line before? Have you sailed in the past? Please Select Luxury (Silversea, Regent, Crystal, Oceania etc.) Premium (Holland America, Princess, Windstar etc.) Moderate (Royal Caribbean, Carnival etc.) Have not sailed before Bon Voyage Travel handles your personal data with care and respect, so in order to complete your quote request we need to store and process the personal information shared in this form. If you consent to us storing your data for this purpose, please click the submit button below.
cc/2019-30/en_head_0021.json.gz/line1730143
__label__wiki
0.637145
0.637145
Iron Fist - Here I Lie Women's Platform Shoes If there's one thing you can trust the artistic masters at Iron Fist to do, it's give you a style that isn't for everyone, and they like it that way. If you're an individual who has their own sense of style who likes to make... 10 / Off-White - $55.00 USD 7 / Off-White - Sold Out If there's one thing you can trust the artistic masters at Iron Fist to do, it's give you a style that isn't for everyone, and they like it that way. If you're an individual who has their own sense of style who likes to make an impression and give everyone that feeling of "Wow" then these are the shoes for you. Iron Fist makes no apologies, pushing the envelope with their designs to create a one of a kind experience. Grateful Dead - Guru Bear Tie Dye T-Shirt
cc/2019-30/en_head_0021.json.gz/line1730146
__label__cc
0.603481
0.396519
Category Archives: stuttering The Bright Spots Strategy, Tony Robbins, Stuttering no more! goal setting, goals, happiness, inspiration, motivation, self-help, stuttering, success, wellness May 18, 2012 1 Comment This is a Tony Robbins video and commentary from Robbins-Madanes I just think the commentary, at least, is some really good ‘stuff’ that many of us can use? What do you think? Click here to go to their site and the video THE BELOW IS FROM Robbins-Madanes Training’s Website STEP 1: WHAT IS ALREADY PERFECT? When you’re looking to help someone, it’s important to keep an eye out for moments where the person you’re trying to help… is already perfect. Most of the time, Rechaud’s stutter was paralyzing. He could get stuck in the middle of a sentence and stay stuck for 15-20 seconds. Terrible! But when Tony informed Rechaud that he was not doing to eliminate his stuttering, Rechaud responded “Yeah, sign me up for that right now.” And he said it perfectly. What does this mean? It means that even though Rechaud has been a lifelong stutterer, there are times where he speaks perfectly, with fluency, with expression, and with humor. There are moments in his speech where everything is perfect, and nothing needs to be improved. Rechaud didn’t notice it, but Tony did. We call these moments of perfection “Bright Spots” (thanks to authors Chip and Dan Heath for this great term from their book Switch). Bright Spots are happening all of the time, sometimes for just a few seconds, but we tend to overlook them. Is there a part of your life, a skill set, a habit, a belief, a relationship, where you know it’s going to work? You don’t have to worry or second-guess. Where you have faith, where you know that when you need it to happen, it will be there? That’s a bright spot, an outstanding result, a moment or a place or situation where you’re seeing the perfect result taking place, even if it’s very small or short-lived. STEP 2: WHERE ARE YOUR BRIGHT SPOTS? We tend to overlook Bright Spots, take them for granted, and focus more on our difficulties and problems, when we should be doing the opposite. You have to find your Bright Spots! Why? Because when something is working well, when in some area of your life you’re getting a perfect result, you’ll find you’re doing something special there, something that’s really working well. When you find something that’s working very well, what do you do? Do MORE of it! Do more of what works, get more of the result you want. When Rechaud was saying “Yeah, sign me up for that right now,” he was in a Bright Spot: optimistic, congruent, connected, looking forward… and not stuttering at all. If he spoke like this all of the time, would he be paralyzed by stuttering? Nope. He’d be free. At that moment, Tony saw the Bright Spot. He saw that despite his lifelong limitation, whatever its causes might be, whatever his neurological situation etc., Rechaud’s speech impediment was ALSO a behavioral pattern. When Rechaud gets outside of that behavioral pattern, he can speak perfectly. The objective now: to get Rechaud outside of his pattern. By the way, what are your Bright Spots? What are the things that come naturally to you? What are the areas of your life where you’re getting great results? Are there moments that you’re take for granted where you actually experiencing substantial confidence? What would happen if you doubled the bright spots in your life? Tripled them? STEP 3: FIND THE KEY DECISION Rechaud introduced himself by saying he had stuttered “as long as I can remember.” What have you done ever since you can remember? What are your limiting patterns? We all have them. Some limiting patterns are “sometimes” patterns (e.g. “Sometimes I wake up cranky”). Some of them are rare: (e.g. “I never get mad, except when…”) Some patterns are so prevalent in our lives, we feel they never go away (“I’m just not a very loveable person”). So how did those patterns get there? Past decisions. Makes sense, right? Our lives are the products of our decisions. Now, among all of the thousands of decisions we make every week, there are some decisions which are much more powerful. We call these Key Decisions. Key decisions are the decisions we make which have a global, pervasive impact in our lives because they influence all of our future decisions. For instance: imagine a little eight year old girl who decides, one day, that people are not to be trusted. Will that affect all of her future decisions? All of her future relationships? Of course: a Key Decision like that will affect every single human relationship in her life from that point on. In fact, if she should ever find herself wanting to trust someone, what’s going to be the biggest barrier to trusting? The key decision she made as an eight year old. That’s a Key Decision. If you have a limiting pattern, you can bet there was a Key Decision that installed it in your life. Find the Key Decision, you can change that resulting pattern forever. Tony guessed that if Rechaud has stuttered since childhood, odds are that his pattern originated with a Key Decision. Tony asked Rechaud for his earliest memory. Rechaud remembered being two years old and watching Rocky and Bullwinkle while his parents were arguing. He was worried that his father would beat his mother. Remembering this, Rechaud recognized his reason for stuttering: to distract his parents from their troubles. STEP 4: UPDATE YOUR REASONS If you want to be effective in any area of your life, you need to update your reasons for doing what you do. The reasons you did something in your teen years is going be different than your reasons for doing what you do in your thirties, right? We evolve. We do the same with our key decisions. Many of your key decisions are based on the past: old decisions, old reasons, having to do with situations that no longer exist. Did you make a key decision about yourself, or about others, or about the world… as a child? Guess what? That child doesn’t exist anymore. So if you want to live NOW, you need to update your reasons. Rechaud already had his reasons: to reclaim his career for the sake of his family. Now that he understood his key decision, it was time to break out of that pattern and create a new pattern for his speech and his life. He needed to get out of that pattern created for a reason that no longer exist, and create a new pattern based on what he needed now. STEP 5: ACCESS YOUR POWER Behind your limiting pattern, there is YOU. You are a force of nature. You have the power to break out of any pattern or sticking point and move forward boldly towards the future you deserve. To get past your limiting pattern, access the power and fullness of you. Tony guided Rechaud through a Strategic Archetype Process (taught in our training) of accessing his Warrior, the archetypal part of himself that is not afraid to do combat with his own limitations, the part of himself that insists on self-expression, freedom, and victory, and is not afraid to exert himself to do so. Tony asked Rechaud to make the sound of the warrior, and for Rechaud, the sound of the warrior was a primal scream. For everyone it is different. For some the sound of the warrior is the word “love.” For some it is a song. What does your Warrior sound like? STEP 6: BREAK THROUGH! Rechaud found a way to break through his stuttering pattern, and as you see, confronted his biggest fear (and the biggest fear of 90% of the human race), which is public speaking. Did you see just a little change in Rechaud’s ability to articulate and express himself? Do you think he might have gotten past his limiting pattern? Now: is Rechaud “permanently cured?” Will he never have challenges? Will he nevermore experience moments of blockage or stuttering? Of course not. He will have challenges, as all of us will. When you earn progress, you have to continue to earn it. Everybody trips, everybody has vulnerabilities, everybody has bad days now and then. The point is: this is no longer a pattern that limits Rechaud, pushing him down, and controlling the story of his life. Rechaud now knows that stuttering is not “him.” It is a pattern that used to have a function in his life, that he has outgrown, and that he now how to circumvent in order to pursue his life goals. How about you? Is there a pattern that has dominated your life? How could you break out of it and experience life on the other side… just like Rechaud? Let us know and leave a comment below! Mark Peysha CEO & CoFounder Robbins-Madanes Training
cc/2019-30/en_head_0021.json.gz/line1730148
__label__wiki
0.911903
0.911903
Innovation, Science and Economic Development Canada [Х] Parole Board of Canada [Х] Innovation, Science and Economic Development Canada (3470) Parole Board of Canada (664) Administrative Tribunals Support Service of Canada (369) Agriculture and Agri-Food Canada (5184) Atlantic Canada Opportunities Agency (224) Canada Border Services Agency (3356) Canada Economic Development for Quebec Regions (1638) Canada Revenue Agency (32498) Canada School of Public Service (297) Canadian Centre for Occupational Health and Safety (48) Canadian Environmental Assessment Agency (786) Canadian Food Inspection Agency (1584) Canadian Grain Commission (297) Canadian Heritage (8678) Canadian Human Rights Commission (114) Canadian Institutes of Health Research (588) Canadian Intergovernmental Conference Secretariat (50) Canadian Northern Economic Development Agency (36) Canadian Nuclear Safety Commission (607) Canadian Radio-television and Telecommunications Commission (296) Canadian Space Agency (1012) Canadian Transportation Agency (261) Civilian Review and Complaints Commission for the RCMP (109) Correctional Service of Canada (22966) Courts Administration Service (619) Crown-Indigenous Relations and Northern Affairs Canada (1893) Department for Women and Gender Equality (41) Department of Finance Canada (3403) Department of Justice Canada (1130) Elections Canada (969) Employment and Social Development Canada (24334) Environment and Climate Change Canada (50686) Farm Products Council of Canada (14) Federal Economic Development Agency for Southern Ontario (753) Financial Consumer Agency of Canada (947) Financial Transactions and Reports Analysis Centre of Canada (856) Fisheries and Oceans Canada (63462) Global Affairs Canada (46761) Health Canada (4367) Immigration, Refugees and Citizenship Canada (6790) Indigenous Services Canada (449) International Joint Commission (66) Military Grievances External Review Committee (88) Military Police Complaints Commission of Canada (78) National Defence (213162) National Energy Board (741) National Film Board (428) National Research Council Canada (26726) Natural Resources Canada (17119) Natural Sciences and Engineering Research Council of Canada (373) Office of the Auditor General of Canada (598) Office of the Commissioner for Federal Judicial Affairs Canada (207) Office of the Commissioner of Lobbying of Canada (49) Office of the Commissioner of Official Languages (164) Office of the Information Commissioner of Canada (92) Office of the Privacy Commissioner of Canada (209) Office of the Public Sector Integrity Commissioner of Canada (43) Office of the Secretary to the Governor General (199) Office of the Superintendent of Financial Institutions Canada (930) Office of the Taxpayers' Ombudsman (18) Parks Canada (8953) Passport Canada (1217) Patented Medicine Prices Review Board Canada (68) Privy Council Office (925) Public Health Agency of Canada (2123) Public Prosecution Service of Canada (518) Public Safety Canada (918) Public Service Commission of Canada (2232) Public Services and Procurement Canada (18272) Royal Canadian Mounted Police (9588) Security Intelligence Review Committee (52) Shared Services Canada (10857) Social Sciences and Humanities Research Council of Canada (100) Statistics Canada (619) Status of Women Canada (115) The Correctional Investigator Canada (13) Transportation Safety Board of Canada (80) Transport Canada (11126) Treasury Board of Canada Secretariat (670) Veterans Affairs Canada (3080) Veterans Review and Appeal Board (60) Western Economic Diversification Canada (78) None (1757) North American Free Trade Agreement (NAFTA) (830) Canada-Chile Free Trade Agreement (CCFTA) (779) Canada-Colombia Free Trade Agreement (CCoFTA) (765) Canada-Honduras Free Trade Agreement (CHFTA) (765) Canada-Panama Free Trade Agreement (CPaFTA) (765) Canada-South Korea Free Trade Agreement (CKFTA) (693) Canada-Peru Free Trade Agreement (CPFTA) (662) World Trade Organization – Agreement on Government Procurement (WTO-AGP) (641) Agreement on Internal Trade (AIT) (451) Canadian Free Trade Agreement (CFTA) (439) Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP) (11) Aboriginal Business Set Aside – Procurement Strategy for Aboriginal Business (ABSA (PSAB)) (8) Comprehensive Economic and Trade Agreement (CETA) (7) A: $5,000,000.00+ (11) B: $1,000,000.00 - $4,999,999.99 (76) C: $100,000.00 - $999,999.99 (869) D: $25,000.00 - $99,999.99 (1064) E: $10,000.00 - $24,999.99 (2077) F: $0.00 - $9,999.99 (20) Found 4134 record(s) Last page 414
cc/2019-30/en_head_0021.json.gz/line1730150
__label__wiki
0.897339
0.897339
Posts Tagged ‘Media’ accept, cannot, China, Media, Military, power, State, US US cannot accept China military power: state media In Uncategorized on January 8, 2011 at 4:10 am BEIJING, Jan 7, 2011 (AFP) – China will eventually have a military powerful enough to compete with the United States, state media said Friday ahead of the visit of US Defence Secretary Robert Gates. The claim in a newspaper editorial followed reports that China had completed a prototype of a stealth fighter and after a top US military official said Beijing was stepping up efforts to deploy a “carrier-killer” missile system. “Whether the reported new weapons are true or not, in the long run, China will own first-class weapons that are capable of competing with the US war machine,” said the Global Times, known for its nationalist tone. Chinese Foreign Minister Yang Jiechi (R) meets with UN Secretary General Ban Ki-Moon at the United Nations headquarters in New York, January 6, 2011. AFP Gates arrives in China on Sunday to smooth over tense defence relations between the two countries — one year after Beijing cut military ties with Washington in protest against US arms sales to rival Taiwan. “Apparently, the US is not ready to treat China as a major power. They cannot accept the fact that China will sooner or later possess a first-class military,” the editorial said. “They are too used to the old power structure, in which China and other developing countries have long been treated unfairly.” In an interview last week with a Japanese newspaper, the head of the US Pacific Command Admiral Robert Willard said China was pushing development of “carrier-killers” and aimed to project its influence beyond its regional waters. US military analysts have warned China is developing an anti-ship ballistic missile — a new version of its Dongfeng 21 missile — that could pierce the defences of even the most sturdy US naval vessels and has a range far beyond Chinese waters. Whereas Gates’s Chinese counterpart Liang Guanglie has said that China will push forward with modernisation of its military thanks to a booming economy, the United States is facing major cuts. Citing “dire” fiscal pressures, Gates on Thursday proposed deeper cuts than planned in US military programmes, scaling back ground forces for the first time since the 1990s. Gates, in a compromise with the White House, said the 78 billion dollars in cuts and other measures would result in a slower pace of growth in defence budgets over the next five years, despite earlier plans to keep spending at a higher rate. China has long described its military build-up as “defensive” in nature but top armed forces officials have recently made increasingly strong statements about its quest for a powerful military. China, coal, flood, in, killed, Media, mine, Twelve Twelve killed in China coal mine flood: media In Uncategorized on October 28, 2010 at 7:10 am Twelve workers were killed and one injured in a flood in a coal mine in southwest China’s Guizhou province, state media said Thursday. A Chinese miner unloads coal from a train in eastern China’s Anhui province. The brief report by the Xinhua news agency did not provide further details of the accident, the latest to strike the country’s notoriously dangerous mining sector. More than 2,600 miners were killed in job-related accidents last year, according to official data — or about seven people a day. Independent labour groups say the actual number of deaths is probably much higher. City, entertainment, in, Media, opens, Show, tech Media, entertainment tech show opens in city PALME Vietnam 2010, an international exhibition on professional audio, lighting, AV and system integrations, opened in Ho Chi Minh City Thursday. A corner of PALME Vietnam 2010 on July 22 (Photo: Truong Son)The three-day show at the Saigon Exhibition and Convention Centre in District 7, showcases modern audio visual techniques from world famous-brands like Bosch, Robe, Desisti Asia and Pioneer. Highlights include the Robin 3 Plasma Spot – an extreme light output of 18,000 Lumens with a 10,000 hour lifespan; the DJM-2000 from Pioneer, a professional DJ tool with PRO DJ LINK function that allows Djs to connect with multiple players; the New Touch Link from Extron Electronics, described as the first fully configuration-based touch-panel control system, equipped with the power to handle the control needs of single display rooms, dual display rooms, divisible rooms, multi-image system and video conference suites. The Vietnam DJ contest will kick off its final round after treating audiences to a full-day of music mixed by local Djs and the world Dj – Dj JoshM. The show will last two hours, starting from 2pm at the main stage of the SECC hall. Other must-see musical performances on the second day to hear boom out of the professional giant speaker system at the west gate include: a live outdoor performance by some rock bands at the Palme Lounge at 5pm; the Control Room Showcase, featuring a presentation on Jupiter Systems’ Pixelnet Display Wall System Processor by Tien Phong Co.; and Danish Interpretation and Emblaze Vcon by Hans Technology on creating good experiences in video conferencing. For those who want to learn more how to use or control the new technologies, they may freely attend conferences hosted by LifeSize Communications, Nexo and Krammer at 11am, 1pm and 3pm respectively, in Convention Rooms No.1 and 3. The schedule will repeat tomorrow as well. The PALME Vietnam is co-organized by the HCMC Department of Culture, Sports and Tourism and Singapore’s IIR Exhibitions Pte. Ltd. brigade, combat, Iraq, last, Media, of, out, pulls, US Last US combat brigade pulls out of Iraq: US media In Uncategorized on August 19, 2010 at 7:22 am WASHINGTON, Aug. 18 (AFP) – The last US combat brigade pulled out of Iraq and crossed into Kuwait almost seven and a half years after the US-led invasion to oust Saddam Hussein, US media reported. Television footage showed an NBC reporter travelling with the 4th Stryker Brigade, 2nd Infantry Division crossing the border around midnight local time to be followed in the coming hours by the rest of the brigade. US soldier stands in front of a line of armoured vehicles at Camp Victory, a giant sprawling military base on the edge of Baghdad airport, in June 2010. AFP file But the US military said there were still several thousand more US troops in Iraq that had to go before the drawdown was complete. When it does the official name of the US mission in Iraq will change from “Operation Iraqi Freedom” to “Operation New Dawn,” said Major General Stephen Lanza in an interview with MSNBC. The pullout comes just one day after a suicide bomber blew himself up at a crowded army recruitment center in Baghdad killing 59 people, as violence coinciding with the Muslim holy month of Ramadan raged across Iraq. The attack, blamed on Al-Qaeda and the deadliest this year, wounded at least another 100 people and came a day after Iraq’s two main political parties suspended talks over the formation of a new government. News of the milestone withdrawal was also carried by Al-Jazeera and US media such as The Washington Post, CNN and The Los Angeles Times, many of which had reporters embedded with the departing troops. Lanza, the military spokesman, said there were still nearly 56,000 US troops in Iraq, but the number would fall to 50,000 by the end of the month. “And we’ll continue to go through our responsible drawdown to meet that drawdown by 1 September. It is about a transition to a change of mission, going from combat operations to stability operations,” he said. US State Department spokesman Philip Crowley, live on MSNBC as the footage was shown, described the end of combat operations as a “historic moment,” but vowed that America’s long-term commitment was unwavering. “The last thing that we want to see is an occasion where we have to send troops back into Iraq yet again so we are ending the combat phase of our involvement in Iraq for a second time. “We’re not ending our involvement in Iraq. We will have important work to do. This is a transition. This is not the end of something. It’s a transition to something different. We have a long-term commitment to Iraq.” Crowley said that after spending one trillion dollars in Iraq and with 4,400 lives lost, the conflict had come “at high expense.” “We’ve invested heavily in Iraq and have to do everything we can to preserve that investment to integrate Iraq along with the neighborhood into a much more peaceful situation that serves their interests as well as ours.” In a letter dated August 18 and posted on the White House website, President Barack Obama also hailed the end of combat operations but made no mention of the final combat troops leaving. “Shortly after taking office, I put forward a plan to end the war in Iraq responsibly,” the letter said. “Today, I’m pleased to report that — thanks to the extraordinary service of our troops and civilians in Iraq — our combat mission will end this month, and we will complete a substantial drawdown of our troops.” While most reports suggested the pullout of the 4th Brigade would take only a few hours, The Los Angeles Times said it would take three days for the 360 military vehicles and 1,800 soldiers to get down the road from Baghdad, through the Shiite south and into Kuwait. The Pentagon would not confirm it was the pullout of the final combat troops, but has long said the number of American soldiers in Iraq would fall to 50,000 by the end of the month when combat missions officially end. All US troops are supposed to leave the country by the end of next year, according to the terms of a bilateral security pact, and Obama has insisted the ongoing withdrawal is on schedule and will not be altered. The US troop pullouts have come despite warnings from senior Iraqi politicians and officers about the dangers of an early exit given the security situation and political uncertainty. Iraq’s top military officer told AFP last week on the sidelines of a defense ministry conference in Baghdad that American forces may be needed in the conflict-wracked nation for a further decade. “At this point, the withdrawal is going well, because they are still here,” Lieutenant General Babaker Zerbari said. “But the problem will start after 2011 — the politicians must find other ways to fill the void after 2011. If I were asked about the withdrawal, I would say to politicians: the US army must stay until the Iraqi army is fully ready in 2020.” The pullout also coincided with the arrival of James Jeffrey, the new US ambassador to Iraq, who presented his diplomatic credentials Wednesday to the conflict-torn nation’s head of state, President Jalal Talabani. 37, China's, floods, in, kill, Media, northeast Floods kill 37 in China’s northeast: media In Uncategorized on July 31, 2010 at 7:18 am The death toll from floods sweeping through northeastern China has risen to 37, state media said Saturday, as the country continues to battle the worst floods in a decade. Torrential rains in Jilin province have left a further 35 missing as more than 364,000 people were evacuated from waterlogged areas, the official Xinhua news agency reported. The weather bureau has predicted more heavy rain for the central and eastern parts of the hard-hit province, with experts warning of further flooding and landslides. Water, electricity and telecommunications services were cut in parts of the province, while train services in the town of Kouqian were suspended after the railway station was surrounded by flood waters, previous reports said. More than 95,500 buildings have been damaged in the floods, with 25,400 destroyed, Xinhua said. A general view shows the town of Kouqian in China’s Jilin province, on July 28 Floods up to three metres (10 feet) deep in some places submerged factories and houses, reports said earlier this week, before the waters receded to about one metre. Elsewhere in Jilin, hundreds of workers scrambled to recover 3,000 barrels full of explosive chemicals that were washed by flood waters into the Songhua River, a major waterway. Water supplies to the nearby city of Jilin were temporarily cut after the incident on Wednesday, leaving 4.3 million people dependent on bottled water. A total of 7,000 barrels were washed into the river, with 2,500 containing the chemical trimethyl chloro silicane — a highly explosive, colorless liquid — while 500 contained the compound hexamethyl disilazane, Xinhua said. About 3,700 barrels had been recovered by Friday afternoon, the report said, but it was not clear how many of them contained the chemicals. Jilin is the latest province to have been hit by recent deadly floods that have killed more than 300 people since July 14 and left another 300 missing, according to the latest official figures. Until now, torrential rains have mostly hit China’s south, swelling the Yangtze River — the nation’s longest waterway — and some of its tributaries to dangerous levels. In the far-western Xinjiang region, rescuers were trying to reach 700 residents, construction workers and tourists trapped by floods. Floodwaters have damaged three bridges and a dozen buildings in Kuqa county in the central part of the region, with more than 13,000 people from the area preparing to reinforce dykes to contain floods. The worst floods in a decade have left 991 dead and 558 missing since the beginning of the year and caused more than 28 billion dollars in damage, latest official figures show, and authorities have warned of more to come. In Uncategorized on July 23, 2010 at 11:16 am leaders, Media, N.Korea:, new, pick, to N.Korea to pick new leaders: media In Uncategorized on June 26, 2010 at 12:41 pm SEOUL (AFP) – North Korea’s ruling party will convene a rare meeting of its political bureau in September to elect new leaders, Pyongyang’s official media reported Saturday. It will be only the third such meeting of the ruling Workers’ Party of Korea (WPK) since the state was founded in 1948 and would likely designate leader Kim Jong-Il’s son as his political heir, analysts said. This 2007 picture, released from Korean Central News Agency, shows North Korean soldiers, carrying a large portrait of late N.Korean leader Kim Il Sung (AFP/KCNA/File) The session would be “for electing its (the party’s) highest leading body,” said an announcement carried by the North’s Korean Central News Agency (KCNA). “The Political Bureau of the WPK Central Committee decides to convene early in September, Juche 99 (the year 2010), a conference of the WPK for electing its highest leading body,” KCNA said. Analysts said the conference would have enormous political significance and would raise the status of Kim Jong-Un, Kim Jong-Il’s youngest son. “This is an extremely rare meeting,” Kim Yeon-Chul, a professor at Inje University, told AFP, adding that the two previous sessions were held in the 1950s and 1960s. Kim Yong-Hyun, a professor at Dongguk University, said the conference would be the most important party event since 1980, when a full-fledged convention of all members made public Kim Jong-Il’s status as Kim Il-Sung’s successor. “There will be an important reshuffle of the party’s official posts aimed at preparing for an eventual succession,” he said. Speculation about succession in North Korea has intensified after Kim Jong-Il, now 68, suffered a stroke in August 2008, but he has since recovered sufficiently to allow him to return to work. Yang Moo-Jin, a professor at the University of North Korean Studies, said the conference was part of a series of events aimed at reshuffling the country’s military, party and the government. Over the past year, North Korea carried out personnel changes at the powerful National Defence Commission chaired by Kim Jong-Il and reshuffled its government cabinet. “The September meeting, which is aimed at reorganising the party leadership, will wrap up the reshuffle,” Yang said. “We cannot rule out the possibility that the party may anoint Jong-Un as successor behind close doors.” But the North is likely to wait until 2012 before it makes public the son’s status as his father’s official successor, Yang said. North Korea has vowed to build a prosperous socialist state by 2012, when it celebrates Kim Il-Sung’s 100th birthday. South Korea’s spy chief said this week that Kim Jong-Il’s poor health is driving him to speed up preparations for the transfer of power to Kim Jong-Un. Won Sei-Hoon, director of the National Intelligence Service, told parliament Thursday that Jong-Un, 27, was taking a greater role in policy-making than before and frequently accompanied his father on inspection tours. Saturday’s announcement comes with tensions high over the sinking in March of a South Korean warship, the Cheonan, leaving 46 dead. A multinational investigation concluded it was attacked by a North Korean torpedo. A US State Department spokesman said Friday Washington was aware of a North Korean notification that it was declaring a nine-day “no sail” zone off its western coast, which in the past has signalled the onset of missile tests. “North Korea should refrain from actions that aggravate tensions,” spokesman Philip Crowley said. “We would hate to see North Korea go through another round of missile launches.” South and North Korea fired off a volley of cross-border accusations Friday as they marked the 60th anniversary of a war that killed millions of people and has kept the peninsula divided to this day. agencies, asked, Media, news, quality, raise, to Media agencies asked to raise news quality QĐND – Monday, June 21, 2010, 22:17 (GMT+7) The National Assembly, Party and Government leaders have asked the media to further enhance its news quality while asserting its important role in social life. At his meeting in Hanoi on June 20 with journalists on the occasion of Vietnam’s 85th Revolutionary Journalism Day (June 21), NA Chairman Trong praised the media as “a close friend” and “an important information channel” of the National Assembly. “Whether the National Assembly’s sessions can drum up public interest or not are largely attributed to the press,” Chairman Trong said, urging the media to improve the quality of coverage so that readers can understand the legislative body’s activities more thoroughly. He particularly hailed the press in general, and the newspapers of the NA in particular, for disseminating information on activities related to the NA, its committees and the people’s councils. Mr Trong said he expects the media to focus more on covering positive trends in society and combating negative phenomena as well as sabotage schemes under the guise of democracy and human rights to undermine the national unity. The same day, To Huy Rua, who is politburo member, secretary of the Communist Party of Vietnam Central Committee (CPVCC) and head of the CPVCC’s Education Commission, visited the Vietnam News Agency (VNA). Rua spoke highly of the VNA’s contributions to the national construction and development, emphasising that the VNA has successfully fulfilled its role and responsibility as an important and reliable strategic information channel of the Party and State. Its provision of timely and accurate information has served well the policy-making and execution as well as meeting the research and information demands of other agencies. He also affirmed that the VNA has well performed its tasks to bring the news to the Vietnamese community and foreign friends abroad. The VNA should continue to raise the quality, effectiveness and competitiveness of its services, and develop the multi-media news service, including the creation of its own television channel, Mr Rua noted, expressing hope that the country’s only news agency will be able to keep pace with regional and international news agencies. Later, Mr Rua made a tour of the Nhan Dan (People) newspaper, Radio the Voice of Vietnam, the Communist Review, the Quan doi Nhan dan (People’s Army) newspaper, the Vietnam Television, the Cong an Nhan dan (People’s Police) newspaper, and the Journalism and Propaganda Institute. Congratulating the journalists on their anniversary, Mr Rua asked the media to focus on covering on Party congresses at all levels in preparation for the 11thth National Party Congress, and the implementation of the campaign “Studying and following the moral example of President Ho Chi Minh” and other major events in 2010. The same day, Deputy Prime Minister Nguyen Thien Nhan held a working session with the staff of the Governmental e-portal, where he asked them to improve the accuracy, timeliness and efficiency of the information. The portal should also provide in-depth analysis of the Government’s viewpoints and policies to help the public gain a better understanding, Mr Nhan said. Source: VNA/PANO against, campaign, exhibits, hanoi, in, Media, pictures, Trade, wildlife Media campaign against wildlife trade exhibits pictures in Hanoi A media campaign aiming to curb the smuggling of rare wildlife, warns citizens not to sell endangered species protected by law. Foreign visitors look at pictures at the Noi Bai Airport (Photo: Thien Nhien) At Noi Bai Airport in Hanoi on May 11, organizers of the campaign displayed 16 pictures of endangered animals typically caught and sold illegally, including tigers, bears, elephants, and rhinos. The campaign titled “Don’t buy complications,” encourages people to refrain from buying illegal animal products. Those who engage in the sale of rare wildlife are subject to fines and criminal prosecution, the campaign’s message said. Campaign organizers selected the Noi Bai International Airport for its high level of visibility, hoping to draw as much attention as possible to the issue of illegal animal smuggling. The northern Vietnamese airport serves about 4 million passengers a year. The campaign, headed by the organization TRAFFIC, also has the support of TRAFFIC, the Wildlife Trade Monitoring Network, the Party Central Committee Commission for Propaganda and Education, the Ministry of Transport, World Wildlife Fund and the Department of Forestry. against, base, Islanders, Japanese, Media, plan, rally, US Japanese islanders rally against US base plan: media In Uncategorized on April 18, 2010 at 7:29 pm TOKYO, April 18, 2010 (AFP) – Thousands of people rallied on a remote Japanese island Sunday, protesting against a possible government move to relocate a major US air base there. The issue centres around a decision by Prime Minister Yukio Hatoyama to review a 2006 agreement with the United States to allow the Futenma Marine Corps Air Station to be moved from an urban area to a quieter coastal part of Okinawa. But media have since reported that the government is planning to transfer the base to Tokunoshima, a subtropical island in Kagoshima prefecture, 200 kilometres (125 miles) north of Okinawa. Hatoyama’s apparent indecision on the issue has become a thorn in Japan-US relations while he battles a slide in his popularity at home. “Let us spread this protest movement to the end,” Hideki Takaoka, mayor of a town on Tokunoshima, told the rally, according to television footage. “Down with the US base,” the protesters chanted at the rally on Tokunoshima, which has 27,000 islanders.” The sugar cane industry and dairy farming are major contributors to the island’s economy. “We prepared 13,000 flyers and all of them were gone,” island official Osamu Minobe told AFP by telephone. Organisers estimated that 15,000 people turned out but police said they did not count the numbers. “I believe we can change the government’s attitude by sending our message today,” another town mayor, Akira Okubo, told Japanese media. Premier Hatoyama has told US President Barack Obama he will find a solution by the end of May. The Okinawa chain, strategically located close to China and the Korean peninsula, hosts more than half of 47,000 US troops based in Japan. The 1995 rape of a Okinawan school girl by three US servicemen prompted mass protests that led to the relocation plan, coupled with the transfer of 8,000 marines to the US Pacific territory of Guam. But Hatoyama has yet to present a definite alternative plan while the Obama administration has repeatedly said the 2006 agreement is the best option. Japanese media have speculated Hatoyama might have to resign if he fails to resolve the row before this self-imposed deadline expires. Tokunoshima hosted a former Japanese military air base during World War II and was returned to Japanese rule in 1953 after US military occupation.
cc/2019-30/en_head_0021.json.gz/line1730156
__label__wiki
0.872294
0.872294
Where does OLINSKY rank in the most common names in the U.S.? OLINSKY is identified by the U.S. Bureau of the Census as a surname with more than 100 occurrences in the United States for the year-2000 U.S. Census. In "Demographic Aspects of Surnames from Census 2000", the Census Bureau tabulated the surnames of all people who had obtained Social Security Numbers by the year 2000. OLINSKY ranks # 99214 in terms of the most common surnames in America for 2000. OLINSKY had 169 occurrences in the 2000 Census, according the U.S. government records. Out of a sample of 100,000 people in the United States, OLINSKY would occur an average of 0.06 times. For the last name of OLINSKY the Census Bureau reports the following race / ethnic origin breakdown: 0 percent, or None reported total occurrences, were "Non-Hispanic Asian and Pacific Islander Only" Search the web for more on the name OLINSKY :
cc/2019-30/en_head_0021.json.gz/line1730157
__label__wiki
0.850785
0.850785
Leadership Lessons from LeBron Today, LeBron James is arguably the best basketball player in the NBA. He is the King of Cleveland, at least for the next year for bringing home a promised NBA championship, to a city that has suffered without a major sports champ for 52 years after the Browns took the last championship in 1964. But behind James’ architecture of the dramatic come-from-behind win over Golden State in Game 7 of the NBA Finals, and also a Finals MVP, lies some leadership lessons. Leaders cast a vision. LeBron gave an interview to Sports Illustrated when he announced he was coming home to Cleveland. He has already won 2 championships with the Miami Heat and had 4 MVPs under his belt. But he cast a vision for what he would bring to his home state. He said, “Our city hasn’t had that feeling in a long, long, long time. My goal is still to win as many titles as possible, no question. But what’s most important for me is bringing one trophy back to Northeast Ohio.” LeBron threw out a vision for where the team would be. He was also very realistic in recognizing where his team was in July 2014 when he rejoined the Cavaliers. He recognized he had a young team and young coach. But the team will never reach the pinnacle, unless the leader is able to cast a vision and then say that he knows the way to get there. Another example that comes to mind is Russell Wilson, the young quarterback for the Seattle Seahawks, who his team believe “why can’t we be the champions?” on their way to their first Superbowl victory. Leaders take responsibility. In the SI interview, James stated, “I’m going into a situation with a young team and a new coach. I will be the old head. But I get a thrill out of bringing a group together and helping them reach a place they didn’t know they could go. I see myself as a mentor now and I’m excited to lead some of these talented young guys.” LeBron recognized his position as a leader and accepted the mantle. He worked to develop those around him and poured efforts into young players like Kyrie Irving and Tristin Thompson, to develop them into stars. He also worked with new veterans who joined the team to provide more leadership around him. But he recognized his responsibility went beyond the court, it was also to the community. The SI interview quoted James, “I feel my calling here goes above basketball. I have a responsibility to lead, in more ways than one, and I take that very seriously. My presence can make a difference in Miami, but I think it can mean more where I’m from. I want kids in Northeast Ohio, like the hundreds of Akron third-graders I sponsor through my foundation, to realize that there’s no better place to grow up. Maybe some of them will come home after college and start a family or open a business. That would make me smile. Our community, which has struggled so much, needs all the talent it can get.” Leaders not only take responsibility for their team, but they also realize their position in the industry and community. Leaders set the work ethic. If you have a lazy team, you will probably have a lazy leader. LeBron recognized the challenge by coming back to Cleveland. He said, “In Northeast Ohio, nothing is given. Everything is earned. You work for what you have. I’m ready to accept the challenge. I’m coming home.” The leader has to be willing to be the one to come in early, stay late, and work hours that may require sacrifice of personal comforts. Additionally, those who want to be a leader need to show the same work ethic. Leaders plan and execute over the long term. James recognized in 2014 that they were not ready as a team to win in that year. But he was committed to working to put the right pieces together to capture as many championships for Cleveland as possible. James’ focus was not to have a one-trick pony that would win one and then not be able to reach the pinnacle again. His goal was to build a base for excellent basketball year after year. Even after their stunning victory in the finals, the Cavs are still recognized as the best team in the East and as a favorite to make it to the top again. Leaders learn from mistakes. John Maxwell calls this “failing forward.” Winston Churchill once commented success was going from failure to failure with great enthusiasm. But as you reach those failures, you learn from each of them and use those skills to be better. Maxwell has a book titled Sometimes You Win, Sometimes You Learn. That attitude can make the world of difference with being successful in life. The owner of the Cavs, billionaire Rock Financial CEO Dan Gilbert, and James had a publically vile relationship when James left for Miami. He called his move a betrayal. But James learned valuable skills as he helped the Heat win championships in 2012 and 2013. Some of these lessons helped mature James into the leader that he is today. After the nets were cut down, Gilbert said, “Everybody made mistakes for years, but by making them everybody learned, myself, the franchise, coaches, players, LeBron, everybody. And now, here we are, only because we learned.” Newer PostAre No Loan Losses Community Losses? Older PostDo Distributions Compromise Repayment?
cc/2019-30/en_head_0021.json.gz/line1730163
__label__wiki
0.538267
0.538267
History of Christianity Unit The mission of this Unit is to deepen and broaden the study of the Christian past by presenting innovative and engaging research on the history, culture, and development of Christianity from its origins to the present, while at the same time promoting interdisciplinary dialogue among the fields of history, religious studies, ritual studies, art history, anthropology, and historical theology. We have a strong commitment to providing a showcase for the work of both younger and established scholars in the field. The History of Christianity program Unit continues to encourage chronological depth and geographic breadth in the study of Christian histories. Generally, unless otherwise noted, we invite papers and papers sessions that address the issues suggested in this Call for Proposals across time periods. We also continue to invite papers or full panels on topics and periods not explicitly mentioned in this Call. ● The following tri-sponsored session (History of Christianity; Latina/o Religion, Culture, and Society; and Religion, Memory, and History Units) invites proposals that explore the themes of religious contact, crossings, and contestation, and especially encourage historical perspectives on militarized border encounters (broadly construed). The quincentennial of Hernán Cortez’s arrival in Mexico occasions us to consider contact cultures in the history of Christianity in the Americas and the longer legacy of incommensurate religious, cultural, political, and social encounters. The location of the AAR’s 2019 meeting in San Diego further invites interrogations of borders as sites and metaphors of contact as well as of containment. 250 years after Cortez’s landfall, Fr. Junipero Serra, also under the auspices of the Spanish Crown, undertook the establishment of missions throughout California. The first of these, San Diego de Alcalá, founded 250 years ago (1769), symbolizes the expansion and contested legacy of the Spanish borderlands. San Diego itself epitomizes the gateway of contact and encounters. The U.S.A.-México border is an open wound, noted critic Gloria Anzaldúa wrote, “where the Third World grates against the first and bleeds.” The recent confrontation between the “caravan” of Hondurans and armed agents of the Mexico and the United States’ heavily-militarized border at the gates of the Tijuana-San Diego crossing, serves as a sobering reminder of Anzaldúa’s description and, at the same time, complicates the longer legacy of borders in the Americas. ● The following co-sponsored call is issued jointly with the Use, Influence, and Impact of the Bible Unit of the Society of Biblical Literature, and represents a welcome unprecedented opportunity. The location and date of our meeting further prompts us to consider the hemispheric and transatlantic linguistic dimensions of contact, as 2019 represents the 450-year anniversary of the publication of La Biblia del Oso (The Bear Bible), the first Spanish-language translation of the Bible which was published in 1569 in Basel, Switzerland by the exiled monk Casiodoro de Reina. His fellow monk Cipriano de Valera, revised his work, culminating in the 1602 Reina y Valera Bible. It looms as large in the memory and culture of Spanish-speaking Protestantism as does the 1611 King James translation in English-speaking Protestantism. In keeping with the theme of encounters, we invite papers that explore the history of sacred text making, translating, and reception history within communities in and around the hispanophone world. ● The long legacies of these aforementioned decisive turning points in Christian history, provokes us to consider political uses of the past (e.g., myths, symbols, texts, creeds, figures, etc.). Notions of the past return in material and visual culture and are often deployed to assert dominance (as in the case of new medievalism of white Christians) and/or resistance to systems of domination. What light can historians of Christianity (across the sweep of history and the globe) shed these patterns of violence (physical, discursive, emotional, and otherwise)? What are ways in which progressive Christian movements have also made uses of the past? Furthermore, the modern appropriation of the past provokes us to consider the very use of “religious history” and the “history of religions” (as it pertains to Christianity). At the dawn of the 25th year since the 1993 Religious Freedom Restoration Act, we ask how government and ruling bodies across the Christian tradition have historically applied and denied the use of the term religion in legal and political contexts. Lloyd Barba, lbarba@amherst.edu Trish Beckman, beckman@stolaf.edu Constance Furey, cfurey@indiana.edu Horace E. Means, horacesixmeans@gmail.com Peter Anthony Mena, pmena@sandiego.edu
cc/2019-30/en_head_0021.json.gz/line1730166
__label__wiki
0.977816
0.977816
Oscars 2018: Everything You Need to Know About the Most Memorable Moments, Insider Tips and More February 23, 2018 – 6:00 AM – 2 Comments By Mara Reinstein Parade @@MaraReinstein More by Mara Sigourney Weaver Reminisces on Her Career, Alien, Avatar and the New Ghostbusters From Tippi Hedren in The Birds to Jamie Lee Curtis in Halloween: 11 Fierce Females in Our Favorite Horror Films Is Candle In the Wind Really About Marilyn Monroe? The Real Stories Behind Classic Elton John Songs It’s always an exciting, glamorous night, but last year the annual Academy Awards show had a particularly memorable moment. Because of a backstage snafu, the night’s top honor was mistakenly awarded, temporarily, to the wrong movie (La La Land instead of Moonlight). “After the Best Picture envelope mix-up last year, there’s built-in interest because we ended on a cliffhanger!” says this year’s host, Jimmy Kimmel. Related: Jimmy Kimmel’s Hair and Makeup Routine for Oscars Sunday With Parade readers’ and Kimmel’s help, we rated the Oscars’ top memorable moments and gathered some of the most fascinating trivia in the awards program’s long history. (AP Photo) The Academy Awards Streaker, 1974 Midway through the Oscars ceremony, Robert Opel—who posed as a journalist to get backstage—ran onstage naked and flashed a peace sign as cohost David Niven introduced Elizabeth Taylor. Quipped Niven, “The only laugh that man will ever get in his life is by stripping off and showing his shortcomings! (REUTERS/Gary Hershorn/Newscom) Jack Palance’s One-armed Push-ups, 1992 The audience went wild when show-off Jack Palance, at 73, dropped to the floor for one-armed push-ups after his Best Supporting Actor win for his role as cowboy Curly Washburn in City Slickers. (Archive Photos/Getty Images) Sidney Poitier’s Best Actor Win, 1964 Sidney Poitier was the first African-American to win a Best Actor Oscar (for his performance in Lilies of the Field). The first African-American woman to win was Hattie McDaniel, who won Best Supporting Actress for Gone With the Wind in 1940. (AP Photo/Eric Draper) Roberto Benigni’s Excited Chair Walk, 1999 When Life Is Beautiful won Best Foreign Film, director Benigni (who also received the Best Actor award for the movie) leapt over the top of the velvet seats en route to the stage. “That really made an impression on me,” says Kimmel. “He was just delightful. When I think about Oscar highlights, that always pops in my head.” (ABC Photo Archives/ABC via Getty Images) Sally Field’s “You Really Like Me” speech, 1985 People cheered when Field, who’d played the title roles in 1960s TV sitcoms Gidget and The Flying Nun, won her second Academy Award for a serious role in Places in the Heart. Yet for decades the actress’s acceptance speech has been misquoted. She didn’t say “really” but actually said, “I can’t deny the fact that you like me. Right now, you like me!” (Ellen DeGeneres/Twitter via Getty Images) The Selfie That Broke Twitter, 2014 Host Ellen DeGeneres’ famous audience selfie set a record for retweets. DeGeneres, Jared Leto, Jennifer Lawrence, Channing Tatum, Meryl Streep, Julia Roberts, Kevin Spacey, Bradley Cooper, Brad Pitt, Lupita Nyong’o, Peter Nyong’o and Angelina Jolie all squeezed into the photo. (TIMOTHY A. CLARY/AFP/Getty Images) Adrien Brody’s Big Kiss, 2003 He planted a big smooch on stunned presenter Halle Berry when he won Best Actor for The Pianist. (Ralph Crane/The LIFE Picture Collection/Getty Images) Charlie Chaplin’s 12-Minute Standing Ovation, 1972 Chaplin received the ovation—the longest in Oscars history—when accepting the Lifetime Achievement Award. (Kevin Winter/Getty Images) J. Law’s Tumble, 2013 Jennifer Lawrence didn’t let her little trip up the stairs stop her sprint to accept her Best Actress award for Silver Linings Playbook. (PA Images / Alamy Stock Photo) The Swan Dress, 2001 Icelandic singer Björk got more attention than she bargained for on the red carpet when she wore a dress that resembled a swan (including the neck and head). Years later, the dress was still being mocked, notably by Kevin Hart and Ellen DeGeneres, who both donned versions of it for awards shows. Here are a few more fun facts about the first 90 years of the Academy Awards. (Albert Watson/ALMPAS) That’s Heavy The Oscar statuette stands 13.5 inches tall and weighs 8.5 pounds. By comparison, a Grammy and an Emmy trophy are each about 6 pounds and a Tony award is just under 2 pounds. The Oscar got its nickname from onetime Academy librarian Margaret Herrick, who remarked in 1931 upon seeing a statuette, “Why, it looks like my uncle Oscar!” (Denver Post via Getty Images) The biggest night in Hollywood started as a private dinner in the Roosevelt Hotel in downtown Los Angeles in May 1929. Actor and Academy of Motion Pictures of Arts & Sciences president Douglas Fairbanks hosted, and Best Picture went to Wings, which remains the only completely silent film to ever take the prize. (Courtesy Everett Collection) Ben-Hur (1959), Titanic (1997) and The Lord of the Rings: The Return of the King (2003) all won 11 Oscars. This year’s top nominee, The Shape of Water, has 13 nominations. Last year, the Ryan Gosling and Emma Stone musical La La Land racked up 14 nominations, winning six. Better With Age At 82, Christopher Plummer became the oldest winning actor ever when he nabbed Best Supporting Actor for his role in Beginners (2010). Now 88, he replaced disgraced Kevin Spacey in the role of billionaire oil magnate J. Paul Getty in the drama All the Money in the World, filming 20 scenes in nine days. He’s nominated this year for Best Supporting Actor for that role. (Jason Merritt/Getty Images) The 21+ Club Meryl Streep, 68, who plays Washington Post publisher Katherine Graham in The Post, is the most nominated actress in Academy history. (She’s nominated again this year, bringing her total to 22.) She’s won the Oscar three times—twice for Best Actress (Sophie’s Choice and Iron Lady) and once for Best Supporting Actress (Kramer vs. Kramer). She still has one to go to catch another Katharine (Hepburn). (Emilio Flores/Everett Collection) In 2010, Kathryn Bigelow, now 66, broke new ground by becoming the first female to win the Best Director Oscar, for The Hurt Locker. Only three women had been nominated before her, including Sofia Coppola for Lost in Translation (2003). This year, Greta Gerwig, the director of Lady Bird, became the fifth woman in the history of the Oscars to receive a nomination in the Best Director category. Meanwhile, director Patty Jenkins’ Wonder Woman, starring Gal Gadot, was the third-highest-grossing domestic film of 2017 and a hit with critics and fans—but was shut out of nominations for this year’s honors. (Emma McIntyre/Getty Images for THR) (Frank Micelotta/Getty Images) Flirting With History If New Yorker Timothée Chalamet, 22, takes home a Best Actor trophy this year for playing a lovestruck gay teen in the drama Call Me by Your Name, he’ll become the youngest winner ever in the category. He’d beat out fellow New Yorker Adrien Brody, who was 29 when he won for 2002’s The Pianist. (Weinstein Company/Courtesy Everett Collection) They Rule! When it reigns, it pours: In 90 years, a whopping 18 acting nominations and five wins have gone to performers playing British monarchs, ranging from Charles Laughton in The Private Life of Henry VIII (1933) to Colin Firth as King George VI in The King’s Speech (2010). (Jemal Countess/Getty Images) Snub Hub Zero. That’s the combined number of Oscar nominations for Richard Gere, John Cusack, Scarlett Johansson, Jim Carrey, Meg Ryan, Dennis Quaid, Jeff Daniels, Isabella Rossellini and Emily Blunt. Ben Affleck has never received a nod either—for acting, at least. (He won for co-writing Good Will Hunting with Matt Damon and for co-producing Argo). (Frederick M. Brown/Getty Images) (Frazer Harrison/Getty Images) Screen Queens Best Supporting Actress nominees Laurie Metcalf, 62, and Allison Janney, 58, both play salty moms in their respective movies, Lady Bird and I, Tonya. And they’re TV-ready: Janney has seven Emmys (one less than all-time winner Julia Louis-Dreyfus). Metcalf won three for her role as Aunt Jackie on Roseanne, a character she’ll reprise in the March reboot. (JOE KLAMAR/AFP/Getty Images) Oscar Hat Trick Now this is how you leave them wanting more: Newly retired Daniel Day-Lewis, 60, who portrays a perfectionist clothing designer in Phantom Thread, is the only actor to have won three Best Actor Oscars—for My Left Foot, There Will Be Blood and Lincoln. (He was also nominated for Gangs of New York and In the Name of the Father, and he’s nominated this year.) They Shoot, He Scores With 51 nominations, legendary composer John Williams (Star Wars, Raiders of the Lost Ark, E.T.) is the most Oscar-honored person alive today. He’s won five. This year, the 85-year-old former Boston Pops conductor scored the music for The Post—for his longtime collaborator, director Steven Spielberg—as well as the music for the blockbuster Star Wars: The Last Jedi (nominated for Best Original Score). (Columbia Pictures/Courtesy Everett Collection) (Dominique Charriau/Getty Images) Youngest and oldest! Justin Henry was just 8 when he was nominated in 1980 for Best Supporting Actor for Kramer vs. Kramer. At the age of 89, writer-director Agnès Varda, nominated this year for the documentary Faces Places, becomes the Oscars’ oldest nominee ever, in any category. (Universal/Courtesy Everett Collection) Bloody Impressive If the Jordan Peele–directed blockbuster Get Out—the racially charged dark comedy about a black man’s weekend from hell at his white girlfriend’s family home—takes Best Picture, it will be only the second horror film in history to do so. The first: The Silence of the Lambs (1991). Kimmel has yet to see Get Out: “I’m scared of horror movies!” He says he and his wife, Molly McNearney (head writer on the CBS comedy 9JKL), plan to watch the film in broad daylight. Show Me the Funny! Comedy films “tend to get overlooked” as Best Pictures, admits Kimmel. Indeed, Woody Allen’s 1977 classic Annie Hall is one of the only prizewinners in that category. Award-winning comedic performances, in acting categories, include Kevin Kline in A Fish Called Wanda (1988), Jack Palance in City Slickers (1991), Marisa Tomei in My Cousin Vinny (1992) and Cuba Gooding Jr. in Jerry Maguire (1996). Kimmel’s funny faves this year? The Disaster Artist, The Big Sick and Thor: Ragnarok—even though it featured a cameo from his longtime “nemesis,” Matt Damon. “It’s a minor blemish in an otherwise splendid film!” Mahershala Ali’s first nomination last year for Moonlight resulted in a Best Supporting Actor win. Other charmed rookies include Reese Witherspoon, 41 (2005’s Walk The Line), George Clooney, 56 (2005’s Syriana), Catherine Zeta-Jones, 48 (2002’s Chicago), Lupita Nyong’o, 34 (2013’s 12 Years a Slave), and Jennifer Hudson, 36 (2006’s Dreamgirls). That could bode well this year for newbies such as 49-year-old Sam Rockwell, who plays a volatile sheriff in Three Billboards Outside Ebbing, Missouri; he’s nominated for Best Supporting Actor. Famous Footnotes Sacheen Littlefeather: At the 45th Academy Awards, the actress and activist (born Marie Louise Cruz), now 71, declined, at his request, Marlon Brandon’s 1972 Best Actor Oscar, telling the shocked audience that the Godfather star refused his award because of Hollywood’s treatment of Native Americans. Her appearance prompted a ban on future acceptance-by-proxy. The key to a well-paced show: “Focus on the audience,” says Kimmel. “If you keep them interested, you’ll keep the people at home interested. When the energy escapes from the room, the home audience senses it too. Billy Crystal gave me that advice last year and he was right.” 1 hour 40 minutes (1959 telecast, co-hosted by Jerry Lewis (video), Mort Sahl, Tony Randall, Bob Hope (video), David Niven and Laurence Olivier) 4 hours 23 minutes (2002 show, hosted by Whoopi Goldberg) Win & Repeat (Inarritu - Jason Merritt/Getty Images Rainer - Courtesy Everett Collection Tracy - Courtesy Everett Collection Hepburn - Courtesy Everett Collection Robards - Courtesy Everett Collection Hanks - JEFF HAYNES/AFP/Getty Images) Alejandro González Iñárritu, 54, won back-to-back Best Director Oscars for 2014’s Birdman and 2015’s The Revenant. These actors and actresses also accomplished rare two-fers: Luise Rainer 1937 (The Great Ziegfeld) and 1938 (The Good Earth) 1938 (Captains Courageous) and 1939 (Boys Town) 1968 (Guess Who’s Coming to Dinner) and 1969 (The Lion in Winter) 1977 (All the President’s Men) and 1978 (Julia) 1994 (Philadelphia) and 1995 (Forrest Gump) There's a discussion among 2 members. Press "Read Comments" to view.
cc/2019-30/en_head_0021.json.gz/line1730167
__label__wiki
0.921355
0.921355
The Latest: Evacuations lifted in Napa County blaze Associated Press 10 September 2018, 7:18 PM UTC In this photo provided by the California Department of Transportation, lanes are closed on northbound Interstate 5 with the Delta Fire burning in the background Friday, Sept. 7, 2018, near Lakehead, Calif. A stretch of a major highway near the California-Oregon border will remain closed through the weekend as crews try to tame a roaring wildfire burning on both sides of the north-south route, authorities announced Friday. The blaze that shut down Interstate 5 on Wednesday was still burning out of control, said Denise Yergenson, a spokeswoman for the California Department of Transportation. (Joe Spini/California Department of Transportation via AP) SHASTA-TRINITY NATIONAL FOREST, Calif. (AP) — The Latest on wildfires in California (all times local): California fire officials have lifted all mandatory orders for a fire in Napa County that ignited over the weekend and had threatened 180 homes. The California Department of Forestry and Fire Protection said Monday residents of the rural area can return but should remain vigilant. The 4-square-mile (10-square kilometer) blaze began Saturday in the Napa County woodlands, but cooling weather helped fire crews slow its growth. The fire is 30 percent contained. The cause of the wildfire remains under investigation. A California transportation official says motorists should expect delays on a newly reopened stretch of highway that connects Northern California to Oregon. California Department of Transportation spokeswoman Denise Yergenson says one lane in each direction of Interstate 5 reopened Monday for drivers traveling through the area. The highway opened six days after a wildfire roaring along the roadway forced its closure. She says officials have determined that the freeway is safe for travel but potential closures could be ordered at any time because the fire is still burning. The blaze had chewed 64-square-miles (165-square-kilometers) of timber and brush in and around Shasta-Trinity National Forest. It was 5 percent contained as of Monday. Officials say a major interstate that connects Northern California to Oregon has reopened six days after a wildfire roaring along the roadway forced its closure. California Department of Transportation spokeswoman Denise Yergenson says one lane in each direction of Interstate 5 reopened Monday at 8:30 a.m. She says no vehicles carrying potential flammable materials will be allowed along a 17-mile stretch between Antlers Bridge in Lakehead and Flume Creek Road south of the city of Dunsmuir, California. She says that includes vehicles carrying hay, wood chips, lumber, logs. The highway that traverses the West Coast from Mexico to Canada and serves as a main artery for commerce had been closed since Wednesday, forcing trucks and other traffic on smaller roads that has added 100 miles (160 kilometers) to their journeys.
cc/2019-30/en_head_0021.json.gz/line1730169
__label__cc
0.570391
0.429609
The roots of existentialism began with Kierkegaard in the first half of the 19th century. He was critical of Hegel's philosophical system which analysed being (or existence) in an abstract and impersonal way. Kierkegaard was concerned with the individuals subjective experience of what it is to exist as a human being. For Kierkegaard the individual constantly has to choose what s/he is to become without recourse to the findings of science and philosophy. As we saw in the philosophy of god section Kierkegaard thought that the individual could chose to have a religious faith in the face of an absurd world The German phenomenologist Edmund Husserl (1859-1938) was influential in the development of methods that were later used by the existentialists. A phenomenologist is interested in things as they appear to consciousness, rather than things-in-themselves (See Kant). This emphasis on the individuals subjective consciousness was continued in the 20th century as existentialism developed. Martin Heidegger (1889-1976) studied under Husserl. Heidegger was interested in the "question of being". He thought that western philosophy had been over obsessed with the problem of knowledge. For Heidegger the individual as being-in-the-world was characterised by action and anxiety: knowing the world is not our primary way of being in the world. In his later works, Heidegger became more interested in the history of concepts in language. He regarded his investigations as an attempt to disclose or uncover the concealed nature of being. His most fundamental question was: why should there be being at all, when there could be nothing? Although Heidegger claimed he was not an "existentialist", his influence on Sartre and the existentialist movement is undeniable. Jean Paul Sartre (1905-80) is, perhaps, the best-known existentialist. He was a gifted playwright and novelist who was offered the Nobel Prize for literature in 1964, but refused it. Sartre thought that there was no fixed human nature or essence and so the individual has to choose his/her being. This choice brings with it responsibility. Those who do not choose, but base their lives on pre-arranged moral and philosophical systems are said to be acting in bad faith. Albert Camus (1913-1960) was a journalist, novelist and philosopher. He thought that life was essentially absurd: the modern world is full of injustice, millions work in repetitive exploitative jobs. Camus thought that we should rebel against these absurdities by refusing to participate in them. Existentialism in the 20th century reflects the loss of certainties in the post-modern world. If there are no clear philosophical answers to the question of existence, then each individual has to design their own life as a project. The choice and responsibility of that project falls entirely on them. Kierkegaard: The solitary wanderer Søren Kierkegaard led a brilliant but turbulent life. His intellectual precocity was recognised by his father who educated him before he moved on to the University of Copenhagen where he studied for 10 years. As a young man, Kierkegaard began to feel that he would always be an 'outsider'. In 1837 he fell in love with the 14 year old Regine Olson to whom he became engaged. However after much inner turmoil he broke of the engagement, convinced that his fate was to be the 'exception', the lonely wanderer. Kierkegaard thought that philosophers who claimed that philosophy could show us the ultimate nature of spirit were deluded. Hegel claimed to have overcome paradox, but Kierkegaard was not convinced. Existence, for Kierkegaard, was paradoxical. The individual must find his/her spiritual path, not through the comfortable dogmatic rituals of the established church or the pseudo-clarity of Hegelian dialectics, but through action, action that is conscious of religious conviction. Kierkegaard held that religious faith was central to an authentic existence. His Christian existentialism has continued to be influential. Theologians have had to face the horrific absurdities of the 20th century and religious (or theistic) existentialism shows how the individual can, with faith be authentic in an uncertain world. Sartre: 'Existence precedes Essence' Jean Paul Sartre was one of the leaders of the French post war left wing intellectual movement, co-founding with Maurice Merleau-Ponty (1908-61) the journal Les Temps Modernes. His experiences as a resistance fighter shaped his philosophy that was influenced by the ideas of Husserl and Heidegger. Politically Sartre claimed he was a Marxist and thought that freedom had both political and individual dimensions. Unlike Kierkegaard, Sartre was an atheist. As God does not exist, there are no 'essences'. By essence, Sartre is talking about a pre-defined human nature. What Sartre meant by the phrase 'existence precedes essence' is this: If there is no cosmic designer, then there is no design or essence of human nature. Human existence or being differs from the being of objects in that human being is self-conscious. This self-consciousness also gives the human subject the opportunity to define itself. The individual creates his/her self by making self-directed choices. As human existence is self-conscious without being pre-defined, we, as autonomous beings are "condemned to be free": compelled to make future directed choices. These choices induce anxiety and uncertainty in to our psyches. If we, as individuals, simply follow custom or social expectations in order to escape this angst, we have escaped the responsibility of making our own choices, of creating our own essence. We have acted in bad faith. To act authentically we must take responsibility for our future. We cannot choose what gender, class, or country we were born into, but we can choose what we make of them. We are free to create our own interpretation of ourselves in relation to the world, to create a project of possibilities, of authentic actions as the expression of freedom. To contents (home)
cc/2019-30/en_head_0021.json.gz/line1730170
__label__wiki
0.583951
0.583951
Architecture - Commercial Historically, our community was preplanned with principles generated from progressive philosophical movements arising as a result of the excesses of industrialization in the late 19th century. The Garden City and Arts and Crafts Movements influenced Powell River's planners of 1910 in regard to the location and architectural style of our homes, parks, green belts, commercial buildings and recreation facilities. Townsite homes built before 1930 depended on add-on and decorative elements for articulation and architectural interest. For example, the use of roof brackets, add-on porch structures, boxed windows, and decorative porch and veranda posts and balustrades were common. Click on a photo to the right for a write-up and photos of commercial buildings built in the early part of the 1900’s. DWIGHT HALL Powell River has always had a ballroom which, in this very social town, has served as a community focal point and the place to hold most events. The original ballroom was built in 1911 and was located on the second floor of the Company Stores. During the depression years, the Powell River Company requested a loan from the Bank of Commerce to undertake the expansion of their facilities. Unfortunately, the Bank of Commerce turned them down. The Company went to great lengths and expense to find a bank which would provide them with the required loan. Another of the first buildings to be erected in Powell River was a simple and functional Frontier style structure which housed dry goods, groceries and offices. PATRICIA THEATRE Built in 1928, the Patricia Theatre has been characterized as exuding subdued elegance. The external architecture was designed in the Spanish Renaissance style, highlighted by the ornamentation on the upper external facade. No other buildings in Townsite have these unique features and styling. ST JOHN'S CHURCH The construction of St. John's Church was the result of the residents of Powell River pooling their resources together to build a nondenominational place of worship. ST JOSEPHS CHURCH In 1916, three years after the completion of the nondenominational St. John's, the Catholic community pooled their resources to build St. Joseph's Church and Rectory. As well as providing all the clear timber needed to build the structure, the Powell River Company also provided a large sum of money to see the building completed. ST LUKE'S HOSPITAL In the early years, Powell River's first hospital was located in a tent which was then replaced with a bunkhouse. After the arrival of Dr. Henderson in 1911, St. Luke's Hospital was completed in 1913.The hospital was located next door to Dr. Henderson's home. THE FEDERAL BUILDING Due to the ever-growing significance of the Powell River Company, the Federal Government decided to erect a building compatible with the extraordinary structures existing in the town of Powell River. With a progressive architect and an open chequebook, the result was indeed worthy of the high standards to which the residents of the town were becoming accustomed. THE PROVINCIAL BUILDING THE RODMAY HOTEL Vimeo G+ linkedIn Twitter Facebook YouTube Home - Townsite Heritage Society Townsite Heritage Digester Townsite Heritage Photo Gallery TOWNSITE WALKING TOUR PAPER PIONEERS FEDERAL BUILDING PROVINCIAL BUILDING RODMAY HOTEL ST. JOSPEH'S CHURCH RESIDENTIAL STYLES OCEAN VIEW APARTMENTS HENDERSON HOUSE Joomla Development by Memory Attic Media. All rights reserved.
cc/2019-30/en_head_0021.json.gz/line1730176
__label__cc
0.679606
0.320394
About Our Service Karl Marx's Theory of Alienation ← The Importance of Traditional Marriage Prism of Race/Ethnicity, Gender and Age in Youth Crime and Youth Justice → Buy custom Karl Marx's Theory of Alienation essay Karl Max used the theory of alienation to describe how people become alienated from their human nature aspects resulting from living in a society that is graded according to social classes. Alienation therefore results from living in a society that has different social classes as this alienates a person from his/her humanity. Based on the capitalist mode of production, the main aspect of this alienation theory is that a worker loses his or her ability to determine his or her destiny and life because he or she is denied the right to conceive or think for himself or herself. When this right is denied, a worker can never be the director of his actions; neither can he determine the sort of actions that he can take (Wood, 2004) By being alienated, a worker cannot define his/her relationships with other people and is not in a position to use the goods and services that he/she produces. Despite the fact that a worker is a mature and self-realized human being with the capability of making sound decisions, he/she is directed to work in order to achieve the goals of those that employed them or those who have their own means of production. The owners of means of production therefore extract the maximum of surplus value from a worker, and thereby, flourish in business. According to Karl Marx, alienation is the structure that will allow a capitalist society to grow since they cannot exist without it. The theory explains that in a capitalist society, people should be divided according to such structures so that they accept that it is just and natural (Hodson & Sullivan, 2012). Forms of Alienation The alienation theory discusses four ways of how labor becomes alienated in a capitalist society. The first one is alienating a worker from what he has produced. The way that a product is going to be produced is not determied by a worker or consumer. It is the capitalist class that determines it. The capitalists use their resources to determine the required labor and materials that will be used in manufacturing a product while maximizing the profits. The labor of the workers is then converted into products to be utilized by the consumers. The capitalists then maximize their output by selling the products at the highest rates possible and paying the workers the least possible salaries for the labor (Marx & Caute, 1967). The second form of alienation is alienating a worker from production. In a capitalist society, the mode of production requires that worker engages in an endless sequence of repetitive activities that usually leave a worker with no psychological satisfaction. The capitalists reward the efforts of the workers through wages, which, in most cases, are not proportional to the input of the latter into the production process. This division of labor in a capitalist society further leads to the exploitation of the workers, therefore limiting his power to determine how their labor is applied to the production (Wood, 2004). The third form of alienation is a system whereby a worker is alienated from himself being a producer. By nature, workers are supposed to have psychological dynamism and plurality of interests meaning that every person has a tendency and desire to engage in different activities that tend to socially connect people. The workers through their cognitive ability should be able to see the end of their effort as purposeful ideas. A person is supposed to draw motivation from seeing how good the final product looks as a result of the labor that he/she used. A worker is therefore deprived of his/her ability to subordinate his/her will to the demands that have been imposed upon him by his imagination (Churchich, 1990). The final form of alienation is where a worker is alienated from his/hher fellow workers. Alienation reduces the worker’s labor to commercial goods that are traded in the labor market as opposed to being an important figure in the socio-economic activity of a society. Capitalists therefore create a labor market that is competitive; hence, they are able to extract maximum labor value from workers. This form of alienation therefore pits the workers against each other, provoking social conflict and alienating them from their common economic interests. Solution to Alienation Marx thinks that the solution to this problem is communism. In a communist society, each worker works in a position where he/she has best skills and abilities, hence benefiting each worker accordingly. Communism makes the workers work on the basis of their innate abilities as opposed to working based on orders and wages. The production of goods and services in a communist society will therefore be directed towards achieving the needs of everyone as opposed to the capitalist system where the capitalists largely benefit. The collective requirements of the society determine the preferred mode of production in a communist society, hence resulting in equal distribution of profits that each worker gets. Communism, according to Marx, is capable of restoring the fullest determination of workers in their work. According to how Marx defines it, alienation is a bad thing because it is a form of exploitation. In a capitalist society, these are the workers that do the hard work, but the profits are enjoyed by the capitalists. Alienation denies the workers the ability to exercise control over the effects of their efforts. Alienation prevents the workers from specializing in a specific type of productive labor; hence, the workers are reduced to an object and instrument that cannot apply his labor to the betterment of his or her life. Earn 10% from all orders made by people you bring Your people also get 17% discount on their first order Prism of Race/Ethnicity, Gender and Age in Youth Crime and Youth Justice The Borders of the Community Perception The Importance of Traditional Marriage Multitask Children Live chat and customer support team working 24/7 Professional experts Quality and confidentiality guarantees All standard formats followed Investigation of all subjects No late orders Original paper writing 5% OFF for more than 15 pages 10%OFF for more than 30 pages Approximately 300 words/page FREE revision (within 2 days) FREE outline FREE e-mail delivery FREE formatting FREE plagiarism report (on demand) FREE abstract Written from scratch Any citation Fully referenced Never resold Unique customer system Character Analysis 1998-2019 Prime-Essay.com Terms of Use Privacy Policy Delivery Policy Sitemap Limited Time OFFER Get 10% OFF Your First Order!
cc/2019-30/en_head_0021.json.gz/line1730178
__label__wiki
0.683783
0.683783
2013: Now or never for the two.. 2013: Now or never for the two-state-solution By Ziad AbuZayyad Ziad AbuZayyad Ziad AbuZayyad, an attorney-at-law, is the co-editor and co-publisher of the Palestine-Israel Journal. He is a former Palestinian Authority minister and a former member of the Palestinian Legislative Council. 2013 will be a decisive year. If the international community doesn't stop Israel from killing the last chance for the two-state solution, this option will disappear forever to be replaced by a long painful bloody struggle which will end in a bi-national state, an option that Israel will never accept voluntarily. As 2012 ends, we should look back at how the events of the past year may have suggested routes for renegotiating the Palestinian: Israeli conflict. Firstly, we should examine the role of Egypt. The ceasefire between Hamas and Israel was achieved through Egypt's mediation, and its willingness to be the guarantor, which included an unwritten commitment to tighten control over its borders with the Gaza Strip, and preventing the smuggling of weapons through Sinai to Gaza. This suggests the possibility that Egypt can have a major influence on Hamas, by controlling the flow of military supplies to Hamas' arsenal and by influencing its future tactics. The exercise of Egyptian influence in the Gaza Strip may well put an end to the possibility that Sinai will become the new Tora Bora of the Middle East, and this influence serves the interests of both Israel and Egypt as well as the wider stability of the region. Egypt’s new leadership, dominated by the Muslim Brotherhood, has an interest in advancing its integration into the international community, by behavior adhering to international norms that will gain it legitimacy, and by developing and normalizing its relations with the U.S. administration. Today, the Egyptian leadership is facing a delicate internal situation as a result of continued protests against the new constitution. The door is open for many possible scenarios, starting from restoring stability to sinking into the mud of chaos. Assuming the internal crisis will be overcome, which is the most probable scenario, it might be followed by an intensive Egyptian effort to conclude the Fatah-Hamas reconciliation http://www.haaretz.com/news/middle-east/after-brokering-israel-gaza-truce-egypt-to-push-for-hamas-fatah-unity.premium-1.479927 and a regional and international effort to move the Palestinian-Israeli negotiations forward towards a resolution of the conflict. Such a development is very likely to happen right after the Israeli elections in January 2013. There are Israelis who believe that Egypt’s role in the agreement between Hamas and Israel should be used to resolve the problem of Gaza – meaning that there should be an Egyptian takeover of the Strip, as was the situation before the 1967 war. Those who push for this option concomitantly aim to abort the chance of creating a Palestinian state in the West Bank, Gaza Strip, and East Jerusalem by reviving the so-called Jordanian option. On the other hand, the PLO leadership, headed by President Mahmoud Abbas, believes that the UN recognition of the State of Palestine on the borders of June 1967 - with East Jerusalem as its capital - will represent the international terms of reference for any future negotiations with Israel by defining beforehand the future borders of the State of Palestine. The UN General Assembly recognition of the State of Palestine and its borders blocks the road in front of Israeli plans to avoid withdrawal from the West Bank, to give back Gaza to Egypt, and to revive the Jordanian option. No doubt that Abbas’ achievement in the UN contributed much to restoring his credibility, in the wake of Hamas’ claims of victory in its fight against Israel, in what has become known in the Palestinian media as the "Eight Days War". The year 2013, with a new/old administration in the White House, possibly a new/old government in Israel, reconciliation between Hamas and Fatah, and the increasing pressure of the international community to put an end to the Israeli-Palestinian conflict, will be a decisive year. Israeli plans to build thousands of new housing units on Palestinian occupied land including the new settlement in the area known as E-1 that isolates Jerusalem from the West Bank, are being seen worldwide as a warning red light. It is now or never. Either the international community will stop Israel from killing the last chance for the two-state solution, or this option will disappear forever, and be replaced by a long painful bloody struggle which will end in a bi-national state, an option that Israel will never accept voluntarily. Ziad AbuZayyad is the co-Editor of the Palestine Israel Journal www.pij.org, a former Palestinian Authority Minister and Member of the Palestinian Legislative Council, and former negotiator. This article originally appeared in Haaretz on December 31, 2012 http://www.haaretz.com/opinion/2013-it-s-now-or-never-for-the-two-state-solution.premium-1.490911
cc/2019-30/en_head_0021.json.gz/line1730179
__label__wiki
0.572921
0.572921
Government Accounting and Financial Reporting Uploaded by Murphy Red saveSave Government Accounting and Financial Reporting For Later IFRS_guidance Himanshu Lohia CV Accounting Disclosures and Corporate Attributes Government Accounting Framework Summary of Frs Audit and Review v2 Philippine Public Fiscal Administration PWC on IFRS and US GAAP Similarities and Differences 2013 ifrs & konservatisme government accounting theories Syllabus for Accounting 823_80_03-23-04_fasac_convergence IFRS of SMEs as Practiced in the Cooperative Industry CL31 - Considering the Effects of Accounting Standards - IPA Budgeting in a Public Sector Power Point P2_Study_Text_2016-2017.pdf Analysis of Business p tech3rd.pdf Chapter II - Accounting and Auditing in Pakistan MFRS_5 HON. ARMANDO G. PANGANIBAN This report describes government budgeting, accounting and auditing arrangements. For the purposes of this report, government comprises national government agencies, local government units and government owned and controlled corporations. Introduction describes fiscal pressures and recent developments. Legal Framework for Government Accounting sets out the key laws that govern government accounting and auditing arrangements. Organizational Roles and Responsibilities describes the organizations that coordinate budgeting, accounting and auditing within government. Budgeting and Reporting Calendar presents the annual timetable for budgeting and reporting processes. Accounting and Reporting Arrangements describes accounting and reporting arrangements, including bases of accounting and the contents of financial reports. Accounting Information Systems discusses the status of accounting information systems. Report Structure Internal Auditing describes internal auditing arrangements and requirements. Government Accounting Personnel discusses the competency and availability of government accounting personnel, and recent legislative initiatives to reduce constraints. Public Financial Management Reform Program describes the objectives and activities of the Governments public financial management reform program. Anticorruption Measures examines initiatives to reduce graft and corruption. Issue Synopsis: Government Budgeting and Accounting summarizes the issues identified in this chapter and in other diagnostic studies. DIAGNOSTIC STUDY OF ACCOUNTING AND AUDITING PRACTICES IN THE PHILIPPINES The Philippines realized fiscal surpluses between 1994 and 1997, prior to the Asian financial crisis. However, indicators have deteriorated significantly in the past 3 years. The Arroyo administration faced a worsening fiscal position that the Aquino government have inherited. Unless the Government curbs expenses and improves revenue collection, the coffers of the government can go empty that will spell bankruptcy for the ruling system because as early as 2001, budget deficit have reached P200 billion ($4.2 billion). The weak fiscal position is creating tensions with multilateral development banks. Moreover, it restricts the Governments ability to address infrastructure issues and poverty reduction. Furthermore, the Philippines experiences significant ongoing problems with corruption. With annual capital expenditure exceeding $3.5 billion, the procurement of goods and services, and implementation of infrastructure projects by the Government present significant opportunities for graft. Government accounting and auditing arrangements were formulated in 1947. They have many strengths including the use of double entry bookkeeping, a mixed cash-accrual accounting base, a cadre of well-trained accountants, and potential access to a large external pool of trained accountants. Public management arrangements are characterized by institutional and regulatory rigidities. Efforts to modernize the public sector have gathered pace in recent years. Among other things, the Government has tried but has not yet succeeded in the: 1. develop a Medium-Term Expenditure Framework (MTEF); 2. introduce output and outcome performance measures and targets; 3. overhaul procurement practices; 4. introduce 3-year baseline budgeting; 5. modernize auditing practices; 6. introduce computerized financial management information systems; and 7. prepare for the introduction of full accrual accounting. Legal Framework for Government Accounting The Constitution of the Philippines 1987 mandates the keeping of government accounts, the promulgation of accounting rules, the audit of financial reports, and the submission of reports covering the Governments financial operations and position. In particular, Article IX defines three constitutional commissions as being separate and independent bodies. These are the Civil Service Commission (CSC), the Commission on Elections, and the Commission on Audit (COA). The Constitutional provisions relating to prescriptiveany reform effort must take consideration. COA are them into At the beginning of the 20th century, the Second Philippine Commission, acting as a legislative body, enacted appropriations measures for the annual expenditures of the government. This was in accordance with the Philippine Bill of 1902, which decreed that disbursements from the National Treasury were to be authorized only in pursuance of appropriations made by law. With the passage of the Jones Law in 1916, the Philippine Legislature was set up with two chambers: the Philippine Senate and the House of Representatives. The GovernorGeneral was to submit, within 10 days of the opening of the Legislature's regular session, the annual budget. Two years later, the Council of the State was formed to prepare the budget that the Governor-General was required to submit to the Philippine Legislature. Budget Office was formed to assist in the preparation, enactment and implementation of such appropriations made by law. Four divisions made up the Office: A Budget Division took charge of agency regular budgets; an Expense-Central Division took care of special budgets; a Service Inspection Division screened appointments and requests for the creation of positions; and an Administrative Division handled routine administrative matters. The Constitution of 1935 established both budget policy and procedure, which were The Budget Commission was established by Executive Order (EO) No. 25 issued on April 25, 1936. It became a Ministry by virtue of Presidential Decree (PD) No. 1405, signed on June 11, 1978. Following the pattern in the United States Federal Government, the Budget Commission was, and the Ministry of the Budget continues to be, part of the Office of the President and separate from the other fiscal agencies of government that form part of the Ministry of Finance. The first Budget Law was passed on December 17, 1937 as Commonwealth Act (CA) No. 246. It took effect on January 1, 1938, providing for a line-item budget as the framework of the governments budgeting system. CA No. 246 called for a balanced budget emphasizing matching proposed expenditures with existing revenues. On June 4, 1954, Republic Act (RA) No. 992, otherwise called the Revised Budget Act, was enacted providing for an enhanced role of the Budget Commission as the fiscal arm and budgeting adviser of the President. The preparation of the budget was to include the aggregation of the programs of the different departments and agencies of the Government. At this point, a performance The Integrated Reorganization Plan of 1972, under Presidential Decree No. 1, implanted re-organizational changes in the Budget Commission with four of its units retained: the Budget Operations Office; National Accounting Office; Management Office; and Wage and Position Classification Office (WAPCO). Five staff units were provided the Commission: for planning service; for financial and administrative services; or training and information services; a Legislative Staff; and a Data The change to a parliamentary form of government was instituted by the 1973 Constitution. The legislative branch of the government, then referred to as the Batasang Pambansa, saw the minister in charge of the budget, chairing the Committee on Appropriations and Reorganization. Through the Budget Reform Decree of 1977, the planning, programming and budgeting linkages of the Ministry was further strengthened. WHEREAS, the national budget is a major instrument for development, requiring careful design of the preparation, legislation, execution, and accountability phases of budgeting. WHEREAS, the experience of the years has been reflected in various improvements in the budget process, and embodied in C.A. WHEREAS, the budget process as implemented prior to September 21, 1972 was not able to fully support national objectives and plans; WHEREAS, national interest calls for the institutionalization of budgetary innovation realized during the New Society and developed within the context of the Constitution of 1973. NOW, THEREFORE, I, FERDINAND E. MARCOS, President of the Philippines, by virtue of the powers vested in me by the Section 3. Declaration of Policy. It is hereby declared the policy of the State to formulate and implement a National Budget that is an instrument of national development, reflective of national objectives, strategies and plans. The budget shall be supportive of and consistent with the socioeconomic development plan and shall be oriented towards the achievement of explicit objectives and expected results, to ensure that funds are utilized and operations are conducted effectively, economically and efficiently. The national budget shall be formulated within the context of a regionalized government structure and of the totality of revenues and other receipts, expenditures and borrowings of all levels of government and of the government-owned or controlled corporations. Section 4. Planning and Budgeting Linkage. The budget shall be formulated as an instrument for the attainment of national development goals and as part of the planning-programming-budgeting continuum. Levels of revenue, expenditure and debt shall be established in relation to macroeconomic targets of growth, employment levels, and price level change, and shall be developed consistent with domestic and foreign debt, domestic credit and Balance of Payments objectives for the budget period. The aggregate magnitudes of the budget shall be determined in close consultation among the planning and fiscal agencies of government. Budgetary priorities shall be those specified in the approved national plans, keeping in mind the capability and performance of the implementing agencies concerned. Agency budget proposals shall Section 5. National Resource Budget. The finances of government shall be analyzed and determined as the aggregate of revenue, expenditure and debt of all units of government, including the national government and its agencies and instrumentalities, local government units and government-owned or controlled corporations. The national government budget shall be evolved within the framework of the total impact of government activity on the national economy. The budgets of government corporations and local governments shall be consistent in form and Section 6. Regional Budgeting. The budgets of national government agencies shall take into full and explicit consideration the goals, plans and requirements of their respective regional offices, in the interest of full government response to local thinking and initiative. The budget preparation process shall originate at regional and local levels, and shall be consolidated and reviewed by the central offices of the various national agencies. The regional development strategies and plans, including physical framework and resource-use plans, shall be Section 12. Fiscal Year. The fiscal year for all branches, subdivisions, instrumentalities, departments, bureaus, offices and agencies of the Government of the Republic of the Philippines, including government-owned or controlled corporations and local governments shall be the period beginning with the first day of January and ending with the thirty-first day of December of each calendar year. Section 13. Submission of the Budget. The President shall, in accordance with section sixteen (1), Article VIII of the Constitution, submit within thirty days from the opening of each regular session of the National Assembly as the basis for the preparation of the General Appropriations Act, a national government budget of estimated receipts based on existing and proposed revenue measures, and of Section 13. (continuation) The President shall include in his budget submission the proposed expenditure level of the Legislative and Judicial Branches and of Constitutional bodies, which shall have undergone the same process of evaluation and which shall have been subject to the same budgetary policies and standards applicable to agencies in the Executive Branch. The President may transmit to the National Assembly, from time to time, such proposed supplemental or deficiency appropriations as are, in his judgment, (a) necessary on account of laws enacted after the Section 18. Budget Evaluation. Agency proposals shall be reviewed on the basis of their own merits and not on the basis of a given percentage or peso increase or decrease from a prior year's budget level, or other similar rule of thumb that is not based on specific justification. Proposed activities, whether new or ongoing, shall be evaluated using a zero-base approach and on the basis of (a) relationship with the approved development plan, (b) agency capability as demonstrated by past performance, (c) complementarities with related activities of other agencies, and (d) other similar criteria. The realization of savings in a given budget year and the consequent non-utilization of funds appropriated or released to a given agency shall not be a negative factor in the The 1973 Philippine Constitution was superseded by the Provisional Constitution under Proclamation No. 3 of President Corazon C. Aquino. The legislative power was temporarily reposed on the President. Budgetary functions once more were exercised by the Office of Budget and Management. EO No. 292, issued pursuant to the 1987 Constitution, provided for major organizational subdivisions of the Department of Budget and Management. Section 1. Declaration of Policy. - The national budget shall be formulated and implemented as an instrument of national development, reflective of national objectives and plans; supportive of and consistent with the socioeconomic development plans and oriented towards the achievement of explicit objectives and expected results, to ensure that the utilization of funds and operations of government entities are conducted effectively; formulated within the context of a regionalized governmental structure and within the totality of revenues and other receipts, expenditures and borrowings of all levels of government and of government-owned or controlled corporations; and prepared within the context of the national long-term plans and budget Section 4. Office of the Secretary. - The Office of the Secretary shall consist of his immediate staff, the Budget Control Staff, Research Staff, a Regional Coordination Staff for Luzon, and a Regional Coordination Staff for Visayas and Mindanao. Sec. 10. The Budget Operations Office. - The Budget Operations Office shall review and analyze the work and financial flows, the budgetary proposals of national and local government agencies and corporations, check each agency's compliance with the budgetary policies and project priorities, determine the budgetary implications of foreign assisted projects from the time of project design to the negotiation for financial assistance, prepare recommendations for fund releases, formulate and implement fiscal policies and plans for budget In 1992, under Fidel V. Ramos, government budgeting aimed to make the National Budget an instrument for breaking the boom and bust cycle that had characterized the Philippine economy in the past. Beyond sustaining the operations of government and its projects, the budget became an economic stimulus and a means to disperse the gains of At the outset of Joseph Estradas presidency, the Asian financial crisis that characterized the period prompted the national leadership to take a second look at the countrys economic policies and strategies. To maintain macroeconomic stability in light of the effects of the economic turmoil, the government had to raise domestic demand by sustaining expenditures and pump-priming the areas of public infrastructure and social services. It had to adopt an expansionary fiscal policy by allowing a reasonable level of cyclical deficit to be financed largely through foreign borrowing while offsetting the negative impact of deficit by introducing structural reforms in the budget process. During this period, from mid-1998 to end of 2000, the DBM continued to introduce budgeting reforms that were meant to Under President Gloria MacapagalArroyo, the DBM focused its efforts on deepening fiscal responsibility, enhancing the efficiency of public expenditures, and promoting good governance. Along with these major areas of concern, it intensified efforts at strengthening intergovernmental relations, eliciting increased participation from the private sector in the overall budget process and in intensifying public information on the administrations fiscal policy, thrusts, and budget policies and procedures. It likewise stepped up efforts at enhancing internal management in line with its vision to be seen as an organization that influences the spending behavior and management of resources of The following organizations play central roles in budgeting, accounting and auditing arrangements. The COA audits the general accounts of the Government, promulgates accounting rules and regulations, and submits the annual financial report of the Government, its subdivisions, and agencies (including government owned or controlled corporations). The DOF is responsible for: (i) formulating, institutionalizing, and administering fiscal policies in coordination with other concerned subdivisions, agencies, and instrumentalities of the government; (ii)managing the financial resources of government; (iii)supervising the revenue operations of all LGUs; (iv)reviewing, approving and managing all public sector debt; and (v)rationalizing, privatizing and ensuring the public accountability of corporations and assets owned, controlled or acquired by the Government. The DOF oversees three operating bureaus: 1. the Bureau of the Treasury (BTr); 2. the Bureau of Internal Revenue (BIR); and 3. the Bureau of Customs. The Bureau of the Treasury (BTr) The BTr plays a pivotal role in the cash operations of the national government. It is responsible for: (i) (ii) (iii) receiving and keeping national funds; managing and controlling disbursements of national funds; and maintaining accounts of financial transactions of all national government offices, agencies, and instruments. The DBM is responsible for the design, preparation and approval of the accounting systems of government agencies. It is also responsible for coordinating and implementing the annual budget process. Furthermore, the Department manages the process of cash disbursement as well as monitoring compliance with appropriations. The DBCC comprises representatives from DBM, DOF, Bureau of Treasury, NEDA, and BSP. All agency budgetary requirements must pass through the Council. The objectives of the DBCC are to: (i) set budget parameters based on available resources; (ii) conduct budget hearings; and (iii) submit the resulting consolidated budget to the House of Representatives (particularly the Committee on Appropriations). BUDGETING AND REPORTING CALENDAR The following presents the indicative budgeting and reporting calendar for national government agencies. The Budget Calendar: National Government Agencies Budget Stage I. Budget Preparation Jan Mar Month t - 1 Budget year ( t ) t + 1 Budget forums and associated consultations. Submission of Budget Proposals: GOCCs; departments (without regional units); and departments with regional units. DBM evaluates agency budget proposals. Inter-agency coordination and consultation. Initial presentation of proposed budget to the President and Cabinet. Printing of budget documentation. Proposed national budget submitted to Congress. AprMay AprJun Jun Jul Jul Budget Stage II. Legislation & Authorization Month t - 1 AugNov Nov III. Budget Implementation DecJan Budget year ( t ) t + 1 Review and evaluation: budget hearings; floor deliberations; and Congressional approval. Approval of General Appropriation Act (GAA) Preparation of Agency Budget Matrix and submission to DBM Release of funds (1st week of January and 10 days before JanSep.) Obligation and disbursement of Funds Submission of requests for budget adjustments or modifications Submission of quarterly financial and physical reports, including project implementation progress. Submission of quarterly reports to the President, House Committee on Appropriations, and Senate Committee on Finance JanDec JanOct IV. Reporting AprJan AprJan ACCOUNTING & REPORTING ARRANGEMENTS In accordance with the Constitution of 1987; fund, obligation and cashdisbursement-ceiling accounting methods are used in government. These methods are based on and hence similar to, those used in the US government (before it began its move to accrual accounting). The table below presents an illustrative comparison of Philippine government and commercial accounting. CHART OF ACCOUNTS Organizations are required to use a standard chart of accounts as prescribed by COA. ACCOUNTING STANDARDS A variety of accounting standards are applied in the preparation of financial reports. These include the prescriptions set out by the Government Financial Statistics (GFS) system, and COAs accounting rules and chart of accounts. The Public Sector Committee (PSC) of IFAC began issuing International Public Sector Accounting Standards (IPSASs) in May 2000. IPSASs are based upon IASs. COA is planning the move to full accrual accounting. In this respect, it is considering the appropriateness of IPSASs as the basis for government accounting standards. FINANCIAL REPORTING Government financial reports and statements, like commercial entities, are prepared based on official accounting records. In the case of government organizations, specific laws and regulations tightly prescribe the format and contents. The timing of reporting requirements is set out in the budget calendar above. However, financial reports are generally not provided in a timely manner. The requirement to prepare and submit balance sheets and operations statements was introduced in 1979. Financial statements in government accounting include: i. ii. iii. iv. v. vi. vii. viii. ix. x. xi. xii. current assets, contingent assets, fixed assets, current liabilities, contingent liabilities, allotted appropriations, income, invested surplus, contingent surplus, national clearing account, the total surplus, and assorted notes to the accounts. Accounting Information Systems in Government The national government accounting system is largely paper based. Financial reports from national agencies, including those with computerized systems, are manually processed and consolidated by COA. Existing computerized systems are of varying types. This variation is to be expected in such a diversified environment comprising a wide range of organizations with differing roles and objectives. The Internal Auditing Act 1962 (RA 3456) introduced internal auditing requirements to the national government. A 1965 amendment (RA 4177) extended the Acts coverage to governmentowned and controlled corporations (GOCCs) and local government units (LGUs). In 1992, President Aquino directed that government internal-control systems be strengthened (AO 278) the Association of Government Internal Auditors (AGIA), among others, was instructed to ensure that internal audit practices, methods, and procedures be improved through continuing education and be conducted in accordance with internal auditing standards. The AGIA represents internal auditors in government and promotes their professional development. It now has thousands of members that more than doubled from had 1,177 at January 1999. Government Accounting Personnel The Philippine civil service has grown dramatically over the past 5 decadestotal government personnel more than tripled between 1960 and present. The Civil Service Commission (CSC) manages personnel arrangements in the civil service. These arrangements are characterized by a high degree of regulation and rigidity. This rigidity has adversely affected the ability of government organizations to retain high-quality accounting personnel. Entrance salaries and conditions for government accountants compare very favorably with the private sector. Consequently, and in contrast with many other countries, government agencies have no difficulty attracting high-quality accounting personnel. These comparatively high salaries, combined with an oversupply of CPAs, enable government organizations to adopt very strict screening criteria. Government Accounting Personnel (continuation) However, the government salary structure is flatter than that of the private sector. Senior private sector accountants earn as much as 630 % more than their public sector counterparts. A major contributing factor is the mandated linkage between the Presidents salary and government salariesthe former has not increased for some years. Consequently, senior government officials are difficult to retain. Moreover, these comparatively low salaries provide a supportive environment for graft and corruption. This constraint has been recognized and the following legislative measures prepared in response: HOUSE BILL NO. 9182 (2000). An Act professionalizing the government accounting service to serve as a tool for effective management and control of government services, creating for the purpose the government accounting office under the DBM and for other purposes. SENATE BILL NO 1333 (2000) declares all employees holding permanent positions in various agencies performing accounting, budgeting, internal audit and other related government accounting functions as the vanguards of the Governments financial and material resources. The Bill also exempts government accountants from the provisions of RA 6758 (The Compensation and Position Classification Act 1998) by providing them additional compensation and incentives such as subsistence allowances and longevity pay. SENATE BILL NO 439 (2000) seeks to professionalize government accounting services so that the profession may serve as a tool for effective management and control of government resources as it does for private business. It seeks to create the government accounting office under the DBM. Accurate, relevant, and timely financial information from the accounting system is essential for the monitoring of programs and projects, budget control, economic analysis, policy formulation, decision-making, and spotting possible areas for anomalies. Personnel in government accounting positions are required to hold a CPA license. Despite their professional training and standing, their role is largely limited to bookkeeping, due to the complicated legal accounting framework and the absence of computerized systems. Little time is available for financial analysis and providing financial advice to management. Public Financial Management Reform Program The objectives of the Governments public financial management reforms are to: (i) - allocate and manage expenditures via a MediumTerm Expenditure Framework (MTEF); (ii) - strengthen feedback mechanisms for budget formulation through enhanced budget and performance monitoring; (iii) - improve the performance management environment by simplifying budgeting rules; (iv) - introduce incentives for better performance management; and (v) - increase management flexibility to ensure performance results. The reforms are based on a benchmarking study of the Philippine expenditure management system vis--vis its neighboring countries (Australia, Korea, Malaysia, New Zealand, Singapore, and Thailand) in terms of the three important expenditure outcomes: maintaining fiscal discipline, facilitating strategic prioritization at the oversight level, and enhancing the implementation efficiency of line agencies. The reform program comprises several activities as follows: SECTORAL BUDGET CEILINGS. Six-year sectoral budget ceilings were introduced for the Fiscal 2000 budget. These sectoral budgets were developed with the multi-sector Planning Committees of the National Economic and Development Authority (NEDA). These Committees include representatives from Congress, local government, academia, the private sector and nongovernment organizations. The process involved various government implementing agencies in a participative and proactive manner. Public Financial Management Reform Program THREE-YEAR BUDGET BASELINES. The 6-year sectoral ceilings served as the basis for allocating resources to implementing agencies using a budget baseline approach. STRENGTHENING EVALUATION MECHANISMS. First, locally funded projects will be subjected to the same approval process that applies to those funded from foreign sources. Second, the performance measurement will be mainstreamed. A set of performance indicators will have to accompany all new policies or projects that are submitted to NEDA or DBM. The ultimate objective is to foster an evaluation culture. IMPROVING GOVERNMENT ACCOUNTING AND INTERNAL CONTROL. Adopting private sector accounting and reporting practices, such as full accrual accounting will enhance the usefulness of accounting information. It will also enable organizational outputs to be meaningfully costed. SEPARATING ACCOUNTING AND AUDITING FUNCTIONS. COA, the Philippines supreme audit institution, undertakes accounting, internal control and auditing functions in government. These groupings are incongruous. IMPROVING PROCUREMENT PROCEDURES. The DBM has launched the Electronic Procurement System to improve the efficiency and transparency of the government procurement process. Anticorruption Measures ADBs anticorruption policy has three objectives: supporting competitive markets, and efficient, effective, accountable, and transparent public administration as part of ADBs broader work in governance and capacity building; (ii) supporting promising anticorruption efforts on a case-to-case basis and improving the quality of ADBs dialogue with its developing member countries on a range of governance issues, including corruption; and (iii) ensuring that ADBs projects and staff adhere to the highest ethical standards. The Government considers corruption a major concern. It has adopted a comprehensive approach towards improving governance as described in the Ten Point Jump Start Anti-Corruption Program. Efforts to eradicate corruption from the public sector focus rest on the effective implementation of existing initiatives and the pursuit of reforms towards reducing opportunities for corruption. These efforts include: (i) deregulating and privatizing public functions; (ii)increasing transparency and public oversight of government and public sector functioning; (iii)vigorously pursuing efforts to root out corruption from those agencies and public processes such as procurement where they mainly exist through improved audit and other special measures; (iv)enabling better judicial functioning and equitable access to the legal system; and (v)reforming agencies that have particularly high interaction with the public such as the police. ISSUES AND RECOMMENDATIONS This part of my report identifies and describes constraints and proposes corrective actions. With minor departures, these include the following selected issues: The Commission on Audit is responsible for promulgating accounting and auditing rules. These responsibilities are defined in Article IX of the Constitution 1987. The coexistence of these responsibilities is inconsistent with the concept of auditor independence. The absence of computerized accounting information systems, combined with complex accounting regulations: (i) relegates the role of most government CPAs to that of highly qualified bookkeepers. Little time is left for value-added activities, such as financial analysis; and (ii) means that financial reports are rarely prepared in time to be useful for decision-making purposes. There is no consistent set of accounting standards for budgeting and reporting. Major reporting differences result. Auditors spend the majority of their time on compliance auditing (checking transactions). Minimal time is spent on financial attest auditing as more effort is applied to value-for-money audits. Comparatively attractive starting salaries attract high-quality personnel into government accounting. A flat earnings structure means that higher-level salaries are far from competitive. This creates retention problems and provides a supportive environment for graft and corruption. The Philippine Constitution emphasizes the importance of accountability in the government. Article XI simply and bluntly begins: Public office is a public trust, before it adds that officials and employees should serve the people with responsibility, integrity, loyalty and efficiency. In the government budget cycle, accountability is laid down by the need for government agencies and departments submit to submit quarterly and monthly income statements; statements of allotment, obligations and balances along with other financial reports and documents for audit - a formal process whereby the authenticity, accuracy and reliability of financial accounts or transactions are checked and approved. There are several kinds of audit: One is FINANCIAL AUDITING wherein financial transactions and accounts are checked to ensure the submitting government agency has complied with the rules and regulations, specifically the pre-agreed and government accounting system. Another type is PERFORMANCE AUDITING whereby one is looking at the systems of the agency to assess it has delivered on its institutional purpose and mandate by linking the budgets with results or results-based budgets. An INTERNAL AUDIT, as the name suggests, an internal check on agency systems and processes. External Auditing involves an outside audit body being brought in to look at the agency. PRE-AUDITING refers to auditing by agencies before approval of transactions while post-auditing is auditing by an independent body after. Philippine public accounting practices originated in the 1700s. The enactment of the Accountancy Law 1923 gave formal recognition to the accounting profession. This law granted CPA certificates to those who successfully passed the CPA examinations and established the Board of Accountancy (BOA) to regulate the profession. In 1929, the Philippines Institute of Accountants was created--one of the oldest professional accountancy organizations in Asia and one of the major key players in the development of accounting standards in the country. There are now over 100,000 Philippine CPAs. The Philippine Accountancy profession is considered as one of the worlds most vibrant but also one of the most restricted due to various regulations in the application of standards (Reid, 2002). Basically, the Philippine standards were patterned after the US GAAP. However, in 1997, the accounting standard setting body in the Philippines decided to start a program to move fully to international accounting standards issued by the International Standards Committee (IASC) and since then has continued its adoption of international accounting standards. In November 2004, the Philippine Accounting Standard Council (ASC) approved the adoption of revised IASs called Philippine Accounting Standards (PASs) and the International Financial Reporting Standards (IFRSs) issued by the International Accounting Standards Board (IASB) called Philippine Financial Accounting Standards (PFRS) with first implementation effective January 2005. Kieso et al (2007) defined generally accepted accounting principles (GAAP) as those principles that have substantial authoritative support. To the question Why one set of documents are more authoritative that others? Two sets of explanations were given by Kieso et al (2007) and these are: (2) that the body issuing the pronouncements are recognized by the Securities and Exchange Commission (SEC) and (2) prior to the issuance of the standard, its contents are: (1) debated in a public forum, (b) exposed in writing to the public for comments, and (2) approved by the Board. Generally accepted accounting principles (GAAP) vary from country to country due to differences in the legal system, levels of inflation, culture, degrees of sophistication and use of capital markets, and political and economic ties with other countries (Spiceland et al, 2007). These differences cause huge problems for multinational companies. Companies doing business in other countries experience difficulties in complying with multiple sets of accounting standards to convert financial statements that are reconciled to the GAAP of the countries they are dealing with. As a result, different national standards impair the ability of companies to raise capital in the international markets. In response to the problem, the International Accounting Standards Committee (IASC) was established in 1973 to develop international accounting standards. In 2001, the IASC created a new standard setting body called International Accounting Standard Board (IASB). The objective is to identify the best accounting standards to be followed in the financial accounting and reporting of all countries around the world. The IASBs objectives are: (1) to develop a single set of high quality, understandable global accounting standards, (2) to promote the use of these standards, and (3) to bring about convergence of national and international accounting standards. The IASC issued 41 Accounting standards (IASs) which were endorsed by the IASB in 2001 (Table 2). In addition, IASB has made revisions and has issued eight standards of its own called International Financial Reporting Standards (IFRS) (Table 2). While IASB has no authority to enforce these standards, since compliance is voluntary, many countries have based their national standards on international accounting standards (Spiceland et al, 2007). The main problem is that different countries use different national accounting standards which make it difficult and costly to compare financial statements for investments decision-making. Globalization, growing interdependence of international financial market, and increased mobility of capital have increased the pressure and demand for the convergence and harmonization of reporting frameworks and standards. There is a need to have a set of financial accounting standards that will allow for greater transparency, comparability, and efficiency in financial reporting worldwide. The Accounting Standards Council (ASC) was created in 1981 to establish generally accepted accounting principles (GAAP) in the Philippines. ASC is funded by the Philippine Institute of Certified Public Accountants (PICPA). The ASC annual subsidy from the PICPA Foundation of P50,000 (approximately US$977) covers meals during meetings and other incidentals. The ASC members serve without any remuneration. ASC is composed of eight representatives from the profession, regulators, and preparers: four representatives from PICPA; and one representative from the SEC, the Bangko Sentral ng Pilipinas, the Board of Accountancy, and the Financial Executives Institute of the Philippines (FINEX). ASC formed an Interpretations Committee whose main purpose is to identify, discuss, and resolve on a timely basis emerging issues affecting financial reporting. Its members consist of representatives from auditing firms, the SEC, and the Board of Accountancy. The authority of ASC pronouncements comes from the approval and recognition of the standards by the regulators. Exposure drafts of proposed accounting standards are issued for comment, to members of PICPA, members of the Financial Executives Institute of the Philippines (FINEX), and interested persons and organizations in the business community, and the comments are considered in the finalization of the standard. Accounting standards approved by the Accounting Standards Council are submitted to the Board of Accountancy for approval. ASC-approved accounting standards, when approved by the Board of Accountancy and the Professional Regulation Commission, become part of Philippine GAAP. Prior to 1996, the accounting standards in the Philippines were mostly based on the accounting standards issued by the U.S.-based Financial Accounting Standards Board (FASB). It was, however, in 1997 that the ASC formally decided to totally move to IAS. In November 2004, ASC approved the issuance of the new and revised Philippine Accounting Standards (PASs) and new Philippine Financial Reporting Standards (PFRSs) which directly corresponds to IASBs IAS and IFRS. The adoption of international accounting standards was a result of the Philippine regulatory bodies involvement in international organizations. The Philippine Securities and Exchange Commission (SEC), a member of the International Organization of Securities and Commissions (IOSCO), agreed with the other IOSCO members to adopt the international accounting standards to uphold high quality, and transparent financial reporting to promote credibility and competence in the capital markets The Philippine Board of Accountancy (BOA) under the supervision of the Philippine Professional Regulation Commission (PRC) supports the adoption of the international accounting standards since part of its responsibilities is to implement the general agreement on trade in services (GATS). The Philippine Institute of Certified Public Accountants (PICPA) supports the work of the International Accounting Standards Council (IASC) being a member of such organization. The World Bank and the Asian Development Bank also recommended the adoption of the international accounting standards (UNCTAD, 2005). The Accounting Standards Council (ASC) started the move towards the adoption of international accounting standards as early as 1996. Prior to this, Philippine generally accepted accounting principles (GAAP) were based mainly on US-based accounting standards. Under its IAS project, the ASC replaced US-based standards and adopted IAS with no local equivalent, and updated previously issued IAS-based standards. The adoption of IAS followed the exposure process for accounting standards issued by the ASC. Since the Philippine GAAP was written in English, there were no translation problems as were encountered by other countries. In 2005, ASC completed the adoption of the IFRSs issued by the International Accounting Standards Board (IASB) and the revised versions of previously adopted IASs. It renamed the designation of accounting standards it issues to Philippine Accounting Standard (PAS) and Philippine Financial Reporting Standard (PFRS) to correspond to the adopted IASs and IFRSs, respectively. IAS and IFRS were adopted with very minor modification, such as effective dates. Small and medium enterprises were given some relief by ASC from new financial reporting standards. There are a significant number of small and medium entities in the Philippines. When originally issued, the new international accounting standards that became effective in 2005 were intended to be applicable to all reporting entities required to file financial statements in accordance with Philippine GAAP. In 2005, the IASB undertook a project to develop accounting standards suitable for entities that do not have public accountability, referred to as non-publicly accountable entities (NPAEs). When preparing their 2005 financial statements, NPAEs are given the option not to apply the new international accounting standards that became effective in 2005 but to apply instead the accounting standards that were effective in 2004. The Philippine Financial Reporting Standards (PFRS)/Philippine Accounting Standards (PAS) are the new set of Generally Accepted Accounting Principles (GAAP) issued by the Accounting Standards Council (ASC) to govern the preparation of financial statements. These standards are patterned after the revised International Financial Reporting Standards (IFRS) and International Accounting Standards (IAS) issued by the International Accounting Standards Board (IASB). (UNCTAD, 2005). The key players in the development of financial accounting standards in the Philippines support the change to the international accounting standards: Accounting Standards Council Accounting Standards Council (ASC) was formally launched by the Board of Directors of Philippine Institute of Certified Public Accountants (PICPA) on November 18, 1981. The main function of the ASC is to establish and improve accounting standards that will be generally accepted in the Philippines. In 2006, the ASC was folded into the Financial Reporting Standards Council (FRSC). Financial Reporting Standards Council (FRSC) The Financial Reporting Standards Council (FRSC) was established by the Board of Accountancy (BOA) in 2006 under the Implementing Rules and Regulations of the Philippine Accountancy of Act of 2004. Its main function is to establish generally accepted accounting principles (GAAP) in the Philippines. The FRSC is the successor of the Accounting Standards Council (ASC). The FRSC carries on the decision made by the ASC to converge Philippine accounting standards with international accounting standards issued by the International Accounting Standards Board (IASB). The FRSC consists of a Chairman and members who are appointed by the BOA and include representatives from the Board of Accountancy (BOA), Securities and Exchange Commission (SEC), Bangko Sentral ng Pilipinas (BSP), Financial Executives Institute of the Philippines (FINEX) and Philippine Institute of Certified Public Accountants (PICPA). The FRSC has full discretion in developing and pursuing the technical agenda for setting accounting standards in the Philippines. Financial support is received principally from the PICPA Foundation. The FRSC monitors the technical activities of the IASB and issues Invitations to Comment on exposure drafts of proposed IFRSs as these are issued by the IASB. When finalized, these are issued as Philippine Financial Reporting Standards (PFRSs). The FRSC similarly monitors issuances of the International Financial Reporting Interpretations Committee (IFRIC) of the IASB, which it adopts as Philippine Interpretations. The FRSC issues news releases to announce the issuance of final Standards and Interpretations, exposure drafts and other matters which are posted in the Philippine Accounting Standards section of the PICPA website (www.picpa.com.ph). The FRSC formed the Philippine Interpretations Committee (PIC) in August 2006 to assist the FRSC in establishing and improving financial reporting standards in the Philippines. The role of the PIC is principally to issue implementation guidance on PFRSs. The PIC members were appointed by the FRSC and include accountants in public practice, the academe and regulatory bodies and users of financial statements. The PIC replaced the Interpretations Committee created by the ASC in 2000. Board of Accountancy The Board of Accountancy (BOA) is one of the Professional Regulatory Boards which exercise administrative, quasi-legislative, and quasi-judicial powers over the accounting profession in the Philippines. BOA, responsible for implementing the general agreement on trade in services (GATS) mandated by the World Trade Organization (WTO), supports the adoption of international accounting standards. Philippine Institute of Certified Public Accountants (PICPA) PICPA was accredited by the Professional Regulations Commission as the bona fide professional organization of CPAs, giving it the responsibility of integrating all CPAs in the Philippines. PICPA is an active participant in the worlds major accounting bodies that include the International Federation of Accountants (IFAC), International Accounting Standards Committee (IASC), Confederation of Asian and Pacific Accountants (CAPA), and the ASEAN Federation of Accountants (AFA). The Philippines Institute of Certified Public Accounting (PICPA) as a member of the international Accounting Standards Committee (IASC) has the commitment to support the work of the IASC and to promote compliance with the international accounting standards. The Philippine Securities and Exchange Commission (SEC) aims to strengthen the corporate and capital market infrastructure of the Philippines, and to maintain a regulatory system, based on international best standards and practices that promote the interests of investors in a free, fair, and competitive business environment. SEC, as a member of the International Organization of Securities Commissions (IOSCO) has to comply with the agreement with other IOSCO members to adopt international accounting standards to ensure high quality, transparent financial reporting with full disclosure as a means to attain credibility and efficiency in the capital markets. The auditor's report refers to "conformity with Philippine Financial Reporting Standards." Accounting standards in the Philippines are approved by the Securities and Exchange Commission (SEC). The Philippines has adopted all IFRSs for 2005 with some modifications. These Philippine equivalents to IFRSs apply to all entities with public accountability that includes: Entities whose securities are listed in a public market or are in process of listing. All financial institutions including banks, insurance companies, security brokers, pension funds, mutual funds, and investment banking entities. Public utilities. Other economically significant entities, defined as total assets in 2004 of at least 250 million pesos (US$5 million) or liabilities of at least 150 million (US$3 million). The modifications, which have been described as 'transition relief', are in the following areas: o o Reduced segment reporting disclosures; Exemption from applying tainting rule for a specific set of financial instruments; Commodity derivative contracts of mining companies as of 1 January 2005 grandfathered'; Insurance companies allowed to use another comprehensive set of accounting principles (also described as Philippine Financial Reporting Standards); For banks, losses from sale of non-performing assets allowed to be amortized over a period of time. Some additional changes to IASB's pension, foreign exchange, and leases Standards. Bangko Sentral ng Pilipinas Bangko Sentral ng Pilipinas (BSP) is the central bank of the Republic of the Philippines. The BSP provides policy directions in the areas of money, banking, and credit. It supervises operations of banks and exercises regulatory powers over non-bank financial institutions with quasi-banking functions. BSP made a pronouncement of its adoption of the PFRS/PAS effective the annual financial statements January 1, 2005 in its memorandum to all banks and other BSP supervised financial institutions. The adoption of the new set of accounting standards in the financial industry is part of BSPs commitment to promote fairness, transparency, comparability, and accuracy in financial reporting. Insurance Commission The Commission supervises and regulates the operations of life and non-life companies, mutual benefit associations, and trusts for charitable uses. Bureau of Internal Revenue The Bureau of Internal Revenue (BIR) is responsible for the assessment and collection of all national internal revenue taxes, fees and charges. Indirectly, however, it also influences the accounting policies of entities through the issuance of revenue regulations. The Philippine government has agencies mandated to ensure accountability and transparency on its overall operations. These agencies are: The Office of the Ombudsman (Ombudsman) is mandated by the Constitution as protectors of the people who shall act promptly on complaints filed against officers or employees of the government including members of the Cabinet, local government units and government-owned and controlled corporations and enforce their administrative, civil and criminal liability in every case where the evidence warrants in order to promote efficient service by the government to the people. Significantly, Section 13 of Republic Act 6770 or the Ombudsman Act of 1989 states it shall give priority to high-profile complaints to high-ranking and supervisory officials involved with grave offenses and large sums of money and/or properties. The Ombudsman does not only cover officials and employees of the government, but also private individuals who have participated or in conspiracy with them in the filed complaints. The Sandiganbayan, or the governments anti-graft court, is mandated by the 1973 and 1987 Constitutions. It covers criminal and civil cases against graft and corrupt practices and other offenses committed by public officers and employees with Salary Grade 27 and above, including those in local government units and government-owned or controlled corporations, which are related to their official duties as determined by law. Crimes and civil cases filed against public officers below Salary Grade 27 are covered by the Regional Trial Court but Sandiganbayan is vested with Appellate Jurisdiction over its final judgments, resolutions or orders. Private individuals can also be sued before this special court if they are alleged to be in conspiracy with public officers. The Sandiganbayan is also entrusted to have original exclusive jurisdiction over special laws such as RA 3019 (Anti-graft and Corrupt Practices Law), RA 1379 (Forfeiture of Illegally Acquired Wealth), Revised Penal Code spec. Batasang Pambansa 871. Presidential Anti-Graft Commission The Presidential Anti-Graft Commission (PAGC) is mandated by Executive Order No. 12 to assist the President in the campaign against graft and corruption. It investigates and conducts hearings of administrative cases and complaints against Presidential appointees in the Executive Branch with Salary Grades 26 and higher including members of the Armed Forces of the Philippines and Philippine National Police of directed by the President, government-owned and controlled corporations and public officers, employees and private persons in conspiracy with alleged public officials. PAGCs jurisdiction includes the following laws: RA 3019, RA 1379, 6713, Revised Penal Code, and E.O. 292. Civil Service Commission The Civil Service Commission (CSC) is the central personnel agency of the government and is tasked in the recruitment, building, maintenance and retention of a highly-competent and professional workforce. It is also one of the three independent commissions established by the Constitution with adjudicative powers to render final disputes and personnel actions on Civil Service. It covers all national government agencies, local government units and government-owned and -controlled corporations. Commission on Audit The Commission on Audit (COA) is the constitutional commission mandated to be the supreme audit institution of the government. It has jurisdiction over national government agencies, local government units, governmentowned and controlled corporations and nongovernment organizations receiving benefits and subsidies from the government. Financial Accounting Standards Board Documents Similar To Government Accounting and Financial Reporting JCPAJO himanshulohia85 Prakhar Tiwari Fadly David Waas Lungisani jeffrey flores ypodvysotskiy Reny Yustina Hazel Jumaquio JM Lomoljo Sandra Mae Cabuenas Dima Abdulhay Zaidpzaid mutisa MM Fakhrul Islam yas_sporty4553 dembele mzsanjay8131 Corporate Accountant / Financial Professional Renungan Mengupayakan Pertobatan Septa Ginting WasimEid 04. CFA1 (2011) FRA groupbeta1 European Union IFRS Profile Maya Amrullah IAS_17_ knilesh SLM-Unit 02 Shekhar Mandal Clerry Samuel Final Paper 18 kmajumder87 More From Murphy Red KP Form #14 (Agreement for Arbitration) Murphy Red KP Form #18 (Notice of Hearing for Complainant) KP Form #25 (Motion for Execution) KP Form #28 (Monthly Transmittal of Final Reports) KP Form #23 (Certification to Bar Action) Lupon Summary of Cases Form KP Form #3 (Notice of Appointment) KP Form #1 (Notice to Constitute the Lupon) KP Form #2 (Appointment Letter) KP Form #4 (List of Appointed Lupon Members) KP Form #6 (Withdrawal of Appointment) KP Form #12 Notice of Hearing (Conciliation Proceedings) KP Form #10 (Notice for Constitution of Pangkat) KP Form #5 (Lupon Member Oath Statement) KP Form #9 (Summon for the Respondent) KP Form #11 (Notice to Chosen Pangkat Member) KP Form #8 (Notice of Hearing) Foundations of Curriculum KP Form #7 (Complainants Form) Product Development - Apple vs Google Felix Böhme u2 essay The Baffler Magazine Issue No. 29 Doug Ohnemus The Holy Bible a Buyers Guide 2013 Ramin Khalili Araghi reader4free Wella Afriani (1111012041) Vancomycin Wella Afriani Franz Hartmann - In the Pronaos of the Temple of Wisdom [1890] Școala Solomonară / The Solomonary School Naila Kabeer11 - MDGs, Social Justice and the Challenge of Intersecting Inequalities Emma 'Emmachi' Asomba Connection Between Object Relations Theory and Attachment Theory Alan Challoner Numerical Relay Abhisekh Anand How to Set Up ChurchInfo on Ubuntu LAMP Server nschiltz Contract Law Flowchart Tiffany Trilli Resume Mobile Single Sign-On for SAP Fiori - Step-By-Step Guide vibin.v.joseph Design and Simulation of Conical Horn Antenna using CST DheerajGoyal 69185184-Pallasmaa-Hapticity-and-Time.pdf Paula Ivan Pp v Cando monica may ramos Üsküfi Yahya Kemal Taştan radargrammetry Arquimedes Aular Preliminaries (1) Mark Tomenes Activity-based Costing and Its Application To Lean Construction Kweku Eli analisis organik anjanipanjalin kejuruteraan awam Haengbokaeyo Hua Min LAB 8 MATLAB.docx Sher Ejaz Specimen Collection kiedd_04 organogram 1 k.shaikh RamonaRamona
cc/2019-30/en_head_0021.json.gz/line1730182
__label__wiki
0.542021
0.542021
ready pack move Tips for Home Buyers & Sellers Famous Homes for The Holidays December 19, 2010 December 19, 2010 Tricia Traugott Homes Made Famous in Favorite Holiday Movies Home Alone House RISMEDIA, December 20, 2010—As the decorations go up and the temperatures go down, winter is the perfect time to cozy up and indulge in a holiday movie marathon. While the Whos in Whoville and elves in Santa’s workshop live happily in our imagination, there is a plethora of real-life locations where some of the best holiday movie moments were captured. Here are some favorite festive flicks from over the years and a sneak peek at the homes and spaces that were part of the Christmas-season movie magic. A Miracle on 34th Street A movie loved by families worldwide, the story of 6-year-old Susan and Kris Kringle in “A Miracle on 34th Street” is the ultimate Christmas classic, and has been for over 50 years. The original was filmed in 1947 and starred Natalie Wood, Maureen O’Hara and John Payne. Since then, there have been four remakes of the movie, the most recent being a 1994 feature film starring Mara Wilson and Dylan McDermott. A majority of the movie is centered around Macy’s flagship store on 34th Street in New York City where Mr. Kringle is hired as Santa. One of the most memorable scenes, however, is when little Susan’s Christmas wish comes true and she sees the house of her dreams for the first time. The real home used as Susan’s dream home is located in Port Washington, New York. The 1,703-square-foot home still stands to this day and looks practically the same as it did in 1947. A holiday season rarely passes without hearing the infamous phrase, “You’ll shoot your eye out!” This, of course, pertains to the Red Ryder BB-gun idolized by Ralphie Parker, but also serves as one of the most memorable lines of the Christmas classic, “A Christmas Story.” Filmed in 1983 and set in the 1940s, “A Christmas Story” has maintained its popularity over the years and has become a top-of-mind flick during the holidays. As a tribute to its immortality, the house originally used in the movie was completely restored and is now open to visitors who wish to walk in little Ralphie’s shoes. Located in Cleveland, Ohio, “A Christmas Story House” is open for tours year-round and sits right across the street from a museum of movie moments, props and costumes. Scrooged Inspired by “A Christmas Carol,” this comedy, “Scrooged,” stars Bill Murray as a selfishly cynical television executive who bathes in wealth but is horribly cold-hearted to his employees and family. As in the Charles Dickens’ original, Murray’s character, Francis “Frank” Xavier Cross, is haunted by three spirits on Christmas Eve who are determined to help him appreciate the spirit of Christmas. Before he embarks on his lesson-bearing adventure, we see Mr. Cross in his executive element, peering down at a recently fired employee from his towering office in New York City. It just so happens that the office building used in the movie is the 38-story, Midtown Manhattan skyscraper known as the Seagram Building. According to the movie location website On the set of New York, the corporate tower stands 516 feet tall and was built in 1958 as the headquarters for Canadian distillers Joseph E. Seagram’s & Sons. The booby-trapping antics of Macaulay Culkin in his claim-to-fame flick, “Home Alone,” are always a family favorite come holiday season. And, aside from the sneaky robbers (aka Wet Bandits), Culkin’s character, Kevin McCallister, shared most of his screen time with the picturesque house that the rambunctious McCallister family called home. Today, the “Home Alone” house that Culkin so creatively defended sits quietly on a tree-lined street in Winnetka, Illinois, and is free and clear of rigged blow torches, flying paint cans and loose tarantulas. According to Zillow, the home was built in 1920 and features five bedrooms, 3.5 bathrooms and 4,243 square feet of living space. Culkin comes back for an encore performance as Kevin McCallister in “Home Alone 2: Lost in New York.” While the sequel sprouts the same premise of a frantic McCallister family who loses Kevin en route to a Christmas vacation, Kevin is set to defend a different location this time around—a monstrous toy store known as Duncan’s Toy Chest. Despite the film’s title, a little bit of digging revealed that Duncan’s Toy Chest was filmed at The Rookery, which is far from a department store and far from New York. The building used is actually a condo property on La Salle Street in Chicago, Illinois. In “Elf,” Will Ferrell takes us on a hilariously heartfelt adventure as Buddy—a human raised by Santa’s elves who travels to New York City in search of his true identity. Since the 2003 film takes place in the Big Apple, most of the movie’s locations are veterans of the big screen, (i.e., the ice rink at Rockefeller Center, the Empire State Building and Central Park). As it turns out, the building where Buddy’s father lives is a blockbuster veteran as well. Nicknamed the “Ghostbuster Building,” the building at 55 Central Park West served as the location to several scenes in 1984’s “Ghostbusters” movie and, more recently, the home of Buddy’s cynical, naughty-listed father, Walter Cobbs (James Caan). Built in 1929, 55 Central Park West opened with apartments ranging from three to nine rooms and set itself apart from neighboring Upper West Side buildings with a unique art deco exterior. Over the years, the co-op property has been home to several famous residents, including Calvin Klein, Donna Karan and Noel Ashman. For Billy Bob Thornton fans, “Bad Santa” is a Christmas favorite. Thornton puts a spin on the Grinch character by playing a mall Santa who cons his way into employment and robs different malls after hours. Thornton eventually befriends a troubled kid and takes up residence in his house while the parents are out of town. It was a pleasant surprise to discover the stucco-style home featured in the film is actually up for sale. The five-bedroom, 4.5-bathroom estate is currently on the market with an asking price of $1 million. Despite the home’s silver screen appearance, it boasts several other assets that are sure to attract the right buyers. According to the listing, the West Hills, California, house features panoramic city views, a custom infinity pool, barbeque center and 4,100 square feet of living space. The Family Stone While the movie received mixed reviews, the star-packed, romantic comedy, “The Family Stone,” was set in a gorgeous house in Riverside, Connecticut. In the movie, the 1860 colonial is the home and place of gathering for the Stone family’s annual Christmas celebration. Likewise, it is the place where a new and rather tightly wound girlfriend (Sarah Jessica Parker) is meeting the close-knit family for the first time. The 3,554 square-foot house consists of 10 rooms—five of which are bedrooms—3.5 bathrooms, and sits on 1.4 acres. With a classic, yet cluttered interior, this house is the ultimate, well-worn home that every family dreams of filling with holiday memories. In the romantic comedy, “The Holiday,” two guy-troubled women (Kate Winslet and Cameron Diaz) swap homes for the holiday season. True to romantic comedy form, both women find new loves at their new addresses. The home that Diaz swaps into is a quaint cottage on the English countryside. The swanky abode that Winslet temporarily takes over, however, is a Wallace Neff-designed home located in the small, affluent city of San Marino, California. According to Zillow, the 10,324-square-foot mansion has nine bedrooms, five bathrooms and a large outdoor pool (also featured in the film). Public records show the home last sold for $3,250,000 in 1998. Lauren Riefflin is PR/Marketing Coordinator at Zillow.com. For more information, visit www.zillow.com. RISMedia welcomes your questions and comments. Send your e-mail to: realestatemagazinefeedback@rismedia.com. Tagged Christmas, Empire State Building, Home Alone, Home Alone 2: Lost in New York, Miracle on 34th Street, New York City, Santa ClausLeave a comment Bob & Tricia Traugott Real Estate Agents in Charlottesville, Virginia and surrounding counties. We're not satisfied until you're more than satisfied! Benjamin Moore Paint Christmas Compost Composting toilet Distressed Sales Empire State Building Environment Foreclosures Home Home Alone Home Alone 2: Lost in New York home energy audit Joseph Jenkins Miracle on 34th Street New York City Organic cotton Santa Claus Short Sales Sustainable living United States 2010 Market Report CAAR Charlottesville Area Association of Realtors Famous Homes Green Homes Short sale or foreclosure Uncategorized CvilleTraugotts Better Homes & Gardens Real Estate III 29 North Office 2271 Seminole Trail Charlottesville VA, 22901 Licensed to Sell Real Estate in Virginia
cc/2019-30/en_head_0021.json.gz/line1730186
__label__wiki
0.767444
0.767444
Johanna Alonso UMBC Hillel’s Freedom Seder, held on the third floor of the University Center, strayed a bit from the traditional Seder formula. Typically, a Passover Seder is a dinner during which families gather to retell the story of the Jews’ freedom from slavery in ancient Egypt, as recounted in the Book of Exodus. But a Freedom Seder, an event first conceived as a way to bring together the struggles and experiences of the Jewish and African-American communities, uses the universal messages contained within the story of Passover to bring together diverse communities. Rabbi Jeremy Fierstien, Director of Hillel and Chair of the Religious Council, says that the focus of a Freedom Seder is to use the story of Passover as a catalyst for conversation and to elevate the voices of community members, Jewish and non-Jewish alike. “That has become a national phenomenon, a national movement. Many places, many people, do different incarnations of this event,” Fierstien noted. Though there have been Freedom Seders held on campus in previous years, Fierstien approached this year’s celebration with a particularly unique focus in mind. “The thing that I saw as a challenge was the siloed nature of our community,” he explains. “If you’re an engineer, you’re not really hanging out with other majors, because you’re so scheduled.” He wanted the Freedom Seder to be a space where students could cross those lines and hear the narratives of people with whom they may not be in frequent contact. The event featured UMBC Hillel president and senior psychology major Dana Kobrin and senior statistics major Sean Bhatia as the emcees; they introduced the four speakers, each of whom spoke about their own personal struggles with oppression. Having immigrated to America from India at the age of one, Swathi Prakash, a senior media and communications studies major, described the struggles of existing in a liminal space between American and Indian culture. Naqiya Ghulamali, a senior psychology major, spoke about her disabilities and the concept of hidden identities. Nikki Donboli, also a senior psychology major, discussed her family’s own exodus from Iran. The final speaker was Jodi Kelber-Kaye, Associate Director of the Honors College. She recounted her memories of growing up with parents who did not shield her from the world’s unfairness, and how this drove her interest in activism. Kelber-Kaye particularly emphasized the necessity of those seeking change to work in tandem with one another: “It’s not about me,” she said. “It’s about we. In we, we have hope, we have liberation, we have freedom.” The crowd in attendance encompassed a vast array of people: students of all majors, Jewish and non-Jewish; faculty, staff and alumni; Hillel regulars and first time attendees. Talon Bevan, a senior chemistry major, has attended a number of Hillel events in the past, but was particularly struck by how well the Freedom Seder captured the spirit and vibrance of the UMBC community. “We all have different stories,” she said. “Just speaking to people we know or see around campus, we get an idea of what their experiences are, and it’s very eye-opening.” Madeline Ross, a sophomore political science major, particularly enjoyed hearing how the themes of Passover could be woven into her peers’ personal narratives. In planning the Freedom Seder, Kobrin’s goal was to create a space where marginalized groups could sit with one another, feel a sense of camaraderie and feel connected through the universality of the presenters’ stories. “Through this event, you heard four different speakers,” she said. “Their events were completely different, in terms of narratives, and yet you could relate to every single one.” Quadmania: behind the scenes of Cheat Codes Quadmania is an annual tradition in the spring at UMBC that features a carn UMBC continues its Take Back the Night tradition A white shirt with a red hand-print hung on a clothesline, displaying the w 2019 SGA election introduces new election procedures Incoming officers of the Student Government Association for the 2019-20 sch Big Prize Poetry Slam contests allows UMBC students to express themselves through poetry Taking to the podium in the lobby of the Performing Arts Building, freshman A Hidden Oasis for Stress Relief A common problem students face is what to do when they find themselves stre UMBC, STEM and #MeToo
cc/2019-30/en_head_0021.json.gz/line1730191
__label__cc
0.662501
0.337499
in Sights & Sounds Review: Batman v Superman: Dawn of Justice Spoiler Alert! If you haven’t seen Batman v Superman yet and don’t want to know anything about its content read no further… I fear that my love of zombies has begun to affect my judgment. Zack Snyder first conned me into thinking he was a good director when he directed the re-make of Dawn of the Dead. And even though Man of Steel had some melodramatic scenes the casting of Henry Cavill as the man with the ‘S’ on his chest was just good enough to salvage any poor directing queues. But what he’s done with his latest effort is unforgivable. Should he be allowed to retain the reigns of the Superman franchise I predict that we will be throwing all the money in the DC Universe to J.J. Abrams to save it! Snyder is a spaghetti director. He takes a big pot of spaghetti and throws it against the wall hoping something will stick. He took his preferred directorial method to new heights in Batman v Superman. There were flashbacks, dream sequences, maybe hallucinations, a whole lot of crazy, and a metal bat suit. He even nuked the Man of Steel. The sequencing was so disjointed at times that you weren’t sure if it was the past, present, or future, or if the editor had opened up a 4th dimension with his most recent cut. And by the way I don’t know what Snyder did to make his editor so angry but they should really make up because that editor butchered this movie. I was skeptical from the start of Ben Affleck as Batman. He had already destroyed one super hero so why should we entrust him with another? Well he didn’t kill Batman but he didn’t make him likeable; or bangable for that matter. Look Ben Affleck is good at a lot of things. He plays cheating husband like nobody’s business (he’s got a lot of in real life practice). You need a recently fired business man, he’s your guy. Even moody detective or CIA agent, he’s capable of doing. And in his youth he could even pull off Southie hood. Charming, vigilante billionaire, not so much. At no point during Bruce Wayne’s interactions with Gal Gadot’s Wonder Woman did you think he had any hope of bedding her. And as the Bat he felt lumbering. The metal suit he was forced to wear during the epic stand-off with Superman may have had something to do with that. Is he Batman or Iron Man? Maybe we should have let Snyder direct that. On second thought I’m glad he didn’t. All I know is that I deeply missed Christian Bale and I’m totally Team Keaton. Henry Cavill delivered a fairly sincere performance when you did get to see him. Maybe if there had been less dream sequences he could have had more lines. I still think he was a good casting for the part. In the hands of a good director he could be out of this world! Alas, he’s stuck with what he’s got. As for Gal Gadot, I’m looking forward to see more of her as Wonder Woman, she gives us skinny bitches hope that we can kick butt too. Not to mention its about time we get a truly awesome super heroine. With Patty Jenkins directing her she may even get an Oscar, hopefully without going ugly like Charlize Theron did. I must address Jesse Eisenberg’s performance. Someone please tell me that what he did in this movie was the result of Snyder saying to him “look kid I want you to be Zuckerberg and the Joker’s love child.” Did he even bother to watch Gene Hackman’s portrayal of Lex Luthor?! I mean the template was there and it was perfect. Or maybe twitchy nerd is all Jesse Eisenberg can do? If so, is there some way to remove someone’s previous Oscar nomination because he does not deserve it, if he was just being himself! I’m going to call the Academy to find out. I did notice some interesting themes during the film. There seemed to be an allusion to 9/11 with the opening sequence which worked in to the seeming xenophobia that Batman and others fearful of Superman seemed to have. ‘He’s bad because he’s different.’ ‘He’s an alien we can’t let an alien have all this power that we can’t control.’ ‘It’s because of him that we’re living in fear.’ It’s definitely something that’s currently in the atmosphere so it makes sense that it would work it’s way into the film. And Bruce Wayne is not all that different than a real life billionaire who claims the aliens are our problems. Maybe that’s why I wanted to brand him with his bat symbol. There was also discussion about the deifying of Superman. Is he a man or a god? If he’s a god what does that say about our God? Did he create him? If he didn’t, is there a God at all? People in the film regard Superman as a beacon of hope. He saves the hopeless without asking anything in return. Selflessness can be frightening in a selfish world. Skeptics do not want to believe that someone, anyone, can be THAT good because if he is then it means its possible. So they will poke him and tempt him, try to get him to do something wrong. When he doesn’t fall for those traps, they’ll blackmail him. And if that doesn’t work they’ll try to destroy him. Everyone begs the heavens for a savior but when they get him they turn against him because he’s everything they wish they could be. We’ve heard that story before and Superman has often been compared to Jesus. In this movie the comparison comes full circle with the Man of Steel dying to save all of us. I wish Snyder would have focused more on one theme and dropped so much of the unnecessary imagery. He had the opportunity to make a real statement about human nature and ambition and he didn’t seize it. The movie felt confused and overdone. And I say that as a huge fan of all things Michael Bay! While this one does not hit it out of the park, here’s the thing about failure, it’s not mortal when it comes to the cinema. In this critical failure Snyder has the opportunity to review his work and hone his craft. Because if Superman is supposed to inspire us to be the best that we can be, in his resurrection lies Snyder’s salvation. Let’s hope when the time comes he believes. Tags: batman, Batman v Superman, cinema, cinephile, film review, movies, superman, wonder woman realgraceshines Just a writer stuck in a lawyer’s body. Movie Review: Captain Marvel at Mar 9 . 2019 at Jul 25 . 2018 Review: Wonder Woman
cc/2019-30/en_head_0021.json.gz/line1730193
__label__cc
0.733343
0.266657
Biographies of the New World: Leif Eriksson, Henry Hudson, Charles Darwin, and More E-BOOKS/PRINT E-BOOK SUBSCRIPTION PLAN CURRICULUM COLLECTIONS Your cart (0) Biographies of the New World: Leif Eriksson, Henry Hudson, Charles Darwin, and More With their eyes set on distant horizons, explorers from across Europe, including Leif Eriksson, Sir Francis Drake, and Alexander von Humboldt, voyaged to the New World. They discovered the lands that would later be known as the Americas, motivated by curiosity, commercial interests, or scientific inquiry. These adventurers charted previously unknown territories, encountered, and often tragically exploited native peoples, and changed the fate of the global landscape. The stories of these trailblazers and their remarkable journeys comprise this compelling volume. Series: Impact on America: Collective Biographies Reading Level: Grade 8 Biographies of Colonial America: Sir Walter Raleigh, Powhatan, Phillis Wheatley, and More Biographies of the American Revolution: Benjamin Franklin, John Adams, John Paul Jones, and More Biographies of the Civil War and Reconstruction: Abraham Lincoln, Robert E. Lee, Ulysses S. Grant, and More Biographies of the New American Nation: George Washington, Thomas Jefferson, Frederick Douglass, and More Biographies of the New World Power: Rutherford B. Hayes, Thomas Alva Edison, Margaret Sanger, and More Biographies of the New World: Leif Eriksson, Henry Hudson, Charles Darwin, and More HOME ABOUT US TERMS OF USE FAQS PRIVACY POLICY CONTACT US your cart (0)
cc/2019-30/en_head_0021.json.gz/line1730199
__label__cc
0.717599
0.282401
Routine, coordinated treatment of opioid abuse can stem national epidemic PORTLAND, Oregon – To help stem the nationwide opioid epidemic and related increases in HIV, hepatitis C and other infections, health care providers should routinely screen and treat patients for opioid abuse when they come to clinics and hospitals seeking other services. That's one of five recommendations outlined in a paper published in the Annals of Internal Medicine. The paper supports a newly published document that outlines the proceedings of a March 12, 2018, workshop convened on the topic by the National Academies of Sciences, Engineering and Medicine. "Treatment can save lives," said one of the paper's authors, Todd Korthuis, M.D., M.P.H. "The national opioid epidemic can turn around if we embrace opioid use disorder as a chronic medical condition that needs treatment instead of a moral issue or the result of poor willpower." Korthuis, who is a professor of medicine (general internal medicine and geriatrics) and head of addiction medicine in the OHSU School of Medicine, also participated in the National Academies workshop and reviewed the resulting proceedings document. He co-wrote the paper with Sandra A. Springer, M.D., of the Yale School of Medicine and Carlos del Rio, M.D., of the Emory University School of Medicine, both of whom also participated in the workshop. The workshop highlighted one of the many dire consequences of the opioid epidemic: more people are turning to injection drug use after their opioid prescriptions are cut off, which in turn has led to an increase in life-threatening infections of the skin, joint, blood, bone and more. These serious infections require expensive and lengthy hospital treatments, but most hospital staff don't regularly address the root cause: drug addiction. OHSU is one of a few U.S. hospitals that already routinely screens and treats patients for opioid abuse when they come to OHSU for other services. Opioid use disorder treatment at OHSU is initiated through a novel service called Project IMPACT, or Improving Addiction Care Team, in which physicians, social workers, peer-recovery mentors and others meet with hospitalized patients who have drug use issues and begin addiction treatment during hospitalization. Honora Englander, M.D., an associate professor of medicine (hospital medicine) in the OHSU School of Medicine, presented Project IMPACT at the National Academies workshop. EMBED VIDEO HERE: "Project IMPACT at OHSU," https://www.youtube.com/watch?v=oki4iYIttNI Korthuis' drug addiction research is funded by the National Institutes of Health's National Institute of Drug Addiction (grants UG3DA044831, UG1DA015815, R01DA037441). Annals of Internal Medicine paper: http://annals.org/aim/article/doi/10.7326/M18-1203 National Academies' proceedings document: https://www.nap.edu/catalog/25153/integrating-responses-at-the-intersection-of-opioid-use-disorder-and-infectious-disease-epidemics Todd Korthuis, M.D., M.P.H.: https://www.ohsu.edu/xd/education/schools/school-of-medicine/departments/clinical-departments/medicine/divisions/general-internal-medicine/faculty/p-todd-korthuis-md-mph.cfm Honora Englander, M.D.: https://www.ohsu.edu/xd/education/schools/school-of-medicine/departments/clinical-departments/medicine/divisions/hospital-medicine/faculty/honora-englander.cfm 4/25/18 OHSU news story, "Hospital staff experience 'sea change' in addressing substance use disorder," https://news.ohsu.edu/2018/04/25/hospital-staff-experience-sea-change-in-addressing-substance-use-disorder 1/10/18 OHSU news story, "Stigma continues to hamper response to opioid epidemic," https://news.ohsu.edu/2018/01/10/stigma-continues-to-hamper-response-to-opioid-epidemic 9/21/16 OHSU news story, "Team-based approach helps patients fight – and win – battle with opioid addiction," https://news.ohsu.edu/2016/09/22/team-based-approach-helps-patients-fight-and-win-battle-with-opioid-addiction Franny White @ohsunews http://www.ohsu.edu https://news.ohsu.edu/2018/07/13/routine-coordinated-treatment-of-opioid-abuse-can-stem-national-epidemic <h4>Related Journal Article</h4>http://dx.doi.org/10.7326/M18-1203 Taxing American wars creates accountability, prevents lengthy conflict Products of omega-3 fatty acid metabolism may have anticancer effects, study shows Nanoparticles help realize ‘spintronic’ devices Scienmag Mar 5, 2019 Researchers demonstrate nanoparticle systems crucial for new high-speed devicesCredit: ©2019 Ohya Laboratory For… New protocol for measuring background levels of drugs in crime labs Groups of pilot whales have their own dialects
cc/2019-30/en_head_0021.json.gz/line1730203
__label__cc
0.649722
0.350278
Making the recruitment process easier Home-Start is a local charity who provide a unique service; recruiting and training volunteers, who themselves have parenting experience, to work with families in their own homes, building supportive relationships and responding directly to the family’s individual needs. Home-Start Lincolnshire offers support, friendship and practical help to families with at least one child aged eleven and under. Operating in Lincolnshire since 1984, developing a network of eight local organisations, with a proven, lasting, positive impact in the development of children and the health and welfare of families, Home-Start Lincolnshire supports over 1000 families a year with more than 2000 children. Home-Start Lincolnshire had traditionally recruited themselves by advertising in the local press and using their own social media platforms. With the integration of different branches and the launch of Home-Start Lincolnshire as a new region, there was more than enough to do and everyone was very busy. Sorting through CV’s and contacting suitable candidates is a time-consuming business and the thought of CV’s pinging over email constantly was a headache they could do without. Home-Start Lincolnshire soon realised that they didn’t have time to handle their recruitment process themselves and would like some help. Home-Start were impressed by the Applicant Tracking System and short-listing service from Root2. All applicants are manually assessed and ONLY suitable candidates uploaded into a client dashboard. No more emails pinging through their inbox. It meant that they saved a lot of time by having everything in one place and all the shortlisting done for them. Home-Start were able to benefit from the expertise of the Root2 account managers who have a wealth of experience dealing with candidates. 10 candidates were shortlisted from a total of 120. The dashboard is easy to access via the Root2 website and the hiring managers were able to identify the candidates they wanted to interview. Root2 Recruit organised the interviews on their behalf and in this instance a successful candidate was selected within 3 weeks of the vacancy being advertised. The cost saving in man hours was calculated at over £700 compared to recruiting themselves. Home-Start enjoyed working with Root2 so much that they now use us for all their recruitment needs. They like the efficiency of the recruitment process and having everything in one place. Candidates are easily accessible and the whole process has been completed quickly, saving the client time on their recruitment campaigns. The client dashboard is easy to use and there is full clarity from start to finish. Root2 Recruit believe in giving back to the community so we were very happy to run a free advertising campaign for Home-Start to attract new trustees. This resulted in 3 new trustees for the branch. Q: What did you like best about working with Root2? A: The whole recruitment process was so much easier and quicker using Root2. From advertising to appointing was done within a month. The fact that they select the candidates for the dashboard and we didn’t have to go through every application saved us a lot of time and money. Karen Rinfret – Finance Manager
cc/2019-30/en_head_0021.json.gz/line1730208
__label__wiki
0.996837
0.996837
Credit by Featured Image Caption © Internet Solutions TECHNOLOGY Singapore Social media giant Facebook on Sep 6 announced it will pour in more than S$1.4 billion to construct its first data centre in Asia in Singapore. The new facility, located at Tanjong Kling (formerly known as Data Centre Park) in the west of Singapore, will span 170,000 sq m and will “support hundreds of jobs”, the company said in its press release, adding it will form part of its growing presence in Singapore and across the region. Mr Thomas Furlong, vice president for Infrastructure Data Centers at Facebook, told reporters at the launch event that the new project will create "thousands of construction jobs", while the facility will require "hundreds of operators" ranging from network maintenance to logistics staff. He added that given it is a long-term project, the company is still working out its staffing needs. Facebook also touted how the facility will be “hyper-efficient” in terms of the use of water, energy and land. For instance, it will incorporate a liquid cooling technology that will minimise water and power consumption and, according to its testing, can reduce the amount of groundwater used by 20 per cent in climates like Singapore’s, it said. Another example is how the 11-storey building’s facade is made out of a perforated lightweight material that allows air flow, the press release said. Building the data centre upwards, instead of outwards, is also another way of conserving land use, it added. Facebook has selected Fortis Construction to act as its general contractor because of their joint experience building efficient data centres, it added. Mr Furlong said the data centre is estimated to start operations in 2022, but that would just be the first phase and more construction is expected to continue beyond that. "It's going to take a while," he said. Trade and Industry Minister Chan Chun Sing, who graced the launch event, said the social media giant's decision to locate its first Asia data centre here is a "significant milestone" for the country. He said the company's presence here speaks to how Singapore is increasingly connected to the world beyond the traditional modes of air, land and sea. He added that it would facilitate the flow of talent, ideas and creativity into the country. The new facility will also strengthen the country's role in data storage, which would augment its other strengths in data protection, intellectual property, data security and data analytics, Mr Chan said. Source: Channel NewsAsia #datacentre Proud0% Excited50% List : Countries with Largest Forex Reserves in the World 2018 Foreign exchange (or forex) reserves are a key indicator of ...
cc/2019-30/en_head_0021.json.gz/line1730217
__label__wiki
0.682188
0.682188
England: Kew Gardens (London): World’s largest glasshouse reopens after 5 year makeover. Posted on May 4, 2018 by Serbian Animals Voice (SAV) SAV Comment. Anyone who comes to London must pay a visit to the Royal Botanical Gardens at Kew. It is a place that is just out of this world when it comes to flora – collected from all over the world and so carefully looked after. The Temperate House has this weekend been re opened to visitors after a 5 year restoration; and boy does it, the world’s largest Victorian glasshouse, look superb. A ‘must visit’ for anyone coming to Ol’ London town. Watch the video here via this link: Kew Gardens (London): World’s largest glasshouse reopens. London’s Kew Gardens is to reopen its Temperate House – the world’s largest Victorian glasshouse – after a five-year restoration. For the first time in its history, the Grade I-listed structure was “stripped back to bare metal” and modernised. More than 5,280 litres (1,160 gallons) of paint was used, enough to cover four football pitches, and 15,000 panes of glass replaced. The house will open to the public on Saturday, 5 May. The vast greenhouse is now home to a geographically arranged collection of 10,000 plants from of temperate climates around the world – areas sometimes described as “the Goldilocks zone” of the planet, where plants are safe from frost. These include some of the rarest and most threatened specimens, for which the botanic garden is a final refuge. Among the 1,500 different species of temperate plants is the extremely rare South African cycad Encephalartos woodii, a plant that has disappeared from the wild and is now found exclusively in botanic gardens and private collections. This tree has been dubbed “the loneliest plant in the world” because only male plants remain – each a clone of the specimen at Kew, which was collected in the middle of the 19th Century. Some plants contain both male and female parts, but this species requires a female to produce seeds. Lead horticulturalist Scott Taylor, who is overseeing the Temperate House collection, explained that plant-hunters are still searching for a female cycad so Encephalartos woodii can be bred. And he stressed the importance of having an insurance population of every one of the world’s most endangered plants. “We have a really important job to keep all of these things going,” Mr Taylor said. “For some plants that are down to a few individuals in the wild – a wildfire, an earthquake, and they’re gone.” The Temperate House in numbers: The restoration cost £41m 69,000 individual elements have been removed from building and cleaned, repaired or replaced 15,000 panes of glass have been replaced 116 urns, which had to be carefully lifted by crane off the building, have been restored 180km (110 miles) of scaffolding was used, equivalent to the length of the M25 5,280 litres of paint was used, enough to cover four football pitches; 400 staff members and contractors worked in phases on the project, taking 1,731 days to complete it In an interview with the BBC, the naturalist and broadcaster Sir David Attenborough said he had first visited Kew Gardens “back when it cost a penny”. “When I had an office job at the BBC, when I used to be stuck in the office and get really depressed, I would come here at the weekend and take a deep breath, because there was a smell of the tropics. “Plant species can go extinct just like animal species can go extinct,” Sir David added. “[So] this is a very important institution.” Filed under: GENERAL NEWS - International / National / Regional | « Mummy; Where Are All The Birds and Bees ? – Oh, Ask Bayer and Monsanto ! South Africe: Exposed – The Terrible Suffering of Goats. »
cc/2019-30/en_head_0021.json.gz/line1730220
__label__cc
0.540668
0.459332
Andrea Cottrell: Something in the Water By Mike Watkins//Contributor | Wednesday, August 2, 2017 Picture it: A young Andrea Cottrell practicing her swim strokes with a neighbor in her front yard. Nothing out of the ordinary, right? Practice makes perfect, after all. The funny thing is, there was no water. No pool. Just grass and dirt and the occasional squirrel. “My neighbors had been swimming for a couple weeks, and I entered the season late,” she said. “We were just going through the motions on dryland, and I can remember being very overwhelmed with all the strokes and trying to remember which one was what. Needless to say, I am not a butterflier.” That’s the way she perfected her strokes when she first started swimming – water or no water – and it’s paying off now. While her start may have been rudimentary, the long-term gains have been more than she and any of her early teammates and friends ever imagined. Cottrell is competing in the 100 and 200 breaststroke events this week at the U.S. Open as a prelude – a tune-up – before she leaves for Taiwan later this month to represent the United States at World University Games. “Every summer, my friends and I would go to this daytime playground program where basically it got us away from our mothers so they didn’t have to watch us all the time,” she said. “One summer when I was 10, all my friends decided to join the summer league team instead of the playground program.” Ever since those days, Cottrell has continued to watch her swimming star shine as she’s steadily risen through the ranks. While she never enjoyed an individual NCAA title during her years at the University of Louisville (she was part of a couple of relay championship swims), she has been a regular on the U.S. National Team, excelling in long course competition. Last summer at Olympic Trials, she made it into the finals of the 100 breaststroke (finishing 6th), and also made the semifinals of the 200 breast. Along the way, she had one of the best meet experiences of her career and gained a tremendous boost in confidence. “Trials was by far the most fun meet I have ever had, and it was definitely a confidence boost for me because I learned that I can keep up with the fastest swimmers in the country, which are some of the fastest swimmers in the world now,” said Cottrell, who admits she didn’t grow up dreaming of being an Olympian and only recently realized she has the potential. “This meet, in particular, helped me see the things that I need to work on because I am able to see where my strengths and weaknesses are in my races. I am able to visually see where I am losing races so I can go and work on that at practice.” At Phillips 66 USA Swimming National Championships in June, she finished 6th in all three breaststroke disciplines – qualifying for WUGs in the two sprints. Cottrell said she’s excited to swim this week in East Meadow, N.Y., at the U.S. Open to see where she is since Nationals and make sure she’s in the best possible racing shape before WUGs. “The U.S Open will be a great meet to just be able to focus on my strategy and how I want to swim my races,” said Cottrell, who finished her college eligibility this past spring but won’t graduate until next spring. “I am swimming the 100 and 200, but I’ll be focusing on the 100 a lot more at the meet. I might time trial a 50 since I will be swimming that as well in Taiwan. “But the meet fits in very well with my overall race calendar because I like to get in some racing every few weeks. I had World Trials and then I went to Sectionals back home in Columbus, Ohio last week, and then I will have the U.S Open so I have gotten in a few chances to just practice my races in a great race environment.” Cottrell has just over a week between the end of the U.S. Open and when she leaves for Taiwan August 15. Competition begins August 20 and runs through the 26th. Having competed at WUGs two years ago in South Korea, she said she feels well prepared for how the meet progresses. In many ways, that meet in 2015 was a catalyst for everything that’s happened for Cottrell’s swimming career since. “It was amazing to travel to the other side of the world for the first time,” she said. “I had also never really gotten to meet other fast swimmers in the United States, so getting the opportunity to just meet all the people I did and have the experience to wear that USA cap was really special and motivates me at practice. It definitely keeps you hungry for more.” And now that she’s more seasoned as a swimmer, competitor and person, Cottrell said she’s eager to soak in the experience, swim fast and have fun – whether or not she swims beyond this year, which is still undecided. “To be on the National team and race at any international meet is a stepping stone and should give me confidence for the bigger things to come, in and out of the pool,” said Cottrell, an exercise science major who plans to get her master’s in nursing, specializing in neonatal care. “For this meet especially, it will be good to race people from all over the world and just overall practice my race strategies and execute them the way I’ve been working on at a high level international meet. I think that if I keep practicing the little details and focus on those things that I can control, then I will be able to get a little better each day which will set me up well for the future.” And what about that water in the Louisville pool – the same water that helped Kelsi Worrell become a 2016 Olympic gold medalist and placed Worrell and Mallory Comerford on this year’s FINA World Championships team, where they won multiple gold medals? What’s the secret? “No, there is unfortunately nothing in our water here in Louisville, although it is rather cold at 6 a.m. practices,” she said. “But the coaches are absolutely incredible. Arthur (Albiero) and all the other coaches have done an outstanding job transforming this program to what is it today. “All of the coaches have swam under Arthur at some point in their careers, which is something I find so valuable in the success to this program. The coaches really take pride in what they do and go above and beyond in making this program what it is, to see us preform at our best.”
cc/2019-30/en_head_0021.json.gz/line1730222
__label__wiki
0.737724
0.737724
Category Archives: Poe No, this is Coleridge! Posted by Person from Porlock in Editorial Notes, Poe A Descent into the Maelstrom, Edgar Allan Poe, He mad?, Kantianism, Sponge Bob, The Atlantic, The Narrative of Arthur Gordon Pym of Nantucket, The Rime of the Ancient Mariner I feel like I should apologize – this is STILL the “Samuel Taylor Coleridge Blog”. The thing is just, sometimes a lot of stuff happens that is relevant to what I do behind the scenes, and then, I tend to mention it as well; like, the recent events concerning the Baltimore Edgar Allan Poe house, for example. So, why should Coleridgians care about Poe? (If you seriously have to ask that, chances are, you are still pretty new to the topic, but let’s assume that for a while.) Well, because, to answer in an extremely simplified fashion, Poe and Coleridge are very, very similar to each other in the choice of the topics they deal with. Of course, Poe mostly uses another medium (mainly, the short stories that make him so important even today), and of course, there is this thing that Poe writes about 30 years later than Coleridge (or, as I personally like to treat it, that Coleridge is a Pre-Kantian, while Poe is a Post-Kantian), but the similarities in the narratives they treat with are universally recognized, and have been extensively researched. So, to discuss Poe, is, in part, to discuss Coleridge, too. I have pondered quite a while which source to quote to give a good example; I will quote this article from The Atlantic – from April 1896, to give you an idea how established this connection is. To the readers more acquainted with the crunchy stuff, I apologize; more elevated stuff is about to arrive, but sometimes, you got to explain some basics, too. 🙂 http://www.theatlantic.com/past/docs/unbound/classrev/poe2.htm The Works of Edgar Allan Poe It is nearly fifty years since the death of Edgar Allan Poe, and his writings are now for the first time gathered together with an attempt at accuracy and completeness. The alleged reason for this indifference to the claims of a writer who has received almost universal recognition is that the literary executors of Dr. Rufus B. Griswold, Poe’s first editor, held until recently the copyright to his works. But in reading the various memoirs of which, at one time or another, Poe has been the subject, it appears that other causes have been at work. One and all, even the most flattering estimates of Poe’s genius, are pervaded by a curious antipathy to him as a man, and this prejudice, no doubt, has been largely responsible for the absence of any serious demand on the part of the public for a fair representation of the author in his works. A part of the disfavor with which Poe is regarded is due to Dr. Griswold’s biography; for of all men Poe had best reason to pray that he might be delivered from the hands of his friends. But still more is chargeable to the extraordinary confusion of the man with his work–of the ethical with the purely literary aspect–which is so characteristic of literary judgments in this country. This puritanical tang is to be detected even in a study so conscientious as the Memoir by Professor Woodberry, which occupies the opening pages of the first volume of the new edition. However, unlike his predecessor, Professor Woodberry has not allowed his lack of sympathy with his subject to interfere with the precision of his editing. Every care has been given to the preparation of the text and the notes. Whenever obtainable, the exact date of publication of the various papers has been ascertained, as well as other facts of interest regarding them, although no new light is thrown upon the source of Poe’s inspiration. Besides the Memoir by Professor Woodberry, the Tales, Criticisms, and Poems are severally preceded by a critical introduction by Mr. E.C. Stedman. These essays are distinguished by a very just appreciation of the merits and demerits of Poe as a writer. In effect, Mr. Stedman pronounces him a critic of exceptional ability, and agrees with the opinion of Mr. James Russell Lowell that Poe’s more dispassionate judgments have all been justified by time. As a story-writer, Mr. Stedman considers that Poe’s achievement fell short of his possibilities; he lacked the faculty of observation of real life, a defect for which his unique imaginative power in part compensated, but which will prevent his being classed among the greatest writers of fiction of his century. These qualities, however, appear in their proper aspect when he is regarded as a poet; they then fall into their right relation to his work, and are seen to have made him what he was, a master in his chosen field. The imaginative illustrations have scarcely the quality of Poe’s own creative genius, but the edition is well supplied with portraits of Poe, his wife, and his mother, as well as interesting views of places with which Poe’s name is associated. This edition is supposed to include all of Poe’s writings which are of value. The Elk is here reprinted for the first time, while The Landscape Garden and The Pinakidia, a collection of quotations which struck Poe as important or suggestive, are omitted. Whatever may be thought of the omission of the first paper, that of the second is surely an error. It is conceded that not more than a half dozen of the tales, less than that number of the critical essays, and not all of the poems are of interest to the public at large. The sole reason, therefore, for publishing a complete edition of the works of Poe, as of any other writer, must be to increase the facilities for the student of the particular period in which he lived. To exclude writings in which an author has recorded the influences, however slight, which have moulded his thought is plainly to eliminate the chief reason for the compilation of such an edition. In this case, it amounts to an assumption on the part of editors and publishers alike that the last word in regard to Poe has been said. But as yet we have had no critical history of the intellectual development in this country during the past century. There remains, therefore, for the student of Poe’s life and times, a field of research practically unexplored; and as long as this is the case it is impossible to form any conclusions in regard to him which can be considered final. For Poe was essentially the product of his time. The intellectual activity which characterized the educated class in this country before 1860 was no sporadic instance, but the logical result of influences which belong to universal history. For example, when Goethe made his discovery of the unity of structure in organic life, it gave to the philosophers a physiological argument for the suppression of tyrants, and put the whole of creation on an equal footing. The French Revolution pointed the moral most effectually, and to the dullest mind brought a host of new deductions. These deductions necessarily involved a realization of the dignity and value of the individual, whether man or beast, and presented life in an entirely new aspect. To us Americans these ideas came filtered through the mind of Coleridge, vivified by his enthusiasm. They found a fertile soil, and resulted in a growth of new ideas so vigorous and rapid that a kind of explosion of righteousness took place, which effectually and permanently upset some ancient and picturesque notions of might and right. The so-called Transcendentalists of New England were the most conspicuous result of this new enthusiasm for the individual. In spite of his scorn for their pretensions, Edgar Allan Poe, in his way, was as deeply affected by the enthusiasm as the most radical among them. He was not, indeed, a reformer in the ordinary sense; he remained always, so to speak, just within the outer fringe of this new humanist movement. Its effect upon him was purely psychologic and the human mind became, in his estimation, a treasure-house of undreamed-of possibilities, which was but the poet’s version of the value of the individual. Yet he was no more conscious of this than he was that Goethe’s researches in natural history actuated him when, in imitation of Coleridge, he humanized his redoubtable raven. His mind was like a mirror in the precision with which it reflected the prevailing tendencies of his time, and with no more intention. The effect of Coleridge’s influence on Poe has never been properly estimated. Professor Woodberry, it is true, accuses him of “parroting Coleridge,” while Mr. James Russell Lowell also pointed out Poe’s great indebtedness to him. Both critics, however, failed to appreciate the extent of this indebtedness. Not only did Coleridge exert a general influence, which Poe shared with every other man of letters in this country, but he transmitted a special and unique influence to him alone. This had already made of Coleridge a great poet, while to it Poe owes the tardy measure of fame which has been accorded him. One aspect of the general influence which Coleridge exerted upon Poe is curiously exemplified in his poems from the time that he began to write. Coleridge was among the first to humanize nature. It was a fashion of the day, and a part of those tendencies of thought already briefly indicated. It arose, probably, from a haziness as to the limitations of self-consciousness. But whatever its cause, the idea strongly affected the poets, and animals, birds, plants, and insects were given human attributes, or were made to symbolize all kinds of abstractions. Christabel, The Rime of the Ancient Mariner, and many of the political poems, such as The Destiny of Nations and The Raven, are evidence of the attraction this notion possessed for Coleridge. It apparently suited as well Poe’s mystical turn of mind. The Raven is, of course, the most conspicuous instance, and in the Philosophy of Composition Poe assumes that a talking bird is the most natural thing in the world. In his so-called Juvenile Poems, printed about 1831, thirteen years before The Raven was published, he already makes use of birds as symbols of Nemesis or Destiny, and many of the passages are nearly identical in thought with some of Coleridge’s lines. That Poe was familiar with the writings of Coleridge at that time is shown by his eulogistic reference to him in the preface to this early edition of his poems. The special influence which Coleridge had upon Poe relates to the development of his own poetical genius, and, to be understood, requires a short digression from the main subject. About 1773, Gottfried August Bürger, a poor student at Göttingen, wrote a ballad under the title of Lenore. The composition of this ballad was due to Herder’s famous appeal to the poets of Germany for the development of a national spirit in poetry. Lenore was modeled upon the ancient ballad forms as Bürger found them in the collections of Bishop Percy, Motherwell, and Ossian. From these and other relics of folk-songs, as well as from the study of Shakespeare, he evolved a theory as to the requirements of a poem which should endure,–a poem, in short, which should possess a universal, and therefore a national interest. The ballad was written in strict accord with the theory, and its success justified its author’s conclusions. It was sung and recited by all classes throughout Germany, and its author, according to Madame de Staël, was more famous than Goethe. The poem was translated into nearly every language. In England it had seven different translators, among them Sir Walter Scott and Pye the poet laureate. It was set to music in many forms, and is said to have inspired The Erl King of Schubert. To the artists it was equally suggestive. Ary Scheffer and Horace Vernet both painted pictures which had for their subjects some episode in the poem, while two of the greatest illustrators of the day, Maclise and Bartolozzi, found it worthy of their best efforts. Nor did the poets escape its influence. In England, Keats, Shelley, Southey, Coleridge, and Wordsworth either imitated or were inspired by it. Coleridge and Wordsworth were of all most deeply affected by its influence. From the evidence at hand it is apparent that the two poets based their famous new departure in poetry upon Bürger’s poetic theory, which had been formulated in the preface to the second edition of his volume containing Lenore; also, that Coleridge’s greatest poems, including The Rime of the Ancient Mariner and Christabel, were its direct result. It is this theory which is the foundation of Poe’s Philosophy of Composition, and Poe was the third poet to be made famous by the careful application of it to his work. It is a striking confirmation of these facts that the productions in which Poe most faithfully conformed to the rules laid down by Burger are of all his writings those which have been considered by the critics as best worth preserving. The famous theory whose effects have been so far-reaching is extremely simple. It is based upon a fundamental principle of aesthetics, that art, to endure, must deal with experiences common to all men. Simplicity of phrase, the narrative form, the refrain, and particularly the use of the supernatural are the ancient and essential means for the accomplishment of this end. Bürger’s poems were well known in this country before 1840, but Poe undoubtedly received his knowledge of the theory from Madame de Staël and from The Lyrical Ballads. This, it will be remembered, is the volume of poems whose publication in 1798 marked the apostasy of Wordsworth and Coleridge from the classic models. In the appendix to the second edition their reasons are set forth at length, and Bürger’s ideas are referred to with enthusiasm. It is this explanation which Poe quotes in the introduction to his Juvenile Poems. The succession therefore, is uninterrupted: Bürger formulated his theory in the essay prefixed to the edition of his poems published in 1778; Coleridge and Wordsworth applied it and quoted it in The Lyrical Ballads in 1800; while Poe, in his turn quoted it, as adopted by Wordsworth and Coleridge, in the preface to the edition of his poems in 1831, and finally by its complete application made the chief success of his life. It is clear from this that Poe was far from being the literary mountebank he is generally pictured. From his earliest youth he seems to have been actuated by a unity of purpose, an unswerving application of proven means to a desired end, which indicates in him the possession of qualities that are even Philistine, so respectable are they. As for Poe’s weaknesses, some day, perhaps, they may find a critic such as François Villon found in Stevenson, and Coleridge in Walter Pater, who will judge them together with his genius as alike the expression of a nature too keenly responsive to the exigencies of life. In the mean time, satisfactory as the new edition of Poe’s works undoubtedly is to the general reader, we shall hope it may some day be supplemented by the republication of the papers now omitted, with the suggestion of new light to be thrown upon the tendencies of the period in which Poe lived.
cc/2019-30/en_head_0021.json.gz/line1730230
__label__wiki
0.960431
0.960431
Pat Symonds Formula 1 employee Credit: Glenn Dunbar/Williams F1 Vital statistics for Pat Symonds Nationality GBR Symonds has been in Formula One since the early 1980s, and has experienced the highs and lows of helping create championship winning cars, as well as playing consultant to backmarker teams. After serving an F1 ban for race-fixing at Renault, Symonds made an advisory return with the Marussia team, before joining Williams full-time as their Chief Technical Officer. Symonds’ F1 career began after experience gained in junior racing categories. He joined the Toleman team during the 1980s and remained with them through their days as Benetton and Renault F1. Starting out as a race engineer, Symonds gradually worked his way up to Head of Research and Development, before being promoted to Technical Director. Following in the footsteps of the outgoing Ross Brawn wasn’t an easy task, but Symonds helped the team to their two world championships in 2004 and 2005, after being promoted to Executive Director of Engineering. During the 2009 season, Symonds and Renault team principal Flavio Briatore, were found guilty of race-fixing – asking driver Nelson Piquet Jr to deliberately crash during the Singapore Grand Prix the previous year. Initially, the FIA banned Symonds and Briatore for five years, and the Renault team released him from his contract. After legal wranglings, the ban was reduced. In 2011, Symonds became an advisor to the Marussia F1 team which resulted in the split with then-technical director Nick Wirth. On the very day that his ban was lifted, it was confirmed that Symonds would join Williams F1, taking on the role of Chief Technical Officer. After a dire couple of season, the Williams team had their hopes pinned on Symonds to turn things around for them. At the end of 2016, it was confirmed that Symonds would be leaving the team, with Claire Williams thanking him for leaving the team stronger than he found it. Filed under Formula 1 employees 21/01/2015 Williams provide a look at the FW37 08/12/2014 To be quite Frank 18/09/2013 Slow patrol 03/12/2010 F1 Advent Calendar 2010 (Day 3) - A Renault reinvention 06/10/2008 Ancillary F1 - Météo-France 18/10/2014 Health and safety in Formula 1: Tragedy and action 16/02/2017 James Allison joins Mercedes as technical director 20/12/2016 Pat Symonds to leave Williams at the end of the year 21/01/2015 2015 launch season kicks off with Force India and Williams 05/01/2015 Williams reorganise race engineering team for 2015 15/12/2014 Steve Nielsen joins Williams as Sporting Manager 13/01/2014 Williams F1 promote and expand engineering department 19/02/2016 Edge of tomorrow Mentions during live coverage Tweet from @adamcooperF1: Pat Symonds says that there are "a number of " ex-Marussia and Caterham people already working at @WilliamsRacing During the Friday press conference, Williams' chief technical officer Pat Symonds was asked for his views on this year's engine regulations."I think as a business we ought to focus on the positives and I think that the technology that we’re employing in Formula One now is impressive. The road car industry has to hit CO2 per kilometre targets and those are very difficult targets to meet. And they will have to employ technologies such as we are using in Formula 1. So we are moving things forward, we are more relevant than we used to be and I think that’s very important."I think there was a great danger that we would become irrelevant. We would become the focus of gas-guzzling and not having social responsibility. And I think it was really important that we did move away from that" Discover Formula 1 Driver biographies Circuits past and present Grand Prix seasons in depth Individuals working in F1 Officiating race stewards Key product suppliers
cc/2019-30/en_head_0021.json.gz/line1730231
__label__wiki
0.789759
0.789759
Andre O'Keefe shouts Johnny O'Keefe Price from $79.00 130 Magnolia Road, Tanunda, Barossa, South Australia, 5352 http://www.barorraconvention.org Johnny O’Keefe was the pioneer of rebellious Australian rock and roll, predecessor to the likes of Bon Scott, Jimmy Barnes, and Michael Hutchence that succeeded him. Often labelled as Australia’s Elvis, his explosive live shows left a mark on the best of the best in global rock royalty including Buddy Holly and Roy Orbison. Having debuted his show to a sold-out season at the 2018 Adelaide Cabaret Festival and two sell-out shows at Palms At Crown Melbourne (for which he attracted a standing ovation each night), Johnny’s real wild nephew – the multi-talented Andrew O’Keefe – delivered an extraordinary performance in Andrew O’Keefe 'Shouts' Johnny O’Keefe. Highly applauded by the critics for his song interpretation and his storytelling, Andrew intertwines his own experiences with legendary stories of The Wild One, and takes audiences on a very personal journey through JOK’s twenty-five year career, belting out classics like 'Wild One','Sing Sing Sing' and 'Shout' with an intensity topped only by Johnny himself. From $ 79.00 to $ 79.00
cc/2019-30/en_head_0021.json.gz/line1730234
__label__wiki
0.586769
0.586769
Athletics 3 Bidding 1 Featured bidding announcement: Paris awarded European Athletics Championships 2020 Sportcal Insight’s ‘Featured bidding announcement’ focuses on the European Athletic Championships, after Paris was awarded hosting rights to the 26th edition in 2020. Major marathons and their contribution to host cities There are more than 80 international marathons taking place between now and the new year, with thousands scheduled throughout 2015. Sportcal looks at the continuing popularity of major international marathons and how they have affected host cities in various nations. IAAF World Indoor Athletics Championships set to make impact on smallest ever host city Sopot, Poland, is in the final stages of preparations for the 2014 IAAF World Indoor Athletics Championships, which is anticipated to make a significant impact on the coastal city, with over 20,000 expected to attend, including 2,000 foreign visitors, and media exposure worth millions of dollars. Sopot is the smallest city ever to host the championships, with a population of less than 40,000. A regular tourist destination, it is, however, visited by over 2 million people each year.
cc/2019-30/en_head_0021.json.gz/line1730236
__label__wiki
0.634195
0.634195
Interview: Billy Flynn Talks Days Shocking Exit, Big Return and Future Lori Wilson Finding perspective post Days of our Lives. As the actor confirmed to Soaps.com at the Daytime Emmys, Billy Flynn is returning to Days of our Lives. While no airdate has been released yet for his re-entry into Salem aside from it being this coming fall, Flynn recently talked about his and Kate Mansi’s return as Chad and Abigail DiMera to Soap Opera Digest and revealed how his time away resulted in some much-needed self-care. Despite being written off the canvas last year, the powers that be wanted to keep the story of Chad and Abigail going and reached out. The film Flynn was supposed to be shooting got pushed back, so he “jumped at the opportunity” to play Chad again. Though it was a shock to learn he was being written off in the first place, Flynn took the respite as a way to focus on himself. Considering the role of Chad DiMera was his first job, he found the constant, fast pace schedule of shooting Days of our Lives could be overwhelming. Describing the last two years as being in a bit of a decline, he took the time he had away to work on himself and get healthy. He started doing the things he loved, dealt with his grief over losing his great-grandmother, and found gratitude for many things in his life. More: Marci Miller & Tyler Christopher’s red carpet interviews Because he was afraid to lose everything he had during his initial run as Chad, Flynn recalled trying to control everything, which eventually trickled down from work to other parts of his life. So, during his time away from Salem, “I just focused on myself. There were so many parts of myself that I’d forgotten and I just got in touch with that again.” Those things included boxing, jiu-jitsu, and his wife – all of which he reported makes him better at his job. “Now, I’m in great shape. I’m super-clear-headed. I have perspective on what’s important. I’m a better actor now.” Now that he’s back, he’s learned not to take from his personal life to help tell Chad’s story. Describing that approach as “cutting yourself over and over again,” Flynn said, “Chad is a character that has been through so much and I was going through so much in my life. I just never got out of it. I’ve had so much grief and so much depression I was doing things in my off time to cope that weren’t healthy for me.” Instead, he’s learned he can access the feelings needed to portray Chad without being in it. Admitting he was a little nervous approaching the work in a new way, he relayed, “After the first day, I was like, ‘Oh, okay, I can do this. I can do it in a safe and healthy way. I can still tell the story. I still feel good about my work. It feels good.’” More: Blake Berris film, actress reveals Tourette Syndrome Happy to be back in Chad’s shoes, Flynn shared that Chad and Abigail have an open and honest marriage, and while he’s comfortable with his relationship, there will still be things that make Chad “revisit some of his own insecurities and things that he’s lost.” Chad’s still flawed, but he’s matured. “He’s a man now, as I am. I mean, Chad’s always reflected my own personal life. I think that’s what you see.” Take a look at Billy Flynn on the red carpet with Soaps.com at the 37:40 time slot where he dishes on his return. Days Spoiler Video: Nicole’s Life... Days Spoiler Video: Melinda Pulls a...
cc/2019-30/en_head_0021.json.gz/line1730241
__label__cc
0.538173
0.461827
Student-only Lunch and Roundtable Discussion: Olivia A. Albrecht, Senior Vice President, PIMCO School of Social Work, 1255 Amsterdam Ave., New York, NY 10027 Please join the Center on Global Energy Policy on Friday, April 5 for a luncheon and roundtable discussion with Olivia A. Albrecht, senior vice president at PIMCO and a member of the executive office. During this student-only luncheon, Ms. Albrecht will discuss her work at PIMCO, including ESG (environmental, social and governance) bond strategies and green bonds, academic and job histories, career paths, and perspectives on what it means to be a female leader in this sector. Biography Ms. Albrecht is a senior vice president in the Newport Beach office and a member of PIMCO's executive office, leading the firm's ESG (environmental, social and governance) business strategy. Prior to joining PIMCO in 2011, she worked in private equity at Cerberus Capital Management in Frankfurt, Germany. She has also held positions at Lockheed Martin, Mubadala Development Corporation in Abu Dhabi, UAE, and the U.S. Department of Defense. She holds an MBA from Columbia Business School, along with a master's degree from Columbia University's School of International and Public Affairs and an undergraduate degree from Princeton University. Ms. Albrecht was a member of the Big Brothers, Big Sisters Orange County Board of Directors from 2012-2014. Registration is required. This event is open to all students. Space is limited therefore please register only if you can commit to attending the roundtable. Lunch will be provided. If you have any questions, please contact: energypolicy@columbia.edu Center on Global Energy Policy energypolicy@columbia.edu Register on CU Events
cc/2019-30/en_head_0021.json.gz/line1730245
__label__cc
0.716524
0.283476
Women key to food systems, healthy & sustainable diets According to the 2018 State of Food and Agriculture report published by the Food and Agriculture Organization (FAO), women make up about 43 percent of the agricultural labor force worldwide, and in some countries like Zambia, women make up 80 percent of all farmers. In addition to participating in farming, most women, particularly in rural areas in Zambia, are also major actors in seed saving, animal husbandry, grain processing, and other tasks related to growing food. This is in addition to cooking, cleaning, and taking care of sick elders and children. It is women farmers who produce the food that families eat. While male farmers often focus on growing commodity crops like maize, rice, and soybeans, women raise vegetables and small livestock that nourish families each day. Thus, women make significant contributions to agricultural production, rural economies, food security and nutrition, land and natural resource management, and building resilience to climate change. Beyond their contribution to food production and nutrition for their families, women engaged in agriculture use it as a source of livelihood but also contribute towards a healthier and more resilient environment. Examples range from women in Chongwe District engaging in crop diversity through climate-adaptive irrigation strategies, to women dairy farmers in Kafue district starting a co-operative to pay for their children’s health care and education. The state of Zambia's women farmers While women are the majority of Zambia’s smallholder farmers, their contributions are at best largely unnoticed and at worst almost universally ignored. Women do not have equal access to resources land, credit, education, extension services etc. This lack of women’s empowerment increases maternal under-nutrition, and limits women’s ability to practice positive care behaviors, such as providing sufficient and nutritious complementary foods. Therefore, to achieve food and nutrition security for all people, food assistance policies and programs must create conditions that advance, rather than undermine, gender equality and women’s empowerment. To achieve this, women need the same access to land, education, and inputs that men currently are offered. According to FAO, globally, if resources were available, women’s food production capacity would be increased by 20 to 30 percent and lift as many as 150 million people out of hunger and food insecurity. With about 815 million people going hungry worldwide, that’s no small number. Hivos Southern Africa is working with women in Zambia through various initiatives and making a monumental change in the food system. An important aspect that has been taken by the Sustainable Diets for All (S4ALL) program is to promote the production and consumption of traditional foods. This is because food is as important to a culture as language. Not only is it a tool for communication, and a source of social engagement, it is a platform for human expression. It embodies our Zambian culture and ought to be preserved for future generations to not only enjoy its nutrition but to understand our rich culture. Understanding the culture of our traditional food means equally understanding Zambia’s culture around women’s role in food systems in Zambia. Celebrating local food value and diversity Thus, the Hivos SD4ALL program in collaboration with International Institute for Environment and Development (IIED) published a Food Values Book themed: Celebrating local food value and diversity. The book celebrates Zambian traditional foods and adds knowledge of the nutritional value contained in these foods. Additionally, the crops celebrated are crops that are adapted to the Zambian climate and therefore can be used in climate change mitigation and adaptation strategies. Hivos works with like-minded Civil Society Organizations such as the Zambia Alliance of Women, Civil Society for Poverty Reduction, Civil Society Organizations-Scaling up Nutrition (CSO-SUN), Consumer Unity Trust Society (CUTS) and Alliance for Zambia Informal Economy Association (AZIEA). These partners together work to promote production and consumption of sustainable diets as it is a multiform phenomenon. Ms. Chimya, the Executive Director of the Zambia Alliance of Women (ZAW) acknowledges the important role played by various actors but suggests that policymakers, community leaders, and elders need to value the work of women and youth as a priority. Not only are the women farmers and food producers but they are nutritional gatekeepers, caretakers of rich agricultural traditions, and stewards of the land and biodiversity. Thus, the empowerment of women makes policy interventions more nutrition sensitive. For Ms. Chimya, the process of women’s empowerment must be supported more vigorously adding that gender equality is fundamental to justice, and it is fundamental to nutrition. Recognizing the role of women in agriculture and providing concrete solutions to eliminating hunger and malnutrition, stopping food loss and food waste, promoting nutrient-dense and indigenous crops, and realizing the vision of a more equitable food system will all lead to a healthy nation. Therefore, creating a more sustainable food system means not only acknowledging women’s pivotal role in nourishing the planet, but also uplifting women in their current efforts and potential to be pioneers of change. The author: Sustainable Diets For All (SD4ALL) Program Team, Hivos Southern Africa. SD4ALL is a lobby and advocacy program that is currently working on policies and plans that support diverse food production and consumption while acknowledging the role of women in the food system. This blog post originally featured on our Southern African website: https://southern-africa.hivos.org/news/women-key-to-food-systems-healthy-sustainable-diets/
cc/2019-30/en_head_0021.json.gz/line1730246
__label__wiki
0.73504
0.73504
January 2, 2018 · by kistchquixote · in Authors, Global Taiwan Institute, Liao (Kitsch) Yen-Fan. · Taiwan’s ongoing quest for the F-35B Lightning II has recently been revisited during policy discussions in Taipei and Washington. Most notably, in April, Japan Time’s report led the discussion by speculating that the Trump administration’s upcoming arms sales to Taiwan includes F-35Bs. This was followed by Taiwan’s announcement to propose that acquisition as early as July, and echoed by an expert opinion during a recent panel. The importance of acquiring F-35Bs was further highlighted by the recent conclusion of the annual Han Kuang-33 exercise designed to test and verify the strategy outlined in the 2017 Quadrennial Defense Review (QDR). U. S. Marine Corps F-35B aircraft prepares for a landing on Marine Corps Air Station Yuma, Ariz., Nov 16, 2012. Image Credit: DoD Photo by Cpl. Ken Kalemkarian, U. S. Marine Corps/Flickr. The computer-simulated portion of the Hang Kuang 33, which employed the Joint Theater Level Simulation (JTLS) system, has revealed significant challenges for Taiwan’s ability to maintain air parity across the Taiwan Strait. The result of the air portion of the exercise indicated that while the blue team (Taiwan) was successful in denying air superiority to the red team (China), it was unsuccessful in providing critical ISR support. This led to other branches, such as the Taiwan (ROC) Navy, failing to counter the PLA carrier groups deployed at 1,500 kilometers to the east of Taiwan. During the discussion and evaluation portion of the exercise every morning, both teams and the visiting US delegation headed by General (ret.) Edward A. Rice Jr. agreed that the inclusion of F-35Bs would tip the balance in Taiwan’s favor, and enable the air force to fulfill its secondary mission of supporting other branches instead of being tied down in the skies over northern Taiwan. Evolving Requirement Over the course of Taiwan’s longstanding quest to acquire the F-35B, two key characteristics remain consistent: stealth (low observable tech) and short take-off and vertical landing (STOVL). It is worth tracing and examining the evolution of these two requirements. In the early 2000s, Taiwan’s Ministry of National Defense (MND) already recognized the role stealth would play in the future contest for control of the air, and tasked the NCSIST with the development of a stealth upgrade for the F-CK-1 indigenous fighter code-named Lushan Project (廬山計畫). DOWNLOAD Quadrennial Defense Review 2017 The NCSIST team went as far as conducting a visit to US companies in December 2002 surveying potential useful techniques in adopting Radar Absorbent Materials (RAM), which culminated in the testing of a RAM-coated AT-3 trainer. While the project was later abandoned, stealth remained a key goal and became a requirement, as early as 2002, for Taiwan’s third generation fighter. Stealth, as a requirement for Taiwan’s next-generation fighter, was also documented in the first ever released Quadrennial Defense Review in 2009. Stealth persistently appeared in the Legislative Yuan record during sessions with succeeding Air Force chiefs of staff, and other defense officials through 2013. The next QDR reaffirmed the same requirement. The quest for STOVL was similar to the stealth requirement, however with a much more apparent sense of urgency. As early as 2002, rumors of Taiwan’s interest in the STOVL-capable AV-8B emerged, with officials even raising the issue during the annual arms sales talks. While the Air Force officially denied such pursuit, the prospect of acquiring AV-8B was soon confirmed in a 2003 legislative session, when the Aerospace Industrial Development Company (AIDC) was instructed to prepare to refurbish the airframe. STOVL continued to make appearances in the intervening years alongside stealth, with rumors of Taiwanese interest emerging both during the retirement of Britain’s Harrier fleet and in 2016 when the US expressed tentative interest in providing the platform. However, by then Taiwan had already lost interest in AV-8B as a potential platform, while the STOVL requirement persists. Taiwan had interest in acquiring STOVL-capable AV-8B Harrier II. Image Credit: CC by 2.0 Marines/Flickr. Stealth and STOVL continue to appear together as requirements for Taiwan’s next generation fighter in official documents and legislative records. The Ministry of National Defense unequivocally stated in April 2017 that “any platform that possesses both Stealth and STOVAL capabilities is the one we want.” Stealth and STOVL The acquisition and employment of any weapons system is a complicated task, requiring a detailed assessment of the current force structure, deployment, and tactics that influence the mission. This assessment will then inform the various desired capabilities and key performance indicators associated with the platform. In the context of a Taiwan contingency, the suitability of the F-35B would involve numerous qualitative and quantitative analyses based on the evolving paradigms of various fields. Analyses will cover factors as narrow as the rise of high-alpha maneuvers in agility studies, to the overall shift of China’s strategic intent following the PLA reorganization into five theater commands. Regardless of the F-35B’s suitability, it is clear from the legislative records that the Taiwan Air Force’s determination to acquire a platform possessing both STOVL and stealth capabilities has been consistent for more than a decade. However, currently, only the F-35B satisfies both requirements. The pursuit of these two intrinsic capabilities raises the question of their utility within Taiwan’s war plan. The utility of low observable tech in combat and its role in compressing the kill chain was further validated by the high kill ratio demonstrated through dissimilar air combat Training (DACT) and joint exercises like the Red Flag. However, the necessity of the STOVL requirement is less clear and it comes with a significant performance trade-off. From information made public so far, we know that the F-35B sacrificed much to accommodate STOVL, including a higher wing-loading, a lower thrust-to-weight ratio, a significant reduction in transonic acceleration performance, and compromised endurance. These are all considered key performance parameters (KPPs) that inhibit Taiwan’s ability to achieve air dominance, a top-level requirement. Earlier studies conducted by the federally-funded research center RAND indicate that China has the potential ability to simultaneously incapacitate all existing Taiwanese runways and taxiways through multiple volleys of PLA rocket force (PLARF) ballistic missiles armed with maneuverable reentry vehicle (MARV) warheads. Nevertheless, the window of opportunity between incapacitating runways and their repair would be a short one, perhaps too short for a fledgling air power such as the PLAAF. Fairly limited suppression of enemy air defense (SEAD) capability makes the PLAAF situation more complicated. With a relatively low investment, the window could be made shorter by boosting the existing rapid runway repair capacity and readiness rate, along with additional volleys for the existing SAM batteries. PLA Rocket Force (PLARF) short-range ballistic missile DF-15B with a range of 800 km and estimated payload of 600 kg. Variants of DF-15 pose a major threat to Taiwanese air bases. That threat, however, can be mitigated. Image Credit: Wikimedia Commons/CC BY-SA 4.0 Determining whether the trade-offs the F-35B experience as a result of incorporating STOVL capability are mission critical or not would depend on data still outside of the public domain. However, if Taiwan’s armed forces focuses on acquiring STOVL capabilities without first exhausting the lower-end solutions to mitigate potential runway denial, it could compromise the first order requirement of a weapon system which is meant to redress the qualitative balance across the Strait. The last chance for Taiwan to become a part of the original Joint Strike Fighter (JSF) program was in 2003. If it was an original participant in the program, Taiwan could have secured the possibility of shaping a platform more suited to its needs, as a security cooperation partner alongside Singapore and Israel. However, both political and financial circumstances prevented such an eventuality. With Germany’s recent interest in the F-35, it is increasingly likely that, even if Taiwan were to secure a sale, the delivery horizon may well stretch beyond 2025. Such concerns over delivery schedules should be tempered by possibilities for negotiation with partners facing lower threat levels. Alternatively, a temporary loan of USM airframes following the precedent set by the AH-64 Apache case could be considered. The real challenge facing the Taiwanese defense planners is not the meticulous calculation of equipment KPPs or quantitative models for the hardware balance.Instead, it is maintaining vigilance as to the quality and quantity of air force personnel, as demonstrated by operational readiness rate, cockpit ratio, flight hours, and the strategic and tactical initiative of Taiwan’s military leadership. People will ultimately determine the effectiveness of conventional deterrence. The first U.S. Air Force F-35A Lightning II aircraft to land at Hill Air Force Base (AFB), Utah, arrives Sept. 13, 2013. Image Credit: DoD photo by Staff Sgt. Devin Doskey, U.S. Air Force/Flickr. The main point: Taiwan’s quest to acquire F-35B Lighting IIs has gained renewed vigor with the Trump administration. However, the decades-long focus on a STOVL-capable third-generation fighter may have neglected lower-end solutions to potential runway denial. Considering the timetable and available options, F-35Bs combined with an improved readiness rate remain the most likely candidates for a redress of cross-Strait air imbalance. This article originally appeared on Global Taiwan Brief, vol. 2, Issue 24, published by Global Taiwan Institute on 14 June 2017. Kitsch Liao is a Taipei-based senior policy analyst for cybersecurity firm, specializing in cybersecurity, air power, and the Taiwanese military. Tags: F-35, f-35b, Han Kuang 33, NCSIST, QDR2017, stealth, STOVL, US arms sales, US-Taiwan relations ← U.S.-China Relations and Taiwan’s Place in U.S. National Security Strategy Week in Taiwan Defense 1/2018 →
cc/2019-30/en_head_0021.json.gz/line1730249
__label__wiki
0.577976
0.577976
Preschool & Pre-Tertiary Institution Search Postgrad Articles Malaysian Providers of Postgraduate Qualification & Quality Assurance Why Many International Students Pursue Postgraduate Studies in Malaysia? Acquiring a Postgraduate Qualification Duration of Study MBA and Cost of Study Funding for Postgraduate ProgrammesMalaysian Government Scholarships for Welcome to the Postgraduate Channel. Postgraduate study is significantly important when you aim to reposition your career or to begin scientific research. Institution Profile Home Where to Study Monash University Malaysia BRIEF BACKGROUND OF MONASH UNIVERSITY Monash University was invited by the Malaysian government to open a campus in 1998. Through a long-standing partnership with the Sunway Group, the first foreign university campus in Malaysia was created at Bandar Sunway in Petaling Jaya. Classes commenced in July 1998. The current campus was purpose-built in 2007 at a cost of RM200m. At present there are some 4,400 students and 400 staff, with growth projected to lead to over 6,000 students and 600 staff. About a quarter of the student body is international. The campus continues to develop steadily, and now enjoys excellent facilities for world-class education and research. All academic staff members are expected to engage in scholarly research. As a full campus of Monash University, we provide a distinctive international experience, with teaching and research of the highest order. We engage with Malaysian and regional societies to improve the human condition. The Sunway campus is a dynamic community of scholars comprising staff and students, supported by collegial processes and comprehensive first-class infrastructure, and aspiring to intellectual achievement of the highest order. WHY MONASH UNIVERSITY FOR POSTGRADUATE STUDIES? Reputation as a top-ranked Australian and international university Same high standard of education as the Australian campuses Global alumni network with over 215,000 alumni International advantage Strategically located in a safe township Technologically advanced facilities Excellent graduate outcomes A vibrant student life New state-of-the-art campus Monash University offers the following postgraduate courses: Master of Arts (Research) Master of Engineering Science (Research) Master of Science (Research) Master of Philosophy (MPhil) ACADEMIC AND RESEARCH STRENGTHS OF MONASH Monash University is world-renowned for its innovation and excellence in research and teaching. Monash researchers make important contributions that bring real and positive change to people all over the world. The Sunway campus has research strength in biotechnology, medicine and health, economic and business modelling, Islamic banking, electronic test technology, and agri-business. The Brain Research Institute at Monash Sunway (BRIMS) is an Associate School of Neuroscience of the French-based International Brain Research Organisation (IBRO). This status aids in its efforts to be the regional driver of neuroscience research and education development. Monash University’s School of Business is leading research in Islamic Banking and Finance, and is the organiser of a major annual conference on Islamic Banking and Finance in Kuala Lumpur. The School of Engineering has formed a number of partnerships with industry and other organisations for research. These range from FreeScale Semiconductor to Malaysia’s National Sports Institute, with whom research is being carried out on how to improve the performance of athletes. Researchers at the School of Science are also working on a number of major research projects, ranging from understanding how gum infections can lead to heart disease, to deepening our understanding of the body’s immune system. Various external funds are available to Monash researchers in Malaysia. They include the government’s Intensified Research in Priority Areas (IRPA) grants, the Ministry of Science, Technology and Innovation’s e-Science fund for research, the non-governmental International Service for the Acquisition of Agri-biotech Application (ISAAA) funding as well as research grants from Petronas and the TORAY Foundation. Collaboration in research is strongly encouraged between Sunway campus’ staff with other local institutions of higher learning and companies in Malaysia. SCHOLARSHIPS/RESEARCH FUND /PAID PLACEMENTS Monash University Sunway campus offers scholarships to our postgraduate students undertaking research-based postgraduate degrees on merit basis. There are 2 types of scholarships offered by the campus. One is known as the full scholarship and the other is tuition fee waiver only. The full scholarship amount are listed as below: Master’s studies – RM 48,000.00 per year for full-time studies PhD studies – RM 54,000.00 per year for full-time studies Note: The scholarship amount includes tuition fee (RM 30,000.00 per year) and cost of living expenses (RM 1,500.00 per month for master’s and RM 2,000.00 per month for PhD). Tuition fee waiver scholarships provide students with tuition fee waiver on their courses excluding cost of living expenses. LEARNING RESOURCES & FACILITIES Library and Learning Commons – A growing collection of over 60,000 items consisting of books, music and sound recordings, serials, together with 155 multimedia workstations including 28 in the training room and 11 express terminals. Apart from that it also has 4 group study rooms and a postgraduate study area with 12 workstations. Monash University has one of the world’s largest collections of electronic resources. With 800 online databases, students and full-time staff have access to over 300,000 e-books along with 75,000 e-journal titles that covers the full range of disciplines taught and researched at the university. At Monash, students have access to an array of facilities including labs for teaching and research sophisticated labs for research, a radio and TV studio, multimedia lab, journalism lab, two auditoriums capable of accommodating 350 people each, a 150-capacity plenary theatre, 3 medium-sized lecture theatres for 150 students and 6 smaller theatres for 120 students each and 22 tutorial rooms. In addition to the PCs in the Leaning commons, there are 10 computer labs for general use. Students also have access to wireless internet connectivity on campus. INSTITUTION’S INTERNATIONAL LINKS Monash University Sunway campus is one of 8 Monash campuses. There are six campuses in Australia and one in South Africa. The university also has a learning centre in Prato, Italy. USEFUL INFORMATION FOR INTERNATIONAL STUDENTS International students who wish to study at the Sunway campus must possess a valid student pass, or they will not be allowed to study in Malaysia. Please visit www.monash.edu.my/studying/admission.htm for more information. Before leaving their home country, our online pre-departure briefing is available to help prepare students for their arrival in Malaysia. Students will be informed on what to expect, airport reception service and what to bring to Malaysia. For more information please visit www.monash.edu.my/studying/pre-departure.htm. For other information, visit www.monash.edu.my/international. A degree with honours I (first-class honours) or IIA (upper secondclass honours) in the relevant research area. To meet the university’s English language requirements. A degree (average 60%) from a recognised tertiary institution. To meet the university’s English language requirements. A degree with honours I (first-class honours) or IIA (upper secondclass honours) in the relevant research area. The completion of the MSc Preliminary examination equivalent to I or IIA would be considered on a case-by-case basis. To meet the university’s English language requirements. A degree of bachelor’s with honours I (first-class honours), IIA (upper second-class honours); or have qualifications which in the opinion of the Monash Research Graduate School (MRGS) are equivalent or a satisfactory substitute. To meet the university’s English language requirements. Bachelor’s degree requiring at least four years of full-time study, and which normally includes a research component in the fourth year, leading to an honours degree class I (first-class honours) or class IIA (upper second-class honours) level; or A course leading to a master’s preliminary qualification at a level rated by the Monash Research Graduate School (MRGS) as equivalent to an honours class I or IIA degree; or A research master’s degree; or A master’s degree that entailed work, normally including a significant research component, at least equivalent to an honours degree. To meet the university’s English language requirements. HOW TO APPLY / APPLICATION PROCEDURE Prospective research candidates are expected to have identified a certain research area of interest prior to applying for candidature. Prospective candidates are required to discuss the proposed research project as well as availability of supervision and facility to conduct research with the School in which they are seeking candidature. For more information please visit http://www.monash.edu.my/Student-services/SA/Admissions/admission_application_next.htm. Monash is the first foreign university to open its campus in Malaysia upon the invitation by the Malaysian government. Among the recognition and achievements of Monash University Sunway campus are: – The School of Medicine and Health Sciences is the only one in Malaysia to be accredited by the Australian Medical Council. – In 2007, Monash was named Business of the Year by the Malaysian Australian Business Council. Monash University is a research intensive university and is committed to finding solutions for 21st century challenges such as climate change, water shortage and cancer. The University undertakes innovative, multidisciplinary research addressing national and international priorities. With campuses in three continents Monash pursues knowledge and solutions from a global perspective. Among the research achievements and accolades received are by being the pioneer in In Vitro Fertilisation (IVF) technology; helping to reduce the road toll through ground-breaking accident research through the Monash University Accident Research Centre (MUARC); as well as investigating ways to help the adult body repair and regenerate damaged tissues and organs by doing research on regenerative medicine. The Sunway campus is home to BRIMS which is the acronym for the Brain Research Institute at Monash Sunway. It is led by one of the world’s leading comparative neuroscientists Professor Ishwar Parhar. The areas of research conducted by BRIMS include Neurogenomics of Sleep Disorders, Molecular Mechanism of Depression, and Reproductive and Metabolic Neuroendocrinology. Jalan Lagoon Selatan, Bandar Sunway Tel : 603 - 5636 0600 Fax : 603 - 5514 60014 Email : Click here to email Website : http://www.monash.edu.my Mr. Danny Chan (Marketing Manager) View Profile of Institution here. For detailed listing of the courses available, click here. Communication & Broadcasting Science (Life Science/Physical Science/Applied Science) Engineering & Engineering Trades Featured Write Up Malaysian Providers of Postgraduate Qualification & Quality Assurance Why Many International Students Pursue Postgraduate Studies in Malaysia? Funding for Postgraduate Programmes Malaysian Government Scholarships for International Students 60-3, Jalan PJU 1/3B, Sunwaymas Commercial Centre, 47301 Petaling Jaya, Selangor, Malaysia. Tel: +603-7880 3837 Fax: +603-7880 7837 Email: [email protected]
cc/2019-30/en_head_0021.json.gz/line1730257
__label__wiki
0.549849
0.549849
Posted on July 16, 2000 September 23, 2006 by Martin If there’s a single image from this film that will stick with me, it’s Kevin Pollak’s expression whenever he’s on screen. If he’d turned to camera, shaken his head in despair, and said “what am I doing in this movie?” it would have seemed almost entirely in character. Now, I have nothing whatsoever against Arnold Schwartzenegger, but he’s not really an actor: he’s a Movie Star. Put him in a film that plays to his strengths, like True Lies, The Terminator or the much-maligned Kindergarten Cop, and he shines. Put him in a role that asks him to display a certain depth and range of emotion, like that of Jericho Cane, the tortured anti-hero of End Of Days, and he is little better than a plank. He can pull a suicidal grimace in the morning twilight of a shabby apartment, but as soon as he opens his mouth you just have to wince. His lines sound like he’s chewed them at least twice before choking, and regurgitating them–with difficulty. Arnie himself is the first, and biggest mistake this film makes. Kevin Pollak, who plays Chicago, Arnie’s sidekick, knows it, and you can read it on his face in every scene they share. Almost any current male lead you can think of could have injected more realism into Jericho’s character. Christine York, played by Robin Tunney (whom you may remember as the not-evil one from The Craft) is the only character who seems to be able to take him seriously. The second great flaw of the film is its script. Written by Andrew W. Marlowe, who did a fairly decent job on “Air Force One” a few years ago, it takes absolutely ages to go anywhere. The first forty-five minutes lazily set the scene: in the last days of 1999, the Devil takes the form of a man so that he can impregnate the chosen one (Christine), and thus bring about the “End Of Days.” Just how the end of the world will come about is never explained. Is a simple bout of demonic nookie enough to open the gates of Hell, or will we have to wait for the resulting offspring to wreak Damien-like havoc on us all? Who knows? Who cares? After this has been set up, the rest of the film consists mostly of a lot of running around with all parties concerned trying to find and snatch Christine from each other. All the parties are: (1) Jericho and Chicago, who work for a private security firm. They were on duty trying to protect a Wall Street Banker (whose body had been taken over by the Devil), when a rogue priest tried to assassinate him. Rather than just taking their danger bonus and letting the police handle things from there, they take it upon themselves to figure out what’s going on. (2) The Devil, played by Gabriel Byrne with about as much menace as a pop tart. (3) The Bad clergy, who want to kill Christine before she can have it off with the Devil. (4) The Good clergy, led by Father Kovac (Rod Steiger), who want to take Christine in and protect her until the whole thing blows over. Any story involving supernatural beings has to be careful in plausibly restricting the powers that these beings have access to. End of Days falls woefully short in this regard: the Devil can apparently possess any body at will, but he chooses one with no straightforward access to Christine. He can raise bodies from the dead, but he can’t force or torture Jericho into revealing Christine’s location. The Devil only gets this opportunity to destroy the world once every thousand years, so why didn’t he plan the whole thing out more carefully? Oh, well, better luck in 2999. Believable, no. Exciting, not really. Tense, only occasionally. Humorous, yes, but unintentionally so. There are some decent special effects (the sex scene is eerily impressive), but with the bulk of the film shot in almost pitch darkness, it’s hard to pick them out. It’s got high production values, but that’s just not enough to save a film. Director Peter Hyams can do, and has done, a lot better than this (Outland, Capricorn One and Running Scared are a couple of excellent examples), but on the other hand, his career is littered with some amazing turkeys (Stay Tuned and Sudden Death immediately spring to mind). Unfortunately, End Of Days belongs in the latter category. CategoriesReviews Previous PostPrevious Slow news week Next PostNext Gomez – Liquid Skin
cc/2019-30/en_head_0021.json.gz/line1730258
__label__wiki
0.841748
0.841748
Lupita Nyong’o Might Be Starring in ‘Black Panther.’ by superselected · black panther, Film, Film-News, Lupita Nyong'o · 12 May 2016 Just weeks after writing an online essay, defending her career choices, Lupita Nyong’o is officially killing it. According to recent reports, Nyong’o is in talks to star in the upcoming Ryan Coogler-helmed film, Black Panther. The Marvel Studios production, stars Chadwick Boseman and is expected to hit theaters in early 2018. Boseman will play T’Challa, the warrior king of Wakanda, a fictional African nation created by Marvel. Production on the film is set to start in 2017. While her character remains unknown, Nyong’o will likely play one of T’Challa’s love interests. As We Are Wakanda notes, the possibilities include Malaika, a fellow Wakandan, singer Monica Lynne, and Monica Rambeau. Lynne seems like the ideal choice, since it was the longest and most intense relationship, but Rambeau would open up more opportunities for other film tie-ins. Lupita Nyong’o most recently played the alien Maz Kanata in Star Wars: The Force Awakens and voiced the character Raksha, a wolf, in The Jungle Book. She also stars in the Disney production Queen of Katwe, which hits theaters in September and is set to star in the upcoming sci-fi production Intelligent Life, which is expected to begin production this summer. Lupita Nyong'o Black Panther Lupita Nyong'o Fashion Lupita Nyong'o Movie Roles 2016 Lupita Nyong'o New Film Roles Lupita Nyong’o Covers PORTER Magazine. Images by Paola Kudacki. Lupita Nyong’o Covers ANOTHER Magazine Spring/Summer 2019. Images by Willy Vanderperre. Lupita Nyong’o Covers Marie Claire March 2019. Images by Daria Kobayashi Ritch.
cc/2019-30/en_head_0021.json.gz/line1730259
__label__wiki
0.651445
0.651445
Jaguar I-PACE named ‘Electric Classic of the Future’ The Jaguar I-PACE has added another accolade to its already burgeoning trophy case, as Motor Klassik named it ‘Electric Classic Car of the Future’. More than 16,600 readers of the German automotive magazine voted the I-PACE as an electric vehicle with the potential to be coveted as a classic car in 30 years' time. The awards handed out on the eve of the Techno Classica motor show in Essen, as the jury recognised the all-electric SUV as a game-changer, and since its launch in March 2018 the I-PACE has collected 62 accolades. These include World, European, German, Norwegian, UK, and Scottish Car of the Year, World Design Car of the Year, BBC TopGear magazine EV of the Year, China Green Car of the Year, and Autobest’s ECOBEST Award. There was also more success on the night for Jaguar, as its XJ220 supercar came second in the Classics of the 1990s category.
cc/2019-30/en_head_0021.json.gz/line1730263
__label__wiki
0.642151
0.642151
Tonight I had the opportunity to watch the first three episodes of Life Unexpected, courtesy of the The CW, which sent me an advanced copy. The show centers around 15-year-old Lux (which is why the show was formerly known as Life UneXpected), a young girl who is seeking emancipation after spending her life being bounced around foster homes. Since she was never adopted, she needs the signature of her birth parents and sets out to find them. She does (in seemingly record time, mind you) and both are understandably shocked. All three are then thrown for a loop when the judge, instead of granting emancipation, makes Lux’s parents temporary co-guardians. For months critics have been raving about the show, saying it is reminsicent of The WB, where substance and heart were favored over style and shock. They were right. Life Unexpected has the wit of Gilmore Girls and the emotional complexity of Everwood. Less than 20 minutes into the first episode, tears were already welling up in my eyes. I was moved several times, in fact, but also giggled and chuckled a ton, too. That’s not to say there aren’t any cliches or weak points but as we know from watching the teen dramas, those are to be expected. It’s not surprising executive producer/writer Liz Tigelaar started out working for Dawson’s Creek and it seems she learned well. Shiri Appleby (Rene, Beverly Hills 90210) stars as Lux’s mother, who is in a romantic relationship with her radio show co-host, played by Kerr Smith (Jack, Dawson’s Creek). It was hard at first to see Appleby as a mom but perhaps that is the point: her character Cate is only 32 years old, making her a teenager when she got pregnant with Lux. Smith, who has thankfully dyed the grey out of his hair, is definitely in a supporting role, one whose future on the show I question despite the press materials. He’s included as if he’s here for the long-haul but it seems to me that Cate and her babydaddy Nate, played by Kristoffer Polaha, are destined for each other in the end. It’s also worth noting that this will be the third show on The CW right now with a main character called Nate. Lux reminded me of One Tree Hill’s Sam (Ashley Rickards), the foster child Brooke (Sophia Bush) takes in in season 6. The two characters may not look alike but their personalities are strikingly similar. Cate has shades of Brooke as well and at times the plot felt very familiar. But that doesn’t mean it wasn’t worth watching. The three episodes held my attention throughout and I’m eager to see what other angles of this story–which easily could’ve been depicted entirely in a 2-hour movie–are explored throughout the season. I highly encourage you to tune in on January 18, when Life Unexpected premieres after the new episode of One Tree Hill. I’m honestly worried about the ratings the show will get both that night and in the weeks to come since, as I mentioned above, this show sooooo isn’t a CW show. While I personally think that’s a good thing, other viewers may not. Here’s hoping there’s enough people out there clamoring for the days and ways of the WB. I have to note, though, that Life Unexpected won’t be covered extensively on this site since it is not a teen drama. I will continue to include it as I have thus far: when there’s something relevant to Smith or Appleby or some other teen drama connection. But, again, I really hope you’ll watch it. Tags: Ashley Rickards, Beverly Hills 90210, Brooke, Cate, Dawson's Creek, Everwood, Gilmore Girls, Jack, Kerr Smith, Kristoffer Polaha, Life UneXpected, Liz Tigelaar, LUX, Nate, One Tree Hill, Rene, Sam, Shiri Appleby, Sophia Bush, The CW, The WB Categories : Beverly Hills 90210, Dawson's Creek, One Tree Hill News Roundup: One Tree Hill, 90210 and Gossip Girl Zap2it, Fancast and The TV Addict have interviews with James Lafferty (Nathan, One Tree Hill). Lafferty also did one with JustJared. I’m going to throw up now. Relate Magazine has a feature on Ashley Rickards (Sam, One Tree Hill). Daphne Zuniga (Victoria, One Tree Hill) will be on tomorrow’s episode of Melrose Place. According to OneTreeHillBlog.com, Barbara Alyn Woods (Deb, One Tree Hill) will appear on Desperate Housewives. Fancast also has some spoilish info on a new 90210 casting, related to Teddy (Trevor Donovan, 90210). TVGuide.com has a spoilish interview with Gillian Zinser (Ivy, 90210). 90210, as well as the other shows, again did well in the DVR ratings. Victoria Beckham will reportedly appear on Gossip Girl. Penn Badgley (Dan, Gossip Girl) is on the cover of the November issue of Men’s Health. The New York Times spent a night out with Badgley. MTV has a short semi-spoilish interview with Leighton Meester (Blair, Gossip Girl). Entertainment Weekly is asking “which Gossip Girl cast member is picking the best movies?” Kristen Bell (Gossip Girl, Gossip Girl) spoke with USA Today about doing voiceover work. Tags: 90210, Ashley Rickards, Barbara Alyn Woods, Blair, Dan, Daphne Zuniga, Deb, Desperate Housewives, Entertainment Weekly, Fancast, Gillian Zinser, Gossip Girl, Ivy, James Lafferty, JustJared, Leighton Meester, Melrose Place, Men's Health, MTV, Nathan, One Tree Hill, OneTreeHillBlog.com, Penn Badgley, Relate Magazine, Sam, Teddy, The New York Times, Trevor Donovan, TVGuide.com, USA Today, Victoria, Victoria Beckham, Zap2it Categories : 90210, Gossip Girl, One Tree Hill Exclusive: Austin Nichols Wants Brulian To Get Married! In just one season, Austin Nichols’ Julian had quite the evolution on One Tree Hill. When he first showed up, fans worried he’d play homewrecker to Leyton’s finally-back-on relationship. Instead we ended up with perhaps the most dedicated boyfriend Sophia Bush’s Brooke has ever seen and a new leading man for the show’s seventh season. TeenDramaWhore: What was your reaction when you found out you were being promoted to a series regular? Austin Nichols: Fear. To be perfectly honest, I didn’t want to do it. The thing about a television series is that you have to have faith that the material is going to be good. Because all you know is episode 1. You have no idea what episode 2-22 will contain. But after many conversations with my captain Mark Schwahn, I felt better about signing up. TDW: Why do you think the audience has taken such a liking to Brooke and Julian? Nichols: Because when we look at each other, volcanoes erupt, the earth quakes, and glitter falls from the sky. TDW: I know I was particularly touched by Julian’s closeness with Sam (Ashley Rickards). Do you want to see him and Brooke have a family? Nichols: Children!!! Absolutely. I want a litter. A whole team of little Brookes and Julians. Twins. Black ones. White ones. Brown and yellow too. Remember the show, JUST THE TEN OF US? We are going to remake that show with Brooke and Julian and their 8 kids. TDW: Is there any storyline you’d like to see Julian face? Nichols: I would like to tackle marriage. The aforementioned children. And I want to see Julian make a movie. I think it would be outstanding to make a short film and release it on the internet. A film by Julian Baker. Or by Austin Nichols. TDW: With the return of Julian’s dad [Episode 7.02, What Are You Willing To Lose], will we learn more about Julian’s past? Nichols: Well, absolutely. The most brilliant thing they could do when writing the third INDIANA JONES: The Last Crusade, was introduce Indy’s father. That glimpse into Indy’s past and to see how his behavior changes around his dad is revelatory. A guy who could have any woman, any artifact, and defeat any foe, becomes a little boy in the presence of Sean Connery. Families with checkered pasts tend to spend the present repairing that damage. TDW: What’s one thing that’s easy about working on a show like OTH and one thing that’s difficult? Nichols: Easy: no traffic here. Hard: living without In-N-Out Burger. TDW: You’re signed on to star in Pedestrian, which is being made by Hilarie Burton’s company, Southern Gothic Productions. What’s it like working with her in a non-OTH capacity? Nichols: PEDESTRIAN is a great script. And Lincoln Booth is one of those characters that doesn’t come around all that often. Working with Hilarie is a piece of cake. She is sharp and quick and a great leader. TDW: Tell me more about your character, Lincoln Booth. What attracted you to the role? Nichols: I can’t really say anything about my character except that something deep inside me started to rumble when I read him. This is either a really good sign or a disaster. We shall see!!!! 🙂 TDW: You have a creative writing degree and were an avid water-skier growing up. Are these two things still a part of your life? Nichols: I am constantly writing. Some ideas soar. And others crash. Right now, it’s a story of a young woman who finds herself pregnant with no money and no one to depend on. She moves out to the desert to start over. I occasionally jump on some skis and do a few flips. Don’t want to forget how. But my mom [Kay Nichols] just won her 15th national title, after beating cancer a few years back. TDW: You also have a big interest in film. What’s one mainstream movie and one lesser-known movie you’ve seen recently? Nichols: 500 Days of Summer is very creative. Right up my alley. Also, in the video store scene, they placed one of my DVDs right in the middle of the two actors. I was delighted. Haha!! Humpday was very interesting. Anvil! The Story Of Anvil is a brilliant rock doc. I enjoyed many parts of Inglourius Basterds. Christopher Waltz should have statues built in tribute to his performance. TDW: Have you thought about getting an official Twitter account? Nichols: Twitter? What’s twitter? Sounds like a term for a titty twister. 🙂 Be sure to come back next Sunday for another exclusive interview, this time in honor of Beverly Hills 90210’s 19th anniversary. Complete TDW Interview Index Tags: 500 Days of Summer, Anvil! The Story of Anvil, Ashley Rickards, Austin Nichols, Brooke, Christopher Waltz, Hilarie Burton, Humpday, In-N-Out Burger, Indiana Jones: The Last Crusade, Inglourious Basterds, Julian, Julian Baker, Just The Ten Of Us, Kay Nichols, Leyton, Lincoln Booth, Mark Schwahn, One Tree Hill, Pedestrian, Sam, Sean Connery, Sophia Bush, Southern Gothic Productions, Twitter, What Are You Willing to Lose Did you know many characters on our teen dramas have the same names? Keep reading for tons of examples: David: a main character on Beverly Hills 90210, and Jack’s boyfriend on Dawson’s Creek Scott: a main character on Beverly Hills 90210 and a last name on One Tree Hill Matt: a main character on Beverly Hills 90210, Joey’s mural-wrecker on Dawson’s Creek and Sandy’s partner on The O.C. Zach: Carly’s son on Beverly Hills 90210 and Summer’s boyfriend on The O.C. Nikki/Nicki: Brandon’s girlfriend on Beverly Hills 90210, Dawson’s classmate on Dawson’s Creek and Jake’s babymama on One Tree Hill Samantha/Sam: Steve’s mom on Beverly Hills 90210 and Brooke’s “foster kid” on One Tree Hill Abby: Valerie’s mom on Beverly Hills 90210, Jen’s friend on Dawson’s Creek and the witness to Keith’s murder on One Tree Hill Emma: Brandon’s cheatee on Beverly Hills 90210 and Pacey & Jack’s roommate on Dawson’s Creek Henry: Brandon’s boss on Beverly Hills 90210 and Jen’s boyfriend on Dawson’s Creek Tracy: Brandon’s girlfriend on Beverly Hills 90210 and Naomi’s mom on 90210 Cliff: Donna’s suitor on Beverly Hills 90210 and Dawson’s classmate on Dawson’s Creek Sophie: David’s girlfriend on Beverly Hills 90210 and Sandy’s mom on The O.C. Lauren: Matt’s wife on Beverly Hills 90210 and Jamie’s teacher on One Tree Hill Allison/Alison: Kelly’s fellow fire victim on Beverly Hills 90210 and Dan/Jenny’s mom on Gossip Girl Elle: the transvestite on Beverly Hills 90210 and Chuck’s mystery woman on Gossip Girl Jen: a main character on Dawson’s Creek and Naomi’s sister on 90210 Jack: a main character on Dawson’s Creek, Dylan’s dad on Beverly Hills 90210 and Chuck’s uncle on Gossip Girl Oliver: Dawson’s film partner on Dawson’s Creek and Marissa’s friend/suitor on The O.C. Alex: Pacey’s boss on Dawson’s Creek and Seth/Marissa’s girlfriend on The O.C. Eddie: Joey’s boyfriend on Dawson’s Creek and Theresa’s boyfriend on The O.C. Ty: Jen’s boyfriend on Dawson’s Creek and Adrianna’s babydaddy on 90210 Ryan: a main character on The O.C. and 90210, and Steve’s brother on Beverly Hills 90210 Taylor: a main character on The O.C. and Haley’s sister on One Tree Hill Jimmy: a main character on The O.C. and Mouth/Lucas’ friend on One Tree Hill Anna: Seth’s girlfriend on The O.C. and Lucas’ girlfriend on One Tree Hill Carter: Kirsten’s business partner on The O.C. and everyone’s frenemy on Gossip Girl Lindsay/Lindsey: Ryan’s girlfriend on The O.C. and Lucas’ girlfriend on The O.C. Theresa: Ryan’s girlfriend on The O.C. and the gang’s classmate/friend on One Tree Hill Lucas/Luke: a main chacter on One Tree Hill and Marissa’s boyfriend on The O.C. Nathan/Nate: a main character on One Tree Hill and Gossip Girl Haley/Hailey: a main character on One Tree Hill and Kirsten’s sister on The O.C. Dan: a main character on One Tree Hill and Gossip Girl, and Andrea’s boyfriend on Beverly Hills 90210 Keith: a main character on One Tree Hill and Steve’s fraternity brother on Beverly Hills 90210 Karen: a main character on One Tree Hill and Pacey’s co-worker on Dawson’s Creek Deb/Debbie: a main character on One Tree Hill and 90210 Rachel: a main character on One Tree Hill, Sandy’s colleague on The O.C. and Serena/Blair’s teacher on Gossip Girl Cooper: Nathan’s uncle on One Tree Hill and a last name on The O.C. Chuck: a main character on Gossip Girl and Jamie’s classmate on One Tree Hill Jenny: a main character on Gossip Girl and Jake’s daughter on One Tree Hill Lily: a main character on Gossip Girl, Dawson’s sister on Dawson’s Creek and Lucas’ sister on One Tree Hill Ethan: a main character on 90210 and Jack’s boyfriend on Dawson’s Creek Dixon: a main character on 90210 and Lucas’ director on One Tree Hill Tags: 90210, Abby, Adrianna, Alex, Alison, Allison, Beverly Hills 90210, Blair, Brandon, Brooke, Carly, Chuck, Cliff, Cooper, Dan, David, Dawson's Creek, Deb, Debbie, Dixon, Donna, Dylan, Eddie, Elle, Emma, Ethan, Gossip Girl, Hailey, Haley, Henry, Jack, Jake, Jamie, Jen, Jennie, Jenny, Jimmy, Joey, Keith, Kelly, Lily, Lindsey/Lindsay, Lucas, Luke, Marissa, Matt, Mouth, Naomi, Nate, Nathan, Oliver, One Tree Hill, Pacey, Rachel, Sam, Samantha, Sandy, Scott, Serena, Seth, Sophie, Steve, Summer, Taylor, The O.C, Theresa, Tracy, Ty, Valerie, Zach, Zack News Roundup: 90210, One Tree Hill, Gossip Girl and More 90210 dropped last night from 2.4 million viewers to 2.2 million. Shenae Grimes (Annie, 90210) and Jessica Stroup (Silver, 90210) will be on The Jay Leno Show tonight. Celebrity deejay Samantha Ronson will guest-star on 90210, alongside Pharrell and N.E.R.D. Beverly Hills 90210 gets a shout-out in this TVGuide.com photo gallery on memorable TV spin-offs. Eastwick, starring Lindsay Price (Janet, Beverly Hills 90210) premieres tonight on ABC. The CW Source has podcasts for the One Tree Hill and Gossip Girl premieres, and another old-school OTH one. As expected, One Tree Hill has been picked up for a full season, according to their official Twitter account. Kudos to OneTreeHillWeb.net for reminding me that today is One Tree Hill’s sixth anniversary! My Jack Savoretti-One Tree Hill contest ends tonight. Alloy has an interview with Ashley Rickards (Sam, One Tree Hill). Hilarie Burton (Peyton, One Tree Hill) is featured in the new SoGoPro podcast. Talking Gossip has a new podcast for last night’s Gossip Girl. PEOPLE.com tells you how to copy the hairstyle Blake Lively (Serena, Gossip Girl) had at the Emmys. Taylor Momsen (Jenny, Gossip Girl) helped launch the Clinique-Teen Vogue Fresh Faces Tour. Mercy, starring Michelle Trachtenberg (Georgina, Gossip Girl), premieres tonight on NBC. Ask Ausiello doesn’t have any TD spoilers this week but it does have some stuff on Benjamin McKenzie (Ryan, The O.C.) Melissa Rosenberg, a former executive producer for The O.C., said working on the show got her her current gig as writing for the Twilight movies. MTV has an interview with Cam Gigandet (Volchok, The O.C.). An article on Glee discusses the Dawson’s Creek episode where Jack (Kerr Smith) comes out to his father. Cougar Town, co-starring Busy Philipps (Audrey, Dawson’s Creek), debuts tonight on ABC. Tags: 90210, ABC, Alloy, Ashley Rickards, Ask Ausiello, Audrey, Benjamin McKenzie, Beverly Hills 90210, Blake Lively, Busy Philipps, Cam Gigandet, Clinique, Cougar Town, Dawson's Creek, Eastwick, Emmys, Fresh Faces Tour, Georgina, Glee, Gossip Girl, Hilarie Burton, Jack, Jack Savoretti, Janet, Jenny, Kerr Smith, Lindsay Price, Melissa Rosenberg, Mercy, Michelle Trachtenberg, MTV, N.E.R.D., NBC, One Tree Hill, OneTreeHillWeb.net, OTH, PEOPLE.com, Peyton, Pharrell, Ryan, Sam, Samantha Ronson, Serena, SoGoPro, Taylor Momsen, Teen Vogue, The CW Source, The O.C, TVGuide.com, Twilight, Twitter, Volchok Get Ready for One Tree Hill Season 7! We’re days away from One Tree Hill’s season 7 premiere! Here’s what you need to know about last season: After season 5 ended with a massive cliff-hanger–which girl did Lucas ask to marry him?–it is revealed that Peyton is the one Luke called and they travel to Las Vegas to get married. Realizing they want their friends and family to witness the nuptials, Leyton returns to Tree Hill where they move in together. A few months later, Peyton finds out she’s pregnant but soon suffers complications. The duo decide to follow the motto of carpe diem and pull-off a last-minute wedding. The wedding night takes a disastrous turn when Peyton suffers yet another pregnancy complication but it leads to the birth of the beautiful and healthy Sawyer Brooke Scott. We last see a happy Leyton and baby Sawyer driving in The Comet.. Earlier in the season, Lucas is ecstatic when he finds out An Unkindness of Ravens will be made into a movie. He’s thrown for a loop, however, when the producer ends up being Peyton’s ex, Julian Baker. Julian decides not to cause any trouble with Leyton and instead works peacefully with Lucas on the film. After finding a director and casting the lead roles, the film is shut down. Peyton finds out who her birth father is but is unable to forge a relationship with him. She continues to work with Mia (who starts dating Brooke’s ex, Chase) on her music career, and helps Haley resume hers. Brooke gets off to a bumpy start when she is assualted one night at Clothes Over Bros. Convinced her mother is responsible for the attack, the two drift further apart. Brooke’s faith in herself and humanity is restored when she takes in Sam, one of Haley’s troubled young students. The two adjust to living together and develop a mother-daughter dynamic, which comes to an end when Sam decides to live with her birth mother. Throughout this, Brooke continues to find happiness in her love life. She rejects Owen when he comes back to town, and reluctantly starts a relationship with Julian. Despite his efforts to convince her how much he loves her, Brooke is apprehensive to commit. In the finale, she mends her relationship with her mother and ultimately decides Julian is one the for her and goes to him to declare her love. Haley, Nathan and Jamie find life as they know it disrupted when Quentin–Haley’s student, Nathan’s motivator and Jamie’s role model–is murdered. Haley is fired from her job as a teacher at Tree Hill High after she refuses to censor one of Sam’s essays. Nathan, in an effort to make his way back to the NBA, plays Slamball before realizing it is too dangerous for him. He joins a minor league team and, in the finale, is called up to the NBA as a member of the Charlotte Bobcats. Jamie’s growing pains include dealing a school bully and his first crush, finding out the truth about Grandpa Dan’s past and being nearly kidnapped by Nanny Carrie (again). Dan faces struggles in almost every aspect of his life: he’s kidnapped and tortured by Nanny Carrie, his sons still refuse to have anything to do with him and his heart conditions worse. Add on an explosive confrontation with ex-wife Deb, and it makes for one trying year in the life of Dan Scott. Speaking of Deb, she breaks up with Skills who takes it badly and first but rebounds with Jamie’s teacher, Miss Lauren. Mouth and Millicent take a big step and move in together, but their relationship progress is thrawted when Gigi coms back to town and tries to get with Mouth. After some time apart, Mouth is able to win Millicent back and they resume their relationship. The season ends with everyone (except for Dan, perhaps) in a state of happiness and satisfaction. Come back tomorrow for an exclusive One Tree Hill interview and come back Monday night at 8pm eastern for a live-blog of the season 7 premiere! Tags: An Unkindness of Ravens, Brooke, Charlotte Bobcats, Chase, Deb, Haley, Julian, Leyton, Lucas, Mia, Millicent, Miss Lauren, Mouth, Nanny Carrie, Nathan, NBA, One Tree Hill, Owen, Peyton, Quentin, Sam, Sawyer, Skills, The Comet
cc/2019-30/en_head_0021.json.gz/line1730264
__label__cc
0.524308
0.475692
Vaping Boom as Users Predicted to Rise to 55m Worldwide Vaping Boom as Users Predicted to Rise to 55m Around the World There are millions of vapers in the United States and around the world, but that’s nothing compared to what’s forecast for the coming years. According to a new prediction by marketing research firm Euromonitor International, the number of people using e-cigarettes and other vaping devices is expected to rise to an enormous 55 million by 2021. While it’s still a small number compared to the amount of smokers globally, estimated at 1.1 billion people, the forecast, if it comes true, shows that vaping is on a seemingly unstoppable upward trajectory. That being said, the number of smokers around the world is falling, with new data from the World Health Organization earlier this year showing that there are now 29 million fewer smokers around the globe. Most of those stubbing out are in wealthier nations, while many in poorer or less-developed countries continue to puff away and put their health at risk. Peculiarly, governments and health authorities in a growing number of Western nations are supporting e-cigarettes as a way to get people off deadly smoking, while many developing nations with large smoking populations have banned vaping entirely — despite at the same time permitting widescale advertising of cigarette products. Tobacco, as we now know, kills half its users and leads to around 7 million deaths around the world each year, nearly 1 million of whom are not smokers, but inhale secondhand smoke and go on to develop smoking-related diseases. A Big Switch to Vaping Countries such as the UK and New Zealand have declared plans to go smoke free in the coming years as they seek to encourage people who are currently smoking to stop. One way they’re doing this is by running public health and other campaigns suggesting that smokers switch to using an e-cigarette instead of lighting up. The National Health Service in Britain says: “E-cigarettes are particularly effective when combined with support from local stop-smoking services — people who choose this route have some of the highest quitting success rates.” You may also like: Heated Tobacco Not Safer: FDA Panel E-cigarettes and other vape gear are easily available at a good vape shop — either online or a physical store — and they’re also more affordable than expensive cigarettes. The attraction for smokers seeking their nicotine hit is that e-cigs and the e-liquid they contain come in varying levels of nicotine, as well as in multiple flavors, but without any of the many thousands of toxic chemicals that are found in burning tobacco. According to the new figures from Euromonitor, vapers worldwide have risen from 7 million in 2011 to 35 million in 2016, and will reach 55 million within the next three years. As to where people are getting their vape supplies, a separate study has found that most are buying e-cigarettes from specialists shops — both physical and online — followed by supermarkets, traditional tobacconists, kiosks in shopping malls, and pharmacies. Others are getting their e-cigs from newsagents, bars, gas stations and other retail outlets. A Growing Market All this is propelling the vaping industry upwards, and now the biggest markets for e-cigarettes and related vaping products are the United States, Japan and the United Kingdom. Consumers in these three countries collectively spent $16.3bn on smokeless tobacco and vaping products in 2016, Euromonitor says. Other research, meanwhile, says that globally the vape market will be worth $32.1 billion by 2021. This comes as the Centre for Disease Control and Prevention released a new report showing that smoking levels among high school students have fallen off in recent years. “Among middle school students, current use of any tobacco product decreased from 7.5% (0.87 million) in 2011 to 5.6% (0.67 million) in 2017 … Since 2014, e-cigarettes have been the most commonly used tobacco product among both middle and high school students,” it says. You may also like: Countries Promoting E-Cigarettes in Bid to Go Smoke-Free The most popular type of vaping gear was open-system vaping, rather than closed-vaping, the Euromonitor survey found. These devices feature a removable mouthpiece, allowing users to refill their e-cigarette with e-liquid manually. Vape Firms Allowed to Promote Health Benefits of Vaping in UK FDA’s Latest Move Raises Questions World’s Biggest Tobacco Company Wants Smokers to Quit (and Vape Instead) PREVIOUS POST Previous post: Switching from One E-Liquid to Another, Made Easy! NEXT POST Next post: Augvape V200 Mod – Start your Engines [Review]
cc/2019-30/en_head_0021.json.gz/line1730266
__label__wiki
0.631928
0.631928
Video Breakdown of Atlas Shrugged Some of you may recall how a few months back, I posted a video from Mr. Jack Collins that provided a breakdown of Ray Bradbury’s Fahrenheit 451. As it turns out, that video was just the tip of the iceberg for what he and others are doing over at Academic Earth, a website dedicated to media literacy and education in an age of evolving technology. So far, I’ve found several items of interest, but this other video breakdown of another dystopian classic – Ayn Rand’s Atlas Shrugged – was especially eye-catching. Here, Collins breaks down the books plot, themes, characters and message with the same thoroughness and incisive commentary that he brought to Bradbury’s classic tale of a society base on censorship and mindless leisure. Of note is how Rand’s philosophy of Objectivism – which combines individualism, freedom and self-interest – is unapologetically portrayed in this book. Having witnessed the horrors of Soviet Communism firsthand, she had a good deal to say about a society that promoted social equality at the expense of creativity, enterprise and personal merit. Rand’s book has often been criticized as “hateful” and the perfect example of class-antagonism, but to conservative thinkers and fans of dystopia alike, it remains a classic. Years later, Atlas Shrugged remains a controversial story, due to its stern and at times vitriolic attack on what Rand saw as systems that promoted mediocrity in the name of “social justice”. In contrast to the idea that the wealthy have a social obligation to those less fortunate than themselves, Rand retorts by stating that those with wealth exist by their own merits and are essentially holding up the needy, poor, and working classes of society – a la Atlas. By urging these people to “shrug” off this burden, Rand was rejecting the idea that the social classes owe each other anything and claimed that society would be made better by enshrining the ideal of self-interest and unfettered rewards for individual effort. And as Mr. Collins notes, by story’s end, it was… for some people. In short, there’s a reason people like Glenn Beck, Michelle Malkin, Sean Hannity and Rupert Murdoch love this book and its author. Nothing says “go capitalism” or promotes Cold War-era ideology like a Russian emigre who thinks that the free market is the pinnacle of civilization and things like charity, welfare, and social assistance are crutches that need to be kicked out. I’m biased, I know. But then again, so was Rand… And as usual, I’m looking forward to using this somewhere down the line, should this book ever appear on my student’s reading list. Check out the full video at the link below: academicearth.org/electives/tldr-atlas-shrugged/ By storiesbywilliamsin Authors, Books, Video July 8, 2013 447 Words5 Comments GOT gets the Simpson’s Treatment You know a TV show has made it big when someone decides to go ahead and render its characters as Simpson caricatures. And now it seems that Game of Thrones has made that list! Created by artist Adrien Noterdaem for the Draw the Simpsons Tumblr, this latest GOT mashup is making the rounds on the internet and proving quite popular. In addition to applying some several key character features to the GOT cast – such as Tywin Lannister having Mr. Burns signature beak and evil finger tent – you have Tyrion looking like a Bart Simpson knock-off (young and mischievous-eyed), Samwell’s pudgy frame reminding one of Chief Wiggum, and Daenery’s face looking very similar to Lisa. And is it me, or does Sandor’s face remind you of Homer Simpson? And just to add a little extra ba-zinga to this parody, Adrien also provided an artists renditions of Mr. George RR Martin himself. The authors pudgy, furry frame is already well known to fans of the novels and miniseries, and it would be just wrong if he didn’t get to stand in here with his creations. Hope this and other bits of fan-made paraphernalia keep people entertained until the season 4 comes out. No word yet on when that will be, but I’m sure we can expected another looooong wait! Source: IO9 By storiesbywilliamsin Artwork, Books, Fantasy July 8, 2013 July 8, 2013 220 Words1 Comment Video Breakdown of Fahrenheit 451 Hello all, and welcome to another glorious Friday! I feel fortunate today, due largely to the fact that yet another person who is dedicated to media literacy, science fiction, books and issues has chosen to get in contact with me and asked to be featured on this site. It’s always good to hear from people and know that what you are doing is garnering attention. But when they ask permission to share their message in your forum, well that’s just the bee’s knees! Apparently. it was my tribute to Ray Bradbury which got this particular gentleman’s attention, and for good reason too. Through a site known as Academic Earth, where one can create and post educational videos on a variety of subject, Mr. Jack Collins created a video breakdown of Fahrenheit 451 that was both educational and insightful. In his brief but poignant segment, he takes a look at the major plot points, themes and motifs of Bradbury’s enduring classic. To quote from his description of the video: Ray Bradbury wrote his dystopian classic Fahrenheit 451 at the height of McCarthyism and Cold War paranoia. In the novel, Guy Montag is employed as a fireman who burns books. The whole of American society has descended into a zombie-like stupor of instant gratification, and books are seen as challenging and disruptive relics, which must be destroyed at any cost. Today, with the increasing proliferation of surveillance equipment in American cities, the spread of digital books and the decline of attention spans the world over, Fahrenheit 451 remains a startlingly relevant work of fiction today. Watch this video and be instantly gratified (irony alert) with your knowledge of Bradbury’s most famous novel. Trust me when I say it’s a fine educational short, one which I would definitely use if and when I got the chance to teach this novel. And after watching it, I couldn’t help but reflect upon a certain irony. More and more today, educators find themselves taking advantage of new media and video breakdowns in order to help students make sense of complex subject matter and lengthy texts. A few decades ago, they would simply be expected to read it, internalize it, and report on what they read. One could easily argue that all this sort of trend really is a part of our society’s growing preoccupation with sound bites and easy accessibility. But then again, in our quest to maintain attention spans and promote thoughtfulness, we’d be fools to not take advantage of the very technology that is making it quicker and easier for people to do the opposite in the first place. Enjoy the video! As you can tell, it got me thinking, and that’s not always the easiest thing for someone else to do 😉 Check out the video by following the link below, and be sure to comment! academicearth.org/electives/tldr-fahrenheit-451/ By storiesbywilliamsin Books, Sci-Fi, Video June 7, 2013 June 8, 2013 474 Words9 Comments Game of Thrones – Season 3, Episode 7 Welcome back to more of the third season of Game of Thrones! As we have now passed the seventh episode in this season, we are fast coming up on the finale of season three and another long wait as they prep for season four. Yes, the show has been renewed for another season, but is anyone surprised at all? The ratings for this season have broken several records, and HBO can be expected to ride this high for as long as they can. In addition, I should note that recently it was revealed that this season was in fact just the first half of A Storm of Swords, the third book in the A Song of Ice and Fire Series. Initially, I was curious how they intended to cram all the material from that book in ten episodes, especially at the pace they were setting. However, breaking it into an even twenty episodes would seem like the perfect solution, given all the material that remains and the climaxes that still need to happen. Anyway, onto this weeks show! Last week, John and Wildlings managed to scale the Wall and were on the way to Castle Black. Robb and his kinsmen, wife and mother were on their way to the Twins for a wedding, the Tyrells and Lannisters where scheing, Sana was betrothed to Tyrion, Petyr and Arys were plotting, Arya was wandering, and Jaime and Brienne were about to be forcibly separated. Which brings us to the latest episode, also known as… The Bear and the Maiden Fair: The episode opens with John and the Wildings making their way towards Castle Black. As they go, both John and Ygritte are made aware that Orell, one of the skinchangers in Mance’s service, doesn’t approve of their little tryst. He tells John he won’t be able to hang onto her, and warns Ygritte that John is not one of them. That does not stop Ygritte from admitting she loves him though. As they continue, John tries to tell Ygritte that the Wildlings don’t have a hope of winning and that he fears she and her kin will die. But of course, she does not listen, and they come together and promise to live before they die, together. Not far away, Bran and the Reeds keep moving north, and the going is tough as Osha continues to suspect them of black magic. Jojen reveals at last that they are moving beyond Castle Black to seek the “three-eyed Raven” beyond the Wall. Osha is afraid, since she has seen what happens where the Others strike, and does not want to go back. In King’s Landing, Sansa and Maergery talk of their upcoming nuptials and Maergery continues to console her. During their talk, Maergery intimates that he is not a virgin, and much more worldly than she let’s on (as if we didn’t know already!) Joffrey meanwhile confronts his uncle Tywin about the fact that he is holding Council meetings without him and demands details. Unfortunately, he finds his uncle much harder to bully than the others and even appears afraid of him. On their way to The Twins, Robb and his company are stalled by bad weather, and he learns from his wife, Talisa, that she is pregnant. At the Dreadfort, Theon is freed from his shackles by two pretty girls who begin to ply him with their natural wiles. But of course, it proves to be just another cruel trick of Ramsay’s, who interrupts and threatens to castrate him. Daenerys and her army comes at last to Yunkai and assess its defenses. Ser Mormont tells her the odds of sacking it are not good, and they do not need it to reach Westeros. But Daenerys is determined to free it of its slaves and add them to her forces, as she did the Unsullied and slaves from Astapor. They set camp and Daenerys recieves the slave masters of the city to demand their surrender. She is rebuffed, and plans for battle begin… Melissandre and Gendry return to King’s Landing where he learns for the first time that his father was King Robert. It is for this reason, she claims, that the Brothers wanted him, and why they need him now. Back at their camp, the Brothers learn of a Lannister war party in the area and they decide to ride to south to set a trap for them. This will delay their trip to Riverrun and Arya decides she’s had enough of their lies. She flees the cave, but is captured by Ser Clegane who has returned for her. Over at Harrenhal, Jaime prepares to leave for King’s Landing while Brienne is left to her fate. She asks Jaime keep his promise to send the Stark girls back to Lady Catelyn, and he swears he will. On his way out, Locke boasts to him that they will “take care” of Brienne. He learns that Brienne’s father has offered a ransom, one which Roose Bolton rejected, and that Brienne is likely to be sacrificed for his mens’ entertainment. He immediately decides to turn around and ride back to save her. There, they find Brienne fighting a bear in a pit for the amusement of Hoat and his men while they sing “The Maiden and the Bear”. Jaime leaps into the pit while Bolton’s man shoot the bear with a crossbow. Brienne makes it out and in turn pulls Jaime out behind her, just in time to avoid an hornery and wounded grizzly! Locke is forced to let them go, fearing what will happen to him if he defies both Lord Tywin and Bolton. As episodes go, I liked this one. It had a good deal of faithful material this time around instead of the changes that are likely to annoy a Thrones geek like me! Sure, some of those found themselves being continued in this episode, but they were pretty scant compared to the material that really needs to be included at this point in the series. Of that, the part with John and Ygritte was probably my favorite. Up until now, his relationship with her and the Wildlings has been the subject of a lot of alterations, including why he’s fighting for them. But they did a good job of capturing the dynamic that is taking place between them, how they love each other but still finds themselves on opposite sides in the fight. The jealousy angle is something that never occurred in the book, but that is clearly just thrown in to accentuate how they come from different worlds and really didn’t detract from things at all. Naturally, I was kind of bothered that they dedicated more time to Theon again. Throughout this season, they’ve been giving us glimpses into the pain and misery he is enduring at the Dreadfort. It’s all true to what we learn in book 5, but I wonder if they plan to display every single cruelty Ramsay inflicted on him just so they can keep him in the show. Trust me when I say there’s a lot, and a few minutes every episode of Theon getting tortured is getting depressing! And sure, they’re still going with the whole bit about Gendry being taken away by Melissandre because she needs “kings blood”, but it seems like they are preparing to write that one to a close. What’s more, I did find it interesting how they did the scene with them sailing up the Blackwater, where all the wrecked ships now lay. Her explanation as to why the Brotherhood wanted him was also kind of apt, and the way she revealed the truth of his past was also kind of fitting. In the book, Gendry is sort of written off. This way, he is at least likely to have an ending that is poignant and meaningful. One thing I didn’t like was the revelation that the man I’ve been calling Vargo Hoat this whole time – leader of the Bloody Mummers – is in fact named Locke. I had to look it up since I didn’t recognize it, and it turns out Locke was actually a highborn member of the Night’s Watch, not one of Bolton’s mercenaries. But the fact that they’ve named him this means Vargo isn’t in the story, and he and the Mummers have been written out of the story altogether! All I can ask is… WHY?! Is this another simplification for brevity’s sake? Vargo was an awesome character, a man you loved to hate and laughed at because he had a lisp that made him sound somewhat less than threatening. Naturally, he overcompensated for it by being a brutal jagoff who cut off people’s hands. Seeing him do his thing and get his just desserts in the books was something I enjoyed. I’m going to miss him… Getting back to the purely good stuff, I was also very happy they finally got to the part involving the Yunkai. For three episodes now, they’ve shown it in the opening credits but stopped short of actually showing it. Now that they’ve brought out the tall walls, the pyramids and the Harpy, things are getting pretty cool. All that remains now is for her to assess their strength, and unleash her own on them! Looking forward to seeing it happen! And of course, they managed to capture Jaime’s rescue of Brienne – although who saved who was open to interpretation – very well. Last time, they skewed why she was being held while Jaime was being set free, but this episode pushed past that and got to good stuff. For some time, people have been wondering if Jaime and Brienne would ever join forces and bond over a shared sense of honor. And this is exactly how it happened. Now the two are set to go to King’s Landing to see their promises through to the end. But of course, since Arya is unaccounted for and Sansa has a number of people vying for her hand, that’s likely to get a bit complicated. And trust me, it does! Several battles to come and intrigues to take place before the season ends. And this point these include Daenery’s seige of Yunkai, the Wildling’s assault on Castle Black, and two weddings, neither of which are likely to be happy occasions! By storiesbywilliamsin Books, Fantasy May 15, 2013 1,720 WordsLeave a comment Morning folks, welcome to another work week, and another episode review of GOT! This week, since I’ve got a bit more free time on my hands, I thought I’d get to this review early and avoid what happened last time. I mean, people don’t need to wait til Thursday to hear about a show they watched on Sunday right? Yeah, mea culpa. But its a new week and a new episode, and the mid-season one at that! Naturally, I was eager to see this week’s episode, since the story was now in full swing and the big plot points were being addressed. For example, Daenerys campaign to raise an army of free people from the ruins of the slave capitol of the world. This was one of the best parts of book III, so I’m quite interested to see how they go about illustrating it. And of course, there’s also Robb Stark’s growing problems, which were not dealt with last time. But biggest for me was the plot thread hinted at in the title. After weeks of having John Snow’s story only touched on, and with him not even making an appearance last week, I was happy to see that this episode would be dealing with his story. Not only is it too one of the most important in the third book, it is perhaps the most personal and emotionally involved. Taken together, the promise of seeing all these threads further developed left me feeling eager and antsy… Kissed By Fire: The episode opens in the Riverlands, where Beric Dondarrion prepares for trial by combat with Sandor Clegane. After setting his sword ablaze in true R’hllorian fashion, Beric fights Sandor, who’s naturally afraid of his flaming blade. However, Sandor manages to survive the bout and lands his sword in Beric’s shoulder, killing him. But the death doesn’t last long, as Thoros issues a prayer to the Lord of Light and resurrects Beric yet again. Found innocent by trial of combat, Sandor is released… Later on, Arya learns that Gendry will be staying behind with the Brothers while she is taken to Riverrun and handed over to her brother. Afterwards, she learns from Beric that he has died many times and been brought back by Thoros, and wonders if her father could be resurrected in the same way. In Riverrun, Robb is faced with yet more problems as Lord Karstark take matters into his own hands and executes the Lannister captives. Though he is encouraged to take him as a hostage in order to ensure the continued loyalty of House Karstark, he decides to execute him and swings the sword himself. He loses the Karstarks as allies and laments how unity has broken down in his army. However, he knows he can still march on Casterly Rock, provided he can rebuild his alliance with House Frey. In Harrenhal, Vargo Hoat delivers Brienne and Jaime Lannister to Roose Bolton. Being merciful, he chooses to let Jaime know that his family prevailed in the siege of King’s Landing and sends him to get the care he needs for his wound. Afterward, he finds Brienne in the baths and shares a tub with her. After agreeing on a truce, he explains to her why it is he killed King Aerys, thus earning him the name “Kingslayer”. Moving to the north, we see John with his newfound Wildling companions, sharing what information he can with Tormund about the Wall’s defenses. Afterward, Ygritte leads him on a bit of a chase and they end up inside a cave, where she undresses for him and tests his loyalties by seeing if he will break his vow of celibacy. He does, and the two are joined in Wildling fashion… a couple of times! In King’s Landing, Cersei reaches out to Lord Baelish for help in dealing with the Tyrells, while Tyrion reaches out to Lady Redwyne for help with the royal wedding. Sansa gets a chance to see Ser Loras, whom she thinks she will marry. However, Tywin intervenes and decides to wed her to Tyrion. After gloating, Cersei is told she will wed Ser Loras, which sends her into a fit of self-pity. On Dragonstone, Stannis meets with his wife for the first time in ages. He comes to confess for his indiscretion with Lady Melissandre, but is told that he has done nothing wrong. As his wife is clearly crazed over the loss of her stillborn children, which she keeps in a set of jars, she confesses that she was overjoyed to learn that someone else was able to give him the son he deserved. Afterward, Stannis meets with his daughter, Shireen Baratheon, who waits in her tower and suffers from greyscale. After learning that Ser Davos, who has always been a friend to her, is in prison for treason, Shireen goes to the dungeons to see him and brings him a book – Aegon the Conqueror. He confesses that he is illiterate, at which point she begins reading it to him and suggest she make a habit of coming to see him. In Essos, Daenerys army continues to march from Astapor to Yunkai. This gives Ser Mormont and Ser Selmy a chance to discuss the men they’ve served over the years and discuss how best to serve their new queen. But both agree that they are happy to be serving Daenerys now since they believe in her, though it is clear Mormont also holds a torch for her. Daenerys also addresses her Unsullied officers and asks them to pick their own names and shed their slave names. Their leader, Grey Worm, tells her he will keep that name, as it is lucky. His birth name was the one he had when he was taken as a slave, whereas the one he has now he held when Daenerys set him free. As usual, high and lows in this episode, though I felt it was mainly characterized by highs. For starters, I was glad to finally see John and Ygritte hook up! Their thread has been sorely neglected so far and I was seriously beginning to wonder if they would ever get around to showing their relationship or not. I was glad to see that they did! In the third novel, this was not only an important aspect of the plot but the also one of the most gripping and emotionally involved parts of the story. Here, John’s loyalties are being severely tested, and his newfound love for Ygritte was causing him to break his oaths. Of course, he was only doing what Qorin told him to before they were captured, but that didn’t make it any easier for him. Though that raises something that I’ve found generally unlikeable about their adaptation. In the second season, Qorin did not ask this of John and instead seemed to condemn him for letting Ygritte go, a move which led to their capture. Granted, it seemed obvious he staged their little “fight” to get John into their good books and sacrificed himself, but John was not in the know and is now groping around blindly. Perhaps they thought this would make his uncertainty and test of loyatlies more genuine, but I think it only complicates matters. Better to have him playing the role of defector and constantly be wondering if he’s doing the right thing than have him vacillating between two camps for real. Another high point was Jaime’s confession to Brienne of why he killed Aerys. Not only was the scene accurate and lucidly portrayed, it was a testament to Nikolaj Coster-Waldau’s skill as an actor that he managed to pull off Jaime’s torment so well. After years of being a cynical bastard because of how people view him as a man without honor, and having lost his sword hand – his only redeeming feature, in his mind – he is naturally in serious emotional pain and wants redemption. Personally, I thought he captured that here brilliantly. And of course, the machinations that are going on in King’s Landing. As I’ve said before, the Sansa-Pyter plot has been simplified, since it was Boros Blount who arranged for her escape and Pyter’s involvement not revealed until later. But aside from that, they are capturing the spirit of this point in the story quite well, showing how plotting between houses is causing a general atmosphere of distrust that will threaten to boil over. And for the most part, it’s being conveyed accurately. And as for Robb’s thread, there is a minor change here which caught my attention. His decision to repair relations with the Freys was not part of some brilliant idea to attack Casterly Rock. It was done out of necessity because his decision to marry Talisa Maegyr was basically a big middle finger to his promise to marry Walder Frey’s oldest daughter. What’s more, its hardly big news that he would plan to attack Casterly Rock, home of the Lannisters. That was his aim in the book all along. Since it sits west of Riverrun and well north of King’s Landing, he knew he had to have it, since to march past it would expose his entire western flank. A nitpick, I know, but sometimes I wonder why they bother with little changes like these. They kind of seem frivolous and unnecessary, like they are trying to sex up the storyline or something. It’s already well-sexed, believe me! Just tell it and move on… And to end things happily, I like that they brought in Stannis’s daughter and developed his back story some more. Naturally, its hard to give all the characters their worth in a format like television, especially when adapting something as voluminous as Martin’s series. But they managed to get her and his wife in, and show the kind’s of debilitating and tragic things which have effected their family. Oh, and the way they had his daughter singing the song that Patchface – her jester, who was important in the books but didn’t make it into the cast of the show – always sung her was a nice touch. And that was the middle of season three, people! Things are shaping up and we are due for some major action, betrayals and intrigue real soon! Stay tuned because I know for a fact that it’s only getting better from here… By storiesbywilliamsin Books, Fantasy, Reviews April 29, 2013 1,725 Words4 Comments Game of Thrones Season 3 Trailer: “We Do Not Choose Our Destiny” It seems we’re in for a bit of a two-fer today. Its become a habit of mine to post trailers for upcoming movies on Mondays now. However, it just so happens that while I was doing my due diligence for one, I came across a second must-see teaser which I had to pass on. This one is for the third season of Game of Thrones, which premiers in less than one week! And I think you’ll agree, this one is definitely the biggest and baddest. Whereas the first gave us nothing but some voice over and a simple graphic (like the one featured above), and the second gave us a brief glimpse with a little eye candy, this one has gone the full nine yards and covered all the major bases. In addition to all the intrigue and plots taking place in Kings Landing, we are given some quick glimpses of the ongoing War of Five Kings, Danearys’ efforts to obtain an army in Slavers Bay, John Snow’s time amongst the Wildlings and their efforts to bring down the Wall, Brienne and Jaime in the Riverlands, Stannis’ ongoing attempts to fulfill an ancient prophecy, and even Bran’s journey to the far North. And fittingly, they gave the voice over for the whole thing to Stannis, who performs the “We do not choose our destiny speech”. Though he is referring to himself in this speech and the role he thinks he will play, it pretty much sums up what everyone in the series is going through at this point. Beyond all the warring, intrigue and personal ambitions, it is fast becoming clear that there is a greater plot at work. But for those of you who haven’t read the many tomes that make up this series, I guess you’ll just have to wait to see what it is! Six more days, people! If you’re not going to be at home, be sure to set your TiVos and DVR’s! And then be sure to swing by because yours truly will of course be doing a review 😉 By storiesbywilliamsin Books, Fantasy, Video March 25, 2013 351 Words1 Comment Remembering Douglas Adams Yesterday was the birthday of the late, great science fiction writer and luminary known as Douglas Adams. Had he not passed away in 2001, at the age of forty-one, he would have been celebrating his sixty-first birthday. Best remembered for his series The Hitchhikers Guide to the Galaxy, Adams greatest accomplishment was arguably his ability to weave comedy and science fiction into one! And that’s not the easiest thing to do in a genre like science fiction, which is noted for being often bleak, dystopian, or highly technical. Sure, there was plenty that was unintentionally funny, especially in Douglas’ time, but Adams demonstrated that science fiction writing could be both high-minded – incorporating real science and galactic exploration – and irreverent. So I hope people will join me in wishing the man a belated happy birthday! Though I learned about it too late to acknowledge it on time, I’m sure he wouldn’t mind. The man did have a rich sense of humor, after all! Born in Cambridge, England in 1952, Adams parents moved to London when he was still a toddler. They divorced five years later, and Adams spent his formative years with his mother in Brentwood, east of London. Receiving his education from the privately run Brentwood School, he was noted for being unusually tall, he also stood out because of his exceptional ability at creative writing. Some of his earliest writing was published at the school, in the town publication The Brentwoodian, or the school magazine Broadsheet. He also designed the cover of one issue of the latter, and had a letter and short story published nationally in The Eagle, the boys’ comic, in 1965. On the strength of a bravura essay on religious poetry that discussed the Beatles and William Blake, he was awarded a place at St John’s College, Cambridge to read English in 1971 and graduated two years later. While there, he also attempted to ply his comedic skills and applied to join the Footlights, an invitation-only student comedy club. While he waited to join, he began writing and performing in revues with Will Adams (no relation) and Martin Smith, forming a group called “Adams-Smith-Adams”. By 1973, he managed to become a member of the Footlights until he graduated and moved back to London. At this point of his life, he was determined to break into television and radio as a writer. This resulted in a brief collaboration between him and Monty Python’s Graham Chapman, and a series of appearances by Adam’s on Flying Circus. At the time though, his writing style did not seem suited to radio or TV comedy, and he was forced to work odd jobs to make ends meet. However, Adams never stopped writing and continued to work towards his masterpiece. The Hitchhikers Guide to the Galaxy: Hitchhiker began in 1977 as a pitch to the BBC radio as a concept for a science-fiction comedy radio series. According to Adams, the idea for the title occurred to him while he lay drunk in a field in Innsbruck, Austria, gazing at the stars. He was carrying a copy of The Hitchhiker’s Guide to Europe, and it occurred to him that “somebody ought to write a Hitchhiker’s Guide to the Galaxy“. At the same time, Douglas worked on novelizations of his concept, which made producing the series all the more difficult. Not a prodigious writer, Adams was apparently the kind of man who had to be forced to meet deadlines and complete what he started. Despite the difficulties he had, Adams wrote five novels in the series, published in 1979, 1980, 1982, 1984, and 1992. For the rest of his life, Adams made several attempts to get Hitchhiker adapted into a movie. He did not succeed in his lifetime, but in 1981, the radio series became the basis for a BBC television mini-series and Disney bought the rights in 1998. It was not until 2005, four years after his death, that the screenplay finally got a posthumous re-write by Karey Kirkpatrick, and the resulting movie was released. Despite Hitchhikers immense popularity, it was by no means Adam’s only literary creation. During the 1980’s, Adams and Mark Carwardine, a noted zoologist, collaborated on a series of BBC broadcasts known as Last Chance to See where they would travel to foreign countries and speak of endangered species. In between all this, he wrote the novel Dirk Gently’s Holistic Detective Agency, a humorous detective story which was relesead in 1987. Adams himself described the book as “a kind of ghost-horror-detective-time-travel-romantic-comedy-epic, mainly concerned with mud, music and quantum mechanics.” A sequel, entitled The Long Dark Tea-Time of the Soul, was published a year later. These were entirely original works, Adams’s first since So Long, and Thanks for All the Fish. In between all of this, Adams also worked with the BBC as a writer on Doctor Who. Altogether, he wrote three Doctor Who serials starring Tom Baker as the Doctor. These included the episodes “The Pirate Planet” (Season 16), “City of Death” (with producer Graham Williams, from an original storyline by writer David Fisher), and Shada (only partially filmed and never filmed). Adams died in 2001 as a result of a degenerative heart condition and was buried in Highgate Cemetery, North London. After eighteen years of writing, publishing, and broadcasting, he left an indelible mark on science fiction and popular culture. The holiday known as Towel Day – in honor of the sage advice contained in the Guide – takes place every May 25th. And despite his irreverence and characteristic wit, Adams is also remembered for exploring scientifically plausible ideas. For example, the Heart of Gold – the ship featured in Hitchhiker – is powered by the “Infinite Improbability Drive”. This is an FTL drive system which is based in a particular aspect of quantum theory. Chaos theory also plays an important role in Dirk Gently’s Holistic Detective Agency, where everything, even elements which seem superfluous, turn out to be interconnected with the plot. The words “Don’t Panic”, also advice contained within the Guide, and the significance thereof are known by any self-respecting geek. Concepts like the “Babel Fish”, the living translation device one inserts in their ear, are also commemorated with programs like Yahoo’s translation program of the same name. Also, in 2011, over 3000 people took part in a public vote to choose the subjects of People’s Plaques in Islington. Adams received 489 votes, and a plaque is due to be erected in his honour. And just yesterday, to mark his 61st birthday, Google celebrated with an interactive “Google Doodle” which featured a stylized version of the Heart of Gold’s computer console. In addition, the BBC has the text-based Hitchhiker’s Guide to the Galaxy game available to play on their website here. So if you’ve got time and feel like doing something fun to commemorate Adams, just click on the links provided and enjoy! RIP Douglas Adams. You were a rich soul and a witty, funny, and brilliant man. Like so many before you, you were snatched up too soon and didn’t live long enough to get your proper due! By storiesbywilliamsin Authors, Books, Movies, News, Sci-Fi March 12, 2013 March 12, 2013 1,170 Words13 Comments
cc/2019-30/en_head_0021.json.gz/line1730268
__label__wiki
0.532971
0.532971
St. Colmcille and the Water Monster In the episode “Dindshenchas: A Magical Mystery Tour“, we discussed the dindshenchas story of Áth Clíath. It concerns the destruction of the great beast that created the Boyne Valley. Now, there may be no Irish dragons, but there are plenty of tales of water beasts, the ollphéists. We mentioned a few in the podcast episode. I think we might have left out one of the better known ones, that of the péist of Lough Ree. Its most recent sightings date from as late as the 1960s when it was seen by several respectable clerical gentlemen: “It was moving. It went down under the water and came up again in the form of a loop. The length from the end of the coil to the head was 6 feet. There was about 18 inches of head and neck over the water. The head and neck were narrow in comparison to the thickness of a good-sized salmon. It was getting its propulsion from underneath the water, and we did not see all of it.” From ‘The Westmeath Independent’, May 28th, 1960 Other water monster legends to be found in Ireland include: Lough Derg (Donegal): This monster grew from a hairy worm and was banished by St. Patrick Lough Graney (County Clare): This lough had a monster that was said to appear once every seven years. Lough Mask (County Mayo): This lough has a legend of a creature that might be a crocodile, or perhaps just a large otter. ( It was the Dobhar Chύ according to Roderic O’Flaherty (1629 – 1718) in his ‘ Description of West Connaught’). Lough Rudraige (County Down): Fergus Mac Léite (who had the magic ear-herbs) fought a water monster in this lough. Our own local Lough Allen has a legend of a witch in a stone boat. There is no story of a water beast, but I can imagine such a story evolving if fracking doesn’t remain banned in the county! Lough Swilly (County Donagal): St. Colmcille dealt with a monster in this lough. Talking of the famous Colmcille, there is a legend that he banished a ferocious “water beast” to the depths of the river Ness after it had killed a Pict and then tried to attack Colmcille’s disciple. The story is told in “Vita Columbae” Book 2. Isolde reminded me that some years ago I developed a series of light-hearted gentle spoof hagiographies for St. Patrick’s Day family storytelling shows. They included an unusual version of St Patrick and the Guiness bottles, St Lassair and the garden claw and the story below. The bones of the story respect the legend. The rest is my invention. St Colmcille and the Water Monster Long ago in Ireland, in the part of the land of Saints and Scholars known as Donegal, there lived a man called Saint Colmcille. Well, he didn’t begin life as a saint, of course, but he soon became a good scholar. Mind you, he had a head start. Not only was he born the great-great grandson of the famous Niall of the Nine Hostages, but he even had a saint for a foster-uncle and his first teacher. Later, he went away to school in Moville, where he was taught by St. Finian himself. Finally, he studied at the monastic university of Clonard, which had the reputation for training up the best-qualified Irish saints in the country. He even planned a gap year in Rome, but only got as far as France. There was just so much work to do for a saint and scholar in Ireland. Colmcille had grown up to be tall and strong and with an extremely loud voice. It was said that you could hear him speaking all the way from one hill to another. It was quite impressive. But that was Colmcille. He was a man of action as well as a saint and scholar!. For a while, he travelled around Ireland founding monastic settlements as he went, but adventure was following close on his track. And this tale is all about one of his most exciting adventures. It began with an argument over a book. Fights over copyright issues are common enough these days, but you might not realise that it went on in Colmcille’s time. Well it did, He copied a book of St Finian’s or something like that and the saint wasn’t happy. Well, it lead to a quarrel and then to a bit of a battle, and the upshot of this was that Colmcille left Ireland. Colmcille became famous in Scotland and founded one of the most famous monasteries on Iona, but our story is not set on that special island. No, we are going further east to where a rapid river runs into a huge Loch, not far from the town of Inverness. It is a great place to take a holiday. There are wonderful fresh walks around the loch with plenty of time to enjoy the mountain views and the sparkling water. Perhaps our sainted scholar was there, taking a well-deserved holiday, walking along the river from Invergarry towards the waters of the long lake. We can picture him stretching his long legs, meditating on the wonders of creation and munching a juicy apple as he went. As the Loch opened out before him he was stopped in his tracks. For there, on the narrow path ahead of him, completely blocking the way, was a hideous beast. It had a swollen body, ghastly green and knobbly gnarled. Its neck was long and spiked carrying a small head with wicked yellow eyes and razor sharp teeth. Its heavy legs were wide set and squat, and magnificently talloned and clawed, while the long tail swished impatiently. For a long moment, saint and beast regarded each other warily and then the saint calmly drew another rosy apple from his pouch and held it out to the monster. “Well met beastie,” he said, keeping his eyes firmly on the creature. “Would you like an apple?” His eyebrows scarcely lifted when the monster replied, “I don’t eat apples.” If Columcille was surprised that the beast could speak, he didn’t show it. He gently reached into his pouch and brought out a small bundle wrapped in a cloth. “I have a little bread and cheese if you would prefer.” “I don’t eat bread and cheese.” Again, Colmcille reached into his pouch, bringing out another small parcel. “I have a small honey-cake I was saving for later.” The monster’s voice was now a low intimidating growl. “I don’t eat honey cakes.” Colmcille, he didn’t worry, he didn’t hurry. He didn’t even get flustered. He just thought carefully. Finally, he voiced the terrible question. “Well, what do you eat?” The water beast seemed to grow in front of his eyes. Its yellow eyes glittered. “YOU!” The word exploded like a bellows blast, almost blowing the saint into the Loch. The creature took a step forward. Colmcille realised that it was capable of moving very fast on those short, sharp legs. “Wait!” The saint lifted his hand in a gesture that seemed more benediction than defence. “If you are to eat me, one of the saints and scholars of Ireland, then you must prove yourself worthy.” The oillphéist, taken aback, stared at Colmcille. Colmcille, recognising his chance, continued. “We must have a competition.” He pointed to a distant lightning misshapen tree. “Now, you look to be a fast runner.” The monster nodded growling his agreement. Colmcille took no notice but went on. “Let us race to that tree. You may eat me if you win.” The creature growled again and prepared to run. Now, Colmcille may have been a saint, but he wasn’t about to become a ready meal for a monster. He was also scholar enough to know that he couldn’t win the race either. No, he was preparing to run as fast as he could in the opposite direction. “On your marks, get set, GO!” Colmcille had hardly taken a couple of steps away from the creature when the péist had reached the tree and was back. The beast was fast! Colmcille, he didn’t worry, he didn’t hurry. He didn’t even get flustered. He just thought carefully. He held out his hands to the drooling creature and spoke as calmly as before. “I am sorry,” he said, as if nothing had happened. “I made a mistake. You are a water beast, of course. It is a swimming race we should have had, not a running race. I wasn’t being fair.” He pointed to a distant rock far away in the loch. “If you get to the rock first, you may eat me.” The beast was in the water, had reached the rock and returned before the saint had gone three steps. This time, it didn’t even bother to climb out of the water, so sure it was of its superiority. “Now play fair,” it growled. “Jump into the water and let me crunch you up.” The saint, seemingly untroubled, stepped towards the water’s edge. Then he stopped as if in thought. “I have still done you an injustice,” he smiled gently. “For a beast as noble as you, swimming in a straight line is hardly worthy of your prowess. The competition should have been to see who could swim in circles.” Immediately, the creature began to flap and float in perfect circles. “It would have to be fast circles, of course,” went on the saint, as if he was unaware of the water beast’s actions. The monster was showing off. It began to turn in tighter faster circles. Finally, it was swimming so rapidly that it was almost a blur. Its spiky tail was dragged down deep into the muddy depths. It hardly even noticed when the barbed tip of its tail reached the rocky bottom of the Loch and went on going, spiralling down into the rock, like a corkscrew into a bottle. Colmcille just calmly stood and watched until the monster tired of the activity and stopped its dizzy whirlpool motion. “That is enough,” growled the oillphéist a little out of breath. “If you won’t get in the water, like a good sport, I will come out and get you.” But when the creature tried to get out of the water, it could not. Its tail had it firmly anchored to the bottom of the Loch. Colmcille raised his hand again and this time it was definitely not in benediction. “Water beast you are, and water beast you will remain,” he thundered. “Never again will you threaten man or beast upon dry land.” And he turned upon his sandaled heels and strode away, back to Iona and many more adventures. Posted in: Articles ♦ Dindshenchas 12: A Magical Mystery Tour ♦ Series 03: Dindshenchas and the Art of Mythic Cartography ♦ Stories by Chris Thompson Tagged: dindshenchas, Loch Ness Monster, Metrical Dindshenchas, peist, St. Colmcille, storytelling ← The Dindshenchas of Áth Clíath Cúalann: Dublin The Dindshenchas of Carmun →
cc/2019-30/en_head_0021.json.gz/line1730269
__label__wiki
0.80774
0.80774
Why the BJP Feels It Has to Appropriate Sardar Patel The ruling party's embrace of Vallabhbhai Patel, who openly opposed the RSS's subversive activities, indicates the lengths to which it will go to win back the support of Gujarat's Patel community. Jawhar Sircar This article was first published on November 6, 2017 and is being republished on October 31, 2018 to mark Sardar Patel’s birth anniversary. It is astounding how the University Grants Commission (UGC) could issue an order to all vice chancellors, which is beyond its powers. On October 27, it directed them to observe Sardar Patel’s birthday on October 31 and to send a compliance report with photographic evidence like some untrustworthy schoolboys. With just three days’ notice, all higher education institutions in India were to organise ‘Unity Runs’, inter-college competitions, dramas, songs, essays; design t-shirts and invite freedom fighters. This absurd “order” signed by a bureaucrat in the UGC was so far fetched that one deduces that it was obviously meant to provoke a hue and cry from the academics and liberals, who could then be branded as ‘anti-nationals’. An earlier one had actually directed all institutions to place TV screens to hear Modi pay homage to Deendayal Upadhyaya, who was his former party boss, not any national leader. This is strange because Prakash Javadekar actually has a college degree, unlike his predecessor in the HRD ministry, Smriti Irani, and is expected to have more respect for the autonomy of educational institutions. I know him as a reasonable minister and therefore one concludes that the pressure on him must be too much to refuse. We need, therefore, to understand why the BJP is so desperate to prove that it alone cares for Sardar Patel. This is exactly what the prime minister said on October 31, that all previous governments had ignored Sardar Vallabhai’s legacy. He forgot that this includes Atal Bihari Vajpayee’s three governments as well. Modi must win back the estranged Patel or Patidar community of Gujarat by using India’s most iconic Patel, Sardar Vallabhai. Apart from the crude ham-handed manner in which this regime approaches every issue, whether it be the national flag and patriotism and the mandatory Aadhaar card or demonisation and the Goods and Services Tax, this reveals something more and that is panic. After all, Hardik Patel’s dramatic agitation has weakened the BJP’s traditional hold over the Patidar-Patel community. A week ago, on October 22, the Patidar Anamat Andolan Samiti’s north Gujarat convener, Narendra Patel, suddenly claimed that he was offered one crore rupees to join the BJP and said he had proof from his “sting operation”. We do not know the facts in this case, but we do know that it was Sardar Patel who took the strongest steps to check communal forces, represented by the BJP’s forerunners and mentors, the RSS and the Hindu Mahasabha and their Muslim counterparts. Also read: The Sardar Patel Statue is Narendra Modi’s Necessity Let us recall what Sardar Patel said and did after Gandhiji’s assassination on January 30, 1948. As deputy prime minister and home minister, he banned the RSS immediately and on February 6 he reassured Nehru that he was taking the sternest of steps and even keeping a sharp watch on the RSS open-air Gita classes to know what was being said. On February 27, he told Nehru that even “government servants in Delhi have already been arrested for RSS activities”. Sardar Patel felt, however, that “it was a fanatical wing of the Hindu Mahasabha directly under Savarkar that hatched the (assassination) conspiracy and saw it through”. He was clear that “the RSS has undoubtedly other sins to answer for, but not this one”. He records that Gandhi’s killing “was welcomed by those of the RSS and the Mahasabha who were strongly opposed to….his policy”. In a letter to Shyama Prasad on the July 18, he declared that “the activities of the RSS constitute a clear threat to the existence of government… (and that) the RSS circles are becoming increasingly more defiant and are indulging in subversive activities throughout India”. Prime Minister Narendra Modi flags off the ‘Run for Unity’. Credit: PTI The RSS supremo, M.S. Golwalkar, repeatedly pleaded with Patel to lift the ban but he remained firm for a year and a half. Sardar Patel lifted the ban in July 1949, only after the RSS pledged to abjure violence and secret activities and, more importantly, it finally professed “loyalty to the constitution of India and the national flag” that it had been opposing. Now we understand why an excess of patriotism is being enforced and why the national flag is being bandied everywhere, including movie theatres. They need to make up now. Will these facts about the national hero that it wishes to appropriate be publicised by the BJP or will it stomach everything because the Patels constitute a solid 20% of Gujarat’s voting population? This new game of snatching national leaders from the Congress pantheon has been necessitated also because the political right-wing is obviously starved of national leaders. The founder of the RSS, K.B. Hedgewar, had deliberately decided not to join Gandhi and the Congress in momentous movements like Quit India. In fact, home ministry records give the impression that the RSS was quite loyal to British masters and caused no problems for them. The other stream of the BJP’s ancestry, the Hindu Mahasabha, had a mercurial leader like Vinayak Savarkar who initially took some part in the freedom struggle but when he was imprisoned in the Andamans’ Cellular Jail, he begged for mercy many times. When the NDA government decided to name Port Blair airport after Savarkar, it deliberately ignored hundreds of other prisoners who suffered cruel detention but never wavered and died in the Andamans. Savarkar was also singled out for other honours like a special son et lumiere show to smother the role of so many young brave-hearts and honour this rare participant from the Hindutva camp (Savarkar coined the term) in true Goebbelsian style. The second reason why rightists do not have any tall leader is because even after independence they remained quite self-centred and did not participate in most great political upheavals except during the Emergency. Besides, they did not have too many years in power, even in coalitions. Vajpayee obviously stands the tallest but then his angst with Modi over the Gujarat riots is public knowledge. Shyama Prasad Mookerjee is a distant figure but he is from a peripheral state and cannot excite voters either in the Hindi belt or in Gujarat. Vivekananda is often hijacked by those who see only his saffron robe but have no idea how strongly he despised communal fanatics. So the hunt to appropriate leaders goes on relentlessly. Lal Bahadur Shastri is invoked and the “raw deal” he got from the Gandhi family is agitated. But what have stalwarts like Advani, Murali Manohar Joshi or even Yashwant Sinha or Arun Shourie got from Modi? The Swarajya recently discovered Upendranath Brahmachari, whose discovery had eliminated the dreaded Kalazar disease a century ago, and suddenly realised that he was actually a ‘saint’ that Bengal has ignored. Also read: The Shudras Want Empowerment, Not a Giant Statue of Their Iron Man Another mediocre archeologist from the Gangetic basin brought out a cut and paste biography of Rakhaldas Bandyopadhyay, who discovered Mohenjodaro, and ticked off Bengalis for forgetting him. More such strategies will surely come before the Bengal elections. Kerala witnessed some real dramatics and every state that has not yet submitted to the Delhi sultanate, to use Modi’s favourite term, shall be undermined systematically, clumsily or with Chanakyan ruthlessness. The hunt for heroes, both at the national and regional level, continues unabated as the Right just has to fill up the embarrassing vacuum in our national history – at any cost. It needs patriots from wherever, to promote its brand of ultra nationalism. History, however, is rather cruel in this game. Let us now return to Patel and ask the real patriot to please stand up. The statement that he made on December 17, 1948 says it all. Would this government that needs Vallabhai Patel so much and is so fond of slogans like to use his immortal words as a banner? He had said: “India is a secular country and it will be nothing else.” Jawhar Sircar was culture secretary and CEO at Prasar Bharati. He writes on history of religion.
cc/2019-30/en_head_0021.json.gz/line1730273
__label__wiki
0.552709
0.552709
Media Preview of Bath & Body Works at The Curve Headed over to Bath & Body Works, at The Curve, Petaling Jaya on 10 February 2015 for the media preview of the newest Bath & Body Works in Malaysia. Bath & Body Works is a beauty and personal care chain store in partnership with The Valiram Group in Malaysia. Bath & Body Works operates nearly 1,600 stores based in the United States, 88 locations in Canada and under franchise agreements, has 79 stores in the Middle East, Russia, Poland, Central America and Southeast Asia. The store offers the most luxurious beauty products in fragrant bath and body care, facial skincare, hair, spa and home. Bath & Body Works sells not only its own branded product line with Signature Collection and Hand Soaps, but leading beauty brands as well, including White Barn Candle, Aromatherapy, and True Blue Spa. Pretty Mei Sze Angelica and Patricia The Bath & Body Works store at The Curve is located at: Lot G117 & G117A, Centre Court, Ground Floor, The Curve Shopping Centre, 6, Jalan PJU 7/3, Mutiara Damansara, There are also Bath & Body Works stores at Nu Sentral and Mid Valley Megamall in Kuala Lumpur, Gurney Plaza in Penang, Komtar JBCC in Johor Bahru, and Imago Shopping Mall in Kota Kinabalu. More info on Bath & Body Works at www.BathandBodyWorks.com For more information on the Valiram Group, head over to www.valiram.com TagsBath & Body Works • Malaysia • Petaling Jaya • The Curve • The Valiram Group 0 comments on “Media Preview of Bath & Body Works at The Curve”
cc/2019-30/en_head_0021.json.gz/line1730278
__label__wiki
0.908587
0.908587
Scientists born on December 23rd Scientists died on Science events on Who said: “I seem to have been only like a boy playing on the seashore, ... finding a smoother pebble or a prettier shell ... whilst the great ocean of truth lay all undiscovered before me.” Albert Einstein Benjamin Franklin Isaac Newton more quiz questions >> < 22 Dec | 24 Dec > DECEMBER 23 – BIRTHS – Scientists born on December 23rd Robert E. Kahn Born 23 Dec 1938. Robert Elliot Kahn is an American computer scientist who co-created the packet-switching protocols that enable computers to exchange information on the Internet. In the late 1960s Kahn realized that a packet-switching network could effectively transmit large amounts of data between computers. Along with fellow computer scientists Vinton Cerf, Lawrence Roberts, Paul Baran, and Leonard Kleinrock, Kahn built the ARPANET, the first network to successfully link computers around the country. Kahn and Cerf also developed the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which together enable communication between different types of computers and networks; TCP/IP is the standard still in use today.« Harold Masursky Born 23 Dec 1923; died 24 Aug 1990 at age 66. American geologist and senior scientist at the U.S. Geological Survey's astrogeology branch supporting space exploration. Starting in the mid 1960s, he helped analyze the photographs from the Ranger, Lunar Orbiter, and Surveyor lunar missions. In mapping the moon, suitable landing spots were being sought for the unmanned Surveyor 5 spacecraft (1967) and the manned Apollo landings (1969-72). Masursky headed the group that interpreted television transmissions from Martian satellite Mariner 9 (1971), producing maps to plan the landing of unmanned Viking spacecraft on Mars (1976). He analyzed data on the geological origins and evolution of the planets. He collaborated in foreign projects such as the Soviet Venus probes.« Niels K. Jerne Born 23 Dec 1911; died 7 Oct 1994 at age 82. quotes Niels Kaj Jerne was a Danish immunologist who shared (with César Milstein and Georges Köhler) the 1984 Nobel Prize for Physiology or Medicine. Jerne has provided three important theories of immunology. (1) Natural selection theory of anti-body formation (1955) which initiated modern cellular immunology since the1960s. (2) Somatic generation theory of the generation of antibody diversity (1968) which brought together molecular and cellular immunology in the 1970s. (3) Network theory (1974), which explains a complex system of interactions when the immune system is activated to counteract disease and then is shut down after the need passes. The principles of this theory are beginning to be exploited in prevention, diagnosis and treatment of disease.« Science As Autobiography: The Troubled Life of Niels Jerne, by Thomas Soderqvist. - book suggestion. Madame C.J. Walker Born 23 Dec 1867; died 25 May 1919 at age 51. quotes Madame C.J. Walker (born Sarah Breedlove) was a Black-American businessperson and inventor who invented a metal heating comb and conditioner for straightening hair. She made her fortune by her hugely successful marketing and developing of hair and beauty products for black women. After starting out with her business headquarters in 1910 in Indianapolis, Indiana, she opened part of her company operations in New York City. She established a chain of beauty parlors throughout the U.S. and the Caribbean. The number of African American agents earning commissions by selling her products was about 5,000 in 1910, and this grew in the next nine years to 25,000. Walker has been called the first self-accomplished American millionairess, yet engaged in philanthropy.« On Her Own Ground: The Life and Times of Madam C.J. Walker, by A'Lelia Bundles. - book suggestion. Booklist for Madam C.J. Walker. Sebastian Wilhelm Valentin Bauer Born 23 Dec 1822; died 20 Jun 1875 at age 52. German inventor who was a pioneer of submarines. On 1 Feb 1851, in Kiel Harbour, he made a test-dive in his first submarine, Le Plongeur-Marin ("The Marine Diver"), only to sink 50-ft due to water leaks in the hull. He survived by waiting for the inside air pressure, compressed as more water leaked in, to match the water pressure outside. Seven hours later, he and his crew opened the hatch and rose to the surface to find funeral services in progress. In 1855, Bauer built a four-man treadmill-powered, 52-ft iron submarine, Le Diable-Marin ("The Marine Devil") carrying 11 crew. The photographs Bauer made through its windows are probably the first taken underwater. He also experimented on air purification and underwater sound signals.« Karl Richard Lepsius Born 23 Dec 1810; died 10 Jul 1884 at age 73. German Egyptologist who is regarded as a founding father of scientific methods in archaeology. His plans, maps and drawings of tomb and temple walls are of high accuracy and reliability. In 1842, he headed a team of carefully chosen specialists on a four year expedition to the Nile Valley sponsored by King Fredrich Wilhelm IV of Prussia. Lepsius explored Khartoum and Sennar, during which he collected 15,000 artifacts and dispatched for display in Berlin. In winter 1844-45, Lepsius travelled throughout the Valley of the Kings, recording numerous scenes and inscriptions. He returned in 1866 and found the Canopus decree at Tanis. Being written in two languages, it was a valuable cross-reference for the prior interpretation of the Rosetta stone by Champollion.« Jean-François Champollion Born 23 Dec 1790; died 4 Mar 1832 at age 41. French Egyptologist who established scientific methods in archaeology and pioneered in deciphering Egyptian hieroglyphics. He was well prepared, with a genius for languages, having by age 13 mastered Latin, Greek, Arabic, Syrian, and Chaldean and later Hebrew, Persian, Chinese, and Coptic, an old Egyptian language written in Greek letters. He started interpreting Egyptian hieroglyphics, building on the earlier efforts of Thomas Young. Champollion succeeded in deciphering the Rosetta Stone, a stone slab unearthed (1799) at Rosetta (near Alexandria, Egypt) inscribed in two languages and three scripts: Egyptian hieroglyphic and demotic, and Greek, each recording.a decree (196 BC) of Ptolemy V Epiphanes (reigned 205-180).« The Rosetta Stone: The Story of the Decoding of Hieroglyphics, by Robert Sole, et al. - book suggestion. Wilhelm Hisinger Swedish mineralogist who inherited his father's iron works, and pursued science privately. From one of his iron mines at Bastnäs came a mineral of unusually high density. Hisinger distributed samples to several European chemical analysts. After his examination in 1803, Martin Klaproth suspected it held a new element. That year, both Hisinger and Jöns Berzelius isolated the new element. They named it cerium in recognition of Giussepe Piazzi's discovery of the new minor plant, Ceres, two years earlier (1 Jan 1801). In 1806, Hisinger investigated electricity's effect on salt solutions. He contributed to the geological knowledge of his country, and recorded finds of its animal and plant fossils. He also amassed fine rock, mineral and fossil collections, which he eventually gave to the Swedish natural history museum.« Sir Richard Arkwright Born 23 Dec 1732; died 3 Aug 1792 at age 59. quotes English industrialist and inventor whose introduction of power-driven mechanization of textile factory production methods were enormously successful. The Spinning-Frame machine he invented (1769, British patent No. 931) to spin cotton yarn used multiple sets of paired rollers that turned at different speeds able to draw out yarn of the correct thickness, and a set of spindles to twist the fibres firmly together. It produced a far stronger thread that that made by the Spinning-Jenny of James Hargreaves. Arkwright's machine was too large to be manually driven, so he powered it with a water-wheel (1771) when it became known as the Water Frame. Arkwright's textile business expanded, he built more factories, and later adopted steam power.« The Arkwrights: Spinners of Fortune, by R.S Fitton. - book suggestion. Booklist for Richard Arkwright. Axel Fredrik Cronstedt Born 23 Dec 1722; died 19 Aug 1765 at age 42. quotes Swedish chemist and metallurgist who was the first to isolate nickel (1751) and notice its slight magnetic properties. A new chemical classification of minerals he made was translated to several languages. Patterns he found in the internal structure of minerals enabled him to distinguish between simple one-compound minerals and those comprised of a mixture of several minerals. He discovered zeolite, a water-softening silicate and analysed the high-density mineral calcium tungstate. By adept use of the blowpipe to intensify a flame and burn a small quantity of a mineral he could make an identification of its chemical composition based on the colouring of the flame. He did not invent the instrument, but founded systematic blowpipe analysis technique.« Nature bears long with those who wrong her. She is patient under abuse. But when abuse has gone too far, when the time of reckoning finally comes, she is equally slow to be appeased and to turn away her wrath. (1882) -- Nathaniel Egleston, who was writing then about deforestation, but speaks equally well about the danger of climate change today. Carl Sagan: In science it often happens that scientists say, 'You know that's a really good argument; my position is mistaken,' and then they would actually change their minds and you never hear that old view from them again. They really do it. It doesn't happen as often as it should, because scientists are human and change is sometimes painful. But it happens every day. I cannot recall the last time something like that happened in politics or religion. (1987) ...(more by Sagan) Albert Einstein: I used to wonder how it comes about that the electron is negative. Negative-positive—these are perfectly symmetric in physics. There is no reason whatever to prefer one to the other. Then why is the electron negative? I thought about this for a long time and at last all I could think was “It won the fight!” ...(more by Einstein) Richard Feynman: It is the facts that matter, not the proofs. Physics can progress without the proofs, but we can't go on without the facts ... if the facts are right, then the proofs are a matter of playing around with the algebra correctly. ...(more by Feynman) DECEMBER 23 – DEATHS – Scientists died on December 23rd Gerard Peter Kuiper Died 23 Dec 1973 at age 68 (born 7 Dec 1905). Dutch-born American astronomer, who discovered Miranda, a moon of Uranus, and Nereid, a moon of Neptune. The Kuiper Belt is so-named after his original suggestion of its existence outside the orbit of Neptune before it was confirmed as a belt of small bodies. He measured the diameter of Pluto. In the Martian atmosphere Kuiper detected carbon dioxide, but the absence of oxygen (1947). In the 1960s, Kuiper pioneered airborne infrared observing using a Convair 990 aircraft and served as chief scientist for the Ranger spacecraft crash-landing probes of the moon. By analyzing Ranger photographs, he identified landing sites on the lunar surface most suitable for safe manned landings.« Anthony Herman Gerard Fokker Died 23 Dec 1939 at age 49 (born 6 Apr 1890). Dutch-American airman and pioneer aircraft manufacturer who, having seen an airplane flight at age 16, was inspired to build his first airplane by age 20. This was a braced monoplane, the Spider he put assembled in an empty Zeppelin hangar in Baden-Baden, and flying it gained his pilot's licence. His first factory built many of Germany's WW I pursuit aircraft, and gained recognition, but at the end of the war was put out of business there by the treaty of Versailles. On 21 Jul 1919, he established a company for civil aircraft, in the Netherlands and subsequently started manufacturing in the U.S. He continued to influence airplane construction techniques, and adopted welded-steel tubing fusulage construction.« Fokker Dr.I Triplane: A World War One Legend, by Paul Leaman. - book suggestion. Georg Elias Müller Died 23 Dec 1934 at age 84 (born 20 Jul 1850). Georg Elias Nathanael Müller was a German psychologist whose research work encompassed four principal areas: psychophysical method, memory, thought psychology, and color perception theory. The psychophysics anticipated the color theory, which was founded on Hering. The memory work led into the thought psychology, which was founded on Herbart and Külpe. Whereas earlier in his career his published works lacked original data, he sharpened his approach and became known as the methodologist of psychological experimentation. The experiments carried out in his lab were the gold standard of experimental results. He was directed one of the major centres of psychological research at the University of Göttingen (1881-1921).« Pierre Janssen Died 23 Dec 1907 at age 83 (born 22 Feb 1824). Pierre-Jules-César Janssen was a French astronomer who in 1868 devised a method for observing solar prominences without an eclipse (an idea reached independently by Englishman Joseph Norman Lockyer). Janssen observed the total Sun eclipse in India (1868). Using a spectroscope, he proved that the solar prominences are gaseous, and identified the chromosphere as a gaseous envelope of the Sun. He noted an unknown yellow spectral line in the Sun in 1868, and told Lockyer (who subsequently recognized it as a new element he named helium, from Greek helios for sun). Janssen was the first to note the granular appearance of the Sun, regularly photographed it, and published a substantial solar atlas with 6000 photographs (1904).« more The Astronomer Jules Janssen: A Globetrotter of Celestial Physics, by Françoise Launay. - book suggestion. Sir (Joseph) Henry Gilbert Died 23 Dec 1901 at age 84 (born 1 Aug 1817). English chemist who as co-director with John Bennet Lawes of the Rothamsted Experimental Station, Hertfordshire, for over 50 years established a premier reputation for research at the first organized agricultural experimental station in the world. Their work applied skills in chemistry, meteorology, botany, animal and vegetable physiology, and geology to determine practical improvements for agricultural methods. They studied the nitrogen requirements of plants, how the element was taken up by plants, and the effects of nitrogen fertilizers on grain production and quality. In the 1840s, they initiated the manufacture of superphosphate fertilizer, one of their inventions.« James Cowles Prichard English physician and ethnologist who was among the first to argue that a single human species embraces all the world's races in Researches Into the Physical History of Man (1813). He was able to study sailors of many different races because his home was in the port town of Bristol. He later proposed a theory in a Treatise on Insanity and other Disorders affecting the Mind (1835) that moral insanity (psychopathic personality) was a distinct disease. Later he published on the legal questions of insanity (1842) was in 1845 moved to London as a commissioner of lunacy.«[Image right: Muck-a-tah-mish-a-kah-kaik, illustration by George Catlin, from Prichard's The Natural History of Man.] James Cowles Prichard's Anthropology: Remaking the Science of Man in Early Nineteenth Century Britain, by H. F. Augstein. - book suggestion. Thomas Robert Malthus Died 23 Dec 1834 at age 68 (born 13 Feb 1766). quotes English economist and demographer who can be regarded as a pioneer sociologist. He was one of the first to systematically analyze human society when he published his theories in An Essay on the Principle of Population. Malthus predicted population would always outrun the food supply and that would result in famine, disease or war to reduce the number of people. As Malthus observed the Industrial Revolution was causing a rapid increase in population, he indicated keeping improved social conditions would require imposing strict limits on reproduction. Reading the book inspired Charles Darwin to reflect upon the survival of the fittest individuals in the process of natural selection in evolving populations of any organism. Alfred Russell Wallace likewise acknowledged his theory was stimulated by the book by Malthus. (NPR audio).«[DSB gives birth date 13 Feb 1766. EB gives the range 14/17 Feb 1766.] Categories index: | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 1 | 2 | 3 | 4 | DECEMBER 23 – EVENTS – Science events on December 23rd Smallpox virus In 1993, the U.S. Centers for Disease Control, Atlanta, Georgia, announced that the smallpox virus stockpile would now not be destroyed. The last specimens of the virus to exist on Earth had been secured in storage in 600 frozen vials in Atlanta and Russia, ready to make vaccine should it ever again be necessary. This reversed an earlier decision for final destruction of the last remnants of smallpox with heat on 31 Dec of the same year. Scientists who wanted to continue research on the virus stopped the destruction plan. Smallpox (variola) had been one of the world's most dreaded plagues until 1977, when it was declared eradicated. Its name comes from the pockmarks on the skin that it caused. In 1986, the experimental airplane Voyager, piloted by Dick Rutan and Jeana Yeager, completed the first non-stop, round- the- world flight without refueling which began 14 Dec. It returned safely to Edwards Air Force Base in California after travelling 24,986 miles in 216 hours, at an average speed of 115.8 mph. For nine days they piloted the aircraft from a cramped 7.5-ft tall , 3.3-ft wide and under 3-ft. tall cockpit. Voyager's takeoff weight was more than 10 times the structural weight, but its drag was lower than almost any other powered aircraft. The aircraft's design and light-weight structural materials allowed it to carry an unprecedented amount of fuel. Their flight nearly doubled the previous distance record set in 1962 by a USAF Boeing B-52H. Times Beach dioxin In 1982, it was announced that the soil on unpaved roads of Times Beach, Missouri, USA contained dangerous levels of poisonous dioxin and its 2,800 residents were recommended to relocate. The dioxin came from industrial waste oil sprayed on the roads for dust control in 1972-73. The Centers for Disease Control (CDC) issued the health advisory report only a few weeks after the Environmental Protection Agency (EPA) had started to sample the soil. Analyses found dioxin at levels up to 127 parts per billion. By 22 Feb 1983, the EPA pledged $33 million from the government's Superfund for hazardous chemical cleanup to purchase the Times Beach property. The city was subsequently bulldozed and decontaminated.«[Image: Aerial view of Times Beach and the Meramec River.] In 1970, the construction of the World Trade Center in New York City reached 1353 feet high (411 m), its highest point. This was a complex of 7 buildings including twin 110-story towers, with 9 million sq.ft. of office space. The towers' design by architect Minoru Yamasaki used a steel frame with glass curtain walls. Observation decks at the top of the towers gave a view of 45 miles. The building had three vertical zones served by express elevators to skylobbies at the 41st and 74th floors and local elevators within the three zones. Once the highest skyscrapers in the world (until surpassed by the Sears Tower, Chicago), the twin towers were totally destroyed by fire 11 Sep 2001 by terrorists who crashed hijacked airliners into them. U.S. astronauts orbit the Moon In 1968, American astronauts on Apollo 8 became the first men to orbit the Moon. The three-man crew was Frank Borman (Commander), James A. Lovell, Jr. (Command Module Pilot) and William Anders (Lunar Module Pilot). Not only was this the first manned flight to and from the Moon, but Apollo 8 served to validate many of the technical procedures necessary to support upcoming lunar missions. During ten lunar orbits, the astronauts took star sightings to pinpoint landmarks, surveyed landing sites, took both still and motion pictures and made two television transmissions to Earth. It was also the world's first manned flight to escape the influence of Earth's gravity. Launched on 21 Dec 1968, the mission lasted 6 days 3 hours until recovery on 27 Dec 1968. In 1954, the first successful kidney transplant was carried out between identical twins by surgeons at Peter Bent Hospital, Boston, Mass. The kidney was donated to Richard Herrick, 23, by his identical twin, Ronald. The operation was led by Dr. John P. Merrill who had previously completed a series of nine kidney transplants, only to find they failed. He suspected they were rejected by the recipients' immune system. The identical twins presented an opportunity to test the hypothesis. Merill's team carried out an exchange of skin grafts between Richard and his twin brother. Finding the grafts were successful, the way was clear to carry out the kidney transplant. This time the surgery was successful, and Richard lived until 1962.[Image: Richard Herrick (right) and Ronald ten months after their surgery] Oppenheimer security clearance suspended In 1953, Dr. Robert Oppenheimer was notified that his security clearance had been suspended. (He had directed the Manhattan Project that produced the atomic bombs used during WW II). There were allegations questioning his trustworthiness for association with Communists. By telegram dated 29 Jan 1954, he requested a hearing. On 4 Mar 1954, he submitted his answer to the original notification. Within two weeks, the Commisssion informed him who would conduct the hearing, to be led by Gordon Gray. The hearing before the Gray Board began 12 Apr 1954. It returned a result on 29 Jun 1954 that by a vote of 4 to 1, it had made a decision against reinstating Dr. J. Robert Oppenheimer's access to classified information. American Prometheus: The Triumph and Tragedy of J. Robert Oppenheimer, by Kai Bird, Martin J. Sherwin. - book suggestion. Booklist for Robert Oppenheimer. Atlantic solo boat crossing l'Hérétiqueboat In 1952, Alain Bombard, a 27-yr-old French biologist and physician, completed a single-handed sea voyage across the Atlantic Ocean to test his theory that a shipwrecked person could survive without provisions. He reached Barbados after a 65 day journey during which he had eaten raw fish speared with a home-made harpoon, netted surface plankton. and drank seawater, limited to occasional sips. He had lost about 25-kg (55-lb) in weight. His Zodiac inflatable boat, l'Hérétique, was just 4.5 m (15-ft) long and fitted with a sail. Bombard began from the Canary Islands on 19 Oct 1952.« The Voyage of the Heretique, by Alain Bombard. - book suggestion. In 1947, the transistor was first demonstrated by Walter H. Brattain and John Bardeen to their higher-ups at Bell Laboratories. A microphone and headphones were connected to the transistor, and the device was actually spoken over "with no noticeable change in quality" as Brattain wrote in his notes about that day. The name transistor came from its electrical property known as trans-resistance. The original device, which the researchers first had working on 16 Dec 1947 was a point-contact version, which was later improved by William Schockley as a junction transistor. The inventors shared the 1956 Nobel prize in physics for their work. The transistor replaced the bulkier vacuum tube, and was referred to as the electronic engineer's dream.Image: the first point contact transistor. Australopithecus skull In 1924, Raymond Dart completed his work removing the first fossil skull of Australopithecus from its matrix of rock. Being one of "missing links" in man's evolution, Dart had taken exquisite care during 73 days to separate skull and stone, at work in his laboratory in Johannesburg, South Africa. Dart with his students made the find in the Taung limestone works in the Harts Valley of Bechuanaland. When an endocranial cast was found, at first it seemed to be just another primate skull. Then, Dart noticed how amazingly close to human it looked. Dart had discovered the Taung child, who was only three years old at the time of death. He named it Australopithecus africanus. (Australis means "south" and pithecus means "ape"). Steel railroad coach In 1907, the first U.S. all-steel passenger railroad coach was completed in Altoona, Pa. by the Pennsylvania Railroad Co. in its shop at Altoona, Pa. A previous design built there (1902-03) had a steel underframe and superstructure, a composite roof, and wooden window frames and sills.* Edison patent In 1870, Thomas A. Edison was issued a U.S. patent for an “Improvement in Magneto Electric Machines” (No. 222,881). The object of his improvement was to increase the effectiveness and cheapen the construction of the revolving armature. He designed the armature of a cylinder of wood with two iron heads between which fine iron wire was wound on the cylinder. At the ends of the cylinder, outside the iron heads there were disks of hard rubber or other insulating material, and the wires forming the induction helix are wound lengthwise of the cyclindres into notches in the edges of the disk. In 1854, a tsunami struck the coast of Japan. In the harbor of Simoda the water was agitated so that its depth varied between 8 and 40 feet. Twelve hours later this giant tidal wave reached the Pacific coast of the U.S. Notice of the earthquake waves was observedon newly installed self-registering tide gauges, a new technology at the time. The information derived from this event enabled Alexander D. Bache, Superintendent of the U.S. Coast and Geodetic Survey, to apply a newly derived law relating ocean depth to wave speed and provide the first relatively accurate scientific estimate of the depth of an ocean between Japan and the Pacific coast of the U.S. The velocity of the sea wave from Simoda to San Francisco was 369 mph. In 1834, the first U.S. patent for bellows was issued to J.R. Morrison of Springfield, Ohio (no patent number was assigned on patents of this time). The bellows were designed for smiths and furnace fires.* Benjamin Franklin experiment In 1750, Benjamin Franklin was severely shocked while electrocuting a turkey. Two days later, in a letter (25 Dec 1750) to his brother, John Franklin, he wrote “I have lately made an Experiment in Electricity that I desire never to repeat. ... being about to kill a Turkey by the Shock from two large Glass Jarrs containing as much electrical fire as forty common Phials, I inadvertently took the whole thro' my own Arms and Body.” He was distracted by talking among the Company present, who said “that the flash was very great and the crack as loud as a Pistol,” which he did not sense, but “I afterwards found it raised a round swelling where the fire enter'd as big as half a Pistol Bullet” due to the “Quickness of the Electrical Fire.” He admitted, “I am Ashamed to have been Guilty of so Notorious A Blunder.”« Benjamin Franklin: An American Life, by Walter Isaacson. - book suggestion. Booklist for Benjamin Franklin. Moon of Saturn In 1672, astronomer Giovanni Cassini discovered Saturn's moon Rhea, the fifth major satellite of Saturn, which may be one of the most heavily cratered satellites in the solar system. Its surface appears to be saturated with craters, but long, bright linear features can be seen on the trailing hemisphere and linear ridges can be seen in the leading hemisphere. These ancient features may record changes in Rhea's shape due to internal heating or cooling. Rhea is 950 miles (1500 km) in diameter. Its largest crater is 190 miles (300 km) in diameter. Cassini also discovered three more of Saturn's major moons—Iapetus, Tethys, and Dione. In 1675, he discovered that Saturn's rings are split largely into two parts by a narrow gap—known since as the “Cassini Division.”Image: photograph of Rhea taken by Voyager 1 in Nov 1980.
cc/2019-30/en_head_0021.json.gz/line1730281
__label__cc
0.517258
0.482742
Translation Agencies.com Latest news and language industry related topics The 10 Most Spoken Languages In The World Almost half of the world’s population claims one of only 10 languages as their mother tongue. So what are the top 10 languages of the world? You might be surprised. Determining what are the most spoken languages in the world is a more difficult task than you might imagine. We can say with some confidence that Mandarin, English, Spanish and Arabic will make an appearance (and roughly in what order) but there are some surprises, too! Would you have guessed that Bengali is in the Top 10 most spoken languages? One small caveat: Assigning hard data, in the form of “X million native speakers,” to any of these languages is practically impossible. What constitutes a language or a dialect, is hotly contested stuff. More troubling is the fact that what we refer to simply as “Chinese” is actually a whole family of languages conveniently lumped into a single category. “Hindi” is also used as a catchall term to cover numerous dialects and sub-dialects. We haven’t even yet acknowledged the unreliability of data sources, collected at different times by different institutions. But then again, who doesn’t love a good list? Here are the most spoken languages in the world: Numbers vary widely — Ethnologue puts the number of native speakers at almost 1.2 billion native speakers, roughly a billion of whom speak Mandarin — but there’s no doubt it’s the most spoken language in the world. If you wish to learn a language that one in six people in the world speak, this is the one for you. Seeing as Chinese is a tonal language that uses thousands of logograms, it will certainly keep you busy. If we were only to look at native speakers, Spanish has its nose in front of English with about 400 million speakers. If you want a language that will open up whole continents to you, Spanish is your best bet. As with all the languages on this list, the politics of language and associated identity are highly disputed: ask Catalan or Quechua speakers if Spanish is their local tongue and you will get a very different answer. But it is certainly the primary language of most of South and Central America, Spain, and, ahem, large swathes of the US. If you’re reading this article, you may be one of the 360 million-odd native English speakers, or one of the half a billion people who speak it as a second language. This indicates the remarkable success of English as the lingua franca of business, travel and international relations. The relative ease with which English can be picked up (especially compared with Chinese) and the pervasive soft power of US culture means that English will continue to dominate the world stage for the foreseeable future. For some, English is still synonymous with opportunity and a better quality of life. 4. Hindi India has 23 official languages, with Hindi/Urdu chief among them. Whether this is one language — Hindustani — or two dialects, is still fiercely debated. Spoken mainly in northern India and parts of Pakistan, Hindi uses devnagri script, while Urdu uses Persian notation. At the time of writing, the debate about its role in Indian education and society has once again flared up: Prime Minister Narendra Modi, a Hindu nationalist, is seeking to have Hindi displace English in the southern Indian states as the primary language of official communication and education, a strategy that has been met with resistance. If you ever travel in the Indian subcontinent, a little Hindi will get you a long way. Plus, this is the language that gave us shampoo, jungle, jodhpurs and bungalow — what’s not to love? 5. Arabic Recent numbers put Arabic at around 250 million native speakers. But this is another instance of numbers not telling the full tale: Arabic, like Chinese, is so vastly different in its respective dialects as to be effectively a number of languages, grouped as one for the sake of convenience. Modern Standard Arabic is a primarily written form, closely related to the Classical Arabic of the Quran. However, the spoken forms of Arabic in, say, Oman and Morocco are so different that a couple of philosophy professors from these countries might be able to discuss the finer points of the ancient texts while still struggling to order lunch. 6. Portuguese This is another language whose reach owes much to its colonial past. Starting in the 15th century, avid Portuguese traders and conquerors brought their language to Africa, Asia and the Americas. The spread of Portuguese may have initially been tied to European colonization, but the colonized countries developed their own vibrant cultures that transformed the language forever. Today, Portuguese is spoken by 215 million native speakers in countries like Brazil, Goa, Angola, Mozambique, Cape Verde, Guinea-Bisseau, São Tomé and Príncipe, and Macau. It’s also the language of Machado de Assis, Bossa Nova, Mia Couto, Fernando Pessoa, and Agualusa. 7. Bengali Admit it: you didn’t expect Bengali to be on the list of most spoken languages. The Partition of Bengal by the British in 1947 divided (mainly Hindu) West Bengal, now part of India, from its (mainly Muslim) counterpart East Bengal, now Bangladesh. It is the language of Kolkata, the Andaman Islands, fabulous sweets, and 170-odd million Bangladeshis — many of whom are extremely vulnerable to climate change. By the next century, the population is projected to double while 15% of the land area is expected to disappear below rising seas. 8. Russian With roughly 170 million native speakers as of 2010, Russian is the eighth most spoken language in the world. Famed for its inscrutable grammar and quite lovely Cyrillic script, it remains one of the six languages spoken in the UN, and produced the literary likes of Dostoyevsky, Nabokov, Chekhov, Gogol, Tolstoy and Pushkin. Almost all of the 130 million native Japanese speakers live in Japan — certainly the most highly geographically concentrated of all the languages on this list. Japanese boasts two distinct writing systems, hiragana and katakana, as well making extensive use of Chinese Kanji characters. The largest groups living outside Japan can be found in the US, the Philippines and Brazil. 10. Punjabi/Lahnda With varying estimates of around 100 million native speakers, last spot on the list goes to… Punjabi! (Sorry, German — you got dumped from top world languages a few years back.) Spoken in large tracts of India and Pakistan, the Punjab was sliced in two by the British when they left, and millions of people were forced to abandon their homes, businesses and families. But they’re slowly taking their revenge, Bollywood-style: Punjabi songs now account for 50% of chart-toppers. That’s a comeback if we’ve ever seen one. 12 november 2018 0 Why use Machine Translation Why use Machine Translation? It is helpful for quick translation; however, machine translation cannot replace qualified human translators. If the translation must be of a high quality standard, the job has to be done by a human translator. Most MT systems would be called gisting engines. They allow you get the gist of a text, roughly what is being said. The problem with machine translation is that it can never understand what is being written so can generate some pretty awful mistakes. An example of a phrase that MT would find difficult to translate might be the following text… “Single Colour Ink Cartridge” This phrase can have multiple meanings depending on the context. It can mean… a cartridge with a single colour. A red one, a blue one, a green one a cartridge that contains all colours. This printer takes a single colour ink cartridge. Only a professional translator can understand that the context is missing and important. Some companies use MT for cheap translation. The use of MT is a fast way to get a translation and can increase productivity of translators who may use the MT as a rough draft, i.e. pre-translation. They can then edit the MT translation afterwards. There are plenty of MT platforms, but the most famous machine translation platforms on the Internet are: Google Translate, Yahoo!, Babelfish, Reverso, and Bing Translator Another interesting example is the sentence “sharks swim in schools“. Type this into any of the current machine translation engines and translate it into French. All our tests show the example same result – literally that sharks swim in “schools” = “écoles”, where children go to learn. So lots of scared children and only bad translation. Free isn’t Free The old motto still holds true that anything free comes with a price. If you’d like to read more about free translation and our advice on getting the most from it visit these Free Translation Resources. Even the MT providers reckon that MT translations do not deliver superior quality: “Even today’s most sophisticated software, however, doesn’t approach the fluency of a native speaker or possess the skill of a professional translator. Automatic translation is very difficult, as the meaning of words depends on the context in which they’re used. While we are working on the problem, it may be some time before anyone can offer human quality translations.” SDL Trados Translation Memory FAQ’s When would I use a translation memory? Translation memories should be used by anyone who localizes content from one language into another. When a translator’s jobs regularly contain the same kinds of phrases and sentences, a translation memory will drastically increase the speed of translation. Translation memories are also very helpful when translating content out of context. An increasing number of organizations rely on Content Management Systems (CMS) to manage their information. A CMS allows individual blocks of text, rather than entire documents, to be created/edited and then published in a variety of different formats. A translation memory helps to make this process quicker and more consistent. How does a translation memory differ from a termbase? A translation memory stores segments of text as translation units. A segment can consist of a sentence or paragraph. The TM holds both the original and translated version of each segment for reuse. A termbase, on the other hand, is a searchable database that contains a list of multilingual terms and rules regarding their usage. A translation memory is typically used in conjunction with a termbase within SDL Trados Studio. How does translation memory software differ from machine translation? Machine translation refers to automated translation by a computer, without human input. Translation memory software requires human input as it reuses content that has been previously translated to complete new translation work. The original translation is performed by a professional translator. Machine translation may be used in conjunction with a translation memory to improve the speed of translation. For example, when a translation memory does not have enough information to complete a segment of text, SDL Language Cloud Machine Translation can be used to automatically complete the segment. The translator may then edit the machine translation and save the completed segment to the translation memory so it may be reused later. Can SDL translation memories work with many different file formats? Yes. SDL translation memories are used within SDL Trados Studio, which is compatible with a wide range of file formats. These include Microsoft Office, OpenOffice, RTF, Tab Delimited, HTML and XML. We also support complex formats like Adobe FrameMaker, Adobe InDesign/InDesign Markup Language (IDML) and InCopy Markup Language (ICML), PDF, XLIFF, and XML flavours such as DITA, Docbook and W3C ITS. Does SDL Trados Studio come pre-packed with translation memories? Translation memories are created from the completed translations of a translator, and are not pre-packaged with SDL Trados Studio. By translating within Studio or analysing previously translated content, a translation is built using your own work. How do I make a translation memory using my previous translations? SDL Trados Studio includes an Alignment feature which enables the creation of a translation memory by comparing original and translated documents you have completed in the past. This is a simple process and allows you to leverage all of your past work, even if you have never used Studio to translate before. How a translation memories saved? Translation memories are not kept within SDL Trados Studio – they are stored as the SDLTM file format. They may be stored locally or across a network. TAUS launches e-learning platform TAUS is proud to offer the TAUS eLearning Platform specifically tailored to the needs and demands of the professionals in the translation and localization industry. So far TAUS has trained and certified more than 2,000 language professionals through TAUS training courses. Recent breakthroughs in neural technology drive a great interest among corporations to train their workforce to meet the requirements of the age more than ever. On the other hand there is a keen interest among professionals to step up from the ‘one-quality-fits-all’ service delivery and acquire deeper skills in cultural adaptation. This demand has inspired TAUS to completely revamp its existing courses and carry them onto a brand-new eLearning Platform. On the TAUS eLearning Platform, TAUS offers not only various courses such as the Post-Editing/Reviewing Course and Quality Management Course, but also hosts an environment for the language professionals community where they can access latest TAUS reports, articles and engage in forum discussions. The TAUS eLearning Platform is designed to quickly capture learners’ attention and keep it with the state-of-the-art visual technology, and a professional voice-over. The modular structure of the courses allows learners to develop their skills effectively in a self-paced environment. The TAUS eLearning Platform can also be accessed through a mobile app where all course modules and self-study materials can be followed on-the-go. The TAUS eLearning Platform is an online and mobile training environment where taught skills are awarded with a certificate and a listing under TAUS Post-Editors Directory, a forum for global language professionals, a resource center for TAUS reports and best practices. New courses on technical and cultural aspects of translation will follow very soon. Visit https://elearning.taus.net/ to get an impression of the platform as well as more detail regarding the courses. ABOUT TAUS TAUS, the language data network, is an independent and neutral industry organization. We develop communities through a program of events and online user groups and by sharing knowledge, metrics and data that help all stakeholders in the translation industry develop a better service. We provide data services to buyers and providers of language and translation services.The shared knowledge and data help TAUS members decide on effective localization strategies. The metrics support more efficient processes and the normalization of quality evaluation. The data lead to improved translation automation.TAUS develops APIs that give members access to services like DQF, the Quality Dashboard and the TAUS Data Market through their own translation platforms and tools. TAUS metrics and data are already built in to most of the major translation technologies.
cc/2019-30/en_head_0021.json.gz/line1730284
__label__cc
0.653365
0.346635
HomePosts tagged 'friendship' August 4, 2018 uncaptivevoices death row, reports, solitary, writing ChrisYoung, death row, essay, execution, friendship, human rights, incarceratedwriters, justice, memoir, prisoners, tonyford Note: the following details several events that occurred on Texas Death Row the night before the state-sponsored murder of Christopher Young took place (on 7-17-2018). Back here on death row, the way that we are isolated makes conversation hard. Especially when you are not in the same section. On the side of the pod that I am housed we have three sections, A-C. On the other side of the pod, the other three sections are D-F. Each section is separated by a wall which separates each section’s 14 cells (7 cells on 1-row and 7 cells on 2-row) along with their day rooms, which are in front of the cells in that section. The only way into each section is through the crossover doors on 1 and 2-row and through the gate which leads into the section from the main floor. Inmates can talk with each other from day room to day room when we are allowed out at recreation, or we can attempt to yell at each other over the run, which is hard to do when there are other people attempting to talk in your section, or if someone has music playing particularly loud. Every now and then you will have inmates show some courtesy and allow someone to speak freely without interruptions or interference with other noises. The last few weeks, death row has been on lockdown, which means that we are locked inside our cells 24 hours a day. The only time that we are allowed out during this time is if we get a visit or are taken to Medical. For 3 days out of the week we are given a shower. Otherwise, we are locked in these cages (cells). So, because of this lockdown, a lot of the conversations that we have had to conduct with Chris was over the run. The main people that he talks with are Damon Matthews, who is over in B Section 1-row, Perry Williams who is in the same section that I am in, but he is on 1-row while I am upstairs on 2-row, and Ricky Cummings who is next door to Perry on 1-row in C section. The other people that Chris would like to talk to, but is not able to, are over on the other side. Anthony Medina and Rob Will who are over in D section, and Tomas Gallo and Jeff Prible who are in E section. And then there is Obie Weathers who is over in F section. Now because of the lockdown we have to pass messages over to the other side usually when the door to the crossover is being opened, or if someone from another section is placed in the shower in our section. The night before Chris’ scheduled execution date courtesy was in full swing, allowing for conversation through the night. There was some crying and there was some laughing as we each took turns telling stories from our past together–reliving good times and bad times back here. Some time through the night, a female guard, who is new, came through with the Cleanup Squad– population inmates tasks with cleaning the floors and showers on death row. When she entered death watch (which is A section, where Chris is housed) a situation occurred where she had words with another inmate, and because she wasn’t sure of who it was, she just selected someone. And that ‘someone’ that she selected was Chris. Those of us who were talking with Chris didn’t understand what was going on. All we were told from Chris when he resumed conversation was that he believed that he was about to get gassed and that he loved us! That was all, so we were literally stunned as to this turn of events! I mean, one minute we were talking about how wonderful it would be for Chris to be able to have his daughter, along with Laurence and his Aunt Valerie, up at the radio station KPFT in Houston, on Bobby Phats’ show called “The Groove”, where a painting of Prince would be presented to Bobby Phats from Chris cause he knew that Prince is Bobby’s favorite artist. Now this?! Now Chris is about to be possibly gassed and ran in on by a five-man team of guards in riot gear–who would no doubt beat and hurt him?! When were we talking about his hope that he would get to meet the victim’s son, Mitesh Patel, and NOW THIS?! In the intervening moments that went by, every time that we seen a guard who works the pod, we would inquire about what was going on, only to be told that, “Chris threatened a guard”. We kept saying, “No, he didn’t” and “We was just talkin’ with him”. Then, Chris calls out to us that he has asked for rank to come down. We asked him to tell us what is happening and he said, “Hold tight! I’ll get back with you all!”, and then he was gone again. It was eerily quiet. As if everyone was holding their breath. But I could tell that the tension was building for all of us who love Chris. Without anything needing to be said, I knew that everyone who normally talks with Chris was getting ready to possibly be gassed along with him! This is something that he would not have wanted, but it is something that would have happened, cause the love and solidarity that we have with/for Chris would have dictated nothing less! In the meantime, while trying to find out what was going on, we were watching the doors to the pod to see if a team was coming or if the rank was going to come down. At the same time, we were trying to get messages to the other side to let the guys over there know what’s going on. Once the rank came down, first it was Sergeant Steele from what we learned later, the conversation went something like this: Sgt. Steele: “Chris, why did you threaten my officer?” Chris replied: “Look, I give you my word, cause my word is my bond, that I didn’t say anything to that guard!” Sgt. Steele answered: “You are JUST an inmate. I’ll side with my officer ALWAYS.” Chris then said: “Then why are we even talking? I gave you my word that I didn’t say anything to her. There’s nothing more to say. Do what you do. No matter of fact. Why don’t you call Lieutenant Couch, cause talking with you is useless!” Sgt. Steele then left. Around this time, other people in their various sections started to become aware of what was going on and so the tension on the pod rose even more, with some of the guys getting belligerent and making declarations of their own of what they would do if something happened to Chris. This didn’t and wouldn’t make things easier, so where we could– namely myself on this side and Tomas on the other side– we started telling guys to leave it alone and to chill until we could find out what is happening. Cause things could go from bad to worse real quick if the guards get scared. When they get scared, they react. If they had guns instead of canisters of gas, there would be a lot of dead inmates, specifically black and Mexican ones! And despite how things was looking, I know that those of us in Chris’ inner circle wanted a peaceful resolution to the situation that was happening over in death watch–no matter who that situation was happening with. But as is the case with death watch now, and as is the case with death row, many of the guards walk through death row as if many of us have personally done something to them. It is hard to talk with them. And many of the senior guards, who are supposed to keep the younger, newer guards in line, just don’t. So what you have are guards who will purposely walk through death watch with an antagonistic attitude, trying to provoke the men over there. This was the case on this night. When Lt. Couch came down he spoke with Chris. Because of their history, which at first was not very good, but as Chris changed into a more positive person the belief was that their past personal feuds was settled and left where they belong– in the past. However, that was the first thing that Lt. Couch brought up, the past, and so Chris said to him, “I thought we was past all of that? Yet you throw that in my face again, while I am trying to resolve this situation?” And even as Chris is saying this, we learned later that the person who did get into it with the guard kept saying, “WHY ARE YOU MESSING WITH CHRIS?! I AM THE ONE SHE HAD WORDS WITH!”. Showing that some guards, whether they be new, old, ranking officer, or whatever just wanted to start shit with Chris, and possibly have a use of force against him one more time! I guess for “good ol’ time’s sake”! Fortunately, Lt. Couch continued to talk with Chris. And as he did, Chris asked him to just look into the situation and he would see that he never said anything to the guard who was accusing him of threatening her. What ended up transpiring, when the situation was finally looked into, is that it was revealed that if the guards working the pod, or Sgt. Steele, had just asked the guard who accused Chris of threatening her, they would have found out that it wasn’t him. She clarified who it was. Because she is new, she couldn’t identify who it was by name and so she ‘guessed’ that it was his cell! The situation was resolved without Chris having to get gassed and ran in on by the five-man team. Still, we was pissed cause it is something that never should have happened! After they (guards) were finished in death watch, we was able to talk with Chris and find out what happened. But, he didn’t want to focus on that. He wanted us to get back to the things that was important to him. And that wasn’t one of them. So, despite the things that had occurred and the things that was threatened against him, Chris had us laughing again. Taking our minds away from that situation and helping each of us to try and come to terms, as best we could, with what might happen the next day. The day of Chris’ scheduled execution date and the events of the night before couldn’t have been more different than day and night! I had a wonderful visit with Chris’ Aunt Valerie. Chris was able to meet Mr. Patel face to face, in a visit that TDCJ tried too hard to prevent. Yet, it happened as both of them had long been wishing. A few of the brothers in Chris’ inner circle was fortunate enough to be able to listen to the radio program “The Groove” hosted by Bobby Phats over on KPFT. So, we were able to hear his daughter Crishelle speak over the radio, along with his Aunt Valerie and good friend Laurence, who presented Bobby with the painting of Prince that Chris did. And in between music breaks, we would talk over the run saying how wonderful everything was going. A whole bunch of “ALREADY JASIRI!!!”, calling him by his adopted African name. The night, into the early morning, turned into one of celebration. Celebrating Chris. Showing him the love and respect that he so richly deserved. And shouting out our love to him as he was escorted from the pod to his final visits with his family. The final day of Chris’ life would have been vastly different had the events of the night before been allowed to happen. But, because of Chris, it was resolved. Things was resolved in a manner that shows who he is. Something that the parole board rejected. But something that those of us who know him fully understand: Chris is a truly GOOD MAN that the state of Texas took away from us and his family. Still, his goodness and positivity will always be remembered. We all love and miss you, lil’ brother! In Strength and In Spirit! Tony Egbuna Ford Looking for a pen-friend this Valentine’s Day? We know a few people! February 12, 2017 February 12, 2017 uncaptivevoices pen pals friendship, pen pal, prisoner support, prisoners, solidarity, texas, uncaptivevoices, valentines Many of the incarcerated artists and writers we work with are looking for friends, and especially friends from the United States. We hope you will check out the pen pal profiles on our page and make 2017 a better year for someone! Check out a few of the pictures below and then find more information and explore more pages under “Pen Pal Connection”! You may also look for pen pals on these websites: http://www.writeaprisoner.com http://www.blackandpink.org/pen-pals/ Just in time for the holidays–pen pals, prisoner support, and books!! November 26, 2016 uncaptivevoices books, death row, pen pals, recommended reading, support abolition, books, death row, freenanonwilliams, friendship, houston, human rights, justice, pen pal, prison, prisoners, prisonersupport, writing, wrongfulconviction In order to encourage spreading love and friendship this holiday season, we have re-posted our pen pal connection page for our friends on the inside. Many of the people listed are in solitary confinement and/or have no family support. Here are three people who have recently been added or updated: Kenneth-Conrad Vodochodsky Gerald Marshall Ronald Hamilton We also recommend checking out the links to other pen pal sites on the right hand side of our page!! Since this is our holiday season post, here are a few more things: We have two holiday wishes this year; the first is that you join abolitionists in Houston for a yearly holiday card signing and get-together. We will have pen pal info here as well. See the event here: Holiday cards to Death Row The second wish is that our contributor Nanon Williams will come home soon. Ballistic experts have stated that Nanon was not the shooter in this Houston case from 1992, and his conviction has been overturned several times, but the appeals court has blocked his release. We are asking you to help show that his life matters and encourage Texas politicians and the new Houston DA Kim Ogg to bring him home. Nanon should not die in prison, or spend another year, month or day wrongfully incarcerated!! See petition below: Bring Nanon Williams Home Two great books worth buying this month: .Brian Stolarz, who helped innocent man Alfred Brown get off of TX death row, has written an incredibly interesting book about the case, trial, and struggle to bring him home. It is frankly hard to put down: Grace and Justice on Death Row . Gerald Marshall and several other Texas death row inmates recently contributed to a book of poetry and art that is now available: Creativity in the Midst of Chaos: Poetry and Art from Texas Death Row Look out for some more posts coming soon! Out of Sight, Out of Mind: A Convict’s Analysis on the Maintenance of Relationships While Incarcerated May 30, 2016 uncaptivevoices essay, writing friendship, incarceration, isolation, prison, prisoners, relationships, writing By Sean Adams, Briscoe Unit,Texas Throughout my life, friendships have been how I’ve measured success. Not as to how many friends I could collect, as is the trend in the age of social media, but rather in the mind frame that if I’m going to cut for you, to call you a friend, we have now formed a bond that would never be broken. These types of relationships were not forged right away, rather they were earned through sharing not just the good times, but the bad. Enduring experiences together that not only shaped our friendship but also ourselves. It was these experiences that made me open my heart and pledge my loyalty to this person. From that point on nothing but the ultimate betrayal could shake, sway, or shatter that love. These were principles on which I based my life. But as I’ve been gone almost half a decade now, with a few years left til I have a chance at coming home, a new form of doubt grew from quiet whispers in the back of my head to resounding echos in the forefront of my mind. How are you able to maintain these relationships when you are no longer physically present, and expect them to maintain that strength of love? How long can you ride on the memories of days gone by before people get tired of living in the past and move on? When I posed this question to a friend of mine I offered him a parable: Imagine that as a child you had two best friends with whom you were inseparable. You grew up on the same street, went to the same school, and did the same activities. However, several years pass and one of the friends moves away and starts going to a different school,(different friends, different setting.) Despite all those critical years spent together, in due time, who do you find yourself closer to? The one who continued to go through the journey of life with you, or the one who moved away? The answer is obvious; it was not out of loss of love that your other friend was relegated from a crucial part of your life to just a flicker of a memory of times past. The change is never meant as an act of maliciousness or spite, but rather that of the wise old saying “Out of sight, out of mind.” Since being locked up no phrase has ever rang truer or had a more personal meaning to me. It seems that everything that could have happened did. People grew old. Some died, too often before their times. Flings turned into romances and grew into marriages and families. People who were barely eking out a living, and shacking up in warehouses with half a dozen other people, now have careers and have been approved for loans to buy their first house. All these things I was resigned to hear about through letters and two hour visits. They are always accompanied by the bittersweet feeling of happiness for their accomplishments, and sadness for not being there to share my joy with them. The more I heard, the more I felt disconnected, impotent even. Where was I in all of this? What role did I play? I suddenly felt like a grown up returning to their hometown and listening to a parent fill them in on all of the happenings of the friends you left behind. “Oh, Jimmy got married” or “Sally got a job out of state”, and “Becky passed away a couple years ago”–overwhelmed as you try to digest it all. These are my fears of returning to a world that has changed so much that it is as if you were never there in the first place. My experience is not a common one, in that after all these years I still get at least a few letters a month, and maybe a visit every two or three. Surely it pales in comparison to the flood of mail and visits I got when I first got locked up. Over time, three or four letters a day became three to four a week, to three to four a month, and visits crowded with friends every week became solitary occasions sporadically spaced out. But still, I’m incredibly lucky that I have people like that out there for me. I’d like to think it’s due in part to the bonds I’ve built all my life. With every passing year, I can’t help but wonder how long these bonds will be able to endure the strain. It’s easy when you are in here to forget life still goes on out there, even to the point of lying to ourselves. We wonder why people can’t find the time to visit, or write, send money, or pick up the phone; our minds run rampant with outrageous scenarios as to why, but the plain and simple truth is that people have lives out there, with full time jobs, bills to pay, people to take care of, and their own personal needs, which a lot of times they find themselves putting dead last. It’s not that they are purposefully not thinking of us, but rather they’re trying to take care of the things in front of them on a daily basis. Like I said, “Out of sight, out of mind”. With a logical explanation you would think you could easily dismiss such fears of being forgotten, but the world is not a logical place. I wonder, “If the world has moved on so much, what will it be like returning to it?”, or if that is even as desirable a prospect as it once was. I’m more scared of losing what I love out there than anything I’ve experienced, or will face, in here. But rather than wallow in lament and self-pity, I try to be proactive in my situation. Every week I go through my lists of addresses and think to myself about whom I haven’t written in a while. Even if I haven’t heard from them, I still make it a point to write, because the best way to fight “Out of sight, out of mind” is to keep yourself in their lives the best way you can. Letters of love, support, and keeping them abreast of what I’m up to is almost the same as being there. I’d be ignorant to think that all of the sudden these people wouldn’t want to hear from me. An unexpected letter in the mailbox has the same effect as dropping by for a surprise visit, except the conversation is one-sided. I’ve invested too much time, love, and memories with my friends to let them go without a fight. While I live in a state of caution as to what the next day might bring, or what news the next letter or visit might bare, as long as I have breath in my lungs I won’t disappear– for my friends’, as well as my own, sake. Sean Adams, #1850164, March 2016
cc/2019-30/en_head_0021.json.gz/line1730290
__label__cc
0.602004
0.397996
During Poroshenko's meetings people are beaten up and journalists are forcibly removed During the past week the current President and presidential candidate Petro Poroshenko made several trips to regions, within the framework of which he held regional development council meetings and campaign meetings with voters. In particular, Poroshenko visited Zhytomyr (March 11th), Chernigov (March 13th), Volyn region (March 14th), Transcarpathia (March 15h), and Poltava (March 16th). As a rule, the centralized transportation of participants to the campaign meetings of the candidate Poroshenko is carried out. The meetings happen in an especially fenced off area guarded by the police, who only allow people whose names are in pre-made lists to enter. Ordinary voters, as well as journalists and official observers from "Uspishna Varta" are not allowed to access Poroshenko's meetings. During the week incidents were recorded where people who try to ask him uncomfortable questions are forcefully removed from the electoral rallies of Poroshenko by police officers and even beaten up by unknown people. The police do not intervene in what is happening. Thus, on March 14th the police in Kovel detained a journalist from the "AVERS" TV channel, which was covering the meeting of President Petro Poroshenko. A video posted online shows how a woman with a camera and the ID card of a journalist around her neck is taken away from the square by force. In the video it is seen that the woman showed her journalistic credentials to the police. On March 16th, at a campaign rally held by the candidate Poroshenko in Uzhgorod, unknown persons beat somebody up and forcefully took them away in an unknown direction after they shouted a question that is inconvenient for the President. Witnesses also recorded on video how several others were removed from the meeting by force. The video was published by the well-known blogger Anatoly Shary, who previously launched a flash mob featuring a question to the President Poroshenko ("Petro Alekseyevich, why do you pursue Anatoly Shary?"). In the video it is seen that representatives of law enforcement bodies are at the meeting, however they don't react to offenses in any way. During the incident, the candidate Poroshenko continued his election speech from the stage. In addition, as was previously reported by "Uspishna Varta", the police did not allow a group of Ukrainians, who travelled especially to meet the President, to access the place of the campaign rally of the candidate Poroshenko in Khust (Transcarpathian region). On March 16th, before the campaign rally of President Poroshenko in Poltava, the police detained representatives of the right-wing radical groups "National Corpus" and "National Druzhina", who threw soft toys in the form of pigs at police officers. Recall that as was pointed out by "Uspishna Varta" in the interim report on the observation of the 2019 presidential elections, there are frequent cases of social network users, who allegedly wanted to influence the electoral process, being searched and detained in connection with the start of the electoral campaign in Ukraine. In most cases, the Security Service of Ukraine does not disclose the identity of the detainees. Расскажите друзьям. Пусть они тоже знают больше о реальной ситуации с правами человека в Украине! Vasily Muravitsky: 95% of persons accused under political articles choose to reach a deal with the investigation The Zhytomyr journalist Vasily Muravitsky was detained by the SBU in August, 2017 on charges of state treason, assisting terrorism, and infringing on ... Journalists continue to die in Ukraine. Political and civil rights in Ukraine. June 10 - 23, 2019 Political and civil rights in Ukraine. June 10 - 23, 2019 THE RIGHT TO FREEDOM OF EXPRESSION AND OPINION On June 20th the Cherkassy journalist Vadim K ... The first voter bribing schemes were recorded in Ukraine Two weeks after the electoral campaign in Ukraine for the presidential post started, the first schemes for bribing voters for the elections in March 2 ...
cc/2019-30/en_head_0021.json.gz/line1730293
__label__wiki
0.960241
0.960241
Former Google Chief to Chair Government Artificial Intelligence Advisory Group By Debbie Gregory. Eric Schmidt will join 14 other tech experts on the National Security Commission on Artificial Intelligence. The commission, created by the 2019 National Defense Authorization Act, will advise government on the national security implications of artificial intelligence and how to maintain U.S. dominance in the tech’s increasingly competitive market. The group is eligible for up to $10 million in funding through fiscal 2020. Former Alphabet Chief Executive Eric Schmidt will head the group, and former Deputy Defense Secretary Robert Work will serve as vice chairman. Commissioners were appointed by the secretaries of Defense and Commerce, as well as the top Republicans and Democrats on congressional armed services, commerce and intelligence committees. Other members include: • Andy Jassy, CEO of Amazon Web Services • Safra Catz, CEO of Oracle • Chris Darby, CEO of In-Q-Tel • Jason Matheny, former IARPA director • Eric Horvitz, director of Microsoft Research Labs • Mignon Clyburn, Open Society Foundation fellow and former FCC commissioner • Andrew Moore, head of Google Cloud AI • Steve Chien, supervisor of the AI Group at Caltech’s Jet Propulsion Lab • Ken Ford, CEO of the Florida Institute for Human and Machine Cognition • Jose-Marie Griffiths, president of Dakota State University • Gilman Louie, partner at Alsop Louie Partners • William Mark, director of SRI’s Information and Computing Sciences Division • Katharina McFarland, consultant at Cypress International The commission is required by law to review the state of artificial intelligence in the U.S. and draft multiple reports on how the government could advance the technology. Among the group’s areas of interest are research funding, workforce reskilling and AI ethics. Per the NDAA, the commission is supposed to have its first report published by early February. “Artificial intelligence will have an enormous impact on our future economic and military competitiveness,” Work said in a statement. “I look forward to working with Eric Schmidt and the other distinguished commissioners on how best to exploit this rapidly improving technology for the betterment of our citizens, economy and security.” Blog Alphabet Chief Executive, artificial intelligence, Deputy Defense Secretary, Eric Schmidt, Google Chief, National Defense Authorization Act, National Security Commission, Robert Work
cc/2019-30/en_head_0021.json.gz/line1730297
__label__wiki
0.565327
0.565327
Justia Patents Disclosed Amino Acid Sequence Derived From VirusUS Patent Application for INFLUENZA HEMAGGLUTININ PROTEINS AND METHODS OF USE THEREOF Patent Application (Application #20150056233) INFLUENZA HEMAGGLUTININ PROTEINS AND METHODS OF USE THEREOF In some embodiments the present invention provides influenza hemagglutinin (“HA”) polypeptides, proteins, and protein complexes that comprise a stalk domain that is engineered to facilitate maintenance of its native trimeric conformation, even if the head domain of the HA protein is removed or disrupted. In some embodiments, the present invention provides compositions comprising such polypeptides, proteins, and protein complexes, and methods of use of such proteins and compositions, for example as vaccine immunogens. This application claims the benefit of U.S. Provisional Patent Application No. 61/861,989, filed Aug. 3, 2013, the contents of which are hereby incorporated by reference. The instant application contains a Sequence Listing which has been submitted electronically in ASCII format and is hereby incorporated by reference in its entirety. Said ASCII copy, created on Aug. 1, 2014, is named Avatar—006_US2_Sequence_Listing.txt and is 411,982 bytes in size. COPYRIGHT AND INCORPORATION BY REFERENCE A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. For the purposes of only those jurisdictions that permit incorporation by reference, the text of all documents cited herein is hereby incorporated by reference in its entirety. The US and world populations continue to be at risk of a pandemic influenza outbreak, analogous to the 1918 Spanish (H1N1) outbreak that killed more than 50 million people. Similarly, weaponized influenza virus remains a major bio-warfare threat. Furthermore, antigenic drift requires individuals seeking protection against influenza to be vaccinated annually, and recent studies have shown that seasonal vaccine products are only weakly efficacious if a mismatch occurs between vaccination strains and circulating strains. The development of an effective universal influenza vaccine that provides protection across strains of influenza virus would be of enormous value. Evidence that antibodies specific for the conserved stalk domain of the influenza HA protein can protect against infection has prompted a concerted effort to identify additional and better monoclonal antibodies, and to develop a protective vaccine to address this significant unmet medical and public health need. Some aspects of the present invention are summarized below. Additional aspects are described in the Detailed Description of the Invention, the Examples, the Figures and the Claims sections of the present patent application. The influenza HA protein is known to induce potent neutralizing antibodies that correlate with protection against influenza virus infection. Most existing influenza virus vaccines provide protection based on the generation of antibodies against the highly variable, immunodominant, head domain of the influenza HA protein. However, the head domain is often strain-specific so such vaccines are generally only effective against homologous influenza strains, and do not provide protection against other forms of influenza virus, such as homologous drift variants and heterologous strains. Recently it has been shown that the stalk domain of influenza HA can elicit antibodies that react across influenza virus subtypes, due to the more conserved structure of the stalk domain and the presence of epitopes presented on the conserved stalk. Also, potent neutralizing antibodies (nAbs) have been isolated that specifically bind to the native trimeric conformation of the stalk domain. However, the stalk domain becomes highly unstable and readily transitions to a non-native conformation or disassembles upon removal of the HA head domain—limiting usefulness of the stalk domain on its own (e.g. without the head domain) as a vaccine immunogen. An influenza HA protein having a stalk domain stabilized in its native trimeric conformation could be very valuable—providing a candidate influenza vaccine immunogen capable of providing protection across influenza virus strains. Similarly, such a stabilized influenza HA protein could also be useful for the generation of antibodies, such as diagnostic and therapeutic antibodies. Based on an extensive analysis of the structure of the influenza HA protein, the present invention provides a variety of novel design strategies and novel constructs to stabilize or “lock” the stalk domain of the influenza HA protein in its native trimeric conformation. The present invention also provides a variety of engineered influenza HA polypeptides, proteins, and/or protein complexes, such as those that comprise one or more targeted cross-links (such as di-tyrosine cross-links), one or more to-tyrosine mutations, and/or one or more artificially-introduced protease cleavage sites/motifs. The engineered HA influenza HA polypeptides, proteins, and/or protein complexes of the invention can be made using any suitable influenza HA polypeptide or protein as a starting point. For example, an influenza HA sequence from any influenza type, sub-type, or strain can be used as a starting point for generation of the engineered products described herein. In many of the embodiments described herein, the influenza strain Puerto Rico/8/1934 or “PR8” (which is a strain of the H1N1 influenza subtype of influenza A) was used as the starting point. The amino acid sequence of a wild-type PR8 strain is provided in FIG. 9 (SEQ ID NO: 1). However, any other influenza HA sequence from any other influenza type, sub-type, or strain could equally be used. Non-limiting examples of other influenza HA sequences that can be used as the starting point for generating the engineered HA products described herein include, but are not limited to, those illustrated in FIGS. 55, 56, 57, 58, 59, and 60, and those having the sequences of SEQ ID NO:s 80, 81, 82, 83, 84, 85, 111, 112, 113, 114, and 115. Similarly, codon optimized versions of the nucleotide sequences that encode influenza HA proteins can be used as starting points for the generation of the engineered HA products described herein. Non-limiting examples of codon-optimized HA sequences from the PR8 influenza strain include those having the sequences of SEQ ID NO:s 63, 64, 65, 66, 67, and 68. In some embodiments, the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise one or more targeted cross-links in their stalk domain which serve to stabilize or “lock” the stalk domain in its native trimeric conformation. In some embodiments such targeted cross-links are di-tyrosine cross-links. In some embodiments, the present invention provides an influenza HA protein complex comprising a trimeric stalk domain formed by the association of three protomers, wherein the stalk domain comprises one or more targeted cross-links, such as di-tyrosine cross-links, that stabilize the stalk domain in its native trimeric conformation. In some such embodiments, the influenza HA protein complex further comprises one or more cross-links in the influenza HA head domain. In some such embodiments, the influenza HA protein complex does not comprise an intact head domain. In embodiments where di-tyrosine cross-links are used, such cross-links can be made between two tyrosine residues that are naturally present in an HA polypeptide, protein, and/or protein complex, or between two tyrosine residues that have been introduced by mutation, or between a first tyrosine residue that is naturally present in an HA polypeptide, protein, and/or protein complex and a second tyrosine residue that has been introduced by mutation. In some embodiments, the present invention also provides influenza HA polypeptides, proteins, and/or protein complexes that comprise one or more “to-tyrosine” mutations in the HA stalk domain at locations that have been determined to be desirable locations for the formation of di-tyrosine cross-links to stabilize the stalk domain in its native trimeric conformation. In some embodiments, the influenza HA polypeptides, proteins, and/or protein complexes of the invention (whether containing targeted cross-links (such as di-tyrosine cross-links), or to-tyrosine mutations, or both) are full length HA proteins comprising both the HA stalk domain (with or without the signal peptide) and the HA head domain, and optionally also the HA transmembrane domain. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention lack one or more of the HA head domain, the transmembrane domain, and/or the signal peptide. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention comprise the HA stalk domain, or at least a portion of the HA stalk domain that is sufficient to assemble into, or form a part of, the normal trimeric stalk conformation. Thus, in some embodiments, it may be possible to remove, add, or substitute certain HA stalk domain amino acids without compromising the ability of the HA polypeptide or protein to assemble into its trimeric conformation. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise to-tyrosine mutations at one or more of amino acid positions 403, 406, 411, 422, 429, 432, 433, and 435, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to SEQ ID NO: 1. Non-limiting examples of influenza HA amino acid sequences that comprise one or more of such to-tyrosine mutations include SEQ ID NOs: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 86, 87, 88, 89, 90, 91, 92, 93, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109 and 110. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise di-tyrosine cross-links between one or more pairs of amino acids selected from the following amino acid positions: 308, 403, 406, 411, 422, 429, 432, 433, 435, and 437, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to SEQ ID NO: 1. In some embodiments, the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise one or more artificially-introduced protease cleavage sites that can be used to proteolytically remove the head domain of an HA polypeptide, protein, and/or protein complex. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise one or more artificially-introduced protease cleavage sites inserted after (e.g. immediately after) amino acid positions 48, 63, 228, 278, 282, 283, 286, and 291, where such amino acid numbering is based upon the sequence shown in SEQ ID NO: 1, or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. Non-limiting examples of influenza HA amino acid sequences that comprise one or more of such artificially-introduced protease cleavage sites include SEQ ID NOs: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, and 30. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise at least one pair of artificially-introduced protease cleavage sites, such that cleavage at both of the pair of cleavage sites will result in removal of the HA head domain. Non-limiting examples of influenza HA amino acid sequences that comprise a pair of such artificially-introduced protease cleavage sites include SEQ ID NOs: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 26, 27, 28, 29, and 30. In some such embodiments, where there are a pair of artificially-introduced protease cleavage sites, the first such protease cleavage site is inserted after (e.g. immediately after) amino acid position 48 or 63, and the second such protease cleavage site is inserted after (e.g. immediately after) amino acid position 228, 278, 282, 283, 286, or 291, where such amino acid numbering is based upon the sequence shown in SEQ ID NO: 1, or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments, the present invention also provides influenza HA stalk domain polypeptides, proteins, and/or protein complexes that do not comprise an intact HA head domain, such as those generated by proteolytic removal of the influenza HA head domain, for example by cleavage at one or more of the artificially-introduced protease cleavage sites described herein. The stalk domain sequences of influenza HA are discontinuous because the HA protein comprises an N-terminal region comprising stalk domain sequences, followed by a middle region comprising head domain sequences, followed by a C-terminal region comprising additional stalk domain sequences. Accordingly, in some embodiments, proteolytic cleavage/removal of the HA head domain results in the generation of two stalk domain polypeptide fragments—an N-terminal fragment and a C-terminal fragment. In some embodiments the present invention provides such N- and C-terminal stalk domain polypeptides, and/or polypeptides, proteins, or protein complexes that comprise such N- and C-terminal stalk domain polypeptides. In some embodiments such N- and C-terminal stalk domain polypeptides are present in an HA stalk domain protein complex having a native trimeric stalk domain conformation. Non-limiting examples of influenza HA N-terminal stalk domain polypeptides include SEQ ID NOs: 94 and 95. Non-limiting examples of influenza HA C-terminal stalk domain polypeptides include SEQ ID NOs: 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, and 117. A further non-limiting example of an influenza HA N-terminal stalk domain polypeptide is one that consists of, consists essentially of, or comprises, amino acids 1-228 of SEQ ID NO: 117, or amino acids 229 to 519 of SEQ ID NO: 1. In some embodiments the influenza HA N-terminal stalk domain polypeptide comprises one or more to-tyrosine mutations, for example at one or more of positions 403, 406, 411, 422, 429, 432, 433, or 435 of SEQ ID NO: 1, or positions corresponding thereto (for example as determined by alignment to SEQ ID NO: 1) or at one or more of positions 112, 115, 120, 131, 137, 141, 142, or 144 of SEQ ID NO: 117, or positions corresponding thereto (for example as determined by alignment to SEQ ID NO: 117). In some embodiments, the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise both (a) one or more targeted cross-links, such as di-tyrosine cross-links in their stalk domain which serve to stabilize or “lock” the stalk domain in its native trimeric conformation, and/or one or more “to-tyrosine” mutations in the HA stalk domain at locations that have been determined to be desirable locations for the formation of di-tyrosine cross-links to stabilize the stalk domain in its native trimeric conformation, for example as described above and elsewhere throughout the present patent specification, and (b) one or more artificially-introduced protease cleavage sites that can be used to proteolytically remove the head domain of the HA polypeptide, protein, and/or protein complex, for example as described above and elsewhere throughout the present patent specification. In some embodiments, the present invention provides an influenza HA polypeptide, protein or protein complex that comprises: (a) a trimeric stalk domain that comprises one or more to-tyrosine mutations, and (b) a head domain that comprises one or more artificially-introduced protease recognition motifs. Non-limiting examples of influenza HA amino acid sequences that comprise both a to-tyrosine mutation and an artificially-introduced protease cleavage site include SEQ ID NOs: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, and 17. In addition, any of the to-tyrosine mutations and protease cleave site insertions described or illustrated herein can be combined in the same HA polypeptide, protein, or protein complex. In some embodiments, the present invention provides an influenza HA protein complex that comprises: (a) a trimeric stalk domain formed by the association of three protomers, wherein the stalk domain comprises one or more artificially-introduced targeted cross links, such as di-tyrosine cross-links (for example, to stabilize the stalk domain in its native trimeric conformation), and (b) a head domain that comprises one or more artificially-introduced protease recognition motifs. In some embodiments, the present invention provides a method of making a headless influenza HA polypeptide, protein or protein complex, the method comprising: (a) obtaining or expressing an influenza HA protein comprising (i) a stalk domain and (ii) a head domain containing one or more artificially-introduced protease recognition motifs, (b) allowing the soluble influenza HA protein obtained or expressed in step (a) to fold into its native conformation having a head domain and a trimeric stalk domain comprised of three protomers, (c) introducing one more targeted cross-links, such as di-tyrosine cross-links, into the trimeric stalk domain in order to stabilize the stalk domain in its native trimeric conformation, and (d) subsequently proteolytically cleaving the head domain at the one or more artificially-introduced protease recognition motifs, thereby producing a headless influenza HA protein complex. In some such methods the stalk domain comprises one or more “to-tyrosine” mutations and step (c) comprises introducing one or more di-tyrosine cross-links into the trimeric stalk domain. In some such methods, the locations of the di-tyrosine cross-links, to-tyrosine mutations, and/or artificially-introduced protease cleavage sites/motifs can be those specified above and/or elsewhere throughout the present patent specification. In some such methods, the influenza HA protein may be expressed in any suitable cell type, including, but not limited to, mammalian cells or insect cells. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of the influenza HA amino acid sequences presented herein, or any variants or fragments thereof, that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise a to-tyrosine mutation at one or more of residues 403, 406, 411, 422, 429, 432, 433, and 435, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of the influenza HA amino acid sequences presented herein, or any variants or fragments thereof, that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise an artificially-introduced protease cleavage site inserted after, for example immediately after, one or more of the following residues: 48, 63, 228, 278, 282, 283, 286 and 291, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of the influenza HA amino acid sequences presented herein, or any variants or fragments thereof, that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise two artificially-introduced protease cleavage sites, the first such site introduced immediately after residue 48 or 63, and the second such site introduced immediately after residue 228, 278, 282, 283, 286 or 291, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of the influenza HA amino acid sequences presented herein, or any variants or fragments thereof, that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise both (a) a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 411, 422, 429, 432, 433, 435, or 437, and (b) an artificially-introduced protease cleavage site inserted immediately after one or more of the following residues: 48, 63, 228, 278, 282, 283, 286 and 291, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of the influenza HA amino acid sequences presented herein, or any variants or fragments thereof, that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise both (a) a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 411, 422, 429, 432, 433, 435, or 437, and (b) two artificially-introduced protease cleavage sites—the first such site introduced immediately after residue 48 or 63, and the second such site introduced immediately after residue 228, 278, 282, 283, 286 or 291, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of amino acid residues 229 to 519 of SEQ ID NO: 1, or 279 to 519 of SEQ ID NO: 1, or 283 to 519 of SEQ ID NO: 1, or 284 to 519 of SEQ ID NO: 1, or 287 to 519 of SEQ ID NO: 1, or 292 to 519 of SEQ ID NO: 1, or SEQ ID NO: 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, or 117, or amino acid residues 1-228 of SEQ ID NO: 117, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise a tyrosine residue or to-tyrosine mutation at one or more of residues 308, 403, 406, 411, 422, 429, 432, 433, 435, or 437, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1, or at one or more of residues 112, 115, 120, 131, 137, 141, 142, or 144, where such amino acid numbering is based upon the sequence shown in FIG. 89 (SEQ ID NO: 117), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 117. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of amino acid residues 1 to 47 of SEQ ID NO: 1, or 1 to 62 of SEQ ID NO: 1, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences one or more of residues 308, 403, 406, 411, 422, 429, 432, 433, 435, and 437, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the present invention provides compositions and/or influenza HA protein complexes that comprise, consist essentially of, or consist of a first and a second polypeptide, wherein (a) the first (C-terminal) polypeptide comprises, consists essentially of, or consists of amino acid residues 229 to 519 of SEQ ID NO: 1, or 279 to 519 of SEQ ID NO: 1, or 283 to 519 of SEQ ID NO: 1, or 284 to 519 of SEQ ID NO: 1, or 287 to 519 of SEQ ID NO: 1, or 292 to 519 of SEQ ID NO: 1, or SEQ ID NO: 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, or 117, or amino acid residues 1-228 of SEQ ID NO: 117, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences, and wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise a tyrosine residue or to-tyrosine mutation, at one or more of residues 308, 403, 406, 411, 422, 429, 432, 433, 435, or 437, such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1, or at one or more of residues 112, 115, 120, 131, 137, 141, 142, or 144, where such amino acid numbering is based upon the sequence shown in FIG. 89 (SEQ ID NO: 117), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 117, and wherein (b) the second (N-terminal) polypeptide comprises, consists essentially of, or consists of amino acid residues 1 to 47 of SEQ ID NO: 1, or 1 to 62 of SEQ ID NO: 1, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences. In some embodiments, the present invention provides an influenza hemagglutinin (HA) polypeptide, protein or protein complex comprising, consisting essentially of, or consisting of, an amino acid sequence having at least 50, 55, 60, 65, or 70% sequence identity to amino acid residues 229 to 519 of SEQ ID NO: 1, wherein the amino acid sequence comprises a point mutation to tyrosine at one or more of amino acid positions 403, 406, 411, 422, 429, 432, 433, and 435, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments, the present invention provides an influenza hemagglutinin (HA) polypeptide, protein or protein complex comprising, consisting essentially of, or consisting of, an amino acid sequence having at least 50, 55, 60, 65, or 70% sequence identity to amino acid residues 1 to 228 of SEQ ID NO: 117, wherein the amino acid sequence comprises a point mutation to-tyrosine at one or more of amino acid positions 112, 115, 120, 131, 137, 141, 142, or 144, where such amino acid numbering is based upon the sequence shown in FIG. 89 (SEQ ID NO: 117), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 117. In some such embodiments the influenza HA polypeptide, protein or protein complex forms a part of, and/or is folded into a protein complex having, or capable of forming, a trimeric stalk conformation, and that comprises at least one di-tyrosine cross-link, wherein one or both tyrosines of the at least one di-tyrosine cross-link originate from one of the to-tyrosine mutations. In some such embodiments, the influenza HA polypeptide, protein or protein complex comprises cross-links located between one or more paired tyrosine residues, wherein the paired tyrosine residues are selected from the group consisting of residues 403 and 433; 411 and 422, 403 and 429, 403 and 432, 433 and 435, and 406 and 433, where such amino acid numbering is based upon the sequence shown in FIG. 9 (SEQ ID NO: 1), or at amino acid positions that correspond to such amino acid positions, for example as determined by alignment of an HA amino acid sequence to sequence ID NO: 1. In some embodiments the HA polypeptides, proteins or protein complexes described herein are capable of folding into a trimeric stalk conformation. In some such embodiments, the influenza HA polypeptides, proteins or protein complexes described herein further comprise one or more point mutations to cysteine. In some embodiments, the influenza HA polypeptides, proteins or protein complexes described herein further comprise a trimerization domain, such as a foldon domain. Non-limiting examples of influenza HA polypeptides, proteins and/or protein complexes of the invention include, but are not limited to, those of SEQ ID NOs: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 86, 87, 88, 89, 90. 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, and 117. In some embodiments the influenza HA polypeptides, proteins or protein complexes described herein are capable of eliciting production of influenza HA-specific antibodies in a subject. In some embodiments, the influenza HA polypeptides, proteins or protein complexes described herein are capable of binding to an antibody that recognizes the trimeric stalk domain of influenza HA. In some embodiments the present invention provides nucleic acid molecules encoding the influenza HA polypeptides, proteins or protein complexes described herein. In some embodiments, the present invention provides compositions comprising the influenza HA polypeptides, proteins or protein complexes described herein, including, but not limited to, vaccine compositions. In some such embodiments, such compositions may further comprise an adjuvant, a carrier, an immunostimulatory agent, or any combination thereof. In some embodiments the present invention provides a method of vaccinating a subject against influenza, the method comprising administering to a subject a composition comprising an effective amount of an influenza HA polypeptide, protein or protein complex as described herein. These and other embodiments of the present invention are described throughout the present patent specification. BRIEF DESCRIPTIONS OF THE DRAWINGS FIG. 1. Schematic representation of a headless universal vaccine immunogen (PR8) presenting a QNE-bnAb complex (left), and the same bnAb neutralizing HA of (a) homologous PR8, (b) drift (NL09), (c) group 1 heterologous (VN04), and (d) group 2 heterologous (x31) virus on the right. FIGS. 2A-2B. Schematic representation of DT-cross-links in headless HA stabilizing the stalk trimer. A. DT bonds (top in black) conformationally lock the stalk trimer. B. The stalk trimer has fallen apart without conformational locking. The QNE is lost. FIG. 3. Schematic diagram of a top-down view of the stalk, showing HA variant design: two amino acid substitutions per protomer (black and white circles). FIGS. 4A-4B. (A) DT-specific fluorescence measurement at 405 nm or WT (negative control, left), four HA variants with two amino acid substitutions each, and insulin, as it forms DT bonds with high efficiency (positive control, right). (B) Relative fluorescence of dityrosine mutants. Data represents the average of four replicates with standard deviation indicated by the error bars. FIG. 5. Annotated crystal structure of HA bound to CRC261. The lower circle indicates the targeted area for DT bond formation, the middle circle indicates the targeted area for stalk-proximal proteolytic cleavage, and the upper circle indicates the targeted area for variable loop proteolysis designed to unravel the head to enable stalk-proximal cleavage site access. FIG. 6. Immunofluorescent staining of cells expressing WT and a headless HA protein without cross-linking to stabilize the stalk domain demonstrated that the non-stabilized headless HA protein dis not bind one of the most broadly reactive mAbs, C179. A549 cells were transfected with plasmids for the expression of either WT HA or a recombinantly-spliced headless construct without any cross-linking in the stalk domain. 24 hrs post transfection, cells were fixed, permeabilized, and the HA protein was detected with both rabbit polyclonal, pAB (general expression) (upper panels), and mAb C179 anti-stalk (conformational) (lower panels) primary Abs followed by anti-rabbit Alexa 555-conjugated and anti-mouse Alexa 488-conjugated secondary Abs. FIGS. 7A-7B. DT crosslinks form in the PR8 stalk efficiently, and C179 antigenicity is preserved before & after crosslinking. A. DT-specific fluorescence measurement at ex320/em405 nm of WT (neg. control, A), four HA variants with two amino acid substitutions each (to-Tyr substitutions), at residues 403 and 429 (B), 406 and 433 (C), 403 and 433 (D), and 403 and 432 (E) and insulin, which forms DT bonds with high efficiency (positive control, F). B. C179 binding to variants (B-E) before and after DT crosslinking, as measured by sandwich ELISA using goat polyclonal anti-HA antibody for capture (BEI catalog #NR-3148) and the C179 conformational Ab for detection. FIGS. 8A-8C. 293T cells were untransfected (−) or transfected with WT NA and the indicated HA plasmids. 72 hours post transfection, VLPs in supernatants and WCEs were analyzed by sandwich ELISA (A, BEI catalog #NR-3148 goat polyclonal anti-HA capture, C179 detection), western blot (B, left panel; PNGase treated WCE), and HA assay (C). Panel B, right. Cells were transfected as above as indicated with HA and NA. 72 hours post transfection, VLPs were purified over a 30% sucrose-NTE cushion, assayed for total protein, and either mock incubated (WT, 48G) or digested with TEV protease (WT+TEV, 48G+TEV) and PNGase treated. Percent cleavage was determined by western blot. FIG. 9. Amino acid sequence (SEQ ID NO. 1) of HA protein from PR8 strain of H1N1 influenza virus. Amino acids 59 through 291 comprise the head domain, which may be proteolytically removed or disrupted in some embodiments. Amino acids 1 through 58 (or 18 to 58 without the signal peptide—which is located at residues 1-17) and 292 through 566 (or 292 through 529 without the transmembrane domain and cytoplasmic tail) comprise the stalk domain. The stalk domain is discontinuous and comprises both an N-terminal and a C-terminal portion of the HA protein. Amino acids 529 through 565 comprise the transmembrane region and cytoplasmic tail. The HA ectodomain (i.e. the outer exposed/non-membrane bound portion) comprises residues 1-528 (or 18 to 528 without the signal peptide). FIG. 10. Nucleic acid sequence (SEQ ID NO. 2) of DNA encoding HA protein from PR8 strain of H1N1 influenza virus. FIG. 11. Amino acid sequence of a modified PR8 influenza HA protein comprising inserted TEV protease cleavage sites at positions 63 and 278 (underlined), and to-tyrosine mutations at positions 403 (N403Y) and 433 (D433Y) (underlined) (SEQ ID NO:3). The boxed C-terminal sequence comprises the transmembrane region. The amino acid sequence of SEQ ID NO:3 is encoded by the nucleic acid sequence of SEQ ID NO:31 shown in FIG. 28. FIG. 12. Amino acid sequence of a modified PR8 influenza HA protein comprising inserted TEV protease cleavage sites at positions 63 and 278 (underlined), and to-tyrosine mutations at positions 411 (K411Y) and 422 (N422Y) (underlined) (SEQ ID NO:4). The boxed C-terminal sequence comprises the transmembrane region. The amino acid sequence of SEQ ID NO:4 is encoded by the nucleic acid sequence of SEQ ID NO:32 shown in FIG. 29. FIG. 13. Amino acid sequence of a modified PR8 influenza HA protein comprising inserted TEV protease cleavage sites at positions 63 and 278 (underlined), and to-tyrosine mutations at positions 403 (N403Y), 411 (K411Y), 422 (N422Y), and 433 (D433Y) (underlined) (SEQ ID NO:5). The boxed C-terminal sequence comprises the transmembrane region. The amino acid sequence of SEQ ID NO:5 is encoded by the nucleic acid sequence of SEQ ID NO:33 shown in FIG. 30. FIG. 18. Amino acid sequence of a modified PR8 influenza HA protein comprising inserted TEV protease cleavage sites at positions 63 and 283 (underlined), and to-tyrosine mutations at positions 411 (K411Y) and 422 (N422Y) (underlined) (SEQ ID NO:10). The boxed C-terminal sequence comprises the transmembrane region. The amino acid sequence of SEQ ID NO:10 is encoded by the nucleic acid sequence of SEQ ID NO:38 shown in FIG. 35. FIG. 19. Amino acid sequence of a modified PR8 influenza HA protein comprising inserted TEV protease cleavage sites at positions 63 and 283 (underlined), and to-tyrosine mutations at positions 403 (N403Y), 411 (K411Y), 422 (N422Y), and 433 (D433Y) (underlined) (SEQ ID NO:11). The boxed C-terminal sequence comprises the transmembrane region. The amino acid sequence of SEQ ID NO:11 is encoded by the nucleic acid sequence of SEQ ID NO:39 shown in FIG. 36. FIG. 20. Amino acid sequence of a modified PR8 influenza HA protein comprising inserted TEV protease cleavage sites at positions 48 and 291 (underlined), and to-tyrosine mutations at positions 403 (N403Y) and 433 (D433Y) (underlined) (SEQ ID NO:12). The boxed C-terminal sequence comprises the transmembrane region. The amino acid sequence of SEQ ID NO:12 is encoded by the nucleic acid sequence of SEQ ID NO:43 shown in FIG. 40. FIGS. 26A-26B. Amino acid sequence alignment of modified PR8 influenza HA proteins comprising one inserted protease cleavage site, and the sequence of wild-type PR8 HA from the PR8 strain of influenza virus H1N1 (SEQ ID NO:1—identified as “PR8HA-WT” in the figure). Underlined amino acid residues indicate protease cleavage sites inserted into the wild-type sequence by substitution and/or replacement of amino acids in SEQ ID NO. 1. Protease cleavage sites are inserted immediately after the following amino acid residues: 291 (SEQ ID NO. 18 and SEQ ID NO. 19), 48 (SEQ ID NO. 20), 286 (SEQ ID NO. 21), 278 (SEQ ID NO. 22), 282, (SEQ ID NO. 23), 63 (SEQ ID NO. 24), or 283 (SEQ ID NO. 25). The inserted protease cleavage sites are TEV protease recognition sequences. The C-terminal sequences shown within the boxed portion of the alignment comprise the transmembrane regions of the influenza HA proteins. The amino acid sequences of SEQ ID NO. 18, 19, 20, 21, 22, 23, 24 and 25 are encoded by the nucleic acid sequences of SEQ ID NO. 49, 50, 52, 56, 53, 54, 51 and 55, respectively as shown in FIG. 46. FIGS. 27A-27B. Amino acid sequence alignment of modified PR8 influenza HA proteins comprising two inserted protease cleavage sites, and the sequence of wild-type PR8 HA from the PR8 strain of influenza virus H1N1 (SEQ ID NO:1—identified as “PR8HA-WT” in the figure). Protease cleavage sites are inserted immediately after the following amino acid residues: 63 and 278 (SEQ ID NO. 26), 63 and 282 (SEQ ID NO. 27), 63 and 283 (SEQ ID NO. 28), 48 and 291 (SEQ ID NO. 29 and 30). The inserted protease cleavage sites are TEV protease recognition sequences. Underlined amino acid residues indicate the sequence located between the protease cleavage sites that would be removed from the HA sequence upon cleavage by a protease (here, TEV protease), for example to facilitate the production of a “headless” HA protein where the head domain is disrupted or removed. The C-terminal sequences shown within the boxed portion of the alignment comprise the transmembrane regions of the influenza HA proteins. Amino acid residues shown in bold (N403, F406, K411, N422, D429, L432, D433 and W435) illustrate positions where to-tyrosine mutations may be made so as to facilitate the formation of dityrosine bonds in the influenza HA stalk domain, as described herein. The amino acid sequences of SEQ ID NO. 26, 27, 28, 29 and 30 are encoded by the nucleic acid sequences of SEQ ID NO. 57, 58, 62, 60 and 61, respectively as shown in FIG. 47. FIG. 28. Nucleic acid sequence (SEQ ID NO:31) encoding a modified PR8 influenza HA protein comprising inserted nucleic acid residues (shown in lower case) that encode TEV protease cleavage sites at positions 63 and 278 in the protein, and to-tyrosine mutations (shown in lower case) encoded at positions 403 (N403Y) and 433 (D433Y) in the protein. The boxed C-terminal sequence comprises the nucleic acid sequence that encodes the transmembrane region of the protein. FIG. 29. Nucleic acid sequence (SEQ ID NO:32) encoding a modified PR8 influenza HA protein comprising inserted nucleic acid residues (shown in lower case) that encode TEV protease cleavage sites at positions 63 and 278 in the protein, and to-tyrosine mutations (shown in lower case) encoded at positions 411 (K411Y) and 422 (N422Y) in the protein. The boxed C-terminal sequence comprises the nucleic acid sequence that encodes the transmembrane region of the protein. FIG. 30. Nucleic acid sequence (SEQ ID NO:33) encoding a modified PR8 influenza HA protein comprising inserted nucleic acid residues (shown in lower case) that encode TEV protease cleavage sites at positions 63 and 278 in the protein, and to-tyrosine mutations (shown in lower case) encoded at positions 403 (N403Y), 411 (K411Y), 422 (N422Y), and 433 (D433Y) in the protein. The boxed C-terminal sequence comprises the nucleic acid sequence that encodes the transmembrane region of the protein. FIGS. 46A-46F. Alignment of nucleic acid sequences encoding modified PR8 influenza HA proteins comprising one inserted protease cleavage site, and the sequence of wild-type HA protein from the PR8 strain of influenza virus H1N1 (SEQ ID NO:2—identified as “RR8HA-WT” in the figure). Underlined nucleic acid residues encode TEV protease cleavage sites by substitution and/or replacement of nucleic acid residues of SEQ ID NO. 2. The nucleic acid residues are inserted into the nucleic acid sequence such that the encoded protein will have a protease cleavage site immediately after the following amino acid residues: 291 (SEQ ID NO. 49 and SEQ ID NO. 50), 48 (SEQ ID NO. 52), 286 (SEQ ID NO. 56), 278 (SEQ ID NO. 53), 282 (SEQ ID NO. 54), 63 (SEQ ID NO. 51), or 283 (SEQ ID NO. 55). The boxed C-terminal sequences comprise the sequence that encodes the transmembrane region of the protein. FIGS. 47A-47E. Alignment of nucleic acid sequences encoding PR8 influenza HA proteins comprising two inserted protease cleavage sites, and the sequence of wild-type HA from the PR8 strain of influenza virus H1N1 (SEQ ID NO:2—identified as “PR8HA-WT” in the figure). Underlined nucleic acid residues encode TEV protease cleavage sites by substitution and/or replacement of nucleic acid residues of SEQ ID NO. 2. The nucleic acid residues are inserted into the nucleic acid sequence such that the encoded HA protein will have protease cleavage sites immediately after the following amino acid residues: 63 and 278 (SEQ ID NO. 57), 63 and 282 (SEQ ID NO. 58), 63 and 286 (SEQ ID NO. 59), 48 and 291 (SEQ ID NO. 60 and 61), and 63 and 283 (SEQ ID NO. 62). The boxed C-terminal sequences comprise the sequence that encodes the transmembrane region of the protein. Boxed nucleic acid residues (corresponding to amino acid positions N403, F406, K411, N422, D429, L432, D433 and W435 in the encoded HA protein) illustrate positions where to-tyrosine mutations may be made so as to facilitate the formation of dityrosine bonds in the stalk domain of the encoded influenza HA protein, as described herein. FIG. 48. Nucleic acid sequence encoding HA protein of PR8 strain of influenza virus H1N1 with codon optimization for expression of the encoded HA protein in Homo sapiens (SEQ ID NO:63). FIG. 49. Nucleic acid sequence encoding HA protein of PR8 strain of influenza virus H1N1 with codon optimization for expression of the encoded HA protein in Cricetulus griseus (SEQ ID NO:64). FIG. 50. Nucleic acid sequence encoding HA protein of PR8 strain of influenza virus H1N1 with codon optimization for expression of the encoded HA protein in Nicotiana benthamiana (SEQ ID NO:65). FIG. 51. Nucleic acid sequence encoding HA protein of PR8 strain of influenza virus H1N1 with codon optimization for expression of the encoded HA protein in Pichia pastoris (SEQ ID NO:66). FIG. 52. Nucleic acid sequence encoding HA protein of PR8 strain of influenza virus H1N1 with codon optimization for expression of the encoded HA protein in Saccharomyces cerevisiae (SEQ ID NO:67). FIG. 53. Nucleic acid sequence encoding HA protein of PR8 strain of influenza virus H1N1 with codon optimization for expression of the encoded HA protein in Spodoptera frugiperda (SEQ ID NO:68). FIGS. 54A-54C. Alignment of amino acid sequences of full-length versions of HA proteins from various strains of influenza virus (Udorn 72 (SEQ ID NO:73), Hong Kong 68 (SEQ ID NO:74), Panama 99 (SEQ ID NO:75), Wisconsin 05 (SEQ ID NO:76), Shanghai 13 (SEQ ID NO:77), Singapore 57 (SEQ ID NO:78), Vietnam 04 (SEQ ID NO:79) and PR834 (SEQ ID NO:1), USSR 77 (SEQ ID NO:111), Texas 91 (SEQ ID NO:112), WSN 33 (SEQ ID NO:113), South Carolina 1918 (SEQ ID NO:114), and California 09 (SEQ ID NO:115)). Boxed amino acid residues (corresponding to amino acid positions 403, 406, 411, 422, 429, 432, 433 and 435 in the sequence of wild-type HA from the PR8 strain of influenza virus H1N1 (SEQ ID NO:1—identified as “WT-PR8-34” in the figure) represent positions where a mutation to a tyrosine residue is contemplated to facilitate the formation of dityrosine bonds in the stalk region of the HA protein. The italicized C-terminal sequences comprise the sequence that encodes the endogenous transmembrane region of the protein, and which can be removed or disrupted so as to generate a soluble version of influenza HA protein (see, for example, FIGS. 55-60). FIG. 55. Amino acid sequence of a soluble version of HA protein from the PR8 strain of influenza virus (SEQ ID NO:80). Amino acids 520-565 of the endogenous transmembrane region (italicized C-terminal sequence of SEQ ID NO:1 in FIG. 54) have been replaced by an optional tag (underlined) comprising a thrombin cleavage domain, a T4 foldon trimerization motif, and a 6× His tag (SEQ ID NO: 118). FIG. 56. Amino acid sequence of a soluble version of HA protein from the Hong Kong 68 strain of influenza virus (SEQ ID NO:81). Amino acids 521-566 of the endogenous transmembrane region (italicized C-terminal sequence of SEQ ID NO:74 in FIG. 54) have been replaced by an optional tag (underlined) comprising a thrombin cleavage domain, a T4 foldon trimerization motif, and a 6× His tag (SEQ ID NO: 118). FIG. 57. Amino acid sequence of a soluble version of HA protein from the Wisconsin 05 strain of influenza virus (SEQ ID NO:82). Amino acids 521-566 of the endogenous transmembrane region (italicized C-terminal sequence of SEQ ID NO:76 in FIG. 54) have been replaced by an optional tag (underlined) comprising a thrombin cleavage domain, a T4 foldon trimerization motif, and a 6× His tag (SEQ ID NO: 118). FIG. 58. Amino acid sequence of a soluble version of HA protein from the Vietnam 04 strain of influenza virus (SEQ ID NO:83). Amino acids 522-568 of the endogenous transmembrane region (italicized C-terminal sequence of SEQ ID NO:79 in FIG. 54) have been replaced by an optional tag (underlined) comprising a thrombin cleavage domain, a T4 foldon trimerization motif, and a 6× His tag (SEQ ID NO: 118). FIG. 59. Amino acid sequence of a soluble version of HA protein from the Shanghai 13 strain of influenza virus (SEQ ID NO:84). Amino acids 515-560 of the endogenous transmembrane region (italicized C-terminal sequence of SEQ ID NO:77 in FIG. 54) have been replaced by an optional tag (underlined) comprising a thrombin cleavage domain, a T4 foldon trimerization motif, and a 6× His tag (SEQ ID NO: 118). FIG. 60. Amino acid sequence of a soluble version of HA protein from the Singapore 57 strain of influenza virus (SEQ ID NO:85). Amino acids 516-562 of the endogenous transmembrane region (italicized C-terminal sequence of SEQ ID NO:78 in FIG. 54) have been replaced by an optional tag (underlined) comprising a thrombin cleavage domain, a T4 foldon trimerization motif, and a 6× His tag (SEQ ID NO: 118). FIG. 61. Amino acid sequence of a modified PR8 influenza HA protein comprising to-tyrosine mutations at positions 403 (N403Y) and 429 (D429Y) (underlined) (SEQ ID NO:86). FIG. 62. Amino acid sequence of a modified PR8 influenza HA protein comprising to-tyrosine mutations at positions 403 (N403Y) and 432 (L432Y) (underlined) (SEQ ID NO:87). FIG. 63. Amino acid sequence of a modified PR8 influenza HA protein comprising one to-tyrosine mutations at position 403 (N403Y) (underlined) (SEQ ID NO:88). FIG. 65. Amino acid sequence of a modified PR8 influenza HA protein comprising to-tyrosine mutations at positions 433 (D433Y) and 435 (W435Y) (underlined) (SEQ ID NO:90). FIG. 66. Amino acid sequence of a modified PR8 influenza HA protein comprising one to-tyrosine mutations at position 435 (W435Y) (underlined) (SEQ ID NO:91). FIG. 67. Amino acid sequence of a modified PR8 influenza HA protein comprising to-tyrosine mutations at positions 406 (F406Y) and 433 (D433Y) (underlined) (SEQ ID NO:92). FIG. 68. Amino acid sequence of a modified PR8 influenza HA protein comprising to-tyrosine mutations at positions 411 (K411Y) and 422 (N422Y) (underlined) (SEQ ID NO:93). FIGS. 69A-69B. Amino acid sequence alignment of modified PR8 influenza HA proteins comprising one or more to-tyrosine mutations, and the sequence of wild-type PR8 HA from the PR8 strain of influenza virus H1N1 (SEQ ID NO:1—identified as “PR8HA-WT” in the figure). Dityrosine bonds may be introduced between various combinations of endogenous tyrosine residues (e.g. Y308 and Y437 of SEQ ID NO:1, shown in bold) and residues comprising to-tyrosine mutations (e.g. N403, F406, K411, N422, D429, L432, D433 and W435 of SEQ ID NO:1, shown as underlined), as described herein. FIG. 70. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (63G/278S) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:94) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:96) is the C-terminal portion of the stalk domain comprising two to-tyrosine mutations at amino acid positions 120 and 150 (underlined; corresponding to amino acid positions 403 and 433, respectively, in SEQ ID NO:1). FIG. 72. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (63G/278S) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:94) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:98) is the C-terminal portion of the stalk domain comprising four to-tyrosine mutations at amino acid positions 120, 128, 139 and 150 (underlined; corresponding to amino acid positions 403, 411, 422 and 433, respectively, in SEQ ID NO:1). FIG. 74. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (63G/282S) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:94) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:100) is the C-terminal portion of the stalk domain comprising two to-tyrosine mutations at amino acid positions 130 and 141 (underlined; corresponding to amino acid positions 411 and 422, respectively, in SEQ ID NO:1). FIG. 75. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (63G/282S) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:94) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:101) is the C-terminal portion of the stalk domain comprising four to-tyrosine mutations at amino acid positions 122, 130, 141 and 152 (underlined; corresponding to amino acid positions 403, 411, 422 and 433, respectively, in SEQ ID NO:1). FIG. 76. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (63G/283G) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:94) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:102) is the C-terminal portion of the stalk domain comprising two to-tyrosine mutations at amino acid positions 121 and 151 (underlined; corresponding to amino acid positions 403 and 433, respectively, in SEQ ID NO:1). FIG. 78. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (63G/283G) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:94) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:104) is the C-terminal portion of the stalk domain comprising four to-tyrosine mutations at amino acid positions 121, 129, 140 and 151 (underlined; corresponding to amino acid positions 403, 411, 422 and 433, respectively, in SEQ ID NO:1). FIG. 82. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (48G/291 S) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:95) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:108) is the C-terminal portion of the stalk domain comprising two to-tyrosine mutations at amino acid positions 113 and 143 (underlined; corresponding to amino acid positions 403 and 433, respectively, in SEQ ID NO:1). FIG. 84. Protein fragments comprising a ‘headless’ influenza HA protein generated after proteolysis at two protease cleavage sites (48G/291 S) inserted into the full-length starting sequence (PR8 HA, SEQ ID NO:1). The first fragment (SEQ ID NO:95) is the N-terminal portion of the stalk domain and the second fragment (SEQ ID NO:110) is the C-terminal portion of the stalk domain comprising four to-tyrosine mutations at amino acid positions 113, 121, 132 and 143 (underlined; corresponding to amino acid positions 403, 411, 422 and 433, respectively, in SEQ ID NO:1). FIGS. 85A-85C. (A) 293T Cells were transfected with constructs for the expression of the indicated HA dityrosine mutants (403Y, 411Y-422Y, 403Y-433Y and 433Y-435Y) and soluble HA protein (with a C-terminal foldon domain) was purified from supernatants 72 hours post transfection by Ni2+ affinity chromatography. Pure HA protein was then subjected to dityrosine crosslinking conditions in the presence (+) or absence (−) of the required ARP peroxidase enzyme and analyzed by reducing SDS-PAGE followed by Coomassie blue staining. The arrow marks the migration of the monomer and crosslinked trimer, as indicated. (B) To confirm the formation of Dityrosine crosslinks, the purified crosslinked and uncrosslinked samples, obtained as described in A, were analyzed for DT-specific fluorescence: excitation wavelength: 320 nm, emission wavelength: 405 nm. (C) Binding of the soluble 403Y-433Y HA mutant, before and after crosslinking, to the broadly neutralizing VH1-69 stalk-specific mAb 8D4 by direct capture ELISA at 20 μg/ml of 8D4. FIGS. 86A-86B. (A) 293T cells were transfected with plasmids for the expression of HA (WT and the indicated insertion mutants) and NA. Virus-like particles were analyzed by direct capture ELISA from transfected cell supernatants with a globular head antibody, PY-102. (B) VLPs obtained as described in A were purified over a 30% Sucrose-NTE cushion. 10 ug of total protein was then incubated in cleavage buffer in the presence (+) or absence (−) of TEV protease (Promega), according to the manufacturer's instructions. Cleavage efficiency was monitored by Western Blot using an anti-HA2 antibody. Arrows indicate the cleavage product. FIGS. 87A-87B. (A) 293T cells were transfected with plasmids for the expression of HA (WT and the indicated double-insertion mutants) and NA. Virus-like particles were analyzed by direct capture ELISA from transfected cell supernatants with a globular head antibody, PY-102. (B) Binding of the double-insertion HA mutants (insertions at positions 63+278, and 63+286) to two broadly neutralizing VH1-69 stalk-specific mAb by direct capture ELISA at 50 μg/ml (normalized for HA presence in supernatants). FIG. 88. Amino acid sequences of influenza HA C-terminal fragments generated following proteolysis at a protease cleavage site inserted at position 291 of the wild-type PR8 HA amino acid sequence (SEQ ID NO:1). The sequence of SEQ ID NO:108 comprises to-tyrosine mutations at positions 113 and 143 (underlined; corresponding to positions 403 and 433, respectively, of SEQ ID NO:1). The sequence of SEQ ID NO:109 comprises to-tyrosine mutations at positions 121 and 132 (underlined; corresponding to positions 411 and 422, respectively, of SEQ ID NO:1). The sequence of SEQ ID NO:110 comprises to-tyrosine mutations at positions 113, 121, 132 and 143 (underlined; corresponding to positions 403, 411, 422 and 433, respectively, of SEQ ID NO:1). The C-terminal transmembrane region is underlined in each sequence. FIG. 89. Amino acid sequence of an influenza HA protein C-terminal fragment (SEQ ID NO: 117). This fragment is generated following proteolysis at a protease cleavage site inserted at position 291 of the wild-type PR8 HA amino acid sequence (SEQ ID NO:1). Underlined amino acid residues N112, F115, K120, N131, D137, L141, D142 and W144 illustrate positions in SEQ ID NO: 117 where to-tyrosine mutations can be made to facilitate the formation di-tyrosine bonds. The underlined residues correspond to positions N403, F406, K411, N422, D429, L432, D433 and W435 respectively, of SEQ ID NO:1. The C-terminal transmembrane region is underlined. In some embodiments the transmembrane region is absent (i.e. the fragment does not contain the last 46 amino acid residues (229-274 of SEQ ID NO: 117, but contains residues 1-228 of SEQ ID NO: 117). Tyrosine residues at positions 17 and 146 (shown in bold italic) are endogenous tyrosine residues that may be used in the formation of dityrosine bonds. These endogenous residues correspond to tyrosine residues at positions 308 and 437, respectively, of SEQ ID NO:1. The present invention provides, in part, influenza HA polypeptides, proteins and/or protein complexes (such as those that comprise a stalk domain having its native conformation and that may or may not comprise an intact head domain), methods of making such polypeptides, proteins and/or protein complexes, compositions (such as pharmaceutical compositions and vaccine compositions) comprising such polypeptides, proteins and/or protein complexes, and methods of use of such polypeptides, proteins and/or protein complexes, for example in vaccination methods, therapeutic methods and other methods. In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes may be useful as immunogens, for example in influenza vaccines. DEFINITIONS AND ABBREVIATIONS As used in the present specification the terms “about” and “approximately,” when used in relation to numerical values, mean within + or −20% of the stated value. The abbreviation “HA” as used herein refers to a hemagglutinin protein. The abbreviation “Ab” as used herein refers to antibody. The abbreviation “bnAbs” as used herein refers to broadly neutralizing antibodies. The abbreviation “QNE” as used herein refers to quaternary neutralizing epitopes. The abbreviation “DT” as used herein refers to di-tyrosine. As used herein the phrase “full-length” when used in relation to an influenza HA protein or polypeptide does not require an HA protein or polypeptide that is as long as a wild-type influenza HA protein. Rather the term is used to refer to an influenza HA protein or polypeptide that comprises, at least, both a stalk domain and a head domain. Such stalk and head domains may or may not be as long as those found in a wild-type influenza HA protein or polypeptide. For example, an influenza HA protein or polypeptide that is missing the transmembrane domain found in a wild-type influenza HA protein or polypeptide may still be referred to as a “full-length” HA protein or polypeptide herein if it has a stalk domain and a head domain. In some embodiments, the phrase “full-length,” when used in relation to an influenza HA protein or polypeptide, may refer to an influenza HA protein or polypeptide that, in addition to a stalk and head domain, also comprises a transmembrane domain. As used herein the phrase “soluble” when used in relation to an influenza HA protein or polypeptide refers to an influenza HA protein or polypeptide that does not comprise a transmembrane domain. Such soluble HA proteins or polypeptides may comprise either a stalk domain and a head domain, or stalk domain in the absence of a head domain. As used herein the terms “protein” and “polypeptide” are used interchangeably, unless otherwise stated. As used herein the term “protein complex” refers to an assembly of two or more proteins or protein subunits, such as two or more monomers. Unless otherwise stated, all description herein that relates to proteins and/or polypeptides applies equally to protein complexes, and vice versa. As used herein the terms “stabilized” and “locked” are used interchangeably, for example in relation to the effect of cross-linking in stabilizing or locking the stalk domain of an influenza HA protein, polypeptide, or protein complex in its native trimeric conformation. These terms do not require 100% stability. Rather these terms denote a degree of improved or increased stability. For example, in some embodiments, when the term “stabilized” is used in relation to a stalk domain cross-linked in its native trimeric conformation, the term denotes that the native trimeric conformation of the stalk domain has greater stability than it would have had prior to or without such cross-linking. Stability, and relative stability, may be measured in various ways as described in other sections of this application, for example based on the half-life of the native trimeric conformation of the stalk domain. The improvement or increase in stability may be to any degree that is useful or significant for the intended application. For example, in some embodiments stability may be increased by about 10%, 25%, 50%, 100%, 200% (i.e. 2-fold), 300% (i.e. 3-fold), 400% (i.e. 4-fold), 500% (i.e. 5-fold), 1000% (i.e. 10-fold), or more. As used herein the terms “stem” and “stalk” are used interchangeably to refer to a stalk domain, or portion thereof, of an influenza HA protein or polypeptide. As used herein the term “engineered” when used in relation to the influenza HA polypeptides, proteins and/or protein complexes of the invention refers generally to influenza HA polypeptides, proteins and/or protein complexes that have been altered in some way as compared to the wild-type versions of those polypeptides, proteins and/or protein complexes, for example, but not limited to, by way of removal or disruption of a particular portion or domain of the wild-type polypeptide, protein and/or protein complex (such as a transmembrane domain or a head domain) or by introduction of one or more point mutations (such as those introduced to facilitate formation of di-tyrosine bonds) or by way of introduction of one or more protease recognition motifs not ordinarily present in the wild-type polypeptide, protein and/or protein complex, or by any other modification of the polypeptide, protein and/or protein complex as compared to its wild-type form. Other definitions and abbreviations are found throughout the specification. Influenza and Influenza Viruses Influenza, commonly known as “the flu”, is an infectious disease of birds and mammals caused by RNA viruses of the family Orthomyxoviridae, the influenza viruses. Influenza spreads around the world in seasonal epidemics, resulting in about three to five million yearly cases of severe illness and about 250,000 to 500,000 yearly deaths, rising to millions in some pandemic years. In the 20th century three influenza pandemics occurred, each caused by the appearance of a new strain of the virus in humans, and killed tens of millions of people. Often, new influenza strains appear when an existing flu virus spreads to humans from another animal species, or when an existing human strain picks up new genes from a virus that usually infects birds or pigs. There are three different types of influenza virus, type A, type B, and type C, with various subtypes and strains within those types. Influenza type A viruses are the most virulent human pathogens among the three influenza types and cause the most severe disease. The influenza A virus can be subdivided into different subtypes or serotypes including, but not limited to H1N1 (which caused Spanish Flu in 1918, and Swine Flu in 2009), H2N2 (which caused Asian Flu in 1957), H3N2 (which caused Hong Kong Flu in 1968), H5N1 (which caused Bird Flu in 2004), H7N7, H1N2 (which is endemic in humans, pigs and birds), H9N2, H7N2, H7N3, H10N7, and H7N9. Wild aquatic birds are the natural hosts for a large variety of influenza A. However, domestic poultry, such as turkeys and chickens, can also become very sick and die from avian influenza, and some avian influenza A viruses also can cause serious disease and death in wild birds. Influenza type B almost exclusively infects humans and is less common than influenza A. The only other animals known to be susceptible to influenza B infection are the seal and the ferret. Influenza type B mutates at a rate 2-3 times slower than type A and consequently is less genetically diverse, with only one influenza B serotype known. As a result of this lack of antigenic diversity, a degree of immunity to influenza B is usually acquired at an early age. However, influenza B mutates frequently enough that lasting immunity is not possible. Influenza type C virus infects humans, dogs and pigs, sometimes causing both severe illness and local epidemics. However, influenza C is less common than the other types and usually only causes mild disease. Influenza viruses A, B and C are very similar in their overall structure. They each comprise a viral envelope containing two main types of glycoproteins, and a central core containing the viral RNA genome and other viral proteins. Hemagglutinin (“HA”) and neuraminidase (“NA”) are the two large envelope glycoproteins. HA is a lectin that mediates binding of the virus to target cells and entry of the viral genome into the target cell. The various influenza A subtypes are classified based on their antibody responses to the HA and NA proteins. For example, an “H7N2 virus” designates an influenza A subtype that has an HA 7 protein and an NA 2 protein. Similarly an “H5N1” virus has an HA 5 protein and an NA 1 protein. There are currently around 17 known HA subtypes and around 10 known NA subtypes. Many different combinations of HA and NA proteins are possible. Influenza A subtypes H1N1, H1N2, and H3N2 are currently the main types in general circulation in the human population. There are also several prominent subtypes of the avian influenza A viruses that are known to infect both birds and humans—such as H5N1, H7N2, H7N7, H7N3, and H7N7 subtypes. Within influenza type A, one can group the various different influenza subtypes in a variety of different ways, if desired. For example, influenza type A subtypes are frequently classified or grouped into different antigenic groups and antigenic subgroups based on their HA protein. Such groupings relate to the antigenicity and degree of HA sequence identity between the different subgroups. Influenza subtypes in the same antigenic group or antigenic subgroup are more similar to each other in terms of antigenicity and HA sequence than those in other antigenic groups. Antigenic group 1 consists of H1, H2, H5, H6, H8, H9, H11, H12, H13, and H16 influenza A subtypes. Antigenic group 2 consists of H3, H4, H14, H7, H10, and H15 influenza A subtypes. Within antigenic group 1, there are three antigenic subgroups, which will be referred to herein as antigenic subgroup 1A, 1B, and 1C. Antigenic subgroup 1A consists of H1, H2, H5 and H6 influenza A subtypes. Antigenic subgroup 1B consists of H11, H13 and H16 influenza A subtypes. Antigenic subgroup 1C consists of H8, H9, and H12 influenza A subtypes. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention are generated from HA sequences from any influenza type—including type A, B, or C. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention are generated from HA sequences from influenza type A. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention are generated from HA sequences from influenza type A, antigenic group 1. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention are generated from HA sequences from influenza type A, antigenic group 1A. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, any influenza type—including type A, B, or C. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza type A. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza type A, antigenic group 1. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza type A, antigenic group 1A. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza subtype H1. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza subtypes H1 and H2. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza subtypes H1, H2 and H5. In some embodiments herein the HA polypeptides, proteins and protein complexes of the invention can be used to vaccinate a subject, and provide protection against, influenza subtypes H1, H2, H5 and H6. Tables A and B below provide some examples of the sequence identity between the HA protein of H1N1 strain PR8, or certain fragments of the HA protein, and corresponding proteins or fragments from other influenza subtypes and strains, including some from antigenic groups 1 and 2. TABLE A Percent identity of full-length influenza HA amino acid sequences to the PR8 amino acid sequence of SEQ ID NO: 1 (as illustrated in FIG. 54). % identity to Full-length influenza HA protein SEQ ID NO: 1 Antigenic group 1: HA-USSR-77.pro (SEQ ID NO: 111) (H1 subtype) 90.1 HA-Texas-91.pro (SEQ ID NO: 112) (H1 subtype) 87.8 HA-WSN-33.pro (SEQ ID NO: 113) (H1 subtype) 90.1 HA-SouthCarolina-1918.pro (SEQ ID NO: 114) 88.2 (H1 subtype) HA-California-09.pro (SEQ ID NO: 115) (H1 subtype) 81.1 HA-Singapore-57.pro (SEQ ID NO: 78) (H2 subtype) 65.5 HA-Vietnam-04.pro (SEQ ID NO: 79) (H5 subtype) 63.8 Antigenic group 2: HA-Udorn-72.pro (SEQ ID NO: 73) (H3 subtype) 39.8 HA-HongKong-68.pro (SEQ ID NO: 74) (H3 subtype) 40.5 HA-Panama-99.pro (SEQ ID NO: 75) (H3 subtype) 39.2 HA-Wisconsin-05.pro (SEQ ID NO: 76) (H3 subtype) 38.7 HA-Shanghai-13.pro (SEQ ID NO: 77) (H7 subtype) 40.4 TABLE B Percent identity of fragment that remains after cleavage of influenza HA protein at cleavage sites 48 and 291. % identity to C-terminal fragment of Influenza HA protein C-terminal fragment SEQ ID NO: 1 Antigenic group 1: HA-USSR-77 (H1 subtype) 92.4 HA-Texas-91 (H1 subtype) 90.2 HA-WSN-33 (H1 subtype) 89.6 HA-SouthCarolina-1918 (H1 subtype) 89.6 HA-California-09 (H1 subtype) 85.4 HA-Singapore-57 (H2 subtype) 71.6 HA-Vietnam-04 (H5 subtype) 70.4 Antigenic group 2: HA-Udorn-72 (H3 subtype) 43.9 HA-HongKong-68 (H3 subtype) 44.5 HA-Panama-99 (H3 subtype) 43.3 HA-Wisconsin-05 (H3 subtype) 43.0 HA-Shanghai-13 (H7 subtype) 44.2 In addition to the sequence identities shown in the above table, the percent identity between PR8 (SEQ ID NO: 1) and sequences of H6, H9, H11, and H13 subtypes over a C-terminal fragment remaining after proteolytic cleavage of the influenza HA protein, was found to be 68.2%, 54.7%, 56.2%, and 50.5%, respectively. Influenza HA Polypeptides, Proteins and Protein Complexes In some embodiments the present invention provides engineered influenza HA polypeptides, proteins and/or protein complexes, compositions comprising such polypeptides, proteins and/or protein complexes, and methods of use of such polypeptides, proteins and/or protein complexes. Such proteins can be made using any suitable influenza virus HA protein as a starting point. For example, the proteins of the invention can be made using an influenza HA protein from any suitable influenza type (such as A, B, or C), subtype (including, but not limited to, H1N1, H1N2, and H3N2 subtypes) or strain (e.g. the H1N1 A/Puerto Rico/8/1934 (“PR8”) strain (SEQ ID NO. 1)) of influenza virus as the starting point. One of the important features of the influenza HA polypeptides, proteins and/or protein complexes described herein is that they comprise the trimeric stalk domain of the HA protein which, unlike the highly variable head domain, is more conserved between influenza types, subtypes and strains. Accordingly, in addition to being useful as vaccine immunogens against homologous types, subtypes, and strains of influenza virus (i.e. against influenza viruses of the same type, subtype and/or strain as used as the starting point for making the influenza HA polypeptides, proteins and/or protein complexes described herein), the HA polypeptides, proteins and/or protein complexes of the invention may also be useful as vaccine immunogens against heterologous types, subtypes, and strains of influenza virus (i.e. against influenza viruses of a different type, subtype and/or strain to that used as the starting point for making the engineered HA polypeptides, proteins and/or protein complexes). In some embodiments the present invention provides approaches for stabilizing the stalk domain of an influenza HA protein in its native trimeric conformation, including providing specific locations within the influenza HA protein that can be or should be cross-linked, and providing mutant forms of the HA protein that can facilitate the formation of such cross-links. Such cross-links and mutations can be used alone (e.g. in the context of a wild type HA protein or in the context of an HA protein that does not comprise any man-made mutations or other man-made modifications), or can be used in combination with one or more other man-made mutations, modifications, cross-links, or stabilization strategies. Thus, for example, the approaches described herein can be used in conjunction with the use of added foldon trimerization domains, stabilizing antibodies (such as 6F12, C179, CR6261, F10, A66 and D8), and/or other partially or potentially stabilizing modifications or mutations. The present inventors have performed extensive analysis of the structure of the influenza HA protein and have developed a variety of novel design strategies and novel engineered influenza HA polypeptides, proteins, and/or protein complexes. The present invention also provides methods for making and using such influenza HA polypeptides, proteins, and/or protein complexes. In some embodiments, the present invention provides specific locations within the amino acid sequence of the influenza HA protein at which, or between which, targeted cross-links can be made in order to “lock” the stalk domain of the HA protein in its native trimeric conformation. In some embodiments, the targeted cross-links are di-tyrosine cross-links. Where di-tyrosine cross-links are used, the present invention provides specific amino acid residues (or pairs of amino acid residues) that either comprise a pre-existing tyrosine residue or can be or are mutated to a tyrosine residue such that di-tyrosine cross-links can be made. The engineered influenza HA polypeptides, proteins and/or protein complexes described herein can be made based on the sequence of any suitable influenza HA polypeptide, protein and/or protein complex, such as a wild-type (WT) influenza HA protein or polypeptide, or mutant, homolog, derivative, analog, ortholog, or any other derivative of an influenza HA polypeptide, protein and/or protein complex, provided that the HA polypeptide, protein and/or protein complex has a stalk domain, or a portion of a stalk domain, that is capable of folding into, or forming a part of, an stalk domain having a native trimeric conformation and/or is capable of binding to one or more anti-stalk antibodies. Amino acid sequences of suitable influenza HA polypeptides, proteins and/or protein complexes, and nucleic acid sequences that encode such influenza HA polypeptides, proteins and/or protein complexes, are known in the art and any such amino acid or nucleic acid sequence may be used. Furthermore, amino acid sequences of several suitable influenza HA polypeptides, proteins and/or protein complexes, and nucleic acid sequences that encode such influenza HA polypeptides, proteins and/or protein complexes, are provided herein. While any suitable influenza virus HA protein can be used as a starting point for making the soluble influenza HA polypeptides, proteins and/or protein complexes described herein, such an HA protein should at least comprise a stalk domain, or a portion of a stalk domain, that is capable of folding into a native trimeric conformation and/or that is capable of binding to one or more anti-stalk antibodies, such as neutralizing anti-stalk antibodies. In some embodiments the HA protein used as a starting point is a full-length wild-type HA protein comprising a head domain and a stalk domain, and optionally also a transmembrane domain. In some embodiments the HA protein used lacks a transmembrane domain or lacks a functional or intact transmembrane domain. In some embodiments the HA protein comprises a T4 foldon trimerization motif. In some embodiments the HA proteins that are used as a starting point for making the influenza HA polypeptides, proteins and/or protein complexes described herein: (a) comprise a stalk domain, or a portion of a stalk domain, that is capable of folding into a native trimeric conformation and/or that is capable of binding to one or more neutralizing anti-stalk antibodies, (b) comprise a T4 foldon trimerization motif, and (c) lack a functional or intact transmembrane domain. Throughout the present patent specification, when reference is made to specific amino acid residues or specific amino acid regions in the influenza HA protein by referring to their amino residue number or numbers (such as amino acid residues 403 and 422, for example), and unless otherwise stated, the numbering is based on the HA amino acid sequence provided herein in, FIG. 9 and SEQ ID NO: 1—which is an amino acid sequence of a wild-type HA protein from influenza strain PR8 (influenza type A-H1N1 subtype). However, it should be noted, and one of skill in the art will understand, that different HA sequences may have different numbering systems, for example, if there are additional amino acid residues added or removed as compared to SEQ ID NO: 1 (for example, as illustrated in FIGS. 26 and 27 and many of the other Figures and sequences herein). As such, it is to be understood that when specific amino acid residues are referred to by their number, the description is not limited to only amino acids located at precisely that numbered position when counting from the beginning of a given amino acid sequence, but rather that the equivalent/corresponding amino acid residue in any and all HA sequences is intended—even if that residue is not at the same precise numbered position, for example if the HA sequence is shorter or longer than SEQ ID NO. 1, or has insertions or deletions as compared to SEQ ID NO. 1. One of skill in the art can readily determine what is the corresponding/equivalent amino acid position to any of the specific numbered residues recited herein, for example by aligning a given HA sequence to SEQ ID NO. Thus, in embodiments where specific amino acid residues of the influenza HA protein are referred to, it is to be understood that the invention is not to be limited to sequences having the specified amino acid properties (e.g. presence of a tyrosine residue, a mutation, or an insertion of a protease recognition site, etc.) at only those precise numbered amino acid positions. Rather the specified amino acid properties may be located at any position in any influenza HA protein that is equivalent/corresponding to the numbered positions recited for the PR8 influenza HA protein of SEQ ID NO:1. This description applies equally where references are made to specific nucleic acid residues or specific nucleic acid regions in a nucleotide sequence encoding an influenza HA protein by referring to their nucleic acid residue number or numbers. Thus, unless otherwise stated, the numbering is based on the nucleotide sequence provided herein in FIG. 10 and SEQ ID NO. 2. In some embodiments, the influenza HA polypeptides, proteins or protein complexes of the present invention can be derived from (or can comprise, consist essentially of, or consist of) the amino acid sequences of any suitable influenza HA polypeptide, protein or protein complex sequence known in the art, including, without limitation: the amino acid sequence of the PR8 strain of H1N1 influenza virus (for example, in a full-length form (SEQ ID NO:1) or a soluble form (SEQ ID NO:80; or amino acid residues 1-519 thereof), the amino acid sequence of the Udorn 72 strain of H3N2 influenza virus (for example, in a full-length form (SEQ ID NO:73) or a soluble form comprising amino acid residues 1-520 thereof), the amino acid sequence of the Hong Kong 68 strain of H3N2 influenza virus (for example, in a full-length form (SEQ ID NO:74) or a soluble form (SEQ ID NO:81; or amino acid residues 1-520 thereof)), the amino acid sequence of the Panama 99 strain of H3N2 influenza virus (for example, in a full-length form (SEQ ID NO:75) or a soluble form comprising amino acid residues 1-520 thereof), the amino acid sequence of the Wisconsin 05 strain of H3N2 influenza virus (for example, in a full-length form (SEQ ID NO:76) or a soluble form (SEQ ID NO:82; or amino acid residues 1-520 thereof)), the amino acid sequence of the Shanghai 13 strain of H7N9 influenza virus (for example, in a full-length form (SEQ ID NO:77) or a soluble form (SEQ ID NO:84; or amino acid residues 1-514 thereof)), the amino acid sequence of the Singapore 57 strain of H2N2 influenza virus (for example, in a full-length form (SEQ ID NO:78) or a soluble form (SEQ ID NO:85; or amino acid residues 1-515 thereof)), the amino acid sequence of the Vietnam 04 strain of H5N1 influenza virus (for example, in a full-length form (SEQ ID NO:79) or a soluble form (SEQ ID NO:83; or amino acid residues 1-521 thereof)), the amino acid sequence of the USSR 77 strain of H1N1 influenza virus (for example, in a full-length form (SEQ ID NO:111) or a soluble form comprising amino acid residues 1-519 thereof), the amino acid sequence of the Texas 91 strain of H1N1 influenza virus (for example, in a full-length form (SEQ ID NO:112) or a soluble form comprising amino acid residues 1-519 thereof), the amino acid sequence of the WSN 33 strain of H1N1 influenza virus (for example, in a full-length form (SEQ ID NO:113) or a soluble form comprising amino acid residues 1-518 thereof), the amino acid sequence of the South Carolina 1918 strain of H1N1 influenza virus (for example, in a full-length form (SEQ ID NO:114) or a soluble form comprising amino acids 1-519), the amino acid sequence of the California 09 strain of H1N1 influenza virus (for example, in a full-length form (SEQ ID NO:115) or a soluble form comprising amino acids 1-519), or any fragment thereof. In some embodiments, the influenza HA proteins and polypeptides of the present invention can be derived from (or can comprise, consist essentially of, or consist of) amino acid sequences that have at least about 40%, 50%, 60%, 65%, 70%, 75%, 80%, 85%, 90%, 95%, 98%, or 99% sequence identity to any known influenza HA sequences or to HA sequences from any known influenza groups, subgroups, families, subfamilies, types, subtypes, genera, species, strains, and/or clades, or any fragment thereof. Furthermore, in addition to the large number of specific amino acid and nucleotide molecules and sequences provided herein (including SEQ ID NO:s 1-110); the present invention also provides and encompasses amino acid and nucleotide molecules and sequences that have at least about 40%, 50%, 60%, 65%, 70%, 75%, 80%, 85%, 90%, 95%, 98%, or 99% sequence identity to any such molecules and sequences. Thus, for every embodiment herein that refers to a specific sequence or specific SEQ ID NO (such as SEQ ID NO:s 1-110), the present invention also includes variations of such embodiments that include amino acid and nucleotide molecules and sequences that have at least about 40%, 50%, 60%, 65%, 70%, 75%, 80%, 85%, 90%, 95%, 98%, or 99% sequence identity to such specific sequences or SEQ ID NOs. In some embodiments the present invention provides engineered influenza HA polypeptides, proteins and/or protein complexes that comprise a stalk domain (for example, that has, or is capable of forming, its native trimeric conformation) and that do not comprise a head domain. Such polypeptides, proteins and/or protein complexes can be referred to as “headless” influenza HA polypeptides, proteins and/or protein complexes. In some embodiments the present invention provides influenza HA polypeptides, proteins and/or protein complexes that comprise a stalk domain having its native trimeric conformation and a head domain. Such proteins may be referred to as “head-on” influenza HA polypeptides, proteins and/or protein complexes. In some embodiments such polypeptides, proteins and/or protein complexes may also comprise one or more engineered protease recognition motifs that can be used for proteolytic disruption and/or removal of the head domain. In some embodiments such head-on influenza HA polypeptides, proteins and/or protein complexes may be useful as, for example, intermediates in the production of “headless” influenza HA polypeptides, proteins and/or protein complexes—as described herein. “Headless” HA variants can be obtained or generated by a variety of methods. For example in some embodiments, headless HA variants can be obtained by removal of all or part of the HA head domain, for example by proteolytic removal of the head domain, or by another other suitable means. In other embodiments headless HA variants can be obtained by expression of a nucleotide sequence encoding only the stalk domain. In some embodiments, “headless” HA variants can be generated by proteolytic cleavage of a full-length influenza HA protein at protease recognition motifs inserted into the protein such that following cleavage, the head domain sequence is cut out and at least two protein fragments comprising the stalk domain remain. FIG. 27 illustrates examples of protease cleavage motifs and shows intervening sequences of the head domain that are cut out following protease treatment. Thus, in some embodiments, for example as shown in FIG. 27, a “headless” influenza HA variant comprises at least two protein fragments—e.g. an N-terminal fragment and a C-terminal fragment—comprising the stalk domain. In some embodiments one or more fragments of a “headless” influenza protein comprise one or more to-tyrosine mutations, and/or one-or more dityrosine crosslinks. Such mutations and/or crosslinks will typically be present in the C-terminal fragment of the “headless” HA protein. (See for example SEQ ID NOs: 96-110 and 117). FIGS. 70-84 and 89 illustrate examples of some such HA peptides. In some embodiments such peptides (for example, SEQ ID NOs: 96-110 and 117) may be comprised within a larger HA molecule comprising a head domain, or they may be present in a “headless” HA protein. In some embodiments, several such peptides may associate to form an HA protein complex that is in, or is capable of forming, a trimeric stalk domain. In some embodiments an influenza HA polypeptide, protein and/or protein complex comprises the amino acid sequence of SEQ ID NO: 108, 109, 110. In some embodiments an influenza HA polypeptide, protein and/or protein complex comprises the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:96, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:97, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:98, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:99, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:100, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:101, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:102, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:103, or the amino acid sequence of SEQ ID NO:94 and SEQ ID NO:104, or the amino acid sequence of SEQ ID NO:95 and SEQ ID NO:106, or the amino acid sequence of SEQ ID NO:95 and SEQ ID NO:107, or the amino acid sequence of SEQ ID NO:95 and SEQ ID NO:108, or the amino acid sequence of SEQ ID NO:95 and SEQ ID NO:109, or the amino acid sequence of SEQ ID NO:95 and SEQ ID NO:110. In some embodiments an influenza HA polypeptide, protein and/or protein complex comprises an N-terminal HA peptide comprising, consisting essentially of, or consisting of, SEQ ID NO:94 or SEQ ID NO: 95, and a C-terminal HA peptide comprising, consisting essentially of, or consisting of, SEQ ID NO:96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109 or 110, or a C-terminal HA peptide comprising, consisting essentially of, or consisting of, amino acid residues 229 to 519 of SEQ ID NO:1 wherein the amino acid sequence comprises a point mutation to tyrosine at one or more of amino acid positions 403, 406, 411, 422, 429, 432, 433, or 435, or a C-terminal HA peptide comprising, consisting essentially of, or consisting of, amino acid residues 1 to 228 of SEQ ID NO:117 wherein the amino acid sequence comprises a point mutation to tyrosine at one or more of amino acid positions 112, 115, 120, 131, 137, 141, 142, or 144. It should be noted that amino acid residues 1 through 58 (or 18 to 58 without the signal peptide—which is located at residues 1-17) and 292 through 566 (or 292 through 529 without the transmembrane domain and cytoplasmic tail) of the PR8 HA amino acid sequence (SEQ ID NO. 1) represent the influenza HA stalk domain sequence. The stalk domain is discontinuous and comprises both an N-terminal and a C-terminal portion of the HA protein. The amino acid sequences provided here in may comprise additional domains that may be present or partially present or absent in some embodiments but not in others, for example the head domain (e.g. amino acid residues 59-291 of the PR8 HA amino acid sequence (SEQ ID NO. 1)), and/or the transmembrane and cytoplasmic region (e.g. amino acid residues 529 or 530 to 565 of the PR8 HA amino acid sequence (SEQ ID NO. 1)), and/or the signal peptide (e.g. amino acid residues 1-17 of the PR8 HA amino acid sequence (SEQ ID NO:1), and/or one or more optional exogenous (non-HA) sequences such as epitope tags, foldon domains, and the like. For example, in some embodiments an optional foldon trimerization domain, thrombin cleavage site, 6× His-tag (SEQ ID NO: 118), and/or a strep tag may be present. In some embodiments these additional sequences may be absent, modified, rearranged or replaced. For example, in some embodiments different trimerization domains may be used, or different epitope tags may be used. In some embodiments these additional sequences may be absent, modified, rearranged or replaced, for example with different transmembrane or cytoplasmic domains. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of influenza HA amino acid sequences presented herein, or any variants or fragments thereof that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 437, 411, 422, 429, 432, 433, and 435. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of influenza HA amino acid sequences presented herein, or any variants or fragments thereof that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise an artificially-introduced protease cleavage site inserted immediately after one or more of the following residues: 48, 63, 228, 278, 282, 283, 286 and 291. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of influenza HA amino acid sequences presented herein, or any variants or fragments thereof that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise two artificially-introduced protease cleavage sites, the first such site introduced immediately after residue 48 or 63, and the second such site introduced immediately after residue 228, 278, 282, 283, 286 or 291. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of influenza HA amino acid sequences presented herein, or any variants or fragments thereof that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise both (a) a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 437, 411, 422, 429, 432, 433, and 435, and (b) an artificially-introduced protease cleavage site inserted immediately after one or more of the following residues: 48, 63, 228, 278, 282, 283, 286 and 291. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of any one of influenza HA amino acid sequences presented herein, or any variants or fragments thereof that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences presented herein, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise both (a) a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 437, 411, 422, 429, 432, 433, and 435, and (b) two artificially-introduced protease cleavage sites—the first such site introduced immediately after residue 48 or 63, and the second such site introduced immediately after residue 228, 278, 282, 283, 286 or 291. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of amino acid residues 229 to 519 of SEQ ID NO: 1, or 279 to 519 of SEQ ID NO: 1, or 283 to 519 of SEQ ID NO: 1, or 284 to 519 of SEQ ID NO: 1, or 287 to 519 of SEQ ID NO: 1, or 292 to 519 of SEQ ID NO: 1, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences, wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 437, 411, 422, 429, 432, 433, and 435. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of amino acid residues 1 to 47 of SEQ ID NO: 1, or 1 to 62 of SEQ ID NO: 1, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences. In some embodiments the present invention provides compositions and/or influenza HA protein complexes that comprise, consist essentially of, or consist of a first and a second peptide, wherein (a) the first peptide comprises, consists essentially of, or consists of amino acid residues 229 to 519 of SEQ ID NO: 1, or 279 to 519 of SEQ ID NO: 1, or 283 to 519 of SEQ ID NO: 1, or 284 to 519 of SEQ ID NO: 1, or 287 to 519 of SEQ ID NO: 1, or 292 to 519 of SEQ ID NO: 1, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences, and wherein the influenza HA polypeptides, proteins, and/or protein complexes comprise a tyrosine residue (whether naturally occurring or arising from a mutation to-tyrosine), at one or more of residues 308, 403, 406, 437, 411, 422, 429, 432, 433, and 435, and wherein (b) the second peptide comprises, consists essentially of, or consists of amino acid residues 1 to 47 of SEQ ID NO: 1, or 1 to 62 of SEQ ID NO: 1, or sequences that have at least about 40% or 50% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with such amino acid sequences. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise one or more artificially-introduced cross-links, wherein at least one of the following amino acid residues within the influenza HA polypeptides, proteins, and/or protein complexes is artificially cross-linked to another amino acid residue in the influenza HA protein: Y308, N403, F406, Y437, K411, N422, D429, L432, D433, and W435 In some such embodiments, where the indicated position is not a tyrosine, that residue is mutated to tyrosine. In some such embodiments the cross-link is a di-tyrosine cross-link. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that comprise one or more artificially-introduced cross-links, wherein such artificially introduced cross-links connect two of the following amino acid residues: Y308, N403, F406, K411, Y437, N422, D429, L432, D433, and W435. In some such embodiments, where the indicated position is not a tyrosine, that residue is mutated to tyrosine. In some such embodiment the cross-link is a di-tyrosine cross-link. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes in which the amino acid residues in one or more of the following pairs of amino residues are cross-linked to each other by an artificially introduced cross-link: 308/403, 308/435, 403/437, 403/429, 403/432, 403/433, 406/429, 406/433, 411/422, 422/433, 433/435 and 437/435. In some such embodiments, where the indicated position is not a tyrosine, that residue is mutated to tyrosine. In some such embodiments the cross-link is a di-tyrosine cross-link. In some embodiments, the present invention contemplates the targeted introduction of one or more cross-links at any suitable position(s) in an influenza HA polypeptide, protein or protein complex, for example, in the stalk domain where the cross-link will or may stabilize the stalk domain in a native trimeric conformation or other conformation capable of binding anti-stalk antibodies, such as neutralizing or broadly neutralizing anti-stalk antibodies. Such stabilization may be achieved, for example, by introducing cross-links that stabilize interactions or folds within a stalk monomer or stalk protomer (intramolecular cross-link), and/or interactions between one or more stalk monomers or stalk protomers (intermolecular cross-link), or any combination of such crosslinks. In some such embodiments the cross-link is a di-tyrosine cross-link. For example, in some embodiments intermolecular di-tyrosine cross-links may be formed between tyrosine residues at positions 403 and 433, 411 and 422, or 433 and 435. Similarly, in some embodiments intermolecular di-tyrosine cross-links may be formed between a tyrosine at residue 403 and another tyrosine residue, and/or between a tyrosine at residue 433 and another residue, such as, in particular, any of the other residues described herein as potential sites for di-tyrosine cross-links, such as tyrosines (whether natural or mutated) located at residues 308, 403, 406, 411, 422, 429, 432, 433, 435, or 437. In some embodiments the present invention provides influenza HA polypeptides, proteins, and/or protein complexes comprising an artificially introduced cross-link between two of the following regions: amino acid residues from about position 298 to about 318, amino acid residues from about position 393 to about position 413, amino acid residues from about position 396 to about position 416, amino acid residues from about position 401 to about position 421, amino acid residues from about position 412 to about position 432, amino acid residues from about position 419 to about position 439, amino acid residues from about position 422 to about position 442, amino acid residues from about position 423 to about position 443, amino acid residues from about position 425 to about position 445 and amino acid residues from about 427 to about 447. In some such embodiments the cross-link is a di-tyrosine cross-link. In embodiments where the influenza HA polypeptides, proteins, and/or protein complexes of the invention comprise one or more di-tyrosine cross-links, di-tyrosine cross-links may be introduced between two endogenous tyrosine residues, between two tyrosine residues originating from “to-tyrosine” mutations, or between a tyrosine residue originating from a “to-tyrosine” mutation and an endogenous tyrosine residue. In some embodiments, more than one di-tyrosine cross-link is introduced into an influenza HA protein or polypeptide. In embodiments where the influenza HA polypeptides, proteins, and/or protein complexes of the invention comprise one or more di-tyrosine cross-links, non-limiting examples of amino acid positions where a “to-tyrosine” mutation can be introduced include N403, F406, K411, N422, D429, L432, D433, W435, or any combination thereof. In embodiments where the influenza HA polypeptides, proteins, and/or protein complexes of the invention comprise one or more di-tyrosine cross-links, non-limiting examples of preexisting or endogenous tyrosine residues that can be used to form a di-tyrosine cross-link include Y308 and Y437, or any combination thereof. In embodiments where the influenza HA polypeptides, proteins, and/or protein complexes of the invention comprise one or more di-tyrosine cross-links, non-limiting examples of residue pairs between which a di-tyrosine cross-link can be introduced include 403/429, 403/432, 403/433, 406/429, 406/433, 411/422 and 433/435, or any combination thereof. In embodiments where the influenza HA polypeptides, proteins, and/or protein complexes of the invention comprise one or more di-tyrosine cross-links, non-limiting examples of regions or secondary structures of the influenza HA protein from which amino acids may be selected for tyrosine substitution and/or di-tyrosine cross-linking include the stalk domain (e.g. amino acid residues 1 (with the signal peptide) or 18 (without the signal peptide) to 58, and 292 to 529 (without the transmembrane and cytoplasmic domain(s)) or 566 (with the transmembrane domain). In some embodiments the lower region of the stalk domain (comprising amino acid residues 18-46, 334-343, 344-390 and 449-503 of SEQ ID NO:1), and/or the head domain (e.g. amino acid residues 59 to 291 of SEQ ID NO:1), of the influenza HA polypeptides, proteins, and/or protein complexes of the invention may also comprise one or more di-tyrosine cross-links and/or one or more to-tyrosine mutations. Non-limiting examples of other regions of influenza HA proteins from which one or more amino acids may be selected for tyrosine substitution and/or cross-linking include amino acid residues from about position 298 to about position 313, amino acid residues from about position 393 to about position 413, amino acid residues from about position 396 to about position 416, amino acid residues from about position 401 to about position 421, amino acid residues from about position 412 to about position 432, amino acid residues from about position 419 to about position 439, amino acid residues from about position 422 to about position 442, amino acid residues from about position 423 to about position 443, amino acid residues from about position 425 to about position 445, and amino acid residues from about position 427 to about position 447. In some embodiments, the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of, the amino acid sequence of SEQ ID NO: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 86, 87, 88, 89, 90, 91, 92, 93, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109 or 110 (each of which are mutants of the influenza HA amino acid sequence that comprise one or more protease recognition sequences to facilitate proteolytic cleavage of the head domain of the HA protein, and/or one or more “to tyrosine” mutations to facilitate di-tyrosine cross-linking and to facilitate “locking” of the stalk domain of the influenza HA protein in a particular conformation, for example, in its native trimeric conformation), or any fragment thereof, such as fragments comprising amino acid the stalk domain of the influenza HA protein, or any other fragments of the influenza HA protein that may be generated proteolytically and/or that may be assembled into or form part of a functional influenza HA protein. In some embodiments, the present invention provides influenza HA polypeptides, proteins, and/or protein complexes that are derived from, comprise, consist essentially of, or consist of, an amino acid sequence having at least about 50%, 55%, 60%, 65%, 70%, 75%, 80%, 85%, 90%, 95%, 98%, or 99% sequence identity to SEQ ID NO: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 86, 87, 88, 89, 90, 91, 92, 93, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109 or 110, or any fragment thereof. Non-limiting examples of amino acid positions in an influenza HA protein or polypeptide to which di-tyrosine cross-links may be targeted include positions Y308 (pre-existing/endogenous Tyr residue) and N403Y (to-Tyr substitution), the positions Y308 (pre-existing/endogenous Tyr residue) and W435Y (to-Tyr substitution), the positions N403Y (to-Tyr substitution) and Y437 (pre-existing/endogenous Tyr residue), the positions N403Y (to-Tyr substitution) and D429Y (to-Tyr substitution), the positions N403Y (to-Tyr substitution) and L432Y (to-Tyr substitution), the positions N403Y (to-Tyr substitution) and D433Y (to-Tyr substitution), the positions N406Y (to-Tyr substitution) and D429Y (to-Tyr substitution), the positions N406Y (to-Tyr substitution) and D433Y (to-Tyr substitution), the positions D433Y (to-Tyr substitution) and W435Y (to-Tyr substitution), the positions K411Y (to-Tyr substitution) and W422Y (to-Tyr substitution), and the positions Y437 (pre-existing/endogenous Tyr residue) and W435Y (to-Tyr substitution). In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention comprise one of the above listed di-tyrosine cross-links. In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention comprise two of the above listed di-tyrosine cross-links (for example, SEQ ID NO: 5, 8, 11, 14, and 17). In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention comprise three of the above listed di-tyrosine cross-links. In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention comprise four of the above listed di-tyrosine cross-links. In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention comprise five or more of the above listed di-tyrosine cross-links. In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention comprise any combination or one or more of the above listed di-tyrosine cross-links. Non-limiting examples of influenza HA polypeptides, proteins and/or protein complexes designed to have more than one di-tyrosine cross-link include influenza HA proteins with two “to-tyrosine” mutations, where each such tyrosine residue forms a crosslink with different endogenous/preexisting tyrosine residues, or influenza HA proteins with four “to-tyrosine” mutations, e.g. N403Y/K411Y/N422Y/D433Y, as illustrated by SEQ ID NOs: 5, 8, 11, 14 and 17 where the tyrosine at position 403 is designed to pair with the tyrosine at position 411, and the tyrosine at position 422 is designed to pair with the tyrosine at position 433, thus stabilizing the stalk domain of the HA protein by the formation of two di-tyrosine cross-links. A bond between a first HA polypeptide and second HA polypeptide within the same protein complex (e.g. monomers that arrange to form a trimer) is an example of an inter-molecular bond. The invention provides exemplary influenza HA proteins and polypeptides comprising cross-links designed to stabilize inter-molecular interactions, as well as influenza HA polypeptides, proteins or protein complexes derived from such sequences and including the specific “to-tyrosine” mutations present in such sequences. For example, one introduced tyrosine in one monomer is designed to pair with the other introduced tyrosine on the adjacent monomer. In some embodiments, an HA polypeptide is intra-molecularly cross-linked (e.g., both tyrosines of the cross-link are located within the same HA polypeptide). The invention provides exemplary influenza HA proteins and polypeptides comprising cross-links designed to stabilize intra-molecular interactions, including without limitation, SEQ ID NO:______, as well as influenza HA polypeptides, proteins or protein complexes derived from such sequences and including the specific “to-tyrosine” mutations present in such sequences. In some embodiments (including all of those described above, and those involving influenza HA polypeptides, proteins, and/or protein complexes having any of the specific amino acid sequences recited herein, and those involving variants or fragments of such influenza HA polypeptides, proteins, and/or protein complexes having less than 100% identity to the specific amino acid sequences provided herein), the influenza HA polypeptides, proteins, and/or protein complexes of the invention should have one or more desired properties, such as being capable of (1) forming a native trimeric conformation of the stalk domain, (2) having the stalk domain “locked” in a native trimeric conformation by cross-linking, (3) binding to an influenza HA stalk-specific antibody, (4) binding to a neutralizing antibody, (5) binding to a broadly neutralizing antibody, (6) binding to an antibody selected from the group consisting of 6F12, C179, CR6261, F10, A66, and D8, (7) binding to and/or activating a B cell receptor, (8) eliciting an antibody response in an animal, (9) eliciting a protective antibody response in an animal, (10) eliciting production of neutralizing antibodies in an animal, (11) eliciting production of broadly neutralizing antibodies in an animal, (12) eliciting production of antibodies that recognize quaternary neutralizing epitopes (QNEs) in an animal, and/or (13) eliciting a protective immune response in an animal. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes described herein are capable of eliciting a protective immune response against one or more influenza virus strains in an animal and/or capable of eliciting a protective immune response against both homologous and heterologous influenza virus strains in an animal. Unless otherwise stated, all description herein that relates to specific influenza HA polypeptides, proteins, and protein complexes, relates equally to all homologs, orthologs, analogs, derivatives, mutant forms, fragments, chimeras, fusion proteins etc. thereof, such as those that have certain desired properties or features (for example those that have a stalk domain, or a portion of a stalk domain, that is capable of folding into a native trimeric conformation, or that have desired functional properties, including, but not limited to, being capable of binding to, or eliciting the production of, one or more anti-HA antibodies, such as antibodies that are specific to the influenza HA stalk domain). Similarly, all description herein that relates to specific polypeptides, proteins, and/or protein complexes polypeptides, proteins, and/or protein complexes (e.g. those having specific amino acid sequences or those from a specific influenza type, subtype, or strain) relates equally to other related forms of such polypeptides, proteins, and/or protein complexes that may exist in nature (for example in different influenza types, subtypes or strains) or that are related to the specific sequences provides herein but have been altered artificially in some way, such as by recombinant means, chemical means, or any other means. The influenza HA polypeptides, proteins, and/or protein complexes described herein can have, or can be derived from, the nucleotide and/or amino acid sequences of any suitable influenza HA polypeptides, proteins, and/or protein complexes known in the art. In some embodiments, the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be, or may be derived from, derivatives and/or analogs of specific influenza HA polypeptides, proteins, and/or protein complexes described herein or known in the art, including proteins that are substantially homologous to any such proteins, or fragments thereof (e.g., in various embodiments, those having at least about 50% or 55% or 60% or 65% or 70% or 75% or 80% or 85% or 90% or 95% or 98% or 99% identity with an amino acid or nucleic acid sequence of any specific influenza HA polypeptides, proteins, and/or protein complexes described herein or known in the art, when aligned using any suitable method known to one of ordinary skill in the art, such as, for example, using a computer homology program known in the art) or whose encoding nucleic acid is capable of hybridizing to a coding nucleic acid sequence of a protein of the invention, under high stringency, moderate stringency, or low stringency conditions. In some embodiments, the invention provides fragments of the influenza HA polypeptides, proteins, and/or protein complexes described herein, such as those comprising, consisting essentially of, or consisting of, at least about 10 amino acids, 20 amino acids, 50 amino acids, 100 amino acids, 200 amino acids, or 500 amino acids. In some embodiments one or more amino acid residues within a specific influenza HA polypeptide, protein, or protein complex as described herein, or as known in the art, can be deleted, added, or substituted with another amino acid. In embodiments where such mutations are introduced, the influenza HA polypeptides, proteins, or protein complexes can be micro-sequenced to determine a partial amino acid sequence. In other embodiments the nucleic acid molecules encoding the influenza HA polypeptides, proteins, and/or protein complexes can be sequenced to identify and/or confirm the introduction of mutations. In some embodiments, one or more amino acid residues can be substituted by another amino acid having a similar polarity and that may acts as a functional equivalent, resulting in a silent alteration. In some embodiments substitutions for an amino acid within the sequence may be selected from other members of the class to which the amino acid belongs e.g. to create a conservative substitution. For example, the nonpolar (hydrophobic) amino acids include alanine, leucine, isoleucine, valine, proline, phenylalanine, tryptophan and methionine. The polar neutral amino acids include glycine, serine, threonine, cysteine, tyrosine, asparagine, and glutamine. The positively charged (basic) amino acids include arginine, lysine and histidine. The negatively charged (acidic) amino acids include aspartic acid and glutamic acid. Such substitutions are generally understood to be conservative substitutions. In some embodiments artificial, synthetic, or non-classical amino acids or chemical amino acid analogs can be used to make the influenza HA polypeptides, proteins, and/or protein complexes of the invention. Non-classical amino acids include, but are not limited to, the D-isomers of the common amino acids, fluoro-amino acids, and “designer” amino acids such as β-methyl amino acids, Cγ-methyl amino acids, Nγ-methyl amino acids, and amino acid analogs in general. Additional non-limiting examples of non-classical amino acids include, but are not limited to: α-aminocaprylic acid, Acpa; (S)-2-aminoethyl-L-cysteine/HCl, Aecys; aminophenylacetate, Afa; 6-amino hexanoic acid, Ahx; γ-amino isobutyric acid and α-aminoisobytyric acid, Aiba; alloisoleucine, Aile; L-allylglycine, Alg; 2-amino butyric acid, 4-aminobutyric acid, and α-aminobutyric acid, Aba; p-aminophenylalanine, Aphe; b-alanine, Bal; p-bromophenylalaine, Brphe; cyclohexylalanine, Cha; citrulline, Cit; β-chloroalanine, Clala; cycloleucine, Cle; p-cholorphenylalanine, Clphe; cysteic acid, Cya; 2,4-diaminobutyric acid, Dab; 3-amino propionic acid and 2,3-diaminopropionic acid, Dap; 3,4-dehydroproline, Dhp; 3,4-dihydroxylphenylalanine, Dhphe; p-fluorophenylalanine, Fphe; D-glucoseaminic acid, Gaa; homoarginine, Hag; δ-hydroxylysine/HCl, Hlys; DL-β-hydroxynorvaline, Hnyl; homoglutamine, Hog; homophenylalanine, Hoph; homoserine, Hos; hydroxyproline, Hpr; p-iodophenylalanine, Iphe; isoserine, Ise; α-methylleucine, Mle; DL-methionine-S-methylsulfoniumchloide, Msmet; 3-(1-naphthyl) alanine, 1Nala; 3-(2-naphthyl) alanine, 2Nala; norleucine, Nle; N-methylalanine, Nmala; Norvaline, Nva; O-benzylserine, Obser; O-benzyltyrosine, Obtyr; O-ethyltyrosine, Oetyr; O-methylserine, Omser; O-methylthreonine, Omthr; O-methyltyrosine, Omtyr; Ornithine, Orn; phenylglycine; penicillamine, Pen; pyroglutamic acid, Pga; pipecolic acid, Pip; sarcosine, Sar; t-butylglycine; t-butylalanine; 3,3,3-trifluoroalanine, Tfa; 6-hydroxydopa, Thphe; L-vinylglycine, Vig; (−)-(2R)-2-amino-3-(2-aminoethylsulfonyl) propanoic acid dihydroxochloride, Aaspa; (2S)-2-amino-9-hydroxy-4,7-dioxanonanoic acid, Ahdna; (2S)-2-amino-6-hydroxy-4-oxahexanoic acid, Ahoha; (−)-(2R)-2-amino-3-(2-hydroxyethylsulfonyl) propanoic acid, Ahsopa; (−)-(2R)-2-amino-3-(2-hydroxyethylsulfanyl) propanoic acid, Ahspa; (2S)-2-amino-12-hydroxy-4,7,10-trioxadodecanoic acid, Ahtda; (2S)-2,9-diamino-4,7-dioxanonanoic acid, Dadna; (25)-2,12-diamino-4,7,10-trioxadodecanoic acid, Datda; (S)-5,5-difluoronorleucine, Dfnl; (S)-4,4-difluoronorvaline, Dfnv; (3R)-1-1-dioxo-[1,4]thiaziane-3-carboxylic acid, Dtca; (S)-4,4,5,5,6,6,6-heptafluoronorleucine, Hfnl; (S)-5,5,6,6,6-pentafluoronorleucine, Pfnl; (S)-4,4,5,5,5-pentafluoronorvaline, Pfnv; and (3R)-1,4-thiazinane-3-carboxylic acid, Tca. Furthermore, the amino acid can be D (dextrorotary) or L (levorotary). For a review of classical and non-classical amino acids, see Sandberg et al., 1998 (Sandberg et al., 1998. New chemical descriptors relevant for the design of biologically active peptides. A multivariate characterization of 87 amino acids. J Med Chem 41(14): pp. 2481-91). In addition to providing certain influenza HA polypeptides, proteins, and/or protein complexes, as described herein, the present invention also provides nucleic acids encoding such influenza HA polypeptides, proteins, and/or protein complexes, and compositions and vectors comprising such nucleic acids. Such nucleic acids can be obtained or made using any suitable method known in the art. For example, nucleic acid molecules encoding influenza HA polypeptides, proteins, and/or protein complexes may be obtained from cloned DNA or made by chemical synthesis. In some embodiments the nucleic acids may be obtained by reverse transcribing RNA prepared by any of the methods known to one of ordinary skill in the art, such as random- or poly A-primed reverse transcription. Whatever the source, a nucleic acid molecule encoding an influenza HA polypeptide, protein, and/or protein complex of the present invention can be cloned into any suitable vector, such as those to be used for propagation of the nucleic acid molecule or those to be used for expression of the nucleic acid molecule. The nucleic acid may be cleaved at specific sites using various restriction enzymes, if needed. In embodiments requiring expression, the nucleic acid can be operatively linked to a promoter suitable for directing expression in the desired cell type, such as a mammalian cell or an insect cell, and may be incorporated into any suitable expression vector, such as a mammalian or insect expression vector. A nucleic acid molecule encoding an influenza HA polypeptide, protein, and/or protein complex of the present invention optimized by methods known in the art to improve expression levels of the protein expressed therefrom. For example, codon optimization may be used to minimize or eliminate variations in codon usage between species. In some embodiments an influenza HA polypeptide, protein, and/or protein complex of the present invention is derived from a nucleic acid molecule that has been codon optimized for expression in humans (see, for example, SEQ ID NO.63 and FIG. 48), Cricetulus griseus (see, for example, SEQ ID NO.64 and FIG. 49), Nicotiana benthamiana (see, for example, SEQ ID NO.65 and FIG. 50), Pichia pastoris (see, for example, SEQ ID NO.66 and FIG. 51), Saccharomyces cerevisiae (see, for example, SEQ ID NO.67 and FIG. 52) or Spodoptera frugiperda (see, for example, SEQ ID NO.68 and FIG. 53). In some embodiments, the present invention provides nucleic acids that are derived from, comprise, consist essentially of, or consist of, the nucleic acid sequence of SEQ ID NO: 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, or 62 (each of which encodes a mutant of the influenza HA amino acid sequence that comprises one or more protease recognition sequences to facilitate proteolytic cleavage of the head domain of the HA protein, and/or one or more “to tyrosine” mutations to facilitate di-tyrosine cross-linking and to facilitate “locking” of the stalk domain of the influenza HA protein in a particular conformation, for example, in its native trimeric conformation), or any fragment thereof, such as fragments encoding the stalk domain of the influenza HA protein. Furthermore, one or skill in the art can readily visualize, or make, nucleic acid molecules that comprise any one or more of the specific “to-tyrosine” mutations described herein, for example, by locating the nucleotide codon that encodes the specific amino acid residue to be mutated, and mutating the nucleotides at that codon as necessary to result in a tyrosine-encoding codon. In some embodiments the influenza HA polypeptides and/or proteins of the invention are assembled into protein complexes having a desired conformational structure, such as the native trimeric conformation of the stalk domain, and are cross-linked in order to stabilize that conformation. Details of particular regions of the influenza HA protein that can be cross-linked, as well as particular influenza HA mutants designed to facilitate such cross-linking, are described in other sections of this application. In some embodiments the cross-links may be used to stabilize the tertiary and/or quarternary structures of the influenza HA protein. In some embodiments, the cross-linking may be intra- and/or intermolecular cross-linking. In some embodiments, the cross-links that are used are targeted cross-links. In some embodiments, the cross-links that are used are stable under physiological conditions. In some embodiments, the cross-links that are used do not lead to aggregate formation of the influenza HA protein, for example during expression and/or during storage (such as storage of compositions comprising high concentrations of the influenza HA protein). In some embodiments the introduction of such cross-links may enhance the effectiveness of the influenza HA polypeptides, proteins and proteins of the invention as immunogens, such as vaccine immunogens. In some embodiments the introduction of such cross-links may stabilize epitopes within the influenza HA protein, for example, epitopes in the stalk domain, such that the epitopes can be recognized by particular antibodies, elicit production of antibodies, and/or activate B cell receptors upon antibody binding. In some embodiments targeted cross-linking can be used. A targeted cross-link is one that can be made to form at a particular position or positions within the influenza HA protein or protein complex. Several strategies may be used to target cross-links to specific locations in an influenza HA protein or polypeptide, such as the specific locations described herein. The present invention provides residue pairs within the influenza HA protein that, when cross-linked, can or may stabilize an influenza HA polypeptide, protein, or protein complex in a conformation that is capable of binding to, or eliciting the production of, neutralizing antibodies, and/or that is capable of generating a neutralizing antibody response in an animal. A targeted cross-link may be introduced at one or more of the locations or positions specified herein by exploiting the physical and/or chemical properties of certain amino acid side chains, for example by making use of enzymatic reactions that recognize specific amino acid sequences or three-dimensional structures, or by incorporating non-natural amino acids that have the ability to form cross-links in a folded protein or protein complex. Cross-links or modifications may be targeted to specific sites in the structure of the influenza HA protein or polypeptide, for example the stalk domain, in order to achieve the desired outcome, e.g. stabilization of the stalk domain in its native trimeric conformation. The present invention contemplates the targeted introduction of one or more cross-links and/or other stabilizing modifications at any suitable position(s) in an influenza HA protein or polypeptide, preferably where the cross-link or modification stabilizes the stalk domain in its native trimeric conformation, or provides enhanced stabilization of the native trimeric conformation of the stalk domain. The invention contemplates that any influenza HA protein amino acid residue, residue pair, secondary structure or other region described herein for di-tyrosine cross-linking may also be used in the formation of other targeted cross-links or bonds or other modifications, including but not limited to amino acid positions Y308, N403, N406, K411, W422, D429, L432, D433, W435, and Y437 or any combination thereof; residue pairs 308/403, 308/435, 403/437, 403/429, 403/432, 403/433, 406/429, 406/433, 411/422, 433/435 and 437/435, or any combination thereof; regions or secondary structures including, for example the HA protein stalk domain or head domain; and other regions of influenza HA protein including the transmembrane domain or the lower region of the stalk domain. In some embodiments the influenza HA polypeptides, proteins and protein complexes of the invention comprise cross-links in the stalk domain, such cross-links need not be located only in the stalk domain. In some embodiments cross-links may be located anywhere throughout the influenza HA polypeptide, protein or protein complex, including the head domain in “head-on” polypeptides, proteins and/or protein complexes, as desired. Preferably, an influenza HA polypeptide, protein and/or protein complex comprising cross-links in other regions (e.g. outside of the stalk domain) will retain one or more desired properties such as being capable of (1) forming a native trimeric conformation of the stalk domain, (2) having the stalk domain “locked” in a native trimeric conformation by cross-linking, (3) binding to an influenza HA stalk-specific antibody, (4) binding to a neutralizing antibody, (5) binding to a broadly neutralizing antibody, (6) binding to an antibody selected from the group consisting of 6F12, C179, CR6261, F10, A66, and D8, (7) binding to and/or activating a B cell receptor, (8) eliciting an antibody response in an animal, (9) eliciting a protective antibody response in an animal, (10) eliciting production of neutralizing antibodies in an animal, (11) eliciting production of broadly neutralizing antibodies in an animal, (12) eliciting production of antibodies that recognize quaternary neutralizing epitopes (QNEs) in an animal, and/or (13) eliciting a protective immune response in an animal. A wide variety of methods of cross-linking proteins intra- and inter-molecularly are known in the art, including those having cross-links with varying lengths of spacer arms, and those with and without fluorescent and functional groups for purification. Such methods include, but are not limited to, the use of heterobifunctional cross-linkers (e.g. succinimidyl acetylthioacetate (SATA), trans-4-(maleimidylmethyl)cyclohexane-1-carboxylate (SMCC), and succinimidyl 3-(2-pyridyldithio)propionate (SPDP)), homobifunctional cross-linkers (e.g. succinimidyl 3-(2-pyridyldithio)propionate), photoreactive cross-linkers (e.g. 4-azido-2,3,5,6-tetrafluorobenzoic acid, STP ester, sodium salt (ATFB, STP ester), 4-azido-2,3,5,6-tetrafluorobenzoic acid, succinimidyl ester (ATFB, SE), 4-azido-2,3,5,6-tetrafluorobenzyl amine, hydrochloride, benzophenone-4-isothiocyanate, benzophenone-4-maleimide, 4-benzoylbenzoic acid, succinimidyl ester, N-((2-pyridyldithio)ethyl)-4-azidosalicylamide (PEAS; AET), thiol reactive cross-linkers (e.g. maleimides and iodoacetamides), amine reactive cross-linkers (e.g. glutaraldyde, bis(imido esters), bis(succinimidyl esters), diisocyanates and diacid chlorides). Because thiol groups are highly reactive and relatively rare in most proteins by comparison to amine groups, thiol-reactive cross-linking may be used in some embodiments. In cases where thiol groups are missing or not present at appropriate sites in the structures of influenza HA protein, they can be introduced using one of several thiolation methods. For example, Succinimidyl trans-4-(maleimidylmethyl)cyclohexane-1-carboxylate can be used to introduce thiol-reactive groups at amine sites. Several oxidative cross-links are known, such as disulfide bonds (which form spontaneously and are pH and redox sensitive), and di-tyrosine bonds (which are highly stable, and irreversible under physiological conditions). In some embodiments the cross-links stabilize the tertiary structure of an influenza HA protein. In some embodiments the cross-links stabilize the quaternary structure of an influenza HA protein. In some embodiments the cross-links stabilize both the tertiary and quaternary structure of an influenza HA protein. In some embodiments an influenza HA polypeptide, protein and/or protein complex of the invention has cross-links that are thermostable. In some embodiments an influenza HA polypeptide, protein and/or protein complex of the invention has cross-links that are not toxic. In some embodiments an influenza HA polypeptide, protein and/or protein complex of the invention has cross-links that are targeted cross-links, or non-targeted cross-links, or reversible cross-links, or irreversible cross-links, or cross-links formed by use of homo-bifunctional cross-linking agents, or cross-links formed by use of hetero-bifunctional cross-linking agents, or cross-links formed by use of reagents that react with amine groups, or cross-links formed by use of reagents that react with thiol groups, or cross-links formed by use of reagents that are photoreactive, or cross-links formed between amino acid residues, or cross-links formed between mutated amino acid residues incorporated into the structure of the proteins or protein complexes, or oxidative cross-links, or di-tyrosine bonds, or glutaraldehyde cross-links, or any combination thereof. In some embodiments an influenza HA polypeptide, protein and/or protein complex of the invention does not have glutaraldehyde cross-links. In some embodiments an influenza HA polypeptide, protein and/or protein complex of the invention does not have any artificially-introduced disulfide bonds, or if it does have such disulfide bonds, also has additional artificially-introduced cross-links. In some embodiments an influenza HA polypeptide, protein and/or protein complex of the invention does not have any artificially introduced disulfide bonds, but may have naturally occurring disulfide bonds. Disulfide bonds can be introduced artificially when cysteine side-chains are engineered by point mutation. Disulfide bonds are, however, known to be pH sensitive and to be dissolved under certain redox conditions, and the preventative and/or therapeutic utility of proteins and/or protein complexes engineered with disulfide cross-links, for example to be used as immunogens in vivo, may therefore be compromised. Furthermore, undesired disulfide bonds often form between proteins with free sulfhydryl groups that mediate aggregate formation (see, for example, Harris R J et al. 2004, Commercial manufacturing scale formulation and analytical characterization of therapeutic recombinant antibodies. Drug Dev Res 61 (3): 137-154; Costantino & Pikal (Eds.), 2004. Lyophilization of Biopharmaceuticals, editors Costantino & Pekal. Lyophilization of Biopharmaceuticals. Series: Biotechnology: Pharmaceutical Aspects II, see pages 453-454; Tracy et al., 2002, U.S. Pat. No. 6,465,425), which has also been reported as a problem with HIV gp120 and gp41 (Jeffs et al. 2004. Expression and characterization of recombinant oligomeric envelope glycoproteins derived from primary isolates of HIV-1. Vaccine 22:1032-1046; Schulke et al., 2002. Oligomeric and conformational properties of a proteolytically mature, disulfide-stabilized human immunodeficiency virus type 1 gp140 envelope glycoprotein. J Virol 76:7760-7776). Thus, in many embodiments it is preferred that disulfide bonding is not used, or is not used as the sole method of cross-linking. If the structure and/or immunogenicity of an influenza HA polypeptide, protein and/or protein complex is compromised or altered by a cross-link, maintaining its overall structure and function can be achieved by controlling the availability of amino acid side-chains for the cross-linking reaction or by introducing additional cross-links or other stabilizing modifications. For example, in the case of DT cross-linking, tyrosyl side-chains that are available for reaction, but that lead to the distortion of the structure of the complex, and that compromise the immunogenicity/antigenicity of the influenza HA protein, can be removed by mutating such residues to another amino acid such as, for example, phenylalanine. Furthermore, point mutations may be introduced at positions where the amino acid side-chains will react with cross-linking agents or each other, such that the formation of the bond(s) causes the most beneficial outcome. These positions may also be identified as described herein. When at a selected residue a reactive side-chain is not already present, a point mutation may be introduced, for example using molecular biological methods to introduce such a point mutation into the cDNA of a nucleic acid directing its expression, such that a reactive side-chain is present and available for the reaction. Cross-links that may be used include, but are not limited to, reversible cross-links resulting from the use of homo- and hetero-bifunctional cross-linking agents that react with amine and/or thiol groups, photoreactive cross-link reagents, any cross-links that may form between non-classical amino acids incorporated into the structure of an influenza HA polypeptide, protein and/or protein complex, any oxidative cross-links, such as, but not limited to, di-tyrosine cross-links/bonds, heterobifunctional cross-linkers (e.g. succinimidyl acetylthioacetate (SATA), trans-4-(maleimidylmethyl)cyclohexane-1-carboxylate (SMCC), and succinimidyl 3-(2-pyridyldithio)propionate (SPDP)), homobifunctional cross-linkers (e.g. succinimidyl 3-(2-pyridyldithio)propionate), photoreactive cross-linkers (e.g. 4-azido-2,3,5,6-tetrafluorobenzoic acid, STP ester, sodium salt (ATFB, STP ester), 4-azido-2,3,5,6-tetrafluorobenzoic acid, succinimidyl ester (ATFB, SE), 4-azido-2,3,5,6-tetrafluorobenzyl amine, hydrochloride, benzophenone-4-isothiocyanate, benzophenone-4-maleimide, 4-benzoylbenzoic acid, succinimidyl ester, N-((2-pyridyldithio)ethyl)-4-azidosalicylamide (PEAS; AET), thiol reactive cross-linkers (e.g. maleimides and iodoacetamides), amine reactive cross-linkers (e.g. glutaraldyde, bis(imido esters), bis(succinimidyl esters), diisocyanates and diacid chlorides). The present invention also contemplates the introduction of targeted non-covalent tyrosine-stacking interactions as “cross-links” to stabilize protein-protein interactions and/or desired protein or peptide conformations, such as the native trimeric conformation of a stalk domain of an influenza HA polypeptide, protein and/or protein complex. The cross-link comprises a targeted pi stacking interaction including but not limited to a T-shaped, sandwich, or parallel displaced pi stacking interaction between the aromatic side chains of an introduced/engineered tyrosine and an endogenous tyrosine, phenylalanine, histidine, or tryptophan within the influenza HA polypeptide, protein and/or protein complex, or between the aromatic side chain of an introduced/engineered tyrosine and a second introduced/engineered tyrosine within the influenza HA polypeptide, protein and/or protein complex. Irreversible cross-links, as used in the context of this application, include those that are not significantly dissolved under physiologically relevant conditions. It is preferred that the type of cross-links used should not lead to aggregate formation during expression or when the influenza HA polypeptides, proteins and/or protein complexes of the invention are stored at high concentrations. Disulfide bonds are not irreversible cross-links. Rather they are reversible cross-links and may dissolve under physiologically relevant conditions and/or lead to aggregate formation during protein expression and/or production or when stored in high concentrations. In some embodiments cross-links may be targeted to the specific regions of influenza HA polypeptides, proteins and/or protein complexes described herein in order to achieve the desired conformational stabilization and/or the desired immunogenic properties (e.g. the ability to maintain the stalk domain in its native trimeric conformation and/or to bind to broadly neutralizing antibodies). Alternatively, proteins with the cross-links at the locations specified herein may be isolated from a mixture of cross-linked and un-cross-linked proteins with and without desired modifications, for example based on chemical, physical, and/or functional characteristics. Such characteristics may include, for example, trimerization, the presence of a stalk domain having a native trimeric conformation, and/or any desired antigenic, immunogenic, or biochemical characteristics. Alternatively, in some embodiments, cross-links may not be targeted, and proteins with the desired cross-links or properties may be isolated from a mixture of modified and unmodified proteins made using a non-targeted cross-linking system. In embodiments where influenza HA polypeptides, proteins or protein complexes with the desired cross-links are to be isolated from a mixture of cross-linked and un-cross-linked proteins, such isolation or separation may be performed on the basis of one or more characteristics including, but not limited to, molecular weight, molecular volume, chromatographic properties, mobility in electrophoresis, antigenic and biochemical characteristics, fluorescence characteristics, solubility, binding to antibodies, structural characteristics, immunological characteristics, or any other suitable characteristics. In addition to the specific cross-linking positions described herein, additional positions within influenza HA polypeptides, proteins or protein complexes can be identified at which further cross-links can be made, for example where a reactive side-chain would be able to form a bond with a reactive side-chain elsewhere on the influenza HA polypeptide, protein or protein complex. In some embodiments, such additional positions can be selected, for example, to maintain or improve the immunogenicity/antigenicity of the protein, polypeptide or protein complex. In some embodiments, such additional positions to be cross-linked can be selected in pairs. Di-Tyrosine (DT) Cross-Linking In some embodiments the present invention provides influenza HA polypeptides, proteins and/or protein complexes that comprise di-tyrosine (DT) cross-links, and methods of making such DT-cross-linked influenza HA polypeptides, proteins and/or protein complexes. Di-tyrosine cross-linking introduces one or more covalent carbon-carbon bonds into proteins or protein complexes. This provides a method for stabilizing proteins, protein complexes, and conformations, by introduction of intra- and/or inter-polypeptide di-tyrosine bonds while maintaining their structural and functional integrity (See Marshall et al., U.S. Pat. Nos. 7,037,894 & 7,445,912, the contents of which are hereby incorporated by reference). The minimally altering, and zero-length DT cross-link is not hydrolyzed under physiological conditions, and has been demonstrated to maintain proteins' structural integrity by liquid chromatography/mass spectrometry (LC/MS). Di-tyrosine cross-links are known to be safe, as they form naturally in vivo, both in the context of proteins evolved to utilize their specific characteristics (e.g. Elvin C M et al. 2005, Nature 437:999-1002; Tenovuo J & Paunio K 1979, Arch Oral Biol.; 24(8):591-4), and as a consequence of non-specific protein oxidation (Giulivi et al. 2003, Amino Acids 25(3-4):227-32), and as they are present in large quantities in some of our most common foods: DT bonds form the structure of wheat gluten—the quarternary protein structure comprising the glutenin subunits—e.g. in bread dough during mixing and baking (Tilley et al. 2001, Agric. Food Chem 49, 2627). Di-tyrosine bonds do not form spontaneously in vitro. Rather, the enzymatic cross-link reaction is carried out under optimized conditions to preserve protein structure and function. Therefore, non-specific bonding/aggregation does not occur (unlike with disulfide bonding), and therefore large-scale manufacturing of a DT stabilized immunogen may be economically more feasible. Tyrosyl side-chains are present in many redox enzymes, and catalysis of the enzyme-specific reactions often involves tyrosyl radicals that are long-lived and have comparatively low reactivity. Under optimized conditions radical formation is specific to tyrosyl side-chains. In close proximity, tyrosyl side chains undergo radical coupling and form a covalent, carbon-carbon bond. Tyrosyl radicals that do not react revert to non-radicalized tyrosyl side-chains (Malencik & Anderson, 2003. Di-tyrosine as a product of oxidative stress and fluorescent probe. Amino Acids 25: 233-247). Therefore, tyrosyl side-chains must be situated in close proximity to form DT bonds, either within a single folded polypeptide chain, or on closely interacting protein domains within a complex. Because a Cα-Cα separation of approximately 5-8 Å is a prerequisite to bond formation (Brown et al., 1998. Determining protein-protein interactions by oxidative cross-linking of a glycine-glycine-histidine fusion protein. Biochemistry 37, 4397-4406; Marshall et al. 2006, U.S. Pat. No. 7,037,894), and because no atom is added in the formation of these bonds, the resulting “staple” is “zero length” and non-disruptive to the protein structure. Tyrosine residues to be cross-linked may be naturally present in the primary structure of the protein to be cross-linked or may be added by controlled point mutation. To form DT bonds, proteins with tyrosyl side chains can be subjected to reaction conditions that lead to the formation of DT bonds. Such conditions are, or become, oxidative reaction conditions, as the DT bond formation reaction is an oxidative cross-linking reaction. In some embodiments the DT cross-linking reaction conditions yield proteins that are otherwise not, or not detectably, modified. Such conditions may be obtained by use of enzymes that catalyze the formation of H2O2, such as peroxidases. DT bond formation may be monitored by spectrophotometry with an excitation wavelength of around 320 nm, and fluorescence measured at a wavelength of around 400 nm (see, for example, FIG. 4A), while loss of tyrosyl fluorescence is monitored also monitored by standard procedures. When loss of tyrosyl florescence is no longer stoichiometric with DT bond formation, the reaction may be stopped by any methods known to one skilled in the art, such as, for example, by the addition of a reducing agent and subsequent cooling (on ice) or freezing of the sample. Further details of how to perform DT cross-linking are known in the art and are described in, for example, Marshall et al. 2006, U.S. Pat. No. 7,037,894, the contents of which are hereby incorporated by reference. The major advantages of di-tyrosine cross-linking in protein engineering include (i) the ability to target specific residues for cross-linking (based on the primary, secondary, tertiary, and/or quaternary structures of proteins and complexes), (ii) minimal structural modification, (iii) specificity of the reaction (tyrosine is the only amino acid known to form cross-links under specific cross-linking conditions); (iv) stability of the linkage, (v) zero length of the cross-link (no atom is added), and (vi) the scalability of the cross-linking chemistry. In some embodiments, targeted DT cross-links may be introduced at one or more of the specific locations in the influenza HA protein that are recited herein. In other embodiments, additional positions within influenza HA polypeptides, proteins or protein complexes can be identified at which DT cross-links can be made. In some embodiments, di-tyrosine bonds or cross-links are targeted to specific residue pairs within the structure of an influenza HA polypeptide, protein and/or protein complex where DT bonds will, or are expected to, form due to, for example, their close proximity. In some embodiments tyrosyl side chains are already present at amino acid residues to be cross-linked. In some cases naturally occurring tyrosine residues may constitute either one or both of the paired tyrosine residues necessary for di-tyrosine bond formation. However, in other cases the influenza HA polypeptides, proteins and/or protein complexes of the invention are mutated or engineered to add one or more tyrosine residues, or to substitute one or more non-tyrosine residues for tyrosine residues. Such mutations are referred to herein as “to-tyrosine” mutations, and can be introduced at locations where it is desirable to form di-tyrosine cross-links/bonds. In some embodiments, the present invention provides mutant influenza HA polypeptides, proteins, and/or protein complexes in which tyrosyl side chains are introduced at desired cross-linking positions by introducing point mutations to tyrosine in a nucleic acid sequence encoding the influenza HA polypeptide, protein, or protein complex. Alternatively, in some embodiments influenza HA proteins, polypeptides or protein complexes, or portions thereof, may be synthesized to include tyrosine residues or amino acids having tyrosyl side chains at desired cross-linking positions. Conversely, in some embodiments the present invention provides mutant influenza HA polypeptides, proteins, and/or protein complexes in which tyrosyl side chains are removed at undesirable cross-linking positions by introducing point mutations from tyrosine in a nucleic acid sequence encoding the influenza HA polypeptide, protein, or protein complex, or influenza HA polypeptides, proteins, or protein complexes may be synthesized to exclude tyrosine residues or amino acids having tyrosyl side chains at positions where cross-linking is not desired. For example, at least one of the tyrosyl side chains can be replaced with another side chain, such as a phenylalanine side chain (see, for example, Marshall C P et al., U.S. Pat. No. 7,037,894, the contents of which are hereby incorporated by reference). Accordingly, the influenza HA polypeptides, proteins and protein complexes of the invention may comprise point mutations “to tyrosine” or “from tyrosine.” Such mutations can be made by altering the nucleic acid sequences that encode the influenza HA polypeptides, proteins and/or protein complexes of the invention using any suitable mutagenesis methods known in the art. Alternatively, mutant influenza HA polypeptides, proteins and/or protein complexes may be synthesized, purified, and/or produced by any other suitable methods known in the art. In some embodiments, the present invention contemplates the targeted introduction of one or more di-tyrosine cross-link at any suitable position(s) in an influenza HA polypeptide, protein or protein complex, for example, in the stalk domain where the cross-link will or may stabilize the stalk domain in a native trimeric conformation or other conformation capable of binding anti-stalk antibodies, such as neutralizing or broadly neutralizing anti-stalk antibodies. Such stabilization may be achieved, for example, by introducing cross-links that stabilize interactions or folds within a stalk monomer (intra-molecular cross-linking) and/or interactions between one or more stalk monomers that comprise that stalk trimer (inter-molecular cross-linking), or any combination of intra- and/or inter-molecular crosslinks. Proteolytic Cleavage In some embodiments of the invention the influenza HA polypeptides, proteins and/or protein complexes of the invention (and/or intermediates in the synthesis thereof), comprise one or more protease recognition motifs that can be used, for example, to facilitate proteolytic removal of the head domain. Any suitable protease recognition motifs known in the art can be used. Such engineered protease recognition sites can be located at any suitable location in the influenza HA polypeptide, protein, and/or protein complex in which they will be useful for the disruption and/or removal of the head domain but preferably will not disrupt the native trimeric conformation of (and/or conformation of neutralizing eptiopes in) the stalk domain. Such locations can be determined using methods known in the art, including, but not limited to, testing the effect of introducing engineered protease recognition sites in functional assays, antibody binding assays, antigenic assays, structural assays, and the like. In some embodiments such engineered protease recognition motifs may be located within a variable loop region—as such regions are known to tolerate variations in amino acid sequence without significantly altering the structure and/or function of the influenza HA protein. The influenza HA proteins of the invention can be engineered to introduce one or more protease recognition sequences by, for example, inserting one or more amino acids that comprise, or comprise part of, a protease recognition site (see for example SEQ ID NO. 18, 19, 21, 23 and 25), or by substituting one or more amino acids from the influenza HA protein with different amino acids that comprise, or comprise part or, a protease recognition site (see for example SEQ ID NO. 24), or by performing a combination of insertion and substitution of amino acids (see for example SEQ ID NO. 20 and 22) in order to generate a protease recognition sequence within the influenza HA protein sequence. The engineered protease recognition site will typically consist of up to about 20 amino acid residues. In some embodiments the influenza HA polypeptides, proteins and/or protein complexes described herein comprise an engineered protease recognition motif at one or more of the following primary head-removal sites: amino acid residues 53-67, amino acid residues 60-76, amino acid residues 269-277, and amino acid residues 277-290, and may optionally also comprise an engineered protease recognition motif at one or more of the following secondary head-removal sites: amino acid residues 142-146, and amino acid residues 155-164. In some embodiments the influenza HA polypeptides, proteins and/or protein complexes of the present invention comprise a protease recognition sequence that begins at an amino acid residue position within one of the following regions of the influenza HA protein: amino acid residues 40-68, amino acid residues 60-76, amino acid residues 77-114, amino acid residues 120-141, amino acid residues 142-146, amino acid residues 148-178, amino acid residues 182-188, amino acid residues 195-201, amino acid residues 209-242, amino acid residues 250-255, amino acid residues 260-285, amino acid residues 277-290, and amino acid residues 286-320. In some embodiments such protease recognition motifs may allow proteolytic cleavage at one or more of the Sa, Ca, Sb and Cb antigenic sites in the influenza HA head domain. In some embodiments the protease recognition motif is inserted into the influenza HA protein immediately following the amino acid at position 48, 63, 278, 282, 286, or 291. In some embodiments the protease recognition motif is inserted into the influenza HA protein within one or more of the following regions of the influenza HA protein: amino acid residues 38-58, amino acid residue 53-73, amino acid residues 268-288, amino acid residues 272-292, amino acid residues 276-296 and amino acid residues 281-301. In some embodiments the protease recognition motifs may comprise a PreScission Protease recognition sequence (for example, LEVLFQGP (SEQ ID NO. 69)) or TEV recognition sequence, (for example, ENLYFQG (SEQ ID NO. 70) or ENLYFQS (SEQ ID NO. 71)), or any combination thereof. Nucleotide sequences encoding such protease recognition sites can be engineered into the nucleic acids that encode the influenza HA polypeptides, proteins, and/or protein complexes of the invention using standard molecular biology techniques known in the art. Making and Analyzing Influenza HA Polypeptides, Proteins, and Protein Complexes In some embodiments the present invention provides methods for making the influenza HA polypeptides, proteins, and protein complexes of the invention. The influenza HA polypeptides, proteins, and protein complexes of the invention can be made by any suitable means known in the art. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention can be made by recombinant means. In some embodiments, the influenza HA polypeptides, proteins, and/or protein complexes of the invention, or any portion thereof, can be made by chemical synthesis means. For example, a peptide corresponding to a portion of a protein or protein complex as described herein can be synthesized by use of a peptide synthesizer. Recombinant Production Methods In embodiments where the influenza HA polypeptides, proteins and protein complexes of the invention are made by recombinant means, nucleic acids encoding the influenza HA polypeptides, proteins and protein complexes of the invention can be expressed in any suitable cell type, including, but not limited to mammalian cells, avian cells (such as EB66 duck cells) and insect cells (such as SF9 or Hi5 cells, using a baculovirus expression system). Methods for expressing polypeptides and proteins from nucleic acid molecules are routine and well known in the art, and any suitable methods, vectors, systems, and cell types known in the art can be used. For example, typically nucleic acid sequences encoding the influenza HA polypeptides, proteins and/or protein complexes of the invention will be placed into a suitable expression construct containing a suitable promoter, which will then be delivered to cells for expression. Chimeric/Fusion Proteins & Oligomerization Domains In some embodiments it may be desirable to add chimeric domains to the influenza HA polypeptides, proteins and/or protein complexes described herein, to produce chimeric proteins/fusion proteins, for example to facilitate the analysis and/or isolation and/or purification of the influenza HA polypeptides, proteins and/or protein complexes described herein. In some embodiments, the influenza HA polypeptides, proteins and protein complexes of the invention may comprise leader sequences, precursor polypeptide sequences, secretion signals, localization signals, epitope tags, protease cleavage sites, and the like. Epitope tags that can be used include, but are not limited to, FLAG tags, glutathione S-transferase (GST) tags, green fluorescent protein (GFP) tags, hemagglutinin A (HA) tags, histidine (H is) tags, luciferase tags, maltose-binding protein (MBP) tags, c-Myc tags, protein A tags, protein G tags, streptavidin (strep) tags, and the like. In some embodiments it may be desirable to add oligomerization domains to facilitate the assembly of influenza HA polypeptides, proteins and/or protein complexes as described herein, and/or to facilitate stabilization of stalk domain in a native trimeric conformation, and/or to stabilize other structural features of the influenza HA polypeptides, proteins and/or protein complexes. In some embodiments the oligomerization domains are trimerization motifs, including, but not limited to, the T4 foldon motif. There are a wide variety of trimerization domains in natural proteins that can be used for these purposes including, but not limited to, those described in Habazettl et al., 2009 (Habazettl et al., 2009. NMR Structure of a Monomeric Intermediate on the Evolutionarily Optimized Assembly Pathway of a Small Trimerization Domain. J. Mol. Biol.), Kammerer et al., 2005 (Kammerer et al., 2005. A conserved trimerization motif controls the topology of short coiled coils. Proc Natl Acad Sci USA 102 (39): 13891-13896), Innamorati et al., 2006 (Innamorati et al., 2006. An intracellular role for the Clq-globular domain. Cell signal 18(6): 761-770), and Schelling et al., 2007 (Schelling et al., 2007. The reovirus σ-1 aspartic acid sandwich: A trimerization motif poised for conformational change. Biol Chem 282(15): 11582-11589). Stabilizing trimeric protein complexes can also be accomplished using the GCN4 and T4 fibrinitin motifs (Pancera et al., 2005. Soluble Mimetics of Human Immunodeficiency Virus Type 1 Viral Spikes Produced by Replacement of the Native Trimerization Domain with a Heterologous Trimerization Motif: Characterization and Ligand Binding Analysis. J Virol 79(15): 9954-9969; Guthe et al., 2004. Very fast folding and association of a trimerization domain from bacteriophage T4 fibritin. J. Mol. Biol. v337 pp. 905-15; Papanikolopoulou et al., 2008. Creation of hybrid nanorods from sequences of natural trimeric fibrous proteins using the fibritin trimerization motif. Methods Mol Biol 474:15-33). Heterologous oligomerization motifs may be introduced by any recombinant methods known to one of ordinary skill in the art in order to stabilize the protein-protein interactions of the proteins of the present invention. In some embodiments it may be desirable to add more than one additional domain and/or tag to the influenza polypeptides, proteins and/or protein complexes described herein, and any combination of suitable chimeric and/or oligomerization domains may be added to make desired influenza HA polypeptides, proteins and/or protein complexes. In some embodiments, the additional domains are engineered at or in the transmembrane region of an influenza HA protein, for example by insertion and/or substitution of one or more amino acids in the transmembrane region such that all or a portion of the transmembrane region is replaced by the additional domains. In some embodiments the additional domains comprise a thrombin cleavage site, a T4 foldon motif and a histidine tag (e.g. a 6× His tag (SEQ ID NO: 118)). In some embodiments the additional domains are encoded by a nucleic acid sequence comprising CGTTCTCTGGTTCCGCGTGGTTCTCCGGGTTCTGGTTACATCCCGGAAGCTCCGCGT GACGGTCAGGCTTACGTTCGTAAAGACGGTGAATGGGTTCTGCTGTCTACCTTCCTG CACCACCACCACCACCACTGA (SEQ ID NO. 72). In some embodiments the influenza HA polypeptides, proteins and/or protein complexes comprise a tag comprising, consisting of, or consisting essentially of the amino acid sequence RSLVPRGSPGSGYIPEAPRDGQAYVRKDGEWVLLSTFLHHHHHH (SEQ ID NO:116). Chimeric influenza HA polypeptides, proteins and/or protein complexes can be made by any method known to one of ordinary skill in the art, and may comprise, for example, one or several influenza HA polypeptides, proteins and/or protein complexes of the invention, and/or any fragment, derivative, or analog thereof (for example, consisting of at least a domain of a polypeptide, protein, or protein complex of the invention, or at least 6, and preferably at least 10 amino acids of thereof) joined at its amino- or carboxy-terminus via a peptide bond to an amino acid sequence of another protein or other protein domain or motif. In some embodiments such chimeric proteins can be produced by any method known to one of ordinary skill in the art, including, but not limited to, recombinant expression of a nucleic acid encoding a chimeric protein (e.g. comprising a first coding sequence joined in-frame to a second coding sequence); ligating the appropriate nucleic acid sequences encoding the desired amino acid sequences to each other in the proper coding frame, and expressing the chimeric product. Post-Translational Modifications In some embodiments, the influenza HA polypeptides, proteins and protein complexes described herein may be altered by adding or removing post-translational modifications, by adding or removing chemical modifications or appendices, and/or by introducing any other modifications known to those of ordinary skill in the art. Included within the scope of the invention are influenza HA polypeptides, proteins and protein complexes that are modified during or after translation or synthesis, for example, by glycosylation (or deglycosylation), acetylation (or deacetylation), phosphorylation (or dephosphorylation), amidation (or deamidization), pegylation, derivatization by known protecting/blocking groups, proteolytic cleavage, or buy any other means known in the art. For example, in some embodiments the influenza HA polypeptides, proteins and/or protein complexes may be subjected to chemical cleavage by cyanogen bromide, trypsin, chymotrypsin, papain, V8 protease, NaBH4, acetylation, formylation, oxidation, reduction, metabolic synthesis in the presence of tunicamycin, etc. In some embodiments such post-translational modifications can be used to render the influenza HA polypeptides, proteins, and/or protein complexes of the present invention more immunogenic, more stable, and/or more capable of binding to, or eliciting the production of, neutralizing and broadly neutralizing antibodies. Obtaining Influenza HA Protein in Desired Conformations In some embodiments the influenza HA polypeptides and/or proteins of the invention are assembled into protein complexes having a desired conformational structure, such as the native trimeric structure of the stalk domain, and are cross-linked in order to stabilize that conformation. As described elsewhere in the present application, the influenza HA protein comprises a trimer formed from three monomers. In some embodiments, prior to and/or during the enzymatic cross-linking reaction, the influenza HA protein may be obtained in (and/or maintained in) the desired conformation, for example while cross-linking is performed. In some embodiments the influenza HA protein may be produced and/or isolated in such a way that most, or substantially all, of the influenza HA molecules have a stalk domain present in a native trimeric conformation. For example, when the HA protein is expressed or obtained in a form that still comprises the head domain, the stalk domain will typically assume its native trimeric stalk confirmation. In some embodiments influenza HA molecules in a desired conformation may be separated from a mixed population of influenza HA protein molecules comprising some that are in the desired conformation (e.g. native trimeric conformation of the stalk domain) and some that are in other conformations (e.g. stalk domain in a monomeric and/or dimeric conformation). In some embodiments, the influenza HA protein is expressed in cells (for example as its membrane bound or soluble form) and spontaneously assembles into its normal conformation (e.g. having a stalk domain in its native trimeric conformation). In some embodiments no additional stabilization may be necessary to retain stalk domain the influenza HA protein in its native trimeric form. In some embodiments the expressed and assembled/folded influenza HA protein may be kept under particular conditions, or in particular compositions, that favor formation and/or maintenance of the native trimeric conformation of the stalk domain. The influenza HA protein may be obtained and/or isolated and/or maintained in the desired conformation using any suitable method known in the art, including, but not limited to, standard protein purification methods, such as ion exchange chromatography, size exclusion chromatography, and/or affinity chromatography methods. In some embodiments the influenza HA protein may be expressed in the presence of, co-expressed with, or contacted with, molecules that bind to the influenza HA protein and stabilize it in its desired conformation, including, but not limited to, antibodies, small molecules, peptides, and/or peptidomimetics. Non-limiting examples of antibodies that bind to the stalk domain in its native trimeric conformation include 6F12, C179, CR6261, F10, A66, and D8. Other antibodies that can be used to characterize or stabilize the HA polypeptides, proteins and protein complexes of the invention include, but are not limited to, 18A3, 18C11, 18E7, 18E12, 18H9, 16B5, 10A14, 5K24, FI6v3, 6K14, 6J24, 8D4, anti-influenza human antibodies of the VH1-69 heavy chain lineage, and anti-influenza human antibodies of the VH3-30 heavy chain lineage. In some embodiments, the influenza HA protein may be obtained, isolated, or maintained in its desired conformation by controlling the ionic strength of the media/buffer in which the protein is present (such as by using high or low ionic strength media). In some embodiments the influenza HA protein may be obtained, isolated, or maintained at one or more temperatures that favor preservation of the desired conformation. In some embodiments the influenza HA protein may be obtained, isolated, or maintained over a period of time that diminishes the degree to which the desired conformation lost. In some embodiments analysis may be performed to confirm that the desired conformation, such as the native trimeric conformation of the stalk domain, has been formed and/or maintained in the influenza HA protein. Such analysis may be performed prior to cross-linking, during the cross-linking process, after the cross-linking process, or at any combination of such stages. Such analysis may comprise any suitable methods known in the art for assessing the 3-dimensional structure of a protein or protein complex, including functional analysis, crystallographic analysis, and the like. In some embodiments such analysis may include assessing binding of the influenza HA protein to certain antibodies, such as those that are specific to the native trimeric conformation of the stalk domain and/or those that are known to bind to antigenic sites in the stalk domain or elsewhere in the influenza HA protein, as described elsewhere herein, including, but not limited to the 6F12, C179, CR6261, F10, A66, and D8 antibodies. In some embodiments the methods for making influenza HA polypeptides, proteins, and protein complexes of the invention may comprise purifying the influenza HA polypeptides, proteins, or protein complexes before, during, or after, one or more steps in the manufacturing process. For example, in some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be purified after completion of all of the manufacturing steps. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be purified before commencing the cross-linking process or after one or more of the intermediate method steps in the process, for example, after expression of an influenza HA polypeptide or protein, after assembly of a protein complex, after obtaining the influenza HA protein in a desired conformation, during or after performing a cross-linking reaction, or after removal of the head domain. The influenza HA polypeptides, proteins, and/or protein complexes of the invention may be isolated or purified using any suitable method known in the art. Such methods include, but are not limited to, chromatography (e.g. ion exchange, affinity, and/or sizing column chromatography), ammonium sulfate precipitation, centrifugation, differential solubility, or by any other technique for the purification of proteins known to one of ordinary skill in the art. In specific embodiments it may be necessary to separate the desirable influenza HA polypeptides, proteins, and/or protein complexes of the invention from those that were not sufficiently cross-linked, or those in which the head domain was not sufficiently removed. This can be done using any suitable system known in the art. For example, influenza HA proteins having a stalk domain in the native trimeric conformation can be separated from those that have a stalk domain that is not in the native trimeric conformation using antibody-based separation methods. The influenza HA polypeptides, proteins, and/or protein complexes of the invention may be purified from any source used to produce them. For example, the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be purified from sources including insect, prokaryotic, eukaryotic, mono-cellular, multi-cellular, animal, plant, fungus, vertebrate, mammalian, human, porcine, bovine, feline, equine, canine, avian, or tissue culture cells, or any other source. The degree of purity may vary, but in various embodiments, the purified influenza HA polypeptides, proteins, and/or protein complexes of the invention are provided in a form in which they comprise more than about 10%, 20%, 50%, 70%, 75%, 80%, 85%, 90%, 95%, 98%, 99%, or 99.9% of the total protein in the final composition. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be isolated and purified from other proteins, or any other undesirable products (such as non-cross-linked products or products where removal of the head domain is insufficient or incomplete), by standard methods including, but not limited to, chromatography, glycerol gradients, affinity chromatography, centrifugation, ion exchange chromatography, size exclusion chromatography, and affinity chromatography, or by any other standard technique for the purification of proteins known in the art. The influenza HA polypeptides, proteins, and/or protein complexes to be isolated may be expressed in high or low ionic media, or isolated in high or low ionic buffers or solutions. The influenza HA polypeptides, proteins, and/or protein complexes of the invention may also be isolated at one or more temperatures that favor preservation of the desired conformation. They may also be isolated over a period of time that diminishes the degree to which a preparation would have lost the desired conformation. The degree to which a preparation of proteins retains one or more desired conformations (such as the native trimeric conformation of the stalk domain and/or conformations that favor binding to neutralizing antibodies, or other desired properties) may be assayed by any suitable method known in the art, including, for example, but not limited to, biochemical, biophysical, immunologic, and virologic analyses. Such assays include, for example, but are not limited to, immunoprecipation, enzyme-linked immunosorbent assays (ELISAs), or enzyme-linked immunosorbent spot (ELISPOT) assays, crystallographic analysis (including co-crystallization with antibodies), sedimentation, analytical ultracentrifugation, dynamic light scattering (DLS), electron microscopy (EM), cryo-EM tomography, calorimetry, surface plasmon resonance (SPR), fluorescence resonance energy transfer (FRET), circular dichroism analysis, and small angle x-ray scattering, neutralization assays, antibody-dependent cellular cytotoxicity assays, and/or virologic challenge studies in vivo. The yield of the influenza HA polypeptides, proteins, and/or protein complexes of the invention can be determined by any means known in the art, for example, by comparing the amount of the final engineered proteins (such as cross-linked influenza HA proteins) as compared to the amount of the starting material, or as compared to the amount of the materials present in any preceding step of the production methods. Protein concentrations can determined by standard procedures, such as, for example, Bradford or Lowry protein assays. The Bradford assay is compatible with reducing agents and denaturing agents (Bradford, M, 1976. Anal. Biochem. 72: 248). The Lowry assay has better compatibility with detergents and the reaction is more linear with respect to protein concentrations and read-out (Lowry, O J, 1951. Biol. Chem. 193: 265). Exemplary Production Methods In some embodiments the present invention provides methods for making “headless” influenza HA polypeptides, proteins and/or protein complexes as described herein. In some embodiments methods for making “headless” influenza HA polypeptides, proteins and/or protein complexes comprise: (a) expressing an influenza HA protein having (i) both a stalk domain and a head domain, and (ii) one or more engineered protease recognition motifs in or near its head domain, (b) allowing the soluble influenza HA protein expressed in step (a) to fold into its native conformation having a trimeric stalk domain and a head domain, (c) introducing one more cross-links into the trimeric stalk domain, wherein the cross-links stabilize the stalk domain in its native trimeric conformation, and (d) subsequently proteolytically disrupting or removing the head domain, thereby producing a headless influenza HA protein. In some such embodiments the cross-links are targeted cross-links, such as di-tyrosine cross-links. In some embodiments the methods also involve first (at least prior to step (c)) identifying one or more regions in the HA protein in which the introduction of one or more cross-links in step (c) could stabilize the conformation of the stalk in its native trimeric conformation and/or stabilize the stalk in a conformation that allows binding of one or more broadly neutralizing anti-stalk antibodies. In some embodiments methods for making “headless” influenza HA polypeptides, proteins and/or protein complexes comprise: (a) expressing an influenza HA protein having: (i) both a stalk domain and a head domain, (ii) one or more “to-tyrosine mutations within its stalk domain, and (iii) one or more engineered protease recognition motifs within or close to its head domain, (b) allowing the influenza HA protein to fold into its native conformation having a trimeric stalk domain and a head domain, (c) introducing one or more di-tyrosine cross-links into the trimeric stalk domain, wherein the di-tyrosine cross-links are stable under physiological conditions and stabilize the stalk domain in its native trimeric conformation, and (d) subsequently proteolytically removing the head domain, thereby producing a soluble headless influenza HA protein. In some embodiments the method also involves identifying first (at least prior to step (c)) one or more regions in the HA protein in which the introduction of one or more DT cross-links in step (c) could stabilize the conformation of the stalk in its native trimeric conformation and/or stabilize the stalk in a conformation that allows binding of one or more broadly neutralizing anti-stalk antibodies. In such methods the soluble influenza HA protein will typically comprises one or more protease recognition motifs that can be used to facilitate proteolytic removal of the head domain, as described above and in other sections of this application. In some embodiments the methods for making “headless” influenza HA polypeptides, proteins and/or protein complexes described herein may further comprise performing an analysis after commencement or completion of the proteolytic cleavage step(s) to confirm that the head domain of the influenza HA protein has been sufficiently disrupted or removed. In some such embodiments this analysis may comprise, for example, performing an SDS PAGE gel mobility shift assay or using a head-specific antibody. In some embodiments the present invention provides methods for making “head-on” influenza HA polypeptides, proteins and/or protein complexes as described herein. In some embodiments methods for making “head-on” influenza HA polypeptides, proteins and/or protein complexes comprise: (a) expressing an influenza HA protein comprising a stalk domain and a head domain, (b) allowing the expressed influenza HA protein to fold into its native conformation having a trimeric stalk domain, and (c) introducing one more physiologically stable cross-links into the HA protein in the trimeric stalk domain and optionally also in the head domain, thereby producing an engineered “head-on” influenza HA protein having a cross-linked stalk domain. In some such embodiments the cross-links are targeted cross-links, such as di-tyrosine cross-links. In some embodiments methods for making “headless” influenza HA polypeptides, proteins and/or protein complexes comprise: (a) expressing an influenza HA protein having one or more “to-tyrosine” mutations at targeted positions within its stalk domain and optionally also in the head domain, (b) allowing the influenza HA protein to fold into its native conformation having a trimeric stalk domain and a head domain, and (c) performing a DT cross-linking reaction to cross-link tyrosine residues in the stalk domain and optionally also in the head domain, thereby producing an engineered “head-on” influenza HA protein having a DT-cross-linked stalk domain. In such methods the influenza HA protein may comprise one or more protease recognition motifs that could be used, if desired, to facilitate subsequent proteolytic removal of the head domain of the “head-on” protein to generate a “headless” influenza HA protein. Properties of Influenza HA Polypeptides, Proteins and/or Protein Complexes In some embodiments, the influenza HA polypeptides, proteins and/or protein complexes of the invention, including in particular those that are cross-linked as described herein, have certain structural, physical, functional, and/or biological properties. Such properties may include one or more of the following, or any combination of the following: presence or absence of a head domain, existence of the stalk domain in its native trimeric conformation; improved stability of the native trimeric conformation of the stalk domain (as compared to non-cross-linked influenza HA proteins); improved half-life of the influenza HA protein (as compared to non-cross-linked influenza HA proteins); improved thermostability (as compared to non-cross-linked influenza HA proteins); prolonged shelf-life (as compared to non-cross-linked influenza HA proteins); prolonged half-life inside the body of a subject (as compared to non-cross-linked influenza HA proteins); ability to be stored in solution without forming aggregates (including when present at a high concentration in solution); reduced aggregation in solution (as compared to non-cross-linked influenza HA proteins); binding to an antibody; binding to a neutralizing antibody; binding to a broadly neutralizing antibody; binding to a stalk-specific antibody; binding to a conformationally-specific antibody; binding to an antibody that recognizes a stalk domain epitope; binding to an antibody selected from the group consisting of 6F12, C179, CR6261, F10, A66, and D8; binding to a B cell receptor; activation of a B cell receptor; eliciting an antibody response in vivo; eliciting a protective antibody response in vivo; eliciting production of neutralizing antibodies in vivo; eliciting production of broadly neutralizing antibodies in vivo; eliciting production of antibodies that recognize quaternary neutralizing epitopes (QNEs) in vivo; eliciting a protective immune response in vivo; and/or eliciting a humoral immune response in vivo. In the case of binding to antibody molecules, in some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention bind to the antibodies (such as stalk-specific antibodies, and/or 6F12, C179, CR6261, F10, A66, and D8) with high specificity and/or with high affinity. Assays for Properties In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention, or any intermediates in their manufacture, may be analyzed to confirm that they have desired properties, such as the desired structural, physical, functional, and/or biological properties—such as those properties listed above or identified elsewhere in this patent specification. For example, in some embodiments in vitro or in vivo assays can be performed to assess the influenza HA protein's conformational structure, stability (e.g. thermostability), half-life (e.g. inside the body of a subject), aggregation in solution, binding to an antibody (such as a neutralizing antibody, broadly neutralizing antibody; stalk-specific antibody; antibody that recognizes stalk domain epitopes, conformationally-specific antibody, 6F12, C179, CR6261, F10, A66, and Da), binding to a B cell receptor, activation of a B cell receptor, antigenicity, immunogenicity, ability to elicit an antibody response, ability to elicit a protective antibody/immune response, ability to elicit production of neutralizing antibodies, or ability to elicit production of broadly neutralizing antibodies. In embodiments where the influenza HA polypeptides, proteins, and/or protein complexes of the invention are tested in an animal in vivo, the animal may be any suitable animal species, including, but not limited to a mammal (such as a rodent species (e.g. a mouse or rat), a rabbit, a ferret, a porcine species, a bovine species, an equine species, an ovine species, or a primate species (e.g. a human or a non-human primate), or an avian species (such as a chicken)). Assays for assessing a protein's conformational structure are well known in the art and any suitable assay can be used, including, but not limited to, crystallographic analysis (e.g. X-ray crystallography or electron crystallography), sedimentation analysis, analytical ultracentrifugation, electron microscopy (EM), cryo-electron microscopy (cryo-EM), cryo-EM tomography, nuclear magnetic resonance (NMR), small angle x-ray scattering, fluorescence resonance energy transfer (FRET) assays, and the like. Assays for assessing a protein's stability are well known in the art and any suitable assay can be used, including, but not limited to, denaturing and non-denaturing electrophoresis, isothermal titration calorimetry, and time-course experiments in which proteins are incubated and analyzed over time at varying protein concentrations, temperatures, pHs or redox conditions. Proteins may also be analyzed for susceptibility to proteolytic degradation. Assays for assessing binding of proteins to antibodies are well known in the art, and any suitable assay can be used, including, but not limited to, immunoprecipation assays, enzyme-linked immunosorbent assays (ELISAs), enzyme-linked immunosorbent spot assays (ELISPOTs), crystallographic assays (including co-crystallization with antibodies), surface plasmon resonance (SPR) assays, fluorescence resonance energy transfer (FRET) assays, and the like. Assays for assessing neutralization activity are well known in the art, and any suitable assay can be used. For example, assays can be performed to determine the neutralizing activity of antibodies or antisera generated by vaccination/immunization of animals with the influenza HA polypeptides, proteins, and/or protein complexes of the invention. Neutralization assays known in the art include, but are not limited to, those described by Dey et al. 2007 (Dey et al., 2007, Characterization of Human Immunodeficiency Virus Type 1 Monomeric and Trimeric gp120 Glycoproteins Stabilized in the CD4-Bound State: Antigenicity, Biophysics, and Immunogenicity. J Virol 81(11): 5579-5593) and Beddows et al., 2006 (Beddows et al., 2007, A comparative immunogenicity study in rabbits of disulfide-stabilized proteolytically cleaved, soluble trimeric human immunodeficiency virus type 1 gp140, trimeric cleavage-defective gp140 and momomeric gp120. Virol 360: 329-340). Assays for assessing whether a vaccine immunogen is capable of eliciting an immune response and/or providing protective immunity are well known in the art, and any suitable assay can be used. For example, assays can be performed to determine whether vaccination/immunization of animals with the influenza HA polypeptides, proteins, and/or protein complexes of the invention provide an immune response and/or protective immunity against infection with influenza virus. In some embodiments comparisons may be made between placebo and test vaccinated groups with regard to their rates of infection or sero-conversion or viral loads. Assays for assessing a protein's pharmacokinetics and bio-distribution are also well known in the art, and any suitable assay can be used to assess these properties of the influenza HA polypeptides, proteins, and/or protein complexes of the invention. In some embodiments the present invention provides compositions comprising any of the influenza HA polypeptides, proteins, and/or protein complexes described herein. In some embodiments such compositions may be immunogenic compositions, vaccine compositions and/or therapeutic compositions. In some embodiments, such compositions may be administered to subjects. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes described herein may be present in virus-like particles or “VLPs.” In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be provided in a composition that comprises one or more additional active components, such as one or more additional vaccine immunogens or therapeutic agents. In some embodiments the influenza HA polypeptides, proteins, and/or protein complexes of the invention may be provided in a composition that comprises one or more other components, including, but not limited to, pharmaceutically acceptable carriers, adjuvants, wetting or emulsifying agents, pH buffering agents, preservatives, and/or any other components suitable for the intended use of the compositions. Such compositions can take the form of solutions, suspensions, emulsions and the like. The term “pharmaceutically acceptable carrier” includes various diluents, excipients and/or vehicles in which, or with which, the influenza HA polypeptides, proteins, and/or protein complexes of the invention can be provided. The term “pharmaceutically acceptable carrier” includes, but is not limited to, carriers known to be safe for delivery to human and/or other animal subjects, and/or approved by a regulatory agency of the Federal or a state government, and/or listed in the U.S. Pharmacopeia, and/or other generally recognized pharmacopeia, and/or receiving specific or individual approval from one or more generally recognized regulatory agencies for use in humans and/or other animals. Such pharmaceutically acceptable carriers, include, but are not limited to, water, aqueous solutions (such as saline solutions, buffers, and the like), organic solvents (such as certain alcohols and oils, including those of petroleum, animal, vegetable or synthetic origin, such as peanut oil, soybean oil, mineral oil, sesame oil), and the like. In some embodiments the compositions of the invention also comprise one or more adjuvants. Exemplary adjuvants include, but are not limited to, inorganic or organic adjuvants, oil-based adjuvants, virosomes, liposomes, lipopolysaccharide (LPS), molecular cages for antigens (such as immune-stimulating complexes (“ISCOMS”)), Ag-modified saponin/cholesterol micelles that form stable cage-like structures that are transported to the draining lymph nodes), components of bacterial cell walls, endocytosed nucleic acids (such as double-stranded RNA (dsRNA), single-stranded DNA (ssDNA), and unmethylated CpG dinucleotide-containing DNA), AUM, aluminum phosphate, aluminum hydroxide, and Squalene. In some embodiments virosomes are used as the adjuvant. Additional commercially available adjuvants that can be used in accordance with the present invention include, but are not limited to, the Ribi Adjuvant System (RAS, an oil-in-water emulsion containing detoxified endotoxin (MPL) and mycobacterial cell wall components in 2% squalene (Sigma M6536)), TiterMax (a stable, metabolizable water-in-oil adjuvant (CytRx Corporation 150 Technology Parkway Technology Park/Atlanta Norcross, Ga. 30092)), Syntex Adjuvant Formulation (SAF, an oil-in-water emulsion stabilized by Tween 80 and pluronic polyoxyethlene/polyoxypropylene block copolymer L121 (Chiron Corporation, Emeryville, Calif.)), Freund's Complete Adjuvant, Freund's Incomplete Adjuvant, ALUM—aluminum hydroxide, Al(OH)3 (available as Alhydrogel, Accurate Chemical & Scientific Co, Westbury, N.Y.), SuperCarrier (Syntex Research 3401 Hillview Ave. P.O. Box 10850 Palo Alto, Calif. 94303), Elvax 40W1,2 (an ethylene-vinyl acetate copolymer (DuPont Chemical Co. Wilmington, Del.)), L-tyrosine co-precipitated with the antigen (available from numerous chemical companies); Montanide (a manide-oleate, ISA Seppic Fairfield, N.J.)), AdjuPrime (a carbohydrate polymer), Nitrocellulose-absorbed protein, Gerbu adjuvant (C—C Biotech, Poway, Calif.), and the like. In some embodiments the compositions of the invention comprise an “effective amount” of an influenza HA polypeptide, protein, and/or protein complex of the invention. An “effective amount” is an amount required to achieve a desired end result. Examples of desired end results include, but are not limited to, the generation of a humoral immune response, the generation of a neutralizing antibody response, the generation of a broadly neutralizing antibody response, and the generation of protective immunity. The amount of an influenza HA polypeptide, protein, and/or protein complex of the invention that is effective to achieve the desired end result will depend on variety of factors including, but not limited to, the type, subtype, and strain of the influenza virus against which protection or some other therapeutic effect is sought, the species of the intended subject (e.g. whether a human or some other animal species), the age and/or sex of the intended subject, the planned route of administration, the planned dosing regimen, the seriousness of any ongoing influenza infection (e.g. in the case of therapeutic uses), and the like. The effective amount—which may be a range of effective amounts—can be determined by standard techniques without any undue experimentation, for example using in vitro assays and/or in vivo assays in the intended subject species or any suitable animal model species. Suitable assays include, but are not limited to, those that involve extrapolation from dose-response curves and/or other data derived from in vitro and/or in vivo model systems. In some embodiments the effective amount may be determined according to the judgment of a medical or veterinary practitioner based on the specific circumstances. Uses of the Influenza HA Polypeptides, Proteins & Protein Complexes of the Invention In some embodiments, the influenza HA polypeptides, proteins, and protein complexes of the invention may be useful as research tools, as diagnostic tools, as therapeutic agents, as targets for the production of antibody reagents or therapeutic antibodies, and/or as vaccines or components of vaccine compositions. For example, in some embodiments the influenza HA polypeptides, proteins, and protein complexes of the invention are useful as vaccine immunogens in animal subjects, such as mammalian subject, including humans. These and other uses of the influenza HA polypeptides, proteins, and protein complexes of the invention are described more fully below. Those of skill in the art will appreciate that the influenza HA polypeptides, proteins, and protein complexes of the invention may be useful for a variety of other applications also, and all such applications and uses are intended to fall within the scope of this invention. Tools for Studying Influenza HA Antibodies In one embodiment, the influenza polypeptides, proteins, and protein complexes of the invention may be useful as analytes for assaying and/or measuring binding of, and/or titers of, anti-HA antibodies, for example in ELISA assays, Biacore/SPR binding assays, and/or any other assays for antibody binding known in the art. For example, the influenza HA polypeptides, proteins, and protein complexes of the invention could be used to analyze, and/or compare the efficacy of anti-HA antibodies. Tools for Generation of Antibodies The influenza HA polypeptides, proteins, and protein complexes of the invention (including any intermediates and/or variants produced during manufacture of the influenza HA polypeptides, proteins, and protein complexes) may also be useful for the generation of therapeutic antibodies and/or antibodies that can be used as research tools or for any other desired use. For example, the influenza HA polypeptides, proteins, and protein complexes of the invention can be used for immunizations to obtain antibodies to the influenza HA protein for use as research tools and/or as therapeutics. In some embodiments the influenza HA polypeptides, proteins, and protein complexes of the invention can be used to immunize a non-human animal, such as a vertebrate, including, but not limited to, a mouse, rat, guinea pig, rabbit, goat, non-human primate, etc. in order to generate antibodies. Such antibodies, which may be monoclonal or polyclonal, and/or cells that produce such antibodies, can then be obtained from the animal. For example, in some embodiments influenza HA polypeptides, proteins, and protein complexes of the invention may be used to immunize a mouse and to produce and obtain monoclonal antibodies, and/or hybridomas that produce such monoclonal antibodies. Such methods can be carried out using standard methods known in the art for the production of mouse monoclonal antibodies, including standard methods for hybridoma production. In some embodiments influenza HA polypeptides, proteins, and protein complexes of the invention may be used for the production of a chimeric (e.g. part-human), humanized, or fully-human antibody, for example using any of the methods currently known in the art for production of chimeric, humanized and fully human antibodies, including, but not limited to, CDR grafting methods, phage-display methods, transgenic mouse methods (e.g. using a mouse that has been genetically altered to allow for the production of fully human antibodies, such as the Xenomouse) and/or any other suitable method known in the art. Antibodies to the influenza HA polypeptides, proteins, and protein complexes of the invention made using such systems can be characterized antigenically using one or a set of several antigens, preferably including the influenza HA polypeptides, proteins, and protein complexes of the invention themselves. Additional characterization of such antibodies may be carried out by any standard methods known to one of ordinary skill in the art, including, but not limited to, ELISA-based methods, SPR-based methods, biochemical methods (such as, but not limited to, iso-electric point determination), and methods known in the art for studying biodistribution, safety, and efficacy of antibodies—for example in preclinical and clinical studies. Administration to Subjects In some embodiments, the present invention provides methods that comprise administering the influenza HA polypeptides, proteins and/or protein complexes of the invention (or compositions comprising such influenza HA polypeptides, proteins and/or protein complexes) to subjects. Such methods may comprise methods for treating individuals having influenza virus (i.e. therapeutic methods) and/or methods for protecting individuals against future influenza virus infection (i.e. prophylactic methods). Subjects to which the influenza HA polypeptides, proteins and/or protein complexes of the invention, or compositions comprising such influenza HA polypeptides, proteins and/or protein complexes, can be administered (for example in the course of a method of treatment or a method of vaccination) include any and all animal species, including, in particular, those that are susceptible to influenza virus infection or that can provide model animal systems for the study of influenza virus infection. In some embodiments, the subjects are mammalian species. In some embodiments, the subjects are avian species. Mammalian subjects include, but are not limited to, humans, non-human primates, rodents, rabbits, and ferrets. Avian subjects include, but are not limited to chickens, such as those on poultry farms. In some embodiments the subjects to which the influenza HA polypeptides, proteins and/or protein complexes of the invention, or compositions comprising such influenza HA polypeptides, proteins and/or protein complexes are administered, either have influenza, or are at risk of influenza infection, for example due to the subject's age and/or underlying medical conditions. In some embodiments, the subject is immuno-compromised. In some embodiments, the subject has heart disease, lung disease, diabetes, renal disease, dementia, stroke and/or rheumatologic disease. In some embodiments, the subject is a human of greater than about 50 years in age, greater than about 55 years in age, greater than about 60 years in age, greater than about 65 years in age, greater than about 70 years in age, greater than about 75 years in age, greater than about 80 years in age, greater than about 85 years in age, or greater than about 90 years in age. In some embodiments, the subject is a human of less than about 1 month in age, less than about 2 months in age, less than about 3 months in age, less than about 4 months in age, less than about 5 months in age, less than about 6 months in age, less than about 7 months in age, less than about 8 months in age, less than about 9 months in age, less than about 10 months in age, less than about 11 months in age, less than about 12 months in age, less than about 13 months in age, less than about 14 months in age, less than about 15 months in age, less than about 16 months in age, less than about 17 months in age, less than about 18 months in age, less than about 19 months in age, less than about 20 months in age, less than about 21 months in age, less than about 22 months in age, less than about 23 months in age, or less than about 24 months in age. Various delivery systems are known in the art and any suitable delivery systems can be used to administer the compositions of the present invention to subjects. Such delivery systems include, but are not limited to, intradermal, intramuscular, intraperitoneal, intravenous, subcutaneous, intranasal, epidural, and oral delivery systems. The compositions of the present invention may be administered by any convenient route, for example by infusion or bolus injection, by absorption through epithelial or mucocutaneous linings (e.g., oral mucosa, rectal and intestinal mucosa, etc.) and may be administered together with other biologically active agents. Administration can be systemic or local. Pulmonary administration can also be employed, e.g., by use of an inhaler or nebulizer, and formulation with an aerosolizing agent. In some embodiments it may be desirable to administer the pharmaceutical compositions of the invention locally to a tissue in which the influenza HA polypeptide, protein or protein complex may be most effective in generating a desirable outcome. This may be achieved by, for example, local infusion, injection, delivery using a catheter, or by means of an implant, such as a porous, non-porous, or gelatinous implant or an implant comprising one or more membranes (such as sialastic membranes) or fibers from or through which the protein or protein complexes may be released locally. In some embodiments a controlled release system may be used. In some embodiments a pump may be used (see Langer, supra; Sefton, 1987. CRC Crit. Ref. Biomed. Eng. 14: 201; Buchwald et al., 1980. Surgery 88: 507; Saudek et al., 1989. N. Engl. J. Med. 321: 574). In some embodiments polymeric materials may be used to facilitate and/or control release of the influenza HA polypeptide, protein and/or protein complex (see Medical Applications of Controlled Release, Langer and Wise (eds.), 1974. CRC Pres., Boca Raton, Fla.; Controlled Drug Bioavailability, 1984. Drug Product Design and Performance, Smolen and Ball (eds.), Wiley, New York; Ranger & Peppas, 1983 Macromol. Sci. Rev. Macromol. Chem. 23: 61; see also Levy et al., 1985. Science 228:190; During et al, 1989. Ann. Neurol. 25: 351; Howard et al., 1989. J. Neurosurg 71:105). In some embodiments a controlled release system can be placed in proximity to the tissue/organ to which the influenza HA polypeptide, protein and/or protein complex is to be delivered (see, e.g., Goodson, 1984. Medical Applications of Controlled Release, supra, vol. 2: 115-138). Some suitable controlled release systems that may be used in conjunction with the present invention are described Langer, 1990, Science; vol. 249: pp. 527-1533 In some embodiments, administration of the influenza HA polypeptide, protein and/or protein complex of the invention can be performed in conjunction with administration of one or more immunostimulatory agents. Non-limiting examples of such immunostimulatory agents include various cytokines, lymphokines and chemokines with immunostimulatory, immunopotentiating, and pro-inflammatory activities, such as interleukins (e.g., IL-1, IL-2, IL-3, IL-4, IL-12, IL-13); growth factors (e.g., granulocyte-macrophage (GM)-colony stimulating factor (CSF)); and other immunostimulatory agents, such as macrophage inflammatory factor, Flt3 ligand, B7.1; B7.2. The immunostimulatory agents can be administered in the same formulation as the influenza HA protein or polypeptide, or can be administered separately. In some embodiments, the influenza HA polypeptides, proteins, and/or protein complexes of the invention, or compositions comprising them, can be administered to subjects in a variety of different influenza virus vaccination methods or regimens. In some such embodiments, administration of a single dose is preferred. However, in other embodiments, additional dosages can be administered, by the same or different route, to achieve the desired prophylactic effect. In neonates and infants, for example, multiple administrations may be required to elicit sufficient levels of immunity. Administration can continue at intervals throughout childhood, as necessary to maintain sufficient levels of protection against influenza virus infection. Similarly, adults who are particularly susceptible to influenza virus infection, such as, for example, the elderly and immunocompromised individuals, may require multiple immunizations to establish and/or maintain protective immune responses. Levels of induced immunity can be monitored, for example, by measuring amounts of neutralizing secretory and serum antibodies, and dosages adjusted or vaccinations repeated as necessary to elicit and maintain desired levels of protection. In some embodiments, dosing regimens may comprise a single administration/immunization. In other embodiments, dosing regimens may comprise multiple administrations/immunizations. For example, vaccines may be given as a primary immunization followed by one or more boosters. In some embodiments of the present invention such a “prime-boost” vaccination regimen may be used. For example, in some such prime-boost regimens a composition comprising an influenza HA polypeptide, protein or protein complex as described herein may be administered to an individual on multiple occasions (such as two, three, or even more occasions) separated in time, with the first administration being the “priming” administration and subsequent administrations being “booster” administrations. In other such prime-boost regimens a composition comprising an influenza HA polypeptide, protein or protein complex as described herein may be administered to an individual after first administering to the individual a composition comprising a viral or DNA vector encoding an influenza HA polypeptide, protein or protein complex as a “priming” administration, with one or more subsequent “booster” administrations of a composition comprising an influenza HA polypeptide, protein or protein complex as described herein. Boosters may be delivered via the same and/or different route as the primary immunization. Boosters are generally administered after a time period after the primary immunization or the previously administered booster. For example, a booster can be given about two weeks or more after a primary immunization, and/or a second booster can be given about two weeks or more after the first boosters. Boosters may be given repeatedly at time periods, for example, about two weeks or greater throughout up through the entirety of a subject's life. Boosters may be spaced, for example, about two weeks, about three weeks, about four weeks, about one month, about two months, about three months, about four months, about five months, about six months, about seven months, about eight months, about nine months, about ten months, about eleven months, about one year, about one and a half years, about two years, about two and a half years, about three years, about three and a half years, about four years, about four and a half years, about five years, or more after a primary immunization or after a previous booster. Preferred unit dosage formulations are those containing a dose or unit (e.g. an effective amount), or an appropriate fraction thereof, of the influenza HA polypeptides, proteins, and/or protein complexes of the invention. In addition to such ingredients, formulations of the present invention may include other agents commonly used by one of ordinary skill in the art. Pharmaceutical compositions provided by the invention may be conveniently presented in preferred unit dosage formulations prepared using conventional pharmaceutical techniques. Such techniques include the step of bringing into association the active ingredient and the pharmaceutical carrier(s) or excipient(s) or other ingredients. In general, the formulations are prepared by uniformly and intimately bringing into association the active ingredient with liquid carriers. Formulations suitable for parenteral administration include aqueous and non-aqueous sterile injection solutions which may contain anti-oxidants, buffers, bacteriostats and solutes which render the formulation isotonic with the blood of the intended recipient, and aqueous and non-aqueous sterile suspensions which may include suspending agents and thickening agents. The formulations may be presented in unit-dose or multi-dose containers, for example, sealed ampoules and vials, and may be stored in a freeze-dried (lyophilized) condition requiring only the addition of the sterile liquid carrier, for example, water for injections, immediately prior to use. Extemporaneous injection solutions and suspensions may be prepared from sterile powders, granules and tablets commonly used by one of ordinary skill in the art. The present invention further provides kits comprising influenza HA polypeptides, proteins or protein complexes of the invention, or compositions containing such polypeptides, proteins or protein complexes. To facilitate use of the methods and compositions of the invention, any of the components and/or compositions described herein, and additional components useful for experimental or therapeutic or vaccine purposes, can be packaged in the form of a kit. Typically, the kit contains, in addition to the above components, additional materials which can include, e.g., instructions for using the components, packaging material, a container, and/or a delivery device. Various embodiments of the present invention may also be further described by the following non-limiting examples: The numbers in square brackets/parentheses in the Examples section of the present application are citations to the numbered references provided as a reference list herein. The US and world populations continue to be at risk of a pandemic Influenza outbreak, and weaponized influenza virus remains a major bio-warfare/terrorism threat [23,24]. An influenza virus HA-based vaccine immunogen capable of eliciting Ab responses to the conserved stalk QNEs, instead of the immunodominant head of HA, is expected to give rise to broadly neutralizing antibodies that could protect from homologous (H1N1), as well as homologous drift variant, group 1 heterologous (H5N1), and group 2 heterologous challenge (H3N2). Thus, a single, universal immunogen could elicit protective immune responses against seasonal, pandemic, and weaponized influenza virus. Underscoring the commercial and public health impact that influenza virus has on the population is the fact that life insurance companies in the United States today are required to hold capital against a potential reoccurrence of the 1918 Spanish Flu pandemic (Oliver, Wyman, & Co, 2012 & [25]). The approach described herein has the potential to provide a broadly protective influenza vaccine that could enable stockpiling large amounts of vaccine product and eliminate real threats that derive from the ramp-up times in manufacturing required to address each new threat. Current influenza virus vaccines protect mostly against homologous virus strains, requiring new trivalent vaccine cocktails to be matched seasonally to circulating strains. Protection is primarily due to high affinity antibodies to hemagglutinin (HA), and is often strain-specific due to a focusing of the immune response predominantly against the highly variable, immunodominant head domain of the HA protein. The HA stalk, however, is highly conserved across influenza strains, and considerable evidence now suggests that better responses to conserved regions of the stalk would provide broader protection [1-4]. Immunization with DNA coding for HA elicits predominantly stalk-specific Ab responses, and data showing limited heterosubtypic protection by vaccination with HA DNA by electroporation was recently described [5]. Furthermore, vaccination with a ‘headless’ HA protein based immunogen (“Headless HA”, an HA construct from which the variable head domain is removed) results in the induction of Ab responses with significantly enhanced heterosubtypic binding activity [1,6]. A prime-boost combination of a viral or DNA vector encoding HA, followed by a Headless protein boost holds the promise of generating broadly heterospecific responses that yield long-lasting protection. However, good protection against heterologous challenges currently still remains elusive [7-10]. Significant attention has been focused on the identification and characterization of broadly neutralizing antibodies (“bnAbs”) in order to reverse engineer an immunogen capable of eliciting similar antibody responses [9,11]. A number of these bnAbs have been described, and the most potent bind conserved, complex/conformation-specific epitopes that are presented on the conserved stalk of influenza HA trimers, but not on protomers of the same complex[7,12,13]. Isolation of these human Abs proves that a broadly protective vaccine is, in fact, an achievable goal (a “protomer” is a subunit of the trimer, that itself is a HA 1/HA2 heterodimer). These trimer/complex-specific epitopes are therefore called quaternary neutralizing epitopes (QNEs), and they are believed to represent key sites of vulnerability of influenza viruses since they have the potential to elicit potent quaternary bnAbs. [14,15]. Only the intact trimeric stalk exhibits the broadly protective QNE (see FIG. 2). A Headless construct that is locked in its trimeric, native conformation, and that binds the potent and broadly protective quaternary bnAbs could provide a universal influenza immunogen and could elicit potent bnAbs in vaccinated subjects. Recently, a headless influenza hemagglutinin (“Headless HA”) immunogen has been shown to elicit antibody (“Ab”) responses focused on the highly conserved stalk region of influenza hemagglutinin (HA) that are broadly cross-reactive. It has also become clear that the most potent and broadly neutralizing/protective Abs (bnAbs) against the stalk region are trimer-specific (i.e. recognize the quaternary structure of the stalk), and that their corresponding quaternary epitopes are not displayed when the head of influenza HA is removed. In the absence of the head domain, the stalk trimer apparently falls apart. The present invention provides a Headless HA immunogen in which the trimeric conformation of the stalk region is stabilized or “conformationally locked”—for example by introduction of targeted cross-links—before the head is proteolytically removed. This Headless HA immunogen should retain binding to quaternary bnAbs and present quaternary neutralizing epitopes (“QNEs”) as an influenza immunogen. Such a conformationally-locked Headless HA trimer may enable the long-sought goal of broad protection against influenza viruses from a single vaccination regimen. Minimally modifying dityrosine (“DT”) stabilization technology enzymatically introduces safe, targeted, zero-length, and irreversible DT bonds to lock proteins and complexes in native conformations. Application of this technology fully preserves protein structure and avoids aggregation because DT bonds do not form spontaneously. Bonds only form between Tyr side-chains in very close structural proximity, and are introduced after the protein has fully folded and is in its native state. Targeted DT crosslinking enables the design of an improved influenza vaccine immunogen by conformationally locking QNEs to maximize broad protection. The methods described in the present example involve 3 steps. The first step involves expressing soluble, full-length influenza HA with “to-Tyr” substitutions at targeted positions within the stalk region. The second step involves introduction of stabilizing DT crosslinks. And the third step involves proteolytically removing the head domain of the influenza HA in order to focus the immune responses on the DT-Headless HA QNEs. Preliminary studies using a recombinant, soluble HIV Env trimer have demonstrated that DT crosslinking can be used to conformationally-lock the Env immunogen in its native, trimeric conformation, so that it improves binding to the most potent HIV quaternary bnAbs, analogous to the flu quaternary anti-stalk bnAbs, demonstrating the feasibility of this approach. HIV Env and influenza virus Headless are highly analogous in that both are unstable trimers when expressed recombinantly; and in both, key QNEs are only presented in the native trimeric complex. In other preliminary studies targeted DT bonds have been successfully introduced into the influenza HA stalk. DT crosslinking of a recombinant PR8 HA construct in its native, trimeric conformation can be performed to confirm binding to key bnAbs, and subsequently the “head” domain can be removed by engineering proteolytic cleavage sites, while maintaining the DT-locked, native antigenic conformation of the stalk trimer. The resulting Headless HA immunogen can be tested to confirm that it elicits broad protection in a C57BL/6 mouse model. Pre-clinical testing for efficacy can be performed in a highly predictive ferret lethal challenge model. Pre-clinical testing for safety can be performed in rabbits. Targeted DT Cross-Linking By generating native, soluble, and recombinant HA trimers and applying targeted dityrosine (DT) “staples” to covalently cross-link trimerizing interactions in the stalk of the trimer, DT-stabilized HA trimmers will be engineered with fully preserved antigenic profiles. Covalent stabilization of the trimer in the HA stalk region will be engineered to render stable the quaternary structure of the stalk, and this will allow subsequent proteolytic removal of the head while preserving the QNEs of the stalk. DT bonds are introduced to stabilize the complex after the protein/complex is fully folded, and therefore locks the native conformation, while maintaining structural functional integrity of the protein [16-18]. These safe, irreversible, and zero-length cross-links form only between Tyr residues in very close structural proximity, and do not distort the structure of the protein. Nor do they cause non-specific aggregate formation, as observed with disulfide bonds [17,19-22]. Targeted DT cross-linking technology can be applied to covalently stabilize a soluble HA trimer in its correctly folded conformation, and then one can determine whether it does, in fact, present key QNEs. Subsequently the immunodominant head can be removed by introducing sequence-specific protease cleavage sites—making use of variable loop tolerance for amino acid variation and information gathered from transposon-based mutagenesis analysis of HA. Presentation of QNEs on Headless HA is expected to improve upon the breadth of protection in lethal challenge studies with drift variant and heterologous viruses. The inventors' prior work in HIV shows that highly glycosylated multimers (e.g. HIV Env) can efficiently be locked together by DT cross-linking at various locations within the cleaved Env trimer—while maintaining the relevant quaternary structure and antigenicity. Conformationally Locking the Influenza Virus HA Trimeric Complex The HIV envelope spike is trimerized through well characterized interactions at its base as well as interactions at the spike's apex [33, 34]. In order to stabilize the trimerizing interactions at the apex of the spike, tyrosine substitutions were introduced, and the protein was expressed, purified, and DT cross-linked. By fluorescence, 7 variants were identified that form intermolecular, trimerizing cross-links with an average of 80%+ efficiency prior to any optimization, as quantified using DT-specific excitation (320 nm) and emission (405 nm) wavelengths. The ability of these constructs to bind conformational and trimer-specific bnAbs was assayed. DT crosslinking fully preserves binding of the anti-CD4 binding site bnAb b12, which binds both protomers and trimers, and the anti-V2 bnAb PG9, which preferentially binds trimers, but also binds monomers. In addition, conformational locking also significantly reduces binding to non-neutralizing mAbs, such as b6 & b13, in ELISA assays. The position of the DT bonds was confirmed by MS/MS of tryptic fragments of the DT-Env trimer. More importantly, a conformationally locked HIV Env trimer was found to bind significantly better to one of the most extremely broadly neutralizing and potent anti-HIV Env bnAbs, PG16, by comparison to the WT protomer; the PG16 epitope is only presented on the native/functional HIV envelope trimer [28]. Improved PG16 binding correlates with a significant reduction in binding to a poorly neutralizing anti-V2 mAb, CH58, that binds an α-helical conformer of an overlapping epitope that PG16 binds as a β-sheet. The next step with this DT-locked, soluble HIV Env trimer will be to test it in animal immunogenicity experiments. In influenza HA, the trimeric structure of the HA protein in complex with the CR6261 bnAb was analyzed. Five examples of possible HA variants (N403Y D429Y; N403Y L432Y; N403Y D433Y; N406Y D429Y; and N406Y D433Y) were initially identified, each with two point mutations that were predicted to form intermolecular bonds and stabilize the stalk trimer at the membrane distal/head proximal end (see schematic for design in FIG. 3) without altering the CR6261 quaternary epitope. Expression vectors encoding four of these variants were generated, and the variants were expressed and subjected to cross-linking conditions. Spectrofluorometry was used to determine whether these variants were forming DT bonds using the DT-specific excitation and emission wavelengths at which DT bonds fluoresce powerfully in direct proportion to their molar concentration. All four variants, but not wild-type HA, formed DT bonds efficiently (FIG. 4). Based on comparison to the positive control (insulin) and a DT standard, cross-linking efficiency of >70% is estimated for all four of these constructs prior to any optimization [35]. Removing the HA Head from the Conformationally Locked HA Proteolytic removal of the HA head domain from the DT-locked HA trimer requires engineering recognition motifs into the HA1 head domain for a substrate-specific protease (e.g. TEV). Using a transposon-based mutagenesis screen, four regions within the PR8 HA1 globular head have been identified that tolerate the insertion of foreign sequences approximately the same size as an engineered TEV protease site. Without further optimization, two of these regions (located at amino acid residues 128 and 223) would allow proteolytic cleavage of 3 of the 4 major antigenic sites in the PR8 globular head—the Sa, Ca, and Sb sites [36]. The remaining Cb site will also be removed. Viruses with insertions at these sites in HA1 remain capable of fusion, and the HA complex thus remains functionally intact. The proteolytic reaction will then be performed. These data demonstrate that the approach of locking together the HA trimer in the stalk, and subsequently removing the immunodominant head domain, will preserve vaccine-relevant QNEs of headless HA, and will lock the immunogen in an antigenically favorable conformation. This, in turn, suggests that the DT-locked headless trimer(s) described herein are expected to induce broadly protective antibody responses in vivo. Experimental Design. Soluble forms (e.g. lacking the transmembrane domain and possessing the T4 foldon trimerization motif) of the WT HA and variants described above will be expressed in SF9 or Hi5 cells as secreted proteins and purified by well-established methods [37-38]. The antigenic effect of the to-Tyr substitutions and the DT cross-linking will be determined in ELISAs using a panel of anti-HA stalk broadly neutralizing mAbs (e.g. 6F12, C179, CR6261, F10, A66 and D8), as structural changes caused by to-Tyr substitutions may reduce or enhance binding to some of these antibodies. Methods: Full-curve binding assays will compare WT HA to the uncross-linked and cross-linked HA variants. Changes in binding will be determined using non-linear regression analysis (Graphpad software) of binding curves to calculate and compare EC50 values for each construct with each mAb. Intermolecular bond formation will be confirmed by gel-shift in reducing SDS-PAGE (Western blot/Coomassie; DT bonds are not reduced); DT cross-linking will be quantified by spectrofluorometry, as described above. Such methods can be used to produce HA variants that form intermolecular DT bonds, and that retain binding to key anti-stalk quaternary bnAbs equal to wild-type PR8 HA after cross-linking the engineered influenza immunogen. Proteolytically Removing the HA Head from the Conformationally Locked HA PreScission Protease recognition sequences (LEVLFQGP (SEQ ID NO:69) (cleavage between Q and G residues) and/or TEV recognition sequences (ENLYFQG (SEQ ID NO:70) (cleavage between Q and G residues) and ENLYFQS (SEQ ID NO:71) (cleavage between G and S residues)) can be inserted at defined (e.g. amino acid residues 128 and 223) or additional positions to remove most of the globular head of HA from the baculovirus expressed, purified, fully folded, DT-stabilized, soluble HA precursor. Following antigenic confirmation, amino acid analysis and mass spectrometry can be performed to characterize the cross-linked molecule biochemically. Proteolysis of the head domain can be carried out by standard biochemical procedures and assayed by SDS-PAGE electro-mobility shift from a molecular weight corresponding to a complete DT-HA trimer (225 kD) to that of a headless trimer (135 kDa) (Coomassie stain, Western blot). Removal of the head from the DT cross-linked HA stalk can be confirmed with Head-specific Abs, for example in Western blots and ELISA. The same bnAbs and assays described above can be used to confirm preservation of the most relevant QNEs in DT-Headless HA. Amino acid analysis can be performed to assess any non-specific changes to amino acid side chains, and to confirm the presence of DT bonds (the DT moiety itself can be specifically detected). In order to identify the position of the DT bonds in DT-Headless, LC-MS/MS analysis of deglycosylated tryptic digests can be performed, for example on a Thermo Scientific LTQ Mass Spectrometer with a Michrom Paradigm HPLC and Vacuum Spray ionization source. Biochemical characterization can be performed to identify variants of DT-stabilized, Headless HAs that retain binding to key anti-stalk quaternary bnAbs equal to the wild-type soluble PR8 HA trimer. If necessary, additional cleavage sites can be engineered in order to first unravel the head, and thereby improve the efficiency of proteolytic cleavage. Similarly, PreScission and/or TEV proteases and their cleavage sites can be used as described above. Testing Protection Against Challenge with Drift and Heterologous Viruses A PR8 HA variant can be expressed in mg-quantities, DT crosslinked, proteolyzed, purified, and antigenically characterized. PR8, NL09, and VN04 HALO/PR8 6+2 mutant virus preparations can be made. To establish the LD50 for each of the challenge viruses, for each virus 4 groups of 4 C57BL/6 mice (female, 6- to 8-week-old (Charles River Laboratories) can be inoculated, using 10-fold dilutions of the indicated viruses for each group around the published LD50 for each virus. To establish the optimal dose of purified DT-locked Headless HA trimer immungen that protects 80%+ of animals from 5× the LD50 dose of homologous (PR8) challenge, 4 groups of 5 C57BL/6 mice (female, 6- to 8-week-old (Charles River Laboratories) can be immunized with a prime-boost strategy consisting of consecutive injections of varying amounts of the purified DT-Headless HA immunogen with a fixed amount of Poly I/C adjuvant (10 μg). Briefly, each group can be immunized with 0 μg, 2.5 μg, 5 μg, and 10 μg of DT-locked Headless trimer formulated with Poly I/C as an adjuvant. Three weeks later, the mice can be boosted, each with an equivalent amount of the adjuvanted immunogen. Three weeks after the boost, they can be challenged intranasally with a 5×LD50 dose of homologous (PR8) influenza virus. Mice can be monitored and evaluated for morbidity and mortality for a suitable time, such as 14 days. Mice losing more than 25% of their initial weight can be sacrificed and scored as dead. Survival can be defined as <25% weight loss. To test immunized mice for protection against a drift variant and group 1 heterologous challenges, three groups of C57BL/6 mice can be immunized with 10 μg of Poly I/C adjuvant only (“Adjuvant Only” control groups) and the remaining three groups can be immunized according to the schedule described above with the optimal dose of adjuvanted DT-Headless HA immunogen identified above (“DT-locked Headless Trimer” groups). Two weeks after the final immunization, one group of Adjuvant Only and one group immunized with the optimized dose of DT-locked Headless trimer each can be challenged intranasally with a lethal dose of homologous virus (PR8 H1N1), the mouse-adapted novel swine pandemic drift variant (NL/09, H1N1), and with heterosubtypic, group 1 influenza virus (VN04 HALO/PR8—6+2 mutant H5N1) (Table 1). Mice can be monitored and evaluated for morbidity and mortality for 10 days and scored as described above. Immunization groups to assess breadth of protection Adjuvant only (negative DT-locked Headless Immunogen controls) trimer Challenge: A. Homologous B. Homologous homologous (PR8) (PR8) (positive control) vs. C. Drift variant D. Drift variant drift variant (NL09) (NL09) vs. E. Group 1 Heterosubtypic F. Group 1 Heterosubtypic heterosubtypic (VN04 HALO/PR8_6 + (VN04 HALO/PR8_6 + 2 mutant) 2 mutant) Statistical Considerations: In view of the fact that both the predictor (adjuvant only vs. adjuvant+DT Headless immunogen) and the outcome (death vs. survival) are dichotomous, the null hypothesis that the vaccine has no effect can be tested with Fisher's Exact Test. To calculate the minimum number of animals per group (equal numbers in all groups) necessary to detect an effect at the 95% confidence level (p<0.05), the power can be set to 80% and an assumed effect size of 50% can be used (80% lethality in the control group, 30% lethality in the vaccinated groups). Accordingly, each analyte and control group should use a minimum of 15 animals. All methods can be carried out according to standard procedures, for example as described in Steel et al. 2010 [1]. For example, in ELISA assays the antigen (PR8 HA) can be immobilized with an α-foldon mAb (e.g. 74550, Fibrogen Inc.) or an α-stalk mAb to a non-quaternary epitope in order to optimize presentation of its native structure. Antigen-specific Ig in serum can be detected using labeled α-mouse Abs. It is expected that DT-Headless will successfully induce protection against drift virus (group D: NL09, H1N1), and/or a heterologous strain (group F: H5N1). If need be the immunogen can be reformulated with a different/additional adjuvant and/or the doses tested can be increased, and immunogen dose-calibration testing can be repeated. In addition, if need be the prime-boost regimen can be altered to include a third boost with purified DT-Headless HA antigen. The number of animals used in the final challenge study can be altered/increased to achieve an acceptable confidence level from homologous vs. drift and heterologous challenges. REFERENCES FOR EXAMPLE 1 1. Steel, J. et al. Influenza virus vaccine based on the conserved hemagglutinin stalk domain. MBio 1, (2010). 2. Pica, N. et al. Hemagglutinin stalk antibodies elicited by the 2009 pandemic influenza virus as a mechanism for the extinction of seasonal H1N1 viruses. Proc. Natl. Acad. Sci. U.S.A. 109, 2573-2578 (2012). 3. Miller, M. S. et al. 1976 and 2009 H1N1 Influenza Virus Vaccines Boost Anti-Hemagglutinin Stalk Antibodies in Humans. J. Infect. Dis. (2012).doi:10.1093/infdis/jis652 4. Krammer, F., Pica, N., Hai, R., Tan, G. S. & Palese, P. Hemagglutinin Stalk-Reactive Antibodies Are Boosted following Sequential Infection with Seasonal and Pandemic H1N1 Influenza Virus in Mice. J. Virol. 86, 10302-10307 (2012). 5. Wei, C.-J. et al. Induction of broadly neutralizing H1N1 influenza antibodies by vaccination. Science 329, 1060-1064 (2010). 6. Sagawa, H., Ohshima, A., Kato, I., Okuno, Y. & Isegawa, Y. The immunological activity of a deletion mutant of influenza virus haemagglutinin lacking the globular region. J. Gen. Virol. 77 (Pt 7), 1483-1487 (1996). 7. Ekiert, D. C. et al. Antibody recognition of a highly conserved influenza virus epitope. Science 324, 246-251 (2009). 8. Wang, T. T. et al. Vaccination with a synthetic peptide from the influenza virus hemagglutinin provides protection against distinct viral subtypes. Proc. Natl. Acad. Sci. U.S.A. 107, 18979-18984 (2010). 9. Ekiert, D. C. & Wilson, I. A. Broadly neutralizing antibodies against influenza virus and prospects for universal therapies. Curr Opin Virol 2, 134-141 (2012). 10. Ekiert, D. C. et al. A highly conserved neutralizing epitope on group 2 influenza A viruses. Science 333, 843-850 (2011). 11. Julien, J.-P., Lee, P. S. & Wilson, I. A. Structural insights into key sites of vulnerability on HIV-1 Env and influenza HA. Immunol. Rev. 250, 180-198 (2012). 12. Dreyfus, C. et al. Highly conserved protective epitopes on influenza B viruses. Science 337, 1343-1348 (2012). 13. Corti, D. et al. A neutralizing antibody selected from plasma cells that binds to group 1 and group 2 influenza A hemagglutinins Science 333, 850-856 (2011). 14. Nabel, G. J. & Fauci, A. S. Induction of unnatural immunity: prospects for a broadly protective universal influenza vaccine. Nat. Med. 16, 1389-1391 (2010). 15. Burton, D. R., Poignard, P., Stanfield, R. L. & Wilson, I. A. Broadly neutralizing antibodies present new prospects to counter highly antigenically diverse viruses. Science 337, 183-186 (2012). 16. Helms, M. K., Malencik, D. A. & Anderson, S. R. Flexibility involving the intermolecular dityrosyl cross-links of enzymatically polymerized calmodulin. Biochemistry 37, 8378-8384 (1998). 17. Malencik, D. A., Sprouse, J. F., Swanson, C. A. & Anderson, S. R. Dityrosine: preparation, isolation, and analysis. Anal. Biochem. 242, 202-213 (1996). 18. Malencik, D. A. & Anderson, S. R. Dityrosine formation in calmodulin: cross-linking and polymerization catalyzed by Arthromyces peroxidase. Biochemistry 35, 4375-4386 (1996). 19. Rodriguez-Mateos, A., Millar, S. J., Bhandari, D. G. & Frazier, R. A. Formation of dityrosine cross-links during breadmaking J. Agric. Food Chem. 54, 2761-2766 (2006). 20. Horowitz, E. D., Finn, M. G. & Asokan, A. Tyrosine cross-linking reveals interfacial dynamics in adeno-associated viral capsids during infection. ACS Chem. Biol. 7, 1059-1066 (2012). 21. Elvin, C. M. et al. Synthesis and properties of crosslinked recombinant pro-resilin. Nature 437, 999-1002 (2005). 22. Wang, W. Protein aggregation and its inhibition in biopharmaceutics. International Journal of Pharmaceutics 289, 1-30 (2005). 23. Walker, L. M. et al. Broad and potent neutralizing antibodies from an African donor reveal a new HIV-1 vaccine target. Science 326, 285-289 (2009). 24. Pejchal, R. et al. Structure and function of broadly reactive antibody PG16 reveal an H3 subdomain that mediates potent neutralization of HIV-1. Proc. Natl. Acad. Sci. U.S.A. 107, 11483-11488 (2010). 25. Walker, L. M. et al. Broad neutralization coverage of HIV by multiple highly potent antibodies. Nature 477, 466-470 (2011). 26. Harris, A. et al. Trimeric HIV-1 glycoprotein gp140 immunogens and native HIV-1 envelope glycoproteins display the same closed and open quaternary molecular architectures. Proc. Natl. Acad. Sci. U.S.A. 108, 11440-11445 (2011). 27. Alff, P. J. & Marshall, C. et al., C. Conformational-Locking of Cleaved HIV-1 gp140 Trimers by Targeted Dityrosine Bonds. Manuscript in Preparation 28. Palese, P. Influenza: old and new threats. Nat. Med. 10, S82-7 (2004). 29. Madjid, M. & Casscells, W. Influenza as a bioterror threat: the need for global vaccination. Expert Opin Biol Ther 4, 265-267 (2004). 30. Osterholm, M. T. Preparing for the next pandemic. N. Engl. J. Med. 352, 1839-1842 (2005). 31. Avatar Medical, LLC Stabilized proteins. (2005). 32. Josefsberg, J. O. & Buckland, B. Vaccine process technology. Biotechnol. Bioeng. 109, 1443-1460 (2012). 33. Palese, P. Personal Communication. Professor and Chair of Microbiology, Professor of Medicine, Infectious Disease—Mt. Sinal School of Medicine 34. Aeschbach, R., Amadò, R. & Neukom, H. Formation of dityrosine cross-links in proteins by oxidation of tyrosine residues. Biochim. Biophys. Acta 439, 292-301 (1976). 35. Cox, M. M. J. Recombinant protein vaccines produced in insect cells. Vaccine 30, 1759-1766 (2012). 36. Cox, M. M. J. & Hollister, J. R. FluBlok, a next generation influenza vaccine manufactured in insect cells. Biologicals 37, 182-189 (2009). 37. Yondola, M. A. et al. Budding capability of the influenza virus neuraminidase can be modulated by tetherin. J. Vivol. 85, 2480-2491 (2011). 38. Crowe, J. E. Personal Communication. Director, Vanderbilt Vaccine Center, Vanderbilt University Medical Center Recombinant, soluble protein immunogens represent a significant opportunity in the fight against natural and weaponized pathogens. Broadly neutralizing antibodies (bnAbs) against many pathogens have been described in recent years, many of which bind quaternary structures only displayed by protein complexes—which themselves are often unstable. Therefore, an urgent need exists to “lock” protein-based vaccine immunogens into the same native quaternary conformation as they are presented by the pathogen itself. The present example relates to a headless hemagglutinin-based universal flu vaccine made using a system that includes (i) performing site-directed mutagenesis at positions where resulting Tyr residues are predicted to be in close structural proximity, (ii) expressing and purifying the mutant protein, and (iii) subsequently enzymatically crosslinking/locking of the fully-folded protein complex. DT crosslinking is targeted and zero-length, DT bonds are irreversible and do not form spontaneously, and, most importantly, introduction of DT-bonds preserves protein structure and function, since it occurs once the protein is fully folded. At present, a universal influenza vaccine immunogen is not available. Recently, however, headless HA constructs trimerized in the transmembrane domain were described that focus Ab responses on the highly conserved stalk, and that, indeed, elicit broadly protective responses. Soluble headless HA trimerized by a foldon motif, however misfolds, does not present key quaternary neutralizing epitopes (QNEs), and elicits insufficiently protective responses. The present invention provides an alternative system that involves (i) DT-crosslinking a soluble HA construct in its native, trimeric conformation, and (ii) removing the “head” domain by engineering and cutting proteolytic cleavage sites in the variable loops and at the base of the head. The interactions between the subunits of the HA soluble stem (lacking the transmembrane domain) can be locked by dityrosine crosslinking while maintaining the structural integrity of HA trimers. Based on crystal structures, constructs with Tyr side-chains in the stem and in close structural proximity can be made, while avoiding bnAb binding sites. These constructs can be expressed and the resulting proteins purified by His-tag affinity chromatography. Tests can be performed to determine whether the constructs form intermolecular DT crosslinks by screening for DT-specific fluorescence and by gel shift analyses (e.g. Western blots). Using of a panel of anti-stem bnAbs, functional preservation of DT crosslinked HA trimer can be measured by ELISA using anti-stem bnAbs. Thermodynamic stabilization can be assayed to confirm the positions of DT bonds and the constructs' structural integrity after crosslinking biophysically. Constructs can be selected based on favorable antigenic and/or biochemical profiles. It is expected that binding to quaternary anti-stem bnAbs such as 6F12, C179, CR6261, F10, A66 and D8 will be fully maintained. Proteolytic cleavage sites can be engineered to unravel and remove the head of native, DT-stabilized HA trimers. Fully folded HA constructs with 4 or more cleavage sites for 1 or 2 proteases can be designed, generated, expressed, and DT crosslinked, and then purified by His-tag affinity chromatography before digesting with protease(s) to remove the head. Antigenic and biochemical and biophysical analyses can be performed to confirm preservation/integrity of QNEs in DT-headless HA after proteolytic digestion and immunogenic analysis can be performed in mice. Seasonal and pandemic influenza viruses remain a serious threat to human health, due to their ability to evade immune surveillance through rapid genetic drift and re-assortment. In the US alone, influenza causes seasonal epidemics that contribute to hundreds of thousands of hospitalizations and an average of 30,000 deaths annually, while creating a serious economic burden for individuals and the economy as a whole [1-3]. Pandemic outbreaks occur when a virulent strain of virus emerges that infects people with little or no immunity, and rapidly spreads across the globe, representing one of the most serious threats to human health. The 1918 Spanish Flu (H1N1) pandemic caused an estimated 50 million deaths; the 1957 Asian influenza (H2N2) pandemic and the 1968 Hong Kong (H3N2) pandemic each caused several million deaths [6]. Because influenza viruses are readily accessible and are easily transmitted by aerosol, the possibility for genetic engineering represents an enormous threat of weaponization, biowarfare, and bioterrorism [7,8]. Vaccines hold the greatest promise of providing protection in order to control infection. Although highly effective when matched to circulating strains, current influenza virus vaccines protect mostly against homologous virus strains. Protection is primarily due to high-avidity antibodies against the highly variable, immunodominant head domain of the hemagglutinin (HA) protein, which is specific to each strain of influenza. Therefore, new trivalent vaccine cocktails must be tailored each year to the prevalent influenza strains in circulation. Conventional, egg-based influenza vaccine manufacturing requires that strains be selected 9 months before the start of the season. Unfortunately, predictions of the circulating strains are often inaccurate, resulting in vaccines that are poorly matched, and therefore poorly protective [9-11]. A multitude of development programs are underway to address this problem, many of them in advanced stages, but the approach proposed herein has the potential to move one or more programs beyond the safety and efficacy hurdles, and enable a truly long-term broadly protective vaccine product for both seasonal and pandemic influenza. The stem of HA is highly conserved across a multitude of influenza strains, and considerable evidence now suggests that vaccination with a ‘headless’ HA consisting primarily of the HA stem results in the induction of antibody responses with significantly enhanced heterosubtypic binding activity and broad protection against lethal challenge [12-15, 16, 17]. As such, headless HA holds significant promise as a universal vaccine immunogen capable of protecting against all strains of influenza [16] [17]. Interestingly, immunization with DNA coding for HA has been observed to generate predominantly stalk-specific Ab responses, and data describing heterosubtypic protection by vaccination with HA DNA by electroporation was recently described [50]. A prime-boost combination of an expression vector encoding HA, followed by soluble headless protein boost holds the promise of generating broadly heterospecific responses that yield long-lasting protection. The present invention provides a soluble ‘headless’ HA trimer covalently stabilized in its correctly folded conformation that presents key quaternary neutralizing epitopes (QNEs). Targeted dityrosine crosslinking technology is used to stabilize a full-length HA trimer, and subsequently the head is removed using sequence/substrate-specific proteases—making use of variable loop tolerance for amino acid variation. Dityrosine (DT) crosslinking provides a method for stabilizing protein folds, complexes, and conformations by enzymatically introducing zero-length crosslinks, while maintaining structural and functional integrity of the protein [20,21]. Dityrosine bonds provide conformational stability and rigidity to protein structures and have been described in many diverse natural settings. DT crosslinks form naturally in vivo, both in the context of proteins evolved to utilize their specific characteristics [22-24], and as a consequence of protein oxidation [25]. DT bonds form the structure of wheat gluten—the quaternary protein structure comprising the glutenin subunits—and are present in large quantities in some of our most common foods [26]. No other amino acids form crosslinks or are modified when the reaction is carried out under mild conditions, though the tyrosyl side-chains themselves may oxidize if positioned too far apart, thus limiting the efficiency of the reaction, particularly under sub-optimal conditions. DT crosslinks are not hydrolyzed under normal physiological conditions, and do not form spontaneously in vitro. These features of the DT-crosslinking provide important advantages over conventional S—S chemistry; namely spontaneous and/or undesired protein products do not form and non-specific bonding/aggregation does not occur on maturation and processing. Because the reaction can be tightly controlled, development of a large-scale high-yield process can be relatively straight-forward, making the large-scale manufacturing a DT stabilized immunogen more feasible economically. One of the key features of DT crosslinking is that it is highly dependent on the structural proximity of tyrosyl side-chains, which must therefore be engineered within the structure of a protein or protein complex. Because no carbons are added in the formation of the bond, the resulting “staples” are non-disruptive to the overall protein fold and, critically, specific sites within the protein structure can be targeted with high specificity. The necessary tyrosines may be present in the primary structure of the protein or added by “to tyrosine” point mutations, while Tyr residues that form undesirable DT bonds can be mutated (to Phe, for example) to reduce background. Protein immunogens are folded chains of amino acid polypeptides, sometimes consisting of several polypeptide subunits. The rate of spontaneous unfolding, conformational transition, and dissociation determines a protein's functional half-life. Covalent non-peptide bonds between non-adjacent amino acid side chains can dramatically affect the rate of unfolding, and thus the half-life of a protein or protein complex. At least two different chemistries have evolved to accomplish covalent cross-links in proteins in vivo to stabilize their conformations and/or retard unfolding: these are disulfide bonds and dityrosine (DT) bonds. One major advantage of a directed DT cross-linking approach is that covalent bonds targeted to specific locations can reinforce particular 3-D arrangements of epitopes' secondary, tertiary, and/or quaternary structures, thereby preventing undesirable conformational transitions, and have the potential to provide a high degree of thermodynamic stabilization and conformational locking without adversely affecting the antigenic properties of protein immunogens. Disulfide bonds have been found in many eukaryotic proteins of diverse function. Intra-molecular S—S cross-links are often essential in stabilizing protein domains, and inter-molecular S—S bonds provide stability for the quaternary structure of protein complexes. These bonds can form spontaneously, and therefore do not require an additional manufacturing and purification process, but also reduce manufacturing yields due to free sulfhydryl-mediated aggregate formation. Furthermore, because they are formed as the protein is folding in the ER/Golgi apparatus, they can lead to structural distortions that would affect QNE presentation and the breadth of immunogenic protection. The C—C bond created by DT-crosslinking is stable under virtually any physiological and/or operational conditions that are likely to be used in accordance with the present invention, including those used in the process of immunization and vaccination. DT bonds are “zero length”—i.e. no atom is added. The cross-linking catalyst simply initiates bond formation between two tyrosines and is not incorporated into the product. Thus, no undesirable chemical modification of the protein occurs. DT cross linking is also very specific—no amino acids other than tyrosines have been shown to form cross-links or to be modified when the reaction is carried out under mild conditions. In addition, there is a strict distance requirement between the tyrosine side-chains, with the bond forming only when the two are in very close proximity. Furthermore, DT crosslinks do not form spontaneously, and, as described above, form only between Tyr residues in close proximity. DT crosslinking a protein can therefore lock it in its pre-existing native/functional conformation. In the context of headless HA design, this allows one to (i) engineer headless in an antigenically/immunogenicaly favorable conformation, e.g. by introducing point mutations, and then (ii) lock it in this preferred conformation by DT crosslinking Dityrosine bonds (DT bonds) that have important biological functions have been identified in proteins of several species, presumably in environments where disulfide bonds would be unsuitable. Specific DT bonds have, for example, been described in the cuticlin protein of Caenorhabditis elegans [27], the cell wall proteins of bamboo shoots [28], and parchment collagen [29]. In all of these cases, the proteins have evolved such that specifically placed DT cross-links contribute to the structural rigidity underlying the proteins' functionality. The importance of such bonds is also evidenced by the fact that in yeast, for example, a metabolic pathway has been described that leads to the formation of DT bonds in specialized proteins [30]. Furthermore, due to the distinct fluorescent properties of DT bonds, in the absence of atomic level structures, their formation can easily be assayed using conventional 96- and 384-well fluorescence plate readers. This also makes optimization of cross-linking conditions simple and efficient. The present methods involve (a) generating a DT stabilized full-length HA molecule that retains a stalk-specific antigenic profile equivalent to that of WT HA, (b) removing the head domain from the fully folded DT-HA by proteolytic cleavage while retaining the same ‘stalk-specific’ antigenic profile as WT HA. Immunogenicity may be confirmed in animal studies. The present example utilizes HA from the H1N1 A/Puerto Rico/8/1934 (“PR8”) strain of influenza as the starting point. The majority of influenza virus research in mice employs lab adapted PR8 or the A/WSN/1933 (H1N1) [WSN] influenza viruses. Immunogenicity and challenge studies can be carried out in BALB/c mice with homologous and heterologous H1N1 PR8 and H3N2X31 challenges. X31 is a reassortant virus carrying the HA and NA genes of A/Hong Kong/1/1968 (H3N2) in the background of PR8 [35]. To identify HA constructs which allow dityrosine bonds to form and stabilize the HA trimer, the trimeric HA crystal structure is analyzed (pdb file 3 GBN) and proximal residues are selected for tyr-substitution away from the binding sites of quaternary neutralizing antibodies (see FIG. 5). Once the in silico design of “to-tyr” point mutants (2T-HAs) is complete, cDNA encoding the ectodomain of wild-type HA (PR8) and to-tyr substitution mutants can be generated and cloned into a baculovirus transfer vector (pAcGP67A) using standard molecular biology techniques. WT and 2T-HA proteins can be expressed in SF9 or Hi5 cells and secreted HA can be purified over lectin-based glyco-affinity columns and MonoQ anion-exchange columns. Following purification, secreted HA trimmers can be isolated from monomers and high molecular weight aggregates by size exclusion chromatography (SEC) over a Superdex200 column. To evaluate whether or not the designed 2T-HA constructs form intermolecular DT cross-links, the purified proteins can be analyzed before and after exposure to DT crosslinking conditions by gel-shift in reducing SDS-PAGE (Western blot and Coomassie stain) and for DT-specific fluorescence. Constructs capable forming DT cross-links with an efficiency of >50% can be taken forward for further characterization. Based on preliminary studies with HIV env trimers, it is believed that crosslinking efficiencies of greater than 80% are attainable without significant process optimization. Biochemical and biophysical analysis of DT-crosslinked HA trimers (DT-HA) be can be performed to compare their thermostability with that of uncrosslinked HA in normal human serum at 37° C. over a time-course of 1-30 days. Trimeric DT-HA and control (uncrosslinked) trimeric HA can be analyzed each day for the presence of retained trimer by Western blot. Likewise, a 60-day, 25° C. time course in PBS (pH 7.4) of purified, trimeric DT-HA and control (uncrosslinked) trimeric HA can be analyzed weekly by SEC. The proportion of total material in the trimeric and monomeric fractions can be quantified using standard peak-integration software and the ratio of trimer to monomer in the DT-HA and control samples can be determined. Given that DT-HA constructs can be identified based on their stability in reducing SDS-PAGE, it is expected that 100% of the DT crosslinked trimer will remain trimeric under the experimental conditions described above, while labile uncrosslinked HA trimers will dissociate into monomeric subunits throughout the duration of the time course. A central advantage of DT crosslinking technology over other crosslinking methodologies is the ability to form covalent intermolecular crosslinks without disrupting the antigenic profile of vaccine immunogen candidates. The effect of the both the “to-tyr” mutations and the DT crosslinking can be determined by ELISA using a panel of anti-HA stem broadly neutralizing mAbs (e.g 6F12, C179, CR6261, F10, A66 and D8). Full-curve binding assays can be used to compare WT HA trimers to the 2T-HA mutant trimers (uncrosslinked) and to DT-HA trimers (crosslinked). Changes in binding following the introduction of to-tyr mutations as well as after DT crosslinking can be determined using non-linear regression analysis of binding curves to calculate and compare EC50 values for each construct with each mAb. The position of to-tyr mutations can be distal to and non-overlapping with amino acids involved in binding of the anti-stem bnAbs listed above. It is possible that structural changes caused by tyrosine substitutions may reduce or enhance binding to some of these antibodies. However, preliminary studies using HIV suggest that DT crosslinking fully preserves a protein candidate's antigenic profile and a similar degree of antigenic preservation is expected following DT crosslinking of influenza HA. In order to assess non-specific changes to amino acid side chains throughout the entire crosslinked protein, comparative amino acid analysis (AAA) can be performed on uncrosslinked (control) and crosslinked constructs. Amino acid analysis can also be used to confirm the presence of DT bonds since dityrosine crosslinks withstand even the acid-hydrolysis used to prepare samples for AAA and dityrosine itself can be specifically detected in the analysis. In order to directly identify the position of the dityrosine bonds in DT-HA, mass spectrometry analysis of deglycosylated tryptic digests can be used, for example by performing LC-MS/MS on a Thermo Scientific LTQ Mass Spectrometer with a Michrom Paradigm HPLC and Michrom Vacuum Spray ionization source. Collectively these studies can be used to identify and characterize HA constructs capable of forming trimerizing DT bonds. Such constructs may, even prior to removal of the immune-dominant HA head domain, provide improved HA immunogens stably presenting stalk specific QNEs. Previously reported recombinant headless HA constructs do not retain the fully native, quaternary structure of the HA stem and thus, these constructs do not bind known quaternary specific bnAbs. Following baculovirus expression and purification of DT-HA construct(s) as described above the head domain can be removed proteolytically—post-folding and after DT crosslinking—in order to generate a stable headless HA which retains binding to broadly protective, conformation-dependent quaternary antibodies. In order to enable the proteolytic removal of the globular head domain of HA, protease cleavage sites can be introduced into HA1. Head-removal sites can be introduced at, for example, positions 60-76 (N-terminal site) and 277-290 (c-terminal site) through standard molecular biology techniques [19]. Crystal structures of HA indicate that these positions are solvent-exposed and could be made further accessible to proteases by removing the structural constraints that may hamper efficient proteolysis through the introduction of additional cleavage sites into the HA1 variable loop domains (AA positions 142-146 and 155-164) [37]. Unraveling the head can be used to further improve protease substrate access, if required. Introduction of cleavage sites into the HA variable loops is not expected to alter the overall conformation of the HA trimer as these sites are highly tolerant of amino acid substitutions. Indeed, all of these amino acid positions (e.g. 142-146 and 155-164) have changed in infectious virus isolates collected from 1968 through 1999 [38]. Cleaving HA1 in the variable loops can be performed to destabilize the head's globular structure, allowing complete exposure and efficient cleavage at the primary head-removal sites (53-67 and 269-277). PreScission Protease (GE Healthcare Life Sciences) recognition sequences (LEVLFQGP (SEQ ID NO:69)) and TEV (Tobacco Etch Virus protease) recognition sequences ENLYFQG (SEQ ID NO:70) and ENLYFQS (SEQ ID NO:71)) can be used/introduced. TEV cleavage can be carried out at a substrate to enzyme ratio of 1:50-200 w/w in a 25 mM Tris-HCl buffer with 150-500 mM NaCl, and 14 mM (3-mercaptoethanol at pH 7.0. PreScission Protease cleavage can be performed in a 50 mM Tris-HCl buffer, with 150 mM NaCl, 1 mM EDTA and 1 mM dithiothreitol (DTT) at pH 7.0. Removal of the head can be assayed by electro-mobility shift from a molecular weight corresponding to a full-length DT-HA trimer (˜225 kDa) to that of a headless trimer (˜135 kDa) by SDS-PAGE, followed by coomassie stain and Western blot. Head-specific detection Abs can be used to confirm removal of the head from the DT crosslinked HA stem by Western blot and ELISA. If HA head-removal is incomplete, the positions of Prescission Protease and TEV sites can be swapped, or, only a single type of site can be introduced at all desired cleavage positions. In order to test the immunogenicity of the DT-headless constructs, mouse immunogenicity studies can be performed. BALB/c mice (6-8 weeks old) can be anesthetized with isoflurane 3-5% and subsequently immunized in a prime-boost regime/schedule with two intramuscular injections 3 weeks apart, first with DNA comprising 37.5 μg of pGag-EGFP and 75 μg of pDZ_PR8_HA followed by electoporation pulsing (prime), and subsequently with 25 μg of WT HA, foldon/GCN4-stabilized HA trimers, or DT-headless protein (boost). Protein (boost) immunogens can be formulated with Alum (Aluminum phosphate, 300 μg/dose). Two weeks following the second injection (boost), serum can be collected and assayed for anti-HA responses relative to pre-immunization serum and adjuvant only controls. Overall anti-HA IgG and IgM titers for each group can be determined by ELISA. Heterosubtypic reactivity of antisera to 10 different purified group 1 and group 2 HAs can be determined Western blot and ELISA. Immunogens from each group are expected to elicit anti-HA antibody responses. In order to investigate the heterosubtypic neutralization capacity of anti-serum from each group, the ability of these sera to neutralize a panel of heterologous influenza viruses (HK/68 H3, Bris/07 H3, Neth/03 H7, Cal/09 H1, Sing/57 H2, Viet/04 H5, HK/97 H6, HK/99 H9) can be tested. Anti-serum can be serially diluted 2-fold, mixed with an equal volume of virus, and incubated for 2 h at 37° C. Virus-serum mixtures can be added to target cells (MDCK) in serum free media containing trypsin and incubated for 3 h prior to replacement of the media. Cells can be monitored for cytopathic effects 3-5 days following exposure to virus-serum mixtures. A major objective of this immunogen design and development process is to generate a DT-headless immunogen capable of eliciting bnAbs and protecting against heterologous influenza challenge. To directly investigate the ability of DT-headless to elicit protective responses against influenza infection, 3 groups of 20 BALB/c mice can be immunized with WT HA, foldon/GCN4 headless, or DT-headless, compared to non/pre-immunized and adjuvant-only immunized controls (groups 4 and 5, 20 mice each), and challenged intranasally with a lethal dose of homologous (PR8) or heterologous (X31) virus—10 mice each—2 weeks following the second immunization (boost). Mice can be anesthetized with an intra-peritoneal injection of ketamine (75 mg/kg) and xylazine (15 mg/kg) prior to challenge, and body weight can be monitored daily. <20% weight loss can be used as a surrogate for survival. It is expected that each immunogen (WT HA, foldon/GCN4 headless, DT-headless) will provide some degree of protection against PR8 challenge. However, it is expected that immunization with a DT-headless immunogen will provide significantly improved protection against heterologous influenza challenge and that this protection will correlate with the titers of bnAbs recognizing conserved QNEs that presented on the native HA stem in its trimeric form. The baculovirus expression vector system (BEVS) can be used for manufacturing of recombinant HA antigen as this system is well established and suitable production/purification protocols have been well described and validated [10]. Generally, such protocols involve harvesting infected cells by centrifugation, detergent-mediated protein solubilization, followed by purification involving two chromatographic (IE and HIC columns) steps [10]. Due to the large difference in MW of the trimeric stalk as compared to the monomeric head, and the enzymes used in processing, gel filtration can also be used. IE chromatography can also be used. Two enzymes are used in the processes described herein—peroxidases to catalyze the formation of DT bonds and proteases to cleave off the HA head after cross-linking. Both are commercially available. Purity of the finished immunogens can be ascertained by conventional gel electrophoresis and HPLC. Cross-linking can be assessed by a combination of gel electrophoresis under denaturing conditions, fluorescence measurements, and amino acid analysis. Immunogenicity can be assessed by profiling against a panel of selected antibodies as described above. HPLC-based assays can be used to identify and measure protein sugar compositions. DT-Headless HA can be formulated with an adjuvant selected based on technical specifications and other considerations. Adjuvanted HA formulated with a variety of excipients and stabilizing agents/preservatives can be lyophilized, and following rehydration tested biophysically (dynamic light scattering) and antigenically. The effect of storage at room temperature, 4° C. and −20° C. can be tested to determine long-term storage conditions, stability, and potency. Animal efficacy studies (e.g. conducted in ferrets) can be performed and acute and long-term animal safety studies can be performed. Ferrets are susceptible to human influenza viruses and develop some of the symptoms of influenza that are seen in humans; furthermore, they are large enough to monitor clinical parameters (e.g. temperature, pulse, and respiratory rate), and relatively large amounts of sera can be obtained for use in serologic and antigenic characterization. 1. Bouvier N M, Palese P: The biology of influenza viruses. Vaccine 2008, 26 Suppl 4:D49-53. 2. Rappuoli R, Dormitzer P R: Influenza: options to improve pandemic preparation. Science, 336:1531-1533. 3. Palese P S M (Ed.). Orthomyxoviridae: The Viruses and their Replication.; 2007. 4. Liu J, Bartesaghi A, Borgnia M J, Sapiro G, Subramaniam S: Molecular architecture of native HIV-1 gp120 trimers. Nature 2008, 455:109-113. 5. McLellan J S, Pancera M, Carrico C, Gorman J, Julien J P, Khayat R, Louder R, Pejchal R, Sastry M, Dai K, et al: Structure of HIV-1 gp120 V1/V2 domain with broadly neutralizing antibody PG9. Nature 2011, 480:336-343. 6. Tumpey T M, Belser J A: Resurrected pandemic influenza viruses Annu Rev Microbiol 2009, 63:79-98. 7. Tripp R A, Tompkins S M: Animal models for evaluation of influenza vaccines. Curr Top Microbiol Immunol 2009, 333:397-412. 8. Bartlett J G, Borio L: Healthcare epidemiology: the current status of planning for pandemic influenza and implications for health care planning in the United States. Clin Infect Dis 2008, 46:919-925. 9. Fiore A E, Bridges C B, Cox N J: Seasonal influenza vaccines. Curr Top Microbiol Immunol 2009, 333:43-82. 10. Josefsberg J O, Buckland, B.: Vaccine Process Technology. Biotechnology and Bioengineering 2012, 109. 11. Greenberg M E, Lai M H, Hartel G F, Wichems C H, Gittleson C, Bennet J, Dawson G, Hu W, Leggio C, Washington D, Basser R L: Response to a monovalent 2009 influenza A (H1N1) vaccine. N Engl J Med 2009, 361:2405-2413. 12. Ekiert D C, Bhabha G, Elsliger M A, Friesen R H, Jongeneelen M, Throsby M, Goudsmit J, Wilson I A: Antibody recognition of a highly conserved influenza virus epitope. Science 2009, 324:246-251. 13. Wang T T, Tan G S, Hai R, Pica N, Ngai L, Ekiert D C, Wilson I A, Garcia-Sastre A, Moran T M, Palese P: Vaccination with a synthetic peptide from the influenza virus hemagglutinin provides protection against distinct viral subtypes. Proc Natl Acad Sci USA, 107:18979-18984. 14. Ekiert D C, Wilson I A: Broadly neutralizing antibodies against influenza virus and prospects for universal therapies. Curr Opin Virol, 2:134-141. 15. Ekiert D C, Friesen R H, Bhabha G, Kwaks T, Jongeneelen M, Yu W, Ophorst C, Cox F, Korse H J, Brandenburg B, et al: A highly conserved neutralizing epitope on group 2 influenza A viruses. Science, 333:843-850. 16. Hu H, Voss J, Zhang G, Buchy P, Zuo T, Wang L, Wang F, Zhou F, Wang G, Tsai C, et al: A human antibody recognizing a conserved epitope of H5 hemagglutinin broadly neutralizes highly pathogenic avian influenza H5N1 viruses. J Virol, 86:2978-2989. 17. Corti D, Voss J, Gamblin S J, Codoni G, Macagno A, Jarrossay D, Vachieri S G, Pinna D, Minola A, Vanzetta F, et al: A neutralizing antibody selected from plasma cells that binds to group 1 and group 2 influenza A hemagglutinins Science, 333:850-856. 18. Steel J, Lowen A C, Wang T T, Yondola M, Gao Q, Haye K, Garcia-Sastre A, Palese P: Influenza virus vaccine based on the conserved hemagglutinin stalk domain. MBio 2010, 1. 19. Pica N, Hai R, Krammer F, Wang T T, Maamary J, Eggink D, Tan G S, Krause J C, Moran T, Stein C R, et al: Hemagglutinin stalk antibodies elicited by the 2009 pandemic influenza virus as a mechanism for the extinction of seasonal H1N1 viruses. Proc Natl Acad Sci USA, 109:2573-2578. 20. Malencik D A, Sprouse J F, Swanson C A, Anderson S R: Dityrosine: preparation, isolation, and analysis. Anal Biochem 1996, 242:202-213. 21. Malencik D A, Anderson S R: Dityrosine formation in calmodulin: cross-linking and polymerization catalyzed by Arthromyces peroxidase. Biochemistry 1996, 35:4375-4386. 22. Tenovuo J, Paunio K: Formation of dityrosine by human salivary lactoperoxidase in vitro. Acta Odontol Scand 1979, 37:147-152. 23. Tenovuo J, Paunio K: Peroxidase-catalysed formation of dityrosine, a protein cross-link, in human periodontal ligament collagen. Arch Oral Biol 1979, 24:591-594. 24. Elvin C M, Carr A G, Huson M, Maxwell J M, Pearson R D, Vuocolo T, Liyou N E, Wong D C, Merritt D J, Dixon N E: Synthesis and properties of crosslinked recombinant pro-resilin. Nature 2005, 13. 25. Giulivi C, Traaseth N J, Davies K J: Tyrosine oxidation products: analysis and biological relevance. Amino Acids 2003, 25:227-232. 26. Tilley K A, Benjamin R E, Bagorogoza K E, Okot-Kotber B M, Prakash O, Kwen H: Tyrosine cross-links: molecular basis of gluten structure and function. J Agric Food Chem 2001, 49:2627-2632.27. Lassandro F S M, Zei F, Bazzicalupo P.: The role of dityrosine formation in the crosslinking of CUT-2, the product of a second cuticlin gene of Caenorhabditis elegans. Mol Biochem Parasitol 1994, 65:147-159. 28. Totsune H N M, Inaba H.: Chemiluminescence from bamboo shoot cut. Biochem Biophys Res Commun 1993, 194:1025-1029. 29. Sobel H A H: Modification in amino acids of Dead Sea Scroll Parchments. Free Radic Biol Med 1992, 6:701-702. 30. Briza P K H, Pittenauer E, Allmaier G, Breitenbach M: N,N′-Bisformyl dityrosine is an in vivo precursor of the yeast ascospore wall. Eur J Biochem 1996, 239:124-131. 31. Walker L M, Phogat S K, Chan-Hui P Y, Wagner D, Phung P, Goss J L, Wrin T, Simek M D, Fling S, Mitcham J L, et al: Broad and potent neutralizing antibodies from an African donor reveal a new HIV-1 vaccine target. Science 2009, 326:285-289. 32. Kwong P D, Wilson I A: HIV-1 and influenza antibodies: seeing antigens in new ways. Nat Immunol 2009, 10:573-578. 33. Karlsson Hedestam G B, Fouchier R A, Phogat S, Burton D R, Sodroski J, Wyatt R T: The challenges of eliciting neutralizing antibodies to HIV-1 and to influenza virus. Nat Rev Microbiol 2008, 6:143-155. 34. Wu X, Yang Z Y, Li Y, Hogerkorp C M, Schief W R, Seaman M S, Zhou T, Schmidt S D, Wu L, Xu L, et al: Rational design of envelope identifies broadly neutralizing human monoclonal antibodies to HIV-1. Science, 329:856-861. 35. Bouvier N M, Lowen A C: Animal Models for Influenza Virus Pathogenesis and Transmission. Viruses 2010, 2:1530-1563. 36. Cox M M, Hollister J R: FluBlok, a next generation influenza vaccine manufactured in insect cells. Biologicals 2009, 37:182-189. 37. Skehel J J, Wiley D C: Receptor binding and membrane fusion in virus entry: the influenza hemagglutinin. Annu Rev Biochem 2000, 69:531-569. 38. Krashias G, Simon A K, Wegmann F, Kok W L, Ho L P, Stevens D, Skehel J, Heeney J L, Moghaddam A E, Sattentau Q J: Potent adaptive immune responses induced against HIV-1 gp140 and influenza virus HA by a polyanionic carbomer. Vaccine, 28:2482-2489. 39. Du L, Zhao G, Zhang X, Liu Z, Yu H, Zheng B J, Zhou Y, Jiang S: Development of a safe and convenient neutralization assay for rapid screening of influenza HA-specific neutralizing monoclonal antibodies. Biochem Biophys Res Commun 2010. 40. Yumiko Matsuoka E W L, Kanta Subbarao: The Ferret Model for Influenza. Current Protocols in Microbiology 2009, 15G.2.1-15G.2.29. 41. Osterhaus A, Fouchier R, Rimmelzwaan G: Towards universal influenza vaccines? Philos Trans R Soc Lond B Biol Sci, 366:2766-2773. 42. Medina R A, Manicassamy B, Stertz S, Seibert C W, Hai R, Belshe R B, Frey S E, Basler C F, Palese P, Garcia-Sastre A: Pandemic 2009 H1N1 vaccine protects against 1918 Spanish influenza virus. Nat Commun, 1:28. 43. Ross T M, Mahmood K, Crevar C J, Schneider-Ohrum K, Heaton P M, Bright R A: A trivalent virus-like particle vaccine elicits protective immune responses against seasonal influenza strains in mice and ferrets. PLoS One 2009, 4:e6032. 44. Settipane R A, Siri D, Bellanti J A: Egg allergy and influenza vaccination. Allergy Asthma Proc 2009, 30:660-665. 45. Schultz-Cherry S, Jones J C: Influenza vaccines: the good, the bad, and the eggs. Adv Virus Res, 77:63-84. 46. Wrammert J, Koutsonanos D, Li G M, Edupuganti S, Sui J, Morrissey M, McCausland M, Skountzou I, Hornig M, Lipkin W I, et al: Broadly cross-reactive antibodies dominate the human B cell response against 2009 pandemic H1N1 influenza virus infection. J Exp Med, 208:181-193. 47. Kaminski D A, Lee F E: Antibodies against conserved antigens provide opportunities for reform in influenza vaccine design. Front Immunol, 2:76. 48. Reisinger K S, Block S L, Izu A, Groth N, Holmes S J: Subunit influenza vaccines produced from cell culture or in embryonated chicken eggs: comparison of safety, reactogenicity, and immunogenicity. J Infect Dis 2009, 200:849-857. 49. Monto A S, Ohmit S E: Seasonal influenza vaccines: evolutions and future trends. Expert Rev Vaccines 2009, 8:383-389. 50. Wang T T, et al. Broadly protective monoclonal antibodies against H3 influenza viruses following sequential immunization with different hemagglutinins PLoS Pathog 6:e1000796 51. Steel J et al. Influenza Virus Vaccine Based on the Conserved Hemagglutinin Stalk Domain. mBio 1(1): e00018-10. Prior attempts at engineering headless HA have included expressing HA proteins in which the globular head region was recombinantly spliced out. Such prior headless HA constructs generated considerable excitement in the field, because they elicited improved, cross-reactive Ab responses. These Abs, however, were not cross protective and only protected against homologous challenge. These prior recombinant headless constructs do not bind the current repertoire of cross-protective, conformational stalk Abs, which suggests at least some degree of stalk mis-folding in the absence of the intact globular head. These prior observations were confirmed using one of the most broadly cross-reactive anti-stalk Abs, C179, by immunofluorescence analysis (see FIG. 6). Application of DT-based conformational locking will circumvent this shortcoming, by holding together the stalk trimer in its native conformation, prior to proteolytic removal of the head, and thus result in a DT-locked Headless HA immunogen that will focus Ab responses on the critical stalk QNEs. DT crosslinks were introduced into the PR8 HA stalk domain, and the DT-cross-linked HA trimer maintained native antigenicity. Based on the crystal structures of the 1918 H1N1 HA trimer in complex with the cr6261 bnAb (pdb file: 3 GBN) and of the PR8 HA (pdb file: 1RU7), to-tyrosine substitutions were successfully engineered into the HA stalk domain in order to enable DT crosslink formation, which should maintain quaternary antigenicity upon proteolytic removal of the globular head. 293T cells were subsequently transfected with secreted variants of the to-tyrosine mutants and measured at 405 nm fluorescence in transfected cell supernatants, to determine the formation of DT bonds. A large increase in 405 nm fluorescence (highly specific for DT bonds) demonstrates robust crosslinking in several to-tyrosine mutants (FIG. 7 A). Based on comparison to the positive control (insulin) and a DT standard, a cross-linking efficiency of >70% was confirmed for four of these constructs, prior to any optimization. As shown in FIG. 7B, C179 Ab binding is unchanged before and after the crosslinking reaction. These data show that the PR8 HA stalk can be cross-linked and that the key quaternary stalk epitope bound by one of the most broadly cross-reactive, conformational mAbs, C179 (2), is maintained. Targeted protease cleavage sites were also successfully introduced and used to cleave the PR8 HA head domain. Extensive analysis of the PR8 HA structure and transposon-based mutagenesis studies revealed multiple locations within the globular head region that could tolerate insertion of proteolytic cleavage sites. Out of 20+ possible sites identified, two constructs that allow insertion were generated. One site is located at the base of the globular head domain (“48G”), while the other resides closer to the variable loops of the protein (“128S”). Both insertions express well as indicated by Western blot of whole cell extracts (FIG. 6B, left) and form virus-like particles (VLPs) in sufficient quantity for detection in transfected cell supernatants by C179 ELISA (FIG. 8A). Of the two constructs generated, the 48G insertion is predicted to be least accessible for the protease, yet would most completely remove the Head domain, due to its location close to the base of the head. In order to demonstrate that the 48G site is sufficiently accessible, TEV protease cleavage was performed on the HA 48G protein, using WT HA as a negative control. As shown in FIG. 8B, right, TEV protease cleavage of the HA 48G protein results in the removal of the first 48 AAs (6.5 kDa) of HA, but no cleavage occurs in the WT HA protein. Furthermore, HA 48G also maintains hemagglutination activity when assayed directly from transfected cell supernatants, suggesting that it remains folded in its functional conformation (FIG. 8C). Introduction: In designing a conformationally locked headless HA, the atomic structures of the 1918 HA:cr6261 complex (PDB:3 GBN) and PR8 HA (PDB:1RU7) were analyzed to identify positions that 1) enable dityrosine (DT) crosslinking in the stalk at a sufficient distance from the cr6261 epitope to maintain stalk bnAb binding; and 2) enable insertion of protease cleavage sites, that can be used to remove the head. PR8 HA Trimers were Successfully Locked in their Native Trimeric Conformation Using DT Crosslinks at Several Locations in the HA Stalk; and these DT-Locked HAs Maintain Native Stalk Antigenicity Several tyrosine mutations were engineered into the stalk of PR8 HA that enable the trimers to be locked in their native prefusion state, at high efficiency. FIG. 85A demonstrates a clear shift to the trimeric state (reducing SDS-PAGE) following DT crosslinking; and FIG. 85B confirms that di-tyrosine bonds have formed by specific fluorescence at 405 nm. Densitometry of the cross-linked species demonstrates greater than 80% conversion to the trimeric state. Most importantly binding of 8D4, a stalk-specific bnAb, is fully maintained (FIG. 85C). Crystallographic analysis has shown that 8D4 binds the same epitope as cr6261. These data confirm that the PR8 HA can be cross-linked in its stalk while maintaining the native conformation of the key VH1-69 quaternary stalk epitope. Multiple C- and N-Terminal TEV Protease Recognition Sites have been Successfully Engineered into the Head of PR8 HA, Individually and in Combination Regions were identified in the head of PR8 HA into which TEV protease cleavage sites can be inserted without disrupting HA's function. For structure-based design, PR8 HA and TEV protease recognition site structural data were combined, and cleavage site insertions were specifically targeted into regions of HA's head based on the following criteria: i) proximity to the stalk apex, in order to maximize removal of the immune-dominant head; ii) similarity between the secondary structures of HA and the TEV cleavage site, to minimize structural perturbation; iii) regions identified as tolerant of insertion based on the transposon mutagenesis screen with data from a transposon-based mutagenesis screen (Heaton and Palese PNAS Vol. 110, No. 50; pp. 20248-53). In total, approximately 50 insertion sites were screened individually, and assayed for their ability to be incorporated into VLPs by expressing only HA (WT or with insertion) and NA. This assay encompasses several of HA's functional attributes, including expression, cell surface accumulation, membrane microdomain localization, and particle formation, and was therefore performed with full length HA proteins. This approach identified several C-terminal (e.g. at positions 278, 282, 283, 286, and 291) and 2 N-terminal (positions 48 and 63) where TEV insertions maintain the function of WT HA in the VLP formation assay (FIG. 86 A). Several of these also maintain stalk bnAb binding, and cleave efficiently (FIG. 86 B). The single insertion HA mutants (insertion at positions 63, 278, and 286) bound to a broadly neutralizing VH1-69 stalk-specific mAb by direct capture ELISA at 50 μg/ml (normalized for HA presence in supernatants). Two C-terminal insertions (positions 278 and 286) and 1 N-terminal insertion (position 63) were prioritized for further analysis and testing in combination. A second N-terminal insertion (position 48), binds well to certain anti-stalk VH1-69 bnAbs (e.g. 18A3), but less well to others, and therefore could nonetheless provide a reasonable alternative to the insertion at position 63. Some of the prioritized insertion sites have been tested in various combinations (e.g. 63-278 and 63-286) and have shown that both of the combinations of insertions also maintain efficient VLP formation (FIG. 87A) and bind well to stalk bnAbs (FIG. 87B). Going forward both components (to-tyrosine mutations and proteolytic cleavage site insertions) can be introduced into a single HA molecule. DT crosslinking can then be applied to lock the stalk of HA in its trimeric, prefusion conformation, and following this the head can be removed proteolytically to generate a fully native, headless HA. While the foregoing invention has been described in some detail for purposes of clarity and understanding, it will be clear to one skilled in the art from a reading of this disclosure that various changes in form and detail can be made without departing from the true scope of the invention. The invention may also be further defined in terms of the following claims. 1. An influenza hemagglutinin (HA) polypeptide, protein or protein complex comprising an amino acid sequence having at least 65% sequence identity to amino acid residues 229 to 519 of SEQ ID NO: 1, wherein the amino acid sequence comprises a point mutation to tyrosine at one or more of amino acid positions 403, 406, 411, 422, 429, 432, 433, and 435, or an amino acid residue corresponding thereto. 2. An influenza hemagglutinin (HA) polypeptide, protein or protein complex according to claim 1, wherein the amino acid sequence comprises point mutations to tyrosine at two or more of amino acid positions 403, 406, 411, 422, 429, 432, 433, and 435, or amino acid residues corresponding thereto. 3. An influenza hemagglutinin (HA) polypeptide that consists essentially of an amino acid sequence having at least 65% sequence identity to amino acid residues 229 to 519 of SEQ ID NO: 1, wherein the amino acid sequence comprises a point mutation to tyrosine at one or more of amino acid positions 403, 406, 411, 422, 429, 432, 433, and 435, or an amino acid residue corresponding thereto. 4. An influenza HA polypeptide, protein or protein complex according to claim 1, wherein the polypeptide, protein or protein complex is folded into a trimeric stalk conformation and comprises at least one di-tyrosine cross-link, wherein one or both tyrosines of the at least one di-tyrosine cross-link originate from a point mutation to tyrosine. 5. An influenza HA polypeptide according to claim 3, wherein the polypeptide is comprised with an influenza HA protein complex that is folded into a trimeric stalk conformation, and wherein the influenza HA protein complex comprises at least one di-tyrosine cross-link, wherein one or both tyrosines of the at least one di-tyrosine cross-link originates from a point mutation to tyrosine. 6. An influenza HA polypeptide, protein or protein complex according to claim 4, wherein the cross-links are located between one or more paired tyrosine residues, wherein the paired tyrosine residues are selected from the group consisting of residues 403 and 433; 411 and 422, 403 and 429, 403 and 432, 433 and 435, and 406 and 433. 7. An influenza HA protein complex according to claim 5, wherein the cross-links are located between one or more paired tyrosine residues, wherein the paired tyrosine residues are selected from the group consisting of residues 403 and 433; 411 and 422, 403 and 429, 403 and 432, 433 and 435, and 406 and 433. 8. An influenza HA polypeptide, protein or protein complex according to claim 1, wherein the influenza HA polypeptide, protein or protein complex has the amino acid sequence of SEQ ID NO: 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 86, 87, 88, 89, 90. 91, 92, 93, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, or 117, or an amino acid sequence having 65% or greater sequence identity to any of such sequences. 9. An influenza HA polypeptide, protein or protein complex according to claim 1, wherein the polypeptide, protein or protein complex is capable of binding to an HA-stalk-specific antibody. 10. An influenza HA polypeptide, protein or protein complex according to claim 9, wherein the polypeptide, protein or protein complex is capable of binding to antibody C179. 11. An influenza HA polypeptide, protein or protein complex according to claim 1, wherein the polypeptide, protein or protein complex is capable of folding into a trimeric stalk conformation. 12. An influenza HA polypeptide, protein or protein complex according to claim 1, wherein the polypeptide, protein or protein complex further comprises a trimerization domain. 13. An influenza HA polypeptide, protein or protein complex according to claim 12, wherein the trimerization domain is a foldon domain. 14. A nucleic acid molecule encoding an influenza HA polypeptide, protein or protein complex according to claim 1. 15. A composition comprising an influenza HA polypeptide, protein or protein complex according to claim 1. 16. The composition of claim 16, wherein the composition is a vaccine composition. 17. The composition of claim 17, wherein the composition further comprises an adjuvant, a carrier, an immunostimulatory agent, or any combination thereof. 18. A composition comprising an influenza HA polypeptide according to claim 2. 19. A composition comprising an influenza HA polypeptide according to claim 2 and an influenza HA polypeptide consisting essentially of an amino sequence having at least 65% sequence identity to SEQ ID NO: 94 or SEQ ID NO: 95. Filed: Aug 2, 2014 Patent Grant number: 9393297 Inventors: Christopher Patrick Marshall (New York, NY), Peter Joseph Alff (New York, NY), Claudio Bertuccioli (New York, NY), Mark Andrew Yondola (Medford, NY) Current U.S. Class: Disclosed Amino Acid Sequence Derived From Virus (424/186.1); Lectins, E.g., Concanavalin, Hemagglutinin, Etc. (530/396); Viral Protein (536/23.72) International Classification: A61K 39/145 (20060101); C12N 7/00 (20060101); A61K 45/06 (20060101); C07K 14/005 (20060101);
cc/2019-30/en_head_0021.json.gz/line1730299
__label__cc
0.565105
0.434895
Justia Patents US Patent Application for INJECTION SITE TRAINING SYSTEM Patent Application (Application #20180240365) INJECTION SITE TRAINING SYSTEM An injection apparatus and training system for prophylactic, curative, therapeutic, acupuncture, or cosmetic injection training and certification. In an embodiment, an injection training system is described that includes a testing tool having a needle and a position sensor, where the position sensor is configured to obtain position information of the testing tool. The system also includes an injection apparatus configured to receive a simulated injection by the testing tool. The system includes a display device configured to receive the position information and to display position data reflective of the position information. This application is a continuation of U.S. patent application Ser. No. 14/598,614, filed Jan. 16, 2015, which claims the benefit of U.S. Provisional Application No. 61/928,915, filed on Jan. 17, 2014, U.S. Provisional Application No. 61/939,093, filed on Feb. 12, 2014, and U.S. Provisional Application No. 62/066,792, filed on Oct. 21, 2014, the entirety of which are hereby incorporated herein by reference. Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57. A variety of medical injection procedures are often performed in prophylactic, curative, therapeutic, or cosmetic treatments. Injections may be administered in various locations on the body, such as under the conjunctiva, into arteries, bone marrow, the spine, the sternum, the pleural space of the chest region, the peritoneal cavity, joint spaces, and internal organs. Injections can also be helpful in administering medication directly into anatomic locations that are generating pain. These injections may be administered intravenously (through the vein), intramuscularly (into the muscle), intradermally (beneath the skin), subcutaneously (into the fatty layer of skin), or intraperitoneally (into the body cavity). Injections can be performed on humans as well as on animals. The methods of administering injections typically vary for different procedures and may depend on the substance being injected, needle size, or area of injection. Injections are not limited to treating medical conditions, but may be expanded to treating aesthetic imperfections or restorative cosmetic procedures. Many of these procedures are performed through injections of various products into different parts of the body. The aesthetics and therapeutic industry comprises two main categories of injectable products: neuromodulators and dermal fillers. The neuromodulator industry commonly uses nerve-inhibiting products such as Botox®, Dysport®, and Xeomin®. The dermal filler industry uses products administered by providers to patients for both cosmetic and therapeutic reasons, such as, for example, Juvederm®, Restylane®, Belotero®, Sculptra®, Artefill®, and others. These providers or injectors may include plastic surgeons, facial plastic surgeons, oculoplastic surgeons, dermatologists, nurse practitioners, dentists and nurses. A problem in the administration of injections is that there is no official certification or training process. Anyone with a minimal medically-related license may inject a patient. These “injectors” may include primary care physicians, dentists, veterinarians, nurse practitioners, nurses, physician's assistants, or aesthetic spa physicians. However, the qualifications and training requirements for injectors vary by country, state, and county. For example, in most states in the United States, the only requirement to be permitted to inject patients with neuromodulators and/or fillers is to have a nursing degree or medical degree. Accordingly, there is a lack of uniformity and expertise in administering such injections. The drawbacks with this lack of uniformity in training and expertise are widespread throughout the medical industry. Doctors and practitioners often are not well-trained in administering injections of diagnostic, therapeutic, and cosmetic chemical substances. This lack of training has led to instances of chronic pain, headaches, bruising, swelling, or bleeding in patients. Current injection training options are classroom-based, with hands-on training performed on live models. The availability of models is limited. Moreover, even when available, live models are limited in the number and types of injections they may receive. The need for live models is restrictive because injectors are unable to be exposed to a wide and diverse range of situations and anatomies in which to practice. For example, it may be difficult to find live models with different skin tones or densities. This makes the training process less effective because patients have diverse anatomical features as well as varying prophylactic, curative, therapeutic, or cosmetic needs. Live models are also restrictive because injectors are unable to practice injection methods on the internal organs of a live model due to safety and health considerations. As a result of these limited training scenarios, individuals seeking treatments involving injections have a much higher risk of being treated by an inexperienced injector. This may result in low patient satisfaction with the results, or in failed procedures. In many instances, patients have experienced lumpiness from incorrect dermal filler injections. Some failed procedures may result in irreversible problems and permanent damage to a patient's body. For example, patients have experienced vision loss, direct injury to the globe of the eye, and brain infarctions where injectors have incorrectly performed dermal filler procedures. Additional examples of side effects include inflammatory granuloma, skin necrosis, endophthalmitis, injectable-related vascular compromise, cellulitis, biofilm formation, subcutaneous nodules, fibrotic nodules, and other infections. As a result of the varying qualifications and training requirements for injectors, there is currently no standard to train, educate, and certify providers on the proper and accurate process of various injection techniques. Patients seeking injections also have few resources for determining the qualifications or experience of a care practitioner. The present disclosure generally relates to an injection apparatus and training system for prophylactic, curative, therapeutic, acupuncture, or cosmetic injection training and certification. The training system eliminates the need to find live models for hands-on training sessions. The training system provides feedback on trainees and the accuracy of injection procedures performed. In an embodiment, feedback is provided in real time. The training system can be used as a measurement on how the “trainee” is doing prior to receiving actual product by the manufacturing company as a measure of qualification. The training system reduces the risks associated with inexperienced and uncertified medical personnel performing injection procedures. The training system can be used to educate, train, and certify medical personnel for injection procedures. It can also be utilized as a testing program for certifying medical personnel. The system will enable users to practice a variety of injections, ranging from on label to off label product injections. In some embodiments, the system may allow users to train for therapeutic treatments. In other embodiments, the system may allow users to train for injections into arteries, bone marrow, the spine, the sternum, the pleural space of the chest region, the peritoneal cavity, joint spaces, internal organs, or any other injection sites. The system may be used for any type of injection, including, but not limited to those involving prophylactic, curative, therapeutic, or cosmetic treatments in both humans and animals. Illustratively, by way of non-limiting example, the disclosed system may be used to simulate a cosmetic application of filling of a wrinkle with a dermal filler. In other applications, the systems disclosed herein can be used for dental application and training for dental procedures. In an aspect of the present disclosure, an injection training system is described that includes a testing tool having a needle and a position sensor, where the position sensor is configured to obtain position information of the testing tool. The system also includes an injection apparatus configured to receive a simulated injection by the testing tool. The system includes a display device configured to receive the position information and to display position data reflective of the position information, wherein the display device includes a processor and a memory device. In an embodiment of the disclosed injection training system, a method of tracking the position of a testing tool used in an injection training system is described. The method includes obtaining position information of the testing tool from one or more sensors; determining an estimate of the position of the testing tool; transmitting, to a display device, data reflective of the estimate of the position of the testing tool; and displaying, on the display device, the data reflective of the estimate of the position of the testing tool. In an embodiment, an injection training system is disclosed. The injection training system includes a testing tool having a needle, a plunger, and a marker configured to reflect electromagnetic waves. The system also includes an injection apparatus configured to receive a simulated injection by the testing tool. The injection apparatus also has a marker configured to reflect electromagnetic waves. The system includes an optical tracking system having a field of view, where the optical tracking system is positioned such that the injection apparatus is in the field of view. The optical tracking system is configured to obtain position information of the testing tool and the injection apparatus and to transmit the position information to a display device. The display device is configured to receive the position information and to display position data reflective of the position information. In one embodiment, there are three main components of the training system: (1) a training apparatus (also referred to interchangeably as an injection apparatus throughout the present disclosure) which features an anatomically accurate model of a human or human body part necessary for injection training, (2) a light detection device, such as, for example, a camera, associated with the training apparatus, and (3) a testing tool with light emitting capabilities. In an embodiment, a fourth component of the training system can include an output device that can run an application which receives communications from the training apparatus or light detection device and generates information regarding injection parameters based on the communications from the injection apparatus or light detection device. In an embodiment, the images captured by the camera are processed by a processor included either in the injection apparatus or in the light detection device before being communicated to the output device. This processing can include, for example, determining an indication of one or more injection parameters. In an embodiment, the anatomical model can include various injection conditions, such as, for example, layered skin, available in multiple tones and textures to mimic a diverse span of age, race, and skin texture. In an embodiment, the layered skin can be removable and/or replaceable. The injection apparatus can simulate any human or animal part, such as, for example, the face, head, brain, neck, back, chest, spine, torso, arms, legs, hands, feet, mouth, or any other body part or portion of the body of interest. In an embodiment, the testing tool can be, for example a syringe or hypodermic needle. In an embodiment, the injection apparatus is reusable. In an embodiment, the injection apparatus is disposable. In an embodiment a syringe for simulating injection is disclosed. The syringe can include a barrel having a portal at a distal end, and an electronics assembly having a light source at a distal end of the electronics assembly. The electronics assembly can be configured to fit inside the barrel with the light source positioned at the portal of the barrel. A needle can be attached to the barrel. The needle can have a fiber bundle extending axially through it such that the fiber bundle is in close-fitting relation with the light source. In some embodiments a testing tool for use in an injection training system includes a barrel having a fitting at a distal end of the barrel. The fitting can have a portal, and the barrel can have an opening and a finger grip at a proximal end of the barrel. A plunger can be configured to fit in the opening of the barrel to apply a force directed axially toward the distal end of the barrel. The testing tool can include an electronics assembly that has a light source at its distal end and a force sensor at its proximal end. The electronics assembly can be configured to fit inside the barrel with the light source positioned at the portal of the fitting, and the force sensor positioned near the proximal end of the barrel. The force sensor can be configured to sense the force applied by the plunger. The testing tool can include a needle assembly attached to the fitting of the barrel. The needle assembly can have a hollow needle, a fiber bundle extending axially through the hollow needle, and a hub configured to secure the hollow needle and to attach the needle assembly to the fitting of the barrel. The needle assembly can be attached to the barrel such that the fiber bundle within the hollow needle is in close-fitting relation with the light source of the electronics assembly. In an embodiment, a method of simulating an injection into a synthetic anatomical structure is disclosed. The synthetic anatomical structure can be configured to attenuate light emitted into it and to detect the attenuated light. The method can include providing a testing tool to simulate a syringe. The testing tool can be configured to emit light through a needle at a distal end of the testing tool. The method can also include inserting the needle into the synthetic anatomical structure such that the light emitted through the needle is attenuated and detected by the synthetic anatomical structure. FIG. 1 illustrates an injection training system comprising an injection apparatus, a testing tool and an output device in accordance with an embodiment of the present disclosure. FIG. 2A is a perspective view of an embodiment of an assembled testing tool. FIG. 2B is an exploded perspective view of an embodiment of a testing tool. FIG. 2C is a perspective view of an embodiment of a barrel of a testing tool. FIG. 2D is a perspective view of an embodiment of a label of a testing tool. FIG. 2E is a perspective view of an embodiment of a needle assembly of a testing tool. FIG. 2F is an exploded perspective view of an embodiment of a needle assembly of a testing tool. FIG. 2G is a top view of the distal end of an embodiment of the needle assembly of a testing tool. FIG. 3A is a simplified block diagram of an embodiment of an electronics assembly of a testing tool. FIG. 3B is a perspective view of an embodiment of an electronics assembly of a testing tool. FIG. 3C is an exploded perspective view of an embodiment of a force sensor sub-assembly of an electronics assembly of a testing tool. FIG. 4A is a perspective view of an embodiment of a testing tool docked in an embodiment of a docking station. FIG. 4B is a perspective view of an embodiment of a docking station. FIG. 4C is a perspective view of an embodiment of a docking station with its cover removed. FIG. 5 illustrates an embodiment of the injection training system. FIGS. 6A and 6B are two perspective views of an example trajectory for an injection. FIG. 7 illustrates an example embodiment of a three-dimensional (3D) injection detection sensor. FIG. 8 illustrates an example embodiment of a 3D injection detection sensor. FIG. 9 illustrates a side view of one embodiment of the injection apparatus including a 3D injection detection sensor. FIG. 10 is a process flow diagram of a method of manufacturing an anatomically shaped injection apparatus including a 3D tracking system. FIG. 11 is a process flow diagram for a method of 3D injection training. FIG. 12 illustrates an embodiment of an injection training system comprising an injection apparatus, a testing tool, and a resting cradle in which the testing tool follows a sequence of motion (A through D) from the resting cradle to an injection site of the injection apparatus. FIG. 13A illustrates a process flow diagram of a process to determine the position and orientation of a testing tool according to an embodiment of the disclosed injection training system. FIGS. 13B, 13B1, and 13B2, collectively, illustrate a process flow diagram of a process to determine the position and orientation of a testing tool according to an embodiment of the disclosed injection training system. FIG. 14A is simplified perspective view of an exemplary optical tracking system illuminating a testing tool according to an embodiment of the disclosed injection training system. FIG. 14B is simplified perspective view of an exemplary optical tracking system sensing reflected light from testing tool according to an embodiment of the disclosed injection training system. FIG. 14C illustrates a testing tool configured with multiple markers according to an embodiment of the disclosed injection training system. FIG. 14D illustrates aspects of the user interface/display device according to an embodiment of the disclosed injection training system. FIG. 15A illustrates an embodiment of an injection training system comprising an injection apparatus, a testing tool, an output device and an optical tracking system, in accordance with an embodiment of the present disclosure. FIG. 15B illustrates an embodiment of an injection training system comprising an injection apparatus, a testing tool, an output device and a plurality of optical tracking systems, in accordance with an embodiment of the present disclosure. Embodiments will now be described with reference to the accompanying figures. The following description is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or its uses. For purposes of clarity, the same reference numbers will be used in the drawings to identify similar elements. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner, simply because it is being used in conjunction with a detailed description of certain specific embodiments of the disclosure. Furthermore, embodiments of the disclosure may include several novel features, no single one of which is solely responsible for its desirable attributes or which is essential to practicing the present disclosure. It should be understood that steps within a method may be executed in different order without altering the principles of the present disclosure. FIG. 1 depicts an embodiment of an injection training system 100. An injection apparatus 105, comprising a synthetic anatomical structure, can be used for any type of injection training involved with administering diagnostic and therapeutic chemical substances. For example, injection training can be provided for epidural techniques and for intra-cardiac injections. In one embodiment, the injection apparatus 105 can anatomically model the face, neck, and head of a human or animal. Although not shown in the accompanying drawings, the injection apparatus 105 can model other injection sites including the chest, arms, mouth, back, buttocks, etc. The injection apparatus 105 may also represent any body part of a human or animal, including internal organs. In some embodiments, the injection apparatus 105 may include a simulated skull and layers of muscle and skin. The injection apparatus 105 can be positioned on a base 108 to facilitate use on flat surfaces, such as a table or desk. A testing tool 110 is also illustrated which can be used with the injection apparatus 105 and in conjunction with a camera/light detector 120 located within the injection apparatus 105. The testing tool 110 may simulate any type of equipment used in connection with an injection or minimally invasive procedure, such as a needle, catheter or cannula. As described in further detail below, the camera/light detector 120 can capture visual indications of the user's injection using the testing tool 110. The visual indications provide an operator or user with information regarding the location, depth, pressure, or angle of the injection. In an embodiment, the testing tool 110 contains a light source that emits light through the needle portion of the testing tool 110 which is used to aid in obtaining the visual indications detectable by a camera/light detector 120. The light source can emit visible light. In an embodiment, a gradient of white light is emitted through the needle portion of the testing tool. Other colors of visible light can also be used, such as green, blue, red, yellow or any combination of those colors. In an alternative embodiment, the light source may emit light along a spectrum of visible or non-visible light, such as fluorescent, ultraviolet, or infrared light. In some embodiments, the light emitted from the light source is attenuated differently depending on which layer of simulated skin, muscle, or tissue the injection apparatus 105 is penetrated. Different colors, directions, graph lines, visual patterns, polarization, fluorescence, or intensities of light can be captured by the camera/light detector 120 as the testing tool 110 is inserted through the different layers of material surrounding the injection apparatus 105. The resulting light detected by the camera/light detector 120 can be used to determine the location of the injection, the pressure exerted by the user, the angle of injection, and/or the depth of the injection. This information can be detected, for example by a camera/light detector 120, and communicated to a user interface/display device 140 for training, testing, and/or certification purposes. In some embodiments, information used to determine the location of the injection, the pressure exerted by the user, the angle of injection, and/or the depth of the injection can be collected by the testing tool 110 and communicated to a user interface/display device 140 and/or a camera/light detector 120 for training, testing and certification purposes. The camera/light detector 120 within the simulated skull of the injection apparatus 105 captures the attenuated light emitted by the testing tool 110, simulating an injection, through video recording and/or photographic images. The camera/light detector 120 can include a processor and can communicate output from the camera/light detector 120 to a user interface/display device 140. The information gathered from the camera/light detector 120 and testing tool 110 may be communicated to a user interface/display device 140 for data collection, testing or certification purposes. Output from the camera/light detector 120 can be raw or processed video or images obtained from the camera/light detector 120. The processor of the camera/light detector 120 can include software configured to interpret the visual indications for testing purposes or can merely pass images to the user interface/display device 140 for further processing. In an embodiment, the user interface/display device 140 can also communicate instructions to the camera/light detector 120 and/or to the testing tool 110. Attention is now directed to embodiments of the testing tool 110. Although disclosed with reference to particular embodiments of the testing tool 110, an artisan will recognize from the disclosure herein that there is a large number and wide variety of embodiments and configurations that may be used to perform the functions of a testing tool 110 as described herein. FIGS. 2A and 2B illustrate (in assembled and exploded views, respectively) an embodiment of the testing tool 110 adapted for use to train individuals to inject materials with a syringe. In an embodiment the testing tool 110 includes a plunger 210, a barrel 220, a needle assembly 230, and an electronics assembly 240. Also illustrated are fasteners 221, such as screws, to secure portions of the electronics assembly 240 to the barrel 220. For purposes of this description, the end of the test tool 110 toward the needle assembly 230 is referred to as the “distal end,” and motion or direction toward the distal end is described as being “distal.” The end of the test tool 110 longitudinally opposite the distal end is referred to as “the proximal end,” and motion or direction toward the proximal end is described as being “proximal.” The plunger 210 can be manufactured by using many types of materials including polypropylene, glass, and other materials known to skilled artisans. The plunger 210 includes a top portion 212 at the proximal end of the plunger 210. The plunger 210 also includes a shaft 214 which, in an embodiment, is x-shaped. In some embodiments the plunger shaft 214 can be cylindrical or any other shape suitable to perform the function of a plunger 210. In some embodiments, the plunger 210 is collapsible to simulate the process of injecting material into a patient. In some embodiments the plunger 210 is configured to house the electronics assembly 240. In some embodiments the plunger 210 is collapsible and configured to measure the plunger's 210 motion of contraction to determine a volume of material that would have been injected under the simulated circumstances and conditions of use of the testing tool 110. The collapsible plunger 210 can be reset by pulling it back to its original, un-collapsed (or extended) position. In some embodiments data reflecting the position of the plunger 210 is collected and communicated to, for example, the user interface/display device 140 and/or to the camera/light detector 120. In an embodiment the testing tool 110 includes a hydraulic and/or a friction-based device, acting against the plunger 210, to simulate the force of resistance that a liquid material with certain properties of viscosity, would exert against the plunger 210 as it is injected into a patient. At the distal end of the plunger 210 is a seal 216, which is made of rubber in an embodiment. A skilled artisan will appreciate that in some embodiments the plunger seal 216 may be made from any material suitable for creating a seal between the plunger 210 and the inside walls of the barrel 220, such as various types of elastomers and/or polymers. In some embodiments the plunger 210 lacks a seal 216 because the testing tool 110 is not used to deliver liquid, chemical substances, thereby lacking a need to form a seal. FIG. 2C is a perspective view of an embodiment of a barrel 220 of a testing tool 110. The barrel 220 can be made from many types of materials including polypropylene, glass, and other materials known to skilled artisans. The barrel 220 includes a grip 222 and an opening 223 at the barrel's proximal end. The grip 222 provides finger support for reciprocation of the plunger 210 relative to the barrel 220 during use for training. At the distal end of the barrel 220 is a threaded portion 224 configured to receive a fitting 226. The fitting has a portal 225 through which light passes from a light source (on the electronics assembly 240) to a fiber bundle housed within a hollow needle (in the needle assembly 230). In some embodiments the fitting 226 can be a Luer fitting, a standardized set of fittings used to make leak-free mechanical connections between a male-taper fitting and a mating female part on medical and laboratory instruments, including hypodermic syringe tips and needles. In some embodiments the fitting 226 is not tapered. Advantageously, in some embodiments, the fitting 226 can accommodate numerous configurations of needle assemblies 230 corresponding to various injection indications and applications. In some embodiments a customized fitting 226 includes a thread with no taper component to facilitate intimate contact between a light source and a fiber bundle that transmits the emitted light into the injection apparatus 105. In an embodiment the barrel 220 includes bores 228 configured to receive connector pins attached to the electronics assembly 240 to enable charging of a battery when, for example, the testing tool 110 is housed in a docking station. The barrel 220 also includes holes 229 through which fasteners, such as screws, can be used to secure the electronics assembly 240 to the barrel 220. FIG. 2D is a perspective view of an embodiment of a label 250 of a testing tool 110. In an embodiment, the label 250 is configured to fit inside the barrel 220 in close-fitting relation with an inner wall of the barrel 220. In an embodiment the label 250 is configured to fit outside the barrel 220 in close-fitting relation with an outer wall of the barrel 220. The label 250 can be configured to present any type of information including, among other things, branding and/or instructional information. FIGS. 2E-2F are perspective views (assembled and exploded, respectively) of an embodiment of a needle assembly 230 of a testing tool 110, including a hollow needle 232, a needle hub 234, an adapter 236, and a fiber bundle 238 positioned centrally along the longitudinal axis of the needle assembly 230 and configured to transmit light at the distal end of the testing tool 110. In some embodiments a needle hub 234 is configured to connect directly to the fitting 226 of the barrel 220, thereby eliminating the need for an adapter 236. The fiber bundle 238 is housed within the hollow needle 232. In an embodiment the hollow needle 232 is made from hypodermic tubing. A wide variety of hollow needles 232 used for, among other things, hypodermic applications, have outer diameters described by gauge numbers ranging from 7 to 34. Hollow needles 232 within this gauge range can be used in various embodiments of the disclosed needle assembly 230. Smaller gauge numbers indicate larger outer diameters. The inner diameters of such hollow needles 232 depend on both gauge and wall thickness. Thin-wall needles have identical outer diameters, but larger inner diameters, for a given gauge. Thin-wall needles can also be used in various embodiments of the needle assembly 230. In an embodiment the hollow needle 232 is made of stainless steel and has a gauge size of 23RW. A skilled artisan will appreciate that the hollow needle 232 can be of many different gauge sizes without departing from the scope of the disclosure herein. Free space between the fiber bundle 238 and the inner wall of the hollow needle 232 can be potted with optical epoxy. The proximal and distal ends of the hollow needle 232, having the fiber bundle 238 secured inside it, can be polished flat. The hollow needle 232 can be epoxy-bonded to the needle hub 234, which attaches to the fitting 226 on the barrel 220. FIG. 2G is a top view of the distal end of the needle assembly 230 illustrating the fiber bundle 238 housed and secured with optical epoxy within the hollow needle 232. FIG. 3A is a simplified block diagram of an embodiment of the electronics assembly 240 of the testing tool 110. Functionally, among other things, the electronics assembly 240 emits light from a light source 320, measures the electronic assembly's 240 physical position and/or orientation with a position sensor 308, and measures force applied to the plunger 210 by a force sensor 312. The electronics assembly 240 communicates the measured position information and the measured force information to, for example, an external user interface/display device 140, and/or to a camera/light detector 120, by way of a communications protocol. In some embodiments the electronics assembly 240 communicates data by way of a USB port 322 using a cable that has a minimal diameter and is highly compliant. In some embodiments the electronics assembly 240 communicates data by way of a radio 310 employing, for example, a Bluetooth wireless communications protocol. As illustrated in FIG. 3A, an embodiment of the electronics assembly 240 includes a battery 302, a power management controller 304, a voltage regulator 306, a position sensor 308, a radio 310, a force sensor 312, a data acquisition system 314, one or more processors 316, a light source driver 318, a light source 320 and one or more power/communication ports 322. In some embodiments the battery 302 is rechargeable, and the power management controller 304 is configured to communicate with an external battery-charging power/communication port 322, such as, for example, a universal serial bus (USB) port. The battery 302 can supply power to the components and circuitry of the electronics assembly 240. In an embodiment the battery 302 is an ultrathin, rechargeable, lithium polymer cell. A skilled artisan will appreciate that numerous other batteries can be used in the disclosed electronics assembly 240. According to an embodiment, the electronics assembly 240 comprises a battery 302 and a light source 320, where the electronics assembly 240 is configured to emit light through the hollow needle 232 to achieve basic functionality of the disclosed testing tool 110. In an embodiment, the electronics assembly 240 comprises a light source 320 and a port 322 through which an external power source may be electrically connected to energize the light source 320 to achieve basic functionality of the testing tool 110. One skilled in the art will appreciate that various functional capabilities described in connection with embodiments of the electronics assembly 240 can be implemented in numerous ways. To illustrate this point, illustrative components, blocks, modules, and circuits have been described generally in terms of their functionality. The manner by which such functionality is implemented can depend upon the particular application and design constraints imposed on the overall system. The described functionality can be implemented in varying ways for each particular application, but such embodiment decisions should not be interpreted as causing a departure from the scope of the present disclosure. To operate effectively in the injection training system 100, the light source 320 must be sensed by the camera/light detector 120. In an embodiment the camera/light detector 120 is configured to sense visible light and infrared light. In an embodiment the light source is a light emitting diode (LED) that emits low, infrared light at a wavelength of 810 nanometers (nm). In an embodiment the light source 320 is a laser that emits low infrared light at a wavelength of 850 nm. In an embodiment the light source 320 has a narrow emission angle of twenty degrees or less. In an embodiment, the light source 320 is an LED that has its dome removed and is polished flat to facilitate intimate contact with the proximal end of the fiber bundle 238 and the light source 320 when the testing tool 110 is assembled. In some embodiments lenses, reflectors, and/or fiber optic tapers are coupled to the light source 320 to focus and/or to intensify the emitted light in the direction of the fiber bundle 238. In some embodiments the intensity of the light emitted by the testing tool 110 is proportional to the amount of pressure applied to a plunger 210 of the testing tool 110, thereby simulating a process by which liquid material is injected through the testing tool 110. A skilled artisan will appreciate that many other light sources 320 and light ranges of various wavelengths can be used in the disclosed training system 100 without departing from the scope of the disclosure herein. In an embodiment the force sensor 312 is configured to sense up to twenty pounds (20 lbs.) of force with a 2 percent accuracy factor. In an embodiment the position sensor 308 is a three-axis digital gyroscope with angle resolution of two degrees and with a sensor drift adjustment capability (pitch, yaw and roll) of one degree. A skilled artisan will appreciate that numerous other position sensors 308 and force sensors 312 can be used in the disclosed electronics assembly 240 without departing from the scope of the disclosure herein. In an embodiment the electronics assembly includes a power conditioning component, such as a voltage regulator 306, to enable operation of the position sensor 308 and the force sensor 312. In an embodiment the position sensor 308 senses the position of the testing tool 110 in three-dimensional space, and the sensed position information is communicated to the user interface/display device 140 and/or to the camera/light detector 120. FIG. 3B is a perspective view of an embodiment of the electronics assembly 240. Advantageously, the electronics assembly 240 is configured to fit within the barrel 220 of the testing tool 110. A rectangular circuit board 324 comprises a substrate onto which several components of the assembly 240 are attached. In an embodiment the electronics assembly includes the battery 302, the power management controller 304, the voltage regulator 306, the light source driver 318 and the light source 320. When the electronics assembly 240 is configured in the testing tool 110, it is positioned such that the light source 320 is located at the distal end of the testing tool 110, within the fitting 226 so as to make intimate contact with the proximal end of the fiber bundle 238, which is secured to the needle assembly 230. In an embodiment the electronics assembly 240 also includes a force sensor sub-assembly 360 illustrated in FIG. 3B and in FIG. 3C, in assembled and exploded views, respectively. The force sensor sub-assembly 360 has a circular printed circuit board 326 comprising a substrate to which several components of the force sensor sub-assembly 360 are attached, including a force sensor 312, backstops 328, and connector pins 330. The backstops 328 provide structural support for the force sensor sub-assembly 360 and serve as a mechanism by which to secure the force sensor sub-assembly 360 to the barrel 220. The circular printed circuit board 326 is attached to the two backstops 328 with fasteners 329. The connector pins 330 are used to couple to an external power source to charge the battery 302. In an embodiment, the connector pins 330 are spring-loaded contacts that are soldered to the circular printed circuit board 326 and configured to fit through the bores 228 in the barrel 220. By protruding through the bores 228 the connector pins 330 are able to make electrical connection with an external power source to enable charging of the battery 302. When positioned within the testing tool 110, the force sensor sub-assembly 360 is oriented substantially perpendicular to the rectangular printed circuit board 324 such that the force sensor 312 is configured to sense axial force applied in the distal direction by the plunger 210. The force sensor sub-assembly 360 is secured to the barrel 220 by fasteners 221 (shown in FIG. 2B), such as flat head screws, that are inserted through the holes 229 of the barrel 220 and secured into threaded screw holes 362 located centrally on the backstops 328. In this manner the force sensor sub-assembly 360 resists being deflected in response to force applied to the force sensor 312 by the plunger 210. In an embodiment the circular printed circuit board 326 is electrically coupled to the proximal end of the rectangular printed circuit board 324 to enable electrical communication between the force sensor 312 and the processor 316, and between the connector pins 330 and the power management controller 304. An artisan will recognize from the disclosure herein that the functionality of the electronics assembly 240 may be accomplished in many different ways, using many different electronic components and organized in a large number of ways without departing from the scope of the disclosure herein. Referring back to FIGS. 2A-2B, assembly of the testing tool 110, for some embodiments, is accomplished by securing the needle assembly 230 to the fitting 226, and by securing the electronics assembly 240 into the barrel 220. Spring-loaded connector pins 330 retract inward to permit the electronics assembly 240 to move to the distal end of the inside of the barrel 220, such that the light source 320 is in close intimate relation with the proximal end of the fiber bundle 238 of the needle assembly 230. The electronics assembly 240 may be rotated axially such that the spring-loaded connector pins 330 are aligned with bore holes 228, at which point the spring-loaded connector pins will expand to lock into position. Fasteners 221 are then used to secure the electronics assembly 240 to the barrel 220. The plunger 210 is inserted into the proximal end of the barrel 220. In some embodiments the plunger 210 is configured to move distally through the barrel 220 when force is applied to the plunger 210, thereby simulating the plunger motion associated with injecting material into a patient. In an embodiment, the plunger shaft 214 is cylindrical, having an outer diameter slightly less than the inner diameter of the barrel 220. As the cylindrical plunger shaft 214 moves through the barrel 220 in the distal direction, the plunger shaft 214 slides around and envelops the electronics assembly 240. In an embodiment, a resistance device offers a resistive force in response to the force applied to the plunger 210, corresponding to a resistive force experienced when injecting liquid materials into a patient. In an embodiment the resistive device is a friction-based device. In an embodiment the resistive device is a fluid-based device. In an embodiment the resistive device includes a spring configured to apply a resistive force to the plunger 210. One skilled in the art will readily appreciate that there are many ways by which to achieve the functionality of the resistive device. In an embodiment, the force applied by the plunger 210 and the force applied by the resistive device are sensed and communicated to a user interface/display device 140 and/or to a camera/light detector 120. In some embodiments the plunger shaft 214 is configured to collapse telescopically to simulate plunger motion associated with injecting material into a patient. In some embodiments, the collapsible plunger shaft 214 is configured to sense positional displacement of the plunger shaft 214 and to communicate the plunger shaft 214 displacement coordinates to a user interface/display device 140 and/or to a camera/light detector 120. In some embodiments measurements of the position of a movable, collapsible or telescoping plunger 210 are communicated to a user interface/display device 140 and/or to a camera/light detector 120 and used to determine whether proper doses are being delivered. In some embodiments, the electronics assembly 240 is positioned within the plunger shaft 214, and is configured to move distally and proximally through the barrel 220, along with the plunger 210. Placing the electronics assembly 240 in a hollowed shaft 214 of the plunger 210 makes the barrel 220 available to hold a therapeutic agent that can be injected during the training into the injection apparatus 105. The position sensor 308 is configured to obtain position and orientation information of the testing tool 110 and of the plunger 210, and to wirelessly transmit the information to the user interface/display device 140. In an embodiment, the force sensor sub-assembly 360 can be positioned within the shaft 214 of the plunger 210 to measure the resistive force of the therapeutic agent in the barrel 220, as the injection is applied. The measured force information can be wirelessly transmitted to the user interface/display device 140. Illustratively, in such an embodiment the testing tool 110 operates in a manner similar to a syringe in that the testing tool 110 is configured to deliver a therapeutic agent through the needle 232 into the injection apparatus 105. In some embodiments the electronics assembly 240 is positioned within the plunger shaft 214 and is configured to move distally and proximally through the barrel 220, along with the plunger 210. The light source 320 is positioned at the distal end of the barrel 220, and a flexible connector connects the light source 320 to the electronics assembly 240. In some embodiments the flexible connector connecting the light source 320 to the electronics assembly is extendable and retractable. Accordingly, the plunger 210 is able to move axially into and out of the barrel 220, while the light source is configured to emit light through the tip 233 of the hollow needle 232. FIG. 4A illustrates an embodiment of a testing tool 110 docked in a docking station 400. The docking station 400 includes a dock cover 402, a USB port 404, and two indicator lights 406. The docking station 400 is contoured to accommodate the testing tool 110 such that the connector pins 330 of the testing tool 110 are in contact with contact pins 408 to facilitate charging of the battery 302. FIG. 4B provides a view of a contact pin 408 of the docking station 400. FIG. 4C illustrates the docking station 400 with its cover 402 removed revealing a dock circuit board 410 electrically coupled to the USB port 404 and to the indicator lights 406. The dock circuit board 410 is also electrically coupled to contact pins 408 such that when a connection is made from, for example, a standard power outlet to the USB port 404, the contact pins are configured to support charging of the battery 302 of the testing tool 110 when the testing tool is docked in the docking station 400. Standoff elements 412 are employed to provide appropriate spacing within the structure of the docking station 400. In some embodiments of the injection training system 100, an injection training apparatus 105 or method can use one or more three-dimensional (3D) position sensors to determine a position of a testing tool 110, such as a syringe and/or needle, in an artificial patient injection site (such as, for example, an artificial face). One or more 3D position sensors can also be used for training caregivers on performing injections where accurate positioning is important, such as in facial injections (e.g., Botox®), spinal injections, and/or the additional injections described above. By integrating one or more 3D sensors, the injection training apparatus and method may provide enhanced accuracy when tracking the trainee's injection technique. Increased training accuracy can facilitate increased detail on the feedback provided to the trainee. The features discussed below with reference to FIGS. 5-11 may be included, in whole or part, with the training systems, methods, and devices described herein. FIG. 5 illustrates an embodiment of the injection apparatus 105, testing tool 110 and user interface/display device 140. The injection apparatus 105 shown forms a head bust with realistic look and feel of human flesh. The external surface of the injection apparatus 105 may be a substantially synthetic or simulated skin. The synthetic or simulated skin can be an opaque rubber or other material which simulates skin and facial features of real patients. Underlying the skin may be a layer of substantially clear rubber (and/or any suitable elastomer) which simulates the viscosity, elasticity, and feel of skin, muscle, nerve, and bone tissue of a patient. The opaque skin and clear underlay may be capable of being pierced by a needle. It should be noted that the injection apparatus 105 need not include colored underlying skin to attenuate light. The injection apparatus 105 is hollow and includes, within the cavity, a three-dimensional (3D) sensor 502. The 3D sensor 502 may include a camera, an array of light detectors or other sensor(s) capable of detecting a location of an object in three dimensions. The 3D sensor 502 is configured to detect a position of a needle and/or to view the interior surface of the injection apparatus 105. A field of view 504 is established in front of the 3D sensor 502. The field of view 504 represents an area in which the 3D sensor 502 may detect light. A testing tool 110 is also shown. The testing tool 110 may be implemented as a syringe equipped with a light emitting needle, for example, as described in greater detail above. The light emitted by the testing tool 110 may be detected by the 3D sensor 502. As shown in FIG. 5, the 3D sensor 502 and the testing tool 110 are coupled with a signal processing and display interface 555 via cables 560 and 570. The signal processing and display interface 555 can include one or more processors configured to receive and process information, provided from the 3D sensor 502 and/or from the testing tool 110 that corresponds to the position of the testing tool 110 relative to the injection apparatus 105. Illustratively, the processing and display interface 555 processes the received information from the 3D sensor 502 and from the testing tool 110 to determine the testing tool's 110 position relative to the injection apparatus 105. Although illustrated in FIG. 5 as being coupled by wires, coupling between the 3D sensor 502, the testing tool 110, and the user interface/display 140 can be accomplished via wired, wireless, or a combination of wired and wireless configurations. Moreover, the processing and interface 555 can be incorporated into the user interface/display 140. The method of coupling the 3D sensor 502 need not be identical to the method of coupling used for the testing tool 110. In use, as illustrated in FIG. 5, a trainee punctures the face of the injection apparatus 105 with the testing tool 110 which is emitting light from a tip 233 of the hollow needle 232. When the tip 233 passes through the opaque skin layer of the injection apparatus 105, the 3D sensor 502 is configured to detect the light emitted from the tip 233 and to determine the three-dimensional position, in space, of the tip 233. The three-dimensional position information is transmitted to the signal processing and display interface 555, which is configured to communicate the three-dimensional position information to the user interface/display device 140. The user interface/display device 140 integrates the communicated position information into a digital model of the head bust injection apparatus 105. The user interface/display device 140 may be configured to present a visual representation of the position of the needle tip 233 relative to the injection site on the injection apparatus 105. The user interface/display device 140 allows the trainee to evaluate the actual needle position, as represented on the user interface/display device 140, in comparison to the ideal position, which is also represented on the user interface/display device 140. The user interface/display device 140, shown in FIG. 5, is coupled with the signal processing and display interface 555 by a cable 580. The coupling may be via wired, wireless, or a combination of wired and wireless configurations. The three-dimensional position information relative to the 3D sensor 502 is mapped in software to a graphical representation of the injection site on the user interface/display device 140. This mapping is performed by determining accurate three-dimensional coordinates corresponding to the position of the injection apparatus 105 in the world. The position of the 3D sensor 502 relative to the injection apparatus 105 is also determined with a high degree of precision. This precision allows a very accurate mapping of the detected three-dimensional position information of the hollow needle 232 and its tip 233 to be accurately detected by the 3D sensor 502 and accurately mapped in software to recreate the position of the needle 232 and the needle tip 233 of the testing tool 110. This information is then used to determine both the accuracy of the injection relative to a predetermined injection site accuracy goal, as well as to provide a graphical illustration of the injection, again relative to the injection site goal. This mapping and display can be provided substantially in real time so that a user can adjust the trajectory of injection during the training. FIGS. 6A and 6B illustrate two views of a trajectory for an injection. FIG. 6A illustrates a view from the perspective of the 3D sensor 502, positioned inside the injection apparatus 105 and directed at the inner surface of the injection apparatus 105. To orient the reader, an eye 602 and a nose 604 have been labeled. An injection starting point 610 is detected by the 3D sensor 502. As the needle tip 233 proceeds into the injection apparatus 105, the changing positions of the light emitted from the needle tip 233 are measured by the 3D sensor 502. In some implementations, the measurement may be a video capture of the injection. In some implementations, the measurement may be a sampled capture at, for example, predetermined intervals. A trajectory path 630, from the starting point 610 to an ending point 620, is thus obtained. As shown in FIG. 6A, the trajectory path 630 takes the form of an irregular injection path, which may, in some circumstances, indicate the need for additional training. The trajectory path 630 may be presented via the user interface/display device 140. The presentation may include providing a line tracking the injection path. The presentation may include providing an animated depiction of the injection. In some implementations, the presentation may be augmented with additional information such as identifying and showing which muscles, skin, body parts, etc. the injection is coming in contact with or is penetrating. The augmentation of the presentation may retrieve one or more models of the desired physiological information from a data store. The models include three-dimensional information indicating the location(s) of certain anatomical or physiological features. The feature information, along with the three-dimensional injection location information, is mapped onto the presentation of the injection apparatus 105. Because three-dimensions of information are being obtained, multiple views of the injection trajectory may be provided. FIG. 6B provides a second view of the injection trajectory shown in FIG. 6A. FIG. 6B illustrates a view taken from an overhead perspective of a horizontal cross-section of the injection apparatus 105. The cross-section is taken at a point on the injection apparatus 105 which allows the viewer to see a horizontal injection trajectory path 660 of the needle. As in FIG. 6A, to orient the reader, the eye 602 and the nose 604 have been labeled. The horizontal injection trajectory path 660 begins at the starting point 610 and ends at the ending point 620. However, because the perspective has changed, the shape of the path 660 is different than that shown in FIG. 6A. This provides another view of the injection result. It will be understood that the presentation model may be arbitrarily rotated, and a representation of the trajectory path for the representational model, as rotated, may be generated. The rotation may be provided to the system as a display point of view identifying the location in space from which to view the trajectory path. Because the injection apparatus digital model is combined with the three-dimensional injection information and, in some instances, anatomical or physiological information, the injection training may provide a wide variety of views, depending on the technique needed for the injection. The views may be provided as animated depictions, such as video or reconstructed animations. For example, in some embodiments, historical trajectories for the same type of injection can be shown in a 3D overlap view which illustrates historical injection trajectories to a current injection trajectory. In this way, a care provider can visually compare trajectory information for improvement progression analysis and general accuracy analysis. Different historical trajectories can be shown in different colors, shades, and/or highlights in order to illustrate age and/or accuracy of the trajectories. The aspects shown in FIG. 5 allow a trainee to adjust his or her technique and monitor his or her progress toward the ideal injection technique. For example, the user interface/display device 140 may provide a view selector (not shown) to allow the trainee to see the injection site from a variety of views, such as rotated, zoomed in, zoomed out, cross-sectional, time-lapsed, and the like, both in real time and after the injection has occurred. As shown in FIG. 5, a cross-sectional view is displayed on the user interface/display device 140 whereby the trainee can see how far through an opaque skin layer 590 into a clear material layer 592 the testing tool has passed. In some implementations, the three-dimensional position information received from the 3D sensor 502 may be converted before integration into the digital model of the injection apparatus 105. In such implementations, the received three-dimensional position information may be calibrated, adjusted, or otherwise converted such that the position information of the testing tool 110 may be correlated with a position on the digital model of the injection apparatus 105. As discussed, one or more sensors may be provided within the training apparatus 105 which provide three-dimensional position information for the testing tool 110. FIG. 7 illustrates an example embodiment of a 3D sensor 502. A dimensional legend 799 is provided to indicate the three axes (e.g., X, Y and Z) of detection. This dimensional legend 799 is logical and may not physically be included in an embodiment of the injection training systems described. The names attributed to each axis may differ, but each axis should represent one unique dimension. The 3D sensor 502 is shown receiving light from a testing tool 110 at a first position 702, and then at a second position 704. These positions are not simultaneous, but rather represent the sequential movement of the testing tool 110 over time. The light emitted from the testing tool 110 is received by the 3D sensor 502. The light is emitted from the tip 233 of the testing tool 110 and disperses on its way to the 3D sensor 502. As shown in FIG. 7, a first area of light 710 is generated when the testing tool is located at the first position 702. A second area of light 712 is generated at a second time when the testing tool 110 is located at the second position 704. The 3D sensor 502 may be configured to measure one or more characteristics of the received light and generate information corresponding to the three-dimensional position of the testing tool 110 based on the characteristics detected. Illustratively, the characteristics may include angle, intensity, brightness, color, dispersion, and/or duration of the light. In one implementation, the 3D sensor 502 may include an array of light sensors. As light is emitted from the needle tip 233, one or more of the sensors in the array may receive light. By aggregating the information about which sensors received light and characteristics of the light received at each sensor, three-dimensional information about the position of the light source may be determined. Some 3D sensors 502 may be housed in a recess and, based on the light pattern cast on the sensor, determine the location of the light source. In generating the 3D location information, the 3D sensor 502 may also obtain calibration information for the needle tip 233 of the testing tool 110 to account for variability, such as in manufacturing, wear-and-tear, and power. Further calibration information may be used to specify the field of view 504 for the 3D sensor 502. The calibration information may be received, for example, through an initialization sequence whereby the testing tool 110 is placed at a predetermined location on the injection apparatus. Because the 3D sensor 502 knows the light source and its particular location vis-à-vis the light source, the 3D sensor 502 can generate accurate and, in some implementations, real-time 3D location information for the testing tool 110. FIG. 8 illustrates another embodiment of a 3D sensor 502. It may be desirable to implement the 3D sensor 502 as a stereoscopic sensor pair. A dimensional legend 899 is provided indicate the three axes (e.g., X, Y and Z) of detection. This dimensional legend 899 is logical and may not physically be included in an embodiment of the injection training systems described. The names attributed to each axis may differ, but each axis should represent one unique dimension. The 3D sensor pair includes a first 3D sensor 502A and a second 3D sensor 502B. The first 3D sensor 502A and the second 3D sensor 502B are configured to receive, at substantially the same time, light from a testing tool 110. The testing tool 110 may be located at different positions at different times. FIG. 8 shows a first position 810 at a first time, and a second position 812 at a second time, for the testing tool 110. Each 3D sensor 502A and 502B is configured to measure one or more characteristics of the light transmitted from the testing tool's 110 position and to generate three-dimensional location information corresponding to the position of the testing tool 110, based in the detected characteristics. The characteristics may include angle, intensity, dispersion, brightness, color, or duration of the sensed light. Combining the characteristic data received from the first 3D sensor 502A and the second 3D sensor 502B, three-dimensional information for the testing tool 110 may be generated. The combination may be performed by one of the 3D sensors 502A and 502B, or by the signal processing and display interface 555. In an embodiment the combination can be performed in the user interface/display device 140. In generating the 3D location information, the generation of the three-dimensional information may also include obtaining calibration information for the needle tip 233 to account for variability such as in manufacturing, wear-and-tear, and power. The calibration information may be received, for example, through an initialization sequence whereby the testing tool 110 is placed at a predetermined location on the injection apparatus 105. FIG. 9 depicts a side view of one embodiment of the injection apparatus 105, including a 3D sensor 502. The injection apparatus 105 is formed as a human head. A testing tool 110 is shown inserted into the injection apparatus 105. The testing tool 110 may be implemented as described above, such as in reference to FIGS. 2A-G, 3A-C and 4A-C. To minimize diffraction of the light emitted from the testing tool 110, a surface of clear elastomer 910 may be made substantially perpendicular to the direction of light travel. Accordingly, in an embodiment the inner surface of the clear elastomer 910 is formed as a spherical surface with the center facing a 3D sensor 502. The 3D sensor 502 may be implemented as described above such as in reference to FIGS. 5, 7 and 8. The 3D sensor 502 is configured to detect light emitted by the testing tool 110 within a field of view 504. Rather than utilize a light emitting testing tool 110 in combination with a single two-dimensional (2D) camera that detects a two-dimensional position of the light emitting needle tip 233, the injection training system 100 may include one or more 3D sensors 502 and/or tracking equipment. With a single 2D camera, a position with respect to a third dimension may be determined, for example, by tinting the clear elastomer surface 910, causing a color of the light to change as the needle tip 233 transitions through the tinted layer. Illustratively, the color may trend toward white light as the needle tip 233 moves closer to the inner surface of the clear elastomer surface 910. It may be desirable to avoid tinting the clear elastomer surface 910 and allow the use of 3D tracking equipment, such as 3D sensors 502 (which may be cameras or other types of sensors), examples of which are shown in FIGS. 7 and 8 above. Further examples of 3D tracking equipment include equipment sold by Personal Space Technologies B.V. (available at http://ps-tech.com/). An additional example of 3D tracking equipment is described in a Centre Suisse d'Electronique et Microtechnique SA (CSEM) Scientific & Technical Report entitled “spaceCoder: a Nanometric 3D Position Sensing Device,” which is incorporated by reference herein in its entirety. As the testing tool 110 penetrates an opaque skin layer 590 and enters the internal clear elastomer layer 592, the 3D sensor 502 detects characteristics of the light which can be used to generate a three-dimensional location of the testing tool 110. For example, it may be desirable to track a desired range 912 of needle penetration. In some implementations, the depth information is displayed on a display, such as the user interface/display device 140, as the testing tool 110 is inserted. This allows a trainee to visualize the location of the injection in near real-time. The signal processing and display interface 555 may provide the location information to facilitate such displays. In some implementations, the feedback may be provided in audio form such as a beep or an alert. FIG. 10 shows a process flow diagram of a method of manufacturing an anatomically shaped injection apparatus 105 including a 3D sensor 502, such as that shown in FIG. 9. The method includes, at block 1002, forming an at least partially hollow base configured to provide structural support for a target injection test area. The method includes, at block 1004, coating at least a portion of the base with a clear layer of elastomer. The method also includes, at block 1006, coating at least a portion of the clear layer with an opaque layer. The base, clear layer, and opaque layer form an anatomical shape such as a skull. The method further includes, at block 1008, affixing a three-dimensional (3D) tracking system (which can include one or more 3D sensors 502) within the hollowed portion of the base, wherein the three-dimensional tracking system provides a field of view of the clear layer covering the target injection test area. The three-dimensional tracking system may be a 3D camera such as that shown in FIG. 7 or a stereoscopic camera pair such as those shown in FIG. 8. In some implementations, the method may also include coupling the 3D tracking system with a location processor configured to provide location information for a light source inserted into the clear layer. The location information identifies a three-dimensional location of the light source relative to the injection apparatus 105. The location processor may be implemented in the signal processing and display interface 555 shown in FIG. 5. FIG. 11 illustrates a process flow diagram for a method of three-dimensional (3D) injection training. The method may be performed in whole or in part by one or more of the devices described herein such as the training apparatuses described above. The method includes, at block 1102, calibrating at least one of a light source and a three-dimensional tracking system. The light source may be a light emitter located at the tip 233 of a testing tool 110. The three-dimensional tracking system may include a 3D camera, a stereoscopic camera pair, or other sensor configured to provide three-dimensional location information for the light source. The method also includes, at block 1104, detecting, by the three-dimensional tracking system, a characteristic of light emitted from the light source for an injection. The characteristic may include intensity, angle, dispersion, brightness, color, or duration of the light. In some implementations, an array of sensors may be used to detect light. In such implementations, the characteristic may include which sensors in the array of sensors received light. The method further includes, at block 1106, generating three-dimensional location information of the light source based on the detected characteristics and said calibrating. In some embodiments, the testing tool 110 is configured to determine its position and orientation in three-dimensional space relative to the injection apparatus 105. The testing tool 110 is also configured to communicate its position and orientation information to other components of the injection training system 100, such as, for example, the user interface/display device 140. The user interface/display device 140 can display, in near real time, the testing tool's 110 position relative to the injection apparatus 105, as injection training is performed. The testing tool 110 can also communicate its position and orientation information to the 3D sensor 502 and/or to the signal processing and display interface 555. In an embodiment, the position sensor 308 collects nine dimensions of sensed information to determine the 3D position and orientation of the testing tool 110 in space with adequate accuracy. This is because processing sensed three-dimensional angular velocity provided by a 3D gyroscope leads to an accumulating error in the calculated position and orientation of the testing tool 110. To compensate for this error accumulation, measurements from a 3D accelerometer and from a 3D magnetometer can be used. The 3D accelerometer measures the earth's gravitational field, and the 3D magnetometer measures the earth's magnetic field. Together, the sensed information from the 3D accelerometer and 3D magnetometer can provide an absolute reference of orientation that can be used to compensate for the progressively accumulating error of the sensed and processed angular velocity data provided by the 3D gyroscope. A method for sensor fusion includes processing the measured nine dimensions of sensed information (from the 3D gyroscope, the 3D accelerometer, and the 3D magnetometer) to determine a single estimate of position and orientation of the testing tool 110, in three-dimensional world coordinates. In an embodiment, the position sensor 308 of the testing tool 110 comprises a inertial measurement unit (IMU) that includes one or more accelerometers, one or more gyroscopes, one or more magnetometers to provide, in near real time, information describing the 3D position and orientation of the testing tool 110. In some embodiments, the position sensor 308 can also include an embedded processor that handles, among other things, signal sampling, buffering, sensor calibration, and sensor fusion processing of the sensed inertial data. The position sensor 308 can also include a wireless network protocol for data transmission to external components, such as, for example, the user interface/display device 140, the 3D sensor 502, and the signal processing and display interface 555. Illustratively, the position sensor 308 senses, processes and transmits sensed position and orientation data of the testing tool 110 to a sensor fusion processing component that can be configured to operate on, for example, the user interface/display device 140. In an embodiment, the position sensor 308 transmits already-processed position and orientation information, delivered in three-dimensional, world coordinates, to the user interface/display device 140 which graphically displays the position of the testing tool 110 relative to the injection apparatus 105 in near real time as the injecting training occurs. The position sensor 308 can provide calibrated 3D linear acceleration, 3D angular velocity, 3D magnetic field, and optionally, atmospheric pressure data, to the sensor fusion processing component which processes the data to deliver precise position and orientation information of the testing tool 110. In an embodiment, the sensor fusion processing component employs a Kalman filter to provide three degrees-of-freedom position and orientation information of the testing tool 110 relative to the injection apparatus 105. The sensor fusion processing component uses data collected from the gyroscopes, accelerometers and magnetometers to compute a statistical, optimal 3D position and orientation estimate, of high accuracy and with no drift, for movements of the testing tool 110. Illustratively, the sensor fusion processing component comprises an algorithm in which the measurement of gravity (by the 3D accelerometers) and the earth's magnetic north (by the 3D magnetometers) compensate for otherwise slowly, but steadily increasing drift errors from the processing (using mathematical integration) of rate-of-turn data (angular velocity) measured from the rate gyroscopes. The described approach for compensating for drift can be referred to as attitude and heading referenced, and a system that employs this approach can be referred to as an Attitude and Heading Reference System (AHRS). FIG. 12 illustrates an embodiment of an injection training system 100 comprising an injection apparatus 105, a testing tool 110, and a resting cradle 1202 in which the testing tool 110 follows a sequence of motion (A through D) from the resting cradle 1202 to an injection site of the injection apparatus 105. In FIG. 12, the injector's hand is not shown to better illustrate the motion of the testing tool 110. At position A, the testing tool 110 sits in the resting cradle 1202. The resting cradle 1202 is in a known, fixed position relative to the injection apparatus 105. This can serve to calibrate the injection training system 100 to know where the testing tool 110 is located relative to the injection apparatus 105 at the initiation of the injection training. In an embodiment, the resting cradle 1202 is attached to the base 108 of the injection apparatus 105. In an embodiment, the injection apparatus 105 has calibration points 1204 that can be used to establish an initial position of the testing tool 110 relative to the injection apparatus 105. Starting from the known position relative to the injection apparatus 105, such as from the resting cradle 1202, the movement of the testing tool 110 can be determined, even as the needle tip 233 penetrates the material of the artificial face. By way of non-limiting illustration, the testing tool is lifted from the resting cradle 1202 to position B. The testing tool 110 is rotated to position C, where the needle tip 233 is directed toward the injection apparatus 105. At position D, the needle tip 233 of the testing tool 110 is inserted into the injection apparatus 105. Position information corresponding to the testing tool 110, including the needle tip 233, can be conveyed to a digital model of the injection apparatus 105. The digital model includes target tissue (individual muscles) and details of vital structures (VS, which is also referred to as vital tissue, VT), such as, for example, arteries, veins, nerves, and skeletal portions, that are to be avoided or accommodated. By comparing the position of the needle tip 233, based on the determined position of the testing tool 110, to the target tissues and the vital structures illustrated on the user interface/display device 140, proximity to a desired injection target can be established. This proximity to target and to vital structures can serve as the basis for evaluating the skill of the injection trainee. Various manufacturers offer for sale inertial measurement systems, devices, and methods, including sensor fusion processing components, for incorporation into products and systems. Such manufacturers include Xsens Technologies, B.V., of Enschede, the Netherlands; InvenSense, Inc. of Sunnyvale, Calif., USA; and Synopsys, Inc., of Mountain View, Calif., USA. Examples of systems, devices and/or methods for inertial measurement of objects in three-dimensional space are disclosed in U.S. Pat. No. 7,725,279B2, issued on May 25, 2010; U.S. Pat. No. 8,165,844B2, issued on Apr. 24, 2012; U.S. Pat. No. 8,203,487B2; issued on Jun. 19, 2012; U.S. Pat. No. 8,250,921B2, issued on Aug. 28, 2012; U.S. Pat. No. 8,351,773B2, issued on Jan. 8, 2013; and in U.S. Patent Application Publication Numbers 2009/0278791A1, published on Nov. 12, 2009; and 2009/0265671A1, published on Oct. 22, 2009, each of which is incorporated by reference herein in its entirety. Computation of the position and orientation of an object in three-dimensional space is a task that can process inputs from several sensors to achieve accurate estimates of the position and orientation of the object. The method can be referred to generally as a fusion of sensor inputs. A sensor fusion process can reduce the impact of, and/or compensate for, inaccuracies of sensor measurements and/or processing approximations. Disclosed herein is a system and method to implement a fusion process that is computationally efficient and that includes nine dimensions of sensor input. In an embodiment, the system includes a processor that can be supplemented with hardware accelerators to help reduce power consumption. An example of a system, device and method to compute the 3D orientation of an object by processing nine dimensions of data using a sensor fusion process is described in a paper entitled “Ultra Low-Power 9D Fusion Implementation: A Case Study,” by Pieter Struik, which is incorporated by reference herein in its entirety. The disclosed system and method to fuse sensor information is one among many possible sensor fusion approaches. One skilled in the art will appreciate that there are numerous systems and methods for fusing sensor input to derive accurate position and orientation information of an object in three-dimensional space without departing from the spirit of the present disclosure. The disclosed system and method offers effective tracking performance while executing computations that are similar to those used by other sensor fusion processes. Performance optimization for this embodiment is based on an analysis of processing-intensive activities. One approach to optimization is to employ a fixed point processing implementation. Another approach to optimization can include the use of one or more hardware accelerators to execute certain computations efficiently. Such optimization approaches are directed at reducing the number of processing cycles required to determine accurate estimates of the position and orientation of an object in three-dimensional space. Described herein is a system and method to calculate three-dimensional (3D) position and orientation of an object derived from inputs from three motion sensors attached to the object: an accelerometer configured to measure linear acceleration along three axes; a gyroscope configured to measure angular velocity around three axes; and a magnetometer configured to measure the strength of a magnetic field (such as the earth's magnetic field) along three axes. In an embodiment, the three motion sensors are attached to the testing tool 110. In an embodiment the three motion sensors are integrated into a single position sensor 308, as reflected in FIG. 3A. In an embodiment, the sensors are sampled at a rate of 50 Hz; however, one skilled in the art will appreciate that the sensors can be sampled at different rates without deviating from the scope of the present disclosure. The sampled data from the three motion sensors, which provide nine sensor inputs, are processed to describe the testing tool's 110 position and orientation in three-dimensional space. The testing tool's position and orientation are described in terms of Euler angles as a set of rotations around a set of X-Y-Z axes of the testing tool 110. Theoretically, the method to determine orientation angles around the three axes of the testing tool 110 is a straightforward process that includes mathematically integrating the three angular velocity measurements provided by the 3D gyroscope sensor. However, when implemented, sensor drift and/or processing approximations can lead to a steadily increasing set of errors that affect the accuracy of such determinations. A method to compensate for the inaccuracy of the processed angular velocity measurements includes processing accelerometer data and magnetometer (or compass) data, in a sensor fusion process. The disclosed system and method to fuse sensor input applies principles that are comparable in accuracy to systems and methods that employ techniques of linear quadratic estimation, such as Kalman filtering, which may also be used to fuse sensor input data in some embodiments. The disclosed system and method to fuse sensor input uses quaternion algebra to determine a present position and orientation of the testing tool 110. In practical application, quaternions can be used in conjunction with other processing methods, such as Euler angles and rotation matrices, to calculate rotations of objects in three-dimensional space. Illustratively, a quaternion, where Q=[q0 q1 q2 q3], can define a three-by-three rotation matrix “R” that translates each coordinate x=(x,y,z) of the initial testing tool's 110 orientation into its current position, Rx. A product (known as the Hamilton product in quaternion algebra, which is represented by the symbol “⊗”) of two quaternions, such as Q0⊗Q1, delivers another quaternion that describes a compound rotation performed by a first rotation, described by Q0, which is followed by a second rotation, described by Q1. Use of quaternion algebra can reduce computational processing requirements because most of the computations used to perform quaternion algebra do not employ computationally-intensive trigonometric functions. FIG. 13A illustrates a process flow diagram of a process 1300 to determine the position and orientation of a testing tool 110 according to an embodiment of the disclosed injection training system 100. One skilled in the art will appreciate that there are numerous ways by which the position and orientation of the testing tool 110 can be determined without departing from the scope of the present disclosure. At block 1302, the process begins by collecting measured data from the 3D gyroscope, the 3D accelerometer, and the 3D magnetometer. The sampling rate can vary, depending on the components used to implement the process. At block 1304, the present orientation of the testing tool 110 is represented by a quaternion “Q” which represents the currently measured angular acceleration data from the 3D gyroscope. This quaternion is an initial estimate of the position and orientation of the testing tool 110. The present orientation can be updated with information provided by the gyroscope sensor which may be represented as (gx, gy, gz). Additional rotation of the testing tool 110 that occurred since the most recent measurement can be represented by a quaternion [1 (gx/f) (gy/f) (gz/f)], where f is defined as a sampling frequency used to execute the sensor fusion process. This representation may be expressed as quaternion [C gx gy gz], with “C” being a constant that is proportional to the sampling frequency, f. At block 1306, information provided by an accelerometer sensor is used to help compensate for accuracy errors in the angular velocity data provided by the gyroscope sensor. An acceleration vector (ax, ay, az), measured by the accelerometer, will equal the acceleration of gravity when the testing tool 110 is not in motion. When the testing tool 110 is in motion, its rotation can be characterized by rotation R, and the vector corresponding to gravity is directed towards the earth's center. When viewed relative to the motion of the sensors attached to the testing tool 110, the gravity vector will have been rotated by the same rotation R. Accordingly, the initial gravity vector v becomes Rv, relative to the testing tool 110, after rotation has taken place. If the testing tool 110 is not moving, the computed gravity vector, Rv, will be aligned with the measured accelerometer information (ax, ay, az). When Rv and (ax, ay, az) are pointing in different directions, we determine that rotation R is inaccurate and, therefore, the coordinates representing the present orientation, Q, must be adjusted based on the vector cross product Rv×(ax, ay, az). At block 1308, fusion with information sensed by the magnetometer can also be applied. It is assumed that the testing tool 110 is subject to the earth's magnetic field. It is also assumed that the testing tool 110 is not subject to interference from a separate magnetic field, such as, for example, the field of a permanent magnet. Under these assumed conditions, the magnetic field measured by the 3D magnetometer (mx, my, mz) can be related to the initial orientation of the testing tool 110 by applying a reverse rotation R*, where the vector w=R*(mx, my, mz). It is also assumed that the earth's magnetic north is aligned in the direction of the X axis. Accordingly, an alignment error can be determined by comparing the vector w to a vector w′, which is obtained by rotating the vector w onto the plane of the testing tool 110. An alignment error vector c can be calculated. The alignment error vector, c, is proportional to the vector cross product c=w×w′. As c is related to the initial orientation of the testing tool 110, Rc corresponds to the adjustment that can be applied to the testing tool's 110 present position and orientation, represented by quaternion Q. At block 1310, the adjusted quaternion Q is converted into three Euler angles. Euler angles are a way of representing the spatial orientation of a coordinate system as a composition of three elemental rotations, starting from a known, standard orientation. The relation between the quaternion Q and the converted Euler angles includes calculations that use inverse sine and inverse tangent functions. Illustratively, the rotation angle around the Y axis is determined with the following conversion equation: Y=−a sin(2*q1*q3+2*q0*q2), where the quaternion Q=[q0 q1 q2 q3]. In an embodiment, the method 1300 to determine the position and orientation of a testing tool 110 updates the position and orientation of the testing tool 110 at the sampling rate of the sensors. Accordingly, at block 1312, the process 1300 determines whether the present injection training is continuing or whether it has ended. When the present injection training is continuing, the method 1300 returns to block 1302 to update the position and orientation information of the testing tool 110. When the present injection training is completed, the process 1300 terminates at block 1314. FIGS. 13B, 13B1, and 1362, collectively, illustrates a process flow diagram of a process 1340 to determine the position and orientation of a testing tool 110 according to an embodiment of the disclosed injection training system 100. Illustratively, process 1340 discloses one approach to implementing process 1300, described above. One skilled in the art will appreciate that there are numerous ways by which process 1300 can be implemented without departing from the scope of the present disclosure. At block 1350, the process begins by collecting measured data from the 3D gyroscope (providing angular momentum information), the 3D accelerometer (providing linear accelerations information), and the 3D magnetometer (providing magnetic field information). The present position and orientation of the testing tool 110 is represented by a quaternion, based on the measured angular acceleration data from the 3D gyroscope. Blocks 1352 through 1358 illustrate computation actions implemented to compensate for inaccuracies in the angular velocity data, provided by the 3D gyroscope, based on the linear acceleration information provided by the 3D accelerometer. This methodology uses the earth's gravitational field to identify inaccuracies in the measured angular momentum data and to compensate for those inaccuracies. At block 1352, the measured 3D accelerometer data is compared with a rotated initial gravity vector. At block 1354, the accelerator data is inverted and normalized. At block 1356, a vector cross product of the normalized accelerator data and the rotated gravity vector is computed. And at block 1358, a compensation for gyroscope data inaccuracies is made, using a constant acceleration compensation factor. Blocks 1360 through 1368 illustrate actions implemented to compensate for inaccuracies in the angular velocity data, provided by the 3D gyroscope, based on the magnetic field information provided by the 3D magnetometer. This methodology uses the earth's magnetic field to identify inaccuracies in the measured angular momentum data and to compensate for those inaccuracies. At block 1360, the measured 3D magnetometer data is normalized and inverted. At block 1362, an inverse rotation of the normalized magnetometer data is computed. At block 1364, the computed rotation is aligned in orientation with the testing tool 110, based on earth's magnetic north. At block 1366, the computed rotation is rotated back to the original orientation, and an alignment error vector is computed by computing a cross product of rotation vector with the measured magnetometer data. At block 1370, a compensation for gyroscope data inaccuracies is made, using a constant magnetic compensation factor. At block 1370, the testing tool's position and orientation, represented in a quaternion, is updated based on the adjusted gyroscope data, and it is normalize at block 1372. At block 1374, the updated position and orientation information of the testing tool 110 is converted into Euler angles which can be used by, for example, the user interface/display device 140 to graphically display the position of the testing tool 110. At block 1376, the process 1340 returns to block 1350, to begin another iteration when the injection training is continuing. Alternatively, the process terminates at block 1378 when the injection training is finished. Advantageously, the disclosed method for determining the position and orientation of a testing tool 110 is robust, even when assumptions are not held. For example, when the testing tool 110 is moving, the measured accelerometer data (ax, ay, az) represents a non-zero linear acceleration relative to gravity; however the sensor fusion processing method nevertheless delivers accurate position data. Moreover, fusion of magnetometer data proves to be accurate in the presence of distortion in the gravitational magnetic field. In an embodiment, the disclosed method can be implemented in a system of integrated hardware and software (or firmware) that can be optimized to process data from digital and analog sensors and to engage in power-efficient processing of the sensor data. The system can include a processor (such as the ARC EM4 32-bit processor core offered by Synopsys Inc.), a user-configurable set of serial digital interfaces, analog-to-digital converter interfaces, hardware accelerators, and a software library of digital signal processor (DSP) functions and input/output (I/O) software drivers. The system can take advantage of capabilities to implement tightly coupled I/O peripherals and tightly coupled hardware accelerators, which may be accessed directly from the processor pipeline without the overhead of additional hardware infrastructure, such as, for example, busses, bridges, and/or adapters. In an embodiment, the system configuration contains one or more Inter-Integrated Circuit (I2C) master peripheral ports, a Serial Peripheral Interface (SPI) master peripheral port, and a general purpose input/output (GPIO) port. The processor can be configured to have a single-cycle 32-bit integer multiplier. The system can be configured to include one or more fixed-point hardware accelerators to perform computationally-intensive operations, such as, for example, multiply-accumulate (MAC) operations, trigonometric operations, and the square root operation. Illustratively, use of hardware accelerators can reduce processor cycle time with respect to computationally-intensive operations such as the square root operation. A hardware accelerator accepts a 32-bit fixed point number as input and computes the square root in 31 cycles, evaluating one bit at a time which is substantially faster than calculating a square root by use of software delivered as part of a compiler's standard library. Many of the required computations used in the disclosed method are computationally-intensive when implemented using standard software routines. For example, rotation and inverse rotation operations are matrix-vector multiplications where the (inverse) rotation matrix has coefficients that are based on the quaternion Q. Illustratively, inverse rotation operations involve many multiplications and additions. Similarly computing the inverse norm of a vector or a quaternion requires the following operations: multiplication, addition, square root, and division. Likewise, computing a vector cross product requires multiplication operations and addition operations. Computing the Hamilton product of two quaternions takes many multiplications and additions. Computing Euler angles involves trigonometric functions (a tan 2 and a sin), where the arguments are expressions that are based on quaternion Q. These expressions include multiplication operations and addition operations. Use of one or more hardware accelerators to implement such operations can reduce overall processing time and power consumption. To further improve performance and to reduce power consumption the disclosed system, device and method can be configured to be implemented using fixed point arithmetic as opposed to using floating point arithmetic. Conversion of numerical processing using floating point arithmetic to fixed point arithmetic requires care with respect to overflow and underflow in computations. However, after such conversion is performed successfully, the processing workload can be reduced by replacing floating point multiplication operations with single-cycle, 32-bit multiplications, and floating point addition operations with simple, 32-bit additions (or subtractions). Evaluation of the resulting fixed-point version of the disclosed method shows that the square root function, which is executed four times in each cycle of the disclosed method, consumes many processing cycles. Using a standard square root function call, which is typically included in a library of digital signal processing (DSP) functions, to apply the square root hardware accelerator can further reduce processing cycle count. Another optimization can be to reduce the cycle count of the Euler angles computation by applying a hardware accelerator for the inverse sine function. Because the inverse tangent function can be expressed in terms of the inverse sine and square root operations, using the hardware accelerators for the computations reduces computational workload, power consumption, and processing time per iteration. Thus the processing cycle count of the disclosed nine-dimensional sensor fusion method can be reduced by implementing a fixed point version of the process that takes advantage of available hardware accelerators. Reduction of cycle count leads to lower energy, as the energy that is used for executing the algorithm is proportional to the required performance. In an embodiment, position sensors 308 are used in both the barrel 220 of the testing tool 110 and in the plunger 210 of the testing tool 110 to determine the position of the plunger 210 relative to the barrel 220 of the testing tool 110. This information can be used to indicate distal travel movement of the plunger 210 in the testing tool 110 during simulated injection. The distal travel movement can represent a volume of fluid that would be injected, and therefore the distal travel movement can be used to determine a measure of the injection trainee's performance. An embodiment of the disclosed system, device and method to determine the position and orientation of the testing tool 110, relative to the injection apparatus 105, during injection training includes the use of one or more retro-reflectors attached to the testing tool 110 in association with an optical tracking system. A retro-reflector (sometimes called a retroflector or cataphote) is a device or surface that reflects light back to its source with a minimum of scattering. In a retro-reflector, an electromagnetic wave front is reflected back along a vector that is parallel to, but opposite in direction from, the wave's source. The angle of incidence at which the device or surface reflects light in this way is greater than zero, unlike a planar mirror, which reflects an electromagnetic wave (such as light) only if the mirror is exactly perpendicular to the wave front, having a zero angle of incidence. The retro-reflectors are locatable by an optical tracking system that can operate in, for example, the infrared (IR) range. The retro-reflectors can be positioned on the external surface of the testing tool 110 for use with optical tracking systems that operate by use of infrared illumination. This type of optical tracking allows for the triangulation of energy reflected from the retro-reflectors to determine the testing tool's 110 position in three-dimensional space. In an embodiment, alignment of the needle tip 233 with the injection apparatus 105 can be accomplished by touching the needle tip 233 to a known location on the injection apparatus 105, such as calibration points 1204. FIGS. 14A and 14B are perspective views of an exemplary optical tracking system 1400. Optical tracking is a 3D localization technology that monitors a defined measurement space using two or more light sensors 1402, such as, by way of non-limiting example, cameras. In an embodiment, each light sensor 1402 is equipped with an infrared (IR) pass filter (not shown) in front of the lens, and a ring of IR light emitting diodes (not shown) around the lens to periodically illuminate the measurement space of the optical tracking system 1400 with IR light, as illustrated in FIG. 14A. Reflections from markers 1404 on the testing tool 110 are sensed by the light sensors 1402, and the sensed information is processed by the optical tracking system 1400 to determine the position and orientation of the testing tool 110 in three-dimensional space. Examples of optical tracking systems 1400 are described in a paper entitled “PST iris: Instruction Manual,” published by Personal Space Technologies B.V, and in International Patent Application Number PCT/NL2009/050607, having International Publication Number WO 2011/043645A1, published on Apr. 14, 2011, which are incorporated by reference herein in their entirety. Computer stereo vision is the extraction of 3D information from digital images, such as obtained by a charge-coupled device camera. By comparing information about a scene from two vantage points, 3D information can be extracted by examination of the relative positions of objects in the two panels. In traditional stereo vision, two cameras, displaced horizontally from one another are used to obtain two differing views on a scene, in a manner similar to human binocular vision. By comparing these two images, the relative depth information can be obtained, in the form of disparities, which are inversely proportional to the differences in distance to the objects. To compare the images, the two views are superimposed in a stereoscopic device. In camera systems, several pre-processing steps are required. The image is removed of distortions, such as barrel distortion to ensure that the observed image is a pure projection. The image is projected back to a common plane to allow comparison of the image pairs, known as image rectification. An information measure which compares the two images is minimized. This gives the best estimate of the position of features in the two images, and creates a disparity map. Optionally, the disparity as observed by the common projection, is converted back to a height map by inversion. Using a correct proportionality constant, the height map can be calibrated to provide precise distances. Active stereo vision is a form of stereo vision which actively employs a light, such as an infrared light source, to simplify the stereo matching problem. An examples of a stereo vision system and processing method is disclosed in U.S. Pat. No. 8,208,716B2, issued on Jun. 26, 2012, which is incorporated by reference herein in its entirety. Objects to be tracked, such as the testing tool 110, can be equipped with retro-reflective markers 1404 that reflect the incoming IR light back to the light sensors 1402. The IR reflections are detected by the light sensors 1402 and then internally processed by the optical tracking system 1400. The optical tracking system 1400 calculates the 2D marker position, in image coordinates, with high precision. Using at least two light sensors 1402, the 3D position of each marker 1404 can be derived, as described above. The 3D position can be measured by using a single marker 1404 in the measurement space; however, to be able to also measure the orientation of an object (or to track multiple objects simultaneously), multiple markers 1404 must be placed on each object. Such a configuration can be created by affixing markers 1404 randomly onto the object, making sure at least two markers 1404 can be seen from each angle of the object that the user desires to be detected. By establishing a model of the configuration of each object, the optical tracking system 1400 can distinguish between objects and can determine the 3D position and orientation of each object. Optical tracking systems 1400 offer some advantages over other approaches to measure and determine the 3D position and orientation of an object in three-dimensional space. For example, optical tracking is less susceptible to noise from the environment, such as, for instance, ferromagnetic metal in the environment which can influence the accuracy of the measurements of magnetic tracking systems. Additionally, optical tracking does not suffer from drift problems experienced in, for instance, inertial sensors, which cause measurements to slowly deviate from actual values, for which compensation techniques must be applied. Optical tracking also allows for many objects to be tracked simultaneously. Optically tracked devices can be lightweight and they do not require wires or power. As such, users are neither hampered by wires nor limited in their manipulation of the object. FIG. 14C illustrates a testing tool 110 configured with multiple markers 1404, in accordance with an embodiment of the present disclosure. In an embodiment, an optical tracking system 1400 measures the 3D positions of markers 1404, such as, for example, retro-reflectors, affixed to the testing tool 110. The markers 1404 can be active or passive. Using this information, the optical tracking system 1400 can determine the position and orientation of the marked testing tool 110 within a specific field of view defined by the optical tracking system. The optical tracking system 1400 can be a self-contained, integrated system that does not require external processing or calibration components. The optical tracking system 1400 can be connected to the user interface/display device 140 via a wired or by a wireless communication scheme. The optical tracking system 1400 can deliver 3D position and orientation measurement of the testing tool 110 to the interface unit/display device 140. Advantageously, the disclosed optical tracking system 1400 delivers fully-processed position and orientation data to the user interface/display device 140, thereby freeing up the processing capability of the user interface/display device 140 for other computationally-intensive activities, such as, for example, processing and rendering of a digital model representative of the injection apparatus 105 and the testing tool 110 during injection training. FIG. 14D illustrates, among other things, aspects of the user interface/display device 140 according to an embodiment of the disclosed injection training system 100. Shown in magnified perspective are examples of how the user interface/display device 140 can graphically display, either during the injection training or afterwards, the location of the needle tip 233 as it penetrates the injection apparatus 105. The user interface/display device 140 illustrates portions of the anatomy in the vicinity of the injection site. In particular, vital tissue (VT), and muscle are represented digitally on the user interface/display device 140. Advantageously, the user can view a target site, a proximity to the target site, and nearby vital tissues or structures. In some embodiments, visual and/or aural signals are delivered to the trainee as indications of the needle tip's 233 proximity to the target site. During an injection, for example, the display can graphically illustrate the different skin and tissue layers as the needle tip 233 penetrates each layer. For example, this can be done by graphically peeling back the layers as a new layer is penetrated. For training purposes, the different layers can be labeled or provided with different textures or colors to indicate a new layer is shown. In an embodiment, a single optical tacking system 1400 can track the testing tool 110 in an injection training environment, as illustrated in FIG. 15A. In an embodiment, multiple optical tracking systems 1400 can be coupled together to extend the workspace environment or to reduce issues due to the line-of-sight requirement of the optical tracking system 1400, as illustrated in FIG. 15B. In an embodiment, the optical tracking system 1400 can be configured with different optics configurations to adapt the field of view and the performance characteristics of the optical tracking system 1400 to the intended environment and application. Illustratively, optics with a higher field of view result in a wider tracking area closer to the system, whereas optics with a lower field of view provide a narrower, but longer, tracking area. The optical tracking system 1400 can use tangible, wireless devices for 3D interaction and 3D measurement, such as the testing tool 110. In an embodiment, the position and orientation (sometimes referred to as the “pose”) of the testing tool 110 can be reconstructed with millimeter accuracy. Advantageously, the optical tracking system 1400 can be based on infrared lighting, which can reduce the interference of visible light sources from the environment. This allows the optical tracking system 1400 to be used under normal, ambient working conditions without requiring controlled lighting. The testing tool 110, and the injection apparatus 105, can be tracked by applying retro-reflective markers 1404 to their external surfaces. The optical tracking system 1400 employs these markers to recognize different objects and to reconstruct their poses. In an embodiment, and by way of non-limiting illustration, the optical tracking system 1400 reconstructs the pose of the testing tool 110, and optionally, of the injection apparatus 105, at an adjustable sampling frequency with a maximum of 120 times per second. One skilled in the art will appreciate that other sampling frequencies can be used without departing from the scope of the present disclosure. The optical tracking system 1400 can be triggered externally, such that it can be synchronized to external clock sources. This can, for instance, be used to prevent interference between the internal infrared flash and shutter glasses that are synchronized to a 3D monitor, such as the user interface/display device 140, using an infrared signal. In an embodiment, tracking devices comprise physical objects, such as the testing tool 110 and the injection apparatus 105, that can be recognized by the optical tracking system 1400 and of which the 3D position and orientation can be measured. In an embodiment, such devices can be used to measure the spatial coordinates of objects, or for instance, to interact with virtual 3D objects in an application. Illustratively, just as a mouse can be used to position a pointer in two-dimensional space, so too can a tracking device be used to position an object in three-dimensional space, with six degrees of freedom. The 3D position and orientation (pose) of a tracking device, such as the testing tool 110, is optically tracked, ensuring wireless operation. Retro-reflective markers 1404 can be applied to objects, such as the testing tool 110 and the injection apparatus 105, to transform them into tracking devices. The tracking system uses these markers 1404 to recognize devices and to reconstruct each pose. In order for the optical tracking system 1400 to be able to determine the position and orientation of a tracking device, at least four markers 1404 need to be applied. The size of the markers 1404 helps to determine the optimal tracking distance. The optical tracking system 1400 supports flat retro-reflective markers 1404 for the construction of tracking devices. Such flat retro-reflective markers 1402 do not hamper manipulation. In an embodiment, the markers 1404 are locatable by tracking systems, devices, and methods that can operate in the radio frequency (RF) range. The markers 1404 can be positioned on the interior of the testing tool 110 for tracking systems 1400 that operate through use of RF illumination, such as the technology known as radio-frequency identification (RFID). Advantageously, the RF energy is able to be transmitted through the tissue of the injector's hand, arm and other portions of the injector's body that may obstruct the required line-of-site view between an optical tracking system 1400 and the testing tool 110 during injection training, when implemented using optical tracking systems 1400 based on infrared illumination. In an embodiment, the reflective markers 1404 comprise corner reflectors. Corner reflectors can operate in a wide range of electromagnetic frequencies including the infrared and the radio spectrums. A corner reflector is a retro-reflector comprising three mutually perpendicular, intersecting flat surfaces. The corner reflector reflects waves back directly towards the source, but shifted (translated). The three intersecting surfaces often have square shapes. Optical corner reflectors, called corner cubes, made of three-sided glass prisms, are used in surveying and laser range-finding. The incoming ray is reflected three times, once by each surface, which results in a reversal of direction. The three corresponding normal vectors of the corner's perpendicular sides can be considered to form a basis (a rectangular coordinate system) (x, y, z) in which to represent the direction of an arbitrary incoming ray, [a, b, c]. When the ray reflects from the first side, say x, the ray's x component, a, is reversed to −a while the y and z components are unchanged, resulting in a direction of [−a, b, c]. Similarly, when reflected from side y and finally from side z, the b and c components are reversed. So the ray direction goes from [a, b, c] to [−a, b, c] to [−a, −b, c] to [−a, −b, −c] and it leaves the corner reflector with all three components of direction exactly reversed. The distance traveled, relative to a plane normal to the direction of the rays, is also equal for any ray entering the reflector, regardless of the location where it first reflects. In an embodiment, the optical tracking system 1400 views the testing tool 110 and the needle tip 233 as it approaches and penetrates the injection apparatus 105. The optical tracking system 1400 can operate in the visual and infrared spectrums. For optical tracking systems 1400 using the infrared spectrum, an improvement in resolution and differentiation is available by altering the temperature of the testing tool 110 and/or the needle tip 233 to be different (hotter or colder) than ambient temperature. Infrared thermography (IRT), thermal imaging, and thermal video are examples of infrared imaging science. Thermographic cameras detect radiation in the infrared range of the electromagnetic spectrum (roughly 9,000-14,000 nanometers or 9-14 μm) and produce images of that radiation, called thermograms. Since infrared radiation is emitted by all objects above absolute zero according to the black body radiation law, thermography makes it possible to see one's environment with or without visible illumination. The amount of radiation emitted by an object increases with temperature; therefore, thermography allows one to see variations in temperature. When viewed through a thermal imaging camera, warm objects stand out well against cooler backgrounds. The testing tool 110 and needle tip 233 can be clearly resolved against the ambient temperature background when using thermal imaging. In an embodiment, the 3D sensor(s) 502 from the interior of the injection apparatus 105 can be configured to sense both light emitting from the testing tool 110 and thermal energy emitted from the testing tool 110 and/or needle tip 233 by use of infrared, or other forms of thermal imaging. Multiple methods for achieving temperature variation of the testing tool 110 relative to ambient temperature can be used, including, without limitation, resistive heating on the testing tool 110 interior with conductive heat transfer to the hollow needle 232, and routing gas of a controlled temperature through a tube into the testing tool 110 interior and exhausting the gas through the needle tip 233. In an embodiment, thermal imaging is available by including temperature markers on the injection apparatus 105 to be viewable by a the optical tracking system 1400, which can support accurate resolution of the testing tool's 110 position relative to the injection apparatus 105. In an embodiment, the depth of penetration of the needle tip 233 into the injection apparatus 105 can be determined by measuring the length of the needle 232 remaining exterior to the injection apparatus 105, thereby exposed to the view of the optical tracking system 1400. By knowing the orientation and position of the testing tool 110 relative to the injection apparatus 105, along with the measured length of the needle 232 remaining exterior to the injection apparatus 105, the depth of penetration of the needle tip 233 in the injection apparatus 105 may be determined. In an embodiment, position information provided by the 3D sensor(s) 502 and the optical tracking system 1400 can be combined to determine the position and orientation of the testing tool 110 and the needle tip 233 relative to the injection apparatus 105 during injection training. Combination of position data corresponding to the light emitting needle tip 233 as the needle tip 233 passes through the opaque layer of artificial skin, as sensed by the 3D sensor(s) 502 from the interior of the injection apparatus 105, with the length of the needle 232 remaining exterior to the injection apparatus 105, as sensed by the optical tracking system 1400, can be combined to determine the position and orientation of the testing tool 110 and the needle tip 233 relative to the injection apparatus 105. An injection training system has been disclosed in detail in connection with various embodiments. These embodiments are disclosed by way of examples only and are not to limit the scope of the claims that follow. One of ordinary skill in the art will appreciate from the disclosure herein any variations and modifications. Terminology/Additional Embodiments The term “injection” as used herein includes it usual and customary meaning of an injection, but is also to be interpreted broad enough to encompass, for example, the insertion of a catheter device or the use of simple needles, such as would be used in an acupuncture therapy. The techniques involved, particularly a camera embedded in a model of a living subject and a tool with a light emitter can be applied to any therapeutic procedure. For example, the tool can be a catheter and the procedure can be a minimally invasive procedure requiring the catheter to be located in a particular location. Conditional language used herein, such as, among others, “can,” “could,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or states. Thus, such conditional language is not generally intended to imply that features, elements and/or states are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or states are included or are to be performed in any particular embodiment. Depending on the embodiment, certain acts, events, or functions of any of the methods described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all described acts or events are necessary for the practice of the method). Moreover, in certain embodiments, acts or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores, rather than sequentially. The various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. The described functionality can be implemented in varying ways for each particular application, but such embodiment decisions should not be interpreted as causing a departure from the scope of the disclosure. The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein can be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor can be a microprocessor, but in the alternative, the processor can be any conventional processor, controller, microcontroller, or state machine. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. The blocks of the methods and algorithms described in connection with the embodiments disclosed herein can be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of computer-readable storage medium known in the art. An exemplary storage medium is coupled to a processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The processor and the storage medium can reside in an ASIC. The ASIC can reside in a user terminal. In the alternative, the processor and the storage medium can reside as discrete components in a user terminal. While the above detailed description has shown, described, and pointed out novel features as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the devices or algorithms illustrated can be made without departing from the spirit of the disclosure. As will be recognized, certain embodiments of the disclosures described herein can be embodied within a form that does not provide all of the features and benefits set forth herein, as some features can be used or practiced separately from others. The scope of certain disclosures disclosed herein is indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope. 1.-160. (canceled) 161. An injection system, the system comprising: a syringe having a syringe body and a plunger, the plunger configured to move relative to the syringe body, the syringe body comprising a body portion having a proximal end and a distal end, a flange portion disposed at or near the proximal end, and a needle coupling portion disposed at or near the distal end, the needle coupling portion configured to be coupled to a needle; and at least one circuit board removably attached to the syringe, wherein the at least one circuit board coupled to one or more sensors, the one or more sensors configured to measure injection information about an injection procedure performed using the injection system. 162. The injection system of claim 161, wherein the injection information comprises one or more of: force and/or pressure of injection; angle of injection; depth of injection; and/or location of injection. 163. The injection system of claim 161, further comprising at least first and second cameras spaced apart from each other, wherein the at least first and second cameras are configured to detect a location of the syringe relative to the at least first and second cameras. 164. The injection system of claim 163, further comprising a training apparatus, wherein the at least first and second cameras are located within a cavity of the training apparatus. 165. The injection system of claim 161, wherein the syringe body further comprises a light source located at or near the distal end of the body portion, the light source coupled to the at least one circuit board. 166. The injection system of claim 165, wherein the syringe comprises a needle, the needle having an optic fiber disposed within a lumen of the needle, the optic fiber terminating distally at or near a tip of the needle. 167. The injection system of claim 161, wherein the at least one circuit board comprises a force sensor, a pressure sensor, and/or a position sensor. 168. The injection system of claim 167, wherein the position sensor comprises an inertial measurement unit. 169. The injection system of claim 161, further comprising a rechargeable battery coupled to the at least circuit board, the rechargeable battery configured to provide power to the one or more sensors. 170. The injection system of claim 169, further comprising a light source within the syringe, wherein the rechargeable battery is configured to power the light source. 171. The injection system of claim 169, further comprising one or more electrical contacts coupled to the rechargeable battery, the one or more electrical contacts accessible from outside the syringe. 172. The injection system of claim 171, further comprising a charging base, the charging base having one or more electrical connectors configured to contact the one or more electrical contacts when the syringe is docked onto the charging base. 173. The injection system of claim 172, wherein the charging base comprises a cradle contoured to accommodate the syringe. 174. The injection system of claim 161, comprising a friction device configured to act against the plunger to simulate a viscosity of a medication. 175. The injection system of claim 161, wherein the at least one circuit board is releasably attached to the syringe body. 176. The injection system of claim 161, wherein the at least one circuit board comprises a first circuit board and a second circuit board, the first and second circuit boards being electrically coupled. 177. A method of improving injection training using a processor of an injection system, the injection further comprising a syringe and a training apparatus configured to receive an injection performed using the syringe, the method comprising: receiving sensor outputs from one or more sensors coupled to at least one circuit board removably attached to a syringe body of the syringe, the syringe body comprising a body portion having a proximal end and a distal end, a flange portion disposed at or near the proximal end, and a needle coupling portion disposed at or near the distal end, the needle coupling portion configured to be coupled to a needle, the syringe further comprising a plunger, the plunger configured to move relative to the syringe body; determining, based at least in part on the sensor outputs, injection information about an injection procedure performed using the injection system; and outputting the injection information, through wireless electrical communications, to a display device. 178. The method of claim 177, wherein the one or more sensors comprise a force sensor, the method further comprising determining a force applied to a plunger of the syringe based at least in part on sensor inputs from the force sensor. 179. The method of claim 177, further comprising receiving outputs from at least two cameras of the injection system, the at least two cameras being spaced apart from each other, the outputs related to a three-dimensional position information of the syringe, wherein the determining is based at least in part on the outputs from the at least two cameras. 180. The method of claim 179, wherein the one or more sensors comprise a position sensor, the syringe further comprising a light source, and the at least two cameras located within a cavity of the training apparatus, wherein the determining further comprises obtaining the three-dimensional position information of the syringe by combining the sensor outputs from the position sensor and the outputs from the at least two cameras detecting light emitted from the light source. Filed: Feb 1, 2018 Inventors: Clark B. Foster (Mission Viejo, CA), Gabrielle A. Rios (Newport Beach, CA), Bruce A. Christie (Clairmont, CA), Khoi Turner (Tustin, CA) International Classification: G09B 23/28 (20060101); G09B 23/30 (20060101);
cc/2019-30/en_head_0021.json.gz/line1730300
__label__cc
0.562307
0.437693
Justia Patents Session/connection Parameter SettingUS Patent for System and method for interaction between one or more desktop computers and one or more mobile devices Patent (Patent # 6,272,545) System and method for interaction between one or more desktop computers and one or more mobile devices Oct 22, 1998 - Microsoft A system and method of interaction between a computer, such as a desktop computer, and a plurality of mobile devices include storing a first identifier on a first mobile device and the computer, and storing a second identifier on a second mobile device and the computer, wherein the second identifier is different than the first identifier. A set of settings are stored in the computer referenced to each stored identifier for each respective mobile device. Upon connection of one of the mobile devices to the computer, the identifier stored in the connected mobile device is compared with the identifier stored on the computer. Interaction between the connected mobile device and the computer is controlled as a function of the stored respective set of settings if corresponding identifiers are found. Latest Microsoft Patents: CAPTURING AND VIEWING ACCESS-PROTECTED PHOTOS AND VIDEOS DISPLAYING CONTENT ON A DISPLAY IN POWER SAVE MODE PHASE ARITHMETIC FOR QUANTUM COMPUTATION ORIENTATION SPECIFIC CONTROL Shared Memory in Memory Isolated Partitions REFERENCE TO CO-PENDING PATENT APPLICATIONS The present application claims priority from and fully incorporates herein, U.S. Provisional patent application Ser. No. 60/063,164, filed on Oct. 24, 1997, and U.S. Provisional patent application Ser. No. 60/064,986, filed on Nov. 7, 1997. This application is also a continuation in part of U.S. patent applications, Ser. No. 09/058,685, filed on Apr. 10, 1998, now U.S. Pat. No. 6,128,661 entitled “INTEGRATED COMMUNICATIONS ARCHITECTURE ON A MOBILE DEVICE” and Ser. No. 09/058,528 filed on Apr. 10, 1998 now abandoned, entitled “SYSTEM AND METHOD FOR INTERACTION BETWEEN DESKTOP COMPUTER AND MULTIPLE MOBILE DEVICES”, which have been assigned to the same assignee as the present application and are hereby fully incorporated by reference. The present invention relates to personal mobile computing devices commonly known as handheld portable computers. More particularly, the present invention relates to a system and a method for allowing interaction between a desktop computer and multiple mobile devices. Mobile devices are small electronic computing devices often referred to as personal desktop assistants. One such mobile device is the Handheld PC (or “H/PC”) based on and including the Windows CE brand operating system sold by Microsoft Corporation of Redmond, Wash. Although small, a wide variety of computing tasks and applications can be performed by such mobile devices, such as word processing, spread sheet programs, personal money managers and games, to name a few. In many respects, these programs are very similar to programs that reside on an individual&apos;s desktop computer. In some applications, the mobile device may not have as many functions as available on a desktop computer but, nevertheless, are quite valuable as a means for updating and changing data in the field where even a laptop computer may not be available or used conveniently. It is also common for a mobile device to be used in conjunction with a desktop computer. For example, the user of a mobile device may also have access to, and use, a desktop computer at work or at home. The user may typically run the same types of applications on both the desktop computer and on the mobile device. Thus, it is quite advantageous for the mobile device to be designed to be coupled to the desktop computer to exchange information with, and share information with, the mobile device. In many applications, the user must decide which desktop computer the mobile device will be coupled to or be configured to work with. Having assigned or configured the desktop computer to work with the selected mobile device, the desktop computer cannot be conveniently used with another mobile device. This limitation is particularly disadvantageous when, for example, it is desired that many users interact with a common database stored on the desktop computer. For instance, a sales force may individually return to a home office and interact with a designated desktop computer having a common database that is shared by all in the sales force. Each individual sales person could update each of their respective mobile devices so as to have the most current information in the database, or to update the common database with information obtained in the field. Prior art systems are not convenient to use since each user must reconfigure communication and data transfer parameters each time the user connects the mobile device to the desktop computer. In many situations, each of the users must be using the same type of mobile device. There is a continuing need to improve the interaction between one or more desktop computers and one or more mobile devices. In particular, there is a need to allow a plurality of mobile devices to interact with the desktop computer without requiring an inordinate amount of configuration by the user as well as allow the user to choose to use a particular mobile device independent of other users interacting with the desktop computer. The present invention fulfills these needs by providing a system and a method of interaction between a computer, such as a desktop computer, and a plurality of mobile devices including storing a first identifier on a first mobile device and the computer, and storing a second identifier on a second mobile and the computer, wherein the second identifier is different than the first identifier. A set of settings are stored in the computer referenced to each stored identifier for each respective mobile device. Upon connection of one of the mobile devices to the computer, the identifier stored in the connected mobile device is compared with the identifier stored on the computer. Interaction between the connected mobile device and the computer is controlled as a function of the stored respective set of settings if corresponding identifiers are found. FIG. 1 is a block diagram illustrating an operating environment of the present invention. FIG. 2 is a block diagram of one embodiment of a conventional desktop computer used in conjunction with a mobile device. FIG. 3 is a simplified pictorial illustrating one embodiment of the mobile device in accordance with the present invention. FIG. 4 is one embodiment of a simplified block diagram of the mobile device shown in FIG. 3. FIG. 5 is state or flow diagram illustrating operation of a profile manager module. FIG. 6 is an architectural block diagram illustrating one embodiment of portions of the desktop computer shown in FIG. 2 and the mobile device shown in FIGS. 3 and 4 to illustrate synchronization of information stored in object stores on the desktop computer and the mobile device. FIG. 7 is a state or flow diagram illustrating synchronization of information. FIG. 1 is a block diagram of a typical system or environment 2 in which the present invention operates. The environment 2 includes a first mobile device 3A and a second mobile device 3B. Each of the mobile devices 3A and 3B includes one or more application programs indicated at 5A, 5B and 5C, and a store 6 used to store objects, data files and/or databases used by the application programs 5A-5C. A computer, herein illustrated as a desktop computer 4, also includes one or more application programs indicated at 7A, 7B, 7C and 7D, and a store 8 used to store objects, data files and/or databases used by the application programs 7A-7D. In some circumstances, it is desired that at least some of the objects on stores 6 and 8 be either copied or transferred in order that the user can access the same information regardless as to whether the mobile device or the desktop computer 4 is being used. Although illustrated wherein each mobile device 3A and 3B includes the same application programs 5A-5C, it should be understood that each mobile device 3A and 3B can be individually configured as desired by each respective user to contain one or a number of application programs, some of which can correspond to application programs 7A-7D residing on the desktop computer 4. It should also be understood that the mobile devices 3A and 3B need not be made from the same manufacturer, nor even identical to operate in the present environment 2. In other words, the mobile devices 3A and 3B can be manufactured by different vendors using different CPU platforms and having different operating characteristics. However, each of the mobile devices 3A and 3B are connectable to the desktop computer 4 using one of a plurality of known connection mechanisms 9, such as a serial connection, an infrared link or a modem connection. In the embodiment illustrated, the mobile device 3A is connected to the desktop computer 4 using the connection mechanism 9. Alternatively, when it is desired, the mobile device 3B can be connected to the desktop computer 4 using the connection mechanism 9. Although illustrated wherein two mobile devices 3A and 3B can be connected to the desktop computer 4, if desired, additional mobile devices manufactured by the same or different vendors of mobile devices can also be connected to the desktop computer 4. Generally, the desktop computer 4 also includes partnership information indicated at 10 that is stored in store 8. The partnership information 10 comprises settings or parameters to control aspects of the connection and data transfer process when each mobile device 3A and 3B is connected. Upon initial connection of a new type of mobile device 3A or 3B to the desktop 4, default settings, previously stored on the desktop computer 4, are obtained based on the type of mobile device connected. If desired, at least some to almost all of the default settings can be changed by the mobile device user. In one embodiment, the partnership information 10 corresponding to each mobile device 3A and 3B is stored on the desktop computer 4 and is accessed each time the user connects the mobile devices 3A and 3B thereto. Thus, each user need not have to reestablish his or her user preferences each time the mobile device 3A or 3B is connected. In a preferred embodiment, the partnership information 10 includes any unique settings for each unique type of mobile device being connected to the desktop computer 4. In this manner, the mobile devices 3A and 3B need not be the same type. The partnership information 10 can be stored remote from the desktop computer 4. If desired, some of the partnership information 10, for example, some or all of the user settings, can be stored on each of the respective mobile devices 3A and 3B, which would then be accessible by the desktop computer 4. Likewise, the partnership information 10 can also be stored, for example, on a network server that is accessible to the desktop computer 4. Typically, the partnership information 10 on the desktop computer 4 includes a record of the partnership with the mobile device and a module to access any relevant user setting pertaining to the partnership no matter where they are stored. The partnership information 10 is preferably organized under unique identifiers stored at 15A and 15B assigned, for example, during initial formation of each partnership. The unique identifiers are stored on the desktop computer 4 and stored separately on each of the mobile devices 3A and 3B. In addition to the unique identifiers stored at 15A and 15B, device names can also be stored at 16A and 16B in the partnership information 10 along with the name of the computer 4 stored at 14. The partnership information 10 includes configuration settings for services used by the user to transfer or copy data between the connected mobile device 3A or 3B and the desktop computer 4 as well as data necessary to perform a service. As used herein, a “service” is a single or group of functions made available to the mobile device that connects to the desktop computer 4 with the service installed. For example, a “Synchronization Service” is a service that specializes in the transfer of data between the connected mobile device 3A and the desktop computer 4, including replications, automatic file copy and/or update. Other services include a file conversion service that converts files between the connected mobile device 3A or 3B and the desktop computer 4 (for example, when the user specifies that one or a plurality of files be separately copied) so that data files can be accessed by each respective application program residing thereon. Another service includes synchronizing time and date clocks of the connected mobile device 3A and the desktop computer 4. A profile manager module 12 residing on the desktop computer 4 detects connection of the mobile device 3A or 3B to the desktop computer 4 and stores and/or accesses the partnership information 10 in the store 8 to allow each user convenient access to the desktop computer 4 and the partnership information 10 stored thereon. As will be explained, the partnership information 10 is stored as individual profile areas 13A and 13B corresponding to each of the respective mobile devices 3A and 3B. In one embodiment, the profile areas 13A and 13B comprise registry subkeys and individual profile folders for storing partnership specific information. Before describing aspects of the present invention, a brief description of the desktop computer 4 and a typical mobile device, such as mobile device 3A, will be helpful. FIGS. 2, 3 and 4 and the related discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described, at least in part, in the general context of computer-executable instructions, such as program modules, being executed by the desktop computer 4 or the mobile devices 3A and 3B. Generally, program modules include routine programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including other handheld devices, such as palmtop computers, multiprocessor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. With reference to FIG. 2, an exemplary system for implementing the invention includes a general purpose computing device in the form of a conventional personal or desktop computer 4, including a central processing unit (CPU) 21, a system memory 22, and a system bus 23 that couples various system components including the system memory 22 to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory 22 includes read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system (BIOS) 26, containing the basic routine that helps to transfer information between elements within the desktop computer 4, such as during start-up, is stored in ROM 24. The desktop computer 4 further includes a hard disk drive 27 for reading from and writing to a hard disk (not shown), a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31, such as a CD ROM or other optical media. The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and the associated computer-readable media provide non-volatile storage of computer readable instructions, data structures, program modules and other data for the desktop computer 4. Although the exemplary environment described herein employs the hard disk, the removable magnetic disk 29 and the removable optical disk 31, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read only memory (ROM), and the like, may also be used in the exemplary operating environment. A number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35, one or more of the application programs 7A-7D, other program modules 37, and program data 38. A user may enter commands and information into the desktop computer 4 through input devices such as a keyboard 40, a pointing device 42 and a microphone 43. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus 23, but may be connected by other interfaces, such as a sound card, a parallel port, a game port or a universal serial bus (USB). A monitor 47 or other type of display device is also connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the monitor 47, personal computers may typically include other peripheral output devices, such as a speaker and printers (not shown). The desktop computer 4 may operate in a wired or wireless networked environment using logic connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be another personal computer, a server, a router, a network PC, a peer device or other network node, and typically includes many or all of the elements described above relative to the desktop computer 4, although only a memory storage device 50 has been illustrated in FIG. 2. The logic connections depicted in FIG. 2 include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise-wide computer network Intranets and the Internet. When used in a LAN networking environment, the desktop computer 4 is connected to the local area network 51 through a network interface or adapter 53. When used in a WAN networking environment, the desktop computer 4 typically includes a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet. The modem 54, which may be internal or external, is connected to the system bus 23 via the serial port interface 46. In a network environment, program modules depicted relative to the desktop computer 4, or portions thereof, may be stored in the remote memory storage devices, not shown. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used. In the embodiment illustrated, the mobile device 3A also connects to the desktop computer 4 through the serial port interface 46. The desktop computer 4 runs an operating system that is stored in any of the memory storage devices illustrated in FIG. 2 and executes on the processing unit 21. One suitable operating system is a “WINDOWS” brand operating system sold by Microsoft Corporation, such as “WINDOWS 95” or “WINDOWS NT”, or other derivative versions of Windows brand operating systems, or another suitable operating system. Other suitable operating systems include systems such as “MACINTOSH OS” sold by Apple Corporation, and the “OS/2 PRESENTATION MANAGER” sold by International Business Machines (IBM). FIG. 3 is a pictorial illustration of one preferred embodiment of the mobile device 3A which can be used in accordance with the present invention. The mobile device 3A, in one embodiment, is a desktop assistant sold under the designation H/PC. The mobile device 3A has some components which are similar to those of the desktop computer 4. For instance, in one embodiment, the mobile device 3A includes a miniaturized keyboard 82, a display 84 and a stylus 86. The display 84 can be a LCD display having a contact-sensitive screen used in conjunction with the stylus 86. The stylus 86 is used to press or contact the display 84 at designated coordinates to accomplish certain user input functions. Of course, other configurations could be used as well. For example, user input mechanisms could be included such as a keypad, a track ball, and various types of miniaturized keyboards, or the like. In addition, the mobile device 3A may not be embodied as the H/PC brand of desktop assistant, but could also be implemented as another type of personal digital assistant (PDA), another personal organizer, a palmtop computer, a similar computerized notepad device, a phone or a pager. FIG. 4 is a more detailed block diagram of the mobile device 3A. The mobile device 3A preferably includes a microprocessor 88, memory 90, input/output (I/O) components 92 (which include the keyboard 82, and the touch sensitive display 84 and a serial interface 94). In one embodiment, these components are coupled for communication with one another over a suitable bus 96. The memory 90 can be implemented as non-volatile electronic memory such as a random access memory (RAM) with a battery back-up module (not shown) such that information stored in the memory 90 is not lost when the general power to mobile device 3A is shut down. A portion of memory 90 is preferably allocated as addressable memory for program execution, while the remaining portion of memory 90 is preferably used to simulate storage on a disk drive where memory 90, of course, can function as the store 6 in FIG. 1. Memory 90 includes an operating system 98 and the application programs 5A-5C. The operating system 98, during operation, is preferably executed by the microprocessor 88. The operating system 98, in one embodiment, is the “WINDOWS CEI ” brand operating system commercially available from Microsoft Corporation. The operating system 98 is preferably designed for mobile devices. The objects in the store 6 are preferably maintained by the application programs 5A-5C and the operating system 98, at least partially in response to calls to the exposed application program interfaces and methods. The application programs 5A-5C are not necessarily designed to be entirely compatible with corresponding application programs 7A-7D which execute on the desktop computer 4. For instance, there may not be precise one-to-one matching between the properties of specific object types. In addition to the application programs 5A-5C and the operating system 98, memory 90 further stores a registry 97 used in operating systems such as Windows CE brand operating systems. The use of registries such as the registry 97 is conventional and provides information relating to the application programs 5A-5C installed on the mobile devices 3A and 3B. In a preferred embodiment, the registry 97 stores user settings of the application as well as where particular files are to be stored in tree-type directories, which is a common technique used in many operating systems. For particular use in the present invention, the memory 90 further stores identifiers at 91A and 91B. The identifiers are unique for each partnership formed between the mobile device 3A and 3B and partnered computers, such as the desktop computer 4. By making the identifiers stored at 91A and 91B unique for each partnership formed, the mobile device 3A or 3B can have many partnerships with the desktop computer 4 for different uses, or a plurality of partnerships with different desktop computers. In one embodiment, the identifier stored at 91A corresponds to one of the profile areas 13A or 13B in the desktop computer 4, while the identifier stored at 91B corresponds to a profile area in another desktop computer. In a further embodiment, the mobile device 3A also stores a “Device Name” at 93 given by the user, as well as names at 95 and 99 of one or more desktop computers 4 that the mobile device 3A has been partnered with. If desired, this information can be stored in a part of the registry 97 or stored separately from the registry 97. In one embodiment, the desktop computer 4 stores similar information, including the name of the desktop computer 4, and for each partnership, the identifiers at 15A and 15B and the respective names at 16A and 16B of each partnered mobile device 3A or 3B. In order to provide easy and convenient interaction between the desktop computer 4 and a connected mobile device, for example, mobile device 3A illustrated in FIG. 1, it is preferable that the mobile device type or class first be registered with the desktop computer 4 so that upon connection of the mobile device 3A with the desktop computer 4, the desktop computer 4 can recognize the exact type or class of mobile device being connected and already have available appropriate parameter settings to interact with it. In one embodiment, registration includes copying a default profile information 100 such as a group of registry settings and/or default files into store 8 (FIG. 1) containing all necessary parameters to allow the desktop computer 4 to interact with the mobile device 3A. The default profile information 100 is then used when creating a user specific profile area, such as profile area 13A, or interacting with the desktop computer 4 as a guest, as discussed below. In one embodiment, a manufacturer of the mobile device 3A to be registered on the desktop computer 4 provides information each time it is connected to the desktop computer 4. This information can be obtained using suitable API calls known and used commonly in the art between devices. The information provided by the mobile device when connected to the desktop computer 4 is compared to other stored information during the registration process in order to detect the type of mobile device 3A being connected. Although in one embodiment, registration occurs during execution of a “setup program” provided by the manufacturer and executed on the desktop computer 4 to copy files from any of the removable mediums such as a CD disk, if desired, all registration information could be stored on the mobile device 3A and downloaded to the desktop computer 4 upon initial connection. FIG. 5 is a state or flow diagram illustrating various operating states and actions performed by the profile manager module 12. At state 120, the mobile device 3A is connected (if not already connected from the registration procedure) and the profile identifier 91A is read, if present. Operation then continues to state 122. At stated 122, the profile manager module 12 examines all of the stored profile identifiers in the partnership information 10 to determine if a match exists. In the exemplary embodiment, each profile area 13A and 13B stored in the desktop computer 4 is identified by a unique identifier (profile identifier) that is assigned at profile area creation time by a random number generator. The profile identifier is stored in the profile areas 13A and 13B, preferably along with a unique device name, a description of the mobile device and other device data. The profile identifier is used by the desktop computer 4 to refer to each particular profile area 13A and 13B stored therein. As discussed above, the profile areas 13A and 13B contain data or settings that are needed to provide the desired services to the connected mobile device 3A. The profile areas 13A and 13B stored in the desktop computer 4 correspond to the connected mobile devices 3A and 3B. Preferably, the mobile device 3A has one profile area 13A and 13B with the desktop computer 4. However, since unique profile identifiers are used for each partnership, it would be possible for the mobile device 3A to have multiple partnerships with the same desktop computer 4. A suitable user interface either on the desktop computer 4 or on the mobile device 3A would query the user as to which of the stored profile areas to use. Nevertheless, the data in each profile area 13A and 13B pertains to only that partnership and will not affect any other partnership. If a profile area 13A is found based on the profile identifier stored at 91A, operation of the profile manager module 12 proceeds to state 123, whereat the stored user settings are used and provided to any required service. If either the connected mobile device 3A or the desktop computer 4 has no profile identifiers in its list, or no match is found, operation of the profile manager module 12 proceeds to state 124. At state 124, the user is queried through a suitable user interface (UI) dialog box provided on the desktop computer 4 as to whether the user would like to log on as a guest or create a new user specific profile area 13A. If a user decides to interact as a guest, operation of the profile manager module 12 proceeds to state 126. At state 126, the profile manager module 12 uses the information gathered at connection, identifying the type of mobile device connected, and selects the correct default profile information 100 stored during the registration procedure. In one embodiment, one set of global or common default settings are stored in store 8 to be used by all devices unless otherwise overwritten. Each service has appropriate default settings for that service stored in this area. At the time of connection of the mobile device 3A, the default settings are copied for use as guest profile settings 101, if the user connects as a guest, or copied as new partnership profile settings discussed below, if the user elects to create a new partnership. The system then looks to see if there are default settings that should be changed based on the type of mobile device 3A detected. These default setting changes were stored during the registration of the mobile device 3A with the desktop computer 4. As a guest, the user could have access to all services available to partnered users, or to only a limited number of services. For example, the user may be limited to browsing the mobile device contents, transfer and/or organizing files on the mobile device 3A, or performing file conversion. In other situations, additional services may be provided such as synchronizing the clock of the mobile device 3A to the clock of the desktop computer 4 or loading application programs from the desktop computer 4 onto the mobile device 3A. Some of the settings may be adjustable and adjusted for the connection session, for example, a certain file conversion format to be used. However, at the end of the connection session when the user disconnects the mobile device 3A from the desktop computer 4, these settings will be lost. In the event the desktop computer 4 does not recognize the type of mobile device, a further limited number of services that are not dependent on the type of mobile device can be made available. In yet a further embodiment, if the mobile device user first connects as a guest, but then later decides to setup a partnership, the desktop computer 4 can query the user in the manner described below and save the guest profile settings 101 in a unique profile area 13A. If the user will not be interacting with the desktop computer 4 as a guest, the user can create a new profile area which will be stored on the desktop computer 4, and which is represented in FIG. 6 at state 128. The profile manager module 12 sets aside storage in the store 8 for the new profile area. In one preferred embodiment, a subkey is created in the registry of the desktop computer 4 for the mobile device 3A and a folder in file space on the store 8 is created. The profile manager module 12 obtains a copy of the default profile information 100 corresponding to the type of mobile device connected as discussed above and stores it in one or both of these areas as appropriate. For example, default files can be stored in the file area or folder. The profile manager module 12 assigns the profile identifier which will be stored in the profile area 13A and in the mobile device 3A at 91A. Preferably, the user is then queried to enter a unique device name for the connected mobile device 3A. In one embodiment, the default name of the mobile device 3A is obtained directly from the mobile device 3A and the user is asked whether it should be changed. In the embodiment illustrated, the unique device name is required so that the profile area 13A can be stored on the desktop computer 4 in a manner more easily recognizable to the user than under the profile identifier stored at 15A. As discussed above, the desktop computer 4 can store the profile area 13A under a directory of folder having the unique device name. In this manner, the user can locate the profile area 13 on the desktop computer 4 and access the profile area 13A through a suitable interface module that allows the user to change any of the service settings, or even delete the profile area 13A partnership information, and thus discontinue the partnership. In addition, if the user changes the unique device name stored at 93 on the mobile device 3A, for example, when the mobile device 3A is not connected to the desktop computer 4, upon reconnection to the desktop computer 4, the profile manager module 12 determines that the mobile device 3A does have an associated profile area 13A stored on the desktop computer 4 based on a comparison of the profile identifiers. However, the profile manager module 12 will also detect that the unique device name stored at 93 of the mobile device 3A has been changed. If the new unique device name stored at 93 for the mobile device 3A is not already present on any of the other profile areas 13A and 13B stored on the desktop computer 4, the profile manager module 12 will make appropriate corrections to the directory name in which the profile area is stored. In the preferred embodiment, a step in forming a partnership between the mobile device 3A and the desktop computer 4 involves retaining the desktop computer 4 name at 95 or 99 in the mobile device 3A. In one embodiment, the mobile device 3A is allowed to “partner” with up to two different desktop computers 4. Each of the names stored 95 and 99 of the desktop computers that the mobile device 3A is partnered with is retained in the mobile device 3A along with the unique profile identifiers 91A and 91B as described above. In a preferred embodiment, the mobile device 3A is limited in the number of desktop computers that it can be partnered with. For example, the mobile device 3A can be limited to form only two partnerships with the desktop computers. If the user attempts to form a partnership with a desktop computer in excess of those allowed, the user is prompted as to which previous desktop computer partner should be deleted prior to forming a profile area on the new desktop computer and, thus, forming a partnership therewith. If the user chooses not to form a new partnership with a new desktop computer, or has formed all allowable partnerships, the user can create the guest profile area 101 with the desktop computer and interact as a guest. After the profile area 13A has been successfully created and stored on the desktop computer 4 and a partnership has been formed, the profile manager module 12 can access various settings and present the settings to the user to capture user preferences for mobile device services. In one embodiment, the service provider provides all user interfaces necessary to change the settings, where the user interfaces are stored on the desktop computer 4 and accessible to the profile manager module 12. In this manner, the profile manager module 12 can accommodate new services easily. In one embodiment, the profile manager module 12 assists the user in specifying information that the service needs in order to provide the service to the mobile device. Generally, the user will be provided an opportunity to change commonly adjusted settings for common services. Appropriate default values will be provided for all service settings. Preferably, appropriate defaults for each setting are provided such that the user will not need to adjust settings, except in special situations. Examples follow for settings that do not have obvious defaults. For example, if the synchronization service is used in order to synchronize a calendar application provided on the desktop computer 4 with a calendar application provided on the mobile device 3A, the synchronization service needs to know which calendar applications and data files are being used. Likewise, a preference can be set in the user settings to resolve conflicts between similar objects stored in the mobile device 3A and the desktop computer 4. For example, the user can modify the user setting in the profile area 13A indicating that if any conflicts were to arise, the synchronization service should resolve the conflict automatically and use the value or objects stored on the desktop computer 4. Likewise, if the user prefers, the user can modify this setting and resolve the conflict in favor of the value or the object stored in the mobile device 3A. In yet a further example, the user can modify this setting so that the user is prompted during synchronization to resolve the conflict manually. Another user setting can be modified in the profile areas 13A and 13B to indicate that upon connection of the mobile device 3A to the desktop computer 4, the time and/or date residing on the mobile device 3A will be synchronized with that of the desktop computer 4. Other user settings in the profile area 13A can be used to indicate automatic file conversions when the user either synchronizes data or transfer files between the mobile device 3A and the desktop computer 4. Typically, default settings are provided by the manufacturer upon registration of the mobile device 3A with the desktop computer 4 which are then subsequently copied when a new profile area 13A and 13B is created. Default settings can also be supplied by new services available on the desktop computer 4. The default settings will thus allow application programs residing on the mobile device 3A to synchronize with similar application programs found on the desktop computer 4, but stored in a different format. Many times, the user will not need to change these default settings. However, in some circumstances, it may be necessary for the user to select automatic file conversion when the application programs residing on the mobile device 3A differ from the application programs residing on the desktop computer 4. For instance, the user may have a first type of word processor residing on the mobile device 3A and a second type of word processor residing on the desktop computer 4. In order to obviate the need for either one of the word processors to read a document stored in the other format, by modifying the user settings in the profile area 13A, the user can specify that file conversion take place automatically upon file transfer. Another service available to the user is a “backup/restore” service . This service allows the user to backup data contents stored in the mobile device 3A to the desktop computer 4 and, in the event of data loss, restore any or all of the backed up files. In view that many mobile devices can be partnered with the desktop computer 4, it is preferable to store the backup files in a manner such that they are not overwritten. In the present invention, the profile folders have the unique device name of each mobile device 3A and 3B and are used to store all file-based information that is specific to the mobile device 3A and 3B, including backup files. Special care may have to be taken when the user elects to restore to a mobile device. The restore operation also restores the partnership information 10 to the mobile device (the profile identifiers stored at 91A and 91B and the partnered computer names stored at 95 and 99). If mobile devices are allowed to restore the profile identifier intact, several identical mobile devices can be created having the same profile ID. This would allow several mobile devices to connect to the desktop computer 4 and use the same profile area 13A. This could easily result in confusion to the user, if not data loss. To prevent this, one or more of the profile identifiers stored on the mobile device 3A are invalidated when they are restored. A new profile identifier will be stored at 91A on the mobile device 3A at restore time for the current desktop computer 4 partnership. The desktop computer 4 will then immediately delete the old profile identifier and insert the new profile identifier where necessary. Another aspect of the present invention includes synchronization of data between a mobile device and computers of at least two partnerships. For purposes of explanation, this aspect of the present invention will be described in the context of a personal information manager (PIM). PIMs typically comprise applications which enable the user of the mobile device to better manage contacts, scheduling, communications and other such tasks. Some commercially available PIMs are sold under the brand name “SCHEDULE&plus;” and “OUTLOOK” by the Microsoft Corporation. Hereinafter, application program 7A is a PIM program and will simply be referred to as PIM 7A. Object store 8 is memory which is configured to store a plurality of individual records or objects, each comprising a plurality of fields or properties related to PIM data. Desktop computer 4 executes the application program identified as PIM 7A to maintain objects stored in object store 8. In this illustrative embodiment, the application program designated as 5A for mobile devices 3A and 3B is a similar PIM to that stored on desktop computer 4. Object stores 6 on mobile devices 3A and 3B are configured to store a plurality of individual records or objects, each comprising a plurality of fields or properties related to PIM data. Each mobile device 3A and 3B executes PIM 5A to maintain the objects in each respective object store 6. With respect to mobile device 3A for purposes of explanation, each object stored in object store 8 can also be stored in object store 6. However, there are actually two instances of each object (one in object store 6 and one in object store 8). Thus, when a user changes one instance of the object stored in either store 6 or store 8, the second instance of that object in the other of stores 6 and 8 is preferably updated the next time mobile device 3A is connected to desktop computer 4 so that both instances of the same object contain up-to-date data. This is referred to as synchronization. In order to accomplish synchronization, synchronization components run on both mobile device 3A and desktop computer 4. The synchronization components communicate with PIMs 5A and 7A on mobile device 3A and desktop computer 4 through well defined interfaces to manage communication and synchronization. The synchronization components of mobile device 3A and desktop computer 4 preferably communicate with each other using socket services (such as Winsock services) which may use any suitable, and commercially available, communication mechanism 9, and using a suitable communications protocol. For instance, in one preferred embodiment, mobile device 3A is connectable to desktop computer 4 with a physical cable which communicates using a serial communications protocol. Other communication mechanisms are also contemplated by the present invention, such as infrared (IR) communication, direct modem communication, remote dial-up networking communication, communication through commercially available network cards (i.e., using TCP/IP), remote access services (RAS), wireless modem, wireless cellular digital packet data (CDPD), or other suitable communication mechanisms. FIG. 6 is an architectural block diagram illustrating one embodiment of architectural components of mobile device 3A and desktop computer 4 which are used in synchronizing objects stored in object store 6 on mobile device 3A and object store 8 on desktop computer 4. In addition to PIM 5A and object store 6, mobile device 3A includes synchronization interface component 150, synchronization manager 152, communications component 154 and remote application programming interface (RAPI) server 156. Desktop computer 4 includes, in addition to PIM 7A and object store 8, synchronization interface component 158, synchronization manager 160, reference store 162, RAPI component 164, and communications component 165. Many of the components shown in FIG. 6 are used primarily to implement a suitable synchronization protocol. Generally, synchronization manager 160 executes on desktop computer 4 and orchestrates synchronization between objects in object store 6 in mobile device 3A, and objects in object store 8 in desktop computer 4. Synchronization manager 160 also maintains reference store 162 apart from desktop object store 8 as is described in greater detail below. Synchronization manager 160 implements the synchronization protocol to allow a comparison between corresponding objects stored in object store 6 in mobile device 3A and object store 8 in desktop computer 4, to receive objects from object store 8, and to update objects in object store 8. The synchronization protocol also facilitates the retrieval of objects stored in object store 6 in mobile device 3A through synchronization interface component 150 and synchronization manager 152, as well as communications component 154. On the side of mobile device 3A, the synchronization interface component 150 exposes application programming interfaces which synchronization manager 152 calls to read and store objects and object properties on object store 6. In general, the application programming interfaces allow the creation of databases for different types of objects, and allow application programs to write and read property names and values to and from respective objects within object store 6. As discussed above, PIM 5A executes on mobile device 3A and maintains object store 6. PIM 7A executes on desktop computer 4 and maintains object store 8. There are many different ways which PIMs 5A and 7A can store objects in object stores 6 and 8. However, in one embodiment, PIMs 5A and 7A create a distinct database for each object type. For example, different databases are created for appointments, tasks, electronic mail messages, etc. A predefined set of properties is supported for each object type, and each of the databases is assigned a name by the application program that creates it. In an alternative embodiment, the application programs in PIMs 5A and 7A may use a single database for all object types, with the first property of each object defining the type of object. In any case, objects are uniquely identified within mobile device 3A and desktop computer 4 by object identifiers which are independent of the names assigned by the application programs creating the object. Synchronization manager 160 is not necessarily closely associated with PIM 7A. Rather, it is an independent component which synchronizes objects from any application program that supports the appropriate desktop synchronization interfaces. Communication components 154 and 165 implement serial communications between the computers using connection mechanism 9. Synchronization manager 160 communicates with PIM 7A and accesses object store 8 through synchronization interface component 158. Synchronization interface component 158 corresponds generally to a dynamic linked library (DLL), and exposes one or more application program interfaces and methods. The interfaces and methods are preferably of the form known as store interfaces such as IreplStore and IreplObjHandler developed and published by the Microsoft Corporation for “WINDOWS” brand operating system platforms. Those interfaces may, in turn, use interfaces such as messaging application programming interfaces (MAPI) and/or OLE Automation (or any other application programming interface) to communicate with the underlying PIM and object store. In one embodiment, the MAPI exposed by component 158 is a C-language application programming interface which allows programmable access to features of an electronic mail messaging program known as Exchange also commercially available from the Microsoft Corporation. In another embodiment, the MAPI exposed by component 158 is a component object model based (COM-based) set of interfaces which is sometimes referred to as extended MAPI and includes a set of automation interfaces to messaging systems, for use in Visual Basic and the like. However, synchronization interface component 158 and the associated application program interfaces and methods can be any suitable synchronization interface components designed for any particular application in PIM 7A. Because the application program interfaces are preferably standardized, they allow synchronization manager 160 to access and synchronize any number of different desktop PIMs, as long as the required interface methods are implemented for each PIM. Reference store 162 provides a mapping between instances of objects stored in object store 6 on mobile device 3A and objects stored in object store 8 on desktop computer 4. Since the same object identifiers are not used by PIM 5A to identify objects on object store 6 as are used by PIM 7A to identify objects in object store 8, this mapping is required. Synchronization manager 160 maintains reference store 162 so that reference store 162 contains the identifying data segments corresponding respectively to a plurality of object instances in object store 8 on desktop computer 4 that are to be synchronized with instances of the same object in object store 6 on mobile device 3A. The identifying data segments are updated each time corresponding object instances have been synchronized. The exact composition of an identifying data segment which is used to identify the particular object instances are assignable by the developer of the desktop synchronization interface component 158, and are then handled and stored by synchronization manager 160. The identifying data segments preferably include some sort of time stamp information which can be compared to determine whether an object has changed since the identifying data segment was last recorded in reference store 162. In addition to maintaining a plurality of identifying data segments, synchronization manager 160 also maintains a list of object identifiers corresponding to objects maintained in object store 6. These identifiers are provided to synchronization manager 160 whenever a new object is added to object store 6 on mobile device 3A. The protocol by which full synchronization is accomplished with the present system is described in greater detail in U.S. patent application Ser. No. 08/958,658 filed Oct. 27, 1997, now U.S. Pat. No. 6,125,369 issued on Sep.26, 2000, entitled “OBJECT SYNCHRONIZATION BETWEEN OBJECT STORES ON DIFFERENT COMPUTERS” assigned to the same assignee as the present application, and which is fully incorporated by reference. However, a brief discussion of that protocol is helpful in understanding the context of the present invention. In order to synchronize objects, synchronization manager 160 first creates two lists of handles which refer to particular objects. The term “handle” refers to a number or other identifier that can be used to uniquely identify an object and to access the object. Generally, a handle is valid for a particular time period or session, such as during the time when an object has been “opened”. If the same object is opened again, its handle may be different. The first list of handles is obtained from reference store 162 and is indicative of objects which have been synchronized in the past and are identified in reference store 162. The second list of handles is a list which identifies the objects stored on object store 8. The two lists of handles are compared against one another to determine whether the same objects are stored in reference store 162 and object store 8. If an object is identified in reference store 162, but not in object store 8, that particular object has been deleted from the desktop 4 since the last synchronization. On the other hand, if an object is identified in object store 8, but it does not appear in reference store 162, then it has been added to the desktop since the last synchronization. In either case, synchronization manager 160 determines how to handle the object. In one preferred embodiment, those objects which have been deleted from desktop object store 8 are also deleted from reference store 162. Further, those which have been added to object store 8 are also added to reference store 162. Synchronization manager 160 then determines whether any of the objects stored in object store 8 have been modified at the desktop since the last synchronization. In other words, if handles corresponding to the same object appear in both object store 8 and reference store 162, but they are not identical (such as the time stamp, a revision number, or another suitable identifying segment is not the same) that indicates that the object in object store 8 has been modified since the last synchronization. Synchronization manager 160 then determines whether any objects stored in object store 6 on mobile device 3A have been added or modified since the last synchronization. To determine whether an object has been added or deleted to object store 6, synchronization manager 160 compares the list of objects in reference store 162 (which reflects all objects at the last synchronization) with a list of objects on object store 6 maintained by synchronization manager 152. To determine whether an existing object has been modified, synchronization manager 152 is configured to maintain in status bits associated with each object stored in object store 6. In particular, a status bit is maintained for each partnership that is formed between the mobile device 3A and partnered desktop computers. Referring back to FIG. 4, one status bit is associated with the partnership identified by identifier 91A and another status bit is associated with the partnership identified by identifier 91B. The status bits reflect whether the particular object associated with that bit has been changed since the last synchronization with each respective partnered desktop computer. If so, synchronization manager 152 notifies synchronization manager 160 of that change, if device 3A is then coupled to desktop computer 4, or simply logs the appropriate status bit and sends it to synchronization manager 160 the next time device 3A is coupled to desktop computer 4. In one embodiment, the operating system of the mobile device 3A sets the status bits when there has been a change to an object, while the synchronization manager 152 clears the appropriate status bit when the mobile device 3 has been synchronized with one of the partnered desktop computers. It should be noted that none of these procedures require either synchronization manager 160 or synchronization manager 152 to be aware of the particular nature or format of the identifying data segments or of the objects to which they correspond. Rather, interface components 150 and 158 are called upon for all actions that depend upon the actual content of the identifying data segments, and the content of the objects. It is up to the designer of those interfaces to define a format for the identifying data segments that allows the interfaces to perform their required functions. Once the changes, additions and deletions are determined by synchronization manager 160, the items are synchronized. In order to do this, synchronization manager 160 forms a list of objects which have been changed on either object store 8 or object store 6 and simply calls upon the respective synchronization interface components to update the outdated object. If the same object has been modified both on mobile device 3A and desktop computer 4, a conflict arises. Synchronization manager 160 resolves the conflicts by either prompting the user, or referencing profile information, discussed above. Where an object has either been created at the desktop computer 4 or in the mobile device 3A, that object needs to be exchanged with the other device. In the instance where mobile device 3A needs to obtain a new object from desktop computer 4, synchronization manager 160 calls an interface method known as “Set-Up” which specifies a handle for the object to be obtained from object store 8 in desktop computer 4 and transferred to object store 6 in mobile device 3A. Once the handle is obtained, the method known as “GetPacket” is called repeatedly to retrieve a data stream which represents the object, and which is formatted by interface component 158. Synchronization manager 160 simply treats the data as a data stream which is retrieved and sent over mechanism 9 to synchronization manger 162, and eventually to object store 6. The appropriate synchronization interface component 150 parses the data stream in order to identify certain property values associated with properties corresponding to the object. Those properties are then stored in the object store 6. Finally, synchronization manager 160 updates the identifying data segments associated with either synchronized or exchanged objects and stores the updated data segments in reference store 162. Due to the limited available memory typically found on the mobile device 3A, it is often desirable to set up a “filter” when synchronizing objects from object store 8 of the desktop computer 4 to object store 6 of the mobile device 3A. A filter is a set of rules that determine if a desktop computer object 5 should be synchronized with the mobile device 3A. If a desktop computer object is determined not to be synchronized (i.e. outside of the limits of the filter), its corresponding object on the mobile device 3A is removed. In other words, rather than maintaining all of the objects in object store 8 as corresponding objects in the object store 6, only a subset of the objects in object store 8 are maintained as objects in the object store 6. In this manner, only the most current information is stored on the mobile device 3A and made available to the user. The “rules” of the filter can take many forms, such as a particular type of data or file, directory or folder that will be synchronized. In another example, the rules can pertain to a period of time, for instance, where the mobile device 3A stores PIM information for future events and recent past events, such as meetings or appointments, and the desktop computer 4 stores all events, including archiving all past events. In the architecture of FIG. 6, the filtering function is performed by synchronization manager 160. Problems, however, can arise when the mobile device 3A is partnered with and synchronizing data with two different desktop computers 4. These problems may be best illustrated by way of an example. Assume today is October 8, and the following appointments (objects) are currently stored on the mobile device 3A: (a) Meeting with John on Oct. 5; (b) Lunch with David on Oct. 7; (c) Meeting with Sue on Oct. 9; and (d) Dinner with Anne on Oct. 12. Assume also that the filtering function performed by synchronization manager 160 on the first partnered desktop computer is configured to synchronize only appointments in the last two days and the current day. Upon connection of the mobile device 3A to the first partnered desktop computer, only appointment (b) above is within the selected filter parameters. Thus, the following steps will be performed during synchronization: (A1) Objects (a), (b), (c) and (d) will be created and stored in object store 8 of the desktop computer 4; and (A2) Objects (a), (c) and (d) will be deleted from object store 6 of the mobile device 3A due to being outside of the filter parameters; and (A3) The identifying data segment for object (b) will be stored in the reference store 162 for first desktop computer 4. Accordingly, at the end of synchronization, only object (b) remains in the object store 6 of the mobile device 3A. Now assume that a second partnered desktop computer has the same set of appointments in its object store 8 and the filtering function performed by synchronization manager 160 is to synchronize only appointments occurring the next day. When the mobile device 3A is connected to the second partnered desktop computer, synchronization manager 160 determines that only appointment (c) in the object store 8 is within the filtering parameters, and that appointment (b), currently on the mobile device 3A, is not within the filter parameters. Thus, the following steps are performed during synchronization: (B1) Object (b) on the mobile device 3A is removed due to being outside of the filter parameters; and (B2) Object (c) on the second desktop computer is copied to the mobile device 3A ; and (B3) The identifying data segment for object (c) will be stored in the reference store 162 for second desktop computer 4. At the end of synchronization with the second desktop computer, only appointment (c) remains on the mobile device 3A. Assume now that the mobile device is once again reconnected back to the first partnered desktop computer having the same filter parameters as set forth above. The following steps are then performed during synchronization: (C1) Object (c) is removed from the mobile device 3A because it is outside the filter parameters; and (C2) Because object (b) was in the reference store 162 of the first desktop 4 but is no longer on the mobile device 3A, it is assumed to have been deleted by the user. This assumed action is then propagated to the first desktop computer and object (b) is deleted from the first desktop computer, erroneously. The first partnered desktop computer has interpreted that since an object is no longer on the mobile device 3A, which was there on the previous synchronization, the user has intentionally deleted it. Accordingly, the first partnered desktop computer will delete the corresponding object in its object store. However, from the example above, deletions could have been performed because the object did not fall within the filter parameters of the second partnered desktop computer. In this situation, data can be easily lost. An aspect of the present invention addresses the problems associated with multiple partnered desktop computers operating different filtering functions. Generally, the method includes dynamically determining if the mobile device is configured or partnered with two or more desktop computers. If such is the case, programmatic deletion of objects on the mobile device that are outside the filter parameters (steps A2, B1, C1 above) will be suspended during synchronization. This will then prevent the other desktop partner from interpreting the filtered object as a user deletion. Objects deleted by a user will still be propagated to desktops regardless of whether they match the filter window. FIG. 7 is a flow chart illustrating an exemplary method in accordance with this aspect of the present invention. At step 170, the mobile device 3A is connected to the desktop computer 4. Synchronization manager 160 ascertains whether the mobile device 3A has one or two identifiers 91A and 91B. At step 172, if there are at least two identifiers 91A and 91B present on the mobile device 3A, a status flag is set at step 174. At step 176, synchronization is performed. However, if the status flag is set, objects will not be deleted from the object store 6 of the mobile device 3A. If, on the other hand, the status flag is clear or reset, a command will be sent to the mobile device 3A to remove the object from the object store 6. In this manner, objects will not be appearing and disappearing or inadvertently deleted from the other partnered computer. 1. A method of interaction between a computer and a plurality of mobile devices, the method comprising: storing a first identifier on a first mobile device and the computer; storing a second identifier on a second mobile device the second identifier being different than the first identifier; storing a first set of settings in the computer referenced to the first identifier for the first mobile device; obtaining a set of default settings stored on the computer; comparing the respective identifier stored on the mobile device with the first identifier stored on the computer upon connection of one of the mobile devices to the computer; controlling interaction between the connected mobile device and the computer as a function of the stored respective set of settings if corresponding identifiers are found; and controlling interaction between the connected mobile device and the computer as a function of the default settings if corresponding identifiers are not found. 2. The method of claim 1 wherein the first mobile device and the second mobile device are not substantially similar. 3. The method of claim 1 wherein if corresponding identifiers are not found, a second set of settings and a second identifier referenced to the identifier on the connected mobile device is stored on the computer. 4. The method of claim 3 wherein a user may alter the second set of settings. 5. The method of claim 1 and further comprising storing a unique device name for each of the mobile devices in the computer referenced to each respective identifier. 6. The method of claim 5 and further comprising accessing each set of stored settings on the computer as a function of the device name of the mobile device. 7. The method of claim 5 and further comprising obtaining the device name from the mobile device when connected to the computer and checking the device name with the device name stored on the computer. 8. The method of claim 7 and further comprising changing the device name on the computer to match the device name of the mobile device if corresponding identifiers are found. 9. The method of claim 1 and further comprising storing a set of guest settings, and wherein the step of controlling interaction between the connected mobile device and the computer as a function of the stored set of guest settings if corresponding identifiers are not found. 10. The method of claim 9 wherein the step of storing a set of guest settings includes obtaining a set of default settings. 11. The method of claim 10 and further comprising detecting the type of mobile device when connected to the computer and changing at least one of the default settings as a function of the type of device detected. 12. The method of claim 1 and further comprising storing a name of the computer on each mobile device in association with each identifier. 13. The method of claim 1 and further comprising detecting the type of mobile device when connected to the computer and changing at least one of the default settings as a function of the type of device detected. 14. An interactive computer system comprising: a first mobile device having a first identifier stored thereon; a second mobile device having a second identifier stored thereon, the second identifier being different than the first identifier; and a computer selectively couplable to each of the mobile devices, the computer having a set of settings referenced by an identifier to at least one of the first identifier and the second identifier, the computer comparing the respective identifier stored on the mobile device with the identifier stored on the computer upon connection of one of the mobile devices to the computer, and controlling interaction between the connected mobile device and the computer as a function of the stored respective set of settings if corresponding identifiers are found, and controlling interaction between the connected mobile device and the computer as a function of a set of default settings if corresponding identifiers are not found. 15. The system of claim 14 and wherein the computer stores a device name for each of the mobile devices referenced to each respective identifier. 16. The system of claim 15 and wherein the computer includes a module for accessing each set of stored settings on the computer as a function of the device name of the mobile device. 17. The system of claim 14 where in the first mobile device and the second mobile device are not substantially similar. 18. A method of interaction between a computer and a plurality of mobile devices, the method comprising: creating a first set of settings controlling interaction of a first type of mobile device with the computer; creating a second set of settings controlling interaction of a second type of mobile device with the computer; storing the first and second set of setting on the computer; detecting the type of the mobile device when the mobile device is connected to the computer; accessing the first and second set of settings to control interaction of the computer with the mobile device as a function of the type detected; and assigning an identifier to identify a connected mobile device when connected to the computer; storing the identifier in the connected mobile device and the computer; and storing a third set of settings based on one of the first and second set of settings corresponding to the type of the connected mobile device, the third set of settings being referenced to the identifier. 19. The method of claim 18 wherein the step of storing the third set of settings includes storing a copy of one of the first and second set of settings. 20. The method of claim 19 and further comprising changing at least one setting of the third set of settings. 21. A method of interaction between a computer and a mobile device, the computer storing backup data for the mobile device referenced to a first identifier, the method comprising: connecting the mobile device to the computer; restoring the backup data to the mobile device from the computer; obtaining a second identifier different than the first identifier; storing the second identifier on the mobile device; and changing the first identifier on the computer to the second identifier. 22. The method of claim 21 wherein the mobile device includes a third identifier for interaction with a second computer, the method including invalidating the third identifier. 23. A method of interaction between a first computer and a mobile, device, and a second computer and the mobile device, the method comprising: ascertaining if the mobile device is configured to synchronize data with both the first and second computers; creating data on the first and second computers in accordance with data on the mobile device; deleting data on the mobile device as a function of whether the mobile device is configured to synchronize data with both the first and second computers. 24. The method of claim 23 wherein the step of ascertaining includes setting a status flag if the mobile device is configured to synchronize with both the first and second computers, and wherein the step of deleting data includes deleting data on the mobile device as a function of the value of the status flag. 25. The method of claim 23 wherein the mobile device stores a first identifier if the mobile device is configured to synchronize data with the first computer, and the mobile device stores a second identifier if the mobile device is configured to synchronize data with the second computer, and wherein the step of ascertaining includes ascertaining the number of identifiers on the mobile device. 26. A method of interaction between a mobile device and a plurality of computers, the method comprising: storing a first identifier on the mobile device and a first computer; storing a second identifier on the mobile device and a second computer, the second identifier being different than the first identifier; storing a first set of settings in the first computer referenced to the first identifier; storing a second set of settings in the second computer referenced to the second identifier; comparing each identifier stored on one of the computers with each identifier stored on the mobile device upon connection of said one of the computers to the mobile device; and controlling interaction between the connected computer and the mobile device as a function of the stored respective set of set settings if corresponding identifiers are found. 27. The method of claim 26 and further comprising storing a computer name for each of the first and second computers referenced to each respective identifier. 28. The method of claim 26 wherein the steps of storing a first set of setting and storing a second set of settings each includes obtaining a set of default settings. 29. The method of claim 26 and further comprising detecting the type of mobile device when connected to said one computer, and changing at least one of the default settings as a function of the type of device detected. a first computer having a first set of settings referenced to a first identifier; a second computer having a second set of settings referenced to a second identifier, the second identifier being different than the first identifier; a mobile device couplable to each of the computers, the mobile device having the first identifier and the second identifier stored thereon; and wherein upon connection of the mobile device with one of the computers, said one of the computers compares each identifier with the identifier stored thereon and controls interaction between the mobile device and said one of the computers as a function of the stored respective set of settings if corresponding identifiers are found. storing a first identifier on a first mobile device and a. computer; storing a second identifier on a second mobile device and a computer, the second identifier being different than the first identifier; storing a set of settings in the computer referenced to a stored identifier for at least of the first mobile device and the second mobile device; storing a set of guest settings in the computer; comparing the identifier on the mobile device with the identifier stored on the computer upon connection of one of the mobile devices to the computer; controlling interaction between the connected mobile device and the computer as a function of the guest settings if corresponding identifiers are not found. 32. The method of claim 31 wherein the step of storing a set of guest settings includes obtaining a set of default settings. 33. The method of claim 32 and further comprising detecting the type of mobile device when connected to the computer, and changing at least one of the default settings as a function of the type of device detected. 5247683 September 21, 1993 Holmes et al. 5337044 August 9, 1994 Folger et al. 5392390 February 21, 1995 Crozier 5414844 May 9, 1995 Wang 5497464 March 5, 1996 Yeh 5522089 May 28, 1996 Kikinis et al. 5542046 July 30, 1996 Carlson et al. 5555416 September 10, 1996 Owens et al. 5564070 October 8, 1996 Want et al. 5598536 January 28, 1997 Slaughter, III et al. 5625829 April 29, 1997 Gephardt et al. 5664228 September 2, 1997 Mital 5666530 September 9, 1997 Clark et al. 5666553 September 9, 1997 Crozier 5684990 November 4, 1997 Boothby 5717737 February 10, 1998 Doviak et al. 5721824 February 24, 1998 Taylor 5721835 February 24, 1998 Niwa et al. 5727159 March 10, 1998 Kikinis 5727202 March 10, 1998 Kucala 5742829 April 21, 1998 Davis et al. 5790800 August 4, 1998 Gauvin et al. 5812819 September 22, 1998 Rodwin et al. 5845090 December 1, 1998 Collins, III et al. 5860012 January 12, 1999 Luu 5864708 January 26, 1999 Croft et al. 5887063 March 23, 1999 Vardharajan et al. 5896369 April 20, 1999 Warsta et al. 5918016 June 29, 1999 Brewer et al. 5958006 September 28, 1999 Eggleston et al. 5974238 October 26, 1999 Chase, Jr. 5983176 November 9, 1999 Hoffert et al. 6000000 December 7, 1999 Hawkins et al. 6006274 December 21, 1999 Hawkins et al. 6128661 October 3, 2000 Flanagin et al. WO 94/15294 July 1994 WO WO 94 15294 July 1994 WO Date of Patent: Aug 7, 2001 Assignee: Microsoft Corporation (Redmond, WA) Inventors: Steve Flanagin (Redmond, WA), George Hu (Redmond, WA), Haresh G. Ved (Bellevue, WA), Charles Wu (Bellevue, WA) Primary Examiner: Krisna Lim Attorney, Agent or Law Firms: Westman, Champlin & Kelly, P.A., S. Koehler Current U.S. Class: Session/connection Parameter Setting (709/228); Computer-to-computer Session/connection Establishing (709/227); Multicomputer Synchronizing (709/248); Distributed Data Processing (709/201)
cc/2019-30/en_head_0021.json.gz/line1730302
__label__cc
0.634248
0.365752
Justia Patents ConductiveUS Patent for Secure credit card with near field communications Patent (Patent # 7,128,274) Secure credit card with near field communications Mar 24, 2005 - IBM A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time. Latest IBM Patents: Dynamic cybersecurity protection mechanism for data storage devices Network flow control of Internet Of Things (IoT) devices DISTRIBUTED LOAD-BALANCING FOR SOFTWARE DEFINED NETWORKS COGNITIVE PERSONALIZED RETAIL PRICE TAGS BASED ON SHAKE SIGNATURE ADAPTIVE COMPRESSION FOR DATA SERVICES The present invention generally relates to so-called smart cards and, more particularly to alternative uses of highly secure credit/identification cards and, more particularly, to providing such functions through a near field communications infrastructure. 2. Description of the Prior Art Proliferation of fraudulent activities such as identity theft, often facilitated by streamlining of electronic financial transactions and the proliferation of credit and debit cards often used in such transactions, has led to great interest in techniques for improving security and authentication of the identity of a user of such credit and debit cards. In particular, the streamlining of transactions has led to the proliferation of credit card readers which read information from a magnetic stripe formed on a surface of a credit card and which are often integrated with point-of-sale terminals such as cash registers and fuel pumps. In such cases, it is left to the customer to manipulate the card through the reader where the card is read and, in some cases, the read information is used to automatically print a memorandum of the transaction for signature by the customer to complete the transaction. In other cases, such as transactions at fuel pumps, no action is taken by sales personnel at all and the transaction is completed automatically based only on the information read from the credit card and with no verification of customer identity. In such streamlining of transactions the principal amount of time and effort saved is at the expense of the small and possibly unreliable but very important safeguard provided by the opportunity for sales personnel to at least compare the signature of a customer on a sales memorandum with the signature on the credit card to authenticate customer identity and possibly detect unauthorized use of the credit card. Nevertheless, loss of this important security feature is evidently considered by the public, merchants and financial institutions to be more than balanced by the capability for worldwide, near real-time tracking of credit card use and usage profiling provided by the reading of credit card data and immediate communication to financial institutions to accept or reject any individual transaction as well as the expediting of transactions and the continuity of possession of the credit card by the customer. On the other hand, the monitoring of credit card transactions and transaction profiling may also cause rejection of transactions which are, in fact, legitimate such as those of a person who may travel only infrequently, causing attempted transactions while traveling to be rejected since the identity of the credit card user cannot be authenticated based on magnetic stripe information and temporally proximate transactions at remote locations, as might occur due to transactions immediately before and after air travel, may lead to an inference of credit card theft. Recent advances in semiconductor technology, particularly extremely thin substrates, has also allowed chips to be fabricated with substantial mechanical flexibility and robustness adequate for inclusion of electronic circuits of substantial complexity within conveniently carried cards physically similar to credit cards currently in use. Such technology has also allowed records of substantial information content to be similarly packaged and associated with various articles, living organisms or persons such as maintenance records for motor vehicles or medical records for humans or animals. In regard to increase of security for financial transactions however, various attempts to increase security through improved identity authentication or disablement in case of theft or other misuse, while large in number and frequently proposed have not, until recently, proven adequate for the purpose. However, a highly secure credit or debit card design has been recently invented and is disclosed in U.S. Pat. No. 6,641,050 B2, issued Nov. 4, 2003, and assigned to the assignee of the present invention, the entire disclosure of which is hereby fully incorporated by reference for details of implementation thereof. In summary, the secure credit/debit card disclosed therein includes a keyboard or other selective data entry device, a free-running oscillator, an array of electronic fuses (e-fuses) or other non-volatile memory, a processor, a pair of linear feedback shift registers (LFSRs) and a transmitter/receiver to allow communication with an external card reader. The card is uniquely identified by a unique identification number and the programming of e-fuses which control feedback connections for each of the LFSRs, one of which is used as a reference and the other is used in the manner of a pseudo-random number generator, the card identification number and the feedback connections together forming a pre-initialized personality configuration of the card. The card is activated only for short periods of time sufficient to complete a transaction by entry of a personal identification number (PIN) that can also be permanently programmed into the card. When the card is activated and read by a card reader, the two sequences of numbers generated by the LFSRs are synchronously generated and a portion thereof is communicated to a reader which not only authenticates the number sequences against each other and the card identification number but also rejects the portion of the sequence if it is the same portion used in a previous transaction to guard against capture of the sequences by another device. This system provides combined authentication of the holder/user and the card, itself, together with encryption of transaction information unique to each card which renders the card useless if stolen while providing highly effective protection against simulation and/or duplication of the card or capture of information from it and has proven highly effective in use. However, in its preferred form and to obtain the highest levels of security, a special reader including a complementary receiver and transmitter is required to, in effect, allow direct communication in real-time between the secure credit card and the authentication processor at the financial institution or other authorization facility. While such special readers may be manufactured in quantity and distributed at relatively low cost and do not require a change in the communication system for reporting authentication and transaction information to a financial institution, the number of communications may cause some noticeable delay in completion of transactions. Further, implementing the system of the above-incorporated patent may require an extended period of time and the special readers may be subject to some degree of wear or damage in use which may compromise the functionality thereof. Such a compromise of functionality may reduce the acceptability of the secure credit/identification card system and cause erroneous rejection of transactions, particularly when it is considered that number sequences of significant length must be communicated error-free in order to authorize a transaction. Provision of power to support even the relatively rudimentary communications involved with the above-incorporated secure credit/identification card has also presented relatively intractable problems compromising reliability when in use. So-called near field communication (NFC) systems have recently become known and standards for NFC systems have recently been ratified. In accordance with that standard, NFC systems are limited to a range of only about 10 cm and are capable of a bit transfer rate of 424 kilobits per second using a carrier frequency of 13.56 MHz. Similarly to radio frequency identification (RFID) systems (on which the new NFC standard is based), a principal function contemplated for NFC devices is the capacity to interrogate them in a passive mode in which they consume no power and to have a unique code previously stored therein rapidly and reliably returned in a manner which does not interfere with other wireless communications and which minimizes or avoids interference from such other wireless communications whenever such an interrogation is made. Accordingly, NFC systems transmit information by inductive electromagnetic coupling in the radio frequency portion of the spectrum. The NFC standard also provides for software which enables nearly instantaneous peer-to-peer network setup. NFC devices thus effectively seek each other and establish a communication link between themselves in sharp contrast to, for example, so-called Bluetooth enabled devices in which, while also intended for short range peer-to-peer communications, set up procedures are complex and extended, largely to establish device configuration which is unnecessary in NFC systems. This networking facility is in sharp contrast to RFID systems which are set up in a master/slave relationship in which usually passive chips or transponders are read by relatively expensive, powered reader devices having a range of about two to five meters. NFC systems also differ from other types of known wireless communication systems such as so-called “Wi-Fi systems which generally require an access hub. Further, NFC devices can be set to either an active or passive mode such that identification data can be sent even when the device is off and consuming no power. Even in an active mode, the range of NFC devices is so small that very little power is consumed, Accordingly, NFC devices have been implemented in single chips and chip sets for a wide variety of applications. It is therefore an object of the present invention to provide an alternative communication arrangement for communications incident to transaction using a secure credit/identification card and which does not require a specialized card reader. It is another object of the invention to provide an alternative and/or transitional communication infrastructure for use with the above-incorporated secure credit card. It is a further object of the invention to provide an arrangement for adapting current credit card readers to accommodate communications with a secure credit card similar to that disclosed in the above incorporated patent. It is yet another object of the present invention to improve speed of communications and establishment of communication links and to provide improved reliability of communications for providing a high degree of security for transactions such as financial and identification transactions. In order to accomplish these and other objects of the invention, there is provided, in combination, a near field communication device, including memory for storing information to be returned upon interrogation thereof; and an arrangement for nulling a portion of said memory upon expiration of a selected period of time. In accordance with another aspect of the invention, a secure card and system including a secure card is provided wherein the card comprises a card body which incorporates a microprocessor device, a read only memory device and a secure linear feedback shift register, the microprocessor device being interfaced to the read only memory device containing a pre-initialized personality configuration being comprised of both a unique card identification and a customized secure linear feedback shift register initial configuration, a reference linear feedback shift register incorporated in said card body and synchronized to the secure linear feedback shift register, a security code generator incorporated in the card body and producing a security code utilizing the secure linear feedback shift register providing outputs which, when combined with the card identification, produce a security code uniquely based upon said pre-initialized personality configuration accessible by the microprocessor; and a communication interface incorporated in the card body and connected to the microprocessor device for providing an input/output message function of the secured information between the microprocessor and an agent outside the secure card body, said communication interface further including a near field communication device. In accordance with a further aspect of the invention, a method of communicating secure transaction information is provided comprising steps of selectively engaging a near field communication device in a secure transaction card, upon engagement of said near field communication device, generating secure transaction information, storing the secure transaction information in a memory for transmission by the near field communication device, and nulling a portion of the memory upon transmission of the secure transaction information or upon expiration of a selected period of time. The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which: FIGS. 1A and 1B illustrate a preferred form of the secure credit card and a schematic depiction of operative elements contained within a secure credit card in accordance with the present invention, respectively, FIGS. 2 and 3 are block diagrams of communication systems in accordance with the present invention, and FIGS. 4 and 5 form a flow chart illustrating preferred operation of the invention. DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION Referring now to the drawings, and more particularly to FIGS. 1A and 1B, there is shown a secure credit card similar (and possibly identical externally) to that disclosed in the above-incorporated patent. It should be recognized that while the preferred environment and use of the present invention is in connection with financial transactions in a manner similar to the well-known use of credit or debit cards, such card structures may be used for many purposes such as personal identification and for obtaining controlled access to secure areas or apparatus such as machinery or data processing systems or resources; exemplary types of which are discussed in U.S. patent application Ser. No. 10/906,692, assigned to the assignee of the present invention and hereby fully incorporated by reference. It is therefore to be understood that the term “credit card” as used hereinafter is intended to comprehend and be a collective reference to all such and similar uses of such structures. Similarly, the term “transaction card” may be used to indicate possible use for either financial or access authorization transactions or both. As shown in FIG. 1A, the secure credit card 100 in accordance with the invention physically resembles a conventional credit card of a type currently in use but includes input and display features somewhat similar to calculator devices which are currently available having similar dimension to a credit card. That is, the secure credit card preferably includes photocells 110 which may be one of several alternative power sources (e.g. a battery, external power contacts and/or an inductive power coupling arrangement which could also or alternatively be provided to supply charge to a rechargeable power source such as a small battery or capacitor within the card. A single or multiple digit/character display 120 is preferably provided to display prompts to a user. As an input device, numeric keypad 130 and/or a dynamic key 140 (with single character/digit display) are included, preferably as membrane switches to achieve a very small thickness and a degree of flexibility as well as resistance to physical damage. A status indicator 150 may be provided in addition or alternatively to display 120. Provision of only a status indicator or a dynamic key is considered to be more secure (since it does not display input data which might be seen by a person other than a user or only a single character/digit at a time which may not be the character/digit selected) but may not provide a user with information to correct an input error during an input. If keypad 130 is used, some or all keys may be multi-function keys (e.g. to provide yes or no responses during certain operational states) or even used dynamically in conjunction with a display. FIG. 1B schematically depicts the internal elements of secure credit card 100. Most of the elements depicted and their operation and cooperation are discussed in detail in the above-incorporated U.S. Pat. No. 6,641,050 and a summary thereof herein will be sufficient to enable practice of the invention by those skilled in the art. Central to the operation of the secure credit card is a processor 115 which receives input directly from e-fuses 125 and from linear feedback shift registers (LFSRs) 135. Feedback paths in LFSRs 135 which cause them to operate as unique pairs of pseudo-random sequence generators are also controlled by e-fuses 125. Processor 115 also receives inputs from keyboard unit 145, discussed in regard to various suitable forms 130, 140 thereof, above. When the secure credit card is activated by, for example, input of a personal identification number (PIN) or code which authenticates the user to the card, the LFSRs 135 generate an identification code for the card and preferably a pair of synchronized sequences of pseudo-random numbers, one used as a reference and the other to authenticate the card to the authorization system and possibly other transaction-specific information which can optionally or alternatively be supplied by a card reader or other point-of-sale apparatus. These signals are then placed in a desired transmission format (e.g. with other signals such as packet header(s)) and transmitted directly or stored for transmission upon interrogation by the transaction authorization system. The output of processor 115 is provided to a transmitter/output driver 175. All of these elements receive power from a power supply unit 165 which may be provided in a plurality of different forms, as discussed above. In accordance with the invention, an additional near field communications element 185a is also selectively provided in parallel with transmitter/output driver 175 through an arrangement depicted as switch 195b; a preferred form of which will be described in greater detail below. Power is selectively provided thereto through another arrangement preferably provided by additional functions of processor 115 but schematically depicted here as switch 195a. The secure credit card 100 is thus provided with an additional communication path with a card reader 200 which is equipped or retrofit with a complementary NFC device 185b installed therein and/or with a communication path to another communication device 210 such as a cell phone, personal digital assistant (PDA), palmtop or laptop computer and the like which may be equipped or retrofit with an NFC device 185c installed therein. These additional communication paths provide for at least two system architectures, and variations thereof, which support numerous additional modes of use with attendant improvement of security for varying circumstances as well as accommodating the secure credit card by alternative communication devices or inexpensively retrofit and upgraded existing card readers; some exemplary forms of which will now be discussed with reference to FIGS. 2 and 3. Referring now to FIG. 2, a first preferred system architecture is schematically illustrated. This architecture is similar to that depicted in FIG. 2 of concurrently filed U.S. patent application Ser. No. 10/907,207, which is assigned to the assignee of the present invention and fully incorporated by reference in its entirety. That system provides an alternative and transitional communication arrangement for authenticating users and authorizing transactions using either a conventional magnetic stripe credit card or universal credit card by writing secure transaction and authentication information on a magnetic stripe thereof or normal credit card transactions using a conventional magnetic stripe credit card using a secure credit card holder functioning in much the same manner as the secure credit card of the above-incorporated U.S. Pat. No. 6,641,050 but communicating with a secure card processor through a separate communication device 210 such as a cell phone, PDA or computer having a wireless (or wired) connection, possibly through a network. In accordance with the present invention, however, communication link 215 is made wireless and the link is created and the communication conducted by simply having activated the secure credit card, passing it in close proximity to the separate communication device 210. Similarly, communication link 225 to card reader 220 is created and the communication conducted simply by passing the secure credit card in close proximity to the card reader 220. Therefore, it is not necessary to physically read a magnetic stripe on the card or create a communication link by placing the secure credit card in or passing it through a reading location such as slot 230 in card reader 220 since the invention selectively provides for a link to be made to an agent outside the secure card body through an NFC device. It should also be understood in regard to the present invention that the communication path through communication device 210, transmitter/receiver 240, secure card processor 250 to transaction processor 260 may be used to the exclusion of the communication path through card reader 220 and transaction processor 260 to secure card processor 250 or vice-versa or the two paths may be used together, depending on security aspects of the transaction (e.g. security of the location in which the card must be activated), transitional state of the authentication system between use of conventional cards and use of the secure credit card of the above-incorporated U.S. Pat. No. 6,641,050 or that of the present invention, required expeditiousness of the transaction and other like concerns. For example, the secure credit card in accordance with the invention can be activated and authentication of the card and user performed (as will be described in detail below) well before reaching the point of sale which may be crowded and security thus reduced or, alternatively, if merchant information can be input to the secure credit card in accordance with the invention prior to reaching the point of sale, the transaction can be substantially completed without use of card reader 220 and very little, if any, action required at a point-of-sale. Thus, the system architecture of FIG. 2 provides substantial flexibility in the manner in which a transaction can be conducted and accommodates a wide variety of transitional states of implementing or upgrading the communication infrastructure in order to accommodate secure credit cards of the type disclosed in the above-incorporated patent or the present invention. Referring now to FIG. 3, another system architecture which provides transitional and transactional advantages in some common circumstances will now be discussed. In this case, card reader 220′ represents a potentially unattended point-of-sale terminal such as a commodity (e.g. gasoline) dispenser, automated check-out terminal or security check-point (e.g. a point of access to a secured facility or apparatus). In this case, once the card 100 was activated by entry of a PIN or other action to authenticate a user to the card, an NFC link 270 is formed simply by passing the card 100 in the proximity of the card reader portion of the point-of-sale device 220′, whereupon required communications are conducted with or between the secure card processor 250 or the transaction processor 260 or both. This architecture provides the transitional advantage that the use of conventional credit cards or known NFC devices (e.g. so-called speed passes which are associated with existing credit card accounts) can be accommodated as they are currently through communication with only transaction processor 250 while transactions using the secure credit card in accordance with the invention or that of U.S. Pat. No. 6,641,050 can be authenticated and authorized by communication with secure card processor 250 which may either complete the transaction internally or provide secure authentication information to conventional transaction processor 260 to complete the transaction. It is contemplated that as use of the secure credit card in accordance with the invention or U.S. Pat. No. 6,641,050 becomes more widespread, more transaction processing will be gradually transferred to secure card processor 250 while transaction processing in conventional transaction processor 260 is gradually phased out. In any case, use of the secure credit card in accordance with the present invention will improve reliability of communications over time by avoiding mechanical contact with a card reader and improve speed of communications and establishment of communication links through use of NFC communications. Referring now to FIGS. 4 and 5, operation of the secure credit card using NFC in accordance with the invention and additional meritorious effects and security features supported thereby will now be discussed. Starting at step 400 (which may involve actuation of a key or detectable event, or not, as may be desired), the secure credit card operation is initiated by entering the PIN of the user (which may be varied as disclosed in U.S. patent application Ser. No. 10/905,716, assigned to the assignee of the present invention and fully incorporated by reference at step 401. At step 402, it is assumed for purposes of this discussion that the NFC feature or chip of the secure credit card in accordance with the present invention is not engaged and the user is prompted to indicate if it is desired to engage NFC. As will be discussed, the operation of the secure credit card of the present invention is arranged to automatically disengage or be disabled after a time-out period to reduce the possibility of capture of data therefrom although substantial safeguards against use of captured data are also provided in accordance with the above-incorporated U.S. Pat. No. 6,641,050. If not, or if there is no response to the prompt, the process exits at step 403. However, if the NFC feature of the present invention is to be engaged, two pseudo-random numbers or sequences thereof, alluded to above are generated at step 404 and the secure credit card information including the card identification number and the two pseudo-random numbers or sequences forming secure transaction information are loaded into memory in the NFC chip at step 405. This storage, generally provided in an NFC chip under current standards, allows the NFC chip to be interrogated while in a passive operational mode to cause delivery of the stored information. While interrogation in a passive mode is provided by known NFC chips, that function provides the additional advantage in the current invention of substantially avoiding power consumption, at least by the NFC chip (in which power consumption is minimal in any event) during a period between the time the chip is activated and generates security information and the time that information may be communicated to a transaction authentication system as discussed above in connection with FIGS. 2 and 3. As illustrated in FIG. 5 (reached through cardinal point 2) the user is prompted as to whether active NFC operation should be initiated. Active NFC operation allows, in the arrangement of FIG. 2, for example, for a communication with a further communication device 210 to be initiated from the secure credit card itself by bringing the secure credit card within NFC range thereof rather than upon interrogation from such a device. This can be particularly useful when a transaction is to be performed partially or fully without involvement of a point-of-sale terminal or the like. This feature of the invention allows for the security information to be created, communicated, and destroyed in a very short period of time to reduce the possibility of capture of such information to a vanishingly small level. That is, active operation can be initiated and security data sent at step 502 and the NFC storage or a portion thereof reset to null at step 503 in a matter of a few seconds or less. Nulling the storage of the security information may be viewed as opening switch 195b alluded to above in connection with FIG. 1B. Since the storage of the NFC chip is reset to null after transmission, later interrogation, regardless of operational mode will cause transmission of, at most, the card identification code but not the pseudo-random information; clearly indicating that no transaction is intended or requested. The user is then prompted to exit at 504 and, if so the process exits at step 403 reached through cardinal point 1. If the user does not wish to exit but wishes to re-engage the NFC chip, the process continues with step 402, reached through cardinal point 3. As illustrated in FIG. 5 (reached through cardinal point 2) the user is prompted as to whether active NFC operation should be initiated. Active NFC operation allows, in the arrangement of FIG. 2, for example, for a communication with a further communication device 210 to be initiate from the secure credit card itself by bringing the secure credit card within NFC range thereof rather than upon interrogation from such a device. This can be particularly useful when a transaction is to be performed partially or fully without involvement of a point-of-sale terminal or the like. This feature of the invention allows for the security information to be created, communicated, and destroyed in a very short period of time to reduces the possibility of capture of such information to a vanishingly small level. That is, active operation can be initiated and security data sent at step 502 and the NFC storage or a portion thereof reset to null at step 503 in a matter of a few seconds or less. Nulling the storage of the security information may be viewed as opening switch 195b alluded to above in connection with FIG. 1B. Since the storage of the NFC chip is reset to null after transmission, later interrogation, regardless of operational mode will cause transmission of, at most, the card identification code but not the pseudo-random information; clearly indicating that no transaction is intended or requested. The user is then prompted to exit at 504 and, if so the process exits at step 403 reached through cardinal point 1. If the user does not wish to exit but wishes to re-engage the NFC chip, the process continues with step 402, reached through cardinal point 3. If, however, the user wished, at step 501, to enter the passive mode of operation, the process would branch to step 505 in order to do so. The invention preferably establishes a default or previously set time period in which passive communication can occur upon interrogation of the NFC chip. This period is preferably short since security data including the pseudo-random data can be captured from the secure credit card during this period. However, it is considered that no significant or unjustified security risk is presented since another interrogating NFC device would need to be brought within the NFC range of less than 10 cm in order to perform such an interrogation. Even if such a feature is not provided, the transaction would cause rejection of the same security data sequences in an attempted subsequent transaction. On the other hand, providing for storage of security information for a limited period of time allows the card to be activated under circumstances of the user's choosing to minimize capture of other information such as by the surreptitious reading of the secure credit card display by other persons. It should be appreciated that imposing a limited time period during which interrogation can be performed is diametrically contrary to the principal function generally intended for NFC devices. Returning to FIG. 5, the user is prompted to change the wait time at 506. This could be done in conjunction with display of a currently set or default wait time, as desired. If the wait time is to be changed (e.g. to correspond to an anticipated time of arrival at a point-of-sale terminal) that function is performed at step 507. In any case, the process continues with step 508 in which the security data is transmitted upon interrogation or the passive mode including retention of stored data is maintained for the set wait period. Then, when the security data is transmitted or the set wait period expires, the storage is nulled at step 503 and the user is again prompted to exit at 504. This looping to 503 allows the wait time period to be reset, with or without selective alteration of the wait time period, using newly generated secure transaction information. To alert the user to the possibility of capture of secure information, the user is preferably notified of any transmission 508 to avoid any possible ambiguity between unauthorized capture of the secure data and time-out; both of which cause nulling of the stored secure data in the NFC. In view of the foregoing, it is seen that the use of an NFC device in combination with a secure credit card providing user and card authentication and unique pseudo-random security data provides additional flexibility in transactions, improved communication speed and reliability and several transaction authentication and authorization architectures which may be particularly useful and economically desirable during transitional periods as the system accommodating such secure credit cards is implemented. No specialized card reader is required but only the use or retrofitting of a known, commercially available NFC device in the secure credit card. While the invention has been described in terms of a single preferred embodiment, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims. 1. A secure card comprising: a card body which incorporates a microprocessor device, a read only memory device and a secure linear feedback shift register, the microprocessor device being interfaced to the read only memory device containing a pre-initialized personality configuration, said pre-initialized personality configuration being comprised of both a unique card identification and a customized secure linear feedback shift register initial configuration; a reference linear feedback shift register incorporated in said card body and synchronized to the secure linear feedback shift register; a security code generator incorporated in said card body and producing a security code utilizing said secure linear feedback shift register, said secure linear feedback shift register being driven by a common free-running clock oscillator and providing outputs which, when combined with the card identification, produce a security code uniquely based upon said pre-initialized personality configuration, said security code being accessible by the microprocessor; and a communication interface incorporated in said card body and connected to said microprocessor device, said communication device providing an input/output message function of secured information including said security code between the microprocessor and an agent outside said secure card body, said communication interface further including a near field communication device for transmitting information by inductive electromagnetic coupling over a range of ten inches at a radio frequency and automatic peer-to-peer network setup without requiring establishment of device configuration and which can be set to an active or passive mode. 2. A secure transaction card as recited in claim 1, wherein said near field communication device includes storage means for storing said secured information to be returned upon interrogation thereof, and further comprising means for nulling a portion of said storage means upon expiration of a selected period of time or upon transmission thereof. 3. A secure transaction card as recited in claim 2, further including means for indicating return of said secured information in response to a said interrogation. 4. A secure transaction card as recited in claim 1, further including means for indicating transmission of said secured information, and means for nulling a portion of said storage means upon expiration of a selected period of time. 5. A secure transaction system including a secure transaction card including a card body which incorporates a microprocessor device, a read only memory device and a secure linear feedback shift register, the microprocessor device being interfaced to the read only memory device containing a pre-initialized personality configuration, said pre-initialized personality configuration being comprised of both a unique card identification and a customized secure linear feedback shift register initial configuration; a reference linear feedback shift register incorporated in said card body and synchronized to the secure linear feedback shift register; a security code generator incorporated in said card body and producing a security code utilizing said secure linear feedback shift register, said secure linear feedback shift register being driven by a common free-running clock oscillator and providing outputs which, when combined with the card identification, produce a security code uniquely based upon said pre-initialized personality configuration, said security code being accessible by the microprocessor; and a communication interface incorporated in said card body and connected to said microprocessor device, said communication device providing an input/output message function of the secured information between the microprocessor and an agent outside said secure card body, said communication interface further including a near field communication device for transmitting information by inductive electromagnetic coupling over a range of ten inches at a radio frequency and automatic peer-to-peer network setup without requiring establishment of device configuration and which can be set to an active or passive mode, and a complementary near field communication device for transmitting information by inductive electromagnetic coupling over a range of ten inches at a radio frequency and automatic peer-to-peer network setup without requiring establishment of device configuration and which can be set to an active or passive mode for forming a communication link for communication with at least one of a transaction processor and a secure card processor. 6. A secure transaction system as recited in claim 5 wherein said complementary near field communication device is associated with a card reader. 7. A secure transaction system as recited in claim 6 wherein said card reader is associated with a point-of-sale terminal. 8. A secure transaction system as recited in claim 5 wherein said complementary near field communication device is associated with a wireless communication device. 9. A secure transaction system as recited in claim 8 wherein said wireless communication device is one of a cell phone, a personal digital assistant, or a portable computer. 4812805 March 14, 1989 Lachat et al. 5140517 August 18, 1992 Nagata et al. 5351187 September 27, 1994 Hassett 5408633 April 18, 1995 Katsumura et al. 6273339 August 14, 2001 Tuttle et al. 6388628 May 14, 2002 Dettloff et al. 6641050 November 4, 2003 Kelley et al. 20030085286 May 8, 2003 Kelley et al. 20040066273 April 8, 2004 Cortina et al. 20050040242 February 24, 2005 Beenau et al. 20050077356 April 14, 2005 Takayama et al. 20050091338 April 28, 2005 de la Huerga 20050116026 June 2, 2005 Burger et al. 20050205566 September 22, 2005 Kassayan 62249275 October 1987 JP Filed: Mar 24, 2005 Date of Patent: Oct 31, 2006 Assignee: International Business Machines Corporation (Armonk, NY) Inventors: Edward E. Kelley (Wappingers Falls, NY), Franco Motika (Hopewell Junction, NY) Primary Examiner: Thien M. Le Assistant Examiner: Thien T. Mai Attorney: Whitham, Curtis, Christofferson & Cook, PC Current U.S. Class: Conductive (235/492) International Classification: G06K 19/06 (20060101); G06K 5/00 (20060101);
cc/2019-30/en_head_0021.json.gz/line1730303
__label__wiki
0.78669
0.78669
Justia Patents Gas TreatmentUS Patent for Lid opening/closing system of an airtight container Patent (Patent # 7,841,371) Lid opening/closing system of an airtight container Nov 28, 2006 - TDK Corporation A curtain nozzle is located above an opening portion (10) in a FIMS. A gas curtain formed of inert gas for closing the opening portion is formed. A cover is so provided as to cover a part of the curtain nozzle so as to prevent peripheral gas around an opening of the curtain nozzle from being involved in the gas curtain of the inert gas emitted from the curtain nozzle. Latest TDK Corporation Patents: Dielectric composition, dielectric element, electronic device, and multilayer electronic device Method for calibrating a microphone and microphone Method for manufacturing planar coil Magnetoresistance effect element Position forecasting apparatus and position detection apparatus The present invention relates to a so-called front-opening interface mechanical standard (FIMS) system used when wafers held in a transfer container which is called a pod are transferred among semiconductor processing apparatuses in a semiconductor manufacture process or the like. To be more specific, the present invention relates to a FIMS system which has a purging mechanism for cleaning an inside of the pod and in which the pod serving as an airtight container for containing the wafers, which is called a front-opening unified pod (FOUP), is placed and the wafers are put in and taken out from the pod for transfer of the wafer by opening/closing a lid of the pod, i.e., a lid opening/closing system. 2. Related Background Art Up to now, a semiconductor manufacture process has been conducted in a so-called clean room in which semiconductor wafers are treated with high cleanliness maintained therein. However, in order to cope with an increase in wafer size and reduce a cost required for maintenance of the clean room, a method of maintaining only the inside of a processing apparatus, the pod (wafer container), and a mini-environment for substrate transfer from the pod to the processing apparatus in a highly clean state is employed in recent years. The pod includes a main body portion having a substantially box-like shape and a lid. The main body portion includes a rack capable of holding a plurality of wafers therein in a state where the wafers are separated from one another in parallel and an opening which is formed on a surface of the main body portion and is used for putting in/taking out wafers. The opening is closed with the lid. A pod in which the opening is located not on the bottom or top surface but on a side surface thereof (in front of the mini-environment) is generically called a front-opening unified pod (FOUP). The present invention is mainly intended for a structure using the FOUP. The above-mentioned mini-environment includes a first opening opposed to the opening of the pod, a door for closing the first opening, a second opening provided on a semiconductor processing apparatus side, and a transfer robot that moves from the first opening to the inside of the pod to hold the wafer and passes through the second opening to transfer the wafer to the semiconductor processing apparatus side. A structure for forming the mini-environment includes a mount base for supporting the pod so that the opening of the pod is opposed to the front surface of the door. A positioning pin inserted into a positioning hole provided on a bottom surface of the pod to regulate a mount position of the pod and a clamp unit engaged with a portion to be clamped which is provided on the bottom surface of the pod to fix the pod onto the mount base are located on an upper surface of the mount base. The mount base is normally movable back and forth with respect to a door direction by a predetermined distance. When the wafers in the pod are to be transferred to the processing apparatus, the pod is moved in a state where the pod is mounted on the mount base until the lid of the pod comes in contact with the door. After that contact, the lid is removed from the opening of the pod by the door. With the operations described above, the inside of the pod is communicated with the inside of the processing apparatus through the mini-environment. Subsequently, wafer transfer operation is repeated. A system including the mount base, the door, the first opening, a door opening/closing mechanism, a wall which is a part of the mini-environment including the first opening, and the like is generally called a front-opening interface mechanical standard (FIMS) system. In ordinary cases, the inside of the pod with a wafer or the like loaded therein is filled with dry nitrogen or the like which is controlled to be highly clean to prevent the entry of contaminants, oxidizing gas, and the like into the pod. However, when a wafer in the pod is introduced into various kinds of processing apparatus to be subjected to predetermined processing, the inside of the pod and the inside of the processing apparatus are always kept communicating with each other. A fan and a filter are located above a chamber where the transfer robot is located such that clean air with controlled particles and the like is introduced into the chamber. However, when such the air enters the pod, there is a fear that the surface of the wafer may be oxidized by oxygen or moisture in the air. As semiconductor devices get smaller and achieve higher performance, more attention is being paid to oxidation due to oxygen and the like that enters the pod, which has conventionally not been such a big problem. Such oxidizing gas forms a very thin oxide film on the surface of the wafer or on various kinds of layers formed on the wafer. There is a possibility that, due to such the oxide film, desired characteristics of the micro devices can not be secured. Measures against this include control of the entry of gas without the partial pressure of oxygen and the like therein being controlled from the outside of the pod into the pod. To be more specific, Japanese Patent Application Laid-open No. H11-145245 discloses a structure in which a region in a FIMS system adjacent to a pod opening is provided with a supply nozzle and a suction nozzle for gas to form an airflow curtain for substantially closing the pod opening. By forming the airflow curtain, the entry of external gas into the pod is prevented. In semiconductor manufacturing equipment, there are some cases where a process using gas which contaminates various kinds of wiring and the like formed on the wafer such as an etching process is conducted in processing apparatus. A method of controlling the entry of the gas from the inside of the processing apparatus into the pod in this case is disclosed in Japanese Patent Application Laid-open No. 2003-007799. This method also forms an airflow curtain in front of a pod opening in a FIMS system using a fan to prevent the entry of the gas from the processing apparatus into the pod. This method is considered to be effective also in controlling inflow of oxygen into the pod as a matter of course. However, when those methods were put to practical use, it was actually confirmed that, immediately after the pod opening was opened, the partial pressure of oxygen in the pod remarkably increased. Therefore, in order to meet the above-mentioned requirement, it is necessary to further improve those methods. The present invention is made in view of the above-mentioned situation, and an object of the present invention is to provide a lid opening/closing system of a pod as an airtight container which makes it possible to control the partial pressure of oxidizing gas such as oxygen in the pod at a predetermined low level even after the pod is opened. To solve the above-mentioned problems, according to the present invention, there is provided a lid opening/closing system for inserting and removing an object to be contained by removing a lid from a storage container to open an opening of the storage container which comprises a substantially box-like main body capable of containing therein the object to be contained and having the opening in one surface thereof, and a lid capable of being separated from the main body for closing the opening to form airtight space together with the main body. The lid opening/closing system comprises: a mount base on which the storage container is mounted; a substantially rectangular opening portion adjacent to the mount base and facing the opening; a door capable of holding the lid and capable of closing the opening portion, the door connecting the opening and the opening portion by opening the opening portion while holding the lid; a curtain nozzle located outside a first side that is one of sides of the substantially rectangular opening portion on the side opposite to the side where the mount base is located with respect to the opening portion and capable of ejecting inert gas substantially linearly toward a second side opposite to said first side; and a cover which covers at least a part of said curtain nozzle so as to prevent gas around said curtain nozzle from being involved into the inert gas flow ejected from said curtain nozzle. It should be noted that the above-mentioned cover defines a space around a nozzle opening of the curtain nozzle that ejects the inert gas and the cover is open toward a direction of ejection of the inert gas by said curtain nozzle. Further, it is preferable that the above-mentioned cover further includes a pair of plate-like members which are located outside of sides of the substantially rectangular opening portion other than the first and second sides thereof and which define a space of region of the gas flow ejected from the curtain nozzle in the side opposite to the side where the mount base is located with respect to the opening portion. Further, it is preferable that, the above-mentioned lid opening/closing system further includes an inert gas supply nozzle which is located on inner side of the storage container than the curtain nozzle and which is adapted to eject inert gas toward the inside of the storage container without having any component of gas flow directing toward the inert gas flow ejected from said curtain nozzle. Further, it is preferable that the above-mentioned lid opening/closing system further includes an inert gas supply nozzle composed of a pair of tubular nozzles which are located in parallel with sides of the substantially rectangular opening portion other than the first and second sides thereof and which have nozzle openings capable of ejecting inert gas directing toward the inside of the storage container. According to the present invention, a gas curtain formed by inert gas flow is formed adjacent to a pod opening so as to close the opening, and inert gas is supplied to the inside of the pod. The supply of inert gas to the inside of the pod is carried out in a predetermined direction so as not to affect the gas curtain. To be more specific, the gas curtain controls the entry of gas from the outside of the pod into the pod, and, at the same time, inert gas is supplied to the inside of the pod, to maintain the concentration of inert gas in the pod at a constant level. By combining those effects, even when the pod is open, the partial pressure of oxidizing gas in the pod is always maintained at a predetermined low level. Further, by combining those effects, compared with a case where the entry of oxidizing gas into a pod is prevented by simply supplying inert gas to the inside of the pod and thus a large amount of inert gas is necessary, comparable or better effect of maintaining the partial pressure of oxidizing gas at a low level can be obtained with an extremely small amount of inert gas. Further, according to the present invention, the concentration of inert gas in the inert gas flow which forms the gas curtain itself can be maintained at a high level. For example, it is known that, when gas is ejected from a nozzle, the gas involves other gas existing close to a nozzle opening and the gas mixture forms gas flow. To be more specific, because the gas forming the gas curtain involves other gas existing close to the nozzle, the concentration of inert gas forming the gas curtain decreases, and there is a fear that oxidizing gas is supplied from the gas curtain to the inside of the pod. According to the present invention, the nozzle opening is covered with the nozzle cover such that gas existing close to the nozzle opening contains a high concentration of inert gas. Therefore, even if such inert gas is involved, oxidizing gas is not involved in the gas curtain, and the entry of oxidizing gas into the pod can be effectively controlled. FIG. 1A is a schematic structural view of a lid opening/closing system, in other words, a load port, a pod, a lid of the pod, and a part of an opener according to a first embodiment mode of the present invention shown in a state of vertical section; FIG. 1B is a view of a load port opening portion 10 shown in FIG. 1A seen from a direction of the arrow 1B. FIG. 1C is an enlarged view of a region surrounded by a dotted line 1C shown in FIG. 1A of a curtain nozzle 12 and its adjacent structure. FIG. 2 illustrates a modification of the lid opening/closing system according to the first embodiment. FIG. 3 is an enlarged view of a main portion of a lid opening/closing system according to a second embodiment of the present invention. FIG. 4 is an enlarged view of a main portion of a lid opening/closing system according to a third embodiment of the present invention. FIG. 5 is a side view illustrating a schematic structure of ordinary semiconductor wafer processing apparatus as a whole to which the present invention is applied. FIG. 6A is an enlarged side view illustrating a schematic structure of a conventional opener and an associated structure thereof in the apparatus shown in FIG. 5. FIG. 6B illustrates a schematic structure of the structure shown in FIG. 6A seen from the transfer chamber side. FIG. 7 is a side view illustrating a schematic structure of an opener and the like in a state ready for purging to illustrate purge operation. FIG. 8A is a sectional view illustrating a schematic structure of part of a lid opening/closing system, that is, a load port, a pod, a lid for the pod, and an opener, according to a further embodiment of the present invention in a state of the vertical section. FIG. 8B illustrates a load port opening portion 10 shown in FIG. 8A seen from a direction of the arrow 8B. FIG. 8C illustrates a pod 2, a load port opening portion 10, and their surrounding structure shown in FIG. 8A seen from a direction of the arrow 8C. FIG. 9A is a sectional view illustrating a schematic structure of part of a lid opening/closing system, that is, a load port, a pod, a lid for the pod, and an opener, according to a further embodiment mode of the present invention in a state of the vertical section. FIG. 9C illustrates a pod 2, a load port opening portion 10, and their surrounding structure shown in FIG. 9A seen from a direction of the arrow FIG. 10A is a sectional view illustrating a schematic structure of part of a lid opening/closing system, that is, a load port, a pod, a lid for the pod, and an opener, according to a further embodiment mode of the present invention in a state of the vertical section. FIG. 10B illustrates a load port opening portion 10 shown in FIG. 10A seen from a direction of the arrow 10B. FIG. 10C illustrates a pod 2, a load port opening portion 10, and their surrounding structure shown in FIG. 10A seen from a direction of the arrow 10C. Hereinafter, embodiments of the present invention will be described with reference to the drawings. FIG. 1 is a schematic structural view of a main part of a lid opening/closing system (FIMS, hereinafter referred to as a load port) according to a first embodiment of the present invention, that is a side-view cross section of a pod and the main part of the load port which holds the pod with a lid thereof in an open state. Note that the pod inherently includes various elements such as a rack for supporting wafers and a seal member located between the lid of the pod and the pod. Further, various elements are attached to a door and a base for supporting the pod. However, those members are not directly associated with the present invention, so the detailed illustration and description thereof will be omitted. It should be noted that in the present invention a wafer 1 described below corresponds to an object to be contained, a pod 2 corresponds to a storage container, a main body portion 2a corresponds to a main body defined to be substantially in the shape of a box because its basic shape is a box, and an opening 2b of the pod 2 corresponds to an opening defined to be substantially in the shape of a rectangular because its basic shape is a rectangular or square. A base 53 described below corresponds to a mount base on which the storage container is mounted. In FIG. 1A, inside a main body portion 2a of the pod 2 there is a space for storing wafers 1, each of which is an object to be processed. The main body portion 2a has a box shape and includes an opening provided in one of surfaces constituting the side surfaces of the main body. The pod 2 includes a lid 4 for closing the opening 2b of the main body portion 2a. The main body portion 2a includes therein a rack (not shown) having a plurality of shelves for stacking the wafers 1 which are horizontally held in a vertical direction. Each of the wafers 1 placed on the shelves is stored in the inside of the pod 2 at predetermined intervals. The opening side of the pod 2 is adapted to face and communicate with a load port opening portion 10 which is provided on the load port portion side of a transfer chamber of the load port, which will be described below. The lid 4 is adapted to be held by a port door 6 which normally closes the opening portion 10, and the lid 4 is caused to be moved by a drive mechanism (not shown) so that the opening of the pod 2 communicates with the transfer chamber 52 (shown as an open space). FIG. 1B illustrates a schematic structure of a load port opening portion 10 seen from the direction of the arrow 1B of FIG. 1A. FIG. 1C is an enlarged view of a region surrounded by a dotted line indicated by 1C shown in FIG. 1A. A curtain nozzle 12 is attached to an inner wall of a transfer chamber 52 above the load port opening portion 10. The curtain nozzle 12 has a nozzle main body 12a, a first nozzle opening 12b, and a second nozzle opening 12c. As illustrated in FIG. 1B, the nozzle main body 12a is formed of substantially a hollow pipe-like member which extends in one direction (the direction perpendicular to the plane of FIGS. 1A and 1C) and which has a length longer than the width of the load port opening portion 10. The inside of the hollow nozzle main body 12a is connected to a substantially pipe-like gas introduction path 13 for introducing inert gas or the like from an outside region to the inside. One end of the gas introduction path 13 is, as illustrated in the figure, connected to the nozzle main body 12a, while the other end of the gas introduction path 13 is connected to an inert gas introduction system (not shown). The inert gas introduction system can supply inert gas of a predetermined flow rate from a gas supply under a predetermined pressure to the gas introduction path 13. A first nozzle opening 12b for forming inert gas flow in a direction parallel to an opening surface of the pod opening 2b is formed in a lower region of the nozzle main body 12a. The first nozzle opening 12b is a slit-like opening which extends in the direction in which the nozzle main body 12a extends, and has a length longer than the width of the load port opening portion 10. Therefore, as illustrated in FIG. 1B, the inert gas flow ejected from the first nozzle opening 12b forms a gas curtain 14 which covers the whole load port opening portion 10. The pressure and amount of the inert gas which is supplied from a gas supply system (not shown) through the gas introduction path 13 to the nozzle main body 12a are adjusted so as to be adequate for forming the gas curtain 14 which sufficiently closes the load port opening portion 10. The nozzle main body 12a further has the second nozzle opening 12c formed therein. The second nozzle opening 12c is formed in a lower region of the nozzle main body 12a such an angle that the direction of the inert gas flow ejected from the second opening 12c is directed toward the inside of the pod through the load port opening portion 10 and the pod opening. In other words, the second nozzle opening 12c is formed such that the opening is directed toward an end portion of the wafer 1 contained in the pod 2 on the side of the pod opening 2b. Therefore, the inert gas flow ejected from the second nozzle opening 12c is ejected toward inner space of the pod 2. In this way, a state under positive pressure is formed in the pod 2 which is substantially spatially closed by the gas curtain 14 with respect to the outside of the pod space. By a synergistic effect of the first nozzle opening 12b and the second nozzle opening 12c described above, that is, by a synergistic effect of preventing by the gas curtain 14 the entry of external air or gas into the pod and of preventing by making a pressure of inside of the pod positive the entry of external air or gas into the pod, the entry of oxidizing gas into the pod can be effectively suppressed. It should be noted that, although, in this embodiment, the respective nozzle openings are formed so as to be slit-like, dot-like openings may be additionally provided on a predetermined line at predetermined intervals. Further, although, in this embodiment, the first nozzle opening 12b and the second nozzle opening 12c are formed in the single nozzle main body 12a, taking into consideration the pressure and flow rate of inert gas to be supplied, they may be formed in main body portions, respectively, which are independent of and separated from each other. Further, in this case, a plurality of nozzle openings may be provided in the nozzle main body for supplying inert gas to the inside of the pod such that the plurality of nozzle openings are generally directed toward the inside of the pod but specific directions of the nozzle openings may be different from one another. Alternatively, the nozzle main body may be rotatable about an axis along which the nozzle main body extends, so that inert gas can be directed from the nozzle opening via all the region of the pod opening into the inside of the pod. It should be noted that, in this embodiment, there is a matter to which attention should be paid when inert gas is supplied to the inside of the pod. To be more specific, it is indispensable that the direction of supply of inert gas is set so as not to have a component of gas flow directing toward the inert gas flow forming the gas curtain 14. The gas curtain is formed by mere gas flow. If the direction of supply of other gas has a component opposed to that flow, there is a fear that formation of the gas curtain may be hindered, airflow may be disturbed, and the entry of external gas into the pod may happen. For example, a structure in which so-called purge gas is supplied from a lower surface of the pod to the inside of the pod is known. When the gas curtain according to this embodiment is directly applied to the structure without any modification, the direction of ejection of the purge gas has a component opposed to the gas curtain. Therefore, it is necessary that at least the component opposed to the gas curtain is substantially removed from the direction of ejection of the purge gas. For example, by locating a purge gas outlet far from the pod opening toward the back of the pod, almost all the gas ejected from the outlet strikes a wafer immediately above and most of the gas flow is in the direction of planes in which the wafers extend. If the purge gas outlet is located in this way, the gas curtain can be suitably formed. As a modification of this embodiment, a case where the second nozzle opening is located as an inert gas supply system which is a separate system is now described. FIG. 2 shows an enlarged view of a gas supply nozzle according to this embodiment in the same view as FIG. 1C. In a FIMS system, a so-called mapping sensor is located for deciding which shelf in the pod has a wafer. The mapping sensor is formed of, for example, a pair of sensors for emitting light and receiving light located in parallel with the planes in which the wafers extend. In actual detecting operation, these sensors are adapted to move so as to sandwich wafers therebetween so that presence or absence of a wafer is detected by detecting whether light from a sensor is blocked by a wafer or not. To be more specific, the sensors for emitting light and receiving light are adapted to be introduced into the pod and are driven in a direction of arrangement of the wafers. By attaching to these sensors a nozzle 16 for supplying inert gas, inert gas can be supplied to the inside of the pod. However, when the gas curtain 14 is formed in a state in which the sensors are positioned in an area where a wafer exists, there is a possibility that the gas curtain 14 is blocked by the mapping sensor 15. In this case, because airflow forming the gas curtain 14 is disturbed, there is a possibility that external gas which fundamentally should not enter the pod might be mixed into the pod due to the disturbance of the airflow of the gas curtain. Therefore, in the structure, it is preferable to form the gas curtain 14 in such configuration where, even if the gas curtain 14 strikes the mapping sensor 15 and airflow is disturbed, there is little adverse influence, that is, in a state where the respective sensors of the mapping sensor 15 are positioned at the lowermost end position of the pod. With the structure, inert gas supplied from the mapping sensor 15 side has little influence on the gas curtain 14, and, the influence of the existence of the mapping sensor itself on the gas curtain can be made as small as possible. Therefore, the above-mentioned effect of shielding the space with the gas curtain and effect of blocking, by supplying inert gas, the entry of external gas can be preferably obtained. Next, a further embodiment of the present invention is described. It should be noted that like reference numerals are used to designate structural elements of this embodiment which exhibit like or identical function, operation and effect to those of structural elements of the above-mentioned embodiment. FIG. 8A illustrates a lid opening/closing device according to this embodiment in the same view as FIG. 1A. FIG. 8B illustrates a schematic structure of the load port opening portion 10 in the device seen from the direction of the arrow 8B in FIG. 8A. FIG. 8C illustrates a wafer and a plane in which the wafer extends, seen from the direction of the arrow 8C in FIG. 8A. In this embodiment also, the curtain nozzle 12 for forming the gas curtain 14 and the nozzle for forming inert gas flow toward the inside of the pod are separately provided, that is, the inert gas supply system having the second nozzle opening is provided separately from the gas curtain nozzle 12. In this embodiment, as a structure having the second nozzle opening, a pair of purge nozzles 21 are provided. The purge nozzles 21 have tubular purge nozzle main bodies 21a extending in one direction and are connected to a purge gas supply system (not shown). The purge nozzle main bodies 21a are located in a pair adjacent to the outside of the load port opening portion 10 on both sides thereof on the side opposite to the side of the mount base where the pod 2 is mounted with respect to the load port opening portion 10 so as to extend in parallel with the two sides of the opening portion 10. A plurality of purge nozzle openings 21b are provided in the purge nozzle main bodies 21a at predetermined intervals in the direction in which the purge nozzle main bodies 21a extend such that the intervals equal to intervals at which the wafers 1 are positioned in the pod 2 and such that the purge nozzle openings 21b are aligned to intervals between the respective wafers 1. Further, the purge nozzle openings 21b are so formed as to be directed toward the center of the wafers 1. The present embodiment includes major design modification on that two inert gas supply systems, one of which is for the curtain nozzle 12 and the other of which is for the purge nozzles 21 are required and the plurality of tubular members have to be located around the load port opening portion 10. However, this embodiment makes it possible to obtain the effect of the gas curtain, and at the same time, purge gas can be supplied evenly to surfaces of the respective wafers 1. Further, inert gas can be supplied to the whole region inside the pod 2 with the least resistance and without disturbing gas flow when the inert gas is supplied. Therefore, when atmosphere enters the pod 2 by opening and closing the lid, further entry of atmosphere into the pod 2 can be suppressed by the gas curtain while the partial pressure of atmosphere (oxygen) in the pod can be promptly and effectively decreased by inert purge gas. It should be noted that, in this embodiment, tubular members located in parallel with the arrangement direction of the wafers in the pod 2, that is, in parallel with two sides other than one side where the curtain nozzle 12 is located and a side opposed to the one side of the load port opening portion 10 are used as the purge nozzles 21. Further, the plurality of nozzle openings in the purge nozzles 21 are provided at predetermined intervals in the direction in which the tubular members extend and eject inert gas toward predetermined directions, respectively. However, location of the nozzle openings is not limited thereto, and, as far as substantially linear inert gas flow can be formed along a predetermined direction such as a direction in parallel with the sides, the location and shape of the nozzle openings and the shape of the purge nozzles are not limited to the ones described in this embodiment. Next, a main portion of a lid opening/closing device according to the second embodiment of the present invention is described in the following with reference to FIG. 3 illustrating a gas curtain nozzle in the same view as FIG. 1C. It should be noted that, with regard to a structure which exhibit substantially like function, operation and effect to those of the structure illustrated in FIG. 1C, like reference numerals are used in the following description. Further, because the curtain nozzle 12 in this embodiment has a structure similar to that of the curtain nozzle 12 described in the first embodiment except that it does not have the second nozzle opening 12c, the description thereof is omitted here. In this embodiment, the curtain nozzle 12 is covered with a nozzle cover 18 so formed as to cover the nozzle main body 12a. The nozzle cover 18 has inner space 18a which can accommodate the curtain nozzle 12 and is formed of a member forming an inner shape substantially similar to the curtain nozzle 12. The nozzle cover 18 further has a cover opening 18b provided in its lower region. The curtain nozzle 12 is located in the inner space 18a of the nozzle cover 18, and the first nozzle opening 12b and the cover opening 18b are located so as to be aligned with each other with regard to the direction of formation of the gas curtain 14. Here, the positional relationship between the nozzle cover 18 and the curtain nozzle 12 is set such that the first nozzle opening 12b is contained in the inner space 18a of the nozzle cover 18. Further, in this embodiment, a communication opening 13a which communicates with the inner space 18a of the nozzle cover 18 is provided in the gas introduction path 13. By providing the communication opening 13a, this embodiment makes it possible to introduce inert gas into the inside of the nozzle cover 18 and into the curtain nozzle 12 through a single gas introduction system. It should be noted that ejection of inert gas from the inner space 18a is basically not necessary, and all what is necessary is that space around the first nozzle opening 12b is filled with inert gas. Therefore, the amount of inert gas which is made to flow from the communication opening 13a into the inner space 18a is sufficient if the inert gas fills the space covered with the nozzle cover 18. It should be noted that, in this embodiment, the inner surface of a wall where the load port opening portion 10 is formed is used for forming a part of the nozzle cover 18, and the nozzle cover 18 is shown as a member formed of two surfaces, one of which is an upper surface portion and the other of which is a side surface portion connected to an end of the upper surface portion. However, the nozzle cover 18 may be formed as a substantially pipe-like member similarly to the curtain nozzle main body 12a. Further, the nozzle cover 18 does not necessarily have to cover the whole curtain nozzle, and may cover only the space around the first nozzle opening 12b. Still further, a path for supplying inert gas to the nozzle cover inner space 18a may be provided separately from the gas introduction path 13. Therefore, the nozzle cover may have various shapes and structures as far as the nozzle cover has a shape which defines some extent of space around the nozzle opening of the curtain nozzle so as to prevent gas around the nozzle opening of the curtain nozzle from being involved into the inert gas flow ejected from the nozzle opening of the curtain nozzle and which has an open region corresponding to the flow path of inert gas ejected from the nozzle opening of the curtain nozzle for forming the gas curtain. In the lid opening/closing device according to this embodiment, the curtain nozzle 12 for forming the gas curtain 14 is covered with the nozzle cover such that even gas existing close to the first nozzle opening 12b contains a high concentration of inert gas. Therefore, even if such inert gas is involved into the gas flow forming the gas curtain, oxidizing gas is not involved in the gas curtain 14, and the entry of oxidizing gas into the pod can be effectively suppressed. Next, a third embodiment of the present invention is described with reference to FIG. 4. FIG. 4 illustrates a main portion of a lid opening/closing device according to a third embodiment of the present invention in the same view as FIG. 1C or FIG. 3. An object of this embodiment is to obtain two effects: to introduce inert gas into the pod by the second nozzle opening 12c used in the first embodiment; and to prevent oxidizing gas from being mixed into the gas curtain by the nozzle cover used in the second embodiment. To be more specific, the nozzle cover 18 illustrated in FIG. 3 is added to the curtain nozzle 12 illustrated in FIG. 1C. It should be noted that, because the specific structure of the curtain nozzle 12 and the specific structure of the nozzle cover 18 are substantially identical to those described above in the first and second embodiments, detailed description of the respective structures is omitted here. In this embodiment, space around the second nozzle opening 12c is also covered with inert gas by using the nozzle cover 18. As a result, high purity can be maintained also with regard to inert gas introduced into the pod. Therefore, not only the above-mentioned effect of shielding the space with the gas curtain, effect of blocking, by supplying inert gas, the entry of external gas, and effect of preventing the mixing of oxidizing gas into the gas curtain can be obtained but also high purity can be maintained with regard to gas introduced into the pod. It should be noted that, in this embodiment described above, the curtain nozzle is located above the opening portion. However, the embodiment of the present invention is not limited thereto. In view of efficiently transferring an object to be contained such as a wafer, the pod opening and the opening portion are substantially in the shape of a rectangular with its corners rounded. The curtain nozzle is located outside the rectangular shape along one side of the rectangular. As far as inert gas is ejected toward a side opposed to said one side of the rectangular, the curtain nozzle may be located along whichever side of the rectangular. The nozzle opening may be slit-like, dot-like, or a combination thereof as far as the inert gas flow is approximately continuous in a section perpendicular to the direction of ejection and substantially forms a curtain, in other words, substantially linear. Further, it is preferable that inert gas is introduced into the pod always in a direction toward the inside of the pod (toward the center of the pod or toward a surface opposed to a surface having the opening formed therein). Therefore, it is preferable that the gas outlet is located adjacent to a side along which the curtain nozzle is located and closer to the inside of the pod than the curtain nozzle is. Here, the nozzle cover in the embodiment described above is provided around the curtain nozzle or the like with the intention of preventing involvement of environmental atmosphere in gas flow forming the gas curtain when the gas curtain is formed. However, the form of the cover is not limited to a nozzle cover, and, for example, a nozzle cover of a type which prevents diffusion of gas flow in the gas curtain may be provided to prevent gas atmosphere from flowing toward the inside of the pod by the gas curtain. A structure with a nozzle cover of this type is described in the following as a further embodiment of the present invention. It should be noted that, in explaining this embodiment, like reference numerals are used to designate structural elements of this embodiment which exhibit like or identical function, operation and effect to those of structural elements of the above-mentioned embodiment, and detailed description thereof is omitted. FIGS. 9A, 9B, and 9C illustrate a lid opening/closing device according to this embodiment in the same view as FIGS. 8A, 8B, and 8C described above. In this embodiment, in addition to the curtain nozzle 12 and the purge nozzles 21 illustrated in FIG. 8A and the like, a cover 23 is located around the load port opening portion 10. The cover 23 is formed of three plate-like members 23a, 23b, and 23c having the same width. The plate-like members protrude from a surface of the wall where the load port opening portion 10 is formed on the side opposite to the side where the mount base is formed with respect to the load port opening portion so as to be perpendicular to the surface and so as to be in parallel with the two sides and a top side of the load port opening portion 10. The plate-like members 23a and 23b along the two sides and the plate-like member 23c along the top side are connected to one another at their ends intersecting one another to form a generally U-shaped member which is open on a lower side of the load port opening portion 10. The U-shaped member is located so as to protrude around the load port opening portion 10, and the curtain nozzle 12 and the purge nozzles 21 are housed inside the U-shape member. According to this embodiment, the plate-like member 23c along the top side decreases or prevents involvement of oxidizing gas in the gas curtain 14 supplied from the curtain nozzle 12. In other words, the main object of the plate-like member 23c along the top side is to obtain this effect, and may be in the shape of the nozzle cover of the second embodiment. In order to obtain the effect with regard to the gas curtain, it is sufficient that the cover is configured to define a circumferential space around the region of the nozzle opening of the curtain nozzle which ejects the inert gas to form the gas curtain flow so as to prevent any oxidizing gas from being involved in the gas curtain flow. The inert gas flow ordinarily diffuses with a larger extent as being farther from the curtain nozzle 12 where concentration of the inert gas per unit volume reduces, and as a result the curtain effect degrades. In this embodiment mode, the plate-like members 23a and 23b along the two sides prevent diffusion of inert gas in the direction where these plate-like members exist, and the effect obtained by the inert gas flow can be suitably maintained to a further downstream side of the inert gas flow. Further, because the plate-like members along the two sides exist, involvement of oxidizing gas by inert gas flow when the purge nozzles 21 generates the gas flow can be decreased or prevented. It should be noted that, in this embodiment, the plate-like members 23a and 23b along the two sides are located so as to be in parallel with the two sides of the load port opening portion 10. However, in view of preventing gas diffusion, the plate-like members may be slanted with respect to the sides of the load port opening portion 10 such that the distance from the plate-like members to the sides of the load port opening portion 10 decreases as the plate-like members approaches the bottom side of the load port opening portion. This gathers gas flow which flows between the plate-like members 23a and 23b along the sides toward the center of the opening portion as the plate-like members 23a and 23b approach the bottom side of the opening portion, and thus, even if part of the gas flow is gradually lost by diffusion, the same gas flow as that immediately after ejection can be maintained even at the bottom side of the opening portion. Further, the extending direction of the plate-like members 23a and 23b projected from the wall of the load port along the sides may be slanted with respect to the normal to the wall of the load port or a plane on which the load port opening portion is formed such that the distance between the plate-like members becomes narrower as being further away from the wall of the load port or the plane on which the opening portion is formed. The plate-like members 23a and 23b along the sides are so inclined as to be directed toward the convergent direction in the transfer chamber 52 (see FIG. 1), so that gas flow which is about to diffuse can be concentrated to the place where the opening portion is formed, and thus, the gas flow can be maintained as even flow over the whole region of the opening portion. Those slants are not always required to be provided over the whole region of the plate-like members, and may be provided over a predetermined portion. In this case, it is more preferable to provide the slants especially on a downstream side of the gas flow in the gas curtain where decrease in the concentration of inert gas is a concern. As a further modification of this embodiment, another plate-like members may be additionally provided, which protrudes from each of the plate-like members at its end different from the end where the plate-like member is joined to the surface where the opening portion is formed and which is in parallel with the surface where the opening portion is formed, so as to protrude inwardly thereby forming a canopy-like U-shape. The present embodiment is illustrated in FIGS. 10A, 10B, and 10C in the same way as in FIGS. 9A, 9B, and 9C. In this embodiment, plate-like canopies 25a and 25b are fixed to the end of the plate-like members 23a and 23b on the sides, respectively. Because of the canopies, diffusion of inert gas in the gas curtain can be more suitably suppressed, and the gas flow can be held flowing in a region surrounded by the plate-like members. It should be noted that the width between the canopies 25a and 25b is set so as not to reduce the size of the load port opening portion 10. Further, the canopies may be fixed to the plate-like members 23a and 23b which are slanted with respect to the sides of the load port opening portion 10 as mentioned above. Further, the canopy may be provided with respect to the plate-like member 23c on the top side. To be more specific, the plate-like members on the sides may be slanted on a downstream side of the gas curtain from a predetermined position of the load port opening portion 10 such that the distance between the plate-like members on the sides decreases toward the downstream side of the gas curtain. Further, a canopy may be added also to the plate-like member 23c on the top side. Even if part of the gas flow is gradually lost, the same gas flow as that immediately after ejection can be maintained even at the bottom side of the opening portion. Next, a FIMS system as a lid opening/closing system which implements the present invention and semiconductor wafer processing apparatus using the system are described. It should be noted that, in this embodiment, a case where the curtain nozzle 12 described in the first embodiment is used is described first. FIG. 5 illustrates a schematic structure of a semiconductor wafer processing apparatus 50 which conforms to a so-called mini-environment system. The semiconductor wafer processing apparatus 50 is mainly formed of a load port portion (a FIMS system, a lid opening/closing device) 51, the transfer chamber 52, and a processing chamber 59. A partition 55a and a cover 58a on the side of the load port and a partition 55b and a cover 58b on the side of the processing chamber are provided between the load port portion 51 and the transfer chamber 52 and between the transfer chamber 52 and the processing chamber 59, respectively. In order to remove contaminants and maintain high purity in the transfer chamber 52 of the semiconductor wafer processing apparatus 50, a fan (not shown) provided above the transfer chamber 52 generates airflow from a top portion of the transfer chamber 52 to a lower portion of the transfer chamber 52. This always lets out contaminants downward. The pod 2 which is a storage container for storing silicon wafers or the like (hereinafter merely referred to “wafers”) is mounted on the base 53 located on the load port portion 51. As described earlier, the inside of the transfer chamber 52 is maintained to high cleanliness in order to process the wafers 1. Further, the transfer chamber 52 includes a robot arm 54. The wafers are transferred between the pod 2 and the processing chamber 59 by means of the robot arm 54. The processing chamber 59 normally includes various mechanisms for performing processings, such as thin film formation and thin film processing on the surfaces of the wafers. However, the mechanisms are not directly related to the present invention, so the description will be omitted. The pod 2 has a space for storing the wafers 1, each of which is the object to be processed, in the inside thereof. The pod 2 includes the box main body portion 2a having the opening portion provided in one of the surfaces and the lid 4 for enclosing the opening portion. The main body portion 2a includes the rack having the plurality of shelves for stacking the wafers 1 in one direction. Each of the wafers 1 placed on the shelves are stored in the inside of the pod 2 at predetermined intervals. In this embodiment, the direction in which the wafers 1 are stacked is set to the vertical direction. The opening portion 10 is provided on the load port portion 51 side of the transfer chamber 52. When the pod 2 is to be located on the load port portion 51 such that the pod 2 is close to the opening portion 10, the opening portion 10 is located to face the opening portion of the pod 2. The transfer chamber 52 includes an opener 3 (described later) provided on the inner side in the vicinity of the opening portion 10. FIG. 6A is an enlarged side cross sectional view showing an opener 3 in a conventional apparatus and FIG. 6B is a font view showing the opener 3 which is viewed from the transfer chamber 52 side. FIG. 7 is a schematic side cross sectional view showing a state where the lid 4 is removed from the pod 2 using the opener 3. The opener 3 includes the door 6 and a door arm 42. A fixing member 46 is installed on the door 6. The door 6 is pivotably connected to one end of the door arm 42 through the fixing member 46. The door arm 42 is supported at the other end thereof to a tip end portion of a rod 37 which is a part of air-drive cylinder 31 through a pivot axis 40 to be pivotable about the pivot axis 40. A through hole is provided between the one end of the door arm 42 and the other end of the door arm 42. A pin (not shown) extends through the through hole and a hole of a fixed member 39 fixed to a support member 60 of a movable portion 56 for moving the opener 3 up and down, thereby forming a supporting point 41. Therefore, the door arm 42 is pivotable about the supporting point 41 according to the extension and retraction of the rod 37 due to the drive of the cylinder 31. The support point 41 of the door arm 42 is fixed to the support member 60 to which the vertically movable portion 56 is provided. The door 6 includes holding ports 11a and 11b and thus can hold the lid 4 of the pod 2 by vacuum contact. When the wafer 1 is processed by the above-mentioned structure, first, the pod is located on the base 53 so as to be adjacent to the transfer chamber opening portion 10, and the lid 4 is held by the door 6. It should be noted that a mechanism-to-engage (not shown) is provided on a surface of the door 6 while a mechanism-to-be-engaged (not shown) is provided on a surface of the lid 4. By actuating those mechanisms with the surfaces of the lid 4 and of the door 6 in contact with each other, the lid 4 is held by the door 6. Here, when the rod of the cylinder 31 is retracted, the door arm 42 moves away from the transfer chamber opening portion 10 with the supporting point 41 being the rotation axis. According to this action, the door 6 rotates together with the lid 4 to remove the lid 4 from the pod 2, as illustrated in FIG. 7. After that, the movable portion 56 is lowered to move the lid 4 to a predetermined retreat position. The curtain nozzle 12 according to the present invention is located in a top portion of the transfer chamber opening portion 10. After the lid 4 is removed using the port door 6, the curtain nozzle 12 forms the gas curtain 14, and, at the same time, supplies inert gas to the inside of the pod. It is preferable that, in order to avoid a large change in the internal pressure of the transfer chamber 52 and the like when clean gas is supplied, exhaust operation of various kinds such as suction exhaust of the transfer chamber be simultaneously carried out corresponding to gas supply operation. Further, in this embodiment, the description is in the context of FOUP and FIMS, but application of the present invention is not limited thereto. As far as the container is a front-opening type container which contains a plurality of objects to be contained and is opened and closed when the objects to be contained are inserted into or removed from the container in the system, the lid opening/closing device according to the present invention can be applied to maintain the partial pressure of oxidizing atmosphere in the container at a low level. Further, when the gas which fills the container is not inert gas but predetermined gas having desired characteristics, the lid opening/closing system according to the present invention can be used to maintain the partial pressure of the predetermined gas in the container at a high level. According to the present invention, the effect of shielding the space with the gas curtain, the effect of suppressing, by supplying inert gas, the entry of external gas, and the effect of preventing oxidizing gas from being mixed into the gas curtain can be obtained, and further, high purity can be maintained with regard to gas introduced into the pod. Further, the present invention can be implemented only by adding to an existing FIMS system a gas supply pipe and the like, which can be added to a standardized system easily at low cost. This application claims priority from Japanese Patent Applications No. 2005-346083 filed on Nov. 30, 2005 and No. 2006-314202 filed on Nov. 21, 2006, which are hereby incorporated by references herein. 1. A lid opening/closing system for inserting and removing an object to be contained by removing a lid from a storage container to open an opening of the storage container, the storage container comprising a main body capable of containing therein the object to be contained and having the opening in one surface thereof, and a lid capable of being separated from the main body for closing the opening to form airtight space together with the main body, the lid opening/closing system comprising: an opening portion adjacent to the mount base and facing the opening; a curtain nozzle located outside a first side that is one of sides of the opening portion on the side opposite to the side where the mount base is located with respect to the opening portion and capable of ejecting inert gas toward a second side opposite to said first side; and a cover which projects farther from a wall in which the opening portion is defined relative to the curtain nozzle so as to cover the curtain nozzle, wherein said cover defines a space around a nozzle opening of the curtain nozzle that ejects the inert gas and said cover is open toward a direction of ejection of the inert gas by the curtain nozzle, and wherein said cover further includes a pair of plate members which are located outside of sides of the opening portion other than said first and second sides thereof so that said cover is of a U-shape which defines a space of region of the gas flow ejected from said curtain nozzle in the side opposite to the side where the mount base is located with respect to the opening portion, and said pair of plate members of said cover are attached to a wall in which the opening portion is defined. 2. A lid opening/closing system according to claim 1, further comprising an inert gas supply nozzle which is located on an inner side of the storage container relative to the curtain nozzle and which is adapted to eject inert gas toward the inside of the storage container through the opening portion and the opening without having any component of gas flow directing toward the inert gas flow ejected from said curtain nozzle. 3. A lid opening/closing system according to claim 1, further comprising an inert gas supply nozzle composed of a pair of tubular nozzles which are located inside of said pair of plate members of said cover, in parallel with and outside of sides of the opening portion other than said first and second sides thereof and which have nozzle openings capable of ejecting inert gas directing toward the inside of the storage container. 4. A lid opening/closing system according to claim 1, wherein a distal end of each of said plate members of said cover is angled toward the inside of the U-shaped cover. 5. A lid opening/closing system according to claim 1, wherein said cover houses a part of a gas introduction path by which the inert gas is supplied to the curtain nozzle, and said part of the gas introduction path has an opening through which the inert gas is introduced into the inside of said cover. 6. A lid opening/closing system according to claim 1, wherein said pair of plate members of said cover are slanted with respect to a normal to the wall toward a converging direction. 7. A lid opening/closing system according to claim 1, wherein said pair of plate members of said cover are so arranged to approach each other toward the second side of the opening portion. 5988392 November 23, 1999 Hosoi 6817822 November 16, 2004 Tokunaga 6867153 March 15, 2005 Tokunaga 6883539 April 26, 2005 Inoue et al. 6926029 August 9, 2005 Inoue et al. 7059849 June 13, 2006 Sakata et al. 20040237244 December 2, 2004 Suzuki et al. 20060088406 April 27, 2006 Miyajima et al. 20060272169 December 7, 2006 Miyajima 20090169342 July 2, 2009 Yoshimura et al. 1 780 785 May 2007 EP 57-203278 December 1982 JP 6-63934 March 1994 JP 11-145245 May 1999 JP 2003-7799 January 2003 JP 2004-235516 August 2004 JP 397796 July 2000 TW 522482 March 2003 TW 200601482 January 2006 TW WO 2005/124853 December 2005 WO U.S. Appl. No. 11/563,863, filed Nov. 28, 2006, Okabe. U.S. Appl. No. 12/106,619, filed Apr. 21, 2008, Okabe, et al. U.S. Appl. No. 12/624,579, filed Nov. 24, 2009, Okabe et al. Date of Patent: Nov 30, 2010 Assignee: TDK Corporation (Tokyo) Inventor: Tsutomu Okabe (Tokyo) Primary Examiner: Gregory L Huson Assistant Examiner: Nicolas A Arnett Attorney: Oblon, Spivak, McClelland, Maier & Neustadt, L.L.P. Current U.S. Class: Gas Treatment (141/63); Gas Condition Control In Housing For Receiver (141/51); Combined (141/98); For A Semiconductor Wafer (206/710); Apparatus For Moving Material Between Zones Having Different Pressures And Inhibiting Change In Pressure Gradient Therebetween (414/217); With Container Opening Means (414/411); Associated With Semiconductor Wafer Handling (414/935) International Classification: B65G 1/12 (20060101); B65B 31/04 (20060101);
cc/2019-30/en_head_0021.json.gz/line1730305
__label__wiki
0.793748
0.793748
Justia Patents With Fluid SupplyUS Patent for Patient temperature control system with variable gradient warming/cooling Patent (Patent # 8,647,374) Patient temperature control system with variable gradient warming/cooling Oct 23, 2006 - Cincinnati Sub-Zero Products, Inc. A patient temperature control system (10) uses variable temperature gradient warming/cooling in combination with a warming/cooling device (16), such as a blanket, to increase efficiency in driving a patient's temperature to a desired setpoint, with reduced occurrence of and magnitude of overshoot conditions. In operation, the controller (26) of the system (10) senses the temperature of a patient (12) via a sensor (31), for comparison to a temperature of the circulating water, sensed via sensor (30). If the patient temperature is not sufficiently close to a setpoint temperature, the system (10) is operable to warm/cool the circulating water to a temperature which differs from the patient's temperature by a temperature gradient of 10 ° C., or some other preselected initial temperature gradient. After a subsequent time interval, if the patient temperature has not moved sufficiently close to the setpoint temperature, the controller (26) incrementally raises or lowers the temperature of the circulating water, to intensify the a warming/cooling effect. This procedure repeats at desired intervals, to more efficiently reach the setpoint temperature. Thus, the system (10) is capable of automatically increasing or decreasing the temperature gradient, dependent upon subsequently sensed patient temperatures. Latest Cincinnati Sub-Zero Products, Inc. Patents: Fluid disinfection unit for patient temperature control system Refrigeration system with a scroll compressor Multiple wavelength metal vapor laser system for medical applications The present application claims priority to PCT Application No. PCT/US2006/041278, entitled “Patient Temperature Control System With. Variable Gradient Warming/Cooling,” filed on Oct. 23, 2006, which in turn claims priority to U.S. Provisional Patent Application Ser. No. 60/729,313, bearing the same title and filed on Oct. 21, 2005, and which is expressly incorporated by reference herein in its entirety. This invention relates to a patient temperature control system suitable for raising, lowering, or maintaining a patient's temperature through conductive heat transfer. To understand the present invention, it is helpful to first understand the capabilities of existing patient temperature control systems of the same type. More specifically, the assignee of this invention has marketed a patient temperature control system which uses a closed loop fluid circuit, typically with water circulating through a blanket, to conductively warm or cool a patient to a desired temperature. This temperature control system is called the Blanketrol-II system. This system provides three modes of operation, namely MANUAL CONTROL, AUTO CONTROL and MONITOR ONLY. This last mode represents use of the system solely as a patient temperature monitor. In other words, in this last mode, the system senses the patient temperature but does not circulate warming or cooling water to the patient via a blanket or other device. In MANUAL CONTROL, this prior system raises or lowers the temperature of the circulating fluid, namely water, to a setpoint temperature. The setpoint temperature is selectable, or adjustable, by the operator, within a range of acceptable temperatures for the circulating water. In the MANUAL CONTROL mode of operation, the system warms or cools the circulating water until it reaches the setpoint temperature, regardless of the patient temperature. The control panel of the system displays the water temperature in one window, and also displays the setpoint temperature in a separate window. The operator may adjust the setpoint temperature, by using the TEMPSET push button, and the triangularly-shaped up and down indicators. This system also displays the patient temperature when a patient temperature probe is placed so as to sense the temperature of the patient, and when the probe is operatively connected to the correct input of the controller. However, in this MANUAL CONTROL mode the system does not use the sensed patient temperature to automatically change or effect the temperature of the circulating water. During operation in the AUTO CONTROL mode, the operator again sets a desired setpoint temperature for the patient, using the controls. The desired setpoint temperature is displayed on the panel. In the AUTO CONTROL mode, the patient temperature is sensed, and if the sensed patient temperature is below the setpoint temperature, the system circulates warming water to the patient in order to warm the patient until the sensed patient temperature reaches the setpoint temperature. Thus, in this mode the controls of the system compare the setpoint temperature with the sensed temperature. Once the patient has been sufficiently warmed so that the sensed patient temperature reaches the setpoint temperature (or is within an acceptable range of the setpoint temperature) the system discontinues the active warming of the circulating water, but continues to circulate the water. Thereafter, if the patient's temperature again falls below the setpoint temperature (or outside an acceptable range including the setpoint), the temperature control system will once again actively warm the circulating water, to once again raise the patient's temperature to the setpoint temperature. Conversely, if the initially sensed patient temperature is above the setpoint temperature, the system cools the water and circulates the cooled water in order to cool the patient down to the setpoint temperature. Once the sensed patient temperature reaches the setpoint temperature (or within an acceptable range thereof), the system discontinues cooling the circulating water, but continues to circulate the water. In the AUTO CONTROL mode, the system initially uses the warmest water available in order to warm the patient, or the coolest water available in order to cool the patient, within reasonable and acceptable water temperature limits. Typically, the coolest water available is generally about 4° C. (40° F.), and the warmest water available is generally about 42° C. (107.5° F.). By using the warmest or coldest water available, this system utilizes the greatest possible warming or cooling effect, in order to bring the patient's temperature to the setpoint temperature in the shortest time possible. Using the coldest or the warmest water available is the best way to quickly move the patient's temperature to the setpoint temperature, at which point the system then discontinues further warming or cooling of the circulating water. This may cause some patient temperature discomfort. But this disadvantage is secondary to the primary goal of getting the patient's temperature to the setpoint. Thus, patient discomfort is a consideration, but not the most important consideration. Also, in some cases this type of warming (or cooling) of the patient may cause the patient's temperature to become warmed (or cooled) beyond the setpoint. This condition is called “overshoot.” Overshoot can occur because, in the AUTO CONTROL mode, the system continues to warm or cool the circulating water until the sensed patient temperature reaches the setpoint temperature. Thereafter, the system discontinues further warming or cooling. But at the time heating or cooling is discontinued, the circulating water remains relatively warmed or relatively cooled for some transition time thereafter. The liquid in this closed liquid circuit cannot be immediately switched from hot to cold, or vice versa. Such temperature transitions take some time, depending on the total volume of the water, and the efficiency of the heat transfer. As a result, the circulating water continues to warn or cool the patient, sometimes beyond the setpoint temperature, such that it becomes necessary thereafter to cool (warm) the patient in order to get the patient back to the setpoint temperature. This means that the system may automatically swing back and forth between circulating warning water and then circulating cooling water to the same patient, or vice versa, depending upon the successively sensed patient temperatures. When overshoot occurs, the system switches from warming to cooling, or from cooling to warming, but again with the warmest or coolest water available. This can sometimes result in several overshoots, thereby requiring the system to successively switch back and forth from warmest water to coolest water, or vice versa. Eventually, the patient's temperature becomes stabilized at or about the setpoint temperature. However, in some cases a subsequent fluctuation of the patient's temperature from the setpoint temperature may cause one or more subsequent overshoots. These overshoot situations occur, at least in part, because the temperature gradient between the setpoint temperature and the warmest water available, or the coolest water available, can be relatively high. In the past, others have sought to minimize patient discomfort by using water warmed or cooled to a predetermined temperature gradient, rather than the warmest or coolest water available. For example, the 1985 SARNS Operating Manual describes a temperature control and monitor unit, primarily for supplying temperature controlled water to a blood heat exchanger in an extracorporeal circuit. The SARNS Manual also describes a “Blanket Supply” feature, for supplying water to a blanket to externally heat or cool a patient. Within this context, the SARNS Manual discloses gradient warming, via a GRADIENT switch. This switch enables the operator to select a rewarming temperature gradient for the circulating water, namely, either 6° C. or 10° C. above the sensed patient temperature. Thus, this SARNS Manual discloses the use of automatic gradient temperature control, namely, gradient warming, as opposed to warmest water available. Similarly, U.S. Pat. No. 6,517,510 issued to Stewart, uses essentially the same gradient temperature control strategy in its Automatic mode, namely a fixed, predetermined temperature gradient for patient warming or cooling With the predetermined gradient fixed at the factory by the designer of the machine, at one or two filxed and predetermined gradient values. The use of automated gradient temperature control, i.e., warming or cooling, can reduce the occurrence and/or the magnitude of overshoot. That is because the selected temperature differential i.e., the temperature difference between the warming fluid (or the cooling fluid) and the sensed patient temperature, will not be as great as would occur if the warmest or the coolest water available were initially used. However, if too much emphasis is placed on avoiding temperature overshoot, the main goal of rapidly cooling (or warming) the patient may be sacrificed. For instance, if the sensed patient temperature is 37° C. (98.6° F.), and it is desired to cool the patient to a temperature of 28.9° C. (84° F.), and the cooling water is only cooled to a temperature of 27° C. (80.5° F.) (which represents a 10° C. temperature gradient from the sensed patient temperature, common temperature gradient), the cooling water will clearly not produce the same cooling effect as cooling water which is cooled to about 4.5° C. (40° F.), as was done with the use of the coolest water available. Accordingly, in some instances, by not using the coldest available water, it may take much longer for the patient's temperature to be reduced to the setpoint temperature. In fact, the “cooling” water in this example, at a temperature of about 27° C. (80.5° F.), is actually warmer than ambient air. This means that the cooling blanket actually produces a lesser cooling effect than would occur if the patient were simply exposed to ambient air, with no blanket at all. This is one situation where the use of gradient heating or cooling, per se, suffers from a practical and common limitation. Thus, although the use of gradient cooling or warming may reduce the occurrence and/or magnitude of overshoot, it may also sacrifice rapid and efficient cooling or warming of the patient, because it will take longer to cool or warm the patient to the setpoint temperature. In some cases, the additional time needed to cool the patient to the setpoint temperature may be significant. And as noted above, sometimes the cooling water used in gradient cooling is warmer than room temperature air. Thus, there is a tradeoff among the desires to efficiently and effectively warm or cool the patient to the desired setpoint temperature in the shortest reasonable time frame, the desire to minimize the magnitude and occurrence of temperature overshoot, and the concern for patient comfort. It is an object of the present invention to conveniently achieve the primary goal of getting the patient's temperature to a desired setpoint, while also addressing the secondary issues of patient discomfort and overshoot. It is another object of this invention to minimize the occurrence of overshoot, and to also reduce the magnitude and duration of any overshoot that does occur. It is still another object of the invention to achieve the previous stated objects in a user-friendly manner, without adding undue complexity for hospital personnel. To achieve the above-stated objects, the present invention permits the use of a variable temperature gradient for warming or cooling the patient. More specifically, the present invention allows the operator to set an initial temperature gradient, i.e. the temperature difference between the sensed patient temperature and the circulating fluid. Thereafter, during operation, the system automatically and incrementally increases or decreases the magnitude of that initially-selected gradient temperature, or leaves it the same, depending on subsequently sensed patient temperatures. Thus, after a predetermined period of time, such as half an hour, if the difference between the patient temperature and the setpoint temperature is still too great (as may occur if the patient temperature is not dropping fast enough, because the temperature difference between the circulating water and the patient is simply not great enough), the present invention automatically increases the temperature gradient (the difference between the circulating water and the sensed patient temperature) by an amount of 5° C. For instance, if an initial temperature gradient of 10° C. has not caused the sensed patient temperature to drop to the setpoint temperature within one half hour, the controller of this system further cools the circulating water, so that the temperature differential between the sensed patient temperature and the circulating water now becomes 15° C., instead of 10° C. In this example, the system increases the magnitude of the temperature gradient, based on the subsequently sensed patient temperatures, after an initial sensed temperature. Additionally, after yet another predetermined time increment, for instance another half hour, this control feature again compares the sensed patient temperature with the setpoint temperature, and may then either: 1) further increase the temperature gradient of the cooling water, say from 15° C. to 20° C.; or 2) retain the same temperature gradient of 15° C.; or 3) reduce the temperature gradient from 15° C. back to the initial temperature gradient of 10° C. Thus, at the next predetermined time interval, based on the sensed patient temperature, the present invention does one of the following: 1) increases the temperature gradient magnitude, by adding another increment of 5° C. to the prior gradient (if greater, or faster cooling is needed); 2) keeps the temperature gradient the same (if the rate of cooling or warming is progressing in an acceptable manner); or 3) decreases the temperature gradient by subtracting an increment of 5° C. from the prior gradient (if lesser, or slower cooling is needed). As presently configured, the magnitude of these gradient increments has been set, or fixed, at 5° C. Nonetheless, this increment could be made variable, but it is also recognized that the user-friendliness of this system is maintained by minimizing the number of operator decisions. With this feature the system of the present invention provides greater versatility in causing the patient's temperature to move upwardly or downwardly to the desired setpoint temperature. And this system does this in a manner which quickly and efficiently drives the patient temperature in the desired direction, while thereafter automatically adjusting the temperature gradient, i.e. the difference between the sensed patient temperature and the circulating water, as needed, to increase or decrease the heating or cooling effect, as needed. Because this system automatically varies the temperature gradient, this system efficiently and effectively warms or cools the patient to the setpoint temperature in a reasonable time, while reducing the occurrence and the magnitude of overshoot. Because this system uses some of the same modes, and generally the same essential layout as the prior system, it is relatively easy to understand for the operator. That is, the operator has user-friendly access to the familiar modes of operation of the existing system, but with the added versatility and performance of these new variable temperature gradient features. These and other features of the invention will be more readily understood in view of the drawings and the following detailed description of the drawings. FIG. 1 is a schematic diagram which generally shows an exemplary overall arrangement for the components that may be used in the present invention. FIG. 2 is a plan view of a control panel of a patient temperature control system according to the present invention. FIGS. 3A-3I are graphs which show temperature versus time, with time on the horizontal axis and temperature on the vertical axis, for the setpoint temperature, the circulating water temperature, the sensed patient temperature, and ambient temperature. These graphs illustrate the operational capability of the present invention, in accordance with a preferred embodiment thereof. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT OF THE PRESENT INVENTION As noted above, FIG. 1 shows a schematic layout of a patient temperature control system 10 in accordance with the invention. This layout is meant to supply the proper background and context for explaining the operational capability of the present invention. It is not meant to be limiting in scope. More particularly, FIG. 1 shows a patient 12 supported on a table 14, with a warming/cooling device, in this case a blanket 16, substantially covering the patient 12. Water flow lines interconnect the blanket 16 with a housing, shown by a dash line 17. More particularly, FIG. 1 shows an inflow conduit line 18 which routes circulating water to the blanket 16, and an outflow line 20 which routes the circulating water back to the housing 17. Additional fluid lines could be used, if desired. Within housing 17, water from the outflow line 20 flows to a reservoir 22. From the reservoir 22, the circulating water flows to a pump 23, then through a heating/cooling device designated generally by reference numeral 24, and then outwardly again from the housing 17. The focus of the invention is not on the particular details of the circulating water components residing within the housing 17, such as the reservoir 22, the pump 23, or the heating/cooling device 24. Rather these components are shown generally in block form, for schematic purposes. A controller 26 resides within the housing 17. The controller 26 operatively connects to the heating/cooling device 24 via an electrical connector 27, and also to the pump 23 via an electrical connector 28. The controller 26 connects to a first temperature sensor 30 which senses the circulating water temperature as it exits the heating/cooling device 24, and also a second temperature sensor 31 which senses the body temperature of the patient 12. As with the circulating water components, the electrical connectors which connect to the components residing within housing 17 and with the temperature sensors 30 and 31 are merely shown in schematic form, to illustrate the general layout of the present invention. The controller 26 operatively connects to a control panel 32. An operator selectively controls operation of the system 10 via push button controls shown on the control panel 32. Stated another way, the controller 26 is microprocessor-based and configured to control warming and/or cooling in a manner which cooperates with the control panel 32 via the push buttons which are shown best in FIG. 2. Via the control panel 32, the present invention achieves one or more of the above-stated objects by more specifically controlling the temperature of the circulating water relative to the sensed patient temperature and the setpoint temperature. Notably, the present invention continues to use the same general layout of the controls as the assignee's prior Blanketrol-II system. That is, the indicator windows remain generally in the same relative positions, and the TEMPSET controls for the setpoint temperature remain centered. That is, a display window 35 shows the setpoint temperature. Display windows 41 and 45 show the temperature of the circulating water and the patient temperature, respectively. This temperature can be changed by depressing the TEMP SET push button 36, and then either the raise 37 or lower 38 buttons. Also, in the present invention the MANUAL CONTROL button 42 and the MONITOR ONLY button 43 represent operational modes that remain identical to those of the pre-existing Blanketrol-II system. The main operational advantages of the present invention relate primarily to options that are shown in the right side of control panel 32, below the AUTO CONTROL button 46, namely features which enable variability of the temperature gradient of the circulating water. Due to these features, the present invention has greater capability for more specific control over the temperature of the circulating water relative to the sensed temperature of the patient and the setpoint temperature, compared to systems that always use the warmest water available or the coolest water available for warming or cooling, respectively. At the same time, the present invention still allows the operator to use the warmest water available or the coldest available water, if that option is desired. For all of these reasons, the present invention remains user-friendly for the operator and cost-effective for the institution, and represents a better procedure for efficiently and economically driving a patient's body temperature to a desired setpoint. In the AUTO CONTROL mode, the system 10 works in the same manner as the prior Blanketrol II system. That is, it uses the warmest or coolest water available. Via pushbutton 48, the system 10 provides an option designated as GRADIENT 10° C., which involves circulating warming or cooling water which is warmed or cooled at a temperature which is, at a maximum, 10° C. different from the sensed patient temperature. Stated another way, the present invention uses temperature gradient warming or cooling (i.e. gradient warning, or gradient cooling), wherein the temperature gradient reflects a 10° C. difference between the temperature of the heating or cooling water and the sensed temperature of the patient. Additionally, the operator can also choose to set the temperature gradient at a desired magnitude which differs from 10° C. This is done by selecting an option designated as GRADIENT VARIABLE, via the appropriately labeled control button 50. Thus, the present invention provides for operator selectability of the temperature gradient, to apply temperature gradients other than merely 10° C. As with the prior Blanketrol II system, the AUTO CONTROL push button 46 is pushed after the operator uses the TEMP SET push button 36 and the incremental push buttons 37 and 38, to determine the target temperature for the circulating fluid. This sequence is also true for the GRADIENT 10° C. and the GRADIENT VARIABLE modes. That is, the operator first sets the target temperature. In GRADIENT VARIABLE mode, after push button 50 is pushed, the operator again uses the TEMP SET button 36 and the increment push buttons 37 and 38 to select a desired temperature gradient. As described up to this point, the system 10 maintains the predetermined temperature gradient, either 10° C. or a different value, for the duration of the patient cooling or warming. Compared to the prior systems which only used the warmest or the coolest water available, the present invention is capable of also circulating warming or cooling water which is warmed or cooled at a temperature that differs from the sensed patient temperature by, at a maximum, a differential of 10° C. (by selecting the Gradient 10° C. option) or some other preselected differential (by selecting the GRADIENT VARIABLE option). Generally, for the system 10, the hardware and software components may be the same or updated versions of corresponding components of the Blanketrol-II system. The controller 26 cooperates with the temperature sensor for the patient 31 and the temperature sensor 30 for the circulating fluid 30, an internal timer, and the warming/cooling device 24 within the housing 17. The system 10 coordinates the interaction of these components in a manner dictated by the control push buttons shown in FIG. 2. The operational control of the system 10 can best be understood by describing the various options for the functional operation of the system 10, with reference to FIGS. 3A-3I. More specifically, FIGS. 3A-3I show, in graphical format, the sensed patient temperature, the setpoint temperature, the ambient temperature, and the temperature of the circulating water. All of these parameters are shown by lines which extend across the graph. These time versus temperature graphs schematically illustrate the operational details of the system 10, and how those details vary in the different modes of operation. In each graph, time is depicted on the horizontal axis, and temperature is depicted on the vertical axis, in degrees centigrade. Generally, the graphs depict a temperature range from 3° C. to 43° C., which is roughly equivalent to about and 37½° F. to about a 109½° F. The time measurements are shown in military fashion (with hours, minutes and seconds shown as: hh:mm:ss). Some of the time scales differ from graph to graph. These graphs are computer generated. They do not represent actual tests. Nonetheless, applicant believes that the graphs accurately reflect the operational capability of the present invention. FIG. 3A shows that the controller 26 controls the circulating water temperature so as to track, or follow, the setpoint temperature during operation in the Manual mode. Ambient temperature is shown by solid dark line 55, which extends horizontally across the graph at about 23° C. The setpoint temperature is shown by hashed line 57. The circulating water temperature is shown by dotted line 59. At the left side of the graph, hashed line 57 shows that the setpoint temperature is at about 42° C., while the circulating water temperature (dotted line 59), is about 19.5° C. This graph shows that when the controller 26 heats the circulating water, the temperature of the circulating water raises to the setpoint temperature, until the circulating water temperature eventually levels off. If the setpoint temperature is reduced, as shown at about half way across the graph, and in this case to a temperature of about 35° C., the controller 26 cools the circulating water until it reaches the setpoint temperature. This manual mode of operation for the system 10 is identical to the manual mode of operation for the prior Blanketrol-II system. It is described herein primarily because a visual depiction of this manual mode of operation helps to clarify the other visual depictions of the variable gradient temperature modes of operation for the system 10. In the manual mode, the patient's temperature may be sensed, but it is not automatically controlled in coordination with the temperature of the circulating water. Instead, the operator must closely monitor patient temperature and the circulating water temperature, and use the setpoint temperature accordingly. Auto Mode FIG. 3B shows the Auto mode. This is represented by the AUTO CONTROL push button 46, and no additional push buttons. In this mode, the system 10 uses the warmest water available and the coldest water available, within recognized safety restrictions. As with the Manual mode (FIG. 3A), this mode is the same as the prior Blanketrol-II system. The ambient temperature is shown as a solid line 55. The setpoint temperature is shown by hashed line 57, and is initially set at 37° C., but then subsequently reduced to 32° C. The circulating water is shown as dotted line 59, and starts at 21° C. The patient temperature is shown by the hybrid dashed/dotted line 61, and is initially 37° C. In this mode, the system 10 senses the patient's temperature via sensor 31, and the circulating water temperature via sensor 30, and compares them to the setpoint. Initially, the temperature of the circulating water increases in the direction of ambient temperature, and toward the higher patient temperature. When the patient temperature moves downwardly from 37° C. to 36° C., at 9:48:33, the controller 26 begins to actively warm the circulating water, thereby causing the circulating water to reach a temperature of about 42° C., which occurs at 9:56:51. At this point, the controller 26 discontinues further warming, for safety reasons, due to a temperature override. Eventually, at the time of 10:00:15, the patient's temperature raises back up to the setpoint temperature, as a result of the warmed circulating water. At that point, when the setpoint is lowered by 5° C., to 32° C., the system 10 begins cooling the circulating water with the coolest water available, eventually reducing the temperature of the circulating water to 4° C., as shown by the line 59. Eventually, the cooling effect of the circulating water causes the patient's temperature to drop back down to the last setpoint, to 32° C. This is shown on the far right side of the graph. Thereafter, the graph shows the patient's temperature continuing to decrease below the setpoint temperature. At that point, the controller begins to warm the circulating water in order to drive the patient's temperature back up to the setpoint. FIG. 3B shows some wide swings for the temperature of the circulating water. For instance, starting at about 10:11:53, the circulating water is at the lowest temperature available, which is 4° C. This graph also shows, at the very far right side, a condition of overshoot. That is, the use of the coldest water available for cooling the patient has caused the patient's temperature to decrease downwardly, first to the setpoint temperature, and then down to a point below the setpoint temperature. Thus, the use of the coolest water available has caused an “overshoot” condition. Gradient 10° C. and Gradient Variable FIGS. 3C and 3D generally depict gradient warming and gradient cooling using a temperature gradient of 10° C. (FIG. 3C) and a selected temperature gradient of 3° C. (FIG. 3D). In both graphs, the ambient temperature is shown as a solid line 55 at 23° C. The circulating water is shown by dotted line 59, and the sensed patient temperature is shown by hybrid line 61. The setpoint temperature is shown by dashed line 57. FIG. 3C shows the patient temperature (36° C.) initially below the setpoint temperature (37° C.). In this condition, the controller 26 warms the water at a temperature that is, at a maximum, predetermined temperature gradient above the sensed patient temperature. In this case, that predetermined temperature gradient is 10° C. However, for safety reasons the system 10 limits temperature of the circulating water to 42° C., due to an overheat override, as is known. For some time thereafter, the temperature of the circulating water and the patient temperature remain generally parallel, as the system 10 gradiently warms the patient. Eventually, just before the 0:20:00 mark, the setpoint temperature decreases from 37° C. to 30° C. Correspondingly, after the system 10 senses the patient temperature well above the setpoint temperature, the controller decreases the temperature of the circulating water toward a temperature of 27° C., or 10° below the sensed patient temperature of 37° C. This next section of the graph shows a step-like decrease of the patient temperature (in three steps) as a result of gradient cooling, with the circulating water also correspondingly decreasing in step-like fashion so as to maintain a gradient cooling temperature range of 10° C. Prior to the 0:45:00 time frame, the setpoint again increases from 30° C. to 37° C. Now the patient temperature is below the setpoint temperature, so the system 10 starts to warm the circulating water. The graph shows the results of the controller 26 warming the circulating water, initially toward a temperature of 40° C. This again corresponds to the gradient 10° C. setting, which corresponds to a circulating water temperature which is 10° higher than the sensed patient temperature of 30° C. Thereafter, the patient's temperature increases in step-like fashion, due to the warming effect of the water, and the controller subsequently increases the temperature of the circulating water, in order to maintain the warming temperature gradient of 10° C. But again, because the system 10 limits the upper temperature of the circulating water to 42° C., the temperature gradient between the circulating water and the patient temperature actually becomes something less than the predetermined temperature magnitude of 10° C. Eventually, at the time of 1:10:0, the patient temperature reaches the setpoint temperature. At that point, the system 10 discontinues warming the circulating water, so that it gradually decreases in temperature to a temperature below the setpoint temperature, after the 1:20:00 time. The patient's temperature rises again at the 1:25:0 time, and the graph shows a corresponding cooling of the circulating water to the predetermined (or pre-set) cooling temperature gradient of 10° C. FIG. 3C shows that there are situations when the actual applied gradient warming temperature is not the same as the predetermined temperature gradient. This is because the system 10 automatically maxes out, or limits, the warming of the circulating water to a temperature of 42° C., due to temperature safety override, for high temperatures. FIG. 3D is entitled Gradient Variable. It generally shows the same sequence of operating parameters as FIG. 3C, and with similar results, but with a selected predetermined temperature gradient of 3° C., rather than 10° C. This is achieved by push button 50, as shown in FIG. 2. Because of this lower temperature gradient, FIG. 3D shows an initial warming situation where the temperature of the circulating water does not max out at the uppermost limit of 42° C. FIG. 3D shows that this lower temperature gradient also causes step-like decreasing of the patient temperature on the left side of the graph (in three steps), and subsequent thereto, step-like increasing of the patient's temperature on the right side of the graph (in three steps), all in increments of 3° C., followed by one temperature spike at 2:17:34, which then causes the system 10 to cool the circulating water. It is believed that this selectability to the initial temperature gradient will help to reduce the incidents of and magnitude of overshoot conditions. Notably, in each of FIGS. 3A, 3B, 3C, and 3D, broken line 59 showing the temperature of the B-III water starts in the range of about 19-21° C., a temperature range that is relatively close to room temperature. Thus, during the initial stage of treatment, the temperature of the B-III water (as reflected by line 59), is moving from about room. temperature toward the setpoint temperature because of the gradient setting (either 10° C. or another user-selected temperature gradient). From a functional standpoint, the controller 26 causes the temperature of the B-III water to gradually move toward the setpoint temperature, with the user-selected gradient serving as the maximum temperature differential, as measured from the patient's sensed temperature. In use, due to inertia in the water temperature the actual temperature of the B-III water may never attain the particular temperature difference established by the gradient setting. On the time axis, the numbered intervals are set at six minutes apart in FIG. 3D, wherein the intervals are set at five minutes apart in FIG. 3C. The Variable Gradient Feature FIGS. 3E, 3F, 3G, and 3H show the advantageous aspects of the variable gradient feature of the present invention, according to the GRADIENT 10° C. option in combination with the SMART feature. This is done by pushing the SMART push button 52, after activating the GRADIENT 10° C. push button 48. To distinguish among these Figures, the next four subheadings refer to the starting temperature of the circulating water. For each of the situations reflected by these graphs, the initial temperature gradient is 10° C. Circulating Water Starts at 27° C. In FIG. 3E, ambient temperature is shown by solid line 55, the setpoint temperature is shown by dashed line 57, the circulating water temperature is shown by dotted line 59, and patient temperature is shown by hybrid line 61. The temperature of the circulating water, on the left, starts at 27° C., above the ambient temperature of 23° C. It appears that the system 10 is actually operating in AUTOMATIC mode until 0:20:30. At that time, the patient temperature first appears on the graph, at 35° C. Because the patient's temperature at that point is below the setpoint temperature of 37° C. (and which decreased from 42° C. at the same time of 0:20:30), the temperature of the circulating water decreases. At the time 0:35:30, the patient's temperature increases to 39° C., which is two degrees above the setpoint temperature of 37° C. At that point, the controller 26 operates to cool the circulating water to a temperature of 29° C., which is 10° C. below the patient's temperature of 39° C., thus using the initial 10° C. temperature gradient for patient cooling. Thereafter, this graph shows subsequent incremental increases in the cooling gradient temperature, resulting in a 15° gradient at 1:05:31, then a 20° gradient at 1:35:31, then a 25° temperature gradient at 2:05:31, and then a 30° temperature gradient at 2:35:32. Looking at the top of the graph, the patient's temperature has remained flat at 39° C., while the setpoint temperature has remained flat at 37° C. Thus, even though these two temperature lines have remained parallel, or flat, the system 10 periodically (in this case every half hour) incrementally increases the gradient temperature for cooling, in 5° increments, to magnify the efforts to reduce the temperature of the patient to the setpoint temperature. This graph provides a good depiction of variable temperature gradient cooling, wherein the system 10 senses the need to incrementally increase the cooling temperature gradient four times in a row, and in each case, a half hour after the previous incremental increase. Circulating Water Starts at 9° C. FIG. 3F is a graph which shows a continuation of the situation which occurred at the end (the right side) of FIG. 3E. That is, ambient temperature is still at 24° C., the setpoint temperature is still at 37° C., (where it remains for the duration of the graph) and the patient's temperature, beginning at the left side of the graph, is at 39° C. If this graph is viewed as a continuation of the previous graph (FIG. 3E), it is seen that at 0:03:00, the system 10 further increases the cooling temperature gradient by another increment of 5° C., to a cooling temperature gradient of about 35° C., with the cooling circulating water cat a temperature of 4° C. Stated another way, the cooling temperature gradient has moved, in incremental step-like fashion, to a value of 35° C. In this case, the system 10 has “bottomed-out,” because the cooling temperature gradient cannot reduce any further below 4° C. In this example, 4° C. represents the lower limit for the temperature of the circulating water, for safety reasons, just as 42° C. represents the upper limit temperature for the circulating water. At 0:35:03, the patient's temperature drops to 30° C., which is 7° C. below the setpoint temperature of 37° C. Thus, the controller 26 recognizes that the patient's temperature needs to be warmed, to increase it to the setpoint of 37° C. This results in heating of, and a steep increase in, the temperature of the circulating water, an increase that continues until about 0:51:04, when the initial warming temperature gradient of 10° C. is reached. Thereafter, at 1:03:04, the system 10 further incrementally increases the warming temperature gradient, in an effort to warm the patient to the setpoint temperature, but the temperature of the circulating water maxes out at 42° C. The patient's temperature eventually rises to the setpoint at the 1:23:04 time. While this chart (FIG. 3F) may represent a continuation of the temperature situation reflected in the prior graph (FIG. 3E), it should be recognized that the time scales of both graphs are different. Also, as noted previously, these graphs represent computer modeling of the system 10, as presently configured. They do not represent actual patient treatment situations. Circulating Water Temperature Starts at 22° C. In FIG. 3G, ambient temperature is at 23° C., circulating water temperature starts at about 22° C. below ambient temperature, the patient temperature is shown at 30° C., and the setpoint temperature is shown at 37° C. Under this set of conditions, the system 10 warms the circulating water to raise the patient's temperature to the setpoint temperature. Accordingly, the temperature of the circulating water gradually increases. At the time 0:07:30, the system holds the raised circulating water temperature to a predetermined warming temperature gradient of 10° C. At 0:15:00, the patient's temperature increases from 30° C. to 32° C. Correspondingly, the controller 26 causes an increase in the temperature of the circulating water to 42° C., to maintain the 10° warming temperature gradient. Thereafter, at 0:30:00, the patient's temperature further increases from 32° C. to 35° C. However, because the system 10 has already maxed out with the warmest temperature water allowed, at 42° C., there is no further increase in the gradient temperature. At 00:34:30, the patient's temperature decreases from 35° C. to 30° C. Correspondingly, the controller 26 reduces the temperature of the circulating water to the predetermined 10° temperature gradient, in an effort to warm the patient to the setpoint temperature of 37° C. In FIG. 3H, the ambient temperature is shown at 23° C. The setpoint temperature is shown at 30° C., and it remains at 30° C. throughout the entire graph. The patient's temperature is shown at 37° C. The circulating water starts at 36° C. Because the patient's temperature is initially warmer than the setpoint temperature, the system cools the circulating water, down to 27° C., or 10° lower than the sensed patient temperature of 37° C., corresponding to the initial 10° cooling temperature gradient. At time 00:14:30, the patient's temperature decreases from 37° C. to 35° C., and the system correspondingly cools the circulating water from 27° C. down to 25° C., thereby to retain and maintain the initial 10° cooling temperature gradient. At 00:31:00 (or about 16:30 thereafter), the system has recognized that the 10° cooling temperature gradient is insufficient to cool the patient's temperature down to the setpoint. Therefore, at that point, the system 10 automatically incrementally responds by increasing the temperature gradient by 5° C., to a varied temperature gradient of 15° C. Or stated another way, the system 10 reduces the temperature of the circulating water from 25° C. to 20° C. At time 00:47:30, the patient's temperature decreases from 35° C. to 32° C. Correspondingly, the system 10 reduces the temperature of the circulating water from 20° C. to 17° C. to maintain the 15° temperature differential. At time 1:04:00 (or about 16:30 later), the system 10 again incrementally increases the cooling gradient temperature, to a gradient of 20° C., by reducing the temperature of the circulating water from 17° C. down to 12° C., in an effort to reduce the patient's temperature down to the setpoint temperature of 30° C. At time 1:15:00, the patient's temperature reduces to 30° C., the setpoint temperature. This causes the system to discontinue cooling of the circulating water, thereby allowing the temperature of the cooling water to gradually raise to the ambient temperature. At 1:31:30, the patient's temperature raises from 30° C. to 32° C. Correspondingly, the system 10 cools the circulating water to achieve a 10° cooling gradient temperature. At time 2:04:30, the system 10 determines that the initial 10° gradient temperature has not been sufficient to cool the patient down to the setpoint temperature, so the system 10 causes an incremental increase in the gradient temperature by 5° C., to 15° C. Or stated another way, the system 10 lowers the temperature of the circulating water from 22° C. down to 17° C. At time 2:10:00, the patient's temperature again reduces to the setpoint temperature, whereupon the controller discontinues cooling the circulating water. Thereafter, the temperature of the circulating water gradually raises toward ambient. But soon afterwards, the patient's temperature again increases to 32° C., and then the system 10 initiates cooling of the circulating water toward the 10° temperature gradient. Variable Gradient (Initial Gradient of 4° C., Not 10° C.) FIG. 3I shows ambient temperature at 24° C., circulating water initially at 20° C., patient temperature initially at 36° C., and setpoint temperature initially at 37° C. To achieve this example, the operator chooses the SMART feature (push button 52) after selecting the GRADIENT VARIABLE of 4° C. (push button 48). With a sensed patient temperature lower than the setpoint (as shown at the left side of the graph), the controller 26 heats the circulating water to an initial warming temperature gradient of 4° C., at 0:14:30. This causes the patient's temperature to increase to the setpoint, and thereafter, the controller 26 correspondingly discontinues further heating of the circulating water. At 0:29:31, the setpoint temperature decreases from 37° C. to 30° C. Then the sensed patient temperature is greater than the setpoint temperature, so the system 10 operates to cool the circulating water to reduce the patient's temperature, first via the initial temperature gradient of 4° C. At a time of 0:59:31, the system 10 determines that the patient temperature has not yet lowered to the setpoint temperature. Therefore, the system 10 increases the magnitude of the temperature gradient, from 4° C. to 9° C., so that the circulating water is now 26° C., or 9° C. below the patient temperature of 35° C. Thus, the system 10 incrementally increases the gradient temperature by 5° C., from 4° C. to 9° C. Even though the patient temperature then steps down to 32° C., at 1:14:32, the system 10 initially maintains this 9° C. temperature gradient. Thereafter, at a time of 1:22:02 (about 7:30 later), the system 10 further determines that the patient's temperature has not lowered fast enough. Therefore, the system 10 further reduces the temperature of the circulating water to a temperature differential which is now 14° C. below the patient's temperature, or to a temperature of 18° C., compared to a patient temperature of 32° C. In other words, the controller 26 has increased the magnitude of the cooling temperature gradient from 9° C. to 14° C., to maintain the temperature of the circulating water at a value of 14° C. below the patient temperature. Eventually, at time 1:37:02, the patient's temperature decreases to the setpoint. At that point, the system 10 discontinues further cooling of the circulating water, and the temperature of the circulating water gradually begins to rise to ambient. At 1:52:03, the patient temperature again increases above the setpoint. The controller 26 reacts by cooling the circulating water to the selected 4° C. initial temperature differential, as shown from time frame 2:07:03 to 2:22:03. However, at that time, i.e., 2:22:03, the controller 26 determines that the patient temperature has not reduced to the setpoint. Accordingly, the controller 26 further increases the magnitude of the 4° C. gradient to a 9° C. gradient, to provide a greater magnitude of cooling to the patient. Thereafter, at the right edge of the graph, the controller 26 again determines that the patient's temperature has not reduced to the setpoint (or to an acceptable range near the setpoint). Therefore, the controller 26 again reduces the temperature of the circulating water, or stated another way, increases the magnitude of the temperature differential by another increment of 5° C., from 9° C. to 14° C. Thus, the controller 26 increases or decreases the temperature gradient, in increments of 5° C., depending on the subsequently sensed patient temperature. With the present invention, the temperature can be sensed continuously, or intermittently. Also, a time interval may be selectable for determining when it is necessary to vary the temperature gradient. Nonetheless, a time interval of 30 minutes seems to be preferable. Also, the SMART feature can be selected after the fact, that is, some time into the patient temperature control treatment. That is done by simply depressing the SMART push button 52, when already in the GRADIENT 10° C., in the GRADIENT VARIABLE mode. In total, the system provides seven modes of operation, namely: 1) MANUAL CONTROL, 2) AUTO CONTROL, 3) MONITOR ONLY, 4) GRADIENT 10° C., 5) GRADIENT VARIABLE, 6) GRADIENT 10° C./SMART, AND 7) GRADIENT VARIABLE/SMART. It is believed that no other patient temperature control system provides any of the last three of these modes. The prior art described in the background does not teach or suggest any of these last three modes, nor the concept of automatically changing the temperature gradient during treatment, thereby to automatically decrease or increase the temperature gradient depending on subsequently sensed patient temperatures. With respect to the fifth mode, i.e. GRADIENT VARIABLE, neither U.S. Pat. No. 6,517,510 nor the Sarns Manual teaches the ability for a user to select any one of a plurality of different gradient options. To the contrary, with each of these two prior art references the gradient is permanently set at the factory during manufacture, at two fixed differentials. As a result, because of the combination of all of these features, and particularly the SMART modes, the system described herein is capable of achieving a high degree of versatility and user-friendliness in providing cost-effective and comfortable patient temperature control. This invention has been described in the context of the accompanying Figures, and particularly the graphs. Nonetheless, those skilled in the art will recognize that this system 10, with the variable temperature gradient feature, is susceptible to numerous variations in implementation and modification. In short, this specification is meant to be exemplary, relative to the presently preferred embodiments of the invention, not specific or limiting. Thus, it is to be understood that the invention itself is not limited by this specification, but instead is defined only by reference to the following claims, as understood in the context of this specification. 1. A patient temperature control system comprising: a) a fluid circuit for conveying warming/cooling fluid to a patient warming/cooling device, the patient warming/cooling device capable of being non-invasively applied to a patient for conductive warming/cooling of the patient according to a hypo-hyperthermia treatment; b) a controller operatively connected to the fluid circuit to control the flow and the temperature of the warming/cooling fluid there through; c) a first temperature sensor adapted to sense the temperature of the patient and operatively connected to the controller; d) a second temperature sensor adapted to sense the temperature of the warming/cooling fluid and operatively connected to the controller; e) the controller adapted to warm the warming/cooling fluid being conveyed to the warming/cooling device, thereby to conductively warm the patient in a non-invasive manner when the first sensor senses a patient temperature lower than a selected target temperature; f) the controller also operative to cool the warming/cooling fluid being conveyed to the warming/cooling device, thereby to conductively cool the patient in a non-invasive manner when the first sensor senses a patient temperature higher than the selected target temperature; g) wherein the controller automatically controls the warming or cooling of the warming/cooling fluid during an initial stage, at a temperature that differs from the sensed patient temperature by, at a maximum, a predetermined initial stage temperature gradient; and h) the controller, during a subsequent stage, automatically controls the warming or cooling of the warming/cooling fluid by automatically varying the magnitude of the temperature gradient from the predetermined initial stage temperature gradient toward a subsequent temperature gradient, in response to a subsequently sensed temperature of the patient as sensed via the first sensor, if the sensed patient temperature has not moved sufficiently close to the selected target temperature, thereby to more quickly bring the temperature of the patient to the selected target temperature and to do so in a manner which minimizes overshoot, and wherein the controller does not automatically vary the magnitude of the temperature gradient from the predetermined initial stage temperature gradient if the sensed patient temperature has moved sufficiently close to the selected target temperature. 2. The patient temperature control system of claim 1 wherein the controller causes the subsequent variations in the magnitude of the temperature gradient to occur at specified time intervals. 3. The patient temperature control system of claim 2 wherein the duration of the specified time intervals is selectable. 4. The patient temperature control system of claim 2 wherein the durations of the subsequent specified time intervals remain the same. 5. The patient temperature control system of claim 1 wherein the controller is configured to enable a user to select the magnitude of the predetermined initial stage temperature gradient, from a plurality of predetermined initial stage temperature gradient options. 6. The patient temperature control system of claim 1 wherein the controller is configured such that each of the subsequent variations in the magnitude of the temperature gradient, which result from the subsequently sensed patient temperatures, is at a fixed temperature increment. 7. The patient temperature control system of claim 6 wherein the fixed increment for the subsequent variations in the temperature gradients is about 5° C. 8. The patient temperature control system of claim 1 wherein the patient warming/cooling device is a blanket and the fluid is water. 9. A method of controlling the temperature of a patient using a patient temperature control system, the method comprising conductively warming/cooling the patient in a non-invasive manner via warmed/cooled fluid that flows through a device located near the patient, the warming/cooling fluid being warmed/cooled at a temperature which, at a maximum, differs from the patient's first sensed temperature by a predetermined temperature magnitude; and thereafter, automatically varying said predetermined temperature magnitude if the subsequently sensed patient temperature has not moved sufficiently close to a selected setpoint temperature within a given time window, but maintaining the predetermined temperature magnitude if the subsequently sensed patient temperature has moved sufficiently close to the selected setpoint temperature within the given time window. 10. The method of claim 9 wherein the duration of the given time is selectable. 11. A patient temperature control system comprising: a blanket; a controller operatively connected to the blanket for, in a mode of automatic control, conductively warming/cooling a patient in a non-invasive manner via warming/cooling fluid conveyed through the blanket, wherein the warming/cooling fluid is warmed/cooled at a temperature which is based on an initial predeteimined temperature differential relative to the patient's sensed temperature, said initial predetermined temperature differential being user-selectable such that one of at least three different initial predetermined temperature differentials may be selected, and wherein the controller automatically varies the temperature differential from said initial, user selectable predetermined temperature differential toward a subsequent temperature differential, dependent on the patient's subsequently sensed temperature, if the patient's subsequently sensed temperature has not moved sufficiently close to a selected setpoint temperature within a given time window, but wherein the controller maintains the same temperature differential if the patient's subsequently sensed temperature has moved sufficiently close to the selected setpoint temperature. 4691762 September 8, 1987 Elkins et al. 5097829 March 24, 1992 Quisenberry 5183039 February 2, 1993 Sarian et al. 5871526 February 16, 1999 Gibbs et al. 6149674 November 21, 2000 Borders 6188930 February 13, 2001 Carson 6454792 September 24, 2002 Noda et al. 6500200 December 31, 2002 Kushnir 6508831 January 21, 2003 Kushnir 6517510 February 11, 2003 Stewart et al. 6551348 April 22, 2003 Blalock et al. 6607517 August 19, 2003 Dae et al. 6620187 September 16, 2003 Carson et al. 6620189 September 16, 2003 Machold et al. 6645232 November 11, 2003 Carson 6660027 December 9, 2003 Gruszecki et al. 6685731 February 3, 2004 Kushnir et al. 6699267 March 2, 2004 Voorhees et al. 6799063 September 28, 2004 Carson 6818012 November 16, 2004 Ellingboe et al. 6827898 December 7, 2004 Fausset et al. 6855158 February 15, 2005 Stolpmann 6921198 July 26, 2005 Gruszecki et al. 20040153132 August 5, 2004 Cobb et al. 9944552 September 1999 WO 03030790 April 2003 WO European Patent Office; Supplementary European Search Report and European Search Opinion issued in related EP Application No. EP 06849847; Dec. 30, 2010; 9 pages. Dave Riggs, TCM—New Product Development, Heart-to-Heart Newsletter, Spring 1985, Sarns Perfusion News and Information, Ann Arbor, Michigan. Sarns Operators Manual, Temperature Control and Monitor System, Sarns, Inc., Ann Arbor, Michigan, May 1985. Sarns Operators Manual, Temperature Control and Monitor System, Sarns, Inc., Ann Arbor, Michigan, Mar. 1985. Sarns TCM II 3M HealthCare, Ann Arbor, Michigan, 1989. TCM Sales History Prior to 1999. 3M Sarns TCM II, The 3M Sarns TCM II—precise temperature control at your fingertips, 3M Health Care, USA, 1994. Sarns TCM II Operators Manual, 3M Health Care, USA, 1994. Sarns TCM II Technical Support Manual, 3M Health Care, USA, 1995. Deposition Transcript of Stephen Wells, Sep. 24, 2008, Ann Arbor, Michigan. Medi-Therm III Hyper/Hypotermia Machine MTA6900 Operator's Manual, Gaymar, Sep. 2000. Medi-Therm III Hyper/Hypothermia Machine MTA6900 Operator's Manual, Gaymar, Sep. 2000. Caruso C, Hadley B, Shukla R. Frame P, Khoury J., Cooling Effects and Comfort of Four Cooling Blanket Temperatures In Humans With Fever, Nursing Research 1992; 68-72. Hubbard R., Armstrong L., Young A., Rapid Hypothermia Subsequent to Oral Nicotinic Acid Ingestion And Immersion In Warm (30° C.) Water, American Journal of Emergency Medicine 1988; 6: 316-317. Deposition Transcript of Dr. Thomas P. Stewart, Oct. 1, 2008, Ann Arbor, Michigan. International Search Report, PCT/ISA/202, PCT/ISA/210, PCT/ISA/220. Medivance Press Release: Medivance, Inc., Begins Market Introdcution of the Arctic Sun TM, The Next Generation Of Patient Temperature Management Systems, Denver, Jan. 28, 2002. Medtronic Press Release: Medivance Unveils First Non-Invasive Patient Cooling System at TCT 2003 Conference, Louisville, Colorado, Sep. 15, 2003. Kimberly-Clark Patient Warming System brochure, 2003. Sarns, Inc., SARNS Operators Manual Temperature Control and Monitor System, Ann Arbor, Michigan, 1985. Assignee: Cincinnati Sub-Zero Products, Inc. (Cincinnati, OH) Inventor: Danial E. Koewler (Batavia, OH) Primary Examiner: Laura Bouchelle Current U.S. Class: With Fluid Supply (607/104); Thermal Applicators (607/96); For Specific External Body Area (607/108) International Classification: A61F 7/00 (20060101);
cc/2019-30/en_head_0021.json.gz/line1730306
__label__cc
0.587332
0.412668
Trifle Bowl We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the ZAPOLLO UG (haftungsbeschränkt). The use of the Internet pages of the ZAPOLLO UG (haftungsbeschränkt) is possible without any indication of personal data; however, if a data subject wants to use special enterprise services via our website, processing of personal data could become necessary. If the processing of personal data is necessary and there is no statutory basis for such processing, we generally obtain consent from the data subject. The processing of personal data, such as the name, address, e-mail address, or telephone number of a data subject shall always be in line with the General Data Protection Regulation (GDPR), and in accordance with the country-specific data protection regulations applicable to the ZAPOLLO UG (haftungsbeschränkt). By means of this data protection declaration, our enterprise would like to inform the general public of the nature, scope, and purpose of the personal data we collect, use and process. Furthermore, data subjects are informed, by means of this data protection declaration, of the rights to which they are entitled. As the controller, the ZAPOLLO UG (haftungsbeschränkt) has implemented numerous technical and organizational measures to ensure the most complete protection of personal data processed through this website. However, Internet-based data transmissions may in principle have security gaps, so absolute protection may not be guaranteed. For this reason, every data subject is free to transfer personal data to us via alternative means, e.g. by telephone. The data protection declaration of the ZAPOLLO UG (haftungsbeschränkt) is based on the terms used by the European legislator for the adoption of the General Data Protection Regulation (GDPR). Our data protection declaration should be legible and understandable for the general public, as well as our customers and business partners. To ensure this, we would like to first explain the terminology used. Profiling means any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements. Consent of the data subject is any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her. ZAPOLLO UG (haftungsbeschränkt) Email: mail@zapollo.de Website: www.zapollo.de The Internet pages of the ZAPOLLO UG (haftungsbeschränkt) use cookies. Cookies are text files that are stored in a computer system via an Internet browser. Through the use of cookies, the ZAPOLLO UG (haftungsbeschränkt) can provide the users of this website with more user-friendly services that would not be possible without the cookie setting. By means of a cookie, the information and offers on our website can be optimized with the user in mind. Cookies allow us, as previously mentioned, to recognize our website users. The purpose of this recognition is to make it easier for users to utilize our website. The website user that uses cookies, e.g. does not have to enter access data each time the website is accessed, because this is taken over by the website, and the cookie is thus stored on the user’s computer system. Another example is the cookie of a shopping cart in an online shop. The online store remembers the articles that a customer has placed in the virtual shopping cart via a cookie. The website of the ZAPOLLO UG (haftungsbeschränkt) collects a series of general data and information when a data subject or automated system calls up the website. This general data and information are stored in the server log files. Collected may be (1) the browser types and versions used, (2) the operating system used by the accessing system, (3) the website from which an accessing system reaches our website (so-called referrers), (4) the sub-websites, (5) the date and time of access to the Internet site, (6) an Internet protocol address (IP address), (7) the Internet service provider of the accessing system, and (8) any other similar data and information that may be used in the event of attacks on our information technology systems. When using these general data and information, the ZAPOLLO UG (haftungsbeschränkt) does not draw any conclusions about the data subject. Rather, this information is needed to (1) deliver the content of our website correctly, (2) optimize the content of our website as well as its advertisement, (3) ensure the long-term viability of our information technology systems and website technology, and (4) provide law enforcement authorities with the information necessary for criminal prosecution in case of a cyber-attack. Therefore, the ZAPOLLO UG (haftungsbeschränkt) analyzes anonymously collected data and information statistically, with the aim of increasing the data protection and data security of our enterprise, and to ensure an optimal level of protection for the personal data we process. The anonymous data of the server log files are stored separately from all personal data provided by a data subject. 5. Registration on our website The data subject has the possibility to register on the website of the controller with the indication of personal data. Which personal data are transmitted to the controller is determined by the respective input mask used for the registration. The personal data entered by the data subject are collected and stored exclusively for internal use by the controller, and for his own purposes. The controller may request transfer to one or more processors (e.g. a parcel service) that also uses personal data for an internal purpose which is attributable to the controller. By registering on the website of the controller, the IP address—assigned by the Internet service provider (ISP) and used by the data subject—date, and time of the registration are also stored. The storage of this data takes place against the background that this is the only way to prevent the misuse of our services, and, if necessary, to make it possible to investigate committed offenses. Insofar, the storage of this data is necessary to secure the controller. This data is not passed on to third parties unless there is a statutory obligation to pass on the data, or if the transfer serves the aim of criminal prosecution. The registration of the data subject, with the voluntary indication of personal data, is intended to enable the controller to offer the data subject contents or services that may only be offered to registered users due to the nature of the matter in question. Registered persons are free to change the personal data specified during the registration at any time, or to have them completely deleted from the data stock of the controller. The data controller shall, at any time, provide information upon request to each data subject as to what personal data are stored about the data subject. In addition, the data controller shall correct or erase personal data at the request or indication of the data subject, insofar as there are no statutory storage obligations. The entirety of the controller’s employees are available to the data subject in this respect as contact persons. On the website of the ZAPOLLO UG (haftungsbeschränkt), users are given the opportunity to subscribe to our enterprise’s newsletter. The input mask used for this purpose determines what personal data are transmitted, as well as when the newsletter is ordered from the controller. The ZAPOLLO UG (haftungsbeschränkt) informs its customers and business partners regularly by means of a newsletter about enterprise offers. The enterprise’s newsletter may only be received by the data subject if (1) the data subject has a valid e-mail address and (2) the data subject registers for the newsletter shipping. A confirmation e-mail will be sent to the e-mail address registered by a data subject for the first time for newsletter shipping, for legal reasons, in the double opt-in procedure. This confirmation e-mail is used to prove whether the owner of the e-mail address as the data subject is authorized to receive the newsletter. The newsletter of the ZAPOLLO UG (haftungsbeschränkt) contains so-called tracking pixels. A tracking pixel is a miniature graphic embedded in such e-mails, which are sent in HTML format to enable log file recording and analysis. This allows a statistical analysis of the success or failure of online marketing campaigns. Based on the embedded tracking pixel, the ZAPOLLO UG (haftungsbeschränkt) may see if and when an e-mail was opened by a data subject, and which links in the e-mail were called up by data subjects. Such personal data collected in the tracking pixels contained in the newsletters are stored and analyzed by the controller in order to optimize the shipping of the newsletter, as well as to adapt the content of future newsletters even better to the interests of the data subject. These personal data will not be passed on to third parties. Data subjects are at any time entitled to revoke the respective separate declaration of consent issued by means of the double-opt-in procedure. After a revocation, these personal data will be deleted by the controller. The ZAPOLLO UG (haftungsbeschränkt) automatically regards a withdrawal from the receipt of the newsletter as a revocation. The website of the ZAPOLLO UG (haftungsbeschränkt) contains information that enables a quick electronic contact to our enterprise, as well as direct communication with us, which also includes a general address of the so-called electronic mail (e-mail address). If a data subject contacts the controller by e-mail or via a contact form, the personal data transmitted by the data subject are automatically stored. Such personal data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties. 9. Comments function in the blog on the website The ZAPOLLO UG (haftungsbeschränkt) offers users the possibility to leave individual comments on individual blog contributions on a blog, which is on the website of the controller. A blog is a web-based, publicly-accessible portal, through which one or more people called bloggers or web-bloggers may post articles or write down thoughts in so-called blogposts. Blogposts may usually be commented by third parties. If a data subject leaves a comment on the blog published on this website, the comments made by the data subject are also stored and published, as well as information on the date of the commentary and on the user’s (pseudonym) chosen by the data subject. In addition, the IP address assigned by the Internet service provider (ISP) to the data subject is also logged. This storage of the IP address takes place for security reasons, and in case the data subject violates the rights of third parties, or posts illegal content through a given comment. The storage of these personal data is, therefore, in the own interest of the data controller, so that he can exculpate in the event of an infringement. This collected personal data will not be passed to third parties, unless such a transfer is required by law or serves the aim of the defense of the data controller. 10. Subscription to comments in the blog on the website The comments made in the blog of the ZAPOLLO UG (haftungsbeschränkt) may be subscribed to by third parties. In particular, there is the possibility that a commenter subscribes to the comments following his comments on a particular blog post. If a data subject decides to subscribe to the option, the controller will send an automatic confirmation e-mail to check the double opt-in procedure as to whether the owner of the specified e-mail address decided in favor of this option. The option to subscribe to comments may be terminated at any time. 11. Routine erasure and blocking of personal data 12. Rights of the data subject If one of the aforementioned reasons applies, and a data subject wishes to request the erasure of personal data stored by the ZAPOLLO UG (haftungsbeschränkt), he or she may, at any time, contact any employee of the controller. An employee of ZAPOLLO UG (haftungsbeschränkt) shall promptly ensure that the erasure request is complied with immediately. Where the controller has made personal data public and is obliged pursuant to Article 17(1) to erase the personal data, the controller, taking account of available technology and the cost of implementation, shall take reasonable steps, including technical measures, to inform other controllers processing the personal data that the data subject has requested erasure by such controllers of any links to, or copy or replication of, those personal data, as far as processing is not required. An employees of the ZAPOLLO UG (haftungsbeschränkt) will arrange the necessary measures in individual cases. If one of the aforementioned conditions is met, and a data subject wishes to request the restriction of the processing of personal data stored by the ZAPOLLO UG (haftungsbeschränkt), he or she may at any time contact any employee of the controller. The employee of the ZAPOLLO UG (haftungsbeschränkt) will arrange the restriction of the processing. In order to assert the right to data portability, the data subject may at any time contact any employee of the ZAPOLLO UG (haftungsbeschränkt). The ZAPOLLO UG (haftungsbeschränkt) shall no longer process the personal data in the event of the objection, unless we can demonstrate compelling legitimate grounds for the processing which override the interests, rights and freedoms of the data subject, or for the establishment, exercise or defence of legal claims. If the ZAPOLLO UG (haftungsbeschränkt) processes personal data for direct marketing purposes, the data subject shall have the right to object at any time to processing of personal data concerning him or her for such marketing. This applies to profiling to the extent that it is related to such direct marketing. If the data subject objects to the ZAPOLLO UG (haftungsbeschränkt) to the processing for direct marketing purposes, the ZAPOLLO UG (haftungsbeschränkt) will no longer process the personal data for these purposes. In addition, the data subject has the right, on grounds relating to his or her particular situation, to object to processing of personal data concerning him or her by the ZAPOLLO UG (haftungsbeschränkt) for scientific or historical research purposes, or for statistical purposes pursuant to Article 89(1) of the GDPR, unless the processing is necessary for the performance of a task carried out for reasons of public interest. In order to exercise the right to object, the data subject may contact any employee of the ZAPOLLO UG (haftungsbeschränkt). In addition, the data subject is free in the context of the use of information society services, and notwithstanding Directive 2002/58/EC, to use his or her right to object by automated means using technical specifications. Each data subject shall have the right granted by the European legislator not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her, or similarly significantly affects him or her, as long as the decision (1) is not is necessary for entering into, or the performance of, a contract between the data subject and a data controller, or (2) is not authorised by Union or Member State law to which the controller is subject and which also lays down suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, or (3) is not based on the data subject’s explicit consent. If the decision (1) is necessary for entering into, or the performance of, a contract between the data subject and a data controller, or (2) it is based on the data subject’s explicit consent, the ZAPOLLO UG (haftungsbeschränkt) shall implement suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and contest the decision. If the data subject wishes to exercise the rights concerning automated individual decision-making, he or she may, at any time, contact any employee of the ZAPOLLO UG (haftungsbeschränkt). f the data subject wishes to exercise the right to withdraw the consent, he or she may, at any time, contact any employee of the ZAPOLLO UG (haftungsbeschränkt). 13. Data protection provisions about the application and use of Affilinet On this website, the controller has integrated components of the enterprise Affilinet. Affilinet is a German affiliate network, which offers affiliate marketing. Affiliate marketing is a web-based form of distribution, which allows commercial operators of Internet sites, the so-called merchants or advertisers, to show advertising, which will be paid mostly through click or sale commissions, on third-party Internet sites that are also called affiliates or publishers. The Merchant provides through the affiliate network an advertising medium, such as an advertising banner or other suitable means of Internet advertising, which is subsequently integrated by an affiliate on its own Internet pages or via other channels such as keyword advertising or e-mail marketing. The operating company of Affilinet is the Affilinet GmbH, Sapporo arc 6-8, 80637 Munich, Germany. Affilinet sets a cookie on the information technology system of the data subject. The definition of cookies is explained above. The tracking cookie by Affilinet stores no personal data. Only the identification number of the affiliate, that is, the partner mediating the potential customer, as well as the ordinal number of the visitor of a website and the clicked advertising medium are stored. The purpose of this data storage is the processing of commission payments between a merchant and affiliate, which are processed through the affiliate network, that is Affilinet. The data subject may, as stated above, prevent the setting of cookies through our website at any time by means of a corresponding adjustment of the Internet browser used and, thus, permanently deny the setting of cookies. Such an adjustment to the Internet browser used would also prevent Affilinet from setting a cookie on the information technology system of the data subject. In addition, cookies already in use by Affilinet may be deleted at any time via a web browser or other software programs. The applicable data protection provisions of Affilinet may be accessed under https://www.affili.net/uk/footeritem/privacy-policy. 14. Data protection provisions about the application and use of Facebook On this website, the controller has integrated components of the enterprise Facebook. Facebook is a social network. A social network is a place for social meetings on the Internet, an online community, which usually allows users to communicate with each other and interact in a virtual space. A social network may serve as a platform for the exchange of opinions and experiences, or enable the Internet community to provide personal or business-related information. Facebook allows social network users to include the creation of private profiles, upload photos, and network through friend requests. The operating company of Facebook is Facebook, Inc., 1 Hacker Way, Menlo Park, CA 94025, United States. If a person lives outside of the United States or Canada, the controller is the Facebook Ireland Ltd., 4 Grand Canal Square, Grand Canal Harbour, Dublin 2, Ireland. With each call-up to one of the individual pages of this Internet website, which is operated by the controller and into which a Facebook component (Facebook plug-ins) was integrated, the web browser on the information technology system of the data subject is automatically prompted to download display of the corresponding Facebook component from Facebook through the Facebook component. An overview of all the Facebook Plug-ins may be accessed under https://developers.facebook.com/docs/plugins/. During the course of this technical procedure, Facebook is made aware of what specific sub-site of our website was visited by the data subject. If the data subject is logged in at the same time on Facebook, Facebook detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-site of our Internet page was visited by the data subject. This information is collected through the Facebook component and associated with the respective Facebook account of the data subject. If the data subject clicks on one of the Facebook buttons integrated into our website, e.g. the “Like” button, or if the data subject submits a comment, then Facebook matches this information with the personal Facebook user account of the data subject and stores the personal data. Facebook always receives, through the Facebook component, information about a visit to our website by the data subject, whenever the data subject is logged in at the same time on Facebook during the time of the call-up to our website. This occurs regardless of whether the data subject clicks on the Facebook component or not. If such a transmission of information to Facebook is not desirable for the data subject, then he or she may prevent this by logging off from their Facebook account before a call-up to our website is made. The data protection guideline published by Facebook, which is available at https://facebook.com/about/privacy/, provides information about the collection, processing and use of personal data by Facebook. In addition, it is explained there what setting options Facebook offers to protect the privacy of the data subject. In addition, different configuration options are made available to allow the elimination of data transmission to Facebook. These applications may be used by the data subject to eliminate a data transmission to Facebook. 15. Data protection provisions about the application and use of functions of the Amazon Partner program On this website, the controller has integrated Amazon components as a participant in the Amazon partner program. The Amazon components were created by Amazon with the aim to mediate customers through advertisements on various websites of the Amazon group, in particular Amazon.co.uk, Local.Amazon.co.uk, Amazon.de, BuyVIP.com, Amazon.fr, Amazon.it and Amazon.es in return for the payment of a commission. By using the Amazon components, the controller may generate advertising revenue. The operating company of this Amazon component is Amazon EU S.à.r.l, 5 Rue Plaetis, L-2338 Luxembourg, Luxembourg. Amazon sets a cookie the information technology system of the data subject. The definition of cookies is explained above. With each single call-up to one of the individual pages of this Internet website, which is operated by the controller and in which an Amazon component was integrated, the Internet browser on the information technology system of the data subject will automatically submit data for the purpose of online advertising and the settlement of commissions to Amazon through the respective Amazon component. During the course of this technical procedure, Amazon receives personal information that is used to trace the origin of orders from Amazon, and as a result, to allow the accounting of a commission. Among other things, Amazon may understand that the data subject has clicked on an affiliate link on our website. The data subject may, as stated above, prevent the setting of cookies through our website at any time by means of a corresponding adjustment of the web browser used, and thus permanently deny the setting of cookies. Such an adjustment to the Internet browser used would also prevent Amazon from setting a cookie on the information technology system of the data subject. In addition, cookies already in use by Amazon may be deleted at anytime via a web browser or other software programs. Further information and the actual data protection provisions of Amazon may be retrieved under https://www.amazon.de/gp/help/customer/display.html?nodeId=3312401&language=en_GB. 16. Data protection provisions about the application and use of Google AdSense On this website, the controller has integrated Google AdSense. Google AdSense is an online service which allows the placement of advertising on third-party sites. Google AdSense is based on an algorithm that selects advertisements displayed on third-party sites to match with the content of the respective third-party site. Google AdSense allows an interest-based targeting of the Internet user, which is implemented by means of generating individual user profiles. The operating company of Google’s AdSense component is Alphabet Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, United States. The purpose of Google’s AdSense component is the integration of advertisements on our website. Google AdSense places a cookie on the information technology system of the data subject. The definition of cookies is explained above. With the setting of the cookie, Alphabet Inc. is enabled to analyze the use of our website. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and into which a Google AdSense component is integrated, the Internet browser on the information technology system of the data subject will automatically submit data through the Google AdSense component for the purpose of online advertising and the settlement of commissions to Alphabet Inc. During the course of this technical procedure, the enterprise Alphabet Inc. gains knowledge of personal data, such as the IP address of the data subject, which serves Alphabet Inc., inter alia, to understand the origin of visitors and clicks and subsequently create commission settlements. The data subject may, as stated above, prevent the setting of cookies through our website at any time by means of a corresponding adjustment of the web browser used and thus permanently deny the setting of cookies. Such an adjustment to the Internet browser used would also prevent Alphabet Inc. from setting a cookie on the information technology system of the data subject. Additionally, cookies already in use by Alphabet Inc. may be deleted at any time via a web browser or other software programs. Furthermore, Google AdSense also uses so-called tracking pixels. A tracking pixel is a miniature graphic that is embedded in web pages to enable a log file recording and a log file analysis through which a statistical analysis may be performed. Based on the embedded tracking pixels, Alphabet Inc. is able to determine if and when a website was opened by a data subject, and which links were clicked on by the data subject. Tracking pixels serve, inter alia, to analyze the flow of visitors on a website. Through Google AdSense, personal data and information—which also includes the IP address, and is necessary for the collection and accounting of the displayed advertisements—is transmitted to Alphabet Inc. in the United States of America. These personal data will be stored and processed in the United States of America. The Alphabet Inc. may disclose the collected personal data through this technical procedure to third parties. Google AdSense is further explained under the following link https://www.google.com/intl/en/adsense/start/. 17. Data protection provisions about the application and use of Google Analytics (with anonymization function) On this website, the controller has integrated the component of Google Analytics (with the anonymizer function). Google Analytics is a web analytics service. Web analytics is the collection, gathering, and analysis of data about the behavior of visitors to websites. A web analysis service collects, inter alia, data about the website from which a person has come (the so-called referrer), which sub-pages were visited, or how often and for what duration a sub-page was viewed. Web analytics are mainly used for the optimization of a website and in order to carry out a cost-benefit analysis of Internet advertising. The operator of the Google Analytics component is Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, United States. For the web analytics through Google Analytics the controller uses the application “_gat. _anonymizeIp”. By means of this application the IP address of the Internet connection of the data subject is abridged by Google and anonymised when accessing our websites from a Member State of the European Union or another Contracting State to the Agreement on the European Economic Area. The purpose of the Google Analytics component is to analyze the traffic on our website. Google uses the collected data and information, inter alia, to evaluate the use of our website and to provide online reports, which show the activities on our websites, and to provide other services concerning the use of our Internet site for us. Google Analytics places a cookie on the information technology system of the data subject. The definition of cookies is explained above. With the setting of the cookie, Google is enabled to analyze the use of our website. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and into which a Google Analytics component was integrated, the Internet browser on the information technology system of the data subject will automatically submit data through the Google Analytics component for the purpose of online advertising and the settlement of commissions to Google. During the course of this technical procedure, the enterprise Google gains knowledge of personal information, such as the IP address of the data subject, which serves Google, inter alia, to understand the origin of visitors and clicks, and subsequently create commission settlements. The cookie is used to store personal information, such as the access time, the location from which the access was made, and the frequency of visits of our website by the data subject. With each visit to our Internet site, such personal data, including the IP address of the Internet access used by the data subject, will be transmitted to Google in the United States of America. These personal data are stored by Google in the United States of America. Google may pass these personal data collected through the technical procedure to third parties. The data subject may, as stated above, prevent the setting of cookies through our website at any time by means of a corresponding adjustment of the web browser used and thus permanently deny the setting of cookies. Such an adjustment to the Internet browser used would also prevent Google Analytics from setting a cookie on the information technology system of the data subject. In addition, cookies already in use by Google Analytics may be deleted at any time via a web browser or other software programs. In addition, the data subject has the possibility of objecting to a collection of data that are generated by Google Analytics, which is related to the use of this website, as well as the processing of this data by Google and the chance to preclude any such. For this purpose, the data subject must download a browser add-on under the link https://tools.google.com/dlpage/gaoptout and install it. This browser add-on tells Google Analytics through a JavaScript, that any data and information about the visits of Internet pages may not be transmitted to Google Analytics. The installation of the browser add-ons is considered an objection by Google. If the information technology system of the data subject is later deleted, formatted, or newly installed, then the data subject must reinstall the browser add-ons to disable Google Analytics. If the browser add-on was uninstalled by the data subject or any other person who is attributable to their sphere of competence, or is disabled, it is possible to execute the reinstallation or reactivation of the browser add-ons. Further information and the applicable data protection provisions of Google may be retrieved under https://www.google.com/intl/en/policies/privacy/ and under http://www.google.com/analytics/terms/us.html. Google Analytics is further explained under the following Link https://www.google.com/analytics/. 18. Data protection provisions about the application and use of Google+ On this website, the controller has integrated the Google+ button as a component. Google+ is a so-called social network. A social network is a social meeting place on the Internet, an online community, which usually allows users to communicate with each other and interact in a virtual space. A social network may serve as a platform for the exchange of opinions and experiences, or enable the Internet community to provide personal or business-related information. Google+ allows users of the social network to include the creation of private profiles, upload photos and network through friend requests. The operating company of Google+ is Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, UNITED STATES. With each call-up to one of the individual pages of this website, which is operated by the controller and on which a Google+ button has been integrated, the Internet browser on the information technology system of the data subject automatically downloads a display of the corresponding Google+ button of Google through the respective Google+ button component. During the course of this technical procedure, Google is made aware of what specific sub-page of our website was visited by the data subject. More detailed information about Google+ is available under https://developers.google.com/+/. If the data subject is logged in at the same time to Google+, Google recognizes with each call-up to our website by the data subject and for the entire duration of his or her stay on our Internet site, which specific sub-pages of our Internet page were visited by the data subject. This information is collected through the Google+ button and Google matches this with the respective Google+ account associated with the data subject. If the data subject clicks on the Google+ button integrated on our website and thus gives a Google+ 1 recommendation, then Google assigns this information to the personal Google+ user account of the data subject and stores the personal data. Google stores the Google+ 1 recommendation of the data subject, making it publicly available in accordance with the terms and conditions accepted by the data subject in this regard. Subsequently, a Google+ 1 recommendation given by the data subject on this website together with other personal data, such as the Google+ account name used by the data subject and the stored photo, is stored and processed on other Google services, such as search-engine results of the Google search engine, the Google account of the data subject or in other places, e.g. on Internet pages, or in relation to advertisements. Google is also able to link the visit to this website with other personal data stored on Google. Google further records this personal information with the purpose of improving or optimizing the various Google services. Through the Google+ button, Google receives information that the data subject visited our website, if the data subject at the time of the call-up to our website is logged in to Google+. This occurs regardless of whether the data subject clicks or doesn’t click on the Google+ button. If the data subject does not wish to transmit personal data to Google, he or she may prevent such transmission by logging out of his Google+ account before calling up our website. Further information and the data protection provisions of Google may be retrieved under https://www.google.com/intl/en/policies/privacy/. More references from Google about the Google+ 1 button may be obtained under https://developers.google.com/+/web/buttons-policy. 19. Data protection provisions about the application and use of Google-AdWords On this website, the controller has integrated Google AdWords. Google AdWords is a service for Internet advertising that allows the advertiser to place ads in Google search engine results and the Google advertising network. Google AdWords allows an advertiser to pre-define specific keywords with the help of which an ad on Google’s search results only then displayed, when the user utilizes the search engine to retrieve a keyword-relevant search result. In the Google Advertising Network, the ads are distributed on relevant web pages using an automatic algorithm, taking into account the previously defined keywords. The operating company of Google AdWords is Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, UNITED STATES. The purpose of Google AdWords is the promotion of our website by the inclusion of relevant advertising on the websites of third parties and in the search engine results of the search engine Google and an insertion of third-party advertising on our website. If a data subject reaches our website via a Google ad, a conversion cookie is filed on the information technology system of the data subject through Google. The definition of cookies is explained above. A conversion cookie loses its validity after 30 days and is not used to identify the data subject. If the cookie has not expired, the conversion cookie is used to check whether certain sub-pages, e.g, the shopping cart from an online shop system, were called up on our website. Through the conversion cookie, both Google and the controller can understand whether a person who reached an AdWords ad on our website generated sales, that is, executed or canceled a sale of goods. The data and information collected through the use of the conversion cookie is used by Google to create visit statistics for our website. These visit statistics are used in order to determine the total number of users who have been served through AdWords ads to ascertain the success or failure of each AdWords ad and to optimize our AdWords ads in the future. Neither our company nor other Google AdWords advertisers receive information from Google that could identify the data subject. The conversion cookie stores personal information, e.g. the Internet pages visited by the data subject. Each time we visit our Internet pages, personal data, including the IP address of the Internet access used by the data subject, is transmitted to Google in the United States of America. These personal data are stored by Google in the United States of America. Google may pass these personal data collected through the technical procedure to third parties. The data subject may, at any time, prevent the setting of cookies by our website, as stated above, by means of a corresponding setting of the Internet browser used and thus permanently deny the setting of cookies. Such a setting of the Internet browser used would also prevent Google from placing a conversion cookie on the information technology system of the data subject. In addition, a cookie set by Google AdWords may be deleted at any time via the Internet browser or other software programs. The data subject has a possibility of objecting to the interest based advertisement of Google. Therefore, the data subject must access from each of the browsers in use the link www.google.de/settings/ads and set the desired settings. Further information and the applicable data protection provisions of Google may be retrieved under https://www.google.com/intl/en/policies/privacy/. 20. Data protection provisions about the application and use of Instagram On this website, the controller has integrated components of the service Instagram. Instagram is a service that may be qualified as an audiovisual platform, which allows users to share photos and videos, as well as disseminate such data in other social networks. The operating company of the services offered by Instagram is Instagram LLC, 1 Hacker Way, Building 14 First Floor, Menlo Park, CA, UNITED STATES. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which an Instagram component (Insta button) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to the download of a display of the corresponding Instagram component of Instagram. During the course of this technical procedure, Instagram becomes aware of what specific sub-page of our website was visited by the data subject. If the data subject is logged in at the same time on Instagram, Instagram detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Instagram component and is associated with the respective Instagram account of the data subject. If the data subject clicks on one of the Instagram buttons integrated on our website, then Instagram matches this information with the personal Instagram user account of the data subject and stores the personal data. Instagram receives information via the Instagram component that the data subject has visited our website provided that the data subject is logged in at Instagram at the time of the call to our website. This occurs regardless of whether the person clicks on the Instagram button or not. If such a transmission of information to Instagram is not desirable for the data subject, then he or she can prevent this by logging off from their Instagram account before a call-up to our website is made. Further information and the applicable data protection provisions of Instagram may be retrieved under https://help.instagram.com/155833707900388 and https://www.instagram.com/about/legal/privacy/. 21. Data protection provisions about the application and use of Pinterest On this website, the controller has integrated components of Pinterest Inc. Pinterest is a so-called social network. A social network is an Internet social meeting place, an online community that allows users to communicate and interact with each other in a virtual space. A social network may serve as a platform for the exchange of opinions and experiences, or allow the Internet community to provide personal or company-related information. Pinterest enables the users of the social network to publish, inter alia, picture collections and individual pictures as well as descriptions on virtual pinboards (so-called pins), which can then be shared by other user’s (so-called re-pins) or commented on. The operating company of Pinterest is Pinterest Inc., 808 Brannan Street, San Francisco, CA 94103, UNITED STATES. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a Pinterest component (Pinterest plug-in) was integrated, the Internet browser on the information technology system of the data subject automatically prompted to download through the respective Pinterest component a display of the corresponding Pinterest component. Further information on Pinterest is available under https://pinterest.com/. During the course of this technical procedure, Pinterest gains knowledge of what specific sub-page of our website is visited by the data subject. If the data subject is logged in at the same time on Pinterest, Pinterest detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Pinterest component and associated with the respective Pinterest account of the data subject. If the data subject clicks on one of the Pinterest buttons, integrated on our website, then Pinterest assigns this information to the personal Pinterest user account of the data subject and stores the personal data. Pinterest receives information via the Pinterest component that the data subject has visited our website, provided that the data subject is logged in at Pinterest at the time of the call-up to our website. This occurs regardless of whether the person clicks on the Pinterest component or not. If such a transmission of information to Pinterest is not desirable for the data subject, then he or she may prevent this by logging off from their Pinterest account before a call-up to our website is made. The data protection guideline published by Pinterest, which is available under https://about.pinterest.com/privacy-policy, provides information on the collection, processing and use of personal data by Pinterest. 22. Data protection provisions about the application and use of Twitter On this website, the controller has integrated components of Twitter. Twitter is a multilingual, publicly-accessible microblogging service on which users may publish and spread so-called ‘tweets,’ e.g. short messages, which are limited to 140 characters. These short messages are available for everyone, including those who are not logged on to Twitter. The tweets are also displayed to so-called followers of the respective user. Followers are other Twitter users who follow a user’s tweets. Furthermore, Twitter allows you to address a wide audience via hashtags, links or retweets. The operating company of Twitter is Twitter, Inc., 1355 Market Street, Suite 900, San Francisco, CA 94103, UNITED STATES. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a Twitter component (Twitter button) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to download a display of the corresponding Twitter component of Twitter. Further information about the Twitter buttons is available under https://about.twitter.com/de/resources/buttons. During the course of this technical procedure, Twitter gains knowledge of what specific sub-page of our website was visited by the data subject. The purpose of the integration of the Twitter component is a retransmission of the contents of this website to allow our users to introduce this web page to the digital world and increase our visitor numbers. If the data subject is logged in at the same time on Twitter, Twitter detects with every call-up to our website by the data subject and for the entire duration of their stay on our Internet site which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Twitter component and associated with the respective Twitter account of the data subject. If the data subject clicks on one of the Twitter buttons integrated on our website, then Twitter assigns this information to the personal Twitter user account of the data subject and stores the personal data. Twitter receives information via the Twitter component that the data subject has visited our website, provided that the data subject is logged in on Twitter at the time of the call-up to our website. This occurs regardless of whether the person clicks on the Twitter component or not. If such a transmission of information to Twitter is not desirable for the data subject, then he or she may prevent this by logging off from their Twitter account before a call-up to our website is made. The applicable data protection provisions of Twitter may be accessed under https://twitter.com/privacy?lang=en. 23. Data protection provisions about the application and use of YouTube On this website, the controller has integrated components of YouTube. YouTube is an Internet video portal that enables video publishers to set video clips and other users free of charge, which also provides free viewing, review and commenting on them. YouTube allows you to publish all kinds of videos, so you can access both full movies and TV broadcasts, as well as music videos, trailers, and videos made by users via the Internet portal. The operating company of YouTube is YouTube, LLC, 901 Cherry Ave., San Bruno, CA 94066, UNITED STATES. The YouTube, LLC is a subsidiary of Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, UNITED STATES. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a YouTube component (YouTube video) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to download a display of the corresponding YouTube component. Further information about YouTube may be obtained under https://www.youtube.com/yt/about/en/. During the course of this technical procedure, YouTube and Google gain knowledge of what specific sub-page of our website was visited by the data subject. If the data subject is logged in on YouTube, YouTube recognizes with each call-up to a sub-page that contains a YouTube video, which specific sub-page of our Internet site was visited by the data subject. This information is collected by YouTube and Google and assigned to the respective YouTube account of the data subject. YouTube and Google will receive information through the YouTube component that the data subject has visited our website, if the data subject at the time of the call to our website is logged in on YouTube; this occurs regardless of whether the person clicks on a YouTube video or not. If such a transmission of this information to YouTube and Google is not desirable for the data subject, the delivery may be prevented if the data subject logs off from their own YouTube account before a call-up to our website is made. YouTube’s data protection provisions, available at https://www.google.com/intl/en/policies/privacy/, provide information about the collection, processing and use of personal data by YouTube and Google. 24. Data protection provisions about the application and use of Zanox On this website, the controller has integrated components by Zanox. Zanox is a German affiliate network that offers affiliate marketing. Affiliate marketing is an Internet-based sales form that enables commercial operators of Internet sites, the so-called merchants or advertisers, to place advertising that is usually paid via click or sale commissions on third-party websites, also called affiliates or publishers (e.g. sales partners). The merchant provides, through the affiliate network, an advertising medium, e.g. an advertising banner or other suitable means of Internet advertising, which is subsequently integrated by an affiliate on their own Internet pages or promoted via other channels, such as keyword advertising or e-marketing. The operating company of Zanox is ZANOX AG, Stralauer Allee 2, 10245 Berlin, Germany. Zanox sets a cookie on the information technology system of the data subject. The definition of cookies is explained above. The tracking cookie of Zanox does not store any personal data. Only the identification number of the affiliate, that is, the partner mediating the potential customer, as well as the ordinal number of the visitor of a website and the clicked advertising medium are stored. The purpose of storing this data is the processing of commission payments between a merchant and affiliate, which are processed via the affiliate network, that is Zanox. The data subject may, as stated above, prevent the setting of cookies through our website at any time by means of a corresponding adjustment of the web browser used and thus permanently deny the setting of cookies. Such an adjustment to the Internet browser used would also prevent Zanox from setting a cookie on the information technology system of the data subject. In addition, cookies already in use by Zanox may be deleted at any time via a web browser or other software programs. The applicable data protection provisions of Zanox may be retrieved under http://www.zanox.com/us/about-zanox/privacy/. 25. Payment Method: Data protection provisions about the use of PayPal as a payment processor On this website, the controller has integrated components of PayPal. PayPal is an online payment service provider. Payments are processed via so-called PayPal accounts, which represent virtual private or business accounts. PayPal is also able to process virtual payments through credit cards when a user does not have a PayPal account. A PayPal account is managed via an e-mail address, which is why there are no classic account numbers. PayPal makes it possible to trigger online payments to third parties or to receive payments. PayPal also accepts trustee functions and offers buyer protection services. The European operating company of PayPal is PayPal (Europe) S.à.r.l. & Cie. S.C.A., 22-24 Boulevard Royal, 2449 Luxembourg, Luxembourg. If the data subject chooses “PayPal” as the payment option in the online shop during the ordering process, we automatically transmit the data of the data subject to PayPal. By selecting this payment option, the data subject agrees to the transfer of personal data required for payment processing. The personal data transmitted to PayPal is usually first name, last name, address, email address, IP address, telephone number, mobile phone number, or other data necessary for payment processing. The processing of the purchase contract also requires such personal data, which are in connection with the respective order. The transmission of the data is aimed at payment processing and fraud prevention. The controller will transfer personal data to PayPal, in particular, if a legitimate interest in the transmission is given. The personal data exchanged between PayPal and the controller for the processing of the data will be transmitted by PayPal to economic credit agencies. This transmission is intended for identity and creditworthiness checks. PayPal will, if necessary, pass on personal data to affiliates and service providers or subcontractors to the extent that this is necessary to fulfill contractual obligations or for data to be processed in the order. The data subject has the possibility to revoke consent for the handling of personal data at any time from PayPal. A revocation shall not have any effect on personal data which must be processed, used or transmitted in accordance with (contractual) payment processing. The applicable data protection provisions of PayPal may be retrieved under https://www.paypal.com/us/webapps/mpp/ua/privacy-full. Art. 6(1) lit. a GDPR serves as the legal basis for processing operations for which we obtain consent for a specific processing purpose. If the processing of personal data is necessary for the performance of a contract to which the data subject is party, as is the case, for example, when processing operations are necessary for the supply of goods or to provide any other service, the processing is based on Article 6(1) lit. b GDPR. The same applies to such processing operations which are necessary for carrying out pre-contractual measures, for example in the case of inquiries concerning our products or services. Is our company subject to a legal obligation by which processing of personal data is required, such as for the fulfillment of tax obligations, the processing is based on Art. 6(1) lit. c GDPR. In rare cases, the processing of personal data may be necessary to protect the vital interests of the data subject or of another natural person. This would be the case, for example, if a visitor were injured in our company and his name, age, health insurance data or other vital information would have to be passed on to a doctor, hospital or other third party. Then the processing would be based on Art. 6(1) lit. d GDPR. Finally, processing operations could be based on Article 6(1) lit. f GDPR. This legal basis is used for processing operations which are not covered by any of the abovementioned legal grounds, if processing is necessary for the purposes of the legitimate interests pursued by our company or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data. Such processing operations are particularly permissible because they have been specifically mentioned by the European legislator. He considered that a legitimate interest could be assumed if the data subject is a client of the controller (Recital 47 Sentence 2 GDPR). We clarify that the provision of personal data is partly required by law (e.g. tax regulations) or can also result from contractual provisions (e.g. information on the contractual partner). Sometimes it may be necessary to conclude a contract that the data subject provides us with personal data, which must subsequently be processed by us. The data subject is, for example, obliged to provide us with personal data when our company signs a contract with him or her. The non-provision of the personal data would have the consequence that the contract with the data subject could not be concluded. Before personal data is provided by the data subject, the data subject must contact any employee. The employee clarifies to the data subject whether the provision of the personal data is required by law or contract or is necessary for the conclusion of the contract, whether there is an obligation to provide the personal data and the consequences of non-provision of the personal data. This Privacy Policy has been generated by the Privacy Policy Generator of the DGD – Your External DPO that was developed in cooperation with RC GmbH, which sells used computers and the German Lawyers from WBS-LAW.
cc/2019-30/en_head_0021.json.gz/line1730308
__label__wiki
0.845193
0.845193
Star Citizen interview — Why Chris Roberts raised another $46 million to finish sci-fi universe Dean Takahashi A Razor ship in Star Citizen. Star Citizen is the biggest crowdfunded video game of all time, with $211 million raised over the past five years from 2.2 million fans. But that isn’t quite enough to get the game to market, and so Chris Roberts, CEO of Cloud Imperium Games and Roberts Space Industries, announced today that the company has raised an additional $46 million in venture capital. The money comes from Clive Calder and Keith Calder’s Snoot Entertainment, a couple of moguls in the United Kingdom music business. Under the deal, they will own 10 percent of Cloud Imperium, and Roberts will still retain control of the company and hold 75 percent ownership. The valuation of the company is $496 million. In an interview with GamesBeat, Roberts said the money will be used to develop full marketing campaigns for the single-player game Star Citizen and the larger multiplayer sci-fi universe, Star Citizen. On top of that, Roberts finally said that fans can expect the game to debut in the summer of 2020. And to comply with United Kingdom rules, the company is disclosing its full financial picture for the first time. Roberts is laying bare for all to see the previously secret details like how much money came in via crowdfunding, how much the money the company raised each year through crowdfunding through 2017, and how much the company has spent. At the end of 2017, the team consisted of 464 people. That’s a huge project. Here’s an edited transcript of our interview. Above: Chris Roberts is CEO of Cloud Imperium Games, maker of Star Citizen. Image Credit: Cloud Imperium Games GamesBeat: I’ve been working on my Game of the Year for this year. I figure, as long as you give me something I can put on my list, I don’t care how long it takes you to make it. Chris Roberts: [Laughs] I’m working hard on that one. I think you’ll like Squadron 42. That one’s going to be pretty special. It’s taking a bit of time, but unfortunately in today’s world, with the detail and all the rest of the stuff you have to put into it, it takes a lot longer than it used to in the ‘90s. But it’s fun, having such powerful technology to create a world. That’s one of the things I liked in Red Dead Redemption 2. They spent a lot of effort on creating the world and did a really good job of it. GamesBeat: This financial information from you guys is pretty eye-opening. I’d love to see the same thing on Red Dead Redemption 2. Roberts: I know! I saw your article talking about the budget and the mechanics, the amount of people they have. I know how much we spend and how many people we’ve had over time. I was thinking that your early guesses were probably closer to the truth than the later ones, when Take-Two was pushing back and saying, “We didn’t spend that much on it!” [Editor’s note: Take-Two did not push back on our report]. GamesBeat: No, it was more just some reasoning that came in from analysts as well. That kind of pushed my numbers around. But yeah, it was difficult to figure out. Of 3,000 names listed, how many of these people really earned a full salary for eight years? Roberts: I’d guess what they did was, in the early days, had 100, 200, and then it slowly ramped up. In the last two, maybe three years you’d be in the thousands. They have a lot of content in that game. I think they have more in the U.S. than we do, but they have a pretty big studio up in Scotland, which isn’t far from our U.K. studio where we have about 270 people. We don’t have nearly as many people as Rockstar does, and we probably pay slightly less than them, but I don’t think we’re too far apart. Our internal costs, I wouldn’t say they’re too far different from theirs. They’ve probably got more established people in the U.S. studios that get paid more, and of course they have Grand Theft Auto and all that stuff that’s been doing well. I’m sure they pay some bonuses on that. Squadron’s not out yet, and Star Citizen is still in a pre-alpha early access state, so we’re not handing out big bonuses to anyone yet. We’re spending it all on development. But yeah, this stuff is always interesting. People don’t always appreciate how much work and effort it takes to make the modern game, where everyone expects this total detail and fidelity. People will complain that we’re taking it too long, but the flip side is, “Well, what about this beautiful snow simulation? Why don’t you have what this game is doing? You should do it exactly like that!” We all want to do that too, but it takes time and effort. Gamers see something out there and want it like that, but then they also want it as quickly as possible. There’s always a bit of conflict that comes from that. Above: Star Citizen is going to be a big universe. GamesBeat: There’s a feeling of raising the bar that you get from some games out there. It seems to put additional pressure on people, on top of what fans want. Roberts: Oh, yeah. Anyone that’s making a game — all the developers I know, they’re not doing it to punch a time clock. You could probably make better money in business software. But they love making games. No one wants to make an okay game. They want to make a great game. When they see other games doing cool stuff, developers want to do that too, and that escalates a little bit. And of course in our case, because we’re an ongoing open process, as we’re adding stuff people are coming up with suggestions and ideas. A lot of this stuff is really good, and we of course say, “Yes, we’d like to be able to do that.” On the Star Citizen front, we’re applying a different approach, which is more like — we treat ourselves like a live game. We’re constantly trying to improve it, even though we still have loads of features that we’ve committed to and we still need to do. We’ve made the approach of — it’s a kind of live, iterative process that’s ongoing. A fair amount of our backers totally get that. They’re cool with that. I think there is some subset of people in the gaming world that don’t quite understand that yet about Star Citizen. They look at it through this lens of, “Is it released yet?” Which is a bit different to us. We’re in this weird early access phase where people are playing and doing stuff, but we’re still wiping the database now and then, doing new releases, changing functionality, and rebalancing stuff. We’re in this neverland spot, which is, I would say — it’s not completely new to the business. Other people, like DayZ or even Minecraft in the early days, were in a similar status. But it is a newer way of doing stuff compared to the old way, where we did it shut away from everyone until it was finished and went out to the public. GamesBeat: On some of the details here — were you required in some way to report financials for any particular regulatory reason? Roberts: We’re split between the U.K. operation, which handles the rest of the world, and the U.S. operation, which handles North America. There are two Cloud Imperium entities. In the U.K., even if you’re a private company, you have to post your financials and board of directors and everything on Companies House, which is this U.K. regulatory body. We’ve been doing that for quite a few years. Obviously in the U.S. you don’t need to do that, but we’ve always — since we’re so open, so public, there’s always a lot of — every time we post every year on Companies House, there’s always debate. People are trying to do the back-of-the-napkin math. “How much are they spending? Do they have enough money to finish the game?” There’s a lot of financial forensics happening. We’re open. We’re public. We’re committed to spending all the money we bring in on development. We’ve told everyone on our backer side that the money we raise dictates the level of development spending and scope of what we’re trying to do with Star Citizen. So we’ve long debated–we’re already showing part of the picture, so why don’t we just show it all? We’re already open with how we’re developing it. In some ways we’ve had this internal debate for quite a few years. Why don’t we just publish the consolidated global numbers like you would as a public company so our backers can see where the money goes? Above: Nox’s race across Yela in Star Citizen. Image Credit: Roberts Space Industries One problem we have is everyone just looks at the headline. “Star Citizen raises $200 million,” and so they immediately think we’re off on a deserted island sipping pina coladas on the back of our super-yacht. We have 500-odd people in five studios spread around the world and it costs money to run an operation like that. The money we bring goes all into development. So we said, “Maybe if we’re just open about it and show the financials people will understand that.” Of course there will probably still be some people that won’t, but we can’t do anything about that. That was the impetus for sharing the financials with the community. It’s something we’ve discussed internally for a long time, just because we feel like we owe it to everybody who’s supported us. We’re open about development, so why not be open about the other stuff? GamesBeat: Even with the financials of public companies, like Take-Two and this capitalized software costs thing — it gets a little murky. There’s a lot of mysteries still. Roberts: Oh, yeah. We went out of our way, in terms of how you treat expenses and capitalized stuff — we wanted to be more like a layman’s style of accounting. Cash in, cash out. We also wanted to be very clear about what goes in terms of development and then what goes in terms of publishing. I don’t think people understand that we run hundreds of servers in AWS. We have a whole department that has to maintain and run those. We have a community team that manages the community and the forums. We have a player relations team that has to deal with — “Someone came in and stole my game!” There’s a lot of things we do even at an early stage. It’s all what you have to do as a full-on publisher. I think people assume this stuff just magically happens or something. One thing about doing this — we’re saying, “This is what it costs.” We’re fairly frugal with how we try to do stuff. We have our most headcount in Europe, which is less expensive than in Los Angeles or even Austin, Texas. But even in the U.S. operations, a lot of our online and player relations stuff is in Austin, because that’s a more economical place to do it than, say, Los Angeles. We’re more efficient because we have to be, compared to a big publisher. But it’s useful for people to see what these things cost. From my standpoint, maybe I’m just a bit of a geek about it. I’d love to know more about what Take-Two’s doing, or even how it goes in EA and Activision’s stuff. They’re so big that it’s all rolled up. You don’t get visibility into what they’re really spending on development versus marketing versus online operations or whatever. Above: Star Citizen’s combat in action. GamesBeat: On the overall financial picture, it looks like you had to spend a lot of what you’ve raised. There’s not a ton of cushion. You’re not riding very comfortably. Roberts: The counter, I would say — we have five years of revenue history. That’s where I’d point. We don’t operate — I think everyone thinks, “You had $200 million to go make a game, and you spent it and that’s it.” That’s not the way it is. Every day we bring in money. Every day we have new people joining. We operate very much like a live product. What we do is every year we forecast what we’ll be doing over the year, and that sets our spending targets. Generally we’ve been incredibly accurate on our forecasts over the last four years. We maybe had two to five percent deviation from our forecasts, which is pretty decent. Yes, you could say, “You have $20 million in the bank, and that’s only so much for operations.” But there’s not ever been a case where we’ve gone to zero dollars. There’s no history to say we would do that. That’s kind of like me saying — yes, if Electronic Arts didn’t bring in another cent, they’d be out of money in short order, because they have pretty heavy running costs. We’ve also set it up in a way that, if we’re seeing a drop-off, we’d scale back our development ambition. But we haven’t, so we’ve been planning for that and getting stuff out. We obviously anticipate that when Squadron comes out, that’s going to be a big revenue-positive event for us. We have a bunch of people who’ve backed for Star Citizen and pledged for Squadron, but that game has potential to reach millions more people than our current base. Our approach was that we wanted to — the money we’re bringing from crowdfunding, we’re committed to spending on the game and development. If we saw a change in that velocity or trajectory of the revenue coming in, we would make an adjustment on our internal development spending. We have a few levers to pull, but we’ve been pretty steady as we’ve gone along. We felt comfortable in our planning on that. It would be great if we sat on a billion dollars and we could work for 20 years without ever bringing any money in. [laughs] But we won’t be anywhere near there until we release Squadron and get a little further on. GamesBeat: How do you feel about the valuation, around $500 million? That seems pretty good. In some ways it even seems a little low given what some of your ambition is. Roberts: We actually did a valuation, an investment bank valuation process. The actual valuation, the paper one, which you’ll always discount, and a private one and all the rest — potentially it could be anywhere from, using comparables and metrics, future events and revenues — it could be $700 million to $1 billion. Our end-up valuation, as you would do for a private one, has a slight haircut to it. I’m pretty proud that we’ve built a company to this point that’s worth almost half a billion dollars. But I think that if it all works, if Squadron comes out and is big, and then Star Citizen turns into this online universe that people just go to — I’m not going to say it’s World of Warcraft-sized, but it has the potential to be that kind of destination. If it does that, you’re talking about a much bigger number than we’re talking about here. I’m not saying we’re Fortnite, but Epic just had a $15 billion valuation. You see a lot of other companies with pretty large valuations. If the online basis works, you could be looking at a business that does $300 million, $400 million, $500 million a year, which means you’re much bigger. The margins would be fairly high because it’s an online game. You’d be talking about a pretty valuable business. Clive and Keith have gotten themselves a good deal, I think, and it’s good for us at this point, because it allows us the flexibility and independence that we wouldn’t have otherwise. For me, I’m seeing the bigger game. I want to be up there with the other big online players. I don’t see any reason why we couldn’t match the Riots of the world and so on. Above: A derelict Javelin ship in Star Citizen. GamesBeat: How did some of the thinking go into raising this round? Did you need this for marketing purposes? Does it have to be designated to U.S. costs or U.K. costs, or do you have more free rein to use this money? Roberts: No, it’s pretty free rein. There are some constraints. I can’t go and buy myself a $50 million yacht with it. [laughs] But both the U.S. and the U.K. companies have issued shares, and it was invested equally there for corporate purposes. The prime thing that we wanted and needed it for was looking forward to the launch of Squadron 42. As you said, we run fairly tight on the development side. It’s not like we have a lot of free cash sitting around to spend on marketing. We could potentially launch Squadron and be organic about it, but it felt like that wouldn’t be the best way to do it. We’re not planning on trying to compete with the blanket Call of Duty style of marketing, but we’re certainly going to be doing marketing than we do, and do some traditional marketing as well as our typical viral community style of marketing. What’s nice about this is, we get to do it. We don’t have to partner with someone. We’re a little different from some other crowdfunded games, because of our scale, but a lot of other companies — the Kingdom Come: Deliverance guys, they partnered with Deep Silver to do the actual release of their game. I think inXile and Obsidian, on their side, they did some partnerships for their physical retail beyond fulfilling the crowdfunded stuff. From our standpoint, that would be leaving money on the table. We’d rather handle it ourselves and be directly in control of our destiny, which is what we’ve done so far already. I would argue we’ve been pretty successful because we’ve done that, so we wanted to keep that and not have to put our destiny, our future, in the hands of a third party. They may do a great job. I don’t know. But it always feels better when you’re in control. GamesBeat: It does look like you still retain quite a bit of ownership. It’s different from a lot of other venture-funded companies out there, which do give up quite a bit of control. Roberts: I hold 75 percent of the company. I have full board control. I have the majority of the votes on the board. The effective control of the company hasn’t changed. We’ve just brought on our first proper outside investor. But we’re talking just over 10 percent. Outside of some rules that — like I said, I can’t spend it on a super-yacht. But they totally buy into what we’re trying to do. They understand what we’re building. They’re actually really excited about it, which is cool. One of the nice things about this — we went through a process. There were quite a few people we talked to, and some where we thought — I’ve had these discussions and been down this road before with the venture and private equity side. Sometimes I feel like they don’t quite get the vision or the alignment. It’s not a product per se. It’s more like a community. We have this community that we’ve built and that we’ll grow. They love science fiction and they love the universe we’ve created. That’s what we’re building and growing. We look at it that way. We look at how we can constantly have engagement with the community. You can look at it, if you’re thinking in the business terms of a Microsoft or someone like that, as a userbase. You’re engaging them year-round. That’s how we look at it. It’s less about how we have to release this on this date. It’s all about building this world. It’s the long game, not the short game. We want to make sure that this game and world can go on for year after year and stand the test of time. Above: Star Citizen FPS Having people who understand more of the longer-term view, and also understand the value of, A, creativity, and B, doing good stuff, is important. Clive’s background is the very top of the music business. One time when we were first meeting, he was telling me about this record — I think it was Def Leppard or someone like that — and he felt like the album needed a few more months to get it right, but he was pushed by the publishing side to get it out for Christmas. He hated that. He said, “I really wish I hadn’t done that, because it would have sold a lot more copies if it had a bit more time.” For me, as a developer — I feel like it’s all about the game. In the end everybody liked Red Dead Redemption 2 and forgot that it might have been out a year earlier. They delivered. If it came out and didn’t have that extra level of polish, it would have been a disaster. They took the time to make it right. If you look at the game industry, at the very height of it, with the biggest titles that’s very consistently what you see. If you’re just trying to push it out to make a quarter, you end up doing a disservice to the product, to the brand. If you make sure you spend the time to get it right, that’s what burnishes it. I felt like, from the moment we were discussing this — yeah, Clive and Keith totally get this. I’ve had some discussions on the VC or private equity side that were much more like — they were batting around whatever the catchphrase of the day might have been as far as metrics or whatever they saw as the latest success story. League of Legends or whatever it was. You know how it goes. People focus on whatever they’ve read in an article. I feel like sometimes, when I talk to VC, you have a junior analyst who’s read some jargon and they navigate around meetings like it means something. GamesBeat: The two new board representatives, Dan Offner and Eli Klein, are they part of the investment team, or are they appointed by the investors? Roberts: Dan is appointed by Clive and Keith to represent them. I’ve known him for quite a few years, actually. I met him when he was at Oculus. He’s obviously got a fair amount of experience in the interactive world, as well as advising and investing and all that stuff. He was helping Clive and Keith as far as advising them on the investment, and so they’ve appointed him to be their board representative. Eli has been a personal friend of mine. He’s been advising and helping us since we started to look for potential financing sources for marketing funds for Squadron. When we started that process, he was helping and advising with that. During the course of that, he was part of introducing us to Clive and Keith. I’ve appointed him to the board for us. As we’re getting bigger in terms of valuation and investment, we felt it would be nice to have a couple of outside board members besides just the internal people. Otherwise it was just myself and my brother and Ortwin Freyermuth, our chief legal counsel, who co-founded the company with us. We felt it would be good to have board members that have some other insights. They can help us as we go forward for whatever business needs and planning. Above: Squadron 42 GamesBeat: In your case it looks like you gave up a little bit of control, but you got a lot of assurance about how much runway you have. You still seem to have the ability to go back and get some more should that contingency arise. Roberts: That’s true. I don’t give up any control. The difference in control and the operations or planning of the company, or even how the board is run now — the only additional stuff is we’ve obviously added a few extra governance items to protect minority investors. But on the investor side there is no company override of control. As long as we’re not spending on a super-yacht, like I said, it’s cool. I don’t think anyone that crowdfunded the game would be very happy about that either, if I was snapping pictures on the back of a yacht somewhere. [laughs] I’d much rather put it into the game, because that’s what I care about. It’s my chance to build something I wanted to build my whole life, to a scale and ambition I’ve wanted to do, that I felt like I couldn’t — it would be almost impossible for me to get a big public publisher to back that. It would be too much of an investment. It would take too long and be too risky. GamesBeat: As we see with Red Dead or God of War, it’s just a handful of games that get to have this kind of development cycle. Roberts: Rockstar has earned it, because they’ve made so much money for Take-Two. Take-Two is willing to let them take the time. God of War is another example. It’s one of Sony’s key franchises. But it would be hard for me to go to any of these guys and say, “I want to spend $200 million on a space sim.” They’d tell me to get lost. I’m very lucky and very fortunate to be in the position I am. GamesBeat: In some ways this is a good answer for you guys, because we’ve seen some past media reports that presented a partial picture. It made everyone worry about the project. But it seems like this has answered that. Roberts: That’s probably one of the reasons we finally decided to do it. You know how a business runs. Contrary to some armchair developers and businesspeople, we actually have quite a lot of people that have a lot of experience in the industry for a long time. We’re not nearsighted in what we’re doing. We feel like we’re running a pretty tight and smart ship considering what we want to get to and what our endgame is. There is a bit of frustration when you see people speculate on half of the information. That was part of the impetus for getting out the information on the finances and all the rest. In the case of the investment, the other thing we see all the time, and it’s not like we’re not aware of it — “Okay, this is great, you’re doing the game, but how are you going to run the servers? How are you going to launch the game? How are you going to do the marketing? Where will you get that money from?” This is essentially saying, “We know that. We’ve been running our business this way so far and we’ll continue to run it this way. Here is how we’re taking care of some of the additional needs we’ll have to go from development to full launch, without having to rely on a third party.” For me, I think the investment is very important for our independence, because it gives us the ability to take our time. We have the ability to take care of our marketing and not be beholden to someone else. For the future of the company, it’s a really good sign. And it’s a good sign to show that, even at this stage, the company is worth this kind of money. As we grow and get bigger, it should only increase beyond that. That should give people who are worried about whether we’ll be around tomorrow — they shouldn’t be so worried about that. Above: Avenger Titan ship in Star Citizen. GamesBeat: Another interesting thing amid all of this is you do have a launch window now. What sort of confidence goes into that setting that up for Squadron 42? Roberts: [Laughs] We wouldn’t publish the road map if we didn’t feel pretty good about it. We spent a fair amount of time breaking all the remaining stuff down. A fair amount of the R&D aspects are either behind us or almost behind us. What we’re publishing is what the team themselves has broken down and done a fair amount of estimation based on the knowledge they have, in a way you wouldn’t have the ability to do at the beginning of the project. We feel that this is as good a guess as we can do this far out. The caveat, obviously, is that some things can take longer than we anticipate. The quality is important. If we feel like some aspects of that need more time, then we’ll take the time. But we’re looking to 2020 to release Squadron, in about Q3 or Q4. Above: An Eclipse stealth bomber in Star Citizen. GamesBeat: So you’re not going to tattoo the launch date on your arm just yet, like Peter Moore did. Roberts: No. [Laughs] Maybe if you have a conversation with me this time next year we can talk about that, but I’m not a big tattoo fan. GamesBeat: When you do ship, what do you think is still the great proposition for gamers with Squadron 42? What do you hope that it will achieve or do to resonate with fans? What’s the feeling you want them to come away with? Roberts: The goal of Squadron has always been to have you as the player feel like you’re living this huge science fiction event movie. You’re emotionally connected to it. There’s a level of performance from the various characters around you that gives a human connection and an emotion that potentially you haven’t seen or had before in most games. We’re trying our best to push the tech in terms of bringing the actors in — their likeness, their performance, how they fluidly behave. People have seen some of this stuff in pre-rendered cinematics, but I don’t think anyone’s played it in a game where it’s all fluidly happening around you — where it’s gameplay, but it’s of a cinematic quality. It’s a fluid immersion in the world. Unlike the Wing Commander games, where you would fly the missions in space from the point of view of flying your spaceship, and then back on your ship you’d click on different characters and talk to them — whether it was done in 2D sprites like Wing 1 and Wing 2, or full-motion video like Wing 3 and Wing 4 — in this case you’re moving around a fully detailed environment with the whole crew going about their daily lives and their own issues and stories. The difference between this and a movie — every single secondary character has their own arcs and stories. It’s tied quite tightly into how the story unfolds. I feel like, hopefully, if it all works on an emotional basis, it will be an experience that will be pretty awesome for people. As we’re making it, as I’m seeing this stuff as it happens, I can feel how that’s going to be and how people will be taken by it. I’m excited to get to a point where other people can see and experience that. Above: Rich Hilleman, director of PMT at Amazon Games, and Chris Roberts of Roberts Space Industries talked about tech’s effect on gaming worlds such as Star Citizen at GamesBeat Summit 2017. Image Credit: Michael O'Donnell/VentureBeat I know there are elements — whether it’s God of War or Red Dead Redemption 2 or Last of Us 2, other games have similar elements to this. I feel like we’re at a level that’s above that, a level of connection and acting and characterization. But of course, I’m very biased. [laughs] I’m hoping it will push forward that sense of interactive — whatever you want to call it. In the old days we’d call it interactive movies. This story where you are the star, that you’re driving forward. We’ve crafted it in such a way that you’re making the choices. The difference compared to — in some of our past games, some of the actual choices you make, in terms of character interaction, are made for you, not by you as the player. But in our case we’ve very carefully crafted it so you choose who you befriend, who you hang out with, who you talk to, how you find out what their life stories are. As the story unfolds and things happen to various characters inside the story — and of course they do, because otherwise it wouldn’t be a very interesting story — then hopefully it’s more affecting for you. If someone gets killed and you spent the time to get to know them and really like them, that should be more emotionally affecting than if you’re told that you should be upset, if you’re crying about them simply because that was constructed into the narrative. We’ve tried very much to be subtle, to paint with texture. When it all comes together, I think the detail of it will be really impactful. There’s no point in working this hard, for this long, to do something okay. That’s how I feel, and how most of the team feels. Hopefully people will appreciate all that work. Top Stories from VentureBeat ©2019 VentureBeat. All rights reserved.
cc/2019-30/en_head_0021.json.gz/line1730310
__label__wiki
0.581738
0.581738
(The.Idea.Exchange) Blog Congressional Leaders Highlight Tax Reform Proposals By Barry Edelstein CPA, Partner As the new administration and Congress get to work, tax reform is high on the agenda. Although legislative language has not been yet released, statements from tax writers in Congress shed some light on various proposals. House Ways and Means Chair Kevin Brady, R-Texas, has predicted that tax reform will lower the tax rates for all businesses. “We are proposing a corporate rate of 20 percent and for small businesses, a top rate of no more than 25 percent,” Brady said in February. As for the timeline of tax reform, Brady said that tax reform legislation will be unveiled in the “coming months,” but “repeal and replacement of the Affordable Care Act (ACA) comes first.” Senate Finance Committee Chair Orrin Hatch, R-Utah, has said that the Senate will work through its own tax reform process. “No one should expect the Senate to simply take up and pass a House tax reform bill,” Hatch said in February. Hatch added that Senate tax writers are in the early stages of drafting a tax reform proposal. Hatch did not provide details of the proposal but said that House and Senate Republicans generally agree on basic principles, such as lower tax rates for individuals and businesses. One area of potential friction is the House GOP’s so-called “border adjustability” proposal. Hatch has questioned if the border adjustment proposal, essentially taxing imports but not U.S. exports, is “in line with international trade obligations” and if “adjustments would need to be made to prevent shifting a tax burden onto specific industries.” Democrats, although in agreement the tax code is in need of reform, have been critical of Republicans’ proposed solutions as appearing to focus on tax cuts for the wealthy. “They (Republicans) are for trickle-down economics…giving tax breaks to the wealthy, it trickles down and if somebody gets a job, that’s great, if they don’t, so be it,” House Minority Leader Nancy Pelosi, D-Calif., said in February. “You don’t receive economic security by tossing the rich even more tax breaks,” she added. The Affordable Care Act (ACA) included a host of tax-related provisions. The ACA created the net investment income (NII) tax, the additional Medicare Tax, an excise tax on certain medical devices, and more. The ACA also imposes shared responsibility requirements on individuals and employers (known as the individual and employer mandates). Although President Trump and Republicans in Congress have called for repeal and replacement of the ACA, it is not clear at this time if repeal includes the ACA’s tax provisions. In February, Hatch said that all of the ACA’s taxes “need to go.” The timeline for Congressional action on the ACA is expected to be known in March. GOP leaders in Congress have said that they will unveil an ACA repeal and replacement measure in March. Pelosi said in February that Democrats have still not seen a repeal and replacement plan for the ACA. “They’re supposed to have their plan to repeal the Affordable Care Act. We have not seen hide nor hair,” Pelosi said. According to Pelosi, the GOP’s chosen route of reforming the healthcare law is a difficult endeavor. If you have any questions about tax reform or the Affordable Care Act, please contact Warady & Davis LLP at (847) 267-9600. Show All Blog Posts Click below to subscribe to our publications.
cc/2019-30/en_head_0021.json.gz/line1730318
__label__cc
0.69358
0.30642
IRS offers guidance on taxation of phased retirement payments Phased retirement has become an increasingly popular trend lately. Along with its increased use, however, a number of questions have arisen. The IRS recently has issued guidance for determining the taxable portion of payments made to an employee during phased retirement. The guidance explains whether the payments are “received as an annuity” under Code Sec. 72 and how to determine the taxable portion of payments that are not received as an annuity. Phased Retirement Phased retirement is an arrangement where an employee (the “participant”) in a qualified defined benefit plan elects to keep working on a part-time basis, rather than completely retire and take full benefits. The employer and the employee agree that an employee will work part-time for a specified period. However, the parties may agree at any time to change the period of part-time employment. During phased retirement, the employer pays the participant a portion of his or her full retirement benefits, in the form of a single life annuity. At the same time, the employee continues to earn additional retirement benefits and to make additional contributions. The guidance provides an example where the employee in phased retirement works 40 percent of his full-time schedule. During part-time employment, the employee receives payments equal to 60 percent of the employee’s benefit at full retirement. Thus, for example, an employee who would be entitled to a single life annuity of $2,000 a month at full retirement would receive $1,200 a month during part-time employment. When the part-time employee terminates all employment, the employee begins to receive an annuity based on full retirement. The employee’s total retirement benefit equals the monthly benefit paid during phased retirement, increased by a cost-of-living adjustment and an additional amount. Non-Annuity Payments Under Code Sec. 72(e), amounts not received as an annuity are excluded from gross income if allocated to investment in the contract. Code Sec. 72(e)(8) provides for the pro rata recovery of the employee’s contributions. The ratio of the investment in the contract to the vested account balance (the “basis recovery fraction”) determines the nontaxable portion of each payment. A plan’s obligations to the employee at full retirement may not be fixed and determinable for an employee receiving phased retirement payments, if: the plan’s obligations depend on the employee’s continued part-time employment; the employee will not receive full retirement benefits until ceasing employment at an undetermined time; and the employee can elect a distribution option at full retirement. If these conditions apply, the payments made during phased retirement are not received as an annuity. As a result, the taxable and excludible portions of the payments must be determined under Code Sec. 72(e)(8), by applying the basis recovery fraction to each phased retirement payment.
cc/2019-30/en_head_0021.json.gz/line1730319
__label__wiki
0.604665
0.604665
Ruby Rose to Suit Up as BATWOMAN August 8, 2018 • Posted under: In Technicolor by Jeff Andrews Tags: Arrow, Batwoman, Comic Con, DC, DC Comics, John Wick: Chapter 2, Kate Kane, Orange Is The New Black, Ruby Rose, The CW, The Meg, xXx: Return of Xander Cage The ever-expanding world of The CW’s “Arrowverse” is about to get a new corner…and a trailblazing new hero. Ruby Rose, the charismatic actress who has stolen the show in Orange is the New Black and in movies like xXx: Return of Xander Cage, John Wick Chapter 2 and the upcoming “Jurassic shark” thriller The Meg, has landed the role of Batwoman in next season’s crossover event. Stephen Amell first announced that the character would be a prominent part of the crossover last May at upfronts, an exciting announcement that was further teased this summer at Comic-Con with a new trailer. Rose will be playing the Kate Kane version of the character, who, armed with a passion for social justice and flair for speaking her mind, soars onto the streets of Gotham as Batwoman, an out lesbian and highly trained street fighter primed to snuff out the failing city’s criminal resurgence. But don’t call her a hero yet—in a city desperate for a savior, Kate must overcome her own demons before embracing the call to be Gotham’s symbol of hope. Kate Kane was first introduced in 2006 in the weekly comic series 52 and to this date remains one of DC’s most prominent gay superheroes. The daughter of a prominent Colonel and cousin to Bruce Wayne, in the comics, Kate has a tragic childhood in which her mother and sister are both killed after being abducted and taken hostage, leaving her to be raised by her father. Eventually accepted to West Point, Kate does very well academically until it’s discovered that she’s in a lesbian relationship with another student and chooses to leave the school rather than lie about who she is. Over time, inspired by Gotham’s most famous vigilante, Kate finds a new way to fight for justice under the guise of Batwoman. Since then, Kate Kane’s Batwoman has remained an important part of the Bat-family, anchoring both DETECTIVE COMICS on occasion and her own self-titled ongoing. She also appeared in the recent animated movie Batman: Bad Blood and in DC video games like DC Universe Online and LEGO Batman 3: Beyond Gotham. This will be her first live-action appearance. Rose is an apt choice for the role, as she’s both demonstrated a penchant for action and is a member of the LGBTQ community. She also physically fits the part, has shown real breadth in her acting, and if her past roles are any indication, can throw down with the best of them. But what do you think? Are you excited to see Rose bring Kate Kane to life? And how ready are you to see the streets of Gotham enter the Arrowverse? – via DC Comics SPINNER RACK: Rob’s Picks – Week of 07/12/2017 Welcome to the SPINNER RACK! My name is Rob, and each week I’ll bring you my top picks … ‘War for the Planet of the Apes’ – New Trailer A new trailer for Matt Reeves’ third installment of the “Planet of the Apes” franchise reboot. A darker, …
cc/2019-30/en_head_0021.json.gz/line1730321
__label__wiki
0.808767
0.808767
Jan MAR Jun Collection: Wikipedia Outlinks March 2016 Crawl of outlinks from wikipedia.org started March, 2016. These files are currently not publicly accessible. Properties of this collection. It has been several years since the last time we did this. For this collection, several things were done: 1. Turned off duplicate detection. This collection will be complete, as there is a good chance we will share the data, and sharing data with pointers to random other collections, is a complex problem. 2. For the first time, did all the different wikis. The original runs were just against the enwiki. This one, the seed list was built from all 865 collections. Timeline of the San Francisco Earthquake This timeline is excerpted from Gladys Hansen’s “Chronology of the Great Earthquake, and the 1906-1907 Graft Investigations.” San Francisco was wrecked by a Great Earthquake at 5:13 a.m., and then destroyed by the seventh Great Fire that burned for four days. Hundreds, perhaps thousands of trapped persons died when South-of-Market tenements collapsed as the ground liquefied beneath them. Most of those buildings immediately caught fire, and trapped victims could not be rescued. Reevaluation of the 1906 data, during the 1980s, placed the total earthquake death toll at more than 3,000 from all causes. Damage was estimated at $500,000,000 in 1906 dollars. Fire Chief Engineer Dennis T. Sullivan was mortally wounded when the dome of the California Theatre and hotel crashed through the fire station in which he was living at 410-412 Bush St. Acting Chief Engineer John Dougherty commanded fire operations. The earthquake shock was felt from Coos Bay, Oregon, to Los Angeles, and as far east as central Nevada, an area of about 375,000 square miles, approximately half of which was in the Pacific Ocean. The region of destructive effect extended from the southern part of Fresno County to Eureka, about 400 miles, and for a distance of 25 to 30 miles on either side of the fault zone. The distribution of intensity within the region of destruction was uneven. Of course, all structures standing on or crossing the rift were destroyed or badly damaged. Many trees standing near the fault were either uprooted or broken off. Perhaps the most marked destruction of trees was near Loma Prieta in Santa Cruz County, where, according to Dr. John C. Branner of Stanford University, “The forest looked as though a swath had been cut through it two hundred feet in width.” In little less than a mile he counted 345 earthquake cracks running in all directions. U.S. Post Office at Seventh and Mission sts. was dreadfully damaged by the earthquake. Assistant to the Postmaster Burke said, “walls had been thrown into the middle of various rooms, destroying furniture and covering everything with dust. In the main corridors the marble was split and cracked, while the mosaics were shattered and had come rattling down upon the floor. Chandeliers were rent and twisted by falling arches and ceilings.” Fireman James O’Neill, drawing water for the horses in Fire Station No. 4 on Howard Street opposite Hawthorne, was killed when a wall of the American Hotel collapsed onto the fire station. Police officer Max Fenner was mortally wounded when a wall collapsed upon him at 138 Mason Street. All telephone and telegraph communications stopped within the city, although some commercial telegraph circuits to New York and to India, via the Pacific cable at the Ocean Beach, remained in temporary operation. A messenger arrived at Ft. Mason at 6:30 a.m. with orders from Gen. Funston to send all available troops to report to the mayor at the Hall of Justice. First army troops from Fort Mason reported to Mayor Schmitz at the Hall of Justice around 7 a.m. At 8 a.m., the 10th, 29th, 38th, 66th, 67th, 70th and 105th Companies of Coast Artillery, Troops I and K of the 14th Cavalry and the First, Ninth and 24th Batteries of Field Artillery arrived Downtown to take up patrol. Seventy-five soldiers from Companies C and D, Engineer Corps were assigned to the Financial District at 8 a.m., and another 75 along Market from Third Street to the City Hall at Grove and Larkin streets. A major aftershock struck at 8:14 a.m., and caused the collapse of many damaged buildings. There was much panic. Second day session of the Grand Chapter of the Royal Arch Masons of the state of California fifty-second annual convocation. The group met after the earthquake but evacuated before the temple at Montgomery and Post streets was destroyed by fire. The Masons listed the date as April 18, A.I. 2436, A.D. At 10 a.m. Headquarters and First Battalion 22nd Infantry, were brought from Ft. McDowell by boat, and were held for a time in reserve at O’Farrell St. They were later utilized as patrols and to assist the fire department. At about 10:05 a.m. the DeForest Wireless Telegraph Station at San Diego radioed press reports of the disaster at San Francisco to the “U.S.S. Chicago.” Admiral Caspar Goodrich immediately ordered fires started under all boilers, and after a confirmation message from the Mayor of San Diego, the “Chicago” steamed at full speed for San Francisco. It was the first time wireless telegraphy was used in a major natural disaster. At 10:30 a.m., the “U.S.S. Preble” from Mare Island, under the command of Lt. Frederick Newton Freeman, landed a hospital shore party at the foot of Howard St. to help the wounded and dying who sought help at Harbor Emergency Hospital. Another fire broke out at 395 Hayes St. on the southwest corner of Hayes and Gough. It would become known as the “Ham and Egg” fire, and would destroy part of the Western Addition, the Mechanics’ Pavilion, City Hall and then jump Market Street at Ninth. General Funston’s staff abandoned the Dept. of California’s Headquarters in the Phelan Building, across from the Palace Hotel, at 11 a.m. They did manage to save valuable records. Winchester Hotel caught fire at Third and Stevenson streets and collapsed at 11 a.m. Fort Miley troops, the 25th and 64th Companies Coast Artillery, arrived at 11:30 a.m. Two earthquake in Los Angeles just before noon, about ten minutes apart. The quaking began as crowds gathered around bulletin boards to read the latest telegraphic dispatches from San Francisco. Thousands ran in panic when the earthquakes struck. Hearst Building at Third and Market streets caught fire at noon. Evacuation of the injured from Mechanics’ Pavilion, Grove and Larkin, began at noon because of the spreading “Ham and Egg” fire. The wounded were taken to Golden Gate Park, Children’s Hospital and the Presidio. Mechanics’ Pavilion took fire at 1 p.m. St. Mary’s Hospital at First and Bryant sts. was abandoned to the fire at 1 p.m. Patients were loaded aboard the ferryboat “Modoc” and taken to Oakland. Entire area in the Financial District, behind the Hall of Justice, was on fire by 1 p.m. Fires so threatened the Portsmouth Square area by 1 p.m. that General Manager Hewitt of the Dept. of Electricity decided to abandon the Central Fire Alarm Station at 15 Brenham Place in Chinatown. Restaurant atop the Call, or Claus Spreckels Building, at Third and Market streets, took fire at 2 p.m. Postal Telegraph operators transmitted their last message to the outside world as army troops ordered them from the building at 534 Market St., opposite Second St., at 2:20 p.m. because of the approaching fire. Latest casualty count: 750 people seriously injured people were being treated at various hospitals at 2:30 p.m. Dynamiting of buildings around the U.S. Mint at Fifth and Mission streets began at 2:30 p.m. U.S. Army Signal Corps established Ferry Building telegraph operations at 3 p.m. Mayor Schmitz appointed the Committee of Fifty at 3 p.m. at the Hall of Justice. The mayor also said: “Let it be given out that three men have already been shot down without mercy for looting. Let it also be understood that the order has been given to all soldiers and policemen to do likewise without hesitation in the cases of any and all miscreants who may seek to take advantage of the city’s awful misfortune.” The Mayor appointed ex-Mayor James Phelan to head the Relief Committee. Fifty or more corpses had been buried by the police in Portsmouth Square by 5 p.m because the morgue and police pistol range could hold no more bodies. Mayor Schmitz, at 8 p.m., was still confident that a good part of downtown could be saved. Unfortunately a possible arsonist set fire to the Delmonico Restaurant in the Alcazar Theatre Building on O’Farrell near Stockton, and that blaze burned into Downtown and to Nob Hill. War Department received a telegram from Gen. Funston at 8:40 p.m., Pacific Coast time, that asked for thousands of tents and all available rations. Funston placed the death toll at 1000. Firefighters attempted to make a stand at 9 p.m. along Powell St. between Sutter and Pine, but it was unsuccessful in keeping the fire from sweeping up Nob Hill. Crocker- Woolworth Bank Building at Post and Market took fire at 9 p.m. Governor Pardee arrived in Oakland at 2 a.m. He was supposed to arrive three hours earlier, but his train was stalled because of sinking of the track in the Susuin marshes. The governor said he would declare a bank holiday today. St. Francis Hotel at Union Square caught fire at 2:30 a.m. Mayor Schmitz and Capt. Thomas Magner of Engine No. 3 found a cistern at the Hopkins Mansion, Mason and California streets, at 4 a.m., and attempted to keep the fire from burning the structure. They were not successful. Secretary of War Taft at 4 a.m. ordered 200,000 rations sent to San Francisco from the Vancouver Barracks. Secretary Taft ordered all hospital, wall and conical tents sent to San Francisco from army posts at Vancouver; Forts Douglas, Logan, Snelling, Sheridan and Russell, from San Antonio and the Presidio of Monterey. Secretary Taft wired Gen. Funston at 4:55 a.m. that all tents in the U.S. Army were en route to San Francisco. “Call,” “Chronicle” and “Examiner” printed a combined newspaper today on the presses of the “Oakland Herald.” 176 prisoners moved from city prison to Alcatraz. “U.S.S. Chicago” arrived in San Francisco Bay at 6 p.m. The Great Fire reached Van Ness Avenue during the evening. The army dynamited mansions along the street in an attempt to build a fire break. Demolition to stop the fire was ordered by Colonel Charles Morris of the Artillery Corps. The fire burned as far as Franklin St. by 5 a.m., then attempted to circle south. At the foot of Van Ness Avenue, 16 enlisted men and two officers from the “U.S.S. Chicago” supervised the rescue of 20,000 refugees fleeing the Great Fire. It was the largest evacuation by sea in history, and probably as large as the evacuation of Dunkirk during World War II. Fire approached the Appraisers’ Building for a second time at 3 p.m. Lt. Freeman attempted to pump saltwater from the Bay but found that his hose connections would not fit those of the Fire Department, so the effort was abandoned. Gen. Funston issued General Orders No. 37 which placed Lt. Col. George Torney of the Medical Department in full control of sanitation in San Francisco. Gen. Funston wired War Department at 8:30 p.m. on status of the fire. He advised that Fort Mason has been saved, and some looters have been shot. His telegram said most casualties are in the poorer districts, South of Market St.; not many killed in better portion of the city. Haig Patigian’s statue of President McKinley, commissioned for the city of Arcata, found in the rubble of a local foundry and saved by several artisans who carried it into the street. The fire that swept the Mission District was stopped at 20th and Dolores sts. by three- thousand volunteers and a few firemen who fought the blaze with knapsacks, brooms and a little water from an operating hydrant at 20th and Church. Fire Chief Engineer Dennis T. Sullivan died at the Army General Hospital at the Presidio at 1 a.m. Father Ricard at the University of Santa Clara wrote to the “San Jose Mercury”: The earthquake period is gone. Once the pent up forces of nature have had a vent, nothing of a serious nature need be apprehended. At the most a succession of minor shocks may be felt and that’s all. It is not unreasonable, therefore, for people to continue in dread of a new destructive temblor. People should fearlessly go to work and repair mischief done and sleep quietly at night anywhere at all, especially in wooden frame. Never mind foreboders of evil: they do not know what they are talking about. Seismonetry is in its infancy and those therefore who venture out with predictions of future earthquakes when the main shock has taken place ought to be arrested as disturbers of the peace. Major-General Adolphus W. Greely, Commander of the army’s Pacific Division returned to San Francisco. United Railroad crews began stringing temporary overhead trolley wires on Market St., but did not repair the cable traction system in the street. Governor Pardee told a newspaper reporter, “The work of rebuilding San Francisco has commenced, and I expect to see the great metropolis replaced on a much grander scale than ever before.” Imperial decree on the 30th Day of the Third Moon from Empress Dowager of China to send 100,000 taels as a personal contribution to the relief of the San Francisco sufferers. President Theodore Roosevelt declined the offer, as well as donations from other foreign governments. Return to the 1906 Earthquake exhibit.
cc/2019-30/en_head_0021.json.gz/line1730322
__label__cc
0.6088
0.3912
You are here: Home » News » Local News » Catholic Charities helps immigrant youth legalize status Catholic Charities helps immigrant youth legalize status Dianne Towalski | August 29, 2012 | 2 Comments Rosa Zuñiga hugs Ixia Helmueller, program manager for Catholic Charities’ Migration and Refugee Services, after a meeting with Rosa’s son and two daughters about the Deferred Action for Childhood Arrivals program Aug. 22. Zuñiga, an immigrant from Honduras, has temporary protected status, but her children are undocumented. Her son Samir is in the background. Dianne Towalski / The Catholic Spirit Samir Barrera has always had a passion for music. He plays piano and practices every day in a studio he put together in his home. Barrera, 28, is an undocumented immigrant from Honduras living in St. Paul, and he was beginning to think he would never be able to go to college and realize his dream of becoming a professional music producer — until recently. In June, President Barack Obama announced the Deferred Action for Childhood Arrivals program. It will allow certain undocumented young people to be temporarily freed from the threat of being deported to homelands to which they may have few ties, and get work permits. Applications were accepted beginning Aug. 15. Meeting the need Barrera is one of many young people who have come to Migration and Refugee Services of Catholic Charities of St. Paul and Minneapolis for help determining if they qualify for the program. According to Ixia Helmueller, program manager, there are about 9,000 young people statewide who could qualify for the program. To qualify for the program, applicants must be under age 31 and have arrived in the U.S. before their 16th birthday. They must be currently in school, have obtained a GED or been honorably discharged from the military. Catholic Charities is planning one-day workshops on dates yet to be determined to screen applicants, help them fill out and submit paperwork and answer their questions. The agency is in need of volunteers to help with the workshops, Helmueller said. Migration and Refugee Services is working with the Catholic Legal Immigration Network to train staff and volunteers. There is also a need for donations to cover the cost of submitting paperwork. The government requires a fee of $465 to process applications. Catholic Charities staff members also will be working with Holy Rosary in Minneapolis and St. John the Evangelist in Hopkins — two parishes with a large number of immigrant parishioners that have asked for assistance in helping their young people determine if they can take advantage of the program, which would give them a renewable two-year reprieve and allow them to attend college. Barrera came to the United States with his mother, Rosa Zuñiga, in 1998 after Hurricane Mitch destroyed much of their country. His two sisters, Eunice, 19, and Kayla, 18, arrived in 2009 and also are being screened for the program. Eunice wants to attend college and study to be a criminal lawyer. “I want to be somebody,” she said. Her sister Kayla is interested in medicine and wants to work as a doctor or nurse. “This is a great opportunity for everyone who doesn’t have papers,” she said. “Now that we have this opportunity, we don’t want to let it go,” Samir said. “I think this will open the doors to their dreams to become professionals and be self-sufficient,” said Samuel Felix, Hispanic outreach case manager with Catholic Charities’ Migration and Refugee Services, who has worked with the family for several years. Some undocumented immigrants are not so sure about the program. There may be some risk in coming forward. “It’s probably going to be difficult for some because their [undocumented] parents may not want to be exposed,” Helmueller said. “You have to submit information about your family, who your parents are and when they brought you here. Some might hesitate to do that,” she said. “It’s a hard decision, but you have to live, you have to do it. If you want to be somebody out there, you have to do it,” Samir said. Kayla is more cautious. “It is a little frightening,” she said. “Some are saying, ‘We’re so ready we don’t even worry about it anymore,’” Helmueller added. Helmueller and the community she works with have been waiting for this opportunity for a long time. “For me to actually be able to see this come true . . . I can’t put it into words,” she said. The U.S. bishops are supportive of the program’s goals. Among those hailing the announcement in June was Archbishop José Gomez of Los Angeles, chairman of the U.S. bishops’ Migration Committee. Helmueller noted: “We are about helping folks develop their human potential and also be able to call for justice in their communities. “I strongly believe our involvement in this program exemplifies both,” she added. “These are our children, they have so much to offer, have showed that, and it is phenomenal that we in our agency can be a part of such an amazing country where we can correct things that have been identified as not right. To me that’s exciting.” To volunteer or donate Call Ixia Helmueller, program manager for Catholic Charities’ Migration and Refugee Services at (651) 647-3113. Visit the Minnesota Catholic Conference website. Visit the U.S. Citizenship and Immigration Services website. Tags: Catholic Charities, Deferred Action for Childhood Arrivals, Work permits « The great both/and of Catholic social teaching Bishop offers 10 points for transmitting faith today »
cc/2019-30/en_head_0021.json.gz/line1730324
__label__wiki
0.883492
0.883492
You are here: Home » News » U.S. & World News » Bishop Dewane disappointed by House passage of tax cut bill Bishop Dewane disappointed by House passage of tax cut bill Catholic News Service | November 20, 2017 | 2 Comments Homeless people are seen in Washington June 22. Bishop Frank Dewane of Venice, Fla., chair of the U.S. bishops’ domestic policy committee, released a statement Nov. 17 proclaiming that the House of Representatives “ignored impacts to the poor and families” in passing the Tax Cuts and Jobs Act the previous day. CNS photo/Tyler Orsburn The chairman of a U.S. bishops’ committee concerned with domestic justice issues expressed disappointment over the House of Representatives’ passage of “the deeply flawed” tax cut bill. House members “ignored impacts to the poor and families” in passing the Tax Cuts and Jobs Act Nov. 16, said Bishop Frank Dewane of Venice, Florida. In a statement Nov. 17, Bishop Dewane cited findings by the nonpartisan congressional Joint Committee on Taxation that show the bill’s raising of taxes on the working poor beginning in 2023 while giving simultaneous tax cuts to the highest-income Americans is problematic. A Nov. 9 letter to House members by the chairmen of three U.S. Conference of Catholic Bishops’ committees outlined what they called “many deficiencies” in the bill and that the bill places “new and unreasonable burdens on families.” Bishop Dewane credited lawmakers for restoring the adoption tax credit, which was not included in earlier versions of the bill. But he also raised concern that the House measure repeals an exclusion for families assisted by their employer to adopt children in need and eliminates incentives for charitable giving. Other problems in the bill cited by the bishop include elimination of the Work Opportunity Tax Credit and tax relief for people paying for tuition and student loans and as well as for individuals who retire on disability. He said that the bill “takes an important step forward toward strengthening parents’ ability to choose a school that best suits their child” and called for reversal of the repeal of provisions that aid teachers and students in nongovernment schools. Turning to the Senate’s tax cut bill, Bishop Dewane said the USCCB continued to assess its provisions but offered comments about a few provisions. “The Senate must act decisively to avoid the deficiencies in the House legislation and craft a final bill that affirms life, cares for the poor and ensures national tax policy aimed at the common good,” the bishop said. Although crediting the Senate bill for keeping tax benefits that the House bill eliminates, Bishop Dewane expressed concern about the Congressional Budget Office projection that the tax cut plan will add $1.5 trillion to the deficit over the next decade. He said that the rising deficit will likely lead to spending cuts, particularly in programs that aid poor and vulnerable people, much to the chagrin of his committee. Problems cited by the bishop include: Omission of the “above-the-line” charitable deduction, which could result in up to $13 billion in lost charitable contributions annually. Raising taxes on low-income working poor families while targeting tax cuts for the highest earners. Elimination of the personal exemption, which will cause a net loss for families. He welcomed expansion of the child tax credit and a provision that incentivizes paid family and medical leave, but called for that provision to continue beyond 2019, when the bill calls for it to end. “The Senate must work to ensure a legislative process characterized by integrity, one in which Americans can fully understand the tax proposals which will be voted upon,” he added. “It must also seek to pass a law that demonstrates that our nation prioritizes care for the most vulnerable among us.” Tags: Bishop Dewane, Joint Committee on Taxation, Tax cut bill, U.S. Conference of Catholic Bishops, USCCB Category: U.S. & World News « St. John Paul II relic coming to archdiocese Vatican investigating abuse at pre-seminary »
cc/2019-30/en_head_0021.json.gz/line1730325
__label__wiki
0.561116
0.561116
The Entertainment Nut Reviewing Movies, Music, Books, Toys, and Much More! in Films that deserve a more dignified home video release, Uncategorized Films that deserve a more dignified home video release: The NeverEnding Story *This column is one in which we look at different films that we feel should get better treatment regarding release to the public, based on their content and behind-the-scenes material* With film-making emerging from the dark ages of the 1970’s, growing up in the 1980’s brought us several memorable fantasy pictures that had a dark tone that is missing from some films these days (most likely studios getting cold feet that scaring children will equal less box-office returns). While some films like Labyrinth and Legend have gotten DVD/Blu-Ray releases with bonus features, there’s one film that I often see on the discount shelves, and sigh when I see that all it contains is just the feature film. That feature film, is The Neverending Story. The story of a bullied young boy who comes across a book that captures his imagination is often talked of fondly by many adults who were children during the 80’s. The film was Wolfgang Petersen’s follow-up after his well-received U-Boat drama, Das Boot, and also one of the few films in which he contributed to the screenplay of a film he was directing. However, Petersen was hindered in numerous ways: special effects, story, and soon studio interference. Word was that he would have continued Bastian’s adventures in a sequel, helping to pay off the ending narrator’s words that “Bastian made many other wishes, and had many more exciting adventures.” The DVD/Blu-Ray format helped to showcase plenty of special features that could not be displayed in the original VHS format. Sadly, the DVD/Blu-Ray releases of The Neverending Story seems no better off than the VHS copy (word was, Petersen didn’t even know the film was being released in Blu-Ray a few years ago!). When you think of the film, one has to think that there had to have been numerous concept images, matte paintings, and designs for a lot of the creatures. For all we know, there may have been concepts based on certain parts of Michael Ende’s original novel that were done, but never made real. Beyond the first film, the story’s name sake has pretty much been trampled and tarnished upon over the last 3 decades when it comes to visual media. A sequel in 1990 attempted to carry on into the rest of Ende’s story, but failed to do much but rehash Bastian’s negative traits. As well, a third direct-to-video sequel only references certain items from the series, and just further tarnishes the characters. An animated series and live-action TV series also were made, though their quality has not carried them over. Of all that has been made, it is only the 1984 film that seems to endure in the minds of many. Over the years, I’ve had my own ideas of what a dream release for The Neverending Story would entail. Here is a list of special features that I feel a proper release should have: 1) Audio Commentary – A lot of people dismiss pointless talking over films, but when it’s the filmmakers discussing a technically-complex film like The Neverending Story, there have got to be plenty of stories to tell. While it would be nice to have writer/director Wolfgang Petersen involved, one would hope to also have some of the crew along for the ride. Or, imagine a secondary commentary track with Barrett Oliver (Bastian), Noah Hathaway (Atreyu), and Tami Stronach (The Childlike Empress). Even though Stronach is only in the film for about 5 minutes, I think it would be nice to hear her thoughts on the overall story. In 2001, Warner Brothers Home Entertainment did an amazing audio commentary, putting the main cast of The Goonies and director Richard Donner in a room, recording them on video as they watched and commented on the film they made. It would be neat to see them attempt something like this for The Neverending Story. 2) Retrospective interview with cast and crew – almost every other Special Features section has one of these for a film that is usually 10+ years old. We could hear thoughts about how Wolfgang Petersen decided to make the film, as well as how the actors got chosen for their roles, and the rigors of using their imagination. One also has to wonder about Noah Hathaway’s words regarding the scene where Atreyu’s horse Artax is overtaken in the Swamps of Sadness. 3) Alternate/Extended Cut of the film – Much like what was done with Legend, The Neverending Story also was cut in several different ways. Word is that while the version we know in the United States contains electronic music by Giorgio Moroder and Kalus Doldinger, word is the cut released in Germany is much different. Though I have never seen it, word is it contains a longer cut of the film, and the electronic score has been replaced by something a little more classical. 4) 60 Million For Fantasies – Unknown to a lot of people, a documentary was made for German television, chronicling the making of The Neverending Story. The film’s 60 million dollar budget (a huge amount to make a film back then!) is the subject of the title, but the hour-long documentary is incredibly detailed. We see behind-the-scenes with the Special Effects crew, as well as setting up some major scenes, and in a rather amazing inclusion, video of author Michael Ende telling of his displeaure with the film being made. Yes, you heard that right: a making-of special with the source material’s creator criticizing it! You never would see that kind of thing in this day and age. (note: this documentary is on Youtube, though you may need to search to find it in English Subtitles) A clip from the making-of documentary, “60 Million for Fantasies.” Here, a crew member helps the Rockbiter onto his Rockcycle. 5) Creating the world of Fantasia – A separate documentary with makeup artists, set decorators, costume designers, and other visual effects persons who helped make Rock-Biters look mountainous, made snails race, and much more. 6) A library of the different bits of concept art, matte paintings, and photos regarding the construction/creation of many of the film’s creatures. This could be a bit dicey, since most DVD/Blu-Ray releases have cut back on extra material like this on some Special Features discs. 7) Abandoned Concepts/Deleted Scenes – This would be one area that I could imagine so much information to be found. Looking at the film now, there are some areas where certain scenes just seem to end, and others that feel like they ran out of time and had to force a compromise. 8) Bavaria Filmstudios – The film studio where much of the film was made, is also a treasure trove of animatronics and models from The Neverending Story. Though many of them are not as pristine as they once were, it would be nice to see a video tour of the studio, as well as what remains of the film’s numerous props. Such highlights include Falkor, and even a miniature of Morla, The Ancient One. The Southern Oracle, and Falkor the Luck Dragon props, currently located at Bavaria Filmstudio. Word is you can actually get your picture taken riding Falkor! 9) The Neverending Story 2: What Might Have Been – Originally, Wolfgang Peterson was to have continued the adventures that were hinted at in the closing narration. While The Neverending Story film covered the first half of Ende’s original story, the remainder dealt with Bastian rebuilding Fantastica with his imagination. However, Peterson did not return, and 6 years later, The Neverending Story II: The Next Chapter was released. One has to wonder what Peterson’s original vision was for the two-part magnum-opus. 10) Retrospective on author Michael Ende – To many (like myself),The Neverending Story is the only book of Ende’s that comes to mind. The author of over 20+ stories, it would be nice to have someone give us some background on the man who created Luck Dragons, Fantastica (the original land’s name in his book), and much more. 11) Limahl, and the song film’s theme song – In case you were wondering, the singer of the film’s theme song is a dude (though the dude does sound like a lady). This would shed some light on Limahl’s creative process, and how he came to create the song that just won’t get out of our heads. 12) The Music Video to The Neverending Story – Of course, we couldn’t have the movie without Limahl’s music video, can we? 13) Promotional materials – this would include theatrical trailers, tv spots (if any exist), and movie poster artwork. 14) A Special DVD/Blu-Ray Case – Word was that a couple years ago, a foreign release actually came in a case resembling the book from the film. Given how many studios are releasing fancy boxsets with some of their films, I think this would be a great incentive, and conversation piece for any collector to have! Better yet, if it came with a wearable replica of the Auryn (the talisman given to Atreyu by the Childlike Empress), it’d truly be a thing of beauty! One concept that Warner Brothers been doing recently for certain films, is the Digibook gimmick for several Blu-Ray titles. This book-like casing is a little larger than the standard Blu-Ray case, but also gives some behind-the-scenes information about the film it is representing. Seeing as it is based on a book, The Neverending Story would be a no-brainer for a Digibook release, in my opinion. In fact, I made a little mock-up on what this set could possibly look like (see below, and remember, this is just a mock-up): Admit it…you’d buy this, wouldn’t you? And that’s my ‘grown-up wish list’ for features that I would love to see for this film that is remembered fondly, but has been left in the dust. Even so, the fanbase for The Neverending Story seems to be more conservative than fandoms that have evolved over the years. I’ve never met any die-hard Neverending Story fans, but every other person I know remembers it in some way. The memorable scene of Atreyu riding on Falkor for example, has been parodied in cartoons like Family Guy, Robot Chicken, and a recent episode of Titans Go. Raven, Starfire, and Silkie in a Neverending Story reference from a “Titans Go” episode. Recently, word was announced that there will be an upcoming, 30th Anniversary release of the film from Warner Brothers, coming this fall. However, I’m not holding my breath, as there has been no announcement that this will be anything more than a bare-bones rehash of the previous Blu-Ray release. After all, this is the same studio that when Beetlejuice turned 25 last year, did relatively nothing for one of Tim Burton’s most memorable films. (I also included that film in another dignified home video release posting). With home video sales taking a beating from streaming media these days, studios have stopped giving us impressive special features, and these days seem more apt to just recycle previous releases, with as little heavy-lifting as possible. It’s sad to think we have a better chance of getting sucked up by The Nothing, than ever seeing a dignified release for this gem of Fantasy filmmaking. Update: 8/12/14 Well, it looks like Warner Brothers may have given in and decided a little TLC towards The Neverending Story’s 30th Anniversary was in order! Amazon.com posted images of the front and rear covers of the upcoming release’s front and back covers, and on the back, this is what was found: It’s not everything on my wishlist, but it’s got so much that I’m eager for this release. I can only assume Reimagining the Neverending Story is the much-hoped-for retrospective I would love to see. I’m most intrigued by the audio commentary by Wolfgang Petersen. I’ve only ever heard Petersen’s commentary on the release of Air Force One, though I’m hoping with all these years that have gone by, there’s enough stuff in the film to keep him talking and reminiscing. The additional making-of and documentary is hard to decipher what we’ll see. My assumption is that the World of Fantasies documentary may be the same as the 60 Million for Fantasies one that I mentioned earlier in the posting. I am definitely planning to review this release once I get it into my hands. Despite my feelings about Warner Brothers on several of their releases, they have impressed me in the past, with the likes of their Little Shop of Horrors rekease, which included the long-lost original “Don’t Feed The Plants” ending. Tags: Atreyu, Barret Oliver, Bastian, Bastian Balthazar Bux, Bavaria Studios, Die unendliche Geschichte, Digibook, Ende, Falkor, Fantasia, Fantastica, Limahl, Luck Dragon, Michael Ende, Mr Coreander, Noah Hathaway, Rockbiter, Tami Stronach, The Childlike Empress, The Neverending Story, Warner Brothers, WB, Wolfgang Peterson About MWH1980 Growing up in the state of Iowa, one would assume I'd be enamored with pigs and corn. Well, I wasn't. Instead, I grew fascinated by many things that were entertainment-related. Things like movies, animation, toys, books, and many more kept my attention. This blog I hope to use to express myself regarding my varied obsessions. (P.S. There's no Photoshop involved in that Gravatar-I really am holding an Oscar) View all posts by MWH1980 » 2 responses to “Films that deserve a more dignified home video release: The NeverEnding Story” Donna Bohdanyk says : June 25, 2014 at 5:09 pm #11 OMG! Yes, such an film which has left a huge impression on me should get a more royal treatment. I’m sure that if this film had more ‘moychindizing’ back then, then we would rebuy reboots of Falcor and such once we heard that this film was going to be on a digital release. Frankie Ramos says : June 25, 2014 at 5:49 pm Great blog post! I love this movie and wish it would get the treatment it deserves! All your suggestions for possible special features were spot-on and I’m hoping for some good ones on the upcoming 30th Anniversary edition. Saw your post from Blu-ray.com, would buy your mock-up digipack in a second! 😀
cc/2019-30/en_head_0021.json.gz/line1730328
__label__wiki
0.798308
0.798308
Syrian Refugees Refute and Undermine ISIS Propaganda by The Fifth Column • April 12, 2016 Damascus, Syria (FEE) – For the past several months, Syrian refugees have faced dizzying array of criticism from U.S. politicians who have proposed banning new refugees from Syria, prohibiting all Muslim immigration, deporting Syrians already in the United States, and much else. Yet despite the rhetoric and anti-refugee proposals, Syrian refugees across the United States are still defending their newly adopted country. The descriptions are glowing. Sandy, a 26-year-old woman who fled Syria to New Jersey, calls America “heaven.” She said, “I found peace. I found a chance.” Eventually, she adds, “I want to be an American.” The celestial description fit for Noor Daghistani, a Syrian refugee living in Florida. “Here it’s like heaven,” he said. “What they’re going through over there, it’s a daily hell on Earth.” Yassin, who fled Syria to Tennessee, says: “I love America; I love the U.S., especially Knoxville,” he said. “I’m very lucky.” When asked if they could have one message delivered to Americans, Gasem, a Syrian refugee in Sacramento, simply said, “Thank you, America, for hosting us.” The sentiment of feeling lucky and grateful to their new country comes up repeatedly in profiles of Syrians. “We are extremely grateful to be here,” Morad and Ola Al-Teibawi, a Syrian refugee family in New Jersey, told ABC News. They say now they “can feel secure, protected,” and their five children can grow up safe and with good educations. You can see the foreign relations benefit of admitting Syrian refugees in how they are spreading positive views of America around the world. “I didn’t know anything about Memphis,” Mahmoud Al Hazaz who fled Syria to the city told his local paper. “The people have been excellent. Their treatment of us has been very good. I’m not just saying this for your sake. When I talk to my family they ask, ‘How is the treatment of Americans,’ and I say ‘it’s wonderful.’” Image Source: DFID – UK Department for International Development, Flickr, Creative Commons A Lebanese teeacher lends a hand to Syrian children in Zaatari, Jordan Marwan Batman, a Syrian refugee in Indianapolis, is also spreading the news of American generosity worldwide. “I want to keep painting the image to all of my family and friends about the goodness of the American people,” he told theIndy Star. “I wish other refugees would be able to come and experience the same things we have experienced … to find the same happiness we have found here.” Marwan added that “not a single Muslim” ever welcomed them the way that the Hoosiers had. Syrians in other parts of the country agree. “Arabic people didn’t welcome us,” Ahmad Al Tybawi told Louisville’s Courier-Journal. “Americans opened the door for us, and we are here.” Wasim, a Syrian refugee who is living in Houston, has the same view. “During a time when most of the world let us down, America didn’t,” he told Fusion. “Our future will be here.” “There are a lot of great people here,” Eddin, a Syrian refugee in Kentucky, said, adding his amazement that he could attend a mosque without fear of any problems. “That’s what I love about Louisville. This city — it will treat you well.” Zid agrees with this view, but about Americans a thousand miles away in Boston. “In Massachusetts, people are wonderful,” she told a local station. “Wherever you go, you find the help that you’re looking for.” Safera Alinas, who escaped Syria to Las Vegas, also emphasizes the friendliness of Americans. “They’re always smiling,” Safera told the Las Vegas Sun. She said that a neighbor, who cannot even speak Arabic, drives her to doctor’s appointments and job interviews. “She came out of nowhere, like an angel,” she said. Some refugees think the strategy of using Syrian refugees to combat ISIS’s propaganda is working. Rula Jabbour, a Christian who fled Syria in 2012 before being resettled in Nebraska, said that accepting refugees was “everything this country stands for and all the things I love about this country.” She added, “When you turn your back on these refugees, you make ISIS win.” Syrian Muslim refugees throughout the country have been condemning ISIS in public for months, and their voices are providing a counterweight to ISIS’s narrative about America hating Muslim immigrants. Winning the hearts of the Syrian people is essential to this fight, and refugee resettlement is already playing a critical role. This report prepared by David Bier for Foundation for Economic Education. FacebookTweetPinLinkedInGoogle+ Tags: fee isis islamic state propaganda refugee syria ← Raleigh: A woman and baby were murdered two houses down from me The North Pole Is Moving, And Climate Change Is Probably Responsible →
cc/2019-30/en_head_0021.json.gz/line1730329
__label__wiki
0.509211
0.509211
Photo: Mark Lyons/Getty ImagesPhoto: Mark Lyons/Getty Images Member of Trump’s Labor Department Transition Team Specializes in Recruiting Cheap Foreign Labor Zaid Jilani December 6 2016, 7:29 p.m. A newly-appointed member of Donald Trump’s Department of Labor “landing team” — tasked with helping set up and implement the transition to a Trump administration — is the president of a recruiting agency that specializes in connecting employers, including major hotels, with temporary laborers from Mexico, the Caribbean, and other parts of the developing world. Veronica Birkenstock, named to the Department of Labor team on Monday, is the president of Practical Employee Solutions (PES). PES promotes itself as specializing in the use of H-2B visas, having recruited “over 40,000″ workers in fields including hospitality, landscaping, welding, and construction, from 80 different countries. It is also the “preferred vendor of Marriott and Starwood Hotels.” H-2B visas are reserved for foreign workers who are not immigrants: They come to the country to do typically seasonal, temporary work. The sole purpose of these visas is for nonagricultural employers to bring in employees to do what is basically low-income, low-skilled labor. Donald Trump campaigned on a form of economic nationalism that puts “America First,” and in his video announcing his plan for his first 100 days, he pledged to have the Department of Labor “investigate all abuses of visa programs that undercut the American worker.” The H-2B program has come under criticism for helping suppress wages of domestic workers. The Economic Policy Institute, which Trump frequently cited on the campaign trail, believes that the program leaves “workers vulnerable to low pay and abuse.” PES advertises videos on its website from the H-2B Workforce Coalition, a coalition of mostly business groups who lobby Congress to protect this visa option. In one of these videos, owners of landscaping firms testify that they can’t find domestic workers, and that’s why they have to utilize H-2B visas. Birkenstock has spent the last 20 years working at PES and helping employers find cheap labor. Needless to say, that isn’t America First. Trump modeling a hard hat during a rally at the Charleston Civic Center on May 5, 2016 in West Virginia. Zaid Jilani[email protected]​theintercept.com@ZaidJilani
cc/2019-30/en_head_0021.json.gz/line1730331
__label__wiki
0.871021
0.871021
Tim Tyler Takes Charge as Interim Chief of Katy Police Department By George Slaughter With Bill Hastings’s retirement as Katy police chief last week, the city council turned to long-time assistant chief Tim Tyler to serve as interim chief. Hastings said the city’s growth, and the budget required to meet the needs coming from that, will be Tyler’s biggest challenges going forward. “We can’t fight the growth, but the city is going to have to monitor closely the needs of fire service, emergency management and the police,” Hastings said. “The growth is so fast that this has to be monitored not just on a yearly basis, but on a six-month basis. They’re going to have to keep the staffing up and keep these three departments the help they need. The same goes for public works.” Like their fire department counterparts, the police department faces competition in recruiting and retaining the best people for the job. Tyler said Katy has implemented some measures, such as sign-up bonuses and certificate pay, to compete for that talent. Certificate pay applies as officers earn certificates for years of service. “On the last budget, the council was very nice and gave us slots for new officers,” Tyler said, adding that it takes time for an officer to go through the initial stages of testing, background checks, and training. “We’re talking 10-12 months before you have someone you can actually put on the street,” Tyler said. One program that will continue is the Citizens Police Academy, which begins on February 21. The 15 people who attend must undergo background checks as part of the training, similar to what police officers must undergo. The training itself consists of one three-hour course each week for 10 weeks. Last year, the Katy Citizens Police Academy had its first graduating class. “They go over everything we do in the department,” Tyler said, including such activities as investigations, traffic situations, firearms, and law enforcement. “The people who go through the academy have some idea of the life of a police officer.” Tyler has been assistant chief for 10 years and an officer with the department for 27 years. In an interview at his retirement ceremony last week, Hastings praised Tyler’s abilities and experience. “He knows my job inside and out,” Hastings said. “Our personalities are a little bit different but our philosophies of management and community service and safety are the same. The Katy Police Department is a culture that has been handed down over many years. Tim is more than able to carry that on. The Katy Police Department will not miss a beat on Wednesday morning when I’m not there.” Tyler said he’s worked with all three police chiefs that the city has had: Pat Adams, R.L. “Buddy” Frazier, and Hastings, and has learned from all three. One of Tyler’s first goals as chief is to revamp the department’s policies and procedures. He and his staff will work with through the Texas Police Chiefs Association, headquartered in Elgin—near Austin—to do this. “It’s not like an accreditation, but to get recognized within the state,” Tyler said. “It’s just with changing times that it’s something that has to be done.” Tyler said he had some other goals he’d like to implement for the department, but added that those would have to wait until after a decision is reached on who is appointed permanent chief. Mayor Chuck Brawner said the city’s human resources department must post the job opening, and then resumes must then be collected and reviewed before Brawner and others, as necessary, begin the interview process. Tyler said he has applied for the permanent job. “This is an exciting time for me,” Tyler said. “I’ve lived in Katy since 1978, and I graduated here. I had one other job, with Katy Butane, and I got to know a lot of the rice farmers and old families around here. I know how the citizens like and expect to be treated. I tell my officers, treat citizens like you’d want one of your family members to be treated, and you won’t have any problems.” Articles, Featured, Katy News'featured, City of Katy, Katy Police Chief, Katy Police Department NCJW Houston Accepting Applications for Scholarships The 4th Annual Katy Area Safety Fest (KASF) returns to our community Saturday, April 13
cc/2019-30/en_head_0021.json.gz/line1730332
__label__wiki
0.930557
0.930557
Staff at Lincoln BHS bid emotional farewell to store Sarah Harrison-Barker 11:17 am This story is over Staff at BHS on Lincoln High Street wave goodbye to their customers in a final farewell. Photo: Steve Smailes for The Lincolnite Emotional BHS staff in Lincoln have waved goodbye to a store that many of them had worked for more than 15 years. A final clear out of the shop on Lincoln High Street took place on Monday, August 8, just days after the BHS in St Marks also closed down for good. Despite this, staff told The Lincolnite about how they were looking forward to the future and reflecting back on the past. BHS on Lincoln High Street officially closed its doors on August 6. Photo: Steve Smailes for The Lincolnite Staff at BHS on Lincoln High Street are sad to say goodbye but are glad to have worked as a team. Photo: Steve Smailes for The Lincolnite Photo: Steve Smailes for The Lincolnite. Photo: Steve Smailes for The Lincolnite As previously reported, BHS filed for administration in April 2016. The store in St Marks closed on August 3 with the High Street shutting its doors on August 6, joining 163 stores around the country, which will all close by August 20. The company has made over 8,000 redundancies, around 100 of which were in Lincoln. Genevieve Belcher, 60, had worked for BHS for 24 years and was the longest standing member of staff at the High Street branch. She said: “I have worked in Lincoln for 21 years, like most people here in Lincoln. We had a staff of 32 and we’re all very sad to see what’s happened here at British Home Stores.” The team received an overwhelming amount of support from other High Street stores and loyal customers with some coming in specifically to say ‘thank you’ and wish the staff luck for the future. “Boots have offered jobs and said they have positions, Marks and Spencer also,” Genevieve added. “Marks and Spencer sent us champagne and biscuits over on our last trading day on Saturday. “We are one big happy family here. Most people have been here for a considerable amount of time. “We’ve had some fabulous managers in the time I have been here. The manager at the moment Nick Morgan started about 19 years ago as a Saturday lad, so we have watched him growing up. “He spent a lot of time here as a weekend manager and went on to be a store manager, filling in for lots of people at different stores. He has spent the last few years in Sheffield but came back to see us off, which was very nice. Now he’s moving to Meadowhall to see them off.” Genevieve is looking forward to a break for a few weeks before she decides whether to enter retirement or if she will be taking up another position in the meantime. Another former BHS employee, who did not want to be named, had been at the company for 20 years. She praised the staff and customers for their commitment, and said: “We all get on well and have a really good social life together. It was a great company to work for. We all loved it. “We have had so many entertaining moments that I can’t even handpick one. We’ve had lots and lots of laughs.” One regular customer, a man who staff believe suffers from dementia, became a part of their day-to-day lives. The former BHS employee continued: “Most days he went and sat on the comfy chair in the fitting rooms and he has a little nap for 20 minutes to regenerate.” The man, who staff believe is called Frank, had been seen by staff peering through the window while they were emptying the store, confused why he was unable to come in. Staff have received letters and chocolates from customers. The former employee continued: “An 84-year-old customer sent us a lovely letter thanking us all and telling us that she was going to miss us.” Staff have said they plan to keep in touch through their work Facebook page and they have a final farewell planned for Friday night. “We’re just all very sad and it happened so very quickly,” said Genevieve. Man vs Food host Adam Richman agrees to sponsor Lincoln football team again Man who lived illegally in caravan for four years near Lincoln fined 3 bedroom Town House for sale TO LET – Hatton, Market Rasen Main Road, Little Steeping
cc/2019-30/en_head_0021.json.gz/line1730333
__label__wiki
0.574947
0.574947
Glider Pilot Regiment Service – Tilshead 27th February 2018 Paul On Saturday 24th February a Service took place at 11.30am in Tilshead, to commemorate the founding of an elite Regiment that fought in some of the most daring campaigns in World War II. Formed in February 1942, the Glider Pilot Regiment was made up of volunteers from other parts of the Army. These men were put through some of the most rigorous selection and training processes the forces had to offer, before learning to pilot huge unpowered gliders. The first stage of their intensive training took place at the Regiment’s first headquarters in Tilshead. The responsibility for this initial training fell to the Regiment’s second in command, and later Commanding Officer, Major George Chatterton. He expected volunteers for the Regiment to reach the highest standards. In 1942 he said: “We will forge this regiment as a weapon of attack… I shall be quite ruthless… Only the best will be tolerated. If you do not like it, you can go back whence you came.” He remained true to his word. The volunteers were put through tough run marches, obstacle courses and drills on a daily basis. On completing their physical training, they had to return to the camp and ready themselves for inspection on the parade ground. They were judged harshly on every aspect, and should they not meet the strict physical or presentation standards, they were returned back to their original unit. Many did not make the grade, and were sent packing with the letters LMF (Lack of Moral Fibre) stamped forever on their service records. All of this happened before any of them even glimpsed an aircraft. Those few who did make it through the onerous process, went on to train initially on powered aircraft and then large, troop carrying gliders. Once fully qualified, these men would achieve extraordinary feats of flying, touching their gliders down on unprepared landing zones behind enemy lines, and taking up arms to fight beside the troops who they carried into battle. They adopted whatever role was required of them and became known as “Total Soldiers”. They took part in some of the most significant actions in World War II, including the Invasion of Sicily, D-Day, Operation Market Garden and the Rhine Crossing. There were veterans who were critical of the harsh training they were put through at Tilshead, but many others acknowledged that it prepared them for the experiences they endured during the rest of the war. The Regiment was moved to Fargo Camp, near Larkhill, in September 1943, but Tilshead will forever be remembered as the Regiment’s first home. In 2004 local resident Frank Druce and his wife organised a memorial stone to be placed alongside the existing Parachute Regiment Memorial. In the past an annual service had been held at the memorial stones by the veterans of the Glider Pilot Regiment Association. In 2016 the Regimental Association was wound down due to the declining number of veterans still alive and the memorial service ceased. The new Glider Pilot Regiment Society was formed by the many families and friends of these brave men. Their aim is to continue supporting those who served and celebrate the history of the Regiment for future generations. For further details of the Glider Pilot Regiment Society please e-mail: info@gliderpilotregiment.org.uk or visit their website: www.gliderpilotregiment.org.uk
cc/2019-30/en_head_0021.json.gz/line1730336
__label__cc
0.610802
0.389198
Skip to main content Skip to full site menu HomeOpen HomeClose Home Welcome- Home FAQOpen FAQClose FAQ Go to FAQ AwardsOpen AwardsClose Awards Go to Awards Last Year's Winners ResourcesOpen ResourcesClose Resources Go to Resources Be a Tutor Professional Writing CenterOpen Professional Writing CenterClose Professional Writing Center Professional Writing Center Go to Professional Writing Center Workshop Offerings Home » Staff 2018-2019 DIRECTOR OF THE WRITING CENTER David Lipscomb First, I’m proud of our Center and our staff. You’ll see below an impressive group of well-trained tutors who are also approachable and extremely helpful. As for me, I’ve been teaching writing and what’s often called “communications” for more than two decades. In addition to heading the Writing Center and teaching writing at Georgetown, I serve on the board of directors at the Center for Plain Language, which works to ensure government agencies write clearly. I've also worked as a writing coach for various organizations, including Kellogg, Fannie Mae, and the American Red Cross. Before coming to Georgetown, I taught writing at Wake Forest University and Columbia University, where I earned my Ph.D. in English. I live just outside DC with my wife and two kids (Max and Ella), who sometimes work with me to make art and kitchen tools from the invasive bamboo that grows everywhere in our neighborhood. Abigail Lovell Hey y’all! Abigail is a sophomore in the College double-majoring in Justice & Peace Studies and English. She's from a small town in Ohio and loves to make conversation with literally everyone she meets. She loves to work with argumentative essays and humanities papers. Outside of the writing center, you can find Abigail making a fool of herself on the fencing strip or careening down the streets of DC in the CSJ’s massive vans! Alex Hornick Alex Hornick is in the McDonough School of Business majoring in Finance and Management with a minor in Jewish Civilization. She is from New York City, where she loves people watching in Washington Square Park. Outside of the classroom, she works at the MSB Tech Center, is a BUILD mentor, and is involved in several business clubs on campus including McDonough Women. She specializes in case competition writing, general business writing, and creative writing (especially sardonic satirical nonfiction). In her spare time, Alex enjoys watching Seinfeld, listening to Janis Joplin records, and snowboarding. You can often find her walking around campus with a Lime La Croix. Alison is a senior in the college studying Biology of Global Health and English. She is available to help writers in any discipline or experience level. She enjoys working on a variety of papers, from scientific discussions to creative writing. Angie Newman Angie is a junior in the College majoring in Psychology and French. Her tutoring specialties include humanities and social science papers, grammar, and revising, though she enjoys working with students at any stage of the writing process. She is also available to help with French writing. Outside of the Writing Center, Angie is involved in the GU French Culture Association, GIVES, Georgetown Program Board, and the Mental Health organizations on campus. Anshul Agrawal Anshul is a junior in the College, double majoring in Government and Economics. His main specialties are social science and humanities papers, but he also has experience writing scientific lab reports. Outside of the Writing Center, Anshul loves volunteering for GAAP, dancing for GU Jawani, and choreographing for Georgetown Rangila. Ashly Paulino Ashly Paulino is a junior in the College, majoring in English and minoring in French. She is from a small town called North Bergen in New Jersey. Ashly’s favorite part of the writing process is brain storming and outlining, but her favorite papers to work on involve theory and critical analysis. Her experience working for the career center has also given her an eye for resumes and cover letters. Ashly speaks three languages: English, Spanish, and French, and she is comfortable with working with L2 students. When she’s not working at the Writing Center you can see her around campus laughing with friends, quoting memorable literature, and eating out at new restaurants. Ariel Calver Ariel is a junior in the College from London, England, majoring in Math and minoring in philosophy. She’s comfortable working with students at any stage of the writing process, from brainstorming to revising. She particularly enjoys helping students with application letters and resumes. Outside of the Writing Center, Ariel is involved in the Carroll Fellows Initiative and Georgetown's hip hop team, Groove Theory. Brianna Gist Hello hello! Brianna is a sophomore in the College studying some combination of Government, Linguistics, and French. If all goes right in her life, she would love to study endangered languages through the State Department. She speaks Spanish and French, and is a proud Chicago native who loves to swim and hang with friends. She is thrilled to work with you at any stage of your writing process, but loves brainstorming, outlining, and refining the flow of a piece - especially for humanities papers, op-eds, or job/scholarship applications. L2 students, it would be a pleasure to work with you! If you do stop by, she'd delight in talking about the greatest film she's ever laid eyes on (Avatar), or any of your other comments, questions, interests, or concerns! Bridget Sellers Bridget is a second-year English M.A. student from Knoxville, Tennessee, where she earned her B.A. from the University of Tennessee with concentrations in literature, creative writing, and technical communication. Her specialties include humanities papers, creative writing, resumes, cover letters, application essays, conference presentations, and holistic writing/study habits. In her free time, she likes to watch obtuse movies, write poems, and pet cats (both other people’s and her own). Caroline Genster Caroline is a senior in the College, double majoring in History and Spanish. She hails from the great city of Seattle, Washington and true to the stereotype, she loves coffee. She is comfortable working with all kinds of writing at all stages, but particularly loves brainstorming and drafting essays. She also has extensive experience with resumes and cover letters. When she’s not hanging out in Lau 217 and explaining the benefits of the oxford comma, she can be found tabling with H*yas for Choice, playing Ultimate Frisbee, or debating what show she’ll start watching after she finally finishes 30 Rock. Suggestions welcome! Caroline Zuckerman Caroline is an English M.A. student and the Graduate Coordinator of the Writing Center. She grew up in Raleigh, North Carolina, before moving to DC to attend Georgetown. After earning her undergraduate degree in English and Psychology, she continued to the English M.A. program as a Graduate Writing Associate. Her specialties include humanities papers, personal statements, creative writing, and revision. Outside the Writing Center, Caroline teaches Introduction to Literature at Northern Virginia Community College and assists with English classes at Georgetown. In her free time, she enjoys writing short stories and exploring DC’s food scene. Chloe Li Chloe, an International Political Economy major in the SFS, has lived all across the world. She was born in Shanghai, China, before moving to the US and France. This directly translates into her interests as a tutor — she enjoys helping non-native English speakers, and she is also fluent in Chinese and French. Chloe specializes in research papers, humanities papers, and presentations, but she welcomes all types of writing in various stages. Chloe spends her free time exploring the galleries of DC, trying out ice cream flavors, and obsessing over her dog, Bean. Chris Supplice Chris is a Junior in the college majoring in English and minoring in Education. Her expertise is focused on humanities papers, application essays, and personal statements. She enjoys helping students in all stages of their writing from brainstorming to final drafts. She is the daughter of two non-native English speaking parents so she is perfectly comfortable with helping other non-native speakers with their writing. Daniel Breen Daniel is an M.A. student in the English Department. His experience is with English papers in particular, humanities papers in general; but he welcomes all types of writing at all stages of preparation. In his own time, he enjoys the peace of such things as trail running, hiking, and birdwatching. Emilio Joubert Emilio is a Linguistics major with Italian and Spanish minors. He is happy to discuss any type of writing but finds he works best with English Second Language students. He feels most comfortable working with Government, Philosophy or Humanities papers, and also enjoys assisting students with resumes and cover letters. He also plays video games competitively. Eric Dickstein Eric Dickstein is a sophomore from New York City studying Government in the College. Eric writes for the Hoya’s arts and music section and sings in the Georgetown Phantoms. He specializes in History, Government, and English papers, and journalism. Outside of school, Eric plays piano, sings, and writes music. Talk to Eric about the nuances of funk music if you’re down to give up half your session time! Esther is a junior in the McDonough School of Business majoring in Accounting with minors in Economics and Japanese. Born in Seoul, South Korea, but raised in northern Virginia, she is a fluent Korean speaker. Her tutoring specialties include outlining and editing. Outside of the Writing Center, she works with the Georgetown Journal of International Affairs and designs in her free time. Gustav Honl-Stuenkel Gustav is a Junior in the College studying Philosophy and Government, with a minor in Economics. Government is good for his career, and Philosophy is good for his soul. When not in the Writing Center, he writes for the Free Speech Project and is part of the Lecture Fund. He specializes in History, English, and Philosophy papers, but is always open to learn about other subjects. Hannah Ekeh Hannah graduated summa cum laude with honors from the University of South Carolina in the spring of 2017 with a B.A in English Literature and a minor in French. After graduating, she worked for her alma mater as an assistant in the School of Library and Information Science and as a library associate at the Richland Library in Columbia, SC. At Georgetown, Hannah is a first-year Lannan Associate in the Master of Arts in English program and looks forward to spending the next two years growing as a scholar and writer. She specializes in literary papers, critical essays, and personal statements. When she isn’t reading, Hannah loves to order Chinese and watch re-runs of Forensic Files on Netflix. Fun Fact: She went to the Beyoncé Concert days before coming to Georgetown and shares this with as many people as she can. Hannah Lynch Hannah is a junior in the College studying Psychology, Philosophy, and Linguistics. Along with loving social sciences, Hannah specializes in editing application essays and resumes. Outside the Writing Center, Hannah is involved in H*yas for Choice, College Dems, GU-ACLU, GU Politics, and the Carroll Fellows Initiative. Henry Westerman Henry Westerman is a sophomore in the School of Foreign of Service, majoring in Science, Technology and International Affairs. He hails from Somerville, Massachusetts but will tell you he’s from Boston. Outside of the classroom, Henry serves as the historian for GUSA, runs a Catholic faith group, and is an active member of the IRC. Henry specializes in history and political writing, but also loves philosophy and theology and would be happy to talk to anyone about free will and synchronicity. Ian Jayne Ian Jayne is a first-year English M.A. student from Oklahoma City, where he earned his B.A. in English literature and writing. Ian loves to work at all points of the writing process, from initial brainstorming to final revisions. While Ian is most familiar with research essays, literary analysis, and creative writing, he also enjoys working with students on a wide range of assignments for other disciplines, such as articles, reports, and journalistic writing. When not reading or writing, Ian is most likely exploring one of D.C.'s free museums or seeking out the nearest beagle to pet. Isabella Perera Isabella is a student in the School of Foreign Service majoring in Science, Technology and International Affairs, and minoring in Chinese. Her expertise lies in humanities papers, social science papers, and applications, including anything from resumes to cover letters. Due to experiences working and living abroad in, she enjoys working with non-native English speakers. Additionally, she speaks Spanish and Chinese. Outside of the Writing Center, Isabella works for Hilltop Consultants, a small tea shop, and the SFS Centennial Entrepreneurship Program. Isatou Bah Isatou is a junior in the college who is majoring in Economics and English with a minor in French. Isatou is obsessed with Toni Morrison, whose style of writing she adores. Isatou’s love for literature and all things related to books is indescribable. She is also from the Bronx, New York City. In the future, Isatou plans on pursuing a career in law while writing books. Jack Townsend Jack is a student in the College studying government and computer science. He tutors clients at all stages of the writing process but specializes in working with clients on their tone and clarity. In addition to his interests in politics and technology, he enjoys baking bread, skiing, and reading. Aside from the Writing Center, Jack works on the Georgetown Voice as a designer and copy editor. Kathryn Blanco Kathryn is a student in the College majoring in English and double minoring in Government and Italian. She loves to read, and her favorite book is Jane Eyre. Hailing from Newtown, Connecticut, Kathryn is a huge lover of Italian food (especially escarole and beans). She is also a connoisseur of Disney classics such as Cinderella and Beauty and the Beast. In her free time, she enjoys watching West Wing and baking bread while listening to podcasts. She is particularly interested in creative non-fiction writing and surprisingly enjoys the editing process, but she is excited to work with other students on writing assignments of all topics and at all stages! Kashaf Momin Kashaf is studying Biology of Global Health in the College. Her experience lies with science research papers and lab reports, general humanities analysis papers, and professional writing. She enjoys working on the organization and structure of the paper, developing a strong thesis, revision, and making sure that writers are effectively communicating their ideas. Kayode Lambkin Hey everyone! Kayode Lambkin is a sophmore in the business school majoring in OPIM and Marketing. At the writing center, he specializes in humanities papers, as well as writing cover letters and resumes. A D.C. native, he can tell you where the best food spots are around the city. Outside of the writing center, you can find him finding new trails to run on or in line at the Chick-fil-A. Madison Ferris Madison is majoring in Government and Mathematics and minoring in Spanish. She enjoys combining her qualitative and quantitative skills to work on organization and argument development in papers. Outside the Writing Center, she develops her eloquence as a member of the Philodemic Society and has been published in Utraque Unum. Mahesh Kumar Mahesh is a junior in the college, majoring in Biology of Global Health. His specialties include resume and cover letter writing as well as scientific literature ranging from lab reports to research manuscripts. Outside of the Writing Center he conducts research in a Neurobiology lab on campus and edits the Science and Technology section of the Georgetown Journal of International Affairs. Max Tinter Max is a Government/English major in the College with a minor in Jewish Civilization, and is from the up-and-coming cinematic city of Atlanta, Georgia. When he’s not working with the Writing Center, Max is probably enjoying corny (yet incredible) movies like High School Musical and Forrest Gump or reveling in his dream of becoming President of the United States. While he does not have a tutoring specialty (how can he pick just one), he’s personable, energetic, and would love discussing any part of your paper, if not the exciting minutia of Blue & Gray and Jewish Student Association. Meg Sinek Meg has three loves in life: skiing, sushi, and grammar. At Georgetown (a whopping fifteen minutes away from her hometown of Falls Church, VA), she continues to pursue these passions while studying International Politics in the School of Foreign Service and working towards her French proficiency. When she’s not flying down mountains, seeking out interesting international cuisine, or professing her love for the Oxford comma, Meg works as an administrator for the Women’s Campaign School at Yale. She is excited to outline, workshop, and edit writing projects with other Hoyas of all levels. Stop by sometime to pay her a visit! Michael Lawrence Michael is a first-year M.A. English student at Georgetown University. He studied English Language and Literature and Spanish Literature at the University of Maryland, where he also served as a Writing Center tutor before working at Writing Centers at NYU Shanghai and Pace University. He has extensive experience working with writing in the humanities and especially enjoys working with writers of English as a second language, creative writers, first-year writing students, and graduate writers in any discipline. You may also meet with Michael to discuss Björk or socialism. Nicholas Knowles Nicholas Knowles is a current junior in the SFS majoring in International Politics. Hailing from the Islands of the Bahamas – something he’ll be sure to remind you of – he looks forward to bringing his tropical roots to the Writing Center. Reagan Graney Coming to you from upstate New York (which is actually more like central New York), Reagan is a sophomore in the College, studying English and hopefully minoring in art! Creativity really interests Reagan, and she would love to talk with you about creative writing papers, grammar, and anything artsy. When she’s not at the Writing Center or huddled under a nice blanket watching the latest Netflix films, you can spot Reagan writing for the Georgetown Independent or maybe even reclining at the AMC. Rex Bone Rex is a student in the Georgetown College majoring in Computer Science. He specializes in both academic and creative writing, constantly searching for the overlap of the two. Being from South Florida, Rex has a decent command of Spanish that has not yet extended to writing. On campus, he is a tour guide and works for Classroom Technology, and in his free time, he enjoys soccer, basketball, and playing bridge. Tobi Okopie Hi, y’all! Tobi is a junior in the college majoring in Biochemistry and minoring in JUPS. She is from Houston, TX, but unfortunately, her southern twang never kicks in. She enjoys working on English, Theology, and Science writing. She also has interests in social justice research (focused on poverty and homelessness). On campus, you could find her on Lau 2 or in Regents searching for food! Sienna Brancato Sienna is a junior in the College majoring in English and Government and minoring in Italian. She’s a proud Italian American who grew up on Long Island (she has been told she has a bit of an accent). Sienna loves helping others develop confidence in their writing abilities, providing them with the tools to express their own voices and arguments clearly. She has a special interest in working with non-native English speakers. Her passions include feminism, spoken word poetry (watching more than performing), awkward dancing, and mint chocolate chip ice cream. Outside of the Writing Center, she works for theVoice and Bossier. Tyler Michaud Tyler is an M.A. student in the English Department at Georgetown University. While his broader interests include the humanities, social sciences, and arts, his professional experiences are in the study of English literature and education. He spends much of his free time writing poetry. Bring him your essay, creative writing, resumes, personal statements, or even just some ideas, and he will be happy to help! William (Hockaday) Hockaday, who does indeed go by his last name, is a junior in the College from Austin, TX, double majoring in African American Studies and English and minoring in Korean. His favorite work in the Writing Center includes consulting on humanities papers, government papers, and brainstorming with clients. Outside of the Writing Center, Hockaday is heavily involved with the Center for Multicultural Equity and Access, works out with the Club Boxing team, and is an active member of Mosaic, a club for multiracial and multiethnic students. Lauinger 217A 37th and O St, NW, Washington DC 20057 Email: writingcenter@georgetown.edu
cc/2019-30/en_head_0021.json.gz/line1730338
__label__wiki
0.652538
0.652538
In 1926, Newt Scamander arrives at the Magical Congress of the United States of America with a magically expanded briefcase, which houses a number of dangerous creatures and their habitats. When the creatures escape from the briefcase, it sends the American wizarding authorities after Newt, and threatens to strain even further the state of magical and non-magical relations. Actors: Alison Sudol, Colin Farrell, Dan Fogler, Eddie Redmayne, Jon Voight, Katherine Waterston, Ron Perlman Godzilla: Final Wars Evil Space Aliens called the Xilians unleashes all the Earth’s monsters to lay waste to most of the world’s major cities, including Tokyo, New York, Sydney, Shanghai and Paris. It… Country: Australia, China, Japan Welcome to the Punch When notorious criminal Jacob Sternwood is forced to return to London, it gives detective Max Lewinsky one last chance to take down the man he’s always been after. Genre: Action, Adventure, Crime The Texas Rangers chase down a gang of outlaws led by Butch Cavendish, but the gang ambushes the Rangers, seemingly killing them all. One survivor is found, however, by an… Genre: Action, Adventure, Western Fantastic Four: Rise of the Silver Surfer The Fantastic Four return to the big screen as a new and all powerful enemy threatens the Earth. The seemingly unstoppable ‘Silver Surfer’, but all is not what it seems… Robin Hood The Rebellion Genre: Action, Adventure, History Pocketman and Cargoboy Teenage secret agents must travel to the past and stop an evil doctor from creating a virus that wipes out all life in the future. Genre: Adventure, Comedy, Science Fiction A cryptic message from Bond’s past sends him on a trail to uncover a sinister organization. While M battles political forces to keep the secret service alive, Bond peels back… A joint task force operation between the Drug Enforcement Administration and the U.S. Army has been formed to dismantle one of the largest drug cartels operating in South America. Multiple… A young girl named Mija risks everything to prevent a powerful, multi-national company from kidnapping her best friend – a massive animal named Okja. Country: South Korea, USA Scientist Bruce Banner scours the planet for an antidote to the unbridled force of rage within him: the Hulk. But when the military masterminds who dream of exploiting his powers… Babe, fresh from his victory in the sheepherding contest, returns to Farmer Hoggett’s farm, but after Farmer Hoggett is injured and unable to work, Babe has to go to the… Country: France, Italy, Slovakia, Tunisia, UK Genre: Action, Adventure, Fantasy, War Trailer: Fantastic Beasts and Where to Find Them
cc/2019-30/en_head_0021.json.gz/line1730340
__label__wiki
0.838767
0.838767
Henderson’s Greater Vancouver City Directory, 1917, page 456 (edited image) Charles Edward Dawson was an auctioneer, property appraiser and antique dealer. He lived at 1949 Barclay Street from 1917 to 1920. Charles Edward Dawson was born in Ladysmith, Cape Colony, South Africa, on December 15, 1881 (or 1880). His father was Henry Francis Dawson, who was a school teacher. His mother was Rosie Elizabeth (or Ruth) Heyman. After Charles finished his schooling in Cape Town, South Africa, he served with the South African military for two years and eight months during the Boer War. After the war, he joined an auctioneering and real estate firm in South Africa. He arrived in Vancouver about 1910. By 1912, he was a managing director of Palmer, Burmester and von Graevenitz, which was a financial and estate firm. (Charles Mansel Burmester, one of the principals of the firm, had been in South Africa during the time of the Boer War. He lived at 2037 Pendrell Street in 1911.) Henderson’s Greater Vancouver Directory, 1912, Part 1, page 701 (edited image) Henderson’s Greater Vancouver Directory, 1912, Part 2, page 1092 Charles lived at the following addresses in Vancouver: 1912 number 607, 1214 Jervis Street (Holly Lodge Apartments) 1913 to 1916 1001 Georgia Street (Glencoe Lodge ) 1917 to 1920 1949 Barclay Street 1921 number 46, 1386 Nicola Street (Kensington Place Apartments) 1922 1001 Georgia Street (Glencoe Lodge ) 1923 to 1940 1555 Beach Avenue (listed as 1555 Pacific Street under names in 1923) 1941 and 1943 east side of Stevens Drive, British Properties, West Vancouver 1944 1450 Laurier Avenue 1945 2525 Southwest Marine Drive 1946 1154 Gilford Street (Sylvia Hotel) By 1914, Charles had established his own auctioneer and appraisal business. Henderson’s Greater Vancouver City Directory, 1914, Part 1, page 771 On April 17, 1916, in Vancouver, Charles married Lillian Ruth Duckworth. She was born on November 2, 1898, in Lachine, Quebec. Her father was Walter Ritchie Duckworth (1870-1942), who was a civil engineer. Her mother was Annie Ruth Brown (1866-1946). Charles’s auction and appraisal business was very successful. For some time he also had a business that sold antiques and collectibles. He auctioned the contents of many large homes in Vancouver, including this small sample: October 1919: Charles auctioned the contents of 1933 Robson Street, which was the house of John McLellan Mackinnon (1863-1937). December 1942: Charles auctioned the contents of “Hycroft,” the residence of Senator Alexander Duncan McRae, after Senator McRae decided to donate the residence to the federal government as a convalescent hospital for war veterans. From 1923 to 1940, Charles and Lillian lived at 1555 Beach Avenue. 1555 Beach Avenue, March 1959, Vancouver City Archives, Bu P508.102; http://searcharchives.vancouver.ca/exterior-of-residence-1555-beach-avenue. In 1926, Charles retired from business and travelled in Europe. In 1927, Charles and Lillian appeared in the Greater Vancouver Social and Club Register. Greater Vancouver Social and Club Register, 1927, page 20 In 1933, Charles established a business that sold antiques and high grade furniture. He belonged to the Western Club and the Shaughnessy Golf Club. He was a member of the Board of Trade, and the “Usadians” (now associated with the “International Executives Association”). Charles died in Vancouver on October 10, 1946. Lillian died in Vancouver on December 7, 1986. It appears that Charles and Lillian did not have any children. Charles Edward Dawson Charles Edward Dawson, Who’s Who in British Columbia, volume 5, 1942-1943, pages 94-95. Charles Edward Dawson, Who’s Who in British Columbia, volume 6, 1944-45-46, pages 65-66: “Dawson, Charles Edward—Born December, 1881, in Cape Colony, South Africa, son of Henry Francis Dawson, and grandson of Captain Francis Dawson of the Indian Civil Service. Educated in Cape Town. Joined one of the largest and leading auctioneering and real estate firms in South Africa after the South African War, and conducted many auction sales there. Came to Vancouver, 1910, and established in business as auctioneer, appraiser and general commission agent two years later. Conducted most of the outstanding sales of furniture and works of art in Vancouver. Has made a special study of antique furniture, china, Oriental rugs, etc. Retired from business 1926 and travelled in Europe for some time. Returned to business about 1933 and is now established as retail dealer in antiques and high grade furniture and furnishings, specializing in auction sales of the higher class and appraisals for various purposes. Served during Boer War (South African) with Western Province Mounted Rifles and later Army Service Corps—two years and eight months. Awarded Queen’s and King’s Medals. Married April 1916, Lillian Ruth, daughter of Walter R. Duckworth. Clubs: Shaughnessy Golf, Board of Trade, Usadians. Was a member of the old Western Club. Religion: Anglican. Recreations: riding, golf, and previously cricket and soccer football. Office: 1272 Granville Street, Vancouver. Residence: 2525 S.W. marine Drive, Vancouver, B.C.” International Executives Association; http://www.ieaweb.com/. IEA History Handbook: Chapter 4: “The Executives’ Association Movement (1928–1950)”; http://www.ieaweb.com/web_documents/iea_history_handbook-01.pdf: “Out of many suggestions offered at a meeting held in Victoria, it was decided that the name proposed by Mr. E. T. Fredrich of Seattle, “The Usadians International,” would be most acceptable. The name “Usadians” was coined from the initial letters of the name “United States of America” and from. the last three syllables of the word “Canadians.” “British Columbia Marriage Registrations, 1859-1932; 1937-1938,” database with images, FamilySearch (https://familysearch.org/ark:/61903/1:1:JDZ2-1YW : accessed 16 May 2016), Charles Edward Dawson and Lilian Ruth Duckworth, 17 Apr 1916; citing Vancouver, British Columbia, Canada, British Columbia Archives film number B11379, Vital Statistics Agency, Victoria; FHL microfilm 1,983,707. Merchant Prince: The Story of Alexander Duncan McRae; by Betty O’Keefe, Ian Macdonald, Surrey, British Columbia, Heritage House Publishing Co, 2001, page 200. (Auction of contents of Hycroft.) “British Columbia Death Registrations, 1872-1986; 1992-1993”, database with images, FamilySearch (https://familysearch.org/ark:/61903/1:1:FLLH-MK7 : accessed 16 May 2016), Charles Edward Dawson, 1946. Walter Ritchie Duckworth (father of Lillian Ruth Duckworth) “Canada Census, 1871,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:M4KD-8X1 : accessed 16 May 2016), Walter Duckworth, St-Lambert, Chambly, Quebec, Canada; citing p. 7, line 15; Library and Archives Canada film number C-10060, Public Archives, Ottawa, Ontario; FHL microfilm 2,229,022. “Canada Census, 1881,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:MVJ3-LX6 : accessed 16 May 2016), Walter Duckworth in household of John Duckworth, St-Lambert, Chambly, Quebec, Canada; citing p. 4; Library and Archives Canada film number C-13205, Library and Archives Canada, Ottawa, Ontario; FHL microfilm 1,375,841. “Canada Census, 1901,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:KH5M-L5Q : accessed 16 May 2016), Walter Duckworth, D, Jacques-cartier, Quebec, Canada; citing p. 4, Library and Archives of Canada, Ottawa. “British Columbia Death Registrations, 1872-1986; 1992-1993”, database with images, FamilySearch (https://familysearch.org/ark:/61903/1:1:FLK5-97R : accessed 16 May 2016), Walter Ritchie Duckworth, 1942. Walter Ritchie Duckworth, death notice, Vancouver Sun, January 14, 1942, page 17; https://news.google.com/newspapers?id=sTRlAAAAIBAJ&sjid=R4kNAAAAIBAJ&pg=6399%2C1508040: “Duckworth—Passed away Jan. 13, 1942, Walter Ritchie Duckworth, 3337 W. 3rd Ave. Survived by his loving wife, two sons, John M.C. of Montreal, and Herrick W. of Vancouver; three daughters, Mrs. C.E. Dawson, Mrs. A.M. Walker and Mrs. H.A. Jones, all of Vancouver, and five grandchildren. Private funeral service on Thursday, Jan. 15, in Simmons & McBride Funeral Chapel, Rev. F.W. Norwood, B.C.C., officiating. Cremation. No flowers by request.” Annie Ruth Brown (mother of Lillian Ruth Duckworth) “Canada Census, 1901,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:KH5M-L57 : accessed 16 May 2016), Annie Duckworth in household of Walter Duckworth, D, Jacques-cartier, Quebec, Canada; citing p. 4, Library and Archives of Canada, Ottawa. “British Columbia Death Registrations, 1872-1986; 1992-1993”, database with images, FamilySearch (https://familysearch.org/ark:/61903/1:1:FLL4-MY4 : accessed 16 May 2016), Annie Duckworth, 1946. Lillian Ruth Duckworth (wife of Charles Edward Dawson) “Canada Census, 1901,” database, FamilySearch (https://familysearch.org/ark:/61903/1:1:KH5M-L54 : accessed 16 May 2016), Lilian Duckworth in household of Walter Duckworth, D, Jacques-cartier, Quebec, Canada; citing p. 4, Library and Archives of Canada, Ottawa. “British Columbia Death Registrations, 1872-1986; 1992-1993”, database with images, FamilySearch (https://familysearch.org/ark:/61903/1:1:FLKY-GXL : accessed 16 May 2016), Lillian Ruth Dawson, 1986.
cc/2019-30/en_head_0021.json.gz/line1730342
__label__wiki
0.926031
0.926031
The Watch House The Watch (band) The Watch (Seinfeld) The Watch House is a 1977 fiction book by Robert Westall. The main story is about a teenager called Anne, who is left to spend the summer with her mother's old nanny. While there she explores the watch house, writes a guidebook for the watch house and is haunted by a ghost. It is split up into three parts. Reprintings A hardback edition was printed in May 2000. It was the 10th edition available. It is used as an education book by many schools around the world. This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/The_Watch_House The Watch may refer to: the town Watch, a medieval precursor to the modern police The Watch (2008 film), a made-for-TV film starring Clea DuVall The Watch (2012 film), a science fiction comedy film starring Ben Stiller "The Watch" (Seinfeld), an episode of Seinfeld The Watch (band), an Italian progressive rock band The Watch (TV series), based on Terry Pratchett's Discworld novels Watch (disambiguation) This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/The_Watch The Watch is a 5-member Italian progressive rock band from Milan, led by vocalist and principal songwriter Simone Rossetti. Their music is inspired by classic progressive rock style of the 1970s and in particular by the music of Genesis. Melody and energy are the main aspects of The Watch music and the live dimension is one of the greatest features of the band. The line-up of the band has changed several times throughout their history, with only Simone Rossetti remaining since the band's inception, but began to stabilize in 2007 with the arrival of drummer Marco Fabbri and guitarist Giorgio Gabriel, both of whom remain with the band to the present day. Simone Stucchi has produced all The Watch records (except for Timeless) and followed the band on stage as sound engineer until June 2011. The most recent lineup change occurred in September 2013, when bassist Stefano Castrucci joined the band to replace Guglielmo Mariotti, who had departed the band to commit more time to his family. In early 2014, the band's line-up was augmented by the inclusion of a second bassist, Mattia Rossetti, the son of the band's frontman Simone Rossetti. This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/The_Watch_(band) "The Watch" is the 46th episode of the sitcom Seinfeld. It is the sixth episode of the fourth season of the series, and first aired on September 30, 1992. Jerry has dinner with his parents and Uncle Leo. Elaine uses Kramer as "her boyfriend" in trying to fool her psychiatrist, Dr. Reston, who she was dating (played by Stephen McHattie). George gets Russell Dalrymple's address and tries to get the pilot reinstated. He succeeds -- at a price lower than Russell's original offer. Jerry tries to buy back the watch from Uncle Leo. Outside her psychiatrist's office, Elaine meets "Crazy" Joe Davola, whom she begins to date. This episode is a continuation of and opens with clips from the previous episode, "The Wallet." "The Watch" at the Internet Movie Database This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/The_Watch_(Seinfeld) Episode 1: (#1.1) UK:7 December 1988... UK:14 December 1988... thewebofthing.com thehouseofthreads.com thewatched.com theroyaloperahouse.org changingthewatch.com changingofthewatch.com howthehousemarketworks.com thehouseauction.com thehouseofmodernart.com saopaulohouse.com blockchainhouse.com besthouseparty.com houseofstrangers.net vrhousehunting.org athingaboutyou.com softwarehousewife.com caribbeanwatch.com modernartwatch.com beijinghouse.net amsterdamwatch.com The House, Ice-T The House, Grave Digger The House, Nits The House, Cool Hand Luke The House, Violet Hour The House, Katie Melua The House, Simon Joyner The House, John Williams The House, Lamp Of Thoth You know the house down the street Where the kids are and every day They seem to have a new scar Something strange is going on and everybody knows Doors always shut and windows always closed The little girl had a burn The boy was black and blue They said it came from play You know that shit ain't true The boy's arm's broke girl is scared to speak Their parents drink all day Couple of dead beats Some days they go to school, and other days they might It's hard to stay awake after you cry all night You see 'em every day Tear tracks on their cheeks But they will never tell It goes on weeks and weeks (But what can they do? They're only children man!) You ain't no fuckin' kid Acting like you give a damn! Won't someone save these kids Do something, call a cop Latest News for: the watch house Girl's finger cut off, boy held in isolation for 23 days: The Watch House Files Australian Broadcasting Corporation 12 May 2019 Each year, hundreds of children are locked up in adult watch houses. Some are as young as 11, and some are locked up for weeks. These files document their stories ... .... The Watch House review: A very sharp turn on Rathlin island The Irish Times 12 Aug 2017 The characters of Bernie McGill’s accomplished new novel The Watch House are glic, that old Irish word that belies exact translation ... Her assured style and eye for detail makes The Watch House a pleasure to read, a fast-paced tale that rarely flags, with a complex and beguiling heroine at the helm....
cc/2019-30/en_head_0021.json.gz/line1730353
__label__wiki
0.969936
0.969936
Tottenham Winger Georges-Kévin Nkoudou Joins AS Monaco on Loan Until End of the Season Toby Cudworth 31 Jan 2019 ​Tottenham winger Georges-Kévin Nkoudou has completed a loan move to AS Monaco until the end of the season. The 23-year-old departs after failing to break into Mauricio Pochettino's first team plans in north London, despite the club undergoing somewhat of an injury crisis in recent weeks. Nkoudou, who has only made 10 appearances in the Premier League for Spurs since arriving from Marseille in the summer of 2016, will now spend the rest of the season in Ligue 1 - where he will look to dig the former champions out of relegation trouble after a terrible start to the season. 🇲🇨 @gknkoudou has joined @AS_Monaco on loan until the end of the season. Best of luck, GK. pic.twitter.com/x6wJOkZFqa — Tottenham Hotspur (@SpursOfficial) January 31, 2019 A short statement on ​Tottenham's official website confirmed the move, saying: "Georges-Kevin Nkoudou has joined AS Monaco on loan until the end of the season. "The French attacking player joined us from Marseille in 2016 and has made 26 appearances for the Club, scoring once in the Champions League last season against APOEL." Nkoudou's latest loan spell isn't the first time he has left Spurs in search of regular first-team football. He moved to Burnley last season under the tutelage of Sean Dyche, but failed to earn himself a regular place at Turf Moor - which saw any faint hopes of a permanent deal extinguished. His departure from the club is unlikely to see any incomings at Tottenham - with Mauricio Pochettino resigned to the fact that his threadbare squad will have to see him through until the end of the season.
cc/2019-30/en_head_0021.json.gz/line1730357
__label__wiki
0.807948
0.807948
Judge Rules That Retaliation Lawsuit Against Department of Corrections Can Proceed CONTACT: (212) 549-2666; media@aclu.org A federal judge yesterday refused to dismiss an ACLU lawsuit brought on behalf of an ACI inmate who was retaliated against by guards after he publicly criticized Department of Corrections’ mail policies and sought legal assistance from the ACLU. The pattern of harassment against inmate Jason Cook, which included strip searches, loss of his prison job, destruction of his personal property, and disciplinary time in segregation, began after Cook was quoted in a Providence Journal story criticizing a DOC policy limiting the written materials available to inmates. The policy was later rescinded. The ACLU lawsuit argues that corrections officials’ actions “in retaliating against Cook for publicly criticizing policy changes” at the DOC violated his First Amendment right to freedom of speech “and displayed both deliberate indifference and a reckless disregard of Cook’s constitutional rights.” The suit further claims that the various disciplinary actions taken against him violated Cook’s due process rights. In court, the Department of Corrections made the troubling argument that Cook had no First Amendment right to speak to the Providence Journal about the policy and therefore his suit should be thrown out. Last September, a magistrate judge rejected DOC’s argument, but the agency appealed that ruling. Yesterday, U.S. District Court Judge William Smith agreed that the ACLU’s retaliation claims could proceed, and further ruled that Cook’s due process claims should also not be dismissed. The mail policy at issue that Cook initially protested, and that was ultimately withdrawn after the ACLU intervened, barred family members from ordering books or magazine subscriptions for inmates. Instead, inmates could only obtain publications directly from a publisher with their own funds. The lawsuit is being handled by ACLU volunteer attorneys from the law firm of DeLuca and Weizenbaum. ACLU of RI executive director Steven Brown said today: “The DOC’s position that inmates could be disciplined simply for bringing prison conditions and policies to the public’s attention was extremely troubling. We are pleased that the court has rejected it, and that Mr. Cook can proceed with his claims.” A summary of the actions taken against Cook after he spoke out: ALLEGATIONS OF RETALIATION AGAINST JASON COOK BY DOC OFFICIALS In October 2007, a Providence Journal story quoted Cook criticizing a new DOC policy limiting the written materials available to inmates. A week later, he was fired from his kitchen job under the pretext that he was caught on a video camera stealing state property. He was later found not guilty of the charge. In February 2008, the RI ACLU intervened on Cook’s behalf in the dispute over the new inmate mail policy by writing DOC officials in support of his position. Shortly thereafter, correctional officers conducted a destructive search of Cook’s cell that damaged some of his personal property. After complaining to the DOC’s Office of Inspections about that search, Cook was advised that other inmates in his module with similar complaints should contact the Office. Cook posted a notice to that effect on an inmate bulletin board. A few days later, as a result of that posting, he was disciplined for “engaging in or encouraging a group demonstration and/or activities,” strip searched and taken to segregation. Two weeks later, he was finally given a hearing on the charge, but not allowed to present and/or question any witnesses. In the meantime, the mail policy about which he and the ACLU had complained was rescinded by the DOC. Cook was found guilty of the charge and sanctioned with 30 days in segregation and the loss of good time. At the end of the hearing on the charge, the hearing officer turned off the tape recorder of the proceeding and told Cook that “this is what happens when you get the ACLU involved in our business.” In May 2008, Cook was once again strip searched and thrown into segregation on the grounds that a letter he had written to the Parole Board was “threatening.” He was held in segregation for almost three weeks without a hearing before being released. In September 2008, Cook sent a letter to Corrections Director A.T. Wall protesting the lack of a response to grievances he had submitted. Two days later, Cook was again subjected to a strip search and a cell search where his property was destroyed. Officers also looked through Cook’s legal materials and asked him if he had communicated further with any Providence Journal reporters. Smart Justice Cruel, Inhuman, and Degrading Conditions Prisoners' Rights Real criminal justice reform now
cc/2019-30/en_head_0021.json.gz/line1730359
__label__wiki
0.712256
0.712256
62 Years Ago: First Mass Trials of the Salk Polio Vaccine Remembering Dr. Jonas Salk, creator of the polio vaccine Unfortunate News From Ukraine: 2 Cases of Polio The 60th anniversary of the polio vaccine: It was seen as an absolute miracle and blessing Back-to-Schoolers: Shun Deluded Anti-Vax Doc Africa celebrates one year without polio By Gil Ross — February 23, 2016 On this day in 1954, February 23rd, a group of children from Arsenal Elementary School in Pittsburgh, PA received the first injections of the new polio vaccine developed by Dr. Jonas Salk. The first effective polio vaccine was developed in 1952 by Dr. Salk at the University of Pittsburgh, but it would require years of testing. Beginning on that February day, the vaccine was tested at Arsenal and the Watson Home for Children, also in Pittsburgh. Salk's vaccine was then used in a test called the Francis Field Trial, led by Thomas Francis, which was at the time the largest medical experiment in history. The test began with some 4,000 children at Franklin Sherman Elementary School in McLean, VA and would eventually involve 1.8 million children in 44 states. Thousands of health care professionals and other volunteers administered the vaccine and collected results. By the conclusion of the study, roughly 440,000 received one or more injections of the vaccine, about 210,000 children received a placebo, consisting of harmless culture media, and 1.2 million children received no vaccination and served as a control group, who would then be observed to see if any contracted polio. The results of the field trial were announced on April 12, 1955 (the 10th anniversary of the death of President Franklin D. Roosevelt, whose paralysis was generally believed to have been caused by polio). The Salk vaccine had been 60 70 percent effective against PV1 (poliovirus type 1), over 90 percent effective against PV2 and PV3, and 94 percent effective against the development of bulbar polio. Soon after Salk's vaccine was licensed in 1955, children's vaccination campaigns were launched. In the United States, following a mass immunization campaign promoted by the March of Dimes, the annual number of polio cases fell from 35,000 in 1953 to 5,600 by 1957. By 1961 only 161 cases were recorded in the U.S. February 23rd is, therefore, another day when all Americans, indeed everyone everywhere, should remember the dark cloud of communicable diseases that plagued us over the millennia, and how medical science has so effectively thwarted their onslaught, a fact all-too-often forgotten or even denied by ignorant and cynical demagogues who would put us all back in danger of preventable viral scourges. By Gil Ross Latest from Gil Ross: Don't Abandon Hope, Vapers! There's Light in the Darkness Better Health Through Government Overreach! Heart Disease Deaths Rise, With Cause Unknown Topical Anti-inflammatories Effective, & Safer, than Pain Pills
cc/2019-30/en_head_0021.json.gz/line1730360
__label__cc
0.657666
0.342334
ACT for Safety “Every member of our team is important to us, as it is the people at ACT who primarily contribute to its success. This is why we put safety at the forefront of our priorities, making safety reinforcements and trainings a regular fixture in our corporate culture. " Steven Yoogalingam, CEO - Aqaba Container Terminal Safety is at the heart of everything we do - driven by our senior management and applied through our operating management system. Safety is a way of life and a priority in every service we perform; we are committed to protecting the health and safety of our employees and others at our sites, and are actively engaged in various industry initiatives to constantly improve health and safety issues. We are committed to conducting our business in a manner that protects the health and safety of our employees, contractors and the community at large. To maintain a safe and healthy work environment, we continuously identify and evaluate all potential risks. ACT has always been committed to ensuring the highest levels of safety for its employees and its business partners. this commitment is embodied in the company's periodic training programs and the strict monitoring of safety regulations it reinforces. ACT receives 2009, 2011 and 2015 occupational health and safety award for excellence In recognition of ACT’s achievements on Health and Safety Management and the pioneering regulations it employs in the field, ACT had been 3 times awarded the “Social Security Excellence Award in Occupational Health and Safety” in 2009, 2011 and 2015 which is the only safety award of its kind in Jordan by the Social Security Corporation. This recognition was based on ACT’s high local and international safety standards across all of its activities. And also was awarded best safety performance from APMT in 2015. Through its HSSE department, ACT continues to aggressively pursue new training and workplace initiatives to increase effectiveness of the existing programs, which emphasize personal responsibility for safety in the workplace. ACT employees, contractors, vendors and visitors are also responsible and accountable for their own safety and the safety of others; thereby ensuring a safe work environment. We require them to adhere fully to our HSSE principles. To eliminate accidents and work-related ill health and to protect the environment. The HSSE Department develops guidelines and minimum requirements; it formulates targets for the continuous improvement of ACT safety and environmental standards. And support our all as they work to meet these targets. The department is also equipped with the most advanced emergency equipments and professionals that are available and ready to respond to any emergency: Chemical spill equipment gear Special PPE & breathing apparatuses Emergency Response team 24/7 equipped with latest HAZMAT and firefighting equipments. Fire Rescue gear Pick-ups for safety and security tours Barrier equipments crowd control Fully equipped Clinic staffed with doctor and nurese 24/7 and fully equipped ambulance. Periodical health check for all employees.
cc/2019-30/en_head_0021.json.gz/line1730361
__label__wiki
0.812802
0.812802
Expand Categories 30+ Categories Expand Tags Stick Figure Cute Shooters Endless Runner Brain Teasers & Quizzes Most Addicting Games https://www.addictinggames.com/sites/default/files/littlebigsnake.mp4 https://www.addictinggames.com/sites/default/files/ageofwar.mp4 n00b.io https://www.addictinggames.com/sites/default/files/n00b.io_.mp4 Helicopter Game https://www.addictinggames.com/sites/default/files/helicoptergame.mp4 MiniGiants.io https://www.addictinggames.com/sites/default/files/minigiants.io__0.mp4 Kitten Cannon https://www.addictinggames.com/sites/default/files/kittencannon.mp4 The Idiot Test https://www.addictinggames.com/sites/default/files/idiot.mp4 https://www.addictinggames.com/sites/default/files/bubblespinner.mp4 https://www.addictinggames.com/sites/default/files/theimpossiblequiz.mp4 https://www.addictinggames.com/sites/default/files/krunker.mp4 FlappyRoyale.io https://www.addictinggames.com/sites/default/files/flappy-royale-io.mp4 Unpark Me https://www.addictinggames.com/sites/default/files/unpark-me.mp4 https://www.addictinggames.com/sites/default/files/big-farm-mmo.mp4 https://www.addictinggames.com/sites/default/files/forge-of-empires-mmo.mp4 https://www.addictinggames.com/sites/default/files/DragonAwaken-Video.mp4 https://www.addictinggames.com/sites/default/files/good-game-empire.mp4 Eternal Fury H5 https://www.addictinggames.com/sites/default/files/Eternal%20Fury%20H5%20Video_274x156.mp4 https://www.addictinggames.com/sites/default/files/elvenar.mp4 Tactics Core.io https://www.addictinggames.com/sites/default/files/tacticscore-io_0.mp4 Get the Gun https://www.addictinggames.com/sites/default/files/get-the-gun-mmo.mp4 https://www.addictinggames.com/sites/default/files/klondikemmo.mp4 Indy Cat https://www.addictinggames.com/sites/default/files/indy-cat.mp4 https://www.addictinggames.com/sites/default/files/darkorbit.mp4 New Games - Added Every Thursday! View Last Weeks Games Stickyman Run https://www.addictinggames.com/sites/default/files/stickyman-run.mp4 https://www.addictinggames.com/sites/default/files/Salazar.mp4 Zombie Massacre https://www.addictinggames.com/sites/default/files/Zombie-Massacre.mp4 https://www.addictinggames.com/sites/default/files/Cake-House.mp4 https://www.addictinggames.com/sites/default/files/Totem-Blast.mp4 Space Cubes https://www.addictinggames.com/sites/default/files/Space-Cubes.mp4 Jump Ninja Hero https://www.addictinggames.com/sites/default/files/jump-ninja-hero.mp4 https://www.addictinggames.com/sites/default/files/let-me-rock.mp4 Jewel Blocks https://www.addictinggames.com/sites/default/files/jewel-blocks_0.mp4 https://www.addictinggames.com/sites/default/files/Tetris-Dimensions.mp4 https://www.addictinggames.com/sites/default/files/Jewel-Master.mp4 https://www.addictinggames.com/sites/default/files/Frog-Jump.mp4 Extreme Way https://www.addictinggames.com/sites/default/files/extreme-way1.mp4 Jimbo Jump https://www.addictinggames.com/sites/default/files/jimbo-jump.mp4 Neon Switch https://www.addictinggames.com/sites/default/files/NeonSwitch.mp4 https://www.addictinggames.com/sites/default/files/Space-Connect1.mp4 Stone Symbols https://www.addictinggames.com/sites/default/files/StoneSymbols.mp4 Bomb. Town https://www.addictinggames.com/sites/default/files/knifesmasher_0.mp4 Submarine Dash https://www.addictinggames.com/sites/default/files/submarine-dash.mp4 https://www.addictinggames.com/sites/default/files/saws.mp4 Temple Quest https://www.addictinggames.com/sites/default/files/temple-quest.mp4 Squirrel Bubble Shooter https://www.addictinggames.com/sites/default/files/Squirrel-Bubble-Shooter.mp4 Treasures of Atlantis https://www.addictinggames.com/sites/default/files/TreasuresOfAtlantis.mp4 Black To White https://www.addictinggames.com/sites/default/files/Black-To-White.mp4 Unblock That https://www.addictinggames.com/sites/default/files/unblock-that.mp4 Aqua Friends https://www.addictinggames.com/sites/default/files/aqua-friends.mp4 Dragon Run https://www.addictinggames.com/sites/default/files/Dragon-Run.mp4 Power Wall https://www.addictinggames.com/sites/default/files/power-wall.mp4 Train Switch https://www.addictinggames.com/sites/default/files/Train-Switch.mp4 https://www.addictinggames.com/sites/default/files/Birds-Kyodai.mp4 https://www.addictinggames.com/sites/default/files/Vexed_0.mp4 https://www.addictinggames.com/sites/default/files/Sokoban_0.mp4 Frog Rush https://www.addictinggames.com/sites/default/files/frog%20rush.mp4 Starve.io https://www.addictinggames.com/sites/default/files/surviv-io_0.mp4 Traffic Racer https://www.addictinggames.com/sites/default/files/TrafficRacer.mp4 Mini Golf Master https://www.addictinggames.com/sites/default/files/mini_glof_master.mp4 https://www.addictinggames.com/sites/default/files/nend.io_.mp4 https://www.addictinggames.com/sites/default/files/lost-island.mp4 Vintage Vexed https://www.addictinggames.com/sites/default/files/Vintage-Vexed.mp4 Mini Ostars https://www.addictinggames.com/sites/default/files/mini-ostars_0.mp4 Instant Games Max Dirt Bike https://www.addictinggames.com/sites/default/files/maxdirtbike.mp4 https://www.addictinggames.com/sites/default/files/miniputt.mp4 https://www.addictinggames.com/sites/default/files/50statesv2_0.mp4 https://www.addictinggames.com/sites/default/files/mahjongg.mp4 100 Arrows https://www.addictinggames.com/sites/default/files/100-arrows-game.mp4 Slaughterhouse Escape Deluxe https://www.addictinggames.com/sites/default/files/slaughterhouse-escape.mp4 Hatfall https://www.addictinggames.com/sites/default/files/hatfall_0.mp4 Perfect Hoopz 3 https://www.addictinggames.com/sites/default/files/perfect-hoopz-3-game.mp4 Zombie Love Story https://www.addictinggames.com/sites/default/files/zombie-love-story.mp4 https://www.addictinggames.com/sites/default/files/cut-the-rope-time-trave.mp4 Tactical Squad https://www.addictinggames.com/sites/default/files/tactical-squad.mp4 https://www.addictinggames.com/sites/default/files/cut-the-rope.mp4 Lightybulb Round 2 https://www.addictinggames.com/sites/default/files/lightybulb-round-2.mp4 Battle Coast https://www.addictinggames.com/sites/default/files/battle-coast.mp4 Lightybulb https://www.addictinggames.com/sites/default/files/lightybulb-game.mp4 https://www.addictinggames.com/sites/default/files/Grand-Prix-Hero.mp4 Helicopter Game 2.0 https://www.addictinggames.com/sites/default/files/helicoptergame2.mp4 https://www.addictinggames.com/sites/default/files/day-d-tower-rush.mp4 X-Trial Racing https://www.addictinggames.com/sites/default/files/x-trial-racing.mp4 https://www.addictinggames.com/sites/default/files/x-type.mp4 Soccer Pro https://www.addictinggames.com/sites/default/files/soccer-pro.mp4 https://www.addictinggames.com/sites/default/files/dodge-ball-game.mp4 https://www.addictinggames.com/sites/default/files/headless.mp4 https://www.addictinggames.com/sites/default/files/xibalba-game.mp4 Run Rabbit Run https://www.addictinggames.com/sites/default/files/run-rabbit-run-game.mp4 Top Shootout: The Saloon https://www.addictinggames.com/sites/default/files/top-shootout-the-saloon.mp4 Animalines https://www.addictinggames.com/sites/default/files/animalines-game.mp4 Street Racing Mania https://www.addictinggames.com/sites/default/files/street-racing-mania-.mp4 Nature Strikes Back https://www.addictinggames.com/sites/default/files/nature-strikes-back.mp4 Monster Truck Forest Delivery https://www.addictinggames.com/sites/default/files/monster-truck-forest-delivery.mp4 https://www.addictinggames.com/sites/default/files/jelly-slice-game.mp4 Bust A Beat https://www.addictinggames.com/sites/default/files/bust-a-beat-game.mp4 https://www.addictinggames.com/sites/default/files/block-buster.mp4 Zombie Survival Jumping Light https://www.addictinggames.com/sites/default/files/jumping-light.mp4 https://www.addictinggames.com/sites/default/files/Crush-the-Castle-2.mp4 https://www.addictinggames.com/sites/default/files/age-of-war-2.mp4 https://www.addictinggames.com/sites/default/files/warfare1944.mp4 Oiligarchy https://www.addictinggames.com/sites/default/files/oiligarchy.mp4 https://www.addictinggames.com/sites/default/files/governorofpoker.mp4 Clear Vision II https://www.addictinggames.com/sites/default/files/clearvisionii.mp4 https://www.addictinggames.com/sites/default/files/kingdom-rush.mp4 Zombocalypse https://www.addictinggames.com/sites/default/files/zombacalypse.mp4 https://www.addictinggames.com/sites/default/files/i-saw-her-standing-there_0.mp4 Defend Your Nuts https://www.addictinggames.com/sites/default/files/defendyournut.mp4 Vampire Physics https://www.addictinggames.com/sites/default/files/vampire-physics.mp4 https://www.addictinggames.com/sites/default/files/superstarfootball.mp4 https://www.addictinggames.com/sites/default/files/zombie-trailer-park_0.mp4 https://www.addictinggames.com/sites/default/files/flight.mp4 Creative Kill Chamber https://www.addictinggames.com/sites/default/files/creative-kill-chamber.mp4 https://www.addictinggames.com/sites/default/files/potty-racers-2.mp4 https://www.addictinggames.com/sites/default/files/toss-the-turtle.mp4 Sniper Assassin 5: Final Mission https://www.addictinggames.com/sites/default/files/sniper-assassin-5-final-mission.mp4 Crash Test Launcher https://www.addictinggames.com/sites/default/files/Crash-Test-Launcher.mp4 Effing Worms https://www.addictinggames.com/sites/default/files/effing-worms.mp4 https://www.addictinggames.com/sites/default/files/clan-wars.mp4 https://www.addictinggames.com/sites/default/files/doodle-god.mp4 https://www.addictinggames.com/sites/default/files/ricochet-kills-2.mp4 Red Remover Players Pack https://www.addictinggames.com/sites/default/files/Red-Remover-Players-Pack.mp4 https://www.addictinggames.com/sites/default/files/crush-the-castle-players-pack.mp4 Barnville Massacre https://www.addictinggames.com/sites/default/files/barnville-massacre.mp4 Bloons Super Monkey https://www.addictinggames.com/sites/default/files/bloons-super-monkey.mp4 https://www.addictinggames.com/sites/default/files/infectionator.mp4 Highway Pursuit https://www.addictinggames.com/sites/default/files/highway-pursuit.mp4 https://www.addictinggames.com/sites/default/files/Papa_s-Cupcakeria.mp4 Potty Racers 3.4 https://www.addictinggames.com/sites/default/files/pottyracers3.mp4 https://www.addictinggames.com/sites/default/files/Papa_s-Freezeria.mp4 https://www.addictinggames.com/sites/default/files/thisistheonlylevel.mp4 Sniper Assassin 4 https://www.addictinggames.com/sites/default/files/sniperassassin4.mp4 https://www.addictinggames.com/sites/default/files/bloonstowerdefense4.mp4 Man Hunter https://www.addictinggames.com/sites/default/files/manhunter.mp4 https://www.addictinggames.com/sites/default/files/palisadeguardian2.mp4 Just Avoid It https://www.addictinggames.com/sites/default/files/Just-Avoid-It.mp4 https://www.addictinggames.com/sites/default/files/redremover.mp4 What Is Addicting Games Up To? Hello, fans, followers, and friends! There has been some talk lately in the news about the casual gaming industry. Whether it’s one announcement or another about new game streaming services coming out, rumors about the shutdown of other beloved flash gaming sites, or the inevitable fate of Flash finally being revealed. There is a lot of movement going on in the casual gaming world right now. So, you might as well add this announcement to the pile: We are updating with all new games on Thursdays again. No point in burying the lede, no reason to dress it up in corporate jargon or... What are io games? What is an io game? What does io even stand for? Am I an io game? Are you an io game? Look, definitions are tricky. Maybe it’s just me but I’m kind of an “I am not a number, don’t label me with your labels, man” kind of person. But, categories do serve a function and while they sometimes are too claustrophobic or too laissez-faire, it is safe to say that games in general and io games, in particular, can be neatly defined. To avoid any confusion before we get started, we should be clear that an io game doesn’t need to have the .io domain at the end of its name. The .io domain is just the country code top-level domain for the British Indian Ocean. Much like how Canada uses .ca or India uses .in. The two first and biggest io games --Agar.io and Slither io-- both used .io as their domain of choice, so, it became the de facto standard for similar games and eventually morphed into the name of the genre. The top ten Flash games of all time Flash Games still hold a special place in the hearts of many gamers who grew up or were online during the early to mid-2000s. Anybody into the casual gaming scene could tell you that you were spoiled for choice. There were hundreds of developers, dozens of publishers and a seemingly limitless supply of new games daily. Best of all, there were no micro-transactions, no pay walls, and no downloads. As long as you had flash —which was standard back in the day— you could scroll through and play for as long as you wanted. In this wild west world of Flash Games, it took a lot to stand out and succeed. Sometimes you had to be original, or have a cool theme, great graphics, solid mechanics or a neat twist on an old genre favorite. You also had to hustle. With so many games, so many publishers and such a low barrier to entry for both players and developers it was easy for a new title to suffocate in the deluge of content. But... Top site lists User Submission Agreement Virtual Currency Agreement Copyright © 2019 Addicting Games, inc ; all rights reserved Third-party trademarks are used solely for distributing the games indexed herein and no license or other affiliation is implied.
cc/2019-30/en_head_0021.json.gz/line1730363
__label__cc
0.590853
0.409147
4 Year Old Tupper Boy Drowns Posts Tagged ‘healthcare’ Naj Wikoff: The Healing Powers of Nature by Naj Wikoff Is being out in Nature healing? An increasing body of evidence says yes according to Florence Williams, the author of The Nature Fix: Why Nature Makes US Happier, Healthier, and More Creative. What makes us happy? For a long time, research has pointed to having good relationships, being engaged with one’s community, meeting one’s basic needs of food, housing, and income, getting exercise, and being involved in some cause more significant than one’s self; spending time helping others. But what about the environment we live in, does that matter, and if so, does it matter in some significant way? » Continue Reading. North Country Looks At Single-Payer Health Care by Bill Quinlivan Recently, residents from around the North Country assembled in the Long Lake Town Hall to hear and participate in a meeting dedicated to better understanding the New York Health Act, the projected savings for Adirondack communities of this single-payer health-insurance program and where it currently stands in the state legislature. Dr. Jack Carney of the North Country Access to Health Care Committee and member of the Long Lake Alliance moderated the evening’s program. The program featured Dr. Andrew Coates as the keynote speaker. Dr. Coates is assistant professor of medicine and psychiatry at Albany Medical College and past president of Physicians for a National Health Plan. » Continue Reading. BT3 Alliance To Host Annual Meeting June 20th The Adirondack Birth to Three Alliance’s (BT3) annual meeting will bring together educators, providers, government, nonprofits, and businesses to network, quickly review progress to date, and consider strategies to support services for families with young children across the region. The annual meeting’s theme is Early Childhood Systems Building and will take Tuesday, June 20, at the Crowne Plaza in Lake Placid. The day will begin at 9:30 am with networking and a light breakfast; the meeting will conclude with lunch at 12:30 pm. » Continue Reading. Women’s Health Discussion Set For June 6th The Adirondack Health’s Community Discussion on women’s wellness postponed from May 16th will take place Tuesday, June 6th. The discussion, part of Adirondack Health’s Community Discussion Series, will be held at 6:30 pm at The Wild Center, 45 Museum Drive in Tupper Lake. The event is free, and refreshments will be served. » Continue Reading. Remote Healthcare Monitoring in the Adirondacks Adirondack Health and Health Recovery Solutions (HRS) have partnered to provide remote monitoring and videoconferencing services throughout the North Country region of New York State. Adirondack Health plans to have HRS integrated with Hixny’s health information exchange to serve patients in their homes. The exchange provides electronic access to patients’ records. HRS uses a 4G-enabled tablet equipped with their software and integrated with Bluetooth devices to capture vital signs and provide high risk-alerts. It also provides educational videos, two-way videoconferencing for family members and clinicians, and assistance with medication management. » Continue Reading. Herbal Remedies: Ancient Medicines, Modern Uses by Paul Hetzler By late-March it starts to feel as though winter is the only time of year not in a hurry to get somewhere. By comparison, every other season seems to go by with a Doppler-type velocity like an Indy car blurring past. But I realize that any day now, spring could get sprung, and when that happens, plant life will change by the day, if not the hour. Some of the first plants to catch my eye are ones which have historically been used to treat coughs and colds. Good timing, I’d say. Herbal remedies have been part of human culture since the day culture got invented. No matter where our early ancestors settled, they exploited regional plants for medicinal as well as culinary value. In a sense, unknown plants served as an evolutionary pressure, except they selected against bad luck, and perhaps gullibility, and likely didn’t help the human genome a lot. As knowledge of plant medicine accrued, it was refined, committed to memory and passed along — first orally and later in writing — from one generation to the next. Ancient healers had to know the properties of a given plant, what it might interact with, and how to tell it from similar species. This of course helped protect them from the wrath of disgruntled patients, not to mention early malpractice suits. » Continue Reading. Sprucelets: An Original Adirondack Medicine by Lawrence P. Gooley Cold and flu season once again has sufferers scrambling for any kind of relief from all sorts of medicines. A little over a century ago, right here on Northern New York store shelves, next to cough drops by national companies like Smith Brothers and Luden’s, was a local product made in Malone. Sprucelets were created mainly from a raw material harvested in the Adirondacks: spruce gum. Like hops, blueberries, and maple syrup, the seasonal gathering and sale of spruce gum boosted the incomes of thousands of North Country folks seeking to make a dollar any way they could. Much of what they picked was sold to national gum companies, but some was used locally by entrepreneurs who established small factories and created many jobs. Among these was the Symonds & Allison Company of Malone, founded there in 1897 by Charles Symonds and Aaron Allison when the latter purchased half-interest in Symonds Brothers, a convenience-store operation offering food, coffee, candy, and tobacco products. » Continue Reading. Lake George Residents Take Lead in New Planned Parenthood by Anthony F. Hall Planned Parenthood Mohawk Hudson serves an area larger than some small states. But when creating a campaign to help fund the construction of a new health center in Queensbury, it found its leadership team on Lake George. Jessica Rubin and Sam Caldwell of Bolton Landing co-chair a Steering Committee that includes Sam’s parents, Ted and Jane Caldwell. Joan and By Lapham, Fish Point summer residents, co-chair an Honorary Committee. » Continue Reading. Ticonderoga Hospital Renovations Planned The $9.1 million renovation of Ticonderoga’s Moses Ludington Hospital is scheduled to start in February, 2017. The renovation, which will replace the existing inpatient hospital with new emergency and outpatient departments, is expected to take two years, said Jane Hooper, the hospital’s director of community relations. According to Matt Nolan, the Chief Operating Officer, construction will take place in phases in order to prevent any disruption in services. » Continue Reading. Justice Center Helps Vulnerable New Yorkers With Support, Services The New York Justice Center for the Protection of People with Special Needs has several professional advocates on staff who provide guidance and assistance to people receiving services who have either been victims of, or witnesses to, acts of abuse and neglect. Assistance and guidance is also provided to families. The Justice Center’s Individual and Family Support Unit (IFSU) is staffed with 10 advocates and has responded to more than 3,700 unique callers from people who receive services or their family members and personal representatives since 2013. » Continue Reading. Ray Brook Couple Billed $60,000 For Flight To Hospital by Rick Karlin Leigh Campbell got quite a shock in the predawn hours of April 3: his wife, Heather, 27 weeks pregnant, went into early labor. The couple, who live in Ray Brook, rushed to the Adirondack Medical Center in nearby Saranac Lake. But because that hospital lacks a neonatal intensive-care unit, their midwife called for a helicopter to bring Heather to a hospital in Burlington, Vermont, on the other side of Lake Champlain. The good news: Heather avoided a premature birth. As of Friday, she remained in the hospital waiting to bring her baby to term. But the Campbells are still dealing with the aftermath of another shock: two days after the medical emergency, they learned that the bill for the 25-minute helicopter flight was $59,999. And Heather’s insurance carrier would cover only about $370. The service provided by the helicopter company, LifeNet, was “out of network” and therefore not covered by her health-insurance policy. » Continue Reading.
cc/2019-30/en_head_0021.json.gz/line1730364
__label__wiki
0.897288
0.897288
Stricken Jumbo allowed to fly over centre of London Filed in News from the AEF, Third party safety around airports A stricken Jumbo was allowed to fly over the centre of London with one engine down and three failing. This highlights the fact that Heathrow is by far the most dangerous airport in the country for those on the ground. A stricken Jumbo was allowed to fly over the centre of London with one engine down and three failing. See story below (much of the material taken from the Times article on 13 Jan 06 by Ben Webster).A jumbo jet that had lost an engine and was losing power in the other three was diverted over Central London, putting hundreds of lives at risk on the ground, an investigation has found.The crew were “fortunate” that there was good visibility because in low cloud “the aircraft might have landed well short of the runway”, according to the Air Accidents Investigation Branch (AAIB). It ordered the Civil Aviation Authority to carry out an urgent review of the guidance given to air traffic controllers on diverting aircraft in emergencies over densely populated areas. The American-owned cargo plane was not carrying any charts for Heathrow and the pilots did not realise that their diversion would take them over thousands of homes. They appeared unaware of other options open to them, including Gatwick, Luton and Stansted, which would have allowed them to avoid built-up areas. The incident, in April 2004, began as the Evergreen International Airlines aircraft was flying at 36,000ft over Southend-on-Sea, en route from Ramstein in Germany to New York. An engine failed and the flight engineer was unable to restart it. Minutes later, after the aircraft had descended to 21,000ft, the captain noticed that he was losing power in the other three engines. The crew radioed the airline’s maintenance centre but it was “unable to offer any solutions”, according to the AAIB report. The captain then declared an emergency and asked air traffic control to clear him to land at Heathrow. Fearing that he was about to lose all four engines, he altered the controls of the Boeing 747 to prepare it for gliding. As the aircraft descended over Croydon, the female co-pilot told the air traffic controller: “We’re just not sure we’re gonna get enough power to land.” The captain was forced to make a series of sharp “S” turns to lose height as he approached Heathrow. The 34-year-old plane was still too high as it passed over Richmond, six miles from Heathrow, but the pilot was forced to commit to landing because the aircraft lacked the thrust to climb up for another attempt. The report praised the captain’s safe landing of the aircraft but said that the outcome could have been very different in cloudy weather. Campaigners against the expansion of Heathrow have long predicted that a disaster will eventually happen because more than 500 flights a day pass over Central London as they approach the airport. The Government has proposed building a third runway at the airport, which would add 1,000 more flights a week over the capital. Most other big cities have positioned their airports in places that do not require planes to approach over the centre. AEF comment: “Heathrow is by far the most dangerous airport in the country for those on the ground. This is because there are far more planes flying over far more people than anywhere else. This fact is largely ignored by the government, which takes into acount only ‘individual risk’ as opposed to ‘societal risk’.” A new section on public safety will be added to the web site shortly. See below for document which discusses the issue and in particular ‘Public Safety Zones’. AEF paper on public safety (danger) and ‘Public Safety Lower threshold for noise annoyance CAA study finds UK Government fines five aircraft operators for failure to comply with EU ETS Non-EU airlines in spotlight after Saudi carrier breaches emissions rules
cc/2019-30/en_head_0021.json.gz/line1730365
__label__wiki
0.81952
0.81952
CRW Nevinson: A Printmaker in War & Peace Osborne Samuel Gallery, London To coincide with the centenary of the outbreak of World War One, Osborne Samuel gallery will hold a comprehensive exhibition of CRW Nevinson’s prints alongside the launch of a new book titled CRW Nevinson: The Complete Prints, which is to bethe first complete survey of Nevinson’s printmaking career. Nevinson was a noted British war artist, whose predilection for representing the mechanical nature of war set him apart from many of his contemporaries. Having joined the Friend’s Ambulance Unit as a dedicated pacifist in 1914, Nevinson subsequently served with the Royal Army Medical Corps but was invalided out of the army in January 1916. This was not however the end of his war, as an exhibition of his paintings later that year brought him to the attention of the chief war propagandist Charles Masterman of the War Propaganda Bureau. Nevinson was then employed to travel to the Western Front painting in an official capacity for the British government. In spite of his radicalism, Nevinson accepted, and it is to Masterman’s credit that Nevinson’s work largely escaped censorship – despite its stark and direct portrayal of the increasingly mechanised nature of modern warfare, far removed from the romantic artistry that often depicted hand-combat in the early stages of the war. Between 1926 and 1933, Nevinson made 148 prints; etchings, drypoints, mezzotints and lithographs, and some of the most poignant images of war in printmaking history. CRW Nevinson: A Printmaker in War & Peace Osborne Samuel, 23a Bruton Street, London, W1J 6QG 25 September – 18 October 2014 www.osbornesamuel.com 1. CRW Nevinson, a Dawn, (1914) Courtesy of Osborne Samuel Follow us on Twitter @AestheticaMag for the latest news in contemporary art and culture Interview: Sarah Al-Derham To mark International Women’s Day today, we celebrate women in film with an interview with Qatari Filmmaker Sarah Al-Derham. At just 22-years-old, Al-Derham has already directed six films. Profundity & Play: Anish Kapoor: Flashback, Edinburgh College of Art. To coincide with the centenary of the outbreak of World War One, Osborne Samuel gallery will hold a comprehensive exhibition of CRW Nevinson’s prints alongside the launch of a new book titled CRW Nevinson: The Complete Prints. Stuart Semple, Roni Stretch & Antoinette Wysocki, Mead Carney Fine Art, London Celebrated British artist and curator, Stuart Semple, exhibits alongside two groundbreaking US painters, Roni Stretch and Antoinette Wysocki; both showing work in London for the first time.
cc/2019-30/en_head_0021.json.gz/line1730366
__label__wiki
0.871194
0.871194
Dover AFB delivers communication equipment to Virgin Islands By Senior Airman Zachary Cacicia, 436th Airlift Wing Public Affairs / Published September 27, 2017 Airmen from the 439th Contingency Response Flight from Westover Air Reserve Base, Mass., coordinate mobility operations with 3rd Airlift Squadron loadmasters from Dover Air Force Base, Del., and Federal Emergency Management Agency personnel inside a C-17 Globemaster III, Sept. 24, 2017, at Dobbins ARB, Ga. The C-17 delivered FEMA equipment and personnel to the hurricane-ravaged St. Thomas, U.S. Virgin Islands. (U.S. Air Force photo by Senior Airman Zachary Cacicia) A Federal Emergency Management Agency command and control vehicle is unloaded from a C-17 Globemaster III from Dover Air Force Base, Del., Sept. 24, 2017, at the Cyril E. King International Airport on St. Thomas, U.S. Virgin Islands. Dover AFB’s 3rd Airlift Squadron delivered 45,000 pounds of equipment and nine FEMA personnel to the hurricane-ravaged island. (U.S. Air Force photo by Senior Airman Zachary Cacicia) ST. THOMAS, U.S. Virgin Islands (AFNS) -- A C-17 Globemaster III assigned to Dover Air Force Base, Delaware, conducted a humanitarian relief mission to hurricane-ravaged St. Thomas, U.S. Virgin Islands, Sept. 24, 2017. "When our nation calls for Rapid Global Mobility, Dover (AFB) is ready to deliver excellence,” said Col. Ethan Griffin, 436th Airlift Wing commander. “Our Airmen, in both mission support and operations, take great pride in their jobs, as evidenced by a successful aid flight to St. Thomas. As Dover (AFB) crews extend America's helping hand, our thoughts are with those affected by the disasters.” The Dover AFB C-17 stopped at Dobbins Air Reserve Base, Georgia before flying to St. Thomas. At Dobbins ARB, the crew linked up with Federal Emergency Management Agency personnel and their equipment. The C-17 was tasked to transport a FEMA Mobile Emergency Response Support unit’s command and control vehicle, and a land mobile radio tower and its support pickup truck to St. Thomas. This MERS unit involved in the mission is based out of Maynard, Massachusetts. On the ground at Dobbins ARB, Kevin Canfield, FEMA Maynard MERS coordinator, oversaw the redeployment of MERS assets to the U.S. Virgin Islands and Puerto Rico, both riling in the aftermath of two crippling storms. “We have two aircraft going to St. Thomas, one going to San Juan, (Puerto Rico), and one going to St. Croix (U.S. Virgin Islands),” he said. “We will provide a communications package for their first responders and urban search and rescue teams.” MERS will provide mobile telecommunications, life support, logistics, operational support and power generation during presidentially declared emergencies and disasters required for the on-site management of disaster response activities. Also on the ground at Dobbins ARB, a contingent of Airmen from the 439th Contingency Response Flight from Westover ARB, Massachusetts, is in place to support Dobbin ARB’s airfield operations, due to the increase in traffic. “We are a small team that runs command and control and ramp coordination,” said Tech. Sgt. Tom Rowland, 439th CRF contingency response team chief. “Basically our mission is to set up an air base where there is no air base. For this mission, however, we are augmenting. We are here to grease the wheels.” For Dover AFB’s C-17 mission to transport FEMA personnel and equipment, Rowland explained that he is there to help things ramp up at Dobbins ARB and help FEMA get their folks out the door. With help from the 80th Aerial Port Squadron, based at Dobbins ARB, the C-17 aircrew and FEMA personnel were able to successfully load the jet. “From a loadmaster perspective, everything about this load was complicated,” said Airman 1st Class Logan Smith, 3rd Airlift Squadron loadmaster. “We had only six inches of play between the side wall, the trailer, the pickup truck and the other sidewall. Then there was the huge communications truck; it’s just one of those that just barely fits in the plane. It’s super heavy and really tall.” The loaded C-17 departed Dobbins ARB and landed at Cyril E. King International Airport, St. Thomas, U.S. Virgin Islands. Upon landing, the aircraft was quickly unloaded by aerial port Airmen from both the Arizona and Minnesota Air National Guard Airmen. With the delivery of the FEMA personnel and equipment, the C-17 returned home to Dover AFB. Capt. Dan Davis, 3rd AS pilot and aircraft commander, had only praise for his crew and the mission overall. “Everything worked out pretty well and everything was successful,” he said. “We got everything dropped off like we were supposed to.” Although everything went as planned, Davis elaborated on the exceptional experience. “It was great flying into the (U.S.) Virgin Islands and seeing all the support folks on the ground there to help out,” he said. “Flying to the islands was definitely a unique experience, especially with the degraded radar and tower capabilities they had.” 3rd Airlift Squadron 3rd AS 436th Airlift Wing 436th AW 439th Contingency Response Flight 439th CRF 80th Aerial Port Squadron 80th APS AF Air Force Air Force Base air reserve base Airmen C-17 Dobbins ARB Dover AFB FEMA Globemaster III humanitarian aid hurricane loadmaster MERS Mobile Emergency Response Support pilot relief efforts St Thomas U.S. Virgin Islands
cc/2019-30/en_head_0021.json.gz/line1730367
__label__cc
0.728227
0.271773
“Politics is the Greek passion from antiquity to modernity.” Michel de Grèce sounds like a perfect “nom de plume” for a writer, but in your case it is your real name. How come? Because my family ruled Greece for a hundred years, and when we started we did not need a family name and then it was too late. But in my case it became a professional name which I can use. My grandfather came from Denmark. They did not want a ruler from their own country, so they picked up a foreign ruler. Nowadays this is less strange. We have had a Syrian president of Argentina and a Hungarian French president, but there are many examples. King George I of Greece, born in Copenhagen in 1845. Where were you raised? Morocco, Spain and France, where my mother came from. I came to Greece after my French University and started my Greek military service at once. Are you Greek? Yes, and I am Greek by my heart. Greek was my culture. I have lived in Greece since I was 20. I learned Greek in the army, so my vocabulary is not what it should be expected to be. Prince Christopher of Greece and Denmark & Princess Francoise of Orleans (1929) Are you worried for Greece? I find it incredibly difficult to understand entirely what is happening! It is sure that people suffer, many people. It is very complicated because everyone lies. I get a bit lost. I think the crisis that comes is new, but it is an older situation. Everyone is forced to import it. Greece is the heart of Europe. I find the existence of the Euro modern and practical. Since we have had the Euro the cost of life went up, but we need to be in Europe. What kind of people are the Greeks? When I came to live here I was trying to find out what remains of the Greek antiquity. It took me a long time to discover that what remains untouched from antiquity is the Greek people. The Greeks invented politics. It is still the passion of modern Greeks. The plots of ancient Greek tragedy are in the Greek press every day. Ancient Greeks invented sport and they still like it. They are very proud, they have a kind of “Honour” which remains. They are hard workers and still now Greek ship-owners rule the sea. Greek ship-owners have the largest independent fleet in the world. Are you like a normal citizen in Greece? Yes, of course, and I am very happy to be like that. I tell you something, since antiquity Greeks don’t like people in power, but they are particularly kind with people who lost power. What do you think is going to happen in Greece? Ever since Greece existed, from thousands of years ago its history is made of unpredictable events, so how should I know the future? But in its very, very long history Greece has gone through some very difficult times. Greeks are very resistant and strong. Have you always wanted to be a writer? I started writing at 25 and published my first book at 27. For a while in Greece I was part of the monarchy and at the beginning I enjoyed it, and then I felt later it was not my style of life. What kind of a writer are you? History is my field. My French grandmother, the Duchess de Guise, spoke about the family as if they all lived yesterday. History has to be taken with passion. My mother made me read books by the French historian George Lenôtre. Princess Isabelle of Orléans, Duchess of Guise (1878-1961) What are you writing now? I will tell you something. I write in French, I am published in French, but I am quite interested in the future of publishing linked with the Internet. I came to the conclusion that if you want to be known by your writing the future has two conditions, the Internet and the English Language. To answer your question, I am developing my “site”. It doesn’t mean that I will not write another book. To be a royal person like you, Greek and French, with Danish, Russian, and Spanish blood, which means to be the cousin of all the Kings and Queens of Europe, puts you inside history. How is it? It is true that it puts me in direct touch, but when I write I try to be impartial and the other thing is that these Queens and Kings are family for me. Some I like, some I like less, some I don’t like. With some I am closer than others. Family photograph of Danish, Russian and British royal families. (1884) Do you see these Kings and Queens? See yes, and some I know. My favourite ancestor Louis Philippe “the bourgeois king” used to say, “One chooses friends but not family.” But I like to consider some of the kings as my friends. It is true that I am interested in the future of monarchy, I follow what is going on. Louis Philippe I, King of the French Are you concerned that King Constantine is no longer in power? I am sad for him and in some sense the monarchy can offer services. I am a monarchist, but it depends on the people who represent monarchy. It is true that in our time monarchy can still offer some services. Former King Constantine of Greece and his wife Queen Anne Marie. Do you admire the Queen of England? Yes, she is more than a human being she is an historical monument. When I had dinner with her I had the feeling of being with an historical woman. Philip is my first cousin. He is more a human being. She knows to perfection what the English public request and what monarchy should be. She is very much the example, like her ancestor Queen Victoria. Queen Elizabeth II and Prince Philip, the Duke of Edinburgh You are a bohemian, an artist, married to an artist? More than a bohemian, I am free. Freedom is the thing that I most cherish in life. It is not easy to acquire and keep freedom. Sometimes I pay the price. Sometimes it is difficult. Everyone pretends to want to be free, but not many people perfect it. What does it mean to you to be free? To feel, to believe, to think and to do what I want, respecting the rule, which I do. How do you live? Between Monte Carlo, Paris, Athens and Patmos. I have two axes in my life, my family and my work. I write every day and cannot not be doing work. My books sell comfortably. Do you consider yourself an intellectual and do you have friends in the intellectual milieu? I don’t consider myself an intellectual, but a story teller. I love to tell stories to whoever has the kindness to listen to me. I don’t see a lot of intellectuals. I am far more part of the artistic crowd of my wife, and I am deeply interested in spirituality. Are you an observant Greek Orthodox? When Voltaire went to England he was horrified to find that they had one way to make “la sauce” and “42 religions.” He asked a very great Lord, “My Lord, what religion are you?” The Lord answered, “J’ai une petite religion a moi.” Officially I am Greek Orthodox, and I like icons and the atmosphere of the Greek church. The Greek church is linked to patrie. It is very Greek. Orthodox prelates at the wedding of Constantine of Greece and Princess Anne-Marie of Denmark, September 18, 1967 You had a French mother and a French upbringing, but you seem to be more Greek? By heart I am more Greek, even if I have a French education. It is a love story with Greece. As a matter of fact we come more to Greece now, because since a few years my wife Marina and myself have a foundation which takes care of abused children. Years ago I was involved in New York in the worst case of an abused child and so I wanted to do something in that field. We are the first ones to do it in Greece. The difficult thing is to change the mentality. The Greeks have to accept the fact that it exists, even in Greece, and not deny it. And France? I have many friends and family, but since a few years I don’t feel happy, the mentality is not what I like. Countries are like human beings. They go down and then they go up again. France is sadly going down. I am less happy there than I was. And Patmos? It is my paradise. We started coming 30 years ago, and we have our house since 15 years. It is beautiful, has a very strong energy, here I work well and I feel well. I have this place and I spend more and more time here, in Spring, Summer and Autumn. I have had three paradises in my life, my grandmother’s house in Northern Morocco, then some friends’ house in Mexico near Oaxaca, and now Patmos. Do you travel quite a lot? Yes, I have three favourite directions. The Middle East: Egypt, Lebanon, Syria and Turkey. Then India and Mexico. What do you feel about what is going on in the Middle East? I knew Islam since I was a child. I never could imagine that we would see what we see now. I have difficulty to conceive that such things are happening. It is so barbaric, inhuman, it is beyond any imagination. I know Palmyra and Aleppo by heart. It is terrible, because the image I have of these people and countries is so different. After the Second World War there was a certain appeasement, I could travel everywhere. Now I can’t. It is not safe any more to travel from India to the Atlantic. What is troubling is that it is not a declared conflict. 50 million migrants, and no one knows how to face it. These crises are new, terrifying, and no one knows how to treat them. For many years you lived in New York? Yes, in the Eighties. I loved New York and at one point we had to choose, and we decided to come back to our roots. Which one of your books is your favourite? “La femme sacrée” about the Maharani of Jhansi. She is the heroine of the Indian mutiny, young, beautiful, she died in a battle, everything. I love her, she is my favourite character. Writing the book was very interesting. I wrote my book 90% on oral tradition and there were only two generations between the Rani’s time and today. I went to the place, it was a unique experience. I stayed two months in India… I was in heaven. Indians are interested in the period. At the end of the day you love the past, but are you also intensely interested in the future? I am fascinated by the time we live in and try to see what other perspectives there are on the future. The past for me is history is because it is an endless source of story. Fiction cannot surpass history. One thinks wrongly that because history is the past it is over. History is alive. Have you had a very full life? I suppose so. But life is still full and I want the future to be full. I am 76 and I don’t understand what it is to be retired, and I don’t intend to be retired. I like to be active. The word death for me does not exist. For me another world exists, it is a passage from this state to another state. Do you have many friends? There are many people I like, and some friends. They are of every age and country and social class. I like talking to people, but with the coming of age I am more choosy and intolerant. Intolerant of what? Egoism, laziness, intolerance. Prince Michael of Greece.com PreviousDante Ferretti NextMassimiliano Fuksas Jonathan Taplin Bruce Boucher
cc/2019-30/en_head_0021.json.gz/line1730372
__label__cc
0.690129
0.309871
How a wrong turn led to forming an academy for refugees Sydney Levin, AOL.com A wrong turn ended up being the right turn for Luma Mufleh when she spotted a group of refugees playing soccer in Clarkston, Georgia. HLN has more about this woman's inspiring story. Wrong turn was the right turn 'One woman says that she never thought making a wrong turn would inspire her to start a soccer team. Fugee soccer started off by accident.' It was indeed an accident, but it gave Mufleh purpose. After seeing a group of kids playing soccer, she returned to the area later in the week ... and came prepared. 'This time I was armed with a soccer ball.' From that point, she began coaching them. Born in Jordan, Mufleh came to the U.S. at the age of 18 to attend college. She tells Voice of America seeing the kids play brought back memories. 'Playing without shoes, they had two little rocks set up as goals. It reminded me of home.' According to Access Atlanta, Clarkston's population went from 90% white to 14% white over the course of 30 years. This is due to the arrival of refugees from more than 40 countries. Mufleh tells CBS all the refugee kids have experienced some type of hardship and have fled their countries because of war. 'The civil war in Sudan, the war in Ethiopia and Eritrea, and Congo, and Iraq.' Mufleh tells HLN after practice the kids started asking her for help with homework. So she began going apartment to apartment, tutoring them. But that wasn't enough to help them graduate. With donations and money from her own pocket, Mufleh started the Fugees Academy to fulfill the needs she says other schools didn't. Mufleh acts as a principal, coach and parental figure. Fugee Academy student and soccer player Obai, 13, tells CBS about the program. 'Today I wouldn't be the young man I am without the Fugee and coach.' Another refugee also expressed gratitude. 'If I hadn't been here I could've been dragged into being a gang member, and that's not a great thing.' Although the kids are thanking Mufleh, she in turn thanks the U.S. She tells Voice of America 'Where else would an Arab-Muslim woman be able to coach teenage refugee boys from 28 different countries?' Don't miss the biggest stories of the day. Get breaking news delivered directly to your inbox. No, I don't want more breaking news delivered to my inbox daily
cc/2019-30/en_head_0021.json.gz/line1730375
__label__wiki
0.851084
0.851084
- Professional Licensee Home // About APEGA // Past-Presidents // 1957: J. Campbell Sproule, P.Geol. 1957: J. Campbell Sproule, P.Geol. Born in Edmonton, Dr. Cam Sproule graduated from the University of Alberta in 1930 with a bachelor of science degree specializing in geology. He continued his geology studies at the University of Toronto, receiving a master's degree in 1931 and doctor of philosophy degree in 1935. Over the next four years he worked for the Geological Survey of Canada, covering areas in Saskatchewan, Quebec and Nova Scotia. In 1939 he was hired by Imperial Oil Ltd. as geologist and exploration manager for the company's Saskatchewan operations, then moved to Toronto in 1946 to become chief advisory geologist for International Petroleum Company. In 1951 he moved to Calgary to work as a consulting geologist. A member of council of the Association of Professional Engineers of Alberta (APEA; now The Association of Professional Engineers, Geologists and Geophysicists of Alberta) in 1955, Sproule was elected association vice-president in 1956 and president the following year. He was subsequently awarded Honorary Life Membership. He was also president of what is now the Canadian Institute of Mining, Metallurgy and Petroleum in 1959 and in 1963 became the first Canadian president of the American Association of Petroleum Geologists. In 1966 the Engineering Institute of Canada awarded him the Julian C. Smith Memorial Medal for achievement in the development of Canada. He was also a fellow of the Royal Society of Canada, the Geological Society of Canada and the Geological Society of America. Sproule played a key role in developing the petroleum industry in the north and in 1967 received the association's Centennial Leadership Award in honour of his work in the Canadian Arctic. He passed away in 1970 in Jasper while completing a paper on the geology of the Canadian Arctic islands.
cc/2019-30/en_head_0021.json.gz/line1730376
__label__wiki
0.865768
0.865768
Home / Amazing story of the taj mahal / construction of the taj mahal / mughal emperor shah jahan / mumtaz mahal / shah jahan and mumtal mahal love story / Taj Mahal in Agra / World heritage taj mahal / The Amazing Story of the Taj Mahal The Amazing Story of the Taj Mahal Amazing Life Fact April 30, 2018 The Taj Mahal in Agra, built by the Mughal Emperor Shah Jahan and listed as one of the new seven wonders of the world, has a deeply touching story. It is the story of the extraordinary love that Mughal emperor Shah Jahan had for wife Mumtaz Mahal, a tale that has been captivating the hearts of millions throughout the ages. Prince Khurram, who later came to be known as Shah Jahan, was born in the year 1592. When he was in his teens, he got attracted to Arjuman Banu and fell head over heels in love with her. And when he told his father Jehangir, the fourth Mughal emperor of India that he was in love with Arjuman Banu and desperately want to marry her, the emperor gave his consent and they were eventually married in 1612. After the wedding, the bond of love between them grew stronger and Arjuman Banu received the title of “MumtazMahal” from her husband, which meant "Jewel of the Palace”. Shah Jahan loved Mumtaz far more than any of his other wives and couldn`t live away from her. When he had to travel on his military expeditions, she was the one who always went with him. And it was due to his deepest affection for his wife that he also gave the Imperial Sea-Muhr Uzah to her. However, destiny had other plans for this royal couple. Shah Jahan`s beloved wife died while delivering their 14th child and this tragic incident overwhelmed the emperor with extreme grief. He was grief-stricken to such an extent that his mourning lasted a whole year. He couldn`t believe that his wife was really dead and even went to the extent of digging up her corpse, taking it to Agra and building a mausoleum for her. And it is this marvelous mausoleum, the monument, the tomb, built at the cost of millons, using exquisite white marbles and other precious stones, that came to be known as the Taj Mahal, one of the seven wonders of the world. Famous worldwide as the embodiment of love, the Taj Mahal is a white marbled monument of architecture that reflects the glorious combination of Islamic, Turkish, Persian, Indian and several other art styles. What is also remarkable is that the Taj Mahal was made by using the best available materials brought from myriad locations throughout Asia. The precious turquoise stone was brought from Tibet, white marble from Rajasthan, sapphire from Arabia, crystal from China and so forth. With regard to this amazing mausoleum, it is also noteworthy that it was not built in a few months or one or two years; rather, the construction of the Taj Mahal was completed in more than a decade and it involved over 20,000 labourers and 1000 elephants. According to historical sources, it was Ahmed Shah Lahauri who was appointed as the chief architect to build the Taj Mahal. His efforts, assisted by thousands of workers, resulted in this grand monument that attracts millions of visitors per year from all over the world. Both Shah Jahan and MumtazMahal are no more but their love is still alive and breathing, in the form of the Taj, the epitome of everlasting love. It is the very existence of this glorious piece of architecture that speaks out that true love never dies, that true love is everlasting. What can be more magnificent than this glorious and extraordinary monument that an emperor has built as a memorial to his beloved wife and which has been recognized by the UNESCO as the World Heritage Site? All you have to do is to visit or revisit the Taj Mahal and what you will gain will be no less than the experience of a lifetime. Amazing story of the taj mahal construction of the taj mahal mughal emperor shah jahan mumtaz mahal shah jahan and mumtal mahal love story Taj Mahal in Agra World heritage taj mahal World heritage taj mahal
cc/2019-30/en_head_0021.json.gz/line1730377
__label__cc
0.697154
0.302846
Top 5 Things to Remember When Doing a Social Media Campaign At Ars Technica we've done a number of social media campaigns in the past, and we've learned quite a bit about what it takes to make these e Jon Stokes Deputy Editor of Ars Technica, Ars Technica At Ars Technica we've done a number of social media campaigns in the past, and we've learned quite a bit about what it takes to make these efforts successful. All such campaigns are run on our forums, where they provide advertisers with a high level of engagement and they give forum users a chance to interact directly with brands to provide feedback, ask questions, and gain greater insight into more than just the specifics of a product. Participants in social media campaigns can actually learn about the "whys" behind a product or product line, instead of having the "whats" marketed at them. In many ways, social media campaigns are an even better fit for SMBs than they are for larger companies. Take a look at our list below of five things you should remember before jumping on the social media bandwagon, and try to imagine the relative difficulty of a large corporation doing these vs. an SMB. Though it's by no means impossible for a Fortune 500 company to do all of these things, small and medium businesses will have an easier time with most of them. 1. Make your technical people available for social media opportunities, and not just your marketing people. Different communities have different levels of technical savvy, and Ars Techncia's community is known for one of the savviest. This makes it critical that companies be prepared to put their most technical foot forward (to mangle the metaphor) when their representatives engage our community directly in the context of a social media campaign. Our users don't come to Ars to be marketed to--they come to contribute their time and their considerable expertise, and they expect everyone they engage with, including sponsors, to do likewise. You may be targeting a less tech-savvy community with a social media campaign, but the point still stands. If just one well-respected member of your target community is tech-savvy, and if this member makes a fool of your marketing folks when they arrive on his or her home turf to do a sales pitch, then that's all it takes to damage your brand in the eyes of that community. 2. Acknowledge legitimate criticisms. No product is perfect, and in many cases dedicated users will have a serious gripe about some aspect of your product. It's important to own these criticisms, instead of either ignoring them (bad idea) or getting your back up and getting into a fight with users (worse idea). If you try to ignore a criticism that is indeed legit, other community members might smell blood and gang up on you, in which case you can go from being a guest to a hostile outsider very quickly. And, of course, if your social media person decides to dig in and fight it out with the users, even formerly friendly users may join the instigator in ganging up on you. The best way to handle legitimate criticism (and your technical people are the ones who can really tell you if it's legit or not) is to ackowledge your shortcoming and pledge to improve it. A "we know this is an issue and we're working on it--what input can you give us?" moment can be great for a brand, and we've actually seen this work. It diffuses any hostility, and users feel flattered that you're treating them like partners in your quest to give them a better product. 3. Be prepared to intervene in a social media discussion outside of normal business hours. If you're doing a social media campaign with that involves direct engagement between your people and end-users, be aware that the end-users don't necessarily limit their participation in discussions to normal business hours in your time zone. A discussion can go off the rails at midnight, and you could wake up to a few hundred comments that are either off-topic or hostile. This means that your people have to be checking into the discussion periodically whenever they're awake, and they should be prepared to jump in and get the discussion back on track at any time. 4. Keep all stakeholders in direct contact, so they can coordinate directly to address any problems that come up. As a followup to the previous point, it's difficult to address a developing, user-generated flare-up if the brand representatives and the host community's representatives have to play a game of "telephone" through too many intermediaries. "Telephone" may work fine when you're launching the campaign, but in emergencies you'll need to be able to move a lot faster. 5. Know when a social media campaign isn't a good fit. If your product has real shortcomings that you're not prepared to acknowledge and fix, then a social media campaign is probably not the best idea. Likewise if your company is a target of protest for labor or environmental practicles. In short, know the terrain you're heading in to (again, your technical people are a good resource here), and know when to pass on social media opportunities.
cc/2019-30/en_head_0021.json.gz/line1730378
__label__wiki
0.766951
0.766951
Netanyahu's Victory and Obama's Response By Michael Curtis A saying attributed to Eleanor Roosevelt is that small minds discuss people, average minds discuss events, and great minds discuss ideas. This is not applicable to all commentators on public affairs but sadly rather true about the remarks made by the White House after the victory of Israeli Prime Minister Benjamin Netanyahu in the parliamentary election in Israel on March 17, 2015, as well as declarations during the controversy over the speech Netanyahu delivered to a joint session of Congress on March 3, 2015. Some of the remarks about the person of Netanyahu are hyperbolic, disrespectful, and quite inexplicable. National Security Advisor Susan Rice, before the election, declared that Netanyahu’s speech would be “destructive of the fabric of the relationship” between the United States and Israel. After the Israeli election, White House spokesman, Josh Earnest, spoke of the “divisive rhetoric that seeks to marginalize Arab Israeli citizens, and undermines the values and democratic ideals that have been important to our democracy and an important part of what binds the US and Israel together.” It must come as a shock to the New York Times and the rest of the mainstream media to learn that “divisive rhetoric,” if not playing the race card as in U.S. elections, is used in hard fought national political campaigns in other democratic countries. The media must also be bewildered that “values and democratic ideals” have been perverted by an Israeli election in which 25 political parties participated, and in which ten parties got seats. In the high poll, 71.8% of the electorate voted, 17% higher than those voting in the 2012 U.S. presidential election and 35% higher than in the U.S. Congressional election in 2014. On that basis which country better fulfills democratic values than Israel? Most important in the commentary is the absence of attention by the White House to the participation and relative success of Israel Arabs in a free and fair election. The threshold to gain seats in Israel’s proportional representation electoral system was raised from 2% to 3.25%. Far from being “marginalized” the Arabs thus formed a united party, the Joint List, composed out of four previous Arab parties, that got 11% of the poll and 13 seats in the 120 member Knesset. This success makes the Joint List the third largest party in the Knesset. Since 4 other Arabs were elected from other parties there are now 17 Arabs in the parliament, almost the proportion of Arabs living in the State of Israel. Estimates show that about 65% of the Arab population of Israel voted. In contrast, the estimated vote of African-Americans in the U.S. 2014 Presidential election was less than 25%. It is also worth noting in the “marginalization” that the chairman of the Israeli Central Elections Committee, that oversees the election formalities, is an Arab judge. Two factors are particularly interesting. One is related to the surveys taken of the expressed concerns of Israeli Arab voters. These show that Arab voters are concerned with socio-economic conditions and their civil status, not with the issue that concerns the White House, the need for a Palestinian state. Those concerns and priorities are about employment, education, healthcare, and neighborhood crime, rather than statehood issues. There appears to be a significant ideological gulf between Israeli Arabs, living in a country with civil liberties and being part of a democratic system, and Arabs living in the West Bank and in Gaza. The other factor is that Israeli Arabs, more represented and more confident, can be expected to play a more considerable role and have more clout in the politics of Israel. What impact that will have on the security concerns of Israel and the possibility of a Palestinian state remains to be seen. The main issue with which the U.S. administration is concerned is that of a Palestinian state. President Barack Obama appears to be more concerned with maintaining this stance than in offering congratulations to Prime Minister Netanyahu. Other political leaders, British Minister David Cameron, Chancellor Angela Merkel, President Francois Hollande, the prime ministers of Australia, Netherlands, Romania, Czechoslovakia, and India, and the foreign affairs head of the European Union, quickly made the customary polite remarks to the Israeli leader. Prime Minister Cameron had twittered that he looked forward to working with the government of Israel, one of Britain’s closest friends. The White House appeared less enthusiastic and certainly less personally cordial. The formal cold statement issued after the belated phone conversation between the U.S. and Israeli leaders stated they agreed “to continue consultations on a range of regional issues, including the difficult path forward to resolve the Israeli-Palestinian conflict.” However, much more pointed were the remarks of Obama and his spokespeople that the U.S. was reassessing its approach to Israeli-Palestinian peace efforts. One can imagine that reassessment will entail a number of factors, including UN resolutions on a Palestinian state, and the attempt of the Palestinian Authority to bring charges of war crimes against Israel to the International Criminal Court. One issue will certainly be that of the Israeli settlements, that, in the words of the Secretary of State Hillary Clinton in spring 2010, were a “deeply moving signal” that harmed the bilateral relationship, and that Obama considers illegal. The lack of warmth of the U.S. leader to his Israeli counterpart has long been evident, but it must be disregarded in the effort to achieve a lasting peace. Differences inevitably arise between allied nations, and the current issue of a nuclear Iran is a pressing and controversial one on which Obama and Netanyahu differ. But for 40 years, U.S. policy in the Middle East has been based on shaping an Israel-Arab peace agreement resulting from a process of negotiations between the two parties, not from unilateral actions. For Obama to support a UN Resolution calling for a Palestinian state would be to transform what has been a bipartisan U.S. policy into a one party point of view. In the interests of peace as well as harmonious US-Israeli relations it is essential that Obama rethink his immediate response to Netanyahu’s victory. Obama had already injected himself into the Israeli electoral campaign if only indirectly as a result of the work of Democratic Party operatives. Netanyahu was perhaps excessive in his rhetoric that complained of the foreign-funded effort to topple his party. Yet he was correct that a group, led by a former national organizer for Obama, had set up the electoral V15 organization and boasted they were doing a job of getting out the anti-Netanyahu vote with over 15,000 volunteers throughout Israel. In this connection it is not encouraging that Robert Malley, whom Susan Rice called one of “my most trusted advisors”, was appointed on March 6, 2015 as White House Coordinator for the Middle East. He is known both for having blamed Israel for the failure of peace talks, and for his friendly contacts with Hamas. Obama expressed displeasure at Netanyahu’s pre-election comment that he did not approve a Palestinian state while there was chaos in the Middle East, a qualification that was not understood or ignored by many commentators. It would be wise to accept the Netanyahu’s statement that he remains committed to a demilitarized state of Palestine if conditions are satisfactory, and if PA President Abbas recognizes Israel as a Jewish state. This means a sustainable, two-state solution if conditions in the region change. One of these conditions is for Abbas to end his shaky pact with the terrorist Hamas entity in Gaza. Netanyahu explained his position by arguing that Islamist forces have absorbed every territory that has been vacated in the Middle East. Now that’s an issue for discussion by great minds.
cc/2019-30/en_head_0021.json.gz/line1730379
__label__cc
0.675678
0.324322
2006 Lifetime Service Award 2006 Advancing Trails Awards This award recognizes an individual demonstrating longstanding, significant, and exemplary service to trails planning, implementation, and recreation. Bill bicycled to work for 40 years! Bill was born William Baumgarten Bliss on December 23, 1935. For 40 years, Bill commuted to work from his home in San Jose to Lockheed in Sunnyvale. This coincided with his never-ending crusade for safer trails, bicycling, and bicycling facilities. Bill was tragically killed when hit from behind by a motor vehicle June 24, 2005 while riding his bicycle across the country. Bill said, "It is not how fast you ride, all that matters is that you are moving in the right direction." This was Bill's approach to biking, advocacy, and life. He did not have to "win" a point, but he would revisit issues and stick with problems until they were solved. Always the voice of reason, Bill calmly steered those with competing points of view toward supporting each other. He would save his battles for a later day rather than offend anyone. Bill was probably the most knowledgeable bicycle advocate in California and beyond. He was very patient in explaining bicycling law, its reasoning and purpose to those with little prior knowledge. Bill was never too busy to be a teacher. Bill served on many advisory boards, committees, and task forces, and he exemplified "service." Regardless of the number of organizations he was involved with, he regularly attended meetings and made valuable contributions. By age 69, Bill had peddled 300,000 miles. Two weeks after retiring from Lockheed, Bill departed on a year-long trip around the world, and was one of only a few riders that rode the entire route. At his retirement party, Bill quoted the following words: "The past is history. The future is a mystery. The moment is a gift. That is why the moment is called the present." These words guided his life, his devotion to his family, work and the cycling community. He would still be peddling and advocating today if he'd had the chance. He made all of his moments count. 2015: Mel Huie 2013: Steve Elkinton 2010: Kurt Loheit 2008: Ronald G. Strickland 2004: Deb Schnack
cc/2019-30/en_head_0021.json.gz/line1730380
__label__wiki
0.710634
0.710634
DPC's Annual Report - insights into regulation in 2015 DPC’s Annual Report - insights into regulation in 2015 The Office of the Data Protection Commissioner (DPC) has published its Annual Report for 2015. As usual it reveals some interesting statistics and case-studies, and provides an insight into the DPC's approach to regulation. Approach of the DPC to regulation In 2015 the DPC continued her "engaged approach" to regulation. She engaged in consultations with organisations, rather than simply watching for transgressions. Whilst consultation is not currently mandatory, it is sensible for companies to have a meaningful dialogue with the DPC regarding proposed new policies, products and services. The Report notes that her engagement with the world's leading technology companies which have their European headquarters in Ireland, in particular Facebook and LinkedIn, has led to her being given advance preview of global changes that those corporations intend to implement. Her office has also engaged in extensive consultation with other private and public sector bodies. In 2015, her office received 860 requests for guidance towards compliance with data protection laws from organisations. However, the DPC warned that her office does not have the resources to replace the requirement for organisations to procure their own expert advice to ensure compliance, and that the new General Data Protection Regulation (GDPR) will bring an increased power of enforcement for data protection authorities. The GDPR also explicitly requires organisations to organise themselves to ensure they are protecting individuals' right to privacy and to demonstrate their accountability in this regard. The DPC has a statutory obligation to seek to amicably resolve complaints in the first instance, and in 2015 her office successfully achieved an amicable resolution in 94% of the investigations it conducted into complaints by data subjects against organisations. The DPC received 932 complaints from individuals in 2015, only 52 of which required a formal decision under section 10 of the Data Protection Acts 1988 and 2003 (the Acts). She prosecuted 4 entities under the ePrivacy Regulations 2011 for direct marketing offences. These statistics show that meaningful engagement by the DPC with organisations has paid off. Last year, the main issues dealt with by the office of the DPC included: CCTV in the workplace, direct marketing by SMS; email messages issued without consent; banks failing to keep personal contact information up-to-date, and non-responsiveness to data subject access requests. These issues are discussed in the case studies appended to the report. Data Subject Access Requests As in 2014, the largest category of complaints in 2015 concerned data subject access requests, accounting for 62% (578) of the total complaints received. The Report notes that this reflects the increased awareness by the public of their statutory right of access to their personal data, and also the difficulties faced by individuals in exercising their right of access. Responding to data access requests is a challenge for many organisations due to the volume of information requested, and because it is often made in the context of litigation or some other dispute by aggrieved customers or employees. The DPC plans to conduct an awareness campaign highlighting data access issues during 2016. Electronic Marketing The second highest category of complaints concerned electronic direct marketing, accounting for 11% (104) of the total number of complaints. This was a sharp decrease of 72 complaints compared with the previous year. The DPC attributes this decrease to the success of her Office's active prosecution strategy for direct marketing offences, which generates negative publicity against the entities prosecuted. Data Security Breach Notifications In 2015, there were 2,317 valid data security breach notifications, compared with 2,188 in 2014. The highest category of data breaches reported under the Personal Data Security Breach Code of Practice (non-legally binding) were unauthorised disclosures such as postal and electronic disclosures. The majority of these disclosures occurred in the financial sector and accounted for 54% of the total data breach notifications received in 2015. Businesses might be surprised that in the majority of personal data breaches reported to the DPC, only one or two individuals have been impacted. It is worth noting that whilst only telecommunications companies currently have a mandatory obligation to report data security breaches to the DPC, the GDPR brings stricter breach reporting obligations, requiring all data controllers to notify the DPC of any data security breach that occurs. Enforced Subject Access Requests An "enforced subject access request" occurs where an individual is obliged by an employer, potential employer or recruitment agency to make an access to a data controller (such as An Garda Siochána). Such requests constitute a criminal offence under section 4(13) of the Acts. Last year, the DPC wrote to forty organisations across a range of sectors in an effort to identify companies engaged in the practice of requiring individuals to make subject access requests. The DPC was satisfied that no entity investigated sought to deliberately breach the Acts, but nevertheless found that a number of organisations were in breach of section 4(13). The DPC warns that her office will continue to monitor organisations throughout 2016 to combat practices entailing enforced subject access requests. The DPC carried out 51 audits and inspections last year on major holders of personal data in the public and private sectors. Just under half of these were unscheduled inspections under section 24 of the Acts. Advance notice of these varied from unannounced (two in 2015) to a few weeks' notice. The Report highlights that entities are targeted for audit based on the amount and type of personal data processed by the entity, as well as the number and nature of complaints the office of the DPC receives. In 2015, the DPC focussed, in particular, on recruitment practices as part of a wider investigation into enforced subject access requests; insurance companies regarding their access to penalty-point data; the deployment of CCTV in a range of shopping centres and retail outlets, and a review of the data protection policies and procedures in three utility companies. Ten key audit findings included: lack of data-retention policy; lack of signage of policy for CCTV systems; excessive use of CCTV systems; lack of audit trails to identify inappropriate access; poor call-handling security procedures potentially allowing for "blagging"; illegal use of enforced subject access requests; lack of clarity in relation to data controller/data processor contracts; clear identification of a data controller where a debt collector has been engaged; excessive use of biometric time and attendance systems, and excessive use of body-worn cameras. Last year, with its increased resources, the office of the DPC established a Special Investigations Unit headed up by an Assistant Commissioner. The Unit carries out investigations on its own initiative (as distinct from complaints-based investigations). In cases where it identifies offending behaviour, it will use the DPC's statutory powers to progress its investigations. The Report also highlights the decision of the European Court of Justice (CJEU) in the case of Maximilian Schrems versus the Irish Data Protection Commission last year, which clarified the role of data protection authorities in examining complaints even where the matter complained of is a binding EU instrument, as well striking down the Safe Harbour agreement. The issue of EU-US transfers of personal data continues to occupy the DPC. Last month, she sought a referral to the CJEU to determine the legal status of international transfers under Standard Contractual Clauses (see here for further information). It remains to be seen whether they will similarly be struck down by the CJEU. In the meantime, good news for multinational companies transferring data from the EU to the US is that the Article 31 Committee is expected to vote on the EU-US Privacy Shield (to replace the Safe Harbour agreement) this week which, following a positive vote, would allow the Shield to be adopted by the European Commission next week. The other major news for 2015 was the political agreement on the new data protection framework in Europe, in the form of the GDPR. It will be enforced by European data protection authorities from 25 May 2018. See our dedicated GDPR website for further information. For further information please contact Davinia Brennan at or any member of the IP & Technology Team.
cc/2019-30/en_head_0021.json.gz/line1730382
__label__wiki
0.734964
0.734964
Iraq's education setback The Iraqi education system has witnessed two setbacks in the last 14 years, which has left it in ruins. US posters replaced Baath slogans in Iraqi schools UN sanctions imposed on Iraq in 1990 after the invasion of Kuwait badly affected education in Iraq. Following the 2003 US-led occupation, education deteriorated to dangerously low levels. According to the UNESCO, until I989 Iraq had been allocating 5% of its budget to education. This percentage is higher than the maximum rate in developing countries which stands at 3.8%. Tens of thousands of new schools were built across Iraq between 1960 and 1990. In the 1990s and under the UN sanctions on Iraq, the number of schools needing urgent repair in central and southern Iraq reached 8613 out of 10,334. This number has increased after the war on Iraq in 2003. US appointed Iraqi authorities have started a campaign to reconstruct Iraqi schools. Muzhir al-Dulaymi, spokesman for the League for the Defence of Iraqi Peoples' Rights, told Aljazeera.net contracts for reconstructing schools in Iraq were not adequate to upgrade educational premises to the required standard. "Companies are winning bids worth millions of dollars to reconstruct schools, but in fact schools have only been painted. No improvement to the infrastructure, and no new equipment has been brought." said al-Dulaymi. Iraqi school during wave of resistance attacks last November Aljazeera's correspondent in Baghdad said the painting was not exactly part of the reconstruction plan, but was carried out to change the characteristics of Saddam Hussein's time. "Schools were painted to wipe out slogans on school walls put up during the Saddam Hussein era" said Harif. Anmar al-Azzawi, an Iraqi citizen,said students had seen nothing new in their schools, although ministry of education officials promised many new changes. "Schools were only painted. My children have received the same torn books, and none of the stationery Iraqi pupils used to get for free" he said. Iraq was unable to build new schools during the 1990-2003 period of UN sanctions. In 1980, five hundred pupils attended one school, while in 2003 the number has risen to 4500 pupils for each school. The US occupation authorities handed over the ministry of education to Iraqis last month. Al-Dulaymi said they did this to avoid the headache of having to fulfill their promises. Some Iraqi pupils left school for security reasons "So … they handed over the ministry of education to Iraqis. The question is, are they willing to spend enough money to develop education in Iraq?" he said "will the occupation authorities give Iraqis the right to allocate enough money to reconstruct their education system? Let us see what the future brings." Children out of school The number of pupils under 12 who have left school in order to earn a living has significantly increased since 1990 when the UN imposed sanctions on Iraq. UNESCO reports say that before the sanctions there were 95,692 school leavers in Iraq. But in 1999 and after nine years of sanctions 131,658 Iraqi children were out of school. "Companies are winning bids worth millions of dollars to reconstruct schools, but in fact schools have only been painted. No improvement to the infrastructure, and no new equipment has been brought." Muzhir al-Dulaymi, spokesman for the League for the Defence of Iraqi Peoples' Rights The number has increased since the occupation of Iraq and is unlikely to be reduced in the near future, despite promises made by US appointed Iraqi authorities. Leaving school before 12 was an offence in Iraq, established in the 1970s, but this law has become invalid since the collapse of the Iraqi state in April 2003. "The number of children out of schools is not monitored anymore" Harif said. Earning a living is not the only reason behind leaving school. The security and political situation is also a major factor. "There are people who have stopped sending their children to school fearing they may be kidnapped" said Harif, "Also we should not forget other factors, like a large number of children have left school in Shia areas to join al-Mahdi army."
cc/2019-30/en_head_0021.json.gz/line1730383
__label__wiki
0.987112
0.987112
Interpol chief faces graft charges South Africa's police chief fails to in legal bid to stop his prosecution. South African prosecutors have not indicated when Jackie Selebi will be arrested [AFP] Selebi's indictment covers a range of offences, including receiving payments from his friend, Glenn Agliotti, a convicted drug smuggler accused of playing a role in the murder of a South African mining magnate, Brett Kebble in 2005. The decision to charge Selebi is likely to raise fears of political instability in South Africa, where Mbeki and his rival, Jacob Zuma, the new leader of the ruling African National Congress (ANC) are locked in a power struggle. The NPA charged Zuma with corruption, fraud, money laundering and racketeering less than two weeks after he won the party leadership from Mbeki last month. This fuelled allegations that the charges had been used as a political weapon. Court papers filed by the NPA before the decision to charge Selebi said he faced no prospect of imminent arrest and that arrangements over a court date would be reached with the police chief's lawyer. Mokotedi Mpshe, the NPA's acting director, said "I don't think it is going to be that long" before Selebi is charged. Investigator arrested Gerrie Nel, a senior official of the Scorpions, an elite unit of the NPA, who was leading the investigation into Selebi, has also been arrested on corruption charges. The charges against Nel, who is due in court on Monday, include fraud and "defeating the ends of justice". Selebi is accused of receiving money from Agliotti on several occasions, including $4,400 for a dinner in Paris to celebrate his appointment as president of Interpol. The indictment says that between 2000 and 2005 Selebi received at least $177,000 from Agliotti and his associates. Selebi's friendship with Agliotti has put him under the spotlight as South Africa has one of the world’s worst rates of violent crime. His police force is under mounting pressure to make the streets safe before South Africa hosts the football World Cup in 2010.
cc/2019-30/en_head_0021.json.gz/line1730384
__label__wiki
0.988889
0.988889
Appeal over Bashir genocide charges ICC said it has 'insufficient evidence' to charge Sudan's president with genocide. Al-Bashir has denied ICC prosecutors' charges of committing war crimes in Darfur [EPA] They said the tribunal only needed to prove that there are "reasonable grounds to believe" al-Bashir was responsible for genocide. Luis Moreno-Ocampo, the chief prosecutor at the ICC, also called for the case to be sent back to the ICC's pre-trial chamber. 'Strong' appeal He told Al Jazeera: "We believe it's a mistake. "They requested a level of evidence beyond any doubt and this is the level of evidence [needed] for the conviction, not for the beginning of the trial. "This is the main reason we are appealing. "I think we will win. I believe we have a strong case to win this appeal. I believe we have a case of genocide." Mark Ellis, the chairman of the International Bar Association, told Al Jazeera that charging an individual with genocide was a "complex legal process". "It requires the prosecutors to prove the individual had a specific intent to destroy an ethnic group," he said. "Whether or not the prosecutor is successful really will have no bearing on the case itself. It will move forward." AU rejection Al-Bashir has denied the prosecution's allegations and has refused to recognise the court's jurisdiction. Leaders of the African Union said on Friday they would no longer co-operate with the ICC and would not arrest and extradite the Sudanese president. Al-Bashir was indicted over his alleged role in the conflict in Darfur, which the UN says has displaced an estimated 2.7 million people. The UN says up to 300,000 people have died since the conflict began in 2003 between ethnic minority rebels and the Sudanese government. Sudan's government disputes the figures, saying 10,000 people have been killed.
cc/2019-30/en_head_0021.json.gz/line1730385